Recent advances of wireless communication technologies for ubiquitous computing

Author(s):  
Sherali Zeadally ◽  
Lu Yan
Author(s):  
Michail Yu. Maslov ◽  
Yuri M. Spodobaev

Telecommunications industry evolution shows the highest rates of transition to high-tech systems and is accompanied by a trend of deep mutual penetration of technologies - convergence. The dominant telecommunication technologies have become wireless communication systems. The widespread use of modern wireless technologies has led to the saturation of the environment with technological electromagnetic fields and the actualization of the problems of protecting the population from them. This fundamental restructuring has led to a uniform dense placement of radiating fragments of network technologies in the mudflow areas. The changed parameters of the emitted fields became the reason for the revision of the regulatory and methodological support of electromagnetic safety. A fragmented structural, functional and parametric analysis of the problem of protecting the population from the technological fields of network technologies revealed uncertainty in the interpretation of real situations, vulnerability, weakness and groundlessness of the methodological basis of sanitary-hygienic approaches. It is shown that this applies to all stages of the electromagnetic examination of the emitting fragments of network technologies. Distrust arises on the part of specialists and the population in not only the system of sanitary-hygienic control, but also the safety of modern network technologies is being called into question. Growing social tensions and radio phobia are everywhere accompanying the development of wireless communication technologies. The basis for solving almost all problems of protecting the population can be the transfer of subjective methods and means of monitoring and sanitary-hygienic control of electromagnetic fields into the field of IT.


Author(s):  
Senthil Prabu Ramalingam ◽  
Prabhakar Karthikeyan Shanmugam

Background: The smart grid communication network is constructed with three tiers namely, Home Area Networks (HANs), Neighborhood Area Networks (NANs) and Wide Area Networks (WANs). These networks function with various communication protocols like table protocol, on-demand protocol, Wi-Fi, Zigbee, Z-Wave, Wi-MAX, GSM, LTE, Cognitive Radio Networks. The network interconnection is heterogonous and all appliances have to communicate through the IP gateways. A large amount of data is collected from various sensors placed in different locations. The analytics on large data- “big data” is essential because these data were used to organize and plan an efficient control and management of the smart home including secured data exchange in different sectors. Objective: This paper investigates broadly on data rate, channel bandwidth, power consumption, and a coverage range of both wired and wireless communication technologies used in residential buildings. Besides, a literature survey on optimization algorithms with various constraints to manage home appliances through scheduling is included. The paper also discusses the communication standards along with security and privacy requirements for smart metering networks. Conclusion: Discussion on IEEE standards for both wired and wireless communication protocols. Gives direction to identify the suitable communication technique through mathematical model for computing the communication channel bandwidth. Comparison of various optimization algorithms with multiple constraints in HEMS to achieve the minimum electricity cost and user comfort (with and without Renewable Energy Sources). From the investigation on both wired and wireless networks, the wireless communication networks (Zig-Bee & Wi-Fi) are mostly preferred to use in HAN because of more reliability and low cost. Zigbee is the most appropriate technology used for data transmission between the individual appliances and smart meters. Wi-Fi is a suitable technology for controlling and monitoring appliances because of its high data rate.


Sensors ◽  
2018 ◽  
Vol 18 (11) ◽  
pp. 4075 ◽  
Author(s):  
Ali Balador ◽  
Anis Kouba ◽  
Dajana Cassioli ◽  
Fotis Foukalas ◽  
Ricardo Severino ◽  
...  

Cooperative Cyber-Physical Systems (Co-CPSs) can be enabled using wireless communication technologies, which in principle should address reliability and safety challenges. Safety for Co-CPS enabled by wireless communication technologies is a crucial aspect and requires new dedicated design approaches. In this paper, we provide an overview of five Co-CPS use cases, as introduced in our SafeCOP EU project, and analyze their safety design requirements. Next, we provide a comprehensive analysis of the main existing wireless communication technologies giving details about the protocols developed within particular standardization bodies. We also investigate to what extent they address the non-functional requirements in terms of safety, security and real time, in the different application domains of each use case. Finally, we discuss general recommendations about the use of different wireless communication technologies showing their potentials in the selected real-world use cases. The discussion is provided under consideration in the 5G standardization process within 3GPP, whose current efforts are inline to current gaps in wireless communications protocols for Co-CPSs including many future use cases.


2010 ◽  
Vol 48 (5) ◽  
pp. 156-162 ◽  
Author(s):  
Kashif Dar ◽  
Mohamed Bakhouya ◽  
Jaafar Gaber ◽  
Maxime Wack ◽  
Pascal Lorenz

Author(s):  
S. R. PATIL ◽  
SNEHAL SALUNKHE ◽  
NIKITA KULKARNI ◽  
PRIYANKA SAVANT

ample efforts have been taken in restaurant sector to intrigue the dining experience. Several information and communication technologies have been adopted earlier such as PDA; wireless communication technologies etc.These technologies provide a simple but powerful infrastructure. This paper highlights the limitations of the existing technologies and proposed the E-CONVERSE, which focuses on low cost touch-screen development to enhance the dining experience. In this paper we discuss the design and implementation of a low cost, customizable touch screen. To ensure the security of the system some security strategies are discussed. Basic level testing reveals that proposed system has potential for practical implementation and can overcome several drawbacks of existing system.


Sign in / Sign up

Export Citation Format

Share Document