49 research outputs found

    Adopting MQTT for a multi protocols IoMT system

    Get PDF
    Coronavirus disease (COVID-19) altered the way of caregiving and the new pandemic forced the health systems to adopt new treatment protocols in which remote follow-up is essential. This paper introduces a proposed system to link a remote healthcare unit as it is inside the hospital. Two different network protocols; a global system for mobile communication (GSM) and Wi-Fi were used to simulate the heath data transfer from the two different geographical locations, using Raspberry Pi development board and Microcontroller units. Message queuing telemetry transport (MQTT) protocol was employed to transfer the measured data from the healthcare unit to the hospital’s Gateway. The gateway is used to route the aggregated health data from healthcare units to the hospital server, doctors’ dashboards, and the further processing. The system was successfully implemented and tested, where the experimental tests show that the remote healthcare units using a GSM network consumed about 900 mWh. A high percentage of success data packets transfer was recorded within the network framework as it reaches 99.89% with an average round trip time (RTT) of 7.5 milliseconds and a data transfer rate up to 12.3 kbps

    Flexible and dynamic network coding for adaptive data transmission in DTNs

    Get PDF
    Existing network coding approaches for Delay-Tolerant Networks (DTNs) do not detect and adapt to congestion in the network. In this paper we describe CafNC (Congestion aware forwarding with Network Coding) that combines adaptive network coding and adaptive forwarding in DTNs. In CafNC each node learns the status of its neighbours, and their egonetworks in order to detect coding opportunities, and codes as long as the recipients can decode. Our flexible design allows CafNC to efficiently support multiple unicast flows, with dynamic traffic demands and dynamic senders and receivers. We evaluate CafNC with two real connectivity traces and a realistic P2P application, introducing congestion by increasing the number of unicast flows in the network. Our results show that CafNC improves the success ratio, delay and packet loss, as the number of flows grows in comparison to no coding and hub-based static coding, while at the same time achieving efficient utilisation of network resources. We also show that static coding misses a number of coding opportunities and increases packet loss rates at times of increased congestion

    Monitoring wireless sensor network nodes with a low intrusion hybrid monitor

    Full text link
    [EN] This work presents an active hybrid monitor with low intrusion, to be applied on sensor network nodes. Intrusion caused to the sensor node has been evaluated on three aspects: time, additional code, and power consumption.[ES] Se presenta un monitor hĂ­brido activo de baja intrusiĂłn, aplicable a nodos de redes de sensores. La intrusiĂłn causada al nodo sensor ha sido evaluada en tres aspectos: tiempo, cĂłdigo adicional, y el consumo de energĂ­a.Navia Mendoza, MR. (2015). Monitoring wireless sensor network nodes with a low intrusion hybrid monitor. http://hdl.handle.net/10251/67823Archivo delegad

    Educational Technology and Related Education Conferences for January to June 2011 - November 11, 2010

    Get PDF
    If you attend the same conferences each year, you don’t need to scan this list. This list is your opportunity to “push the envelope” by trying something new. There are hundreds of professional development events that may give you a different perspective or help you learn a new skill. Rather than attend the same event you always do, scan this list and investigate conferences, symposiums, or workshops you have never attended. The list below covers selected events focused primarily on the use of technology in educational settings and on teaching, learning, and educational administration. Only listings until June 2011 are complete as dates, locations, or URLs are not available for a number of events held after June 2011. A Word 2003 format is used to enable people who do not have access to Word 2007 or higher version and those with limited or high-cost Internet access to find a conference that is congruent with their interests or obtain conference proceedings. (If you are seeking a more interactive listing, refer to online conference sites.) Consider using the “Find” tool under Microsoft Word’s “Edit” tab or similar tab in OpenOffice to locate the name of a particular conference, association, city, or country. If you enter the country “United Kingdom” in the “Find” tool, all conferences that occur in the United Kingdom will be highlighted. Then, “cut and paste” a list of suitable events for yourself and your colleagues. Please note that events, dates, titles, and locations may change; thus, CHECK the specific conference website. Note also that some events will be cancelled at a later date. All Internet addresses were verified at the time of publication. No liability is assumed for any errors that may have been introduced inadvertently during the assembly of this conference list. If possible, please do not remove the contact information when you re-distribute the list as that is how I receive updates and corrections. If you publish the list on the web, please note its source

    Contributions to Wireless multi-hop networks : Quality of Services and Security concerns

    Get PDF
    Ce document résume mes travaux de recherche conduits au cours de ces 6 dernières années. Le principal sujet de recherche de mes contributions est la conception et l’évaluation des solutions pour les réseaux sans fil multi-sauts en particulier les réseaux mobiles adhoc (MANETs), les réseaux véhiculaires ad hoc (VANETs), et les réseaux de capteurs sans fil (WSNs). La question clé de mes travaux de recherche est la suivante : « comment assurer un transport des données e cace en termes de qualité de services (QoS), de ressources énergétiques, et de sécurité dans les réseaux sans fil multi-sauts? » Pour répondre à cette question, j’ai travaillé en particulier sur les couches MAC et réseau et utilisé une approche inter-couches.Les réseaux sans fil multi-sauts présentent plusieurs problèmes liés à la gestion des ressources et au transport des données capable de supporter un grand nombre de nœuds, et d’assurer un haut niveau de qualité de service et de sécurité.Dans les réseaux MANETs, l’absence d’infrastructure ne permet pas d’utiliser l’approche centralisée pour gérer le partage des ressources, comme l’accès au canal.Contrairement au WLAN (réseau sans fil avec infrastructure), dans les réseaux Ad hoc les nœuds voisins deviennent concurrents et il est di cile d’assurer l’équité et l’optimisation du débit. La norme IEEE802.11 ne prend pas en compte l’équité entre les nœuds dans le contexte des MANETs. Bien que cette norme propose di érents niveaux de transmission, elle ne précise pas comment allouer ces débits de manière e cace. En outre, les MANETs sont basés sur le concept de la coopération entre les nœuds pour former et gérer un réseau. Le manque de coopération entre les nœuds signifie l’absence de tout le réseau. C’est pourquoi, il est primordial de trouver des solutions pour les nœuds non-coopératifs ou égoïstes. Enfin, la communication sans fil multi-sauts peut participer à l’augmentation de la couverture radio. Les nœuds de bordure doivent coopérer pour transmettre les paquets des nœuds voisins qui se trouvent en dehors de la zone de couverture de la station de base.Dans les réseaux VANETs, la dissémination des données pour les applications de sureté est un vrai défi. Pour assurer une distribution rapide et globale des informations, la méthode de transmission utilisée est la di usion. Cette méthode présente plusieurs inconvénients : perte massive des données due aux collisions, absence de confirmation de réception des paquets, non maîtrise du délai de transmission, et redondance de l’information. De plus, les applications de sureté transmettent des informations critiques, dont la fiabilité et l’authenticité doivent être assurées.Dans les réseaux WSNs, la limitation des ressources (bande passante, mémoire, énergie, et capacité de calcul), ainsi que le lien sans fil et la mobilité rendent la conception d’un protocole de communication e cace di cile. Certaines applications nécessitent un taux important de ressources (débit, énergie, etc) ainsi que des services de sécurité, comme la confidentialité et l’intégrité des données et l’authentification mutuelle. Ces paramètres sont opposés et leur conciliation est un véritable défi. De plus, pour transmettre de l’information, certaines applications ont besoin de connaître la position des nœuds dans le réseau. Les techniques de localisation sou rent d’un manque de précision en particulier dans un environnement fermé (indoor), et ne permettent pas de localiser les nœuds dans un intervalle de temps limité. Enfin, la localisation des nœuds est nécessaire pour assurer le suivi d’objet communicant ou non. Le suivi d’objet est un processus gourmand en énergie, et requiert de la précision.Pour répondre à ces défis, nous avons proposé et évalué des solutions, présentées de la manière suivante : l’ensemble des contributions dédiées aux réseaux MANETs est présenté dans le deuxième chapitre. Le troisième chapitre décrit les solutions apportées dans le cadre des réseaux VANETs. Enfin, les contributions liées aux réseaux WSNs sont présentées dans le quatrième chapitre

    IoT-Based Applications in Healthcare Devices

    Get PDF
    The last decade has witnessed extensive research in the field of healthcare services and their technological upgradation. To be more specific, the Internet of Things (IoT) has shown potential application in connecting various medical devices, sensors, and healthcare professionals to provide quality medical services in a remote location. This has improved patient safety, reduced healthcare costs, enhanced the accessibility of healthcare services, and increased operational efficiency in the healthcare industry. The current study gives an up-to-date summary of the potential healthcare applications of IoT- (HIoT-) based technologies. Herein, the advancement of the application of the HIoT has been reported from the perspective of enabling technologies, healthcare services, and applications in solving various healthcare issues. Moreover, potential challenges and issues in the HIoT system are also discussed. In sum, the current study provides a comprehensive source of information regarding the different fields of application of HIoT intending to help future researchers, who have the interest to work and make advancements in the field to gain insight into the topic

    UAV IoT frameworks views and challenges : towards protecting drones as "things"

    Get PDF
    Unmanned aerial vehicles (UAVs) have enormous potential in enabling new applications in various areas, ranging from military, security, medicine, and surveillance to traffic-monitoring applications. Lately, there has been heavy investment in the development of UAVs and multi-UAVs systems that can collaborate and complete missions more efficiently and economically. Emerging technologies such as 4G/5G networks have significant potential on UAVs equipped with cameras, sensors, and GPS receivers in delivering Internet of Things (IoT) services from great heights, creating an airborne domain of the IoT. However, there are many issues to be resolved before the effective use of UAVs can be made, including security, privacy, and management. As such, in this paper we review new UAV application areas enabled by the IoT and 5G technologies, analyze the sensor requirements, and overview solutions for fleet management over aerial-networking, privacy, and security challenges. Finally, we propose a framework that supports and enables these technologies on UAVs. The introduced framework provisions a holistic IoT architecture that enables the protection of UAVs as "flying" things in a collaborative networked environment

    Evaluating and improving indoor positioning methods

    Get PDF

    Educational Technology and Education Conferences, June to December 2012

    Get PDF
    The conference list contains events such as "Learning and Teaching","Innovation in e-Learning", "Online Teaching", "Distance Learning Administration", "The World Open Educational Resources Congress", "Mobile Health", and "Realizing Dreams"

    Presence Aware Power Saving Mode (PA-PSM) enhancement for IoT devices for energy conservation

    Get PDF
    The Internet of Things has brought a vision to turn the digital object into smart devices by adding an intelligence system and thereafter connecting them to the internet world. These smart devices accumulate environmental information with the help of sensors and act consequently without human intervention. The Internet of Thing is a rapidly growing industry with expected 50 - 200 billion smart devices to connect to the internet. Multi-billions of smart devices will produce a substantial amount of data to provide services to human society, although, it will lead to increase energy consumption at the highest level and drive to high energy bills. Moreover, the flood of IoT devices may also lead to energy scarcity. IoT is nowadays mainly focused on the IT industry and researchers believe the next wave of IoT may connect 1 trillion sensors by 2025. Even if these sensors would have 10 years of battery life, it will still require 275 million batteries to be replaced every day. Therefore, it is a necessity to reduce energy consumption in smart devices. “Presence Aware Power Saving Mode (PA-PSM) Enhancement for IoT Devices for Energy Conservation”, a proposed novel approach in this research paper by the help of a proposed algorithm in this research paper to reduce power consumption by individual devices within smart homes. In the proposed approach, a centralized automation controller keeps the less priority smart devices into deep sleep mode to save energy and experiments suggest the proposed system may help to reduce 25.81% of the energy consumed by smart devices within the smart home
    corecore