Michael Schukat

Learn More
Wireless sensor networks (WSN) are inherently difficult to secure: Limited memory resources rule out the predistribution of keys or certificates, while manual device (and key) configuration in the field is not feasible due to the dynamic and ad-hoc nature of WSNs. All this is complicated by the fact that WSN nodes are not tamper resistant and operate over(More)
This paper presents a diagnostic system for cardiac arrhythmias from ECG data, using an Artificial Neural Network (ANN) classifier based on a Bayesian framework. The Bayesian ANN Classifier is built by the use of a logistic regression model and the back propagation algorithm. A dual threshold method is applied to determine the diagnosis strategy and(More)
This paper presents and new approach to robot exploration and mapping using a team of cooperative robots. This approach aims to exploit the increase in sensor data that multiple robots offer to improve efficiency, accuracy and detail in maps created, and also the lower cost in employing a group of inexpensive robots. The exploration technique involves(More)
With an estimated 50 billion internet-enabled devices deployed by 2020, the arrival of the Internet of Things (IoT) or Internet of Everything (IoE) raises many questions regarding the suitability and adaptability of current computer security standards to provide privacy, data integrity and end entity authentication between communicating peers. In this paper(More)
Energy Systems are undergoing radical changes, driven by a combination of factors, including full economic cost, efficiency, environmental impact and security-of-supply, while being facilitated by increased deregulation. This complexity can only be dealt with effectively with the rollout of complex ICT systems that will play a significant role in managing,(More)
WiFi-enabled mobile devices such as smartphones and tablets are being increasingly used by both personal and business users for Voice over IP (VoIP) communications, while also supporting conventional data applications such as email, file transfer and web access. Previous research has shown that time synchronized endpoints can provide better QoS by utilizing(More)