Reports

The page provides the list of the Confidential Reports and related Internal Reports, which describe the activities and sub-tasks carried on during the SnATCH Project implementation, in accordance with the internal Project time schedule, thus ensuring the achievement of all the agreed objectives.

Project Plan 2017-2019

The Project Plan document describes the main activities to be implemented during the SnATCH Project, thus allowing the achievement of the expected objectives. The document also describes the time schedule as intended for each of the work packages described in the report.

Confidential Report N1.1

Common Cultural Heritage Analysis

The document is devoted to the analysis of the principal cultural heritage for Italy and for Japan. The objective of this evaluation is to know which kind of artworks and building could be monitored to achieve the objective of this project of Structural Health Monitoring in Cultural Heritage.

Internal reports:
  • Italian Cultural Heritage
  • Japanese Cultural Heritage


Confidential Report N1.2

SoA solutions to pervasive computing and distributed monitoring systems

The document is devoted to the analysis of the State of the Art (SoA) for Structural Health Monitoring (SHM) systems, as implemented in the literature. In particular, the investigation is focused on the study of the potential advantages and disadvantages, which may be obtained by the deployment of such systems for the distributed and continuous monitoring of the interested scenarios. Moreover, the analysis is also devoted to the investigation of the commonly used approaches for pervasive computing and distributed systems, thus enabling the data acquisition related to diversified quantities. The SoA review reported in this document will also demonstrate how technologies and methodologies applied to the investigated problem, may improve the defense of cultural heritage, such as in maintenance and safeguard of the artworks.

Internal reports:
  • Structural Health Monitoring Systems Overview
  • Non-destructive Method
  • Destructive Method
  • Monitoring Systems Overview
  • Application Examples


Confidential Report N1.3

Wireless Sensor Network in Structural Health Monitoring

Investigation of the main platforms and devices employed for the implementation of monitoring distributed systems. The analysis is mainly focused on the technical aspects, thus identifying how and with which devices common SoA solutions are implemented.

Internal reports:
  • Wireless Sensor Network in Structural Health Monitoring
  • Wired Sensor Network in Structural Health Monitoring


Confidential Report N1.4

The ELEDIA Know-How in pervasive computing and distributed systems

Report on the ELEDIA know-how on distributed monitoring systems, as applied to several application scenarios. The analysis of the main pros and cons of the experienced systems is also described, as validated by the on-site implemented monitoring systems.

Internal reports:
  • ELEDIA outdoor monitoring from Precision Farming Applications
  • ELEDIA Smart Building Systems
  • ELEDIA Smart Museum Background


Confidential Report N1.5

Project Application Constraints and Objectives

Study and definition of the application constraints, which may impact on the monitoring system to be design in the successive activities. A reference scenario is also considered for the analysis.

Internal reports:
  • Definition of a reference scenario for Cultural Heritage SHM
  • Application constraints analysis

Confidential Report N2.1

Analysis of WSN devices for distributed monitoring systems

Analysis of the principal devices used for WSN networks. Particular focus is given to the analysis of size, power consumption, connection capabilities (considering wireless connectivity as well as connection input/output interfaces already available on or additional to the devices).

Internal reports:
  • General review of SoA WSN
  • Analysis of TmoteSky devices
  • Analysis of TinyNode devices
  • Analysis of 3MATE devices
  • Analysis of Arduino devices
  • Analysis of XBEE devices
  • Analysis of Lora devices
  • Analysis of WiFi devices

Confidential Report N2.2

Off-the-shelf sensors investigation for environmental and structural monitoring

Off-the-shelf sensors investigation for environmental and structural monitoring, with specific focus on both performance and technical features (such as size, power consumption, etc.) to comply with the general view in the WSN design as investigated in this WP.

Internal reports:
  • General review of the off-the-shelf sensors for SHM
  • Analysis of hygrometric sensors
  • Analysis of accelerometers sensors
  • Analysis of vibrations sensors
  • Analysis of optical fiber as a sensor

Confidential Report N2.3.1

Preliminary WSN prototype design

Design of a WSN prototype as a preliminary validation of the proposed sensors and devices.

Internal reports:
  • Sensors integration circuits
  • Sensor node prototype design
  • Gateway node prototype design

Confidential Report N2.3.2

Evaluation and Analysis of Additional Stress Sensors

Assessment and integration testing of stress sensors into the proposed monitoring system.

Internal reports:
  • Assessment of stress sensors
  • Integration testing of stress sensors into monitoring device

Confidential Report N2.4.1

Design and implementation of the preliminary scaled monitoring system

Implementation of the proposed WSN design as a small-scale network (sensor nodes and gateway devices).

Internal reports:
  • Implementation of the preliminary sensor node prototype
  • Implementation of the preliminary gateway prototype

Confidential Report N2.4.2

Preliminary experimental assessment of the scaled monitoring system

Preliminary experimental validation and performance assessment of the proposed monitoring system implementation within the test environment (representative of a museum environment).

Internal reports:
  • WSN as Monitoring system
  • Definition of Performance Metrics
  • Preliminary Experimental Assessment of the monitoring system

Confidential Report N3.1

State of the Art Analysis of Inversion Methods and Learning by Example Methodologies

Inversion methods analysis. A general overview of the main methods for data inversion is provided together with the description of the main advantages per each investigated method.

Internal reports:
  • Inversion method analysis, general overview of Stochastic Methods
  • Analysis of Compressive Sensing methodologies
  • Learning by Examples (LBE) techniques analysis, general overview

Confidential Report N3.2

Commonly Applied Methodologies for Monitoring Systems in Cultural Heritage Applications

Investigation of the commonly applied inversion methods to data obtained with distributed monitoring systems (e.g., for environmental and structural monitoring), considering the specific typology and nature of the data to be analysed.

Internal reports:
  • SoA analysis of inversion method commonly used for SHM

Confidential Report N3.3.1

Definition of the prototypal version of the inversion, learning, and optimization methodologies

Internal reports:
  • Regulations for the definition of the a-priori information used during training phase
  • Inversion, learning, and optimization methodologies for health status estimation in museums

Confidential Report N3.3.2

Preliminary Implementation of the prototypal version of the inversion, learning, and optimization methodologies

Internal reports:
  • Preliminary implementation of the proposed training/testing approach
  • Preliminary definition of dataset formats for implementation assessment

Confidential Report N4.2

Definition of the requirements for the validation of the monitoring system

Internal reports:
  • Preliminary definition of the functional requirements
  • Preliminary definition of the non-functional requirements

Confidential Report N5.1

Results dissemination and exploitation