971 research outputs found

    Bluetooth wireless monitoring, managing and control for inter vehicle in vehicular Ad-Hoc networks

    Get PDF
    Problem statement: The car users expect more and more accessories available in their cars, but the accessories available needed manage by driver manually and not properly manage by smart system. All these accessories are able to control by user manually using different and standalone controllers. Besides, the controller itself uses RF technology which is not existed in mobile devices. So there is lack of a comprehensive and integrated system to manage, control and monitor all the accessories inside the vehicle by using a personal mobile phone. Design and development of an integrated system to manage and control all kind of inter vehicle accessories, improving the efficiency and functionality of inter vehicle communications for the car users. Approach: The proposed system was based on Microcontroller, Bluetooth and Java technology and in order to achieve the idea of an intelligence car with ability to uses personal mobile hand phone as a remote interface. Development strategies for this innovation are includes two phases: (1) java based application platform-designed and developed for smart phones and PDAs (2) hardware design and implementation of the receiver sidecompatible smart system to managing and interconnection between all inside accessories based on monitoring and controlling mechanisms by Bluetooth media. Results: The designed system included hardware and software and the completed prototype had tested successfully on the real vehicles. During the testing stage, the components and devices were connected and implemented on the vehicle and the user by installing the system interface on a mobile phone is able to monitor and manage the vehicle accessories, the efficiency, adaptively and range of functionality of the system has proved with the various car accessories. Conclusion: This study involved design a new system to decrease the hot temperature inside a car that affecting the health of the car driver and the car driver is able to control some of the car accessories by using mobile phone. Once the car was equipped with the Bluetooth module and control system, the car accessories is able to connect with microcontroller and control by the mobile application

    Sensing and making sense of crowd dynamics using Bluetooth tracking : an application-oriented approach

    Get PDF

    Leveraging Resources on Anonymous Mobile Edge Nodes

    Get PDF
    Smart devices have become an essential component in the life of mankind. The quick rise of smartphones, IoTs, and wearable devices enabled applications that were not possible few years ago, e.g., health monitoring and online banking. Meanwhile, smart sensing laid the infrastructure for smart homes and smart cities. The intrusive nature of smart devices granted access to huge amounts of raw data. Researchers seized the moment with complex algorithms and data models to process the data over the cloud and extract as much information as possible. However, the pace and amount of data generation, in addition to, networking protocols transmitting data to cloud servers failed short in touching more than 20% of what was generated on the edge of the network. On the other hand, smart devices carry a large set of resources, e.g., CPU, memory, and camera, that sit idle most of the time. Studies showed that for plenty of the time resources are either idle, e.g., sleeping and eating, or underutilized, e.g. inertial sensors during phone calls. These findings articulate a problem in processing large data sets, while having idle resources in the close proximity. In this dissertation, we propose harvesting underutilized edge resources then use them in processing the huge data generated, and currently wasted, through applications running at the edge of the network. We propose flipping the concept of cloud computing, instead of sending massive amounts of data for processing over the cloud, we distribute lightweight applications to process data on users\u27 smart devices. We envision this approach to enhance the network\u27s bandwidth, grant access to larger datasets, provide low latency responses, and more importantly involve up-to-date user\u27s contextual information in processing. However, such benefits come with a set of challenges: How to locate suitable resources? How to match resources with data providers? How to inform resources what to do? and When? How to orchestrate applications\u27 execution on multiple devices? and How to communicate between devices on the edge? Communication between devices at the edge has different parameters in terms of device mobility, topology, and data rate. Standard protocols, e.g., Wi-Fi or Bluetooth, were not designed for edge computing, hence, does not offer a perfect match. Edge computing requires a lightweight protocol that provides quick device discovery, decent data rate, and multicasting to devices in the proximity. Bluetooth features wide acceptance within the IoT community, however, the low data rate and unicast communication limits its use on the edge. Despite being the most suitable communication protocol for edge computing and unlike other protocols, Bluetooth has a closed source code that blocks lower layer in front of all forms of research study, enhancement, and customization. Hence, we offer an open source version of Bluetooth and then customize it for edge computing applications. In this dissertation, we propose Leveraging Resources on Anonymous Mobile Edge Nodes (LAMEN), a three-tier framework where edge devices are clustered by proximities. On having an application to execute, LAMEN clusters discover and allocate resources, share application\u27s executable with resources, and estimate incentives for each participating resource. In a cluster, a single head node, i.e., mediator, is responsible for resource discovery and allocation. Mediators orchestrate cluster resources and present them as a virtually large homogeneous resource. For example, two devices each offering either a camera or a speaker are presented outside the cluster as a single device with both camera and speaker, this can be extended to any combination of resources. Then, mediator handles applications\u27 distribution within a cluster as needed. Also, we provide a communication protocol that is customizable to the edge environment and application\u27s need. Pushing lightweight applications that end devices can execute over their locally generated data have the following benefits: First, avoid sharing user data with cloud server, which is a privacy concern for many of them; Second, introduce mediators as a local cloud controller closer to the edge; Third, hide the user\u27s identity behind mediators; and Finally, enhance bandwidth utilization by keeping raw data at the edge and transmitting processed information. Our evaluation shows an optimized resource lookup and application assignment schemes. In addition to, scalability in handling networks with large number of devices. In order to overcome the communication challenges, we provide an open source communication protocol that we customize for edge computing applications, however, it can be used beyond the scope of LAMEN. Finally, we present three applications to show how LAMEN enables various application domains on the edge of the network. In summary, we propose a framework to orchestrate underutilized resources at the edge of the network towards processing data that are generated in their proximity. Using the approaches explained later in the dissertation, we show how LAMEN enhances the performance of applications and enables a new set of applications that were not feasible

    Evaluating the Accuracy of Bluetooth-Based Travel Time on Arterial Roads: A Case Study of Perth, Western Australia

    Get PDF
    Bluetooth (BT) time-stamped media access control (MAC) address data have been used for traffic studies worldwide. Although Bluetooth (BT) technology has been widely recognised as an effective, low-cost traffic data source in freeway traffic contexts, it is still unclear whether BT technology can provide accurate travel time (TT) information in complex urban traffic environments. Therefore, this empirical study aims to systematically evaluate the accuracy of BT travel time estimates in urban arterial contexts. There are two major hurdles to deriving accurate TT information for arterial roads: the multiple detection problem and noise in BT estimates. To date, they have not been fully investigated, nor have well-accepted solutions been found. Using approximately two million records of BT time-stamped MAC address data from twenty weekdays, this study uses five different BT TT-matching methods to investigate and quantify the impact of multiple detection problems and the noise in BT TT estimates on the accuracy of average BT travel times. Our work shows that accurate Bluetooth-based travel time information on signalised arterial roads can be derived if an appropriate matching method can be selected to smooth out the remaining noise in the filtered travel time estimates. Overall, average-to-average and last-to-last matching methods are best for long (>1 km) and short (≤1 km) signalised arterial road segments, respectively. Furthermore, our results show that the differences between BT and ground truth average TTs or speeds are systematic, and adding a calibration is a pragmatic method to correct inaccurate BT average TTs or speeds. The results of this research can help researchers and road operators to better understand BT technology for TT analysis and consequently to optimise the deployment location and configuration of BT MAC address scanners

    Securing Wearables through the Creation of a Personal Fog

    Get PDF
    Increased reliance on wearables using Bluetooth requires additional security and privacy measures to protect these devices and personal data, regardless of device vendor. Most wearables lack the ability to monitor their communication connections and protect personal data without assistance. Attackers can force wearables to disconnect from base stations. When a wearable loses its connection to its base station, an attacker can connect to the wearable to steal stored personal data or await reconnection to the base station to eavesdrop on communications. If the base station inadvertently disconnects from the cloud serving a security-aware app, it would be unable to respond to a rapid change in the security of its current environment. We design a personal fog incorporating wearables, a base station, and the cloud that allows the wearable to be situationally aware and manage inter- and intra-fog communications, given local personal fogs with the same app
    corecore