31,497 research outputs found

    Smartening the Environment using Wireless Sensor Networks in a Developing Country

    Get PDF
    The miniaturization process of various sensing devices has become a reality by enormous research and advancements accomplished in Micro Electro-Mechanical Systems (MEMS) and Very Large Scale Integration (VLSI) lithography. Regardless of such extensive efforts in optimizing the hardware, algorithm, and protocols for networking, there still remains a lot of scope to explore how these innovations can all be tied together to design Wireless Sensor Networks (WSN) for smartening the surrounding environment for some practical purposes. In this paper we explore the prospects of wireless sensor networks and propose a design level framework for developing a smart environment using WSNs, which could be beneficial for a developing country like Bangladesh. In connection to this, we also discuss the major aspects of wireless sensor networks.Comment: 5 page

    Remotely piloted aircraft systems and a wireless sensors network for radiological accidents

    Get PDF
    In critical radiological situations, the real time information that we could get from the disaster area becomes of great importance. However, communication systems could be affected after a radiological accident. The proposed network in this research consists of distributed sensors in charge of collecting radiological data and ground vehicles that are sent to the nuclear plant at the moment of the accident to sense environmental and radiological information. Afterwards, data would be analyzed in the control center. Collected data by sensors and ground vehicles would be delivered to a control center using Remotely Piloted Aircraft Systems (RPAS) as a message carrier. We analyze the pairwise contacts, as well as visiting times, data collection, capacity of the links, size of the transmission window of the sensors, and so forth. All this calculus was made analytically and compared via network simulations.Peer ReviewedPostprint (published version

    Comparison of Privatization Processes of Telecom Services in India and Brazil

    Get PDF
    Apart from being BRIC countries, what India and Brazil have in common is a large service sector that contributes significantly to the GDP. The service sector contributed 66% to the Brazilian GDP and 59% to the Indian GDP in 2010. Telecommunication services are a significant part of it in both the countries. This paper compares the regulatory processes of privatization of telecom services in these countries and the consequences of these on the telecom firms broadly and on the sector as a whole. Indian companies, facing harsh competition and having refined their business models to compete in this environment acquired the necessary expertise to foray abroad, opportunistically building their businesses. The highly competitive regulatory policies in India, led to the emergence of innovative business models and creation of large domestic companies both in services and infrastructure segment and consequently acquiring the necessary expertise to foray abroad. Brazilian regulatory policies focused on financially sound business and were open to investment by operators in other countries. Facing difficult domestic situation, the operators from Europe saw the Brazilian market as a growth opportunity. The paper concludes that although both in Brazil and India, the objective of the telecom regulatory policies was to bring in privatization and competition, the variations in models followed by the two countries had led to sectoral outcomes that are very different. Brazilian telecom sector had shown higher penetration, both for telecom services in general and broadband in particular but domestic companies, other than one, which too was recently partially acquired by Portugal Telecom, have not emerged. Phased and controlled FDI in India combined with the hyper competitive scenario has led to the emergence of Indian telecom firms that have become significant global players.

    Towards solutions for assistive technology

    Get PDF
    Introduction What is assistive technology? The agreed World Health Organisation definition is "Assistive technology can be defined as “any piece of equipment, or product, whether it is acquired commercially, modified, or customized, that is used to increase, maintain, or improve the functional capabilities of individuals with disabilities” (WHO, 2011) The array of possible assistive technology products and solutions reflects the diversity of the needs of people with disabilities – ranging from digital technologies that can support social engagement, communication, employment, learning, memory, planning and safe guarding services through to products and devices that support mobility and personal care requirements. Typically as the complexities of assistive technology solutions increase, so do the costs and potential risks (if not appropriately set up or maintained). This document is primarily focused on the Assistive Technology solutions derived from aids and equipment. Home and vehicle modifications and prosthetics have not yet been explored in the same level of detail and will be subject of further work. Proposed approach The proposed assistive technology service approach has been developed in line with the strategic goals of the NDIA. It is one aspect of a broader strategic approach the NDIA has to using technologies to enhance its engagement and management of relationships, services and supports with suppliers, providers, participants and the Australian community. The NDIA’s goal is to use technology in its various forms to ensure that services, supports, and communications between all stakeholders are as streamlined as possible and services are timely and effective. This document outlines the elements of a proposed service delivery approach for individuals to access assistive technology solutions and is based on the three key objectives outlined above

    Adding generic contextual capabilities to wearable computers

    Get PDF
    Context-awareness has an increasingly important role to play in the development of wearable computing systems. In order to better define this role we have identified four generic contextual capabilities: sensing, adaptation, resource discovery, and augmentation. A prototype application has been constructed to explore how some of these capabilities could be deployed in a wearable system designed to aid an ecologist's observations of giraffe in a Kenyan game reserve. However, despite the benefits of context-awareness demonstrated in this prototype, widespread innovation of these capabilities is currently stifled by the difficulty in obtaining the contextual data. To remedy this situation the Contextual Information Service (CIS) is introduced. Installed on the user's wearable computer, the CIS provides a common point of access for clients to obtain, manipulate and model contextual information independently of the underlying plethora of data formats and sensor interface mechanisms

    Fiscal Federalism in Europe: Lessons From the United States Experience

    Get PDF
    The existing political and legal institutions of fiscal policy-making are under challenge. As the United States and the eastern European and Soviet states experiment with policy decentralization, the states of western Europe are looking to a more centralized policy structure via the E.E.C.. This paper seeks to raise issues of importance to all such reform efforts--notably, the need to consider, and balance, the inefficiencies of fiscal policy decentralization (spillovers and wasteful fiscal competition) against the inefficiencies of fiscal policy centralization (policy cycles and localized 'pork barrel' spending and taxes). The need to develop new fiscal policy institutions emphasizing voluntary agreements and responsive 'agenda-setters' is stressed.

    An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations

    Full text link
    With the expansion of wireless sensor networks (WSNs), the need for securing the data flow through these networks is increasing. These sensor networks allow for easy-to-apply and flexible installations which have enabled them to be used for numerous applications. Due to these properties, they face distinct information security threats. Security of the data flowing through across networks provides the researchers with an interesting and intriguing potential for research. Design of these networks to ensure the protection of data faces the constraints of limited power and processing resources. We provide the basics of wireless sensor network security to help the researchers and engineers in better understanding of this applications field. In this chapter, we will provide the basics of information security with special emphasis on WSNs. The chapter will also give an overview of the information security requirements in these networks. Threats to the security of data in WSNs and some of their counter measures are also presented
    corecore