21 research outputs found

    IoT And Cloud Server Based Wearable Health Sensors Monitoring System

    Get PDF
    The healthcare monitoring systems has emerged as one of the most vital system and became technology oriented from the past decade. Humans are facing a problem of unexpected death due to various illness which is because of lack of medical care to the patients at right time. The primary goal was to develop a reliable patient monitoring system using IoT so that the healthcare professionals can monitor their patients, who are either hospitalized or at home using an IoT based integrated healthcare system with the view of ensuring patients are cared for better. A mobile device based wireless healthcare monitoring system was developed which can provide real time online information about physiological conditions of a patient mainly consists of sensors, the data acquisition unit, microcontroller (i.e., Arduino), and programmed with a software (i.e., JAVA). The patient’s temperature, heart beat rate, EEG data are monitored, displayed and stored by the system and sent to the doctor’s mobile containing the application. Thus IOT based monitoring system effectively monitor patient’s health status and save life on time

    Determining the Drivers and Barriers to the Adoption of Smart Vending Machine

    Get PDF
    The Internet of Things (IoT) revolution is revolutionizing numerous industries, including the vending machine industry. Smart vending machines are one example of how the Internet of Things is altering the way vending machines operate. Smart vending machines can do functions other than merely dispatching products in exchange for payment by combining modern technologies such as internet connectivity and touch screens. They can make purchasing more convenient for customers, track inventories in real-time, and even take mobile payments using a smartphone app. By surveying 412 business owners, this study employed a stacking classifier to analyze the determinants of smart vending machine adoption. The findings indicate that improved security and safety, as well as the decrease in operational costs, are the primary drivers of adoption among firms that have adopted the smart vending machine. Smart vending machines can be equipped with security cameras and alarms to deter theft and vandalism, as well as to prevent contamination or tampering. This can help to improve the vending machine's general security and safety, as well as the products it dispenses. By automating processes such as inventory management and refilling, smart vending machines can also help to minimize operating expenses. This can save the operator time and money. This study's findings also revealed that the primary barriers to adoption are upfront costs and technological challenges. The initial cost of purchasing and installing a Smart vending machine might be too expensive, particularly for SMEs. Operators may be required to spend on technical help and training in order to successfully use and maintain this equipment. The future of vending machines is expected to witness a steady move toward Smart vending machines. As sophisticated technology becomes more widely accessible and inexpensive, more operators are likely to realize it and make the switch

    Cross-layer Routing in Wireless Sensor Networks for Machine-to-Machine Intelligent Hazard Monitoring Applications

    Get PDF
    Abstract-Machine-to-Machine (M2M) technologies allow network-to-device communications. M2M covers a wide scope of technologies including sensing and wireless networking protocols. Hazard monitoring applications based M2M such as monitoring using wireless sensor networks (WSNs) are challenged by realtime and interference-aware requirements. The designed communication mechanisms need to guarantee efficient M2M communication and performance management. In hazard monitoring applications, network topology changes rapidly due to device failures. Cross-layer design is an effective scheme to improve communication performance. In this paper, we propose a novel cross-layer mechanism with joint power control, dynamic link scheduling and routing (JPDSR) in hazard scenarios. The joint mechanism of routing, power control and link scheduling with double frame scheme guarantees a high probability of interference-aware and real-time data delivery in hazard according to event priorities. We conduct simulations and compare it with related work. The simulation results show that our routing has better performance that is more suitable for hazard monitoring applications

    Low Complexity Wireless Communication Digital Baseband Design

    Get PDF
    abstract: This thesis addresses two problems in digital baseband design of wireless communication systems, namely, those in Internet of Things (IoT) terminals that support long range communications and those in full-duplex systems that are designed for high spectral efficiency. IoT terminals for long range communications are typically based on Orthogonal Frequency-Division Multiple Access (OFDMA) and spread spectrum technologies. In order to design an efficient baseband architecture for such terminals, the workload profiles of both systems are analyzed. Since frame detection unit has by far the highest computational load, a simple architecture that uses only a scalar datapath is proposed. To optimize for low energy consumption, application-specific instructions that minimize register accesses and address generation units for streamlined memory access are introduced. Two parameters, namely, correlation window size and threshold value, affect the detection probability, the false alarm probability and hence energy consumption. Next, energy-optimal operation settings for correlation window size and threshold value are derived for different channel conditions. For both good and bad channel conditions, if target signal detection probability is greater than 0.9, the baseband processor has the lowest energy when the frame detection algorithm uses the longest correlation window and the highest threshold value. A full-duplex system has high spectral efficiency but suffers from self-interference. Part of the interference can be cancelled digitally using equalization techniques. The cancellation performance and computation complexity of the competing equalization algorithms, namely, Least Mean Square (LMS), Normalized LMS (NLMS), Recursive Least Square (RLS) and feedback equalizers based on LMS, NLMS and RLS are analyzed, and a trade-off between performance and complexity established. NLMS linear equalizer is found to be suitable for resource-constrained mobile devices and NLMS decision feedback equalizer is more appropriate for base stations that are not energy constrained.Dissertation/ThesisMasters Thesis Electrical Engineering 201

    Evaluation of DECT for low latency real-time industrial control networks

    Get PDF
    c. 1905. Pale yellow rayon faille Princess line dress with a bobbinet overlay appliquéd with cream wool Art Nouveau lilies and finished with machine-made Chantilly lace flounces, closing in back, with short sleeves and a floor-length skirt. The dress is made from long fitted panels without a waist seam. Eight shaped pieces extend from the bodice to the skirt hem: two narrow front panels with a center seam, two side-front panels, two side-back panels, and two back panels with a center-back opening with twenty hooks. The panels narrow at the waist, curve over the hips and flare to the hem. The bodice portion of the dress is lined with white cotton just past the waist, made with one front panel shaped with two darts, and two back panels with one dart each. The dress has a scooped neckline in front and back, and has close-fitting sleeves ending above the elbow, made with one seam. The overlay is a two-twist bobbinet appliquéd before construction. Tightly woven cream wool was machine-sewn to the bobbinet with continuous lengths of pale yellow braided cord outlining columns of large stylized Art Nouveau lilies, stems, and leaves. The wool ground was then carefully cut away from the bobbinet, leaving the floral elements behind, as evidenced in part by a lily at the left front skirt hem missing its interior detail cut on one petal. There are two panels in the overlay, sewn to each other with a free-floating center-front seam and sewn to the dress at the neckline (dipping about 10.2 cm / 4 in. down from the edge at center-front), shoulders, and scyes. The overlay’s center-front seam runs precisely down the middle of a column of lilies, matching flower halves from left and right, and the join is reinforced by retaining the full, continuous length of the wool seam allowance and by leaving the interior details of flowers straddling the seam uncut. The bobbinet is, by its nature, stretchy and so drapes closely to the contours of the dress beneath; the panels wrap diagonally around the sides to the back, pulled up from their straight grain center-front seam into a bias angle in back where the columns of lilies form chevrons where they meet at center. The ends of the panels fold over the edges of the center-back opening of the underlying fabric. This draping results in the overlay skirt coming to a point just above the hem in front and rising almost to waist level in back. A machine-made Chantilly lace flounce, shorter in front and lengthening to the back, is added to the bottom edge of the bobbinet, so that the complete overlay skirt is 99.1 cm / 39 in. long in front as measured from the waistline, and 35.6 cm / 14 in. long in back. In the bodice, the flowers and leaves are applied individually to create a horizontal trim across the neckline, reaching slightly past its edge. At the front, an asymmetrical Chantilly flounce is sewn beneath the appliqué, shorter and fuller on the left side than on the right, hanging to the waist in front and ending in back at the shoulders. A lily is centered at the top of the bodice opening, sewn down on the right side and overlapping the opening to hook closed on the left. The sleeves are covered with the same bobbinet and appliqué, and are finished with a gathered, knotted band of the Chantilly lace. Machine-sewn and hand-sewn.https://scholars.unh.edu/bowen_collection/2008/thumbnail.jp

    Evaluation of DECT for low latency real-time industrial control networks

    Full text link

    Modeling and analysis of reservation frame slotted-ALOHA in wireless machine-to-machine area networks for data collection

    Get PDF
    Reservation frame slotted-ALOHA (RFSA) was proposed in the past to manage the access to the wireless channel when devices generate long messages fragmented into small packets. In this paper, we consider an M2M area network composed of end-devices that periodically respond to the requests from a gateway with the transmission of fragmented messages. The idle network is suddenly set into saturation, having all end-devices attempting to get access to the channel simultaneously. This has been referred to as delta traffic. While previous works analyze the throughput of RFSA in steady-state conditions, assuming that traffic is generated following random distributions, the performance of RFSA under delta traffic has never received attention. In this paper, we propose a theoretical model to calculate the average delay and energy consumption required to resolve the contention under delta traffic using RFSA.We have carried out computer-based simulations to validate the accuracy of the theoretical model and to compare the performance for RFSA and FSA. Results show that there is an optimal frame length that minimizes delay and energy consumption and which depends on the number of end-devices. In addition, it is shown that RFSA reduces the energy consumed per end-device by more than 50% with respect to FSA under delta traffic.Peer ReviewedPostprint (published version

    Harnessing XMPP for Machine-to-Machine Communications & Pervasive Applications

    Get PDF
    An ever increasing number of interconnected embedded devices, or Machine-to-Machine (M2M) systems, are changing the way we live, work and play. M2M systems as a whole are typically characterized by the diversity in both the type of device and type of network access technology employed, and such systems are often still today task-specific and built for just one specific application. Smart lighting, remote monitoring and control of all kinds of consumer devices and industrial equipment, safety and security monitoring devices and smart health and fitness products, exemplify this revolution of intercommunicating machines. However, the differences in communication technologies and data formats among such devices and systems are leading to a huge complexity explosion problem and a strongly fragmented market, with no true interoperability. Due to these problems, the full potential of M2M technology has yet to be fulfilled. In this paper, we examine the suitability of the Extensible Messaging and Presence Protocol (XMPP) and experiment with its potential to rise to the challenge of machine-to-machine communications and meet the needs of modern pervasive applications. Experimental implementations and some proof-of-concept solutions are also presented

    Employment of social component in GPS navigation

    Full text link
    GPS tehnologija je danes osnoven del vsakega potovanja, z razvojem pametnih telefonov pa je postala dostopna večjemu številu uporabnikov. Skozi čas je razvoj tehnologije omogočil večjo dostopnost različnih informacij, ki vplivajo na potovanja in na večjo povezavo med uporabniki. Dejstvo je, da so obstoječe GPS aplikacije zastarele, zaradi česar smo si v okviru magistrske naloge zastavili cilj razviti GPS aplikacijo naslednje generacije, ki bo z močno uporabo socialne komponente ter spoznavanjem svojih uporabnikov izboljšala uporabniško izkušnjo mobilnih GPS aplikacij. Sistem je zasnovan na uporabi večih metod strojnega učenja, pri katerih se morajo zaradi posebne strukture sistema te metode prilagoditi za uporabo na mobilni platformi. Na podlagi predlaganega sistema smo izdelali tudi funkcionalen prototip, ki je dokazal, da se obstoječe metode lahko uporabljajo za izboljšavo uporabniške izkušnje mobilnih aplikacij, ki temeljijo na GPS tehnologiji.GPS technology has become an essential part of any travel and, with the development of smartphone technology, it has become accessible to a larger number of users. The development of technology over time has also enabled easier access to different information which can influence travel, and users of these applications have become more connected than ever before. All of this has resulted in one simple fact - existing GPS applications have become obsolete. For this reason, we have set the goal of developing the next generation of GPS applications, which will make significant use of a social component, as well as learning about its users’ interests in order to improve the user experience. The system is designed to use different methods of machine learning, which have to be optimized for use on mobile platforms. We have also developed a functional prototype, which has demonstrated that the existing methods can be used to improve the user experience of GPS mobile applications
    corecore