Search results

1 – 10 of over 1000
Article
Publication date: 17 March 2014

J. Virtanen, F. Yang, L. Ukkonen, A.Z. Elsherbeni, A.A. Babar and L. Sydänheimo

The purpose of this paper is to develop a novel totally passive, wireless temperature sensor tag based on ultra high-frequency (UHF) radio frequency identification (RFID…

Abstract

Purpose

The purpose of this paper is to develop a novel totally passive, wireless temperature sensor tag based on ultra high-frequency (UHF) radio frequency identification (RFID) technology. The temperature-sensing functionality is enabled by using distilled water embedded in the tag antenna substrate. The novel sensor tag is designed to provide wireless temperature readings comparable to a commercial thermocouple thermometer even in environments with high levels of interference, such as reflections. The structure of the novel sensor tag is aimed to increase its usability by minimizing user-created errors and to simplify the measurement procedure.

Design/methodology/approach

The sensor tag is based on a dual port sensing concept in which two ports are used to obtain sensor readings. By utilizing two ports instead of one, the effects of environmental interference, tag-reader antenna orientation and distance can be effectively minimized. Two alternative methods of acquiring the sensor reading from the operating characteristics of the two ports are presented and discussed.

Findings

Temperature measurements in practical scenarios show that by utilizing the dual port sensing concept, the developed tag produces temperature readings wirelessly which are comparable to readings from a commercial thermocouple thermometer.

Research limitations/implications

The concept of dual port sensing was shown and two alternative methods on extracting sensor readings from the differences in the port operating characteristics were introduced and discussed. In this paper, the dual port sensing concept is utilized in creating a temperature sensor tag; however, the same concept can be utilized in a variety of passive wireless sensors based on UHF RFID technology. This enables a new approach in designing accurate, easy to use and easily integrable passive sensors. The dual port sensing concept is in its early stages of development; its accuracy could be improved by developing more advanced data post-processing techniques.

Practical implications

The accuracy of a passive dual port UHF RFID-enabled temperature sensor tag is proven to be sufficient in many applications. This indicates that other sensor types utilizing the dual port sensing concept can reach high levels of accuracy as well. Furthermore, the passive RFID-enabled sensors based on the dual port sensing concept are superior in usability versus sensor tags equipped only with a single port. Therefore, dual port sensing concept in passive UHF RFID-enabled sensor tags could make such sensors more attractive commercially and lead to truly widespread ubiquitous sensing and computing.

Originality/value

This paper presents a novel passive, wireless temperature sensor tag for UHF RFID systems. The sensor tag utilizes a new structure which allows tight integration of two ports and two tag antennas. The accuracy of the developed tag is confirmed throughout measurements and it is found comparable to the accuracy of commercial thermometers in practical measurement scenarios. Moreover, the paper presents a dual port sensing concept and two readout methods based on the concept which are aimed to increase the accuracy and usability of all kinds of UHF RFID-enabled sensor tags.

Details

Sensor Review, vol. 34 no. 2
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 18 November 2021

Kumar Neeraj, Mohammed Mahaboob Basha and Srinivasulu Gundala

Smart ubiquitous sensors have been deployed in wireless body area networks to improve digital health-care services. As the requirement for computing power has drastically…

Abstract

Purpose

Smart ubiquitous sensors have been deployed in wireless body area networks to improve digital health-care services. As the requirement for computing power has drastically increased in recent years, the design of low power static RAM-based ubiquitous sensors is highly required for wireless body area networks. However, SRAM cells are increasingly susceptible to soft errors due to short supply voltage. The main purpose of this paper is to design a low power SRAM- based ubiquitous sensor for healthcare applications.

Design/methodology/approach

In this work, bias temperature instabilities are identified as significant issues in SRAM design. A level shifter circuit is proposed to get rid of soft errors and bias temperature instability problems.

Findings

Bias Temperature Instabilities are focused on in recent SRAM design for minimizing degradation. When compared to the existing SRAM design, the proposed FinFET-based SRAM obtains better results in terms of latency, power and static noise margin. Body area networks in biomedical applications demand low power ubiquitous sensors to improve battery life. The proposed low power SRAM-based ubiquitous sensors are found to be suitable for portable health-care devices.

Originality/value

In wireless body area networks, the design of low power SRAM-based ubiquitous sensors are highly essential. This design is power efficient and it overcomes the effect of bias temperature instability.

Details

International Journal of Pervasive Computing and Communications, vol. 17 no. 5
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 February 2005

Jianhua Ma, Laurence T. Yang, Bernady O. Apduhan, Runhe Huang, Leonard Barolli and Mokoto Takizawa

A cyber world (CW) is a digitized world created on cyberspaces inside computers interconnected by networks including the Internet. Following ubiquitous computers, sensors, e‐tags…

Abstract

A cyber world (CW) is a digitized world created on cyberspaces inside computers interconnected by networks including the Internet. Following ubiquitous computers, sensors, e‐tags, networks, information, services, etc., is a road towards a smart world (SW) created on both cyberspaces and real spaces. It is mainly characterized by ubiquitous intelligence or computational intelligence pervasion in the physical world filled with smart things. In recent years, many novel and imaginative researches have been conducted to try and experiment a variety of smart things including characteristic smart objects and specific smart spaces or environments as well as smart systems. The next research phase to emerge, we believe, is to coordinate these diverse smart objects and integrate these isolated smart spaces together into a higher level of spaces known as smart hyperspace or hyper‐environments, and eventually create the smart world. In this paper, we discuss the potential trends and related challenges toward the smart world and ubiquitous intelligence from smart things to smart spaces and then to smart hyperspaces. Likewise, we show our efforts in developing a smart hyperspace of ubiquitous care for kids, called UbicKids.

Details

International Journal of Pervasive Computing and Communications, vol. 1 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 7 June 2013

Younghee Noh

This study seeks to examine the concepts of context, context‐awareness, and context‐awareness technology needed for applying context‐awareness technology to the next‐generation of…

2987

Abstract

Purpose

This study seeks to examine the concepts of context, context‐awareness, and context‐awareness technology needed for applying context‐awareness technology to the next‐generation of digital libraries, and proposed context‐aware services that can be applied to any situation by illustrating some library contexts.

Design/methodology/approach

The paper investigated both theoretical research and case analysis studies before suggesting a service model for context‐awareness‐based libraries by examining the context, context‐awareness, and context‐awareness technology in depth.

Findings

This paper derived possible library services which could be provided if context‐awareness services are implemented by examining and analyzing case studies and systems constructed in other fields. A library‐applied context‐aware system could recognize users entering the library and provide optimal services tailored to each situation for both new and existing users. In addition, the context‐awareness‐based library could provide context‐awareness‐based reference services, context‐awareness‐based loan services, and cater to other user needs in the stacks, research space, and a variety of other information spaces. The context‐awareness‐based library could also recognize users in need of emergency assistance by detecting the user's behavior, movement path, and temperature, etc. Comfort or climate‐control services could provide the user with control of the temperature, humidity, illumination and other environmental elements to fit the circumstances of users, books, and instruments through context‐aware technology.

Practical implications

Next‐generation digital libraries apply new concepts such as semantic retrieval, real‐time web, cloud computing, mobile web, linked data, and context‐awareness. Context‐awareness‐based libraries can provide applied context‐awareness access service, reactive space according to the user's access, applied context‐awareness lobbies, applied context‐awareness reference services, and applied context‐awareness safety services, context‐awareness‐based comfort services and so on.

Originality/value

Real instances of libraries applying context‐aware technology are few, according to the investigative results of this study. The study finds that the next‐generation digital library using context‐awareness technology can provide the best possible service for the convenience of its users.

Article
Publication date: 31 December 2007

Eleftheria Katsiri, Jean Bacon and Alan Mycroft

The event‐driven paradigm is appropriate for context aware, distributed applications, yet basic events may be too low level to be meaningful to users. The authors aim to argue…

Abstract

Purpose

The event‐driven paradigm is appropriate for context aware, distributed applications, yet basic events may be too low level to be meaningful to users. The authors aim to argue that this bottom‐up approach is insufficient to handle very low‐level sensor data or to express all the queries users might wish to make.

Design/methodology/approach

The authors propose an alternative model for querying and subscribing transparently to distributed state in a real‐time, ubiquitous, sensor‐driven environment such as is found in Sentient Computing.

Findings

The framework consists of four components: a state‐based, temporal first‐order logic (TFOL) model that represents the concrete state of the world, as perceived by sensors; an expressive TFOL‐based language, the Abstract Event Specification Language (AESL) for creating abstract event definitions, subscriptions and queries; a higherorder service (Abstract Event Detection Service) that accepts a subscription containing an abstract event definition as an argument and in return publishes an interface to a further service, an abstract event detector; and a satisfiability service that applies classical, logical satisfiability in order to check the satisfiability of the AESL definitions against the world model, in a manner similar to a constraint‐satisfaction problem.

Originality/value

The paper develops a model‐based approach, appropriate for distributed, heterogeneous environments.

Details

International Journal of Pervasive Computing and Communications, vol. 3 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 3 April 2009

Maria Karyda, Stefanos Gritzalis, Jong Hyuk Park and Spyros Kokolakis

This paper aims to contribute to the ongoing discourse about the nature of privacy and its role in ubiquitous environments and provide insights for future research.

1433

Abstract

Purpose

This paper aims to contribute to the ongoing discourse about the nature of privacy and its role in ubiquitous environments and provide insights for future research.

Design/methodology/approach

The paper analyses the privacy implications of particular characteristics of ubiquitous applications and discusses the fundamental principles and information practices used in digital environments for protecting individuals' private data.

Findings

A significant trend towards shifting privacy protection responsibility from government to the individuals is identified. Also, specific directions for future research are provided with a focus on interdisciplinary research.

Research limitations/implications

This paper identifies key research issues and provides directions for future research.

Originality/value

This study contributes by identifying major challenges that should be addressed, so that a set of “fair information principles” can be applied in the context of ubiquitous environments. It also discusses the limitations of these principles and provides recommendations for future research.

Details

Internet Research, vol. 19 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 9 October 2019

Elham Ali Shammar and Ammar Thabit Zahary

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by…

6453

Abstract

Purpose

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by enabling connections between smart objects and humans, and also between smart objects themselves, which leads to anything, anytime, anywhere, and any media communications. IoT allows objects to physically see, hear, think, and perform tasks by making them talk to each other, share information and coordinate decisions. To enable the vision of IoT, it utilizes technologies such as ubiquitous computing, context awareness, RFID, WSN, embedded devices, CPS, communication technologies, and internet protocols. IoT is considered to be the future internet, which is significantly different from the Internet we use today. The purpose of this paper is to provide up-to-date literature on trends of IoT research which is driven by the need for convergence of several interdisciplinary technologies and new applications.

Design/methodology/approach

A comprehensive IoT literature review has been performed in this paper as a survey. The survey starts by providing an overview of IoT concepts, visions and evolutions. IoT architectures are also explored. Then, the most important components of IoT are discussed including a thorough discussion of IoT operating systems such as Tiny OS, Contiki OS, FreeRTOS, and RIOT. A review of IoT applications is also presented in this paper and finally, IoT challenges that can be recently encountered by researchers are introduced.

Findings

Studies of IoT literature and projects show the disproportionate importance of technology in IoT projects, which are often driven by technological interventions rather than innovation in the business model. There are a number of serious concerns about the dangers of IoT growth, particularly in the areas of privacy and security; hence, industry and government began addressing these concerns. At the end, what makes IoT exciting is that we do not yet know the exact use cases which would have the ability to significantly influence our lives.

Originality/value

This survey provides a comprehensive literature review on IoT techniques, operating systems and trends.

Details

Library Hi Tech, vol. 38 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 18 September 2021

Sara V. Fernandez, David Sadat, Farita Tasnim, Daniel Acosta, Laura Schwendeman, Shirin Shahsavari and Canan Dagdeviren

Although conformable devices are commonly designed to couple with the human body for personalized and localized medicine, their applications are expanding rapidly. This paper aims…

Abstract

Purpose

Although conformable devices are commonly designed to couple with the human body for personalized and localized medicine, their applications are expanding rapidly. This paper aims to delineate this expansion and predict greater implications in diverse fields.

Design/methodology/approach

Today’s device technologies continue to face fundamental obstacles preventing their seamless integration with target objects to effectively access, evaluate and alter self-specific physical patterns, while still providing physical comfort and enabling continuous data collection. Due to their extreme mechanical compliance, conformable devices permit the query of signals occurring at interfaces so as to decode and encode biological, chemical and mechanical patterns with high resolution, precision and accuracy. These unique and versatile capabilities allow for a marked change in the approach to tackling scientific questions, with the ability to address societal challenges at large.

Findings

Here, this study highlights the current state of these devices in a wide range of fields, such as interactive teaching, textiles, robotics, buildings and infrastructure, agriculture, climate and space, and further forecasts essential features of these devices in the near future.

Originality/value

This study justifies conformable devices’ growing utility through a novel quantitative analysis methodology that indexes peer-reviewed journal articles based on specific keywords, whereby this study tracks keyword frequency over time across specific fields in conjunction with conformability-like topics. The resulting trends’ trajectories provide the foundation for this study’s future projections. This study concludes with a perspective on the possible challenges concomitant with a ubiquitous presence of these technologies, including manufacturing, wireless communication, storage, compression, privacy and sharing of data, environmental sustainability, avoidance of inequality and bias and collaboration between stakeholders at all levels of impact.

Details

foresight, vol. 24 no. 1
Type: Research Article
ISSN: 1463-6689

Keywords

Article
Publication date: 23 August 2013

Meriel Huggard and Ciarán Mc Goldrick

The purpose of this study is to evaluate a practical laboratory task where final year undergraduate students design, implement and validate an inferred security wireless sensor

Abstract

Purpose

The purpose of this study is to evaluate a practical laboratory task where final year undergraduate students design, implement and validate an inferred security wireless sensor access system.

Design/methodology/approach

The quality of the learning and technical environment was evaluated from a number of perspectives using a mixed methods approach where both quantitative and qualitative data was collected and analysed. Two‐tailed paired t‐tests were used to analyse data on student performance, while a targeted survey was used to assess the achievement of the learning outcomes. The students’ experience of working with the Sun Microsystems SunSPOTs was evaluated and the evolution of their perception of both ubiquity and security from inception to completion of the activity was explored.

Findings

The results of this study indicate that the students’ level of engagement with the assigned laboratory task was higher than with the two other forms of continuous assessment used on the module. Quantitative feedback gathered indicated that the learning outcomes were achieved, while the qualitative data indicated a high level of student satisfaction with the laboratory assignment.

Originality/value

A novel wireless sensor network laboratory that encourages students to engage with the concepts of ubiquity and security is presented and evaluated.

Details

Campus-Wide Information Systems, vol. 30 no. 4
Type: Research Article
ISSN: 1065-0741

Keywords

Article
Publication date: 31 December 2006

Akio Sashima, Noriaki Izumi and Koichi Kurumatani

In the vision of pervasive computing, numerous heterogeneous devices, various information services, and users performing daily activities are physically co‐located in a…

Abstract

In the vision of pervasive computing, numerous heterogeneous devices, various information services, and users performing daily activities are physically co‐located in a environment. How can we coordinate the services and devices to assist a particular user in receiving a particular service so as to maximize the user’s satisfaction? To solve this human‐centered coordination issue, we propose an agent‐based service coordination framework for pervasive computing. It is called location‐aware middle agent framework. The middle agent takes account of the user location in cognitive way (based on location‐ontology), and determines best‐matched services for the user. Based on this coordination framework, we have developed a multi‐agent architecture for pervasive computing, called CONSORTS (Coordination System of Real‐world Transaction Services). In this paper, we first outline some requirements of the human‐centered service coordination in pervasive computing. Secondly, we describe location‐aware middle agent framework to fill the requirements. Lastly, we outline CONSORTS, an prototype of location‐aware middle agent framework, and two applications of CONSORTS, location‐aware information assistance services in a museum and wireless‐LAN based location systems on FIPA agent Networks.

Details

International Journal of Pervasive Computing and Communications, vol. 2 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of over 1000