scholarly journals WSN and RFID Integration in the IoT scenario: an Advanced Safety System for Industrial Plants

2013 ◽  
Vol 9 (1) ◽  
pp. 104 ◽  
Author(s):  
Matteo Petracca ◽  
Stefano Bocchino ◽  
Andrea Azzarà ◽  
Riccardo Pelliccia ◽  
Marco Ghibaudi ◽  
...  

The paper proposes and discusses the integration of WSN and RFID technologies in the IoT scenario. The proposed approach is based on the REST paradigm, thanks to which the two technologies can be seamless integrated by representing sensors, actuators and RFID related data as network resources globally addressable through state-of-the-art IoT protocols. The integration approach is detailed for the Smart Factory use case by proposing and developing an advanced IoT-based WSN and RFID integrated solution aiming at improving safety in industrial plants. The developed system can guarantee a safe access to factory dangerous areas in which safety equipments are required. In the paper, the system design is first presented, then, all the developed hardware and software solutions are described before presenting system performance results in a real test bed. System performance are reported in terms of response time and accuracy for authorization control and location tracking applications.

Author(s):  
Rajankumar Bhatt ◽  
Chin Pei Tang ◽  
Michel Abou-Samah ◽  
Venkat Krovi

In recent times, there has been considerable interest in creating and deploying modular cooperating collectives of robots. Interest in such cooperative systems typically arises when certain tasks are either too complex to be performed by a single agent or when there are distinct benefits that accrue by cooperation of many simple robotic modules. However, the nature of the both the individual modules as well as their interactions can affect the overall system performance. In this paper, we examine this aspect in the context of cooperative payload transport by robot collectives wherein the physical nature of the interactions between the various modules creates a tight coupling within the system. We leverage the rich theoretical background of analysis of constrained mechanical systems to provide a systematic framework for formulation and evaluation of system-level performance on the basis of the individual-module characteristics. The composite multi-d.o.f wheeled vehicle, formed by supporting a common payload on the end-effectors of multiple individual mobile manipulator modules, is treated as an in-parallel system with articulated serial-chain arms. The system-level model, constructed from the twist- and wrench-based models of the attached serial chains, can then be systematically analyzed for performance (in terms of mobility and disturbance rejection.) A 2-module composite system example is used through the paper to highlight various aspects of the systematic system model formulation, effects of selection of the actuation at the articulations (active, passive or locked) on system performance and experimental validation on a hardware prototype test bed.


2001 ◽  
Vol 7 (4) ◽  
pp. 325-342 ◽  
Author(s):  
MARC LIGHT ◽  
GIDEON S. MANN ◽  
ELLEN RILOFF ◽  
ERIC BRECK

In this paper, we take a detailed look at the performance of components of an idealized question answering system on two different tasks: the TREC Question Answering task and a set of reading comprehension exams. We carry out three types of analysis: inherent properties of the data, feature analysis, and performance bounds. Based on these analyses we explain some of the performance results of the current generation of Q/A systems and make predictions on future work. In particular, we present four findings: (1) Q/A system performance is correlated with answer repetition; (2) relative overlap scores are more effective than absolute overlap scores; (3) equivalence classes on scoring functions can be used to quantify performance bounds; and (4) perfect answer typing still leaves a great deal of ambiguity for a Q/A system because sentences often contain several items of the same type.


This paperis based on security measures to be provided to IoT related data, as there is an increasing demand to secure the IoT devices, networks and applications. The network resources are getting affected as the cybercrimes are increasing day-by-day. In this paper, first we highlight upon the key challenges and security issues in IoT architecture and then focus upon the case study of IoT application in healthcare IoMT, In Healthcare, prevention and cure have seen various advancement in technological schema. The Medical equipment when used with the Internet of Things are termed as Internet of Medical things (IOMT). IoMT is transforming healthcare industry by providing large scale connectivity for medical devices, patients, physicians, clinical and nursing staff who use them and facilitate real-time monitoring supportingthe knowledge gathered from the connected things. Security constraints for IoMT take confidentiality, integrity and authentication as prime key aspect. These can be achievedbytheintegration of physical devices like sensors for connectivity and communication in cloud-based facility which in course is delivered by interface. Access Control security is obtained through key generation for data owners and the user of private health records whilethedata confidentiality is obtained by use of Advanced Encryption Standard (AES)as an efficientencryptionalgorithm


2001 ◽  
Author(s):  
Timothy W. Schweitzer ◽  
Timothy M. Watts ◽  
Noel Wright ◽  
Debbie Cornell

Information ◽  
2020 ◽  
Vol 11 (12) ◽  
pp. 570
Author(s):  
Michael Xevgenis ◽  
Dimitrios G. Kogias ◽  
Panagiotis Karkazis ◽  
Helen C. Leligou ◽  
Charalampos Patrikakis

With the advent of Software Defined Networking (SDN) and Network Function Virtualization (NFV) technologies, the networking infrastructures are becoming increasingly agile in their attempts to offer the quality of services needed by the users, maximizing the efficiency of infrastructure utilization. This in essence mandates the statistical multiplexing of demands across the infrastructures of different Network Providers (NPs), which would allow them to cope with the increasing demand, upgrading their infrastructures at a slower pace. However, to enjoy the benefits of statistical multiplexing, a trusted authority to govern it would be required. At the same time, blockchain technology aspires to offer a solid advantage in such untrusted environments, enabling the development of decentralized solutions that ensure the integrity and immutability of the information stored in the digital ledger. To this end, in this paper, we propose a blockchain-based solution that allows NPs to trade their (processing and networking) resources. We implemented the solution in a test-bed deployed on the cloud and we present the gathered performance results, showing that a blockchain-based solution is feasible and appropriate. We also discuss further improvements and challenges.


Electronics ◽  
2019 ◽  
Vol 8 (2) ◽  
pp. 117 ◽  
Author(s):  
José Santa ◽  
Pedro Fernández ◽  
Jordi Ortiz ◽  
Ramon Sanchez-Iborra ◽  
Antonio Skarmeta

Virtualization technologies are key enablers of softwarized 5G networks, and their usage in the vehicular domain can provide flexibility and reliability in real deployments, where mobility and processing needs may be an issue. Next-generation vehicular services, such as the ones in the area of urban mobility and, in general, those interconnecting on-board sensors, require continuous data gathering and processing, but current architectures are stratified in two-tier solutions in which data is collected by on-board units (OBU) and sent to cloud servers. In this line, intermediate cache and processing layers are needed in order to cover quasi-ubiquitous data-gathering needs of vehicles in scenarios of smart cities/roads considering vehicles as moving sensors. The SURROGATES solution presented in this paper proposes to virtualize vehicle OBUs and create a novel Multi-Access Edge Computing (MEC) layer with the aim of offloading processing from the vehicle and serving data-access requests. This deals with potential disconnection periods of vehicles, saves radio resources when accessing the physical OBU and improves data processing performance. A proof of concept has been implemented using OpenStack and Open Source MANO to virtualize resources and gather data from in-vehicle sensors, and a final traffic monitoring service has been implemented to validate the proposal. Performance results reveal a speedup of more than 50% in the data request resolution, with consequently great savings of network resources in the wireless segment. Thus, this work opens a novel path regarding the virtualization of end-devices in the Intelligent Transportation Systems (ITS) ecosystem.


2019 ◽  
Vol 11 (7) ◽  
pp. 141
Author(s):  
Abro ◽  
Deng ◽  
Memon ◽  
Laghari ◽  
Mohammadani ◽  
...  

This paper aims to propose a new fog cloud architecture that performs a joint energy-efficient task assignment (JEETA). The proposed JEETA architecture utilizes the dynamic application-partitioning algorithm (DAPTS), a novel algorithm that efficiently decides and switches the task to be offloaded or not in heterogeneous environments with minimal energy consumption. The proposed scheme outperforms baseline approaches such as MAUI, Think Air and Clone Cloud in many performance aspects. Results show that for the execution of 1000 Tasks on fog, mobile offloaded nodes, JEETA consumes the leas, i.e., 23% of the total energy whereas other baseline approaches consume in between 50%–100% of the total energy. Results are validated via real test-bed experiments and trice are driven efficient simulations.


2012 ◽  
Vol 157-158 ◽  
pp. 1431-1435
Author(s):  
Ling Zhao ◽  
Jing Zhi Ye ◽  
Wen Feng Luo

In this paper, a real-time location feedback control system based on multi-sensor network is proposed for the precise control of a moving robot. The target tracking network system is a real test-bed that consists of a group of ultrasonic sensor nodes, a mobile robot and two laptops. In order to pursue excellent tracking performance and modify the robot’s trajectory promptly, Extended Kalman Filtering algorithm as well as a kind of scheduling scheme based on location is applied in the system. The experiment result validates the correctness of the Extended Kalman Filter (EKF) and shows that the target tracking network system is effective for robot feedback control.


Sign in / Sign up

Export Citation Format

Share Document