Integrated wireless powering and data interrogation for civil infrastructure monitoring

  • S. G. Taylor
  • , E. B. Flynn
  • , D. L. Mascarenas
  • , M. D. Todd
  • , D. Dondi
  • , T. Rosing
  • , S. Kpotufe
  • , S. Dasgupta
  • , K. Lin
  • , R. Gupta
  • , K. M. Farinholt
  • , G. Park
  • , C. R. Farrar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Post-event inspection of bridges after unexpected events (e.g. an earthquake) is an extremely important step in the path toward damage assessment and functionality restoration. We present how a team of structural, mechanical, electrical, and computer engineers are designing and deploying a variant on sensor networking to address this. The work will present a hybrid approach to sensor array powering and interrogation, where both power and interrogation commands are conveyed via autonomous vehicles. A prototype system described here is demonstrated on a full-scale bridge.

Original languageEnglish (US)
Title of host publicationBridge Maintenance, Safety, Management and Life-Cycle Optimization - Proceedings of the 5th International Conference on Bridge Maintenance, Safety and Management
Pages306-312
Number of pages7
StatePublished - 2010
Event5th International Conference on Bridge Maintenance, Safety and Management, IABMAS 2010 - Philadelphia, PA, United States
Duration: Jul 11 2010Jul 15 2010

Publication series

NameBridge Maintenance, Safety, Management and Life-Cycle Optimization - Proceedings of the 5th International Conference on Bridge Maintenance, Safety and Management

Other

Other5th International Conference on Bridge Maintenance, Safety and Management, IABMAS 2010
Country/TerritoryUnited States
CityPhiladelphia, PA
Period7/11/107/15/10

All Science Journal Classification (ASJC) codes

  • Safety, Risk, Reliability and Quality
  • Building and Construction

Fingerprint

Dive into the research topics of 'Integrated wireless powering and data interrogation for civil infrastructure monitoring'. Together they form a unique fingerprint.

Cite this