79 research outputs found

    Routing and Mobility on IPv6 over LoWPAN

    Get PDF
    The IoT means a world-wide network of interconnected objects based on standard communication protocols. An object in this context is a quotidian physical device augmented with sensing/actuating, processing, storing and communication capabilities. These objects must be able to interact with the surrounding environment where they are placed and to cooperate with neighbouring objects in order to accomplish a common objective. The IoT objects have also the capabilities of converting the sensed data into automated instructions and communicating them to other objects through the communication networks, avoiding the human intervention in several tasks. Most of IoT deployments are based on small devices with restricted computational resources and energy constraints. For this reason, initially the scientific community did not consider the use of IP protocol suite in this scenarios because there was the perception that it was too heavy to the available resources on such devices. Meanwhile, the scientific community and the industry started to rethink about the use of IP protocol suite in all IoT devices and now it is considered as the solution to provide connectivity between the IoT devices, independently of the Layer 2 protocol in use, and to connect them to the Internet. Despite the use of IP suite protocol in all devices and the amount of solutions proposed, many open issues remain unsolved in order to reach a seamless integration between the IoT and the Internet and to provide the conditions to IoT service widespread. This thesis addressed the challenges associated with the interconnectivity between the Internet and the IoT devices and with the security aspects of the IoT. In the interconnectivity between the IoT devices and the Internet the problem is how to provide valuable information to the Internet connected devices, independently of the supported IP protocol version, without being necessary accessed directly to the IoT nodes. In order to solve this problem, solutions based on Representational state transfer (REST) web services and IPv4 to IPv6 dual stack transition mechanism were proposed and evaluated. The REST web service and the transition mechanism runs only at the border router without penalizing the IoT constrained devices. The mitigation of the effects of internal and external security attacks minimizing the overhead imposed on the IoT devices is the security challenge addressed in this thesis. Three different solutions were proposed. The first is a mechanism to prevent remotely initiated transport level Denial of Service attacks that avoids the use of inefficient and hard to manage traditional firewalls. It is based on filtering at the border router the traffic received from the Internet and destined to the IoT network according to the conditions announced by each IoT device. The second is a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. The third is a network admission control framework that prevents IoT unauthorized nodes to communicate with IoT authorized nodes or with the Internet, which drastically reduces the number of possible security attacks. The network admission control was also exploited as a management mechanism as it can be used to manage the network size in terms of number of nodes, making the network more manageable, increasing its reliability and extending its lifetime.A IoT (Internet of Things) tem suscitado o interesse tanto da comunidade académica como da indústria, uma vez que os campos de aplicação são inúmeros assim como os potenciais ganhos que podem ser obtidos através do uso deste tipo de tecnologia. A IoT significa uma rede global de objetos ligados entre si através de uma rede de comunicações baseada em protocolos standard. Neste contexto, um objeto é um objeto físico do dia a dia ao qual foi adicionada a capacidade de medir e de atuar sobre variáveis físicas, de processar e armazenar dados e de comunicar. Estes objetos têm a capacidade de interagir com o meio ambiente envolvente e de cooperar com outros objetos vizinhos de forma a atingirem um objetivo comum. Estes objetos também têm a capacidade de converter os dados lidos em instruções e de as comunicar a outros objetos através da rede de comunicações, evitando desta forma a intervenção humana em diversas tarefas. A maior parte das concretizações de sistemas IoT são baseados em pequenos dispositivos autónomos com restrições ao nível dos recursos computacionais e de retenção de energia. Por esta razão, inicialmente a comunidade científica não considerou adequado o uso da pilha protocolar IP neste tipo de dispositivos, uma vez que havia a perceção de que era muito pesada para os recursos computacionais disponíveis. Entretanto, a comunidade científica e a indústria retomaram a discussão acerca dos benefícios do uso da pilha protocolar em todos os dispositivos da IoT e atualmente é considerada a solução para estabelecer a conetividade entre os dispositivos IoT independentemente do protocolo da camada dois em uso e para os ligar à Internet. Apesar do uso da pilha protocolar IP em todos os dispositivos e da quantidade de soluções propostas, são vários os problemas por resolver no que concerne à integração contínua e sem interrupções da IoT na Internet e de criar as condições para a adoção generalizada deste tipo de tecnologias. Esta tese versa sobre os desafios associados à integração da IoT na Internet e dos aspetos de segurança da IoT. Relativamente à integração da IoT na Internet o problema é como fornecer informação válida aos dispositivos ligados à Internet, independentemente da versão do protocolo IP em uso, evitando o acesso direto aos dispositivos IoT. Para a resolução deste problema foram propostas e avaliadas soluções baseadas em web services REST e em mecanismos de transição IPv4 para IPv6 do tipo pilha dupla (dual stack). O web service e o mecanismo de transição são suportados apenas no router de fronteira, sem penalizar os dispositivos IoT. No que concerne à segurança, o problema é mitigar os efeitos dos ataques de segurança internos e externos iniciados local e remotamente. Foram propostas três soluções diferentes, a primeira é um mecanismo que minimiza os efeitos dos ataques de negação de serviço com origem na Internet e que evita o uso de mecanismos de firewalls ineficientes e de gestão complexa. Este mecanismo filtra no router de fronteira o tráfego com origem na Internet é destinado à IoT de acordo com as condições anunciadas por cada um dos dispositivos IoT da rede. A segunda solução, é uma framework de network admission control que controla quais os dispositivos que podem aceder à rede com base na autorização administrativa e que aplica políticas de conformidade relativas à segurança aos dispositivos autorizados. A terceira é um mecanismo de network admission control para redes 6LoWPAN que evita que dispositivos não autorizados comuniquem com outros dispositivos legítimos e com a Internet o que reduz drasticamente o número de ataques à segurança. Este mecanismo também foi explorado como um mecanismo de gestão uma vez que pode ser utilizado a dimensão da rede quanto ao número de dispositivos, tornando-a mais fácil de gerir e aumentando a sua fiabilidade e o seu tempo de vida

    VITASENIOR-MT: A distributed and scalable cloud-based telehealth solution

    Get PDF
    VITASENIOR-MT is a telehealth platform that allows to remotely monitor biometric and environmental data in a domestic environment, designed specifically to the elderly population. This paper proposes a highly scalable and efficient architecture to transport, process, store and visualize the data collected by devices of an Internet of Things (IoT) scenario. The cloud infrastructure follows a microservices architecture to provide computational scalability, better fault isolation, easy integration and automatic deployment. This solution is complemented with a pre-processing and validation of the collected data at the edge of the Internet by using the Fog Computing concept, allowing a better computing distribution. The presented approach provides personal data security and a simplified way to collect and present the data to the different actors, allowing a dynamic and intuitive management of patients and equipment to caregivers. The presented load tests proved that this solution is more efficient than a monolithic approach, promoting better access and control in the data flowing from heterogeneous equipment.This work has been financially supported by the IC&DT project VITASENIOR-MT CENTRO-01-0145- FEDER-023659 with FEDER funding through programs CENTRO2020 and FCT.info:eu-repo/semantics/publishedVersio

    Smart monitoring of constructed wetlands to improve efficiency and water quality

    Get PDF
    The Smart monitoring of constructed wetlands to improve efficiency and water quality (SmarterCW) project aims to monitor biological wastewater treatment processes by gathering continuous data from remote water and environmental sensors. The acquired data can be processed and analysed through data science tools to better understand the complex and coupled phenomena underneath wastewater treatment, as well as, to monitor and optimize the system performance. The results will improve the efficiency and control of nature-based wastewater treatment technologies. The methodology comprises the following tasks and activities: Implementation of a set of electrochemical sensors in the input and output flow streams of pilot-scale constructed wetlands; Acquisition of water quality parameters such as pH, electrical conductivity, temperature, and ionic compounds; Acquisition of environmental parameters, such as temperature and humidity; Application of data analysis tools to design and optimize conceptual models to correlate pollutants removal with operative parameters in green technologies for wastewater treatment. This methodology was applied to a patent-protected pilot-scale modular constructed wetland in which filling media consists of a mixture of solid waste. The system is complemented by a high-level IoT communication layer structure to support remote real-time water and environmental monitoring, system performance, and data dissemination. The project contributes to: Water and Environment through the efficient management and use of water resources and waste reduction, management, treatment, and valorisation; Materials and raw-materials through efficient, secure, and sustainable use of resources; and Environmental Education promoting environmental awareness and best environmental practices through the dissemination of scientific data and results using Information and Communication Technologies (ICT) tools and IoT platforms. The project also contributes to giving response to Societal Challenges, such as Environment protection, sustainable management of natural resources, water, biodiversity, and ecosystems; Enabling the transition to a green society and economy through eco-innovation.info:eu-repo/semantics/submittedVersio

    Inteligência para a Sustentabilidade das Cidades

    Get PDF
    info:eu-repo/semantics/publishedVersio

    VITASENIOR–MT: Architecture of a Telehealth Solution

    Get PDF
    This poster was awarded the Best Poster Award at the Portuguese Conference Gestão & Tecnologi@ - Criação de Valor em Saúde.VITASENIOR-MT is a telehealth solution under development that aims to monitor and improve the healthcare of elderly people living in the region of Médio Tejo. This solution performs both remote and local monitoring of biometric parameters of the elderly, and also of environmental parameters of their homes. The biometric variables include heart rate and temperature measurements collected automatically, by means of a bracelet, throughout the day. Blood pressure, body weight, and other biometric parameters are measured on a daily basis by the senior’s own initiative, and automatically recorded. The environmental parameters include temperature, carbon monoxide and carbon dioxide measurements. A TV set is used as a mean of interaction between the user and the medical devices. The TV set is also used to receive medical warnings and recommendations according to clinical profiles, and to receive environmental alerts. All data and alerts can be accessible to senior’s family and healthcare providers. In alarm situations, an automatic operational procedure will be triggered establishing communication to predefined entities.This work has been financially supported by the IC&DT project VITASENIOR-MT Programa operacional regional do centro CENTRO-01-0145-FEDER-023659.info:eu-repo/semantics/publishedVersio

    VITASENIOR-MT: a telehealth solution for the elderly focused on the interaction with TV

    Get PDF
    Remote monitoring of health parameters is a promising approach to improve the health condition and quality of life of particular groups of the population, which can also alleviate the current expenditure and demands of healthcare systems. The elderly, usually affected by chronic comorbidities, are a specific group of the population that can strongly benefit from telehealth technologies, allowing them to reach a more independent life, by living longer in their own homes. Usability of telehealth technologies and their acceptance by end-users are essential requirements for the success of telehealth implementation. Older people are resistant to new technologies or have difficulty in using them due to vision, hearing, sensory and cognition impairments. In this paper, we describe the implementation of an IoT-based telehealth solution designed specifically to address the elderly needs. The end-user interacts with a TV-set to record biometric parameters, and to receive warning and recommendations related to health and environmental sensor recordings. The familiarization of older people with the TV is expected to provide a more user-friendly interaction ensuring the effectiveness integration of the end-user in the overall telehealth solution.This work has been financially supported by the IC&DT project VITASENIOR-MT CENTRO-01-0145-FEDER- 023659 with FEDER funding through programs CENTRO2020 and FCT.info:eu-repo/semantics/publishedVersio

    Integrating factors associated with complex wound healing into a mobile application: findings from a cohort study

    Get PDF
    Complex, chronic or hard-to-heal wounds are a prevalent health problem worldwide, with significant physical, psychological and social consequences. This study aims to identify factors associated with the healing process of these wounds and develop a mobile application for wound care that incorporates these factors. A prospective multicentre cohort study was conducted in nine health units in Portugal, involving data collection through a mobile application by nurses from April to October 2022. The study followed 46 patients with 57 wounds for up to 5 weeks, conducting six evaluations. Healing time was the main outcome measure, analysed using the Mann–Whitney test and three Cox regression models to calculate risk ratios. The study sample comprised various wound types, with pressure ulcers being the most common (61.4%), followed by venous leg ulcers (17.5%) and diabetic foot ulcers (8.8%). Factors that were found to impair the wound healing process included chronic kidney disease (U = 13.50; p = 0.046), obesity (U = 18.0; p = 0.021), non-adherence to treatment (U = 1.0; p = 0.029) and interference of the wound with daily routines (U = 11.0; p = 0.028). Risk factors for delayed healing over time were identified as bone involvement (RR 3.91; p < 0.001), presence of odour (RR 3.36; p = 0.007), presence of neuropathy (RR 2.49; p = 0.002), use of anti-inflammatory drugs (RR 2.45; p = 0.011), stalled wound (RR 2.26; p = 0.022), greater width (RR 2.03; p = 0.002), greater depth (RR 1.72; p = 0.036) and a high score on the healing scale (RR 1.21; p = 0.001). Integrating the identified risk factors for delayed healing into the assessment of patients and incorporating them into a mobile application can enhance decision-making in wound care.info:eu-repo/semantics/publishedVersio

    A practical clinical score

    Get PDF
    Copyright © 2022 Sociedade Portuguesa de Cardiologia. Publicado por Elsevier España, S.L.U. All rights reserved.INTRODUCTION AND OBJECTIVES: Obstructive coronary artery disease (CAD) remains the most common etiology of heart failure with reduced ejection fraction (HFrEF). However, there is controversy whether invasive coronary angiography (ICA) should be used initially to exclude CAD in patients presenting with new-onset HFrEF of unknown etiology. Our study aimed to develop a clinical score to quantify the risk of obstructive CAD in these patients. METHODS: We performed a cross-sectional observational study of 452 consecutive patients presenting with new-onset HFrEF of unknown etiology undergoing elective ICA in one academic center, between January 2005 and December 2019. Independent predictors for obstructive CAD were identified. A risk score was developed using multivariate logistic regression of designated variables. The accuracy and discriminative power of the predictive model were assessed. RESULTS: A total of 109 patients (24.1%) presented obstructive CAD. Six independent predictors were identified and included in the score: male gender (2 points), diabetes (1 point), dyslipidemia (1 point), smoking (1 point), peripheral arterial disease (1 point), and regional wall motion abnormalities (3 points). Patients with a score ≤3 had less than 15% predicted probability of obstructive CAD. Our score showed good discriminative power (C-statistic 0.872; 95% CI 0.834-0.909: p<0.001) and calibration (p=0.333 from the goodness-of-fit test). CONCLUSIONS: A simple clinical score showed the ability to predict the risk of obstructive CAD in patients presenting with new-onset HFrEF of unknown etiology and may guide the clinician in selecting the most appropriate diagnostic modality for the assessment of obstructive CAD.proofepub_ahead_of_prin

    Prototype of an affordable pressure-controlled emergency mechanical ventilator for COVID-19

    Full text link
    We present a viable prototype of a simple mechanical ventilator intended as a last resort to ventilate COVID-19 patients. The prototype implements the pressure-controlled continuous mandatory ventilation mode (PC-CMV) with settable breathing rates, inspiration/expiration time ratios and FiO2 modulation. Although safe, the design aims to minimize the use of technical components and those used are common in industry, so its construction may be possible in times of logistical shortage or disruption or in areas with reduced access to technical materials and at a moderate cost, affordable to lower income countries. Most of the device can be manufactured by modest technical means and construction plans are provided.Comment: This version differs from version 2 in that it includes toxicological and bio-safety tests and updated electronic

    Both “illness and temptation of the enemy”: melancholy, the medieval patient and the writings of King Duarte of Portugal (r. 1433–38)

    Get PDF
    Recent historians have rehabilitated King Duarte of Portugal, previously maligned and neglected, as an astute ruler and philosopher. There is still a tendency, however, to view Duarte as a depressive or a hypochondriac, due to his own description of his melancholy in his advice book, the Loyal Counselor. This paper reassesses Duarte's writings, drawing on key approaches in the history of medicine, such as narrative medicine and the history of the patient. It is important to take Duarte's views on his condition seriously, placing them in the medical and theological contexts of his time and avoiding modern retrospective diagnosis. Duarte's writings can be used to explore the impact of plague, doubt and death on the life of a well-educated and conscientious late-medieval ruler
    corecore