scholarly journals An Internet of Things Based Bed-Egress Alerting Paradigm Using Wearable Sensors in Elderly Care Environment

Sensors ◽  
2019 ◽  
Vol 19 (11) ◽  
pp. 2498 ◽  
Author(s):  
Muhammad Awais ◽  
Mohsin Raza ◽  
Kamran Ali ◽  
Zulfiqar Ali ◽  
Muhammad Irfan ◽  
...  

The lack of healthcare staff and increasing proportions of elderly population is alarming. The traditional means to look after elderly has resulted in 255,000 reported falls (only within UK). This not only resulted in extensive aftercare needs and surgeries (summing up to £4.4 billion) but also in added suffering and increased mortality. In such circumstances, the technology can greatly assist by offering automated solutions for the problem at hand. The proposed work offers an Internet of things (IoT) based patient bed-exit monitoring system in clinical settings, capable of generating a timely response to alert the healthcare workers and elderly by analyzing the wireless data streams, acquired through wearable sensors. This work analyzes two different datasets obtained from divergent families of sensing technologies, i.e., smartphone-based accelerometer and radio frequency identification (RFID) based accelerometer. The findings of the proposed system show good efficacy in monitoring the bed-exit and discriminate other ambulating activities. Furthermore, the proposed work manages to keep the average end-to-end system delay (i.e., communications of sensed data to Data Sink (DS)/Control Center (CC) + machine-based feature extraction and class identification + feedback communications to a relevant healthcare worker/elderly) below 1 10 th of a second.

2013 ◽  
Vol 744 ◽  
pp. 532-535
Author(s):  
Chun Wu Wang ◽  
Chun Ling Liu ◽  
Zheng Kun Qin

The system had achieved a wireless data communication function using AVR SCM as a control center and basing on radio frequency identification technology. The transmitting terminal of system produces a high frequency signal through capacitance connecting three point type oscillator. And the encoded signal will be transmitted after high-frequency carrier modulated. While after the receiving terminal receive the signal through antenna, and the signal after a series processes including amplification, detection, rectification, voltage comparison will be processed by SCM. The system includes temperature humidity sensor, clock generator chip, photosensitive element, could detect the surrounding environment signal and wireless transmit. The paper elaborates the soft and the hardware realizing specific course of the wireless transmission system. It has an important meaning for the wireless transmission technique.


Author(s):  
Jordan Frith

The phrase the Internet of things was originally coined in a 1999 presentation about attaching radio frequency identification (RFID) tags to individual objects. These tags would make the objects machine-readable, uniquely identifiable, and, most importantly, wirelessly communicative with infrastructure. This chapter evaluates RFID as a piece of mobile communicative infrastructure, and it examines two emerging forms: near-field communication (NFC) and Bluetooth low-energy beacons. The chapter shows how NFC and Bluetooth low-energy beacons may soon move some types of RFID to smartphones, in this way evolving the use of RFID in payment and transportation and enabling new practices of post-purchasing behaviors.


2018 ◽  
Vol 14 (8) ◽  
pp. 155014771879512 ◽  
Author(s):  
Madiha Khalid ◽  
Umar Mujahid ◽  
Muhammad Najam-ul-Islam

Internet of Things is one of the most important components of modern technological systems. It allows the real time synchronization and connectivity of devices with each other and with the rest of the world. The radio frequency identification system is used as node identification mechanism in the Internet of Thing networks. Since Internet of Things involve wireless channel for communication that is open for all types of malicious adversaries, therefore many security protocols have been proposed to ensure encryption over wireless channel. To reduce the overall cost of radio frequency identification enabled Internet of Thing network security, the researchers use simple bitwise logical operations such as XOR, AND, OR, and Rot and have proposed many ultralightweight mutual authentication protocols. However, almost all the previously proposed protocols were later found to be vulnerable against several attack models. Recently, a new ultralightweight mutual authentication protocol has been proposed which involves only XOR and Rotation functions in its design and claimed to be robust against all possible attack models. In this article, we have performed cryptanalysis of this recently proposed ultralightweight mutual authentication protocol and found many pitfalls and vulnerabilities in the protocol design. We have exploited weak structure of the protocol messages and proposed three attacks against the said protocol: one desynchronization and two full disclosure attacks.


Author(s):  
Sini-Kaisu Kinnunen ◽  
Antti Ylä-Kujala ◽  
Salla Marttonen-Arola ◽  
Timo Kärri ◽  
David Baglee

The emerging Internet of Things (IoT) technologies could rationalize data processes from acquisition to decision making if future research is focused on the exact needs of industry. This article contributes to this field by examining and categorizing the applications available through IoT technologies in the management of industrial asset groups. Previous literature and a number of industrial professionals and academic experts are used to identify the feasibility of IoT technologies in asset management. This article describes a preliminary study, which highlights the research potential of specific IoT technologies, for further research related to smart factories of the future. Based on the results of literature review and empirical panels IoT technologies have significant potential to be applied widely in the management of different asset groups. For example, RFID (Radio Frequency Identification) technologies are recognized to be potential in the management of inventories, sensor technologies in the management of machinery, equipment and buildings, and the naming technologies are potential in the management of spare parts.


Sensors ◽  
2018 ◽  
Vol 18 (11) ◽  
pp. 3746 ◽  
Author(s):  
Antonio Lazaro ◽  
Ramon Villarino ◽  
David Girbau

In this article, an overview of recent advances in the field of battery-less near-field communication (NFC) sensors is provided, along with a brief comparison of other short-range radio-frequency identification (RFID) technologies. After reviewing power transfer using NFC, recommendations are made for the practical design of NFC-based tags and NFC readers. A list of commercial NFC integrated circuits with energy-harvesting capabilities is also provided. Finally, a survey of the state of the art in NFC-based sensors is presented, which demonstrates that a wide range of sensors (both chemical and physical) can be used with this technology. Particular interest arose in wearable sensors and cold-chain traceability applications. The availability of low-cost devices and the incorporation of NFC readers into most current mobile phones make NFC technology key to the development of green Internet of Things (IoT) applications.


2021 ◽  
pp. 1-10
Author(s):  
Jintao Tang ◽  
Lvqing Yang ◽  
Jiangsheng Zhao ◽  
Yishu Qiu ◽  
Yihui Deng

With the development of the Internet of Things and Radio Frequency Identification (RFID), indoor positioning technology as an important part of positioning technology, has been attracting much attention in recent years. In order to solve the problems of low precision, high cost and signal collision between readers, a new indoor positioning algorithm based on a single RFID reader combined with a Double-order Gated Recurrent Unit (GRU) are proposed in this paper. Firstly, the reader is moved along the specified direction to collect the sequential tag data. Then, the tag’s coordinate is taken as the target value to train models and compare them with existing algorithms. Finally, the best Gated Recurrent Unit positioning model is used to estimate the position of the tags. Experiment results show that the proposed algorithm can effectively improve positioning accuracy, reduce the number of readers, cut down the cost and eliminate the collisions of reader signals.


2021 ◽  
Author(s):  
Mohamad Oubai Al-Rejleh

The Internet of Things (IoT) is a revolutionary concept that emerged in the late 21st century, whereby everyday objects such as household items, cars, and wearables, equipped with sensors and (Radio Frequency Identification) RFID chips, can communicate with the internet and to their physical surroundings. These chips allow the connected items to share information, and allow the user to collect information about his/her “quantified self”, measuring personal data such as habits of usage, lifestyle, and location through internet networks. IoT enabled devices are designed to collect, store, share, and analyze of highly personal data ubiquitously and in real time. However, with this new affordance of connectivity, comes a potential loss of privacy for users, as ever increasing sets of personal data are collected and tracked. As such, there is a pressing need for privacy considerations to be embedded within the early stages of design of connected devices and networks.


2013 ◽  
Vol 321-324 ◽  
pp. 2818-2821 ◽  
Author(s):  
Jian Ming Huang

At present, the transportation industry brings energy consumption, pollution and traffic congestion is becoming more and more serious, which has greatly restricted the economic and social development. This paper elaborates the concepts of Internet of things, intelligent transportation, and Internet of vehicles; Internet of vehicles based on Internet of Things technology is considered as an effective method to solve road congestion. The key technologies of the Internet of vehicles include traffic information perception technology, network communication technology, and cloud computing technologies etc. among them, radio frequency identification technology, sensor technology, floating car data technology, and GPS positioning technology are the focus. Application of Internet of vehicles is discussed, and its future development is prospected.


2022 ◽  
pp. 168-180
Author(s):  
Sasikumar Gurumoorthy ◽  
L. Venkateswara Reddy ◽  
Sudhakaran Periakaruppan

Art colonnades and museums all over the world are the first option for individuals to visit for the enhancement of the cultural life of people. To ensure their safety, museums have established numerous cultural security measures. Traditional strategies do not obstruct their pace entirely. They only use a computer in the museum to check individuals at the entrance and exit. Therefore, the authors proposed a gallery anti-stealing device created on the internet-of-things (IoT) technology that ensures security through passive readers/writers of RFID. Radio frequency identification (RFID) remains a system that practices isolated data storing and recovery and offers object tracking with a unique identity code. The system then sends sound and light warning information, while the photographic camera structure is triggered to capture a picture at the same time. The recognition of the accuracy in the hardware component of the device can be additionally enhanced by the use of this technology to increase the safety of museum equipment.


Author(s):  
Maurice Dawson

Secure computing is essential as environments continue to become intertwined and hyperconnected. As the Internet of Things (IoT), Web of Things (WoT), and the Internet of Everything (IoE) dominate the landscape of technological platforms, protection these complicated networks is important. The everyday person who wishes to have more devices that allow the ability to be connected needs to be aware of what threats they could be potentially exposing themselves to. Additionally, for the unknowing consumer of everyday products needs to be aware of what it means to have sensors, Radio Frequency IDentification (RFID), Bluetooth, and WiFi enabled products. This submission explores how Availability, Integrity, and Confidentiality (AIC) can be applied to IoT, WoT, and IoE with consideration for the application of these architectures in the defense sector.


Sign in / Sign up

Export Citation Format

Share Document