Refine
Year of publication
Document Type
- Conference Proceeding (50)
- Master's Thesis (34)
- Report (17)
- Article (9)
- Bachelor Thesis (3)
- Doctoral Thesis (3)
- Other Publications (3)
- Working Paper (2)
Language
- English (63)
- German (56)
- Multiple languages (2)
Keywords
- .NET Remoting (1)
- 2 D environment Laser data (1)
- AAL (2)
- ADO.NET (1)
- ASP.NET (1)
- Accelerometers (1)
- Active Server Pages (1)
- ActiveX Data Objects (ADO) (1)
- Activity monitoring (1)
- Agenten-Plattform (1)
- Akquisition <Vertrieb> (1)
- Ambient assisted living (1)
- Analog-Digital-Umsetzer (1)
- Analog-to-digital-Converter ; Spice Simulation ; Analog integrated circuit design ; (1)
- Annotation (1)
- Anwendung (1)
- Apnoe (1)
- Arbeitsablauf (1)
- Arbeitsplatzcomputer (1)
- Archivierung (1)
- Artefaktkorrektur (1)
- Assisted living (1)
- Atmung (2)
- Atmungssignal (1)
- Audi (1)
- Auftragsabwicklung (1)
- Automatisches Eintakten (1)
- Automotive (1)
- Autonomous Mobile Indoor Robot (1)
- BCG (2)
- BW (1)
- Balanced Scorecard (1)
- Ballistocardiography (1)
- Ballistokardiographie (1)
- Benutzerinteraktion (1)
- Benutzeroberfläche (1)
- Betriebssystem (1)
- Bewegung (1)
- Bewegungssignal (1)
- Bio-vital data (1)
- Biomedical Signal Capturing (1)
- Biomedical signals (1)
- Biosignal analysis (1)
- Biosignal processing (1)
- Biovital signal (2)
- Blockchain (1)
- Bootloader (1)
- Breathing (1)
- Breathing rate (1)
- C sharp (1)
- C++ (1)
- CL <C++> (1)
- CRM (1)
- CSTA (1)
- Canny Edge Detector (1)
- Canny-Kantendetektor (1)
- Checkstyle (1)
- Client Management System ; Haaland Internet Productions ; Client Relationship Management ; workflow (1)
- Codierung (1)
- Common Criteria (1)
- Computer Telephony Integration (1)
- Computersimulation (1)
- Controlling (1)
- Convolution (1)
- Convolutional neural network (1)
- Correlation (1)
- Cross Site Scripting (1)
- DTD (1)
- Data fusion (1)
- Datenbankmodellierung (1)
- Datenstruktur (1)
- Datentypeditor (1)
- Deep Convolutional Neural Network (1)
- Deep learning (2)
- Detektiv Langohr (1)
- Dijkstra Algorithm (1)
- Dijkstra Algorithmus (1)
- Distributed ledger (1)
- Dokumentenerstellung (1)
- Dokumententyp (1)
- Dokumentvorlage (1)
- Driving (1)
- Driving safety (1)
- Driving stress (1)
- Drowsiness (1)
- E-Health (1)
- ECG (5)
- EEG (1)
- EJB (1)
- EKG (1)
- ELF (1)
- EMG (1)
- Echtzeitsystem (1)
- Eindringerkennung (1)
- Einkommensteuer (1)
- Electrocardiography (2)
- Electromyography (1)
- Entwurfsmuster (1)
- Erkennung (1)
- FACS (1)
- FSR sensor (1)
- Facial Action Coding System (1)
- Facility-Management (1)
- Fehlersuche (1)
- Feldbus (1)
- Filter (1)
- Force resistor sensor (1)
- Formel (1)
- Framework (1)
- Framework <Informatik> (2)
- Freistellungssemesterbericht (17)
- GDPR (1)
- GUI (1)
- Geschäftsprozessmodellierung (1)
- Gesetz <Physik> (1)
- Graphische Benutzeroberfläche (1)
- Grundschule (1)
- HTML (1)
- Handy (1)
- Harris Corner Detector (1)
- Harris-Eckendetektor (1)
- Health information exchange (1)
- Heart rate (5)
- Heart rate variability (1)
- Helpdesk-System (1)
- Herzfrequenz (2)
- I3M (1)
- Illuminance (1)
- Impedance measurement (1)
- Implementierung (1)
- Information Security Management (1)
- Installation (1)
- Interfaceeditor (1)
- Internet of Things (1)
- Interpretability (1)
- Intranet (1)
- IoT (1)
- J2EE (1)
- JDBC (1)
- JTAPI (1)
- Java (2)
- Java 2 Enterprise Edition (2)
- Java <Programmiersprache> (2)
- Java Beans (1)
- Java Naming and Directory Interface (1)
- Java Server Pages (1)
- Joi (1)
- Karosseriebau (1)
- Khepera (1)
- Komponente (1)
- Konfigurationsmanagement (1)
- Konfigurationsverwaltung (1)
- Kontaktloses Hardware-System (1)
- Kraftfahrzeugbau (1)
- Kundenmanagement (1)
- Künstliche Intelligenz (1)
- LDAP (1)
- LVP (1)
- Laser-Sensor (1)
- Laserimpuls (1)
- Lasermesstechnik (1)
- Layout (1)
- Lehrveranstaltungsplan (1)
- Lernprogramm (1)
- Link Handler (1)
- Logimatik TM/3 (1)
- Logopädie (1)
- Lohn (1)
- Lohnsteuer (1)
- Lohnsteuerabzug (1)
- Low-pass filters (1)
- Lösung (1)
- MIDP (1)
- Machine learning (2)
- Marktanalyse (1)
- Maschinelles Lernen (1)
- Medical systems (1)
- Mess- und Steuerungssystem ; DDNA (1)
- Mimik (1)
- Mobile-Agenten (1)
- Mobilfunk (1)
- Mobilfunkprotokoll (1)
- Model View Controller (1)
- Monitoring (1)
- Monitoring <Informatik> (1)
- Movement detection (3)
- Multinomial logistic regression (2)
- Mund-Kiefer-Gesichtsbereich (1)
- MySQL 4.0 (1)
- Müdigkeitserkennung (1)
- Namenskonvention (1)
- Navigation (1)
- Navigieren (1)
- Nebenstellenanlage (1)
- Neuronal Netze (1)
- Neuronales Netz (1)
- Nokia (1)
- Non-invasive (1)
- Non-invasive sleep study (2)
- Nortel Meridian (1)
- OLAP (1)
- OSE (1)
- Oberflächeninspektion von Pressteilen (1)
- Oberflächenprüfung (1)
- Objektorientierung (1)
- OnTechnology ; CCM ; OnCommand ; Deployment Werkzeuge ; unattended Setup (1)
- Organisationsform (1)
- Outlook (1)
- PHP (1)
- PPG (1)
- PSG (1)
- PSQI (1)
- Pattern recognition (1)
- Pflichtenheft (1)
- Photoplethysmography (1)
- Physical activity (1)
- Physiognomik (1)
- Point Operations (1)
- Portal (1)
- Portal-Komponenenten (1)
- Posture tracking (1)
- PowerPC (1)
- Pressure sensor (1)
- Pressure sensors (2)
- Privacy by Design (1)
- Probabilistic modeling (1)
- Probability of Exploitation (1)
- Produktion (1)
- Produkttest (1)
- Programmierstil (1)
- Programmierumgebung (1)
- Prozesskette (1)
- Prozessleitsystem (1)
- Prozessmanagement (1)
- Prozessmodell (1)
- Punktoperationen (1)
- Qt (1)
- Qualitätsmanagement (1)
- Qualitätssicherung (1)
- Qualitätssicherung im Automobilbau (1)
- Quellenabzug (1)
- Quellenprinzip (1)
- RMI (1)
- Releasemanagement (1)
- Remediation Strategies (1)
- Remote Access (1)
- Requirements Engineering (1)
- Residual Neural Network (1)
- Respiration Rate (1)
- Respiration rate (1)
- Respiratory sounds (1)
- Roboter (2)
- SAP AG (1)
- SAP Enterprise Portal (1)
- SAP LE-TRA (1)
- SAP R/3 (1)
- SAP Vertriebs-Manager-Portal (1)
- SAX <Programmierumgebung> (1)
- SOAP <Protokoll> (1)
- SPICE <Programm> (1)
- SQL (1)
- SQL Injection (1)
- SVG (1)
- Sales Performance Analyse (1)
- Schlaf (1)
- Schlafanalyse (4)
- Schlafphasen (1)
- Schlafphasenerkennung (1)
- Schlafstadien (1)
- Schlafstudie (1)
- Schriftzeichenerkennung (1)
- Schweizerische Versicherungs-Gesellschaft (1)
- Scoring Systems (1)
- SeMoA (1)
- Security by Design (1)
- Seitenformatierung (1)
- Seitenlayout (1)
- Selbstorganisierende Karte (1)
- Sensor Bed (1)
- Sensor grid (1)
- Sensors (1)
- Sicherheit (1)
- Signal acquisition (1)
- Signal processing (3)
- Skin (1)
- Sleep (2)
- Sleep Stages (1)
- Sleep apnea (1)
- Sleep apnoea (1)
- Sleep efficiency (1)
- Sleep latency (1)
- Sleep medicine (3)
- Sleep phase (1)
- Sleep positions (2)
- Sleep quality (3)
- Sleep stage classification (1)
- Sleep stages (2)
- Sleep study (11)
- Sleep tracking (1)
- Sleep/Wake states (1)
- Smart Home (1)
- Smart bed (1)
- Smart cushion (1)
- Smart home (1)
- Smart-care (1)
- Softwareentwicklung (2)
- Softwareentwicklung / Projekt (1)
- Softwarekomponenten (1)
- Softwareproduktionsumgebung (1)
- Sprachstörung (1)
- Static Code Analysis (1)
- Statistics (1)
- Stethoscope (1)
- Steuerung (1)
- Stress (3)
- Stress detection (2)
- Stress measurement (1)
- Struts (1)
- Swing (1)
- System design (1)
- TSAPI (1)
- TSN (1)
- Tauchen (1)
- Tauchphysik (1)
- Telemedicine (2)
- Test (1)
- Test Suite (1)
- Transistortechnologie (1)
- Transportproblem (1)
- Transportsteuerung (1)
- Treiber <Programm> (1)
- Un-certainty (1)
- Unterstützungssystem <Informatik> (1)
- Update (1)
- Verbindungsoptimierung (1)
- Vergleich (1)
- Versionsverwaltung (1)
- Verteiltes System (1)
- Visual C++ (1)
- VisualBASIC für Applikationen (1)
- Vulnerability Prioritization (1)
- WML (1)
- WSDL (1)
- Wearable (1)
- Web Services (3)
- WebObjects 5 (1)
- Webanwendung (1)
- Winterthur (1)
- Wissensmanagement (1)
- World wide web (1)
- XML (6)
- XML-Anwendungsdeskriptor (1)
- XPath (1)
- XSL (1)
- XSL-FO (2)
- XSLT (2)
- Zeichenerkennung (1)
- Zeitreihenklassifikation (1)
- Zürcher Kantonalbank (1)
- chat system (1)
- distance measurement (1)
- dual-ported RAM (1)
- facial expression recognition ; action unit recognition (1)
- integrierte Java Laufzeitumgebung (1)
- istant messaging system (1)
- low-level feature extraction (1)
- mySAP Enterprise Portal (1)
- pFlow (1)
- support vector machines (1)
Institute
- Fakultät Informatik (121) (remove)
The cornerstone of cognitive systems is environment awareness which enables agile and adaptive use of channel resources. Whitespace prediction based on learning the statistics of the wireless traffic has proven to be a powerful tool to achieve such awareness. In this paper, we propose a novel Hidden Markov Model (HMM) based spectrum learning and prediction approach which accurately estimates the exact length of the whitespace in WiFi channels within the shared industrial scientific medical ISM) bands. We show that extending the number of hidden states and formulating the prediction problem as a maximum likelihood (ML) classification leads to a substantial increase in the prediction horizon compared to classical approaches that predict the immediate (short-term) future. We verify the proposed algorithm through simulations which utilize a model for WiFi traffic based on extensive measurement campaigns.
In der Diplomarbeit werden verschiedene, schon auf dem Markt befindliche Intrusion Intrusion Detection Systeme auf unterschiedliche Kriterien verglichen. Es werden mögliche Einsatzarten und Einsatzorte mit ihren Vor- und Nachteilen durchleuchtet und besprochen. Auf Basis der erlangten Erkenntnisse wird ein System vorgeschlagen, dass nach Abstimmung mit dem Projektleiter eingesetzt werden soll. Zu den Einsatz- kriterien gehören das vorhanden Budget, die Netzwerkumgebung, die Ausstattung und Leistungsfähigkeit des Einsatz-Intrusion Detection Systems sowie die Art des Intrusion Detection Systems. Geplant ist der Einsatz mindestens eines bzw. mehrerer Systeme als eine sogenannte Enterprise-Lösung. Mittels verschiedener Hilfsmittel und Tools werden die Intrusion Detection Systeme eTrust von Computer Associates, Real Secure von ISS, Snort, Tripwire und Network Intrusion Detection von Network Flight Recorder untersucht. Der Test und der Betrieb dieser Systeme geschieht sowohl vor als auch hinter der Firewall also in der demilitarisierten Zone des Unternehmens. Die Untersuchung der Systeme beinhaltet Kontrollen über Systemstabilität, Prozessor- und Hauptspeicherauslastung, Anzahl der erkannten Angriffe auf Basis simulierter Angriffe sowie die Benutzerfreundlichkeit
Die vorliegende Arbeit untersucht, wie Tools für die Überprüfung von Quell-Code auf Konformität mit Programmierstilen, die komplexere Entwurfsmuster beinhalten, als Erweiterung des statischen CodeAnalyse-Tools Checkstyle realisiert werden können. Als Beispiel wird der Joi Programmierstil verwendet, der für diese Arbeit aus der Java Spracherweiterung Joi (Java Objects by Interfaces), die die Einhaltung einiger Entwurfsmuster, die auf die Reduzierung von Code-Abhängigkeiten zielen, unterstützt, abgeleitet wurde.
Ballistocardiography (BCG) can be used to monitor heart rate activity. Besides, the accelerometer should have high sensitivity and minimal internal noise; a low-cost approach was taken into consideration. Several measurements have been executed to determine the optimal positioning of a sensor under the mattress to obtain a signal strong enough for further analysis. A prototype for an unobtrusive accelerometer-based measurement system has been developed and tested in a conventional bed without any specific extras. The influence of the human sleep position for the output accelerometer data was tested. The obtained results indicate the potential to capture BCG signals using accelerometers. The measurement system can detect heart rate in an unobtrusive form in the home environment.
Globalization has increased the number of road trips and vehicles. The result has been an intensification of traffic accidents, which are becoming one of the most important causes of death worldwide. Traffic accidents are often due to human error, the probability of which increases when the cognitive ability of the driver decreases. Cognitive capacity is closely related to the driver’s mental state, as well as other external factors such as the CO2 concentration inside the vehicle. The objective of this work is to analyze how these elements affect driving. We have conducted an experiment with 50 drivers who have driven for 25 min using a driving simulator. These drivers completed a survey at the start and end of the experiment to obtain information about their mental state. In addition, during the test, their stress level was monitored using biometric sensors and the state of the environment (temperature, humidity and CO2 level) was recorded. The results of the experiment show that the initial level of stress and tiredness of the driver can have a strong impact on stress, driving behavior and fatigue produced by the driving test. Other elements such as sadness and the conditions of the interior of the vehicle also cause impaired driving and affect compliance with traffic regulations.
Web services are, due to the excellent tool support, simple to provide and use in trivial cases. But their use in non-trivial Web service-based systems like I3M poses new difficulties and problems. I3M is an instant messaging and chat system with distributed and local components collaborating via Web services. One difficulty is to make a series of related Web service invocations in a stateful session. A problem is the performance of collaborating collocated, service-oriented components of a system due to the high Web service invocation overheaed as is shown by measurements. Solutions to both the difficulty and the problem are proposed.
Tauchsimulation
(2003)
Im 1.Kapitel werden die historischen Aspekte des Tauchens und der Tauchphysik beschrieben. Anhand von physikalischen Gesetzen, mathematischen Formeln und empirisch ermittelten Werten werden im 2. Kapitel die nötigen Grundlagen für das Verständnis zur Berechnung eines Tauchgangs vermittelt. Das 3.Kapitel behandelt verschiedene auf dem Markt befindliche Tauchsimulationen, zeigt deren Funktionsumfang sowie deren Vor- und Nachteile. Die erstellte Tauchsimulation wird im 4. Kapitel vorgestellt. Dabei wird auch auf verschiedene Simulationsläufe eingegangen. Zum Abschluß wird ein Ausblick auf aktuelle Entwicklungstendenzen gegeben.
Systematic Generation of XSS and SQLi Vulnerabilities in PHP as Test Cases for Static Code Analysis
(2022)
Synthetic static code analysis test suites are important to test the basic functionality of tools. We present a framework that uses different source code patterns to generate Cross Site Scripting and SQL injection test cases. A decision tree is used to determine if the test cases are vulnerable. The test cases are split into two test suites. The first test suite contains 258,432 test cases that have influence on the decision trees. The second test suite contains 20 vulnerable test cases with different data flow patterns. The test cases are scanned with two commercial static code analysis tools to show that they can be used to benchmark and identify problems of static code analysis tools. Expert interviews confirm that the decision tree is a solid way to determine the vulnerable test cases and that the test suites are relevant.
Selbstorganisierende Karten sind neuronale Netze, die imstande sind, Daten zu klassifizieren und zu reduzieren. Aus diesem Grund eignen sie sich sehr gut fuer die Steuerung von Robotern, da sie deren Sensoreingangswerte klassifizieren und daraus auf eine Reaktion schließen koennen. Die Architektur und Funktionsweise dieser neuronalen Netze sind der des menschlichen Kortex kuenstlich nachgebildet. Im Rahmen dieser Diplomarbeit wurde ein Java-Framework namens JFSOM implementiert, welches nach dem System einer selbstorganisierenden Karte Datenmengen klassifizieren kann. Das Framework ist so entworfen, dass sowohl Eingabedaten als auch Ausgabedaten trainiert werden koennen, um es auch als sensormotorische Karte nutzbarzu machen. JFSOM wurde verwendet, um den Miniaturroboter Khepera nach bestimmten Verhaltensweisen zu steuern. Als Verhaltensweisen wurden eine Hindernisvermeidung, eine Wandverfolgung, eine Korridorverfolgung und eine Objektverfolgung realisiert. Die Wandverfolgung laesst den Roboter aus jedem beliebigen azyklischen Labyrinth herausfinden.
To get a better understanding of Cross Site Scripting vulnerabilities, we investigated 50 randomly selected CVE reports which are related to open source projects. The vulnerable and patched source code was manually reviewed to find out what kind of source code patterns were used. Source code pattern categories were found for sources, concatenations, sinks, html context and fixes. Our resulting categories are compared to categories from CWE. A source code sample which might have led developers to believe that the data was already sanitized is described in detail. For the different html context categories, the necessary Cross Site Scripting prevention mechanisms are described.
We investigated 50 randomly selected buffer overflow vulnerabilities in Firefox. The source code of these vulnerabilities and the corresponding patches were manually reviewed and patterns were identified. Our main contribution are taxonomies of errors, sinks and fixes seen from a developer's point of view. The results are compared to the CWE taxonomy with an emphasis on vulnerability details. Additionally, some ideas are presented on how the taxonomy could be used to improve the software security education.
Smart-Future-Living-Bodensee
(2018)
This paper presents a bed system able to analyze a person’s movement, breathing and recognize the positions that the subject is lying on the bed during the night without any additional physical contact. The measurements are performed with sensors placed between the mattress and the bed-frame. An Intel Edison board was used as an endpoint that served as a communication node from the mesh network to external service. Two nodes and Intel Edison are attached to the bottom of the bed frame and they are connected to the sensors. First test results have indicated the potential of the proposed approach for the recognition of sleep positions with 83% of correct recognized positions.
This thesis emphasizes problems that reports generated by vulnerability scanners impose on the process of vulnerability management, which are a. an overwhelming amount of data and b. an insufficient prioritization of the scan results.
To assist the process of developing means to counteract those problems and to allow for quantitative evaluation of their solutions, two metrics are proposed for their effectiveness and efficiency. These metrics imply a focus on higher severity vulnerabilities and can be applied to any simplification process of vulnerability scan results, given it relies on a severity score and time of remediation estimation for each vulnerability.
A priority score is introduced which aims to improve the widely used Common Vulnerability Scoring System (CVSS) base score of each vulnerability dependent on a vulnerability’s ease of exploit, estimated probability of exploitation and probability of its existence.
Patterns within the reports generated by the Open Vulnerability Assessment System (OpenVAS) vulnerability scanner between vulnerabilities are discovered which identify criteria by which they can be categorized from a remediation actor standpoint. These categories lay the groundwork of a final simplified report and consist of updates that need to be installed on a host, severe vulnerabilities, vulnerabilities that occur on multiple hosts and vulnerabilities that will take a lot of time for remediation. The highest potential time savings are found to exist within frequently occurring vulnerabilities, minor- and major suggested updates.
Processing of the results provided by the vulnerability scanner and creation of the report is realized in the form of a python script. The resulting reports are short, straight to the point and provide a top down remediation process which should theoretically allow to minimize the institutions attack surface as fast as possible. Evaluation of the practicality must follow as the reports are yet to be introduced into the Information Security Management Lifecycle.
Dynamic Real-Time Range Queries (DRRQ) are a common means to handle mobile clients in high-density areas where both, clients requested by the query and the inquirers, are mobile. In contrast to the very well-known continuous range queries, only a few approaches, such as Adaptive Quad Streaming (AQS), address the mandatory scalability and real-time requirements of these so-called ad-hoc mobility challenges. In this paper we present the highly decentralized solution Adaptive Quad Streaming Flexible (AQSflex) as an extension of the already existing more theoretical AQS approach. Beside a highly distributed cell structure without data structures and a lightweight streaming communication, we use a multi-cell-assignment on limited pool resources instead of an idealistic unlimited cell-per-server assignment. The described experimental results show the potential of our local capacity balancing scheme for cell handover in a strongly decentralized setting. Leafs of a cell hierarchy define a kind of self-optimizing fuzzy edge for the processing resources in high-density systems without any centralized controlling or cloud component.
Das häusliche Umfeld kann vor allem für langfristiges Schlafmonitoring verwendet werden. Gute Patientenakzeptanz erfordert niedrige Nutzer- und Installationsbarrieren. Für die Installation zu Hause sind klassische PSG-Systeme aufgrund von ihrer Komplexität wenig passend. Ziel der Entwicklung ist die qualifizierte Erhebung von Parametern, die einerseits eine hinreichend gute Klassifikation von Schlafphasen erlauben und die andererseits durch nicht-invasive Methoden erfasst werden können.
Basierend auf einer Literaturstudie und der Maßgabe nicht-invasive Methoden zu nutzen, wurden folgende Parameter ausgewählt: Körperbewegung, Atmung und Herzschlag. Diese Parameter können nicht-invasiv durch Matratzendrucksensoren erfasst werden. Die Sensorknoten sind als ein Netz von Drucksensoren implementiert, die mit einem leistungsarmen und performanten Mikrocontroller verbunden sind. Alle Knoten sind über einen systemweiten Bus mit Adressarbitrierung verbunden. Der eingebettete Prozessor ist der Mesh-Netzwerk-Endpunkt, der die Netzwerkkonfiguration, Speicherung und Vorverarbeitung der Daten, externen Datenzugriff und Visualisierung ermöglicht.
Das System wurde getestet, indem Experimente durchgeführt wurden, die den Schlaf verschiedener gesunder junger Personen aufzeichneten. Die erhaltenen Ergebnisse bestätigen die Fähigkeit des Systems, Atemfrequenz und Körperbewegung zu erfassen. Ein wesentlicher Unterschied dieses Systems im Vergleich zu anderen Ansätzen ist die innovative Art, die Sensoren unter der Matratze zu platzieren. Diese Eigenschaft erleichtert die kontinuierliche Nutzung des Systems ohne Einfluss auf den gemeinsamen Schlafprozess.
Um Schlafverhalten langfristig zu untersuchen, wird ein Hardwaresystem mit niedrigen Installationsbarrieren für den Einsatz im häuslichen Umfeld. Erste Ergebnisse weisen auf das Potenzial hin, außer Körperbewegung und Atemfrequenz, auch Herzfrequenz erfassen zu können. Die Werte können weiter verbessert werden, wenn die Sensorabfragefrequenz erhöht wird. Nach der Weiterentwicklung des Systems, soll es mit dem Softwarealgorithmus für die Schlafphasenerkennung verbunden werden.
The process of restoring our body and brain from fatigue is directly depend-ing on the quality of sleep. It can be determined from the report of the sleep study results. Classification of sleep stages is the first step of this study and this includes the measurement of biovital data and its further processing.
In this work, the sleep analysis system is based on a hardware sensor net, namely a grid of 24 pressure sensors, supporting sleep phase recognition. In comparison to the leading standard, which is polysomnography, the proposed approach is a non-invasive system. It recognises respiration and body move-ment with only one type of low-cost pressure sensors forming a mesh archi-tecture. The nodes implement as a series of pressure sensors connected to a low-power and performant microcontroller. All nodes are connected via a system wide bus with address arbitration. The embedded processor is the mesh network endpoint that enables network configuration, storing and pre-processing of the data, external data access and visualization.
The system was tested by executing experiments recording the sleep of different healthy young subjects. The results obtained have indicated the po-tential to detect breathing rate and body movement. A major difference of this system in comparison to other approaches is the innovative way to place the sensors under the mattress. This characteristic facilitates the continuous using of the system without any influence on the common sleep process.