7,106 research outputs found

    Wireless body sensor networks for health-monitoring applications

    Get PDF
    This is an author-created, un-copyedited version of an article accepted for publication in Physiological Measurement. The publisher is not responsible for any errors or omissions in this version of the manuscript or any version derived from it. The Version of Record is available online at http://dx.doi.org/10.1088/0967-3334/29/11/R01

    Fine recycled concrete aggregate as a material replacement in concrete production

    Get PDF
    As a fast and rapid growing nation, Malaysia undergoes a lot of development especially in construction field. Most of the building nowadays are being made mainly using concrete as it provides many favorable features such as satisfactory compressive strength, durability, availability, versatility and cost effectiveness. However, in pursuing the development era, sometimes the authorities overlooked about the construction and demolition (C&D) waste that had been created along the development progress. Construction and demolition waste is becoming a vital issue especially to the environmental aspect in many large cities in the world (Chen et al., 2002). Shen [1] describe C&D waste as the waste which generated from renovation, site clearing, demolition, construction, roadwork, land excavation and civil and building construction. Construction and Demolition (C&D) waste constitutes a major portion of total solid waste production in the world, and most of it is used in landfills .

    Interoperability and standardisation in community telecare: a review

    Get PDF

    Characterization of the on-body path Loss at 2.45 GHz and energy efficient WBAN design for dairy cows

    Get PDF
    Wireless body area networks (WBANs) provide promising applications in the healthcare monitoring of dairy cows. The characterization of the path loss (PL) between on-body nodes constitutes an important step in the deployment of a WBAN. In this paper, the PL between nodes placed on the body of a dairy cow was determined at 2.45 GHz. Finite-difference time domain simulations with two half-wavelength dipoles placed 20 mm above a cow model were performed using a 3-D electromagnetic solver. Measurements were conducted on a live cow to validate the simulation results. Excellent agreement between measurements and simulations was achieved and the obtained PL values as a function of the transmitter-receiver separation were well fitted by a lognormal PL model with a PL exponent of 3.1 and a PL at reference distance ( 10 cm) of 44 dB. As an application, the packet error rate ( PER) and the energy efficiency of different WBAN topologies for dairy cows (i.e., single-hop, multihop, and cooperative networks) were investigated. The analysis results revealed that exploiting multihop and cooperative communication schemes decrease the PER and increase the optimal payload packet size. The analysis results revealed that exploiting multihop and cooperative communication schemes increase the optimal payload packet size and improve the energy efficiency by 30%

    Internet of Things-aided Smart Grid: Technologies, Architectures, Applications, Prototypes, and Future Research Directions

    Full text link
    Traditional power grids are being transformed into Smart Grids (SGs) to address the issues in existing power system due to uni-directional information flow, energy wastage, growing energy demand, reliability and security. SGs offer bi-directional energy flow between service providers and consumers, involving power generation, transmission, distribution and utilization systems. SGs employ various devices for the monitoring, analysis and control of the grid, deployed at power plants, distribution centers and in consumers' premises in a very large number. Hence, an SG requires connectivity, automation and the tracking of such devices. This is achieved with the help of Internet of Things (IoT). IoT helps SG systems to support various network functions throughout the generation, transmission, distribution and consumption of energy by incorporating IoT devices (such as sensors, actuators and smart meters), as well as by providing the connectivity, automation and tracking for such devices. In this paper, we provide a comprehensive survey on IoT-aided SG systems, which includes the existing architectures, applications and prototypes of IoT-aided SG systems. This survey also highlights the open issues, challenges and future research directions for IoT-aided SG systems

    Smart Computing and Sensing Technologies for Animal Welfare: A Systematic Review

    Get PDF
    Animals play a profoundly important and intricate role in our lives today. Dogs have been human companions for thousands of years, but they now work closely with us to assist the disabled, and in combat and search and rescue situations. Farm animals are a critical part of the global food supply chain, and there is increasing consumer interest in organically fed and humanely raised livestock, and how it impacts our health and environmental footprint. Wild animals are threatened with extinction by human induced factors, and shrinking and compromised habitat. This review sets the goal to systematically survey the existing literature in smart computing and sensing technologies for domestic, farm and wild animal welfare. We use the notion of \emph{animal welfare} in broad terms, to review the technologies for assessing whether animals are healthy, free of pain and suffering, and also positively stimulated in their environment. Also the notion of \emph{smart computing and sensing} is used in broad terms, to refer to computing and sensing systems that are not isolated but interconnected with communication networks, and capable of remote data collection, processing, exchange and analysis. We review smart technologies for domestic animals, indoor and outdoor animal farming, as well as animals in the wild and zoos. The findings of this review are expected to motivate future research and contribute to data, information and communication management as well as policy for animal welfare

    Solutions and Tools for Secure Communication in Wireless Sensor Networks

    Get PDF
    Secure communication is considered a vital requirement in Wireless Sensor Network (WSN) applications. Such a requirement embraces different aspects, including confidentiality, integrity and authenticity of exchanged information, proper management of security material, and effective prevention and reaction against security threats and attacks. However, WSNs are mainly composed of resource-constrained devices. That is, network nodes feature reduced capabilities, especially in terms of memory storage, computing power, transmission rate, and energy availability. As a consequence, assuring secure communication in WSNs results to be more difficult than in other kinds of network. In fact, trading effectiveness of adopted solutions with their efficiency becomes far more important. In addition, specific device classes or technologies may require to design ad hoc security solutions. Also, it is necessary to efficiently manage security material, and dynamically cope with changes of security requirements. Finally, security threats and countermeasures have to be carefully considered since from the network design phase. This Ph.D. dissertion considers secure communication in WSNs, and provides the following contributions. First, we provide a performance evaluation of IEEE 802.15.4 security services. Then, we focus on the ZigBee technology and its security services, and propose possible solutions to some deficiencies and inefficiencies. Second, we present HISS, a highly scalable and efficient key management scheme, able to contrast collusion attacks while displaying a graceful degradation of performance. Third, we present STaR, a software component for WSNs that secures multiple traffic flows at the same time. It is transparent to the application, and provides runtime reconfigurability, thus coping with dynamic changes of security requirements. Finally, we describe ASF, our attack simulation framework for WSNs. Such a tool helps network designers to quantitatively evaluate effects of security attacks, produce an attack ranking based on their severity, and thus select the most appropriate countermeasures
    • 

    corecore