81 research outputs found
Performance assessment for mountain bike based on WSN and Cloud Technologies
The mountain bike is one of the most used equipment’s in outdoor sports activities. The thesis
describes the design and all development and implementation of Performance Assessment for
Mountain Bike based on Wireless Sensor Network (WSN) and Cloud Technologies. The
work presents a distributed sensing system for cycling assessment-providing data for
objective evaluation of the athlete performance during training. Thus a wireless sensor
network attached to the sport equipment provides to the athlete and the coach with
performance values during practice. The sensors placed in biker equipment’s behave as nodes
of a WSN. This is possible with the developing of IoT-based systems in sports, the tracking
and monitoring of athletes in their activities has an important role on his formation as bikers
and helps to increase performance, through the analyze of each session. The implemented
system performs acquisition, processing and transmission, of data using a ZigBee wireless
networks that provide also machine-to-machine communication and data storage in a server
located in the cloud. As in many cycling applications use the phone as a module to get the
values, this work will be a little different making use of phone/tablet to consult information.
The information stored on the cloud server is accessed through a mobile application that
analyses and correlates all metrics calculated using the training data obtained during practice.
Additional information regarding the health status may be also considered. Therefore, the
system permits that athletes perform an unlimited number of trainings that can be accessed at
any time through the mobile application by the bikers and coach. Based on capability of the
system to save a history of the evolution of each athlete during training the system permits to
perform appropriate comparisons between different training sessions and different athlete’s
performances.A bicicleta de montanha é um dos equipamentos para desportos no exterior mais usada. A tese
descreve todo o desenho, desenvolvimento e implementação de Performance Assessment for
Mountain Bike based on WSN and Cloud Technologies. Este apresenta um sistema de deteção
distribuída para o aumento do desempenho, melhorar a metodologia da prática do ciclismo e
para formação de atletas. Para tal foi desenvolvida e anexada uma rede de sensores que está
embutida no equipamento do ciclista, através desta rede de sensores sem fios são obtidos os
valores respetivos à interação do utilizador e a sua bicicleta, sendo estes apresentados ao
treinador e ao próprio ciclista. Os sensores colocados comportam-se como nós de uma rede de
sensores sem fios. Isso é possível com o desenvolvimento de sistemas baseados na Internet
das coisas no desporto, a observação da movimentação e monitoramento de atletas nas suas
atividades tem um papel importante na sua formação como ciclistas e ajuda a aumentar o
desempenho. O sistema é baseado numa rede ZigBee sem fios, que permite a comunicação
máquina-para-máquina e o armazenamento de dados num servidor localizado na nuvem. Toda
a informação na nuvem pode ser acedida através de uma aplicação mobile que analisa e
correlaciona todos os valores calculados usando os dados recolhidos durante o treino efetuado
por cada ciclista. Como em muitas aplicações de ciclismo estas usam o telefone como um
módulo para obter os valores, neste trabalho o caso é diferente fazendo o uso do
telefone/tablet para apenas consultar as informações. Alguma informação sobre o ciclista é
fornecida para poder efetuar alguns cálculos, relativos à saúde do ciclista, neste caso toda a
energia gasta na prática de um determinado treino. Toda esta informação pode ser acedida
através de uma aplicação Android e por consequência num dispositivo Android. Com a
aplicação desenvolvida é possível observar e processar toda a informação recolhida através
dos sensores implementados, a observação dos dados recolhidos pode ser efetuada pelo
treinador responsável, como pelo próprio atleta. Portanto, o sistema permite a realização de
um ilimitado número de sessões de treino, estes podem ser consultados a qualquer momento
através da aplicação móvel. Fazendo com que seja possível manter um histórico da evolução
de cada atleta, podendo assim observar e comparar cada sessão de treino, realizada por cada
atleta
Wireless Network Communications Overview for Space Mission Operations
The mission of the On-Board Wireless Working Group (WWG) is to serve as a general CCSDS focus group for intra-vehicle wireless technologies. The WWG investigates and makes recommendations pursuant to standardization of applicable wireless network protocols, ensuring the interoperability of independently developed wireless communication assets. This document presents technical background information concerning uses and applicability of wireless networking technologies for space missions. Agency-relevant driving scenarios, for which wireless network communications will provide a significant return-on-investment benefiting the participating international agencies, are used to focus the scope of the enclosed technical information
Enabling technologies and cyber-physical systems for mission-critical scenarios
Programa Oficial de Doutoramento en Tecnoloxías da Información e Comunicacións en Redes Móbiles . 5029P01[Abstract]
Reliable transport systems, defense, public safety and quality assurance in the Industry 4.0 are essential in a modern society. In a mission-critical scenario, a mission failure would jeopardize human lives and put at risk some other assets whose impairment or loss would significantly harm society or business results. Even small degradations of the communications supporting the mission could have large and possibly dire consequences.
On the one hand, mission-critical organizations wish to utilize the most modern, disruptive and innovative communication systems and technologies, and yet, on the other hand, need to comply with strict requirements, which are very different to those of non critical scenarios. The aim of this thesis is to assess the feasibility of applying emerging technologies like Internet of Things (IoT), Cyber-Physical Systems (CPS) and 4G broadband communications in mission-critical scenarios along three key critical infrastructure sectors: transportation, defense and public safety, and shipbuilding.
Regarding the transport sector, this thesis provides an understanding of the progress of communications technologies used for railways since the implantation of Global System for Mobile communications-Railways (GSM-R). The aim of this work is to envision the potential contribution of Long Term Evolution (LTE) to provide additional features that GSM-R would never support. Furthermore, the ability of Industrial IoT for revolutionizing the railway industry and confront today's challenges is presented. Moreover, a detailed review of the most common flaws found in Radio Frequency IDentification (RFID) based IoT systems is presented, including the latest attacks described in the literature. As a result, a novel methodology for auditing security and reverse engineering RFID communications in transport applications is introduced.
The second sector selected is driven by new operational needs and the challenges that arise from modern military deployments. The strategic advantages of 4G broadband technologies massively deployed in civil scenarios are examined. Furthermore, this thesis analyzes the great potential for applying IoT technologies to revolutionize modern warfare and provide benefits similar to those in industry. It identifies scenarios where defense and public safety could leverage better commercial IoT capabilities to deliver greater survivability to the warfighter or first responders, while reducing costs and increasing operation efficiency and effectiveness.
The last part is devoted to the shipbuilding industry. After defining the novel concept of Shipyard 4.0, how a shipyard pipe workshop works and what are the requirements for building a smart pipe system are described in detail. Furthermore, the foundations for enabling an affordable CPS for Shipyards 4.0 are presented. The CPS proposed consists of a network of beacons that continuously collect information about the location of the pipes. Its design allows shipyards to obtain more information on the pipes and to make better use of it. Moreover, it is indicated how to build a positioning system from scratch in an environment as harsh in terms of communications as a shipyard, showing an example of its architecture and implementation.[Resumen]
En la sociedad moderna, los sistemas de transporte fiables, la defensa, la seguridad pública y el control de la calidad en la Industria 4.0 son esenciales. En un escenario de misión crítica, el fracaso de una misión pone en peligro vidas humanas y en riesgo otros activos cuyo deterioro o pérdida perjudicaría significativamente a la sociedad o a los resultados de una empresa. Incluso pequeñas degradaciones en las comunicaciones que apoyan la misión podrían tener importantes y posiblemente terribles consecuencias.
Por un lado, las organizaciones de misión crítica desean utilizar los sistemas y tecnologías de comunicación más modernos, disruptivos e innovadores y, sin embargo, deben cumplir requisitos estrictos que son muy diferentes a los relativos a escenarios no críticos. El objetivo principal de esta tesis es evaluar la viabilidad de aplicar tecnologías emergentes como Internet of Things (IoT), Cyber-Physical Systems (CPS) y comunicaciones de banda ancha 4G en escenarios de misión crítica en tres sectores clave de infraestructura crítica: transporte, defensa y seguridad pública, y construcción naval.
Respecto al sector del transporte, esta tesis permite comprender el progreso de las tecnologías de comunicación en el ámbito ferroviario desde la implantación de Global System for Mobile communications-Railway (GSM-R). El objetivo de este trabajo es analizar la contribución potencial de Long Term Evolution (LTE) para proporcionar características adicionales que GSM-R nunca podría soportar. Además, se presenta la capacidad de la IoT industrial para revolucionar la industria ferroviaria y afrontar los retos actuales. Asimismo, se estudian con detalle las vulnerabilidades más comunes de los sistemas IoT basados en Radio Frequency IDentification (RFID), incluyendo los últimos ataques descritos en la literatura. Como resultado, se presenta una metodología innovadora para realizar auditorías de seguridad e ingeniería inversa de las comunicaciones RFID en aplicaciones de transporte.
El segundo sector elegido viene impulsado por las nuevas necesidades operacionales y los desafíos que surgen de los despliegues militares modernos. Para afrontarlos, se analizan las ventajas estratégicas de las tecnologías de banda ancha 4G masivamente desplegadas en escenarios civiles. Asimismo, esta tesis analiza el gran potencial de aplicación de las tecnologías IoT para revolucionar la guerra moderna y proporcionar beneficios similares a los alcanzados por la industria. Se identifican escenarios en los que la defensa y la seguridad pública podrían aprovechar mejor las capacidades comerciales de IoT para ofrecer una mayor capacidad de supervivencia al combatiente o a los servicios de emergencias, a la vez que reduce los costes y aumenta la eficiencia y efectividad de las operaciones.
La última parte se dedica a la industria de construcción naval. Después de definir el novedoso concepto de Astillero 4.0, se describe en detalle cómo funciona el taller de tubería de astillero y cuáles son los requisitos para construir un sistema de tuberías inteligentes. Además, se presentan los fundamentos para posibilitar un CPS asequible para Astilleros 4.0. El CPS propuesto consiste en una red de balizas que continuamente recogen información sobre la ubicación de las tuberías. Su diseño permite a los astilleros obtener más información sobre las tuberías y hacer un mejor uso de las mismas. Asimismo, se indica cómo construir un sistema de posicionamiento desde cero en un entorno tan hostil en términos de comunicaciones, mostrando un ejemplo de su arquitectura e implementación
Dimensions of Access to Traceability Information for US Beef Cattle Producers: Merging Information Frameworks for Assessment and Visualization of State Web-Based Resources in an Effort to Strengthen National Security Connections between Government and Cattle Farming Operations
US consumers eat a lot of beef. The nation’s beef cattle production industry is a multi-faceted, complex supply chain which makes it an area rich for discussion about information practices, yet vulnerable to problems such as disease and terrorist attack. This research looks at cattle identification and traceability information resources that are accessible to beef cattle producers through two web channels: the state cooperative Extension website and the state Department of Agriculture website. This is a state by state content analysis of all fifty states to look at the topics, types, formats, quality, and interactivity of the available resources. By merging two information frameworks, one with theoretical attention to components of access to information and one with applied attention to government information valuation measures, the research demonstrates an analysis process that connects state cattle producer demographics for comparison with aspects of the available cattle identification and traceability information from that state. This includes visualizing the nation as a whole and comparing state-based similarities and differences, illuminating areas of strengths, weaknesses, and gaps in contextually congruent information for the producer and stakeholder populations
Semantic discovery and reuse of business process patterns
Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
382 p.Libro ElectrónicoEach of us has been in the computing field for more than 40 years. The book is the product of a lifetime of observing and participating in the changes it has brought. Each of us has been both a teacher and a learner in the field.
This book emerged from a general education course we have taught at Harvard, but it is not a textbook. We wrote this book to share what wisdom we have with as many people as we can reach. We try to paint a big picture,
with dozens of illuminating anecdotes as the brushstrokes. We aim to entertain you at the same time as we provoke your thinking.Preface
Chapter 1 Digital Explosion
Why Is It Happening, and What Is at Stake?
The Explosion of Bits, and Everything Else
The Koans of Bits
Good and Ill, Promise and Peril
Chapter 2 Naked in the Sunlight
Privacy Lost, Privacy Abandoned
1984 Is Here, and We Like It
Footprints and Fingerprints
Why We Lost Our Privacy, or Gave It Away
Little Brother Is Watching
Big Brother, Abroad and in the U.S.
Technology Change and Lifestyle Change
Beyond Privacy
Chapter 3 Ghosts in the Machine
Secrets and Surprises of Electronic Documents
What You See Is Not What the Computer Knows
Representation, Reality, and Illusion
Hiding Information in Images
The Scary Secrets of Old Disks
Chapter 4 Needles in the Haystack
Google and Other Brokers in the Bits Bazaar
Found After Seventy Years
The Library and the Bazaar
The Fall of Hierarchy
It Matters How It Works
Who Pays, and for What?
Search Is Power
You Searched for WHAT? Tracking Searches
Regulating or Replacing the Brokers
Chapter 5 Secret Bits
How Codes Became Unbreakable
Encryption in the Hands of Terrorists, and Everyone Else
Historical Cryptography
Lessons for the Internet Age
Secrecy Changes Forever
Cryptography for Everyone
Cryptography Unsettled
Chapter 6 Balance Toppled
Who Owns the Bits?
Automated Crimes—Automated Justice
NET Act Makes Sharing a Crime
The Peer-to-Peer Upheaval
Sharing Goes Decentralized
Authorized Use Only
Forbidden Technology
Copyright Koyaanisqatsi: Life Out of Balance
The Limits of Property
Chapter 7 You Can’t Say That on the Internet
Guarding the Frontiers of Digital Expression
Do You Know Where Your Child Is on the Web Tonight?
Metaphors for Something Unlike Anything Else
Publisher or Distributor?
Neither Liberty nor Security
The Nastiest Place on Earth
The Most Participatory Form of Mass Speech
Protecting Good Samaritans—and a Few Bad Ones
Laws of Unintended Consequences
Can the Internet Be Like a Magazine Store?
Let Your Fingers Do the Stalking
Like an Annoying Telephone Call?
Digital Protection, Digital Censorship—and Self-Censorship
Chapter 8 Bits in the Air
Old Metaphors, New Technologies, and Free Speech
Censoring the President
How Broadcasting Became Regulated
The Path to Spectrum Deregulation
What Does the Future Hold for Radio?
Conclusion After the Explosion
Bits Lighting Up the World
A Few Bits in Conclusion
Appendix The Internet as System and Spirit
The Internet as a Communication System
The Internet Spirit
Endnotes
Inde
Smart Monitoring and Control in the Future Internet of Things
The Internet of Things (IoT) and related technologies have the promise of realizing pervasive and smart applications which, in turn, have the potential of improving the quality of life of people living in a connected world. According to the IoT vision, all things can cooperate amongst themselves and be managed from anywhere via the Internet, allowing tight integration between the physical and cyber worlds and thus improving efficiency, promoting usability, and opening up new application opportunities. Nowadays, IoT technologies have successfully been exploited in several domains, providing both social and economic benefits. The realization of the full potential of the next generation of the Internet of Things still needs further research efforts concerning, for instance, the identification of new architectures, methodologies, and infrastructures dealing with distributed and decentralized IoT systems; the integration of IoT with cognitive and social capabilities; the enhancement of the sensing–analysis–control cycle; the integration of consciousness and awareness in IoT environments; and the design of new algorithms and techniques for managing IoT big data. This Special Issue is devoted to advancements in technologies, methodologies, and applications for IoT, together with emerging standards and research topics which would lead to realization of the future Internet of Things
Европейский и национальный контексты в научных исследованиях
В настоящем электронном сборнике «Европейский и национальный контексты в научных исследованиях. Технология» представлены работы молодых ученых по геодезии и картографии, химической технологии и машиностроению, информационным технологиям, строительству и радиотехнике. Предназначены для работников образования, науки и производства. Будут полезны студентам, магистрантам и аспирантам университетов.=In this Electronic collected materials “National and European dimension in research. Technology” works in the fields of geodesy, chemical technology, mechanical engineering, information technology, civil engineering, and radio-engineering are presented. It is intended for trainers, researchers and professionals. It can be useful for university graduate and post-graduate students
- …