Download View/Open
Transcript
Priority B • Controlling the sensor, e.g. by setting parameters, may be provided remotely. Security Priority A • The program must be secured against unauthorized access. • The program must ensure that the user is authenticated before the user is allowed to download data or set sensor parameters. Priority B • Access to view the captured data may be allowed without authentication. Hardware functionality Power supply Priority B • Review the available power supply. • Plan a robust and failsafe system for continuous power supply to the sensor. Priority C • Implement the planned power supply system. Future adaptation: Underwater operations Priority C • Review systems and methods for adapting the sensor to underwater operations. • Plan/design a system for adapting the sensor to underwater operations, e.g. on landers and mobile platforms such as AUV/ROV. 4