Download View/Open

Transcript
Priority B
• Controlling the sensor, e.g. by setting parameters, may be provided
remotely.
Security
Priority A
• The program must be secured against unauthorized access.
• The program must ensure that the user is authenticated before the user
is allowed to download data or set sensor parameters.
Priority B
• Access to view the captured data may be allowed without authentication.
Hardware functionality
Power supply
Priority B
• Review the available power supply.
• Plan a robust and failsafe system for continuous power supply to the
sensor.
Priority C
• Implement the planned power supply system.
Future adaptation: Underwater operations
Priority C
• Review systems and methods for adapting the sensor to underwater
operations.
• Plan/design a system for adapting the sensor to underwater operations,
e.g. on landers and mobile platforms such as AUV/ROV.
4