scholarly journals Reliability and effective use of electronic trap monitoring systems based on cellular networks

Author(s):  
Anthony R. Martin

AbstractThe deployment of cage traps rather than kill traps can greatly reduce non-target mortality in an invasive species control/eradication operation, but their use is normally constrained by the need for them to be checked frequently on animal welfare grounds. This paper examines the reliability of electronic monitoring devices that use cellular (mobile phone) networks to alert the operator when a trap door closes, and also discusses the management network that is needed to convert an alarm into a timely trap visit without fail. The two monitoring systems tested were 100% reliable in notifying the operator when a trap door closed, and their use reduced the burden of trap visits by 98% compared to the standard protocol of daily checks. As such, these systems can be of great value to campaigns operating large numbers of traps, especially when capture rates are low.

PEDIATRICS ◽  
1979 ◽  
Vol 63 (4) ◽  
pp. 670-673
Author(s):  
Dorothy H. Kelly ◽  
Kathleen O'Connell ◽  
Daniel C. Shannon

Infants who have experienced an episode of prolonged sleep apnea associated with cyanosis, pallor, and limpness requiring vigorous stimulation or mouth-to-mouth resuscitation to restore breathing, are at risk of experiencing a recurrence that may result in death1.2. The American Academy of Pediatrics has recommended that such infants be treated by 24-hour surveillance either in the home or in the hospital. Electronic monitoring devices "may be useful adjuncts" to such surveillance.3 Since 1973, we have monitored 270 infants at home with apnea or cardiac monitors. A major problem with monitoring infants at home has been false alarms, such as alarms for apnea when the infant is breathing, on heart rate or apnea alarms due to a loose electrode.


Author(s):  
Tobias Hoßfeld ◽  
Michael Duelli ◽  
Dirk Staehle ◽  
Phuoc Tran-Gia

The performance of P2P content distribution in cellular networks depends highly on the cooperation and coordination of heterogeneous and often selfish mobile users. The major challenges are the identification of problems arising specifically in cellular mobile networks and the development of new cooperation strategies to overcome these problems. In the coherent previous chapter, the authors focused on the selfishness of users in such heterogeneous environments. This discussion is now extended by emphasizing the impact of mobility and vertical handover between different wireless access technologies. An abstract mobility model is required to allow the performance evaluation in feasible computational time. As a result, the performance in today’s and future cellular networks is predicted and new approaches to master heterogeneity in cellular networks are derived.


2015 ◽  
Author(s):  
R Long ◽  
A Barney ◽  
C Carlin ◽  
J Joyce ◽  
M Loquine ◽  
...  

2019 ◽  
Vol 16 (3) ◽  
pp. 186-194 ◽  
Author(s):  
Carla R. Jungquist ◽  
Varun Chandola ◽  
Cheryl Spulecki ◽  
Kenneth V. Nguyen ◽  
Paul Crescenzi ◽  
...  

Informatics ◽  
2019 ◽  
Vol 6 (3) ◽  
pp. 40
Author(s):  
Evgenia Princi ◽  
Nicole C. Krämer

Smart technology in the area of the Internet of Things (IoT) that extensively gathers user data in order to provide full functioning has become ubiquitous in our everyday life. At the workplace, individual’s privacy is especially threatened by the deployment of smart monitoring technology due to unbalanced power relations. In this work we argue that employees’ acceptance of smart monitoring systems can be predicted based on privacy calculus considerations and trust. Therefore, in an online experiment (N = 661) we examined employees’ acceptance of a smart emergency detection system, depending on the rescue value of the system and whether the system’s tracking is privacy-invading or privacy-preserving. We hypothesized that trust in the employer, perceived benefits and risks serve as predictors of system acceptance. Moreover, the moderating effect of privacy concerns is analyzed.


Sign in / Sign up

Export Citation Format

Share Document