64,811 research outputs found
Smart Computing and Sensing Technologies for Animal Welfare: A Systematic Review
Animals play a profoundly important and intricate role in our lives today.
Dogs have been human companions for thousands of years, but they now work
closely with us to assist the disabled, and in combat and search and rescue
situations. Farm animals are a critical part of the global food supply chain,
and there is increasing consumer interest in organically fed and humanely
raised livestock, and how it impacts our health and environmental footprint.
Wild animals are threatened with extinction by human induced factors, and
shrinking and compromised habitat. This review sets the goal to systematically
survey the existing literature in smart computing and sensing technologies for
domestic, farm and wild animal welfare. We use the notion of \emph{animal
welfare} in broad terms, to review the technologies for assessing whether
animals are healthy, free of pain and suffering, and also positively stimulated
in their environment. Also the notion of \emph{smart computing and sensing} is
used in broad terms, to refer to computing and sensing systems that are not
isolated but interconnected with communication networks, and capable of remote
data collection, processing, exchange and analysis. We review smart
technologies for domestic animals, indoor and outdoor animal farming, as well
as animals in the wild and zoos. The findings of this review are expected to
motivate future research and contribute to data, information and communication
management as well as policy for animal welfare
Build an app and they will come? Lessons learnt from trialling the GetThereBus app in rural communities
Acknowledgements The research described here was supported by the award made by the RCUK Digital Economy programme to the dot.rural Digital Economy Hub; award reference: EP/G066051/1.Peer reviewedPostprin
Recommended from our members
Informatisation of transport process using GPS navigation system
Nowadays, internal business processes are one of the crucial factors of firms’ competitive advantage achievement, which is becoming increasingly important, not only on local but also on global markets. Firms’ performance improvement depends to a large extent on its flexibility, adjustability and especially ability to manage internal business processes. Hence, use of information technology is among the fundamental elements of business process change, which not only improve competitiveness but also assure long term development and growth of the firm. For all these reasons, the main purpose of this article is firstly to establish that use of information technology is feasible in all industries, explain what possible obstacles for successful informatisation are, and which are major advantages after its implementation. Secondly, within theoretical aspect we present broaden view of informatisation in logistics, whilst practical example illustrates successful informatisation of transport process with adoption of GPS (Global Positioning System) in a transport firm. Furthermore, in this article we are also introducing a case study of three transport firms describing process flow before and after implementation identifying enhanced information quality, service quality and communication as a foremost advantages and achievements after informatisatio
Security of GPS/INS based On-road Location Tracking Systems
Location information is critical to a wide-variety of navigation and tracking
applications. Today, GPS is the de-facto outdoor localization system but has
been shown to be vulnerable to signal spoofing attacks. Inertial Navigation
Systems (INS) are emerging as a popular complementary system, especially in
road transportation systems as they enable improved navigation and tracking as
well as offer resilience to wireless signals spoofing, and jamming attacks. In
this paper, we evaluate the security guarantees of INS-aided GPS tracking and
navigation for road transportation systems. We consider an adversary required
to travel from a source location to a destination, and monitored by a INS-aided
GPS system. The goal of the adversary is to travel to alternate locations
without being detected. We developed and evaluated algorithms that achieve such
goal, providing the adversary significant latitude. Our algorithms build a
graph model for a given road network and enable us to derive potential
destinations an attacker can reach without raising alarms even with the
INS-aided GPS tracking and navigation system. The algorithms render the
gyroscope and accelerometer sensors useless as they generate road trajectories
indistinguishable from plausible paths (both in terms of turn angles and roads
curvature). We also designed, built, and demonstrated that the magnetometer can
be actively spoofed using a combination of carefully controlled coils. We
implemented and evaluated the impact of the attack using both real-world and
simulated driving traces in more than 10 cities located around the world. Our
evaluations show that it is possible for an attacker to reach destinations that
are as far as 30 km away from the true destination without being detected. We
also show that it is possible for the adversary to reach almost 60-80% of
possible points within the target region in some cities
- …