NTT Technical Review, November 2012, Vol. 10, No. 11

Total Page:16

File Type:pdf, Size:1020Kb

NTT Technical Review, November 2012, Vol. 10, No. 11 Feature Articles: Communication Science that Connects Information and Humans Information Processing of Sensor Networks Takayuki Suyama and Yutaka Yanagisawa Abstract In this article, we introduce technologies for collecting information from many sensor nodes deployed in the environment and/or attached to people, interpreting the sensor data as meaningful information, and presenting it to people appropriately. 1. Introduction In our daily lives, we are surrounded by many sen- sors. For example, a video game machine uses an accelerometer as one of its input devices, and a mobile phone uses GPS (global positioning system) to determine the user’s location. In the field of weath- er forecasting, pressure, temperature, and other infor- mation about various places is collected in a network and utilized in creating a weather forecast. Although individual sensors are used in various situations, sen- sor networks are becoming easier to use as a result of sensor evolution and the spread of sensor network technology driven by progress in semiconductor technology. Sensor networks and their information Fig. 1. Sensor nodes. processing technology are expected to be used for various purposes, such as collecting information to enable the provision of appropriate services that suit sides of about 1 mm to 2 mm, and observes environ- a particular situation and for recognizing the real mental information collected from the sensor nodes. world. However, the need for miniaturization, which was initially advocated and dictated the sensor node’s 2. Research on sensor networks size, is no longer considered to be such a high prior- ity. Research on sensor networks is progressing with a The flow of information on a sensor network is focus on a sensor node equipped with various sen- shown in Fig. 2. We assume that sensor nodes are sors, a calculation function (central processing unit deployed in the environment and/or attached to peo- (CPU), memory, etc.), wireless-communications ple. First of all, it is necessary to collect information functions, a battery, and networking capability. The efficiently from a lot of sensor nodes. Because the sensor nodes that we have developed are shown in collected sensor data is the waveform of a time series, Fig. 1. Such research was triggered by the Smartdust it is difficult for humans to understand the waveform’s project announced in 1999. In the Smartdust concept, meaning. So the next step is to interpret such time the user deploys many sensor nodes, each of which series information. When suitably interpreted mean- consists of sensors, a battery, a digital signal proces- ing is presented to the user, the collected sensor data sor, and a transmitter assembled into a cuboid with is finally being used effectively. 1 NTT Technical Review Feature Articles Collection Interpretation Sensor data 50 40 30 Information 20 10 0 10 20 30 40 50 60 70 80 90 Sensor network Presentation Fig. 2. Flow of sensor data. Same behavior Sensor node 1 Sensor node 2 Program Program Program 1 Program 2 VM VM CPU 1 CPU 2 CPU 1 CPU 2 Fig. 3. Virtual machine for wireless sensor node. 3. Virtual machine for wireless sensor node 4. Sensor data collection from many sensor nodes When many sensor nodes are used, it is important to reduce the cost of using them. In particular, in a In order to collect information from many sensor network where two or more kinds of sensor (e.g., nodes, analyze the situation in the real world from the ones from different makers or with different CPUs) sensor data, or create a sensor network that provides nodes are intermingled, the usage cost is high. To services according to a situation, it is necessary to enable easy use in such situations as well, we have collect data efficiently. Data compression technology developed a virtual machine (VM) for a wireless sen- based on the similarity of sensor data is shown in sor node. Usually, when users use various different Fig. 4. Sensor data measuring the situation in the real sensor nodes, as shown on the left in Fig. 3, even world has the characteristics that there are periodic when the same operation is carried out, another pro- changes in the same sequence or changes in similar gram needs to be prepared. But with the VM, even if values obtained from neighboring sensors. Figure the CPUs differ, the same program can be run on 4(a) shows the compression when sensor data from a them. single sensor node shows a similar value repeatedly. Our VM is based on CIL (Common Intermediate First, the sequence of sensor data repeated periodi- Language). Since CIL originated in Windows .NET, cally is cut out. Then, the sensor data is decomposed executable code can be created using the develop- into typical data sequences and weight variables by ment environment of MS-Windows. Moreover, a sen- using singular value decomposition (SVD). sor network’s manner of operation can be changed, Weight variables express the importance for every even after sensor nodes have been deployed in the typical data sequence, and the original sensor data environment, because this VM has a function for can be restored by using these typical data sequences wirelessly distributing created programs. and weight variables. When information is transmit- ted from a sensor node, it is possible to compress the Vol. 10 No. 11 Nov. 2012 2 Feature Articles (a) Compression of repeated similar sensor data Typical data sequences Decomposition to typical data sequences and weight variables by SVD (b) Compression of neighboring sensors’ data Sensor 1 Sensor 2 Sensor 3 Sensor 4 Fig. 4. Compression of sensor data. Base station Sensor G H Sensor E Sensor F Sensor B Sensor A DC Fig. 5. Collection of sensor data in a hierarchical network. information by not transmitting all of the typical data reducing the data amount in the wireless communica- sequences but transmitting only typical data sequenc- tions, we can reduce the battery consumption, es that make a high contribution. However, because enabling the sensors to measure efficiently for a long not all of the information is sent, a certain amount of time and collect more sensor information [1]. error occurs. An example of transmitting the data of neighboring sensors is shown in Fig. 4(b). Tempera- 5. Interpretation of collected data ture may be data that shows similar values among neighboring sensors. This sensor data can be com- If the information collected from the sensors can be pressed by using the abovementioned method. The interpreted and human activity can be inferred, this sensor data is transmitted to the base station while the kind of technique lets us make applications such as sensor nodes are used as a hierarchical network ones for automatic lifelog creation, elderly care sup- (Fig. 5). After the data of sensor A and sensor B has port, and home automation. We assume that almost been compressed and sent to sensor E, it is further all human activities are performed using the hands, so sent to sensor G. Finally, the data is sent to a base sta- we developed technology to infer the kind of action tion. Thus, it becomes possible to reduce the amount being performed by using only a sensor device of information even further by applying the compres- attached to a person’s wrist. Moreover, whereas pre- sion technique shown in Fig. 4 hierarchically. By vious methods can infer only simple human activities 3 NTT Technical Review Feature Articles Microphone Camera Accelerometer Light sensor Digital compass Prototype sensor device Wireless sensor device Cocoa Images Acceleration data Use cocoa Use fridge Fig. 6. Wrist-worn sensor devices and example of sensor data. such as running and walking by using an accelerom- color information for recognition. A histogram of the eter, our method can infer more complex activities color contained in a picture is used as the feature. with a comparatively high degree of abstraction, such Other sensor data is also converted into correspond- as vacuuming and making cocoa. The wrist-worn ing features. Next, the extracted features are input to sensor device consists of two or more kinds of sen- a classifier. sors, for example, a camera, accelerometer, and First, we prepare several binary classifiers—one for microphone. The cameras acquire visual information each activity that we want to identify—and the prob- about an object being manipulated, the accelerometer abilities for all actions are output. For example, the captures hand movements, and the microphones cap- data input from one binary classifier to the operation tures ambient sounds [2]. Prototype sensor devices “making cocoa” judges the degree of agreement with and the information obtained from them are shown in the cocoa-making operation. Since 15 kinds of Fig. 6. actions were identified in the experiment, 15 classi- Human activity is inferred from sensor data by fiers were used. Features were input in parallel with applying the machine learning technique. A system these classifiers. Next, they were input to a hidden that can infer actions from sensor data is shown in Markov model (HMM) classifier, the time direction Fig. 7. First, features are extracted from the sensor was inferred, and the output result of the binary clas- data. For example, in the case of a camera image, the sifier produced the final classification result. In the raw image might be heavily blurred and privacy experiment, when all the sensors were used, activities issues might arise depending on what other details are were recognized with probabilities ranging from 80% captured, including ones in reflections. In our system, to 90%. these problems are avoided by using the picture’s Vol. 10 No. 11 Nov. 2012 4 Feature Articles Static classifiers HMM classifiers Binary classifier 1 HMM 1 Sensor Feature Binary classifier 2 HMM 2 HMM likelihoods data extraction Binary classifier n HMM n Fig.
Recommended publications
  • Smart Dust: Communicating with a Cubic- Millimeter Computer
    COVER FEATURE Smart Dust: Communicating with a Cubic- Millimeter Computer The Smart Dust project is probing microfabrication technology’s limitations to determine whether an autonomous sensing, computing, and communication system can be packed into a cubic-millimeter mote to form the basis of integrated, massively distributed sensor networks. Brett ecreasing computing device size, increased • monitoring environmental conditions that affect Warneke connectivity, and enhanced interaction with crops and livestock; the physical world have characterized com- • building virtual keyboards; Matt Last puting’s history. Recently, the popularity of • managing inventory control; Brian Dsmall computing devices, such as handheld • monitoring product quality; Liebowitz computers and cell phones, burgeoning Internet • constructing smart-office spaces; and growth, and the diminishing size and cost of sensors— • providing interfaces for the disabled. Kristofer S.J. especially transistors—have accelerated these trends. Pister The emergence of small computing elements, with SMART DUST REQUIREMENTS University of sporadic connectivity and increased interaction with Smart Dust requires both evolutionary and revolu- California, the environment, provides enriched opportunities to tionary advances in miniaturization, integration, and Berkeley reshape interactions between people and computers energy management. Designers can use microelectro- and spur ubiquitous computing research.1 mechanical systems (MEMS) to build small sensors, The Smart Dust project2 is exploring whether an optical communication components, and power sup- autonomous sensing, computing, and communication plies, whereas microelectronics provides increasing system can be packed into a cubic-millimeter mote (a functionality in smaller areas, with lower energy con- small particle or speck) to form the basis of integrated, sumption. Figure 1 shows the conceptual diagram of massively distributed sensor networks.
    [Show full text]
  • Kent Academic Repository Full Text Document (Pdf)
    Kent Academic Repository Full text document (pdf) Citation for published version Arief, Budi and Blythe, Phil and Fairchild, Richard and Selvarajah, Kirusnapillai and Tully, Alan (2008) Integrating Smartdust into Intelligent Transportation System. In: 10th International Conference on Application of Advanced Technologies in Transportation (AATT 2008), 27-31 May 2008, Athens, Greece. DOI Link to record in KAR https://kar.kent.ac.uk/58716/ Document Version UNSPECIFIED Copyright & reuse Content in the Kent Academic Repository is made available for research purposes. Unless otherwise stated all content is protected by copyright and in the absence of an open licence (eg Creative Commons), permissions for further reuse of content should be sought from the publisher, author or other copyright holder. Versions of research The version in the Kent Academic Repository may differ from the final published version. Users are advised to check http://kar.kent.ac.uk for the status of the paper. Users should always cite the published version of record. Enquiries For any further enquiries regarding the licence status of this document, please contact: [email protected] If you believe this document infringes copyright then please contact the KAR admin team with the take-down information provided at http://kar.kent.ac.uk/contact.html INTEGRATING SMARTDUST INTO INTELLIGENT TRANSPORTATION SYSTEMS Budi Arief1, Phil Blythe2, Richard Fairchild3, Kirusnapillai Selvarajah4, Alan Tully5 ABSTRACT. The last few years have seen the emergence of many new technologies that can potentially have major impacts on Intelligent Transportation Systems (ITS). One of these technologies is a micro-electromechanical device called smartdust. A smartdust device (or a mote) is typically composed of a processing unit, some memory, and a radio chip, which allows it to communicate wirelessly with other motes within range.
    [Show full text]
  • Smart Dust Technology
    250, Mini-Project Report Amy Haas Smart Dust Technology Smart dust is an emerging technology with a huge potential for becoming an internationally successful commercial venture. Now is the best time to invest in smart dust – right at the point at which the scientific community is close to perfecting the technology and its applications but its potential has not yet been realized by the capitalist market. Fundamental Concept Smart dust is a theoretical concept of a tiny wireless sensor network, made up of microelectromechanical sensors (called MEMS), robots, or devices, usually referred to as motes, that have self-contained sensing, computation, communication and power1. According to the smart dust project design created by a team of UC Berkeley researchers2, within each of these motes is an integrated package of “MEMS sensors, a semiconductor laser diode and MEMS beam-steering mirror for active optical transmission, a MEMS corner-cube retroreflector for passive optical transmission, an optical receiver, signalprocessing and control circuitry, and a power source based on thick-film batteries and solar cells.” The intent is that these motes will eventually become the size of a grain of sand or a dust particle, hence the name “smart dust”, but the technology still has a long way to go to achieve its target size. In current sensor technology, the sensors are about the size of a bottle cap or small coin. As with most electronic devices or technologies, the biggest challenges in achieving actual smart dust are the power consumption issues and making the batteries small enough. Although there is a lot of work being done on solar cells to keep the motes self-sustaining, the components are just not small enough yet to actually be considered smart dust.
    [Show full text]
  • Jul 2 7 2000
    THE SNAP! TOOLKIT FOR DEVELOPING SENSOR NETWORKS AND APPLICATION TO XC SKIING BY MATTHEW B. DEBSKI Submitted to the Department of Electrical Engineering and Computer Science in Partial Fulfillment of the Requirements for the Degrees of Bachelor of Science in Electrical Engineering and Computer Science and Master of Engineering in Electrical Engineering and Computer Science at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY May 2000 2 20C: MASSACHUSETTS INSTITUTE © Massachusetts Institute of Technology 2000. All rights reserved. OF TECHNOLOGY JUL 2 7 2000 LIBRARIES Author Department of Electrical Engineering and Computer Science May 18, 2000 Certified by MichaelJ. Hawley Assistant Prolssor of Media Arts and Sciences Alex Dreyfoos Jr. (1954) Career Development Professor of Media Arts and Sciences Thesis Supervisor Accepted by Arthur C. Smith Chairman, Department Committee on Graduate Theses ' pT THE SNAP! TOOLKIT FOR DEVELOPING SENSOR NETWORKS AND APPLICATION TO XC SKIING BY MATTHEW B. DEBSKI Submitted to the Department of Electrical Engineering and Computer Science in Partial Fulfillment of the Requirements for the Degrees of Bachelor of Science in Electrical Engineering and Computer Science and Master of Engineering in Electrical Engineering and Computer Science May 18, 2000 ABSTRACT Athletes, health professionals, animal specialists, meteorologists, and other investigators increasingly employ small, human-scale sensor networks in their disciplines. The sensor networks used by each field and study have unique requirements. Regardless, these networks all collect and store data, and often display or transmit them. The Snap! toolkit takes advantage of the similarities among sensor networks to make prototyping them fast and easy. Simultaneously, it acknowledges their inherent differences, remaining flexible in order to accommodate the needs of different systems.
    [Show full text]
  • Case /.'06-285F
    NATIONAL SCIENCE FOUNDATION 4201 WILSON BOULEVARD ARLINGTON, VIRGINIA 22230 nsf OFFICE OF THE GENERALCOUNSEL Case /.'06-285F October 17.2006 Ms. M'dwh Mofmaiiii Staff Attorney Fleclronie Frontiei Foundation 1875 Coonecticul Avenue, WW, Suite 850 Wasmn#on, DC 7.0009 Dear Ms. rloimann: ibis is in response to sour Scpien<ber 26. 2006 emailed Freedom of In formation. Act (FOIA> request .for eoui.es of the NSF fiu-ded grants r-umbered 042.3.386, 0209190 and 0512976. Records responsive io your request are enclosed. Personal information (individual salaries, bios, pending aiid non-Federal grams) has been withheld wherever it appears uncer the; pviv.-ey protests''.-n of Exemption 6 of the FOiA. Reviewer identifying in forma!ion in ihe proposal jacket is withheld under exemptions 5 and;6 of the Freedom of lp-ormali'ori Ac! {.- '.J.S.C. :": 52(b)) that protect from disclosure the prcdeeisional, ueJiberaWe process and. personal information and exemption (k)(5) of the Privacy Act (5 IJ.S.C !o?a). Father, reviewer's coiniininis/rankings are exempt from disclosure under the provisions oM.-.xanption (b)(3) of the FOiA. Your right of administrative appeal is set ftVlh in See'riot; 612.9 of dsc NSF FOIA regulation (copy enclosed). There is ao fee (or FCTA services in this instance in accordance with 5 U.S.C. 552 uOC^XAX'i) yt seq. Sincerely, Leslie A Jensen FOIA/Privacy Act Ofiker Hnciosure:-; Telephone (703) 292-8060 FAX (703) 292-9041 §612.9 Appeals. .F^omof.nfonna,ionAc.ApI«a.,Yo«rappea11enerInus,iIlduae.c0pyofyo»r wrinenreques,a„a,heae„ia1,oEe*erwi*anyWri«enargume«youWishK,subml«.
    [Show full text]
  • Using Radio Frequency Identification and Virtual Reality to Map and Track Assets
    Using Radio Frequency Identification and Virtual Reality to Map and Track Assets by Christopher S. Moon Advisor: Dr. David Fredrick Honors Assistant to the Advisor: Keenan Cole Thesis in partial fulfillment of the requirements for the degree Bachelor of Science in Business Administration in Information Systems Sam M. Walton College of Business University of Arkansas Fayetteville, Arkansas May 8th, 2011 1 Contents An Introduction to Technologies Used ........................................................................................... 3 What is Radio Frequency Identification? .................................................................................... 3 Table 1 ‐ Example of Typical RFID Data................................................................................... 5 What is Virtual Reality Technology? ........................................................................................... 6 What is Unity? ............................................................................................................................. 8 Objective ......................................................................................................................................... 8 Current Visualization Standards ..................................................................................................... 9 Figure 1 ‐ Current 3D Representation of RFID Positional Data at the University of Arkansas RFID Lab .................................................................................................................................
    [Show full text]
  • RFID Technology for Human Implant Devices Hervé Aubert
    RFID Technology for Human Implant Devices Hervé Aubert To cite this version: Hervé Aubert. RFID Technology for Human Implant Devices. Comptes rendus à l’Académie des Sciences, 2011, Special issue on nanosciences/nanotechnologies. hal-00599304 HAL Id: hal-00599304 https://hal.archives-ouvertes.fr/hal-00599304 Submitted on 9 Jun 2011 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Comptes rendus à l’Académie des Sciences Special issue on nanosciences/nanotechnologies March 1st, 2011 Hervé AUBERT RFID Technology for Human Implant Devices Technologie RFID pour implants dans le corps humain Hervé Aubert Laboratoire d’Analyse et d’Architecture des Systèmes (LAAS) - CNRS and University of Toulouse: INP, UPS, INSA, ISAE 7 Avenue du colonel Roche, Toulouse, France - email : [email protected] Abstract - This paper presents an overview on Radio Frequency Identification (RFID) technology for human implants and investigates the technological feasibility of such implants for locating and tracking persons or for remotely controlling human biological functions. Published results on the miniaturization of implantable passive RFID devices are reported as well as a discussion on the choice of the transmission frequency in wireless communication between passive RFID device implanted inside human body and an off-body interrogator.
    [Show full text]
  • A Changing Landscape: the Internet of Things (Iot)
    A Changing Landscape: the Internet of Things (IoT) Prof Sanjay Jha Deputy Director, Australian Center for Cyber Security, UNSW Director of Cyber Security and Privacy Laboratory, School of Computer Science and Engineering University Of New South Wales [email protected] http://www.cse.unsw.edu.au/~sanjay SecureCanberra@MilCIS 2014, Australia 13th Nov 2014 Internet of Things • Connected devices • Smoke alarms, light bulbs, power switches, motion sensors, door locks etc. 2 Outline • Introduction to IoT • History of IoT (and M2M) and Wireless Sensor Networks • Security Challenges in IoT • Sample Research Projects at UNSW History (IoT) • Early 90s or prior: SCADA systems, Telemetry applications • Late 90s- Products/services from mobile operators (Siemens) to connect devices via cellular network – Primarily automotive telematics • Mid- 2000s – Many tailored products for logistics, fleet management, car safety, healthcare, and smart metering of electricity consumption • Since 2010 – A large number of consortiums mushrooming up to bid for a large market share – ABI Projects US$198M by 2018 – Berg Insight US$187M by 2014…… History of Wireless Sensor Net • 1999: Kahn, Katz,Pister: Vision for Smart Dust • 2002 Sensys CFP: Wireless Sensor Network research as being composed of ”distributed systems of numerous smart sensors and actuators connecting computational capabilities to the physical world have the potential to revolutionise a wide array of application areas by providing an unprecedented density and fidelity of instrumentation”. Typical Application Roadmap to IoT • Supply Chain Applications – Routing, inventory, loss prevention. • Vertical Market Helpers – Healthcare, Transport, Energy, Agriculture, Security, Home Network. • Ubiquitous Position – Location of people and objects and possible tailored services • Teleoperations/Telepresence - Ability to interact/control with remote objects.
    [Show full text]
  • Robotics Research the International Journal Of
    The International Journal of Robotics Research http://ijr.sagepub.com Localization and Navigation Assisted by Networked Cooperating Sensors and Robots Peter Corke, Ron Peterson and Daniela Rus The International Journal of Robotics Research 2005; 24; 771 DOI: 10.1177/0278364905057118 The online version of this article can be found at: http://ijr.sagepub.com/cgi/content/abstract/24/9/771 Published by: http://www.sagepublications.com On behalf of: Multimedia Archives Additional services and information for The International Journal of Robotics Research can be found at: Email Alerts: http://ijr.sagepub.com/cgi/alerts Subscriptions: http://ijr.sagepub.com/subscriptions Reprints: http://www.sagepub.com/journalsReprints.nav Permissions: http://www.sagepub.com/journalsPermissions.nav Downloaded from http://ijr.sagepub.com at MASSACHUSETTS INST OF TECH on February 14, 2007 © 2005 SAGE Publications. All rights reserved. Not for commercial use or unauthorized distribution. Peter Corke Localization and CSIRO ICT Centre, Australia Ron Peterson Navigation Dartmouth Computer Science Department and Assisted by The Institute for Security Technology Studies (ISTS) at Dartmouth College Networked Hanover, NH 03755, USA Daniela Rus Cooperating Computer Science and Artificial Intelligence Lab Massachusetts Institute of Technology (MIT) Sensors and Cambridge, MA 02139, USA [email protected] Robots Abstract small number of expensive sensors of limited spatial reach. The new paradigm is of ubiquitous sensors embedded in the In this paper we discuss how a network of sensors and robots can environment with which the robot interacts: to deploy them, cooperate to solve important robotics problems such as localization to harvest data from them, and to task them.
    [Show full text]
  • Wireless Sensor Network Platform for Harsh Industrial Environments
    WIRELESS SENSOR NETWORK PLATFORM FOR HARSH INDUSTRIAL ENVIRONMENTS by Ahmad El Kouche A thesis submitted to the School of Computing In conformity with the requirements for the degree of Doctor of Philosophy Queen’s University Kingston, Ontario, Canada (September, 2013) Copyright ©Ahmad El Kouche, 2013 Abstract Wireless Sensor Networks (WSNs) are popular for their wide scope of application domains ranging from agricultural, medical, defense, industrial, social, mining, etc. Many of these applications are in outdoor type environments that are unregulated and unpredictable, thus, potentially hostile or physically harsh for sensors. The popularity of WSNs stems from their fundamental concept of being low cost and ultra-low power wireless devices that can monitor and report sensor readings with little user intervention, which has led to greater demand for WSN deployment in harsh industrial environments. We argue that there are a new set of architectural challenges and requirements imposed on the hardware, software, and network architecture of a wireless sensor platform to operate effectively under harsh industrial environments, which are not met by currently available WSN platforms. We propose a new sensor platform, called Sprouts. Sprouts is a readily deployable, physically rugged, volumetrically miniature, modular, network standard, plug-and-play (PnP), and easy to use sensor platform that will assist university researchers, developers, and industrial companies to evaluate WSN applications in the field, and potentially bring about new application domains that were previously difficult to accomplish using off the shelf WSN development platforms. Therefore, we addresses the inherent requirements and challenges across the hardware, software, and network layer required for designing and implementing Sprouts sensor platform for harsh industrial environments.
    [Show full text]
  • MEMS for Environmental and Bioterrorism Applications Learning Module
    Southwest Center for Microsystems Education (SCME) University of New Mexico MEMS for Environmental and Bioterrorism Applications Learning Module This Learning Module contains the following units: Primary Knowledge (PK) Reading material Research Activity Final Assessment This learning module provides an overview of how MEMS (MicroElectroMechanical Systems) are being used for bioterrorism and environmental sensing. An activity allows for more in-depth exploration into an application of personal interest. Target audiences: High School, Community College, University Made possible through grants from the National Science Foundation Department of Undergraduate Education #0830384, 0902411, and 1205138. Any opinions, findings and conclusions or recommendations expressed in this material are those of the authors and creators, and do not necessarily reflect the views of the National Science Foundation. Southwest Center for Microsystems Education (SCME) NSF ATE Center © 2009 Regents of the University of New Mexico Content is protected by the CC Attribution Non-Commercial Share Alike license. Website: www.scme-nm.org MEMS for Environmental and Bioterrorism Applications Primary Knowledge (PK) Instructor Guide Note to Instructor This Primary Knowledge (PK) unit provides introductory material on the applications of Microelectromechanical Systems (MEMS) for environmental and bioterrorism sensing. This PK and its related activity and assessment are part of the MEMS for Environmental and Bioterrorism Applications Learning Module: • MEMS for Environmental and Bioterrorism Applications PK • MEMS for Environmental and Bioterrorism Applications: Activity • MEMS for Environmental and Bioterrorism Applications Assessment Description and Estimated Time to Complete This learning module provides an overview of how MEMS (MicroElectroMechanical Systems) are being used for bioterrorism and environmental sensing. An activity allows for more in- depth exploration into an application of personal interest.
    [Show full text]
  • Nanotech Ideas in Science-Fiction-Literature
    Nanotech Ideas in Science-Fiction-Literature Nanotech Ideas in Science-Fiction-Literature Text: Thomas Le Blanc Research: Svenja Partheil and Verena Knorpp Translation: Klaudia Seibel Phantastische Bibliothek Wetzlar Special thanks to the authors Karl-Ulrich Burgdorf and Friedhelm Schneidewind for the kind permission to publish and translate their two short stories Imprint Nanotech Ideas in Science-Fiction-Literature German original: Vol. 24 of the Hessen-Nanotech series by the Ministry of Economics, Energy, Transport and Regional Development, State of Hessen Compiled and written by Thomas Le Blanc Svenja Partheil, Verena Knorpp (research) Phantastische Bibliothek Wetzlar Turmstrasse 20 35578 Wetzlar, Germany Edited by Sebastian Hummel, Ulrike Niedner-Kalthoff (Ministry of Economics, Energy, Transport and Regional Development, State of Hessen) Dr. David Eckensberger, Nicole Holderbaum (Hessen Trade & Invest GmbH, Hessen-Nanotech) Editor For NANORA, the Nano Regions Alliance: Ministry of Economics, Energy, Transport and Regional Development, State of Hessen Kaiser-Friedrich-Ring 75 65185 Wiesbaden, Germany Phone: +49 (0) 611 815 2471 Fax: +49 (0) 611 815 49 2471 www.wirtschaft.hessen.de The editor is not responsible for the truthfulness, accuracy and completeness of this information nor for observing the individual rights of third parties. The views and opinions rendered herein do not necessarily reflect the opinion of the editor. © Ministry of Economics, Energy, Transport and Regional Development, State of Hessen Kaiser-Friedrich-Ring 75 65185 Wiesbaden, Germany wirtschaft.hessen.de All rights reserved. No part of this brochure may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without prior permission in writing from the publisher.
    [Show full text]