9 research outputs found

    Communications in Emergency and Crisis Situations

    Get PDF
    Abstract. In emergency and crisis situations (ECS) like earthquakes, tsunamis, terrorist attacks, it is very important that communication facilities are operative to provide services both to rescue teams and civilians. In ECS it is very common that communication premises are often unable to provide services, either due to physical damages or traffic overload. In such a case there is the need for rapid reestablishment of communication services. In this paper the communication services that can be exploited for ECS mitigation are discussed. The usage scenarios of such services are studied. Following that and looking from a network perspective view an ECS communication network architecture is presented. This architecture aims to provide seamless interoperability of varies communication technologies often present in EC

    NextGEM: Next-Generation Integrated Sensing and Analytical System for Monitoring and Assessing Radiofrequency Electromagnetic Field Exposure and Health

    Full text link
    The evolution of emerging technologies that use Radio Frequency Electromagnetic Field (RF-EMF) has increased the interest of the scientific community and society regarding the possible adverse effects on human health and the environment. This article provides NextGEM’s vision to assure safety for EU citizens when employing existing and future EMF-based telecommunication technologies. This is accomplished by generating relevant knowledge that ascertains appropriate prevention and control/actuation actions regarding RF-EMF exposure in residential, public, and occupational settings. Fulfilling this vision, NextGEM commits to the need for a healthy living and working environment under safe RF-EMF exposure conditions that can be trusted by people and be in line with the regulations and laws developed by public authorities. NextGEM provides a framework for generating health-relevant scientific knowledge and data on new scenarios of exposure to RF-EMF in multiple frequency bands and developing and validating tools for evidence-based risk assessment. Finally, NextGEM’s Innovation and Knowledge Hub (NIKH) will offer a standardized way for European regulatory authorities and the scientific community to store and assess project outcomes and provide access to findable, accessible, interoperable, and reusable (FAIR) data

    UDC 004.735, DOI: 10.2298/CSIS0901169M Co-existence Performance Evaluation of Wireless Computer Networks in a Typical Office Environment

    No full text
    Abstract. The Wireless Local Area Networks (WLANs) are often used as a wireless extension to the typical office network infrastructure providing mobility to the users. In addition Wireless Personal Area Networks (WPANs) serve interconnection to computer and mobile phone peripherals as headsets, input devices, printers etc. Thus it is common that WLANs and WPANs have to operate in the same area. IEEE 802.11b/g is the most popular WLAN technology operating in the 2.4GHz Industrial Medical and Scientific (ISM) band. On the other hand Bluetooth (BT) is the technology often used to support WPANs. As BT also uses the 2.4GHz ISM band, there an issue of interference between WLANs and PANs. In this work the performance degradation in Wireless Local Area Networks and Wireless Local Area Networks due to coexistence is examined by real measurements. Both 802.11 to 802.11 and 802.11 to Bluetooth coexistence is addressed

    Pairing a circular economy and the 5G-enabled Internet of Things: creating a class of "Looping Smart Assets"

    No full text
    Summarization: The increase in the world's population has led to a massive rise in human consumption of the planet's natural resources, well beyond their replacement rate. Traditional recycling concepts and methods are not enough to counter such effects. In this context, a circular economy (CE), that is, a restorative and regenerative by-design economy, can reform today's "take-make-dispose" economic model. On the other hand, the Internet of Things (IoT) continues to gradually transform our everyday lives, allowing for the introduction of novel types of services while enhancing legacy ones. Taking this as our motivation, in this article we analyze the CE/IoT interplay, indicating innovative ways in which this interaction can drastically affect products and services, their underlying business models, and the associated ecosystems. Moreover, we present an IoT architecture that enables smart object integration into the IoT ecosystem. The presented architecture integrates circularityenabling features by maximizing the exploitation of assets toward a new type of IoT ecosystem that is circular by design (CbD). Finally, we provide a proof-of-concept implementation and an application study of the proposed architecture and results regarding the applicability of the proposed approach for the telecommunications (telecom) sector.Presented on: IEEE Vehicular Technology Magazin

    Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol

    No full text
    Summarization: Massive advancements in computing and communication technologies have enabled the ubiquitous presence of interconnected computing devices in all aspects of modern life, forming what is typically referred to as the 'Internet of Things'. These major changes could not leave the industrial environment unaffected, with 'smart' industrial deployments gradually becoming a reality; a trend that is often referred to as the 4th industrial revolution or Industry 4.0. Nevertheless, the direct interaction of the smart devices with the physical world and their resource constraints, along with the strict performance, security, and reliability requirements of industrial infrastructures, necessitate the adoption of lightweight as well as secure communication mechanisms. Motivated by the above, this paper highlights the Message Queue Telemetry Transport (MQTT) as a lightweight protocol suitable for the industrial domain, presenting a comprehensive evaluation of different security mechanisms that could be used to protect the MQTT-enabled interactions on a real testbed of wireless sensor motes. Moreover, the applicability of the proposed solutions is assessed in the context of a real industrial application, analyzing the network characteristics and requirements of an actual, operating wind park, as a representative use case of industrial networks.Presented on
    corecore