Search results

1 – 10 of 78
Open Access
Article
Publication date: 30 July 2024

Lin Li, Jiushan Wang and Shilu Xiao

The aim of this work is to research and design an expert diagnosis system for rail vehicle driven by data mechanism models.

Abstract

Purpose

The aim of this work is to research and design an expert diagnosis system for rail vehicle driven by data mechanism models.

Design/methodology/approach

The expert diagnosis system utilizes statistical and deep learning methods to model the real-time status and historical data features of rail vehicle. Based on data mechanism models, it predicts the lifespan of key components, evaluates the health status of the vehicle and achieves intelligent monitoring and diagnosis of rail vehicle.

Findings

The actual operation effect of this system shows that it has improved the intelligent level of the rail vehicle monitoring system, which helps operators to monitor the operation of vehicle online, predict potential risks and faults of vehicle and ensure the smooth and safe operation of vehicle.

Originality/value

This system improves the efficiency of rail vehicle operation, scheduling and maintenance through intelligent monitoring and diagnosis of rail vehicle.

Open Access
Article
Publication date: 15 March 2018

Moufida Maimour

Multipath routing holds a great potential to provide sufficient bandwidth to a plethora of applications in wireless sensor networks. In this paper, we consider the problem of…

360

Abstract

Multipath routing holds a great potential to provide sufficient bandwidth to a plethora of applications in wireless sensor networks. In this paper, we consider the problem of interference that can significantly affect the expected performances. We focus on the performance evaluation of the iterative paths discovery approach as opposed to the traditional concurrent multipath routing. Five different variants of multipath protocols are simulated and evaluated using different performance metrics. We mainly show that the iterative approach allows better performances when used jointly with an interference-aware metric or when an interference-zone marking strategy is employed. This latter appears to exhibit the best performances in terms of success ratio, achieved throughput, control messages overhead as well as energy consumption.

Details

Applied Computing and Informatics, vol. 16 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 1 December 2006

Kasim Randeree

Strategies for teaching engineering in the United Arab Emirates (UAE) have been evolving over the past decades due to innovations in technology, as well as the development of…

Abstract

Strategies for teaching engineering in the United Arab Emirates (UAE) have been evolving over the past decades due to innovations in technology, as well as the development of educational methodologies. In the recent past, the focus for engineering faculty has been not only on promoting the skills needed to raise the level of employability of Emirati graduates, but increasingly on new educational methodologies, e-learning and wireless networked laptop technology. Students in the UAE exhibit certain characteristics emerging from a variety of cultural and historical traditions, as well as from methodologies of education used at the pre-tertiary levels. These characteristics include expecting to be passive recipients of taught information, and lack of independence in their approach to problem solving. In this paper I discuss the development of strategies to facilitate the transition of students from passive to active learning; examine the role of technology-driven educational methodologies in promoting independent and group-centered learning skills; and use a case study to explore the instruction of Engineering Design and Computer-Aided Design (CAD) and to examine how classroom management techniques have changed as a result of the growing use of technology.

Details

Learning and Teaching in Higher Education: Gulf Perspectives, vol. 3 no. 2
Type: Research Article
ISSN: 2077-5504

Open Access
Article
Publication date: 28 November 2022

Kodama Haruo

The purpose of this paper is to investigate the legal issues of simultaneous Internet transmission of broadcasting programs of the Open University of Japan (OUJ) and to take legal…

Abstract

Purpose

The purpose of this paper is to investigate the legal issues of simultaneous Internet transmission of broadcasting programs of the Open University of Japan (OUJ) and to take legal measures to promote the mutual utilization of open university courses in Japan, the UK, China and Korea.

Design/methodology/approach

The author examines the legal relationship regarding Internet simultaneous distribution of broadcast courses at the OUJ. The author then considers the legal relationship between the UK, China and South Korea regarding the simultaneous transmission of broadcast courses over the internet. Based on that consideration, this paper clarifies legal measures to promote its utilization.

Findings

Internet transmission of broadcasting courses will be webcasting. Arguably, it can be assumed to be streaming and on-demand, albeit controversial. Webcasting will be publicly transmitted, but there is only an on-demand provision for Internet transmission. As webcasting is streaming and on-demand, it involves reproduction of broadcasting courses. Therefore, webcasting needs to provide streaming provision for public transmission rights and associate them with reproduction right.

Originality/value

The originality of this paper lies in clarifying the legal response of the object, subject and rights of webcasting from the perspective of the OUJ, in order to dispel legal problems that may arise in the future against this unexplored phenomenon. Additionally, this paper is valuable in that it presents legal consistency from the point of view of the comparative laws of Japan, the UK, China and South Korea, based on an examination of the legal response in Japan.

Details

Asian Association of Open Universities Journal, vol. 17 no. 3
Type: Research Article
ISSN: 1858-3431

Keywords

Open Access
Article
Publication date: 4 July 2018

C.E. Oude Weernink, E. Felix, P.J.E.M. Verkuijlen, A.T.M. Dierick-van Daele, J.K. Kazak and J. van Hoof

In the domain of healthcare, both process efficiency and the quality of care can be improved through the use of dedicated pervasive technologies. Among these applications are…

4166

Abstract

Purpose

In the domain of healthcare, both process efficiency and the quality of care can be improved through the use of dedicated pervasive technologies. Among these applications are so-called real-time location systems (RTLS). Such systems are designed to determine and monitor the location of assets and people in real time through the use of wireless sensor networks. Numerous commercially available RTLS are used in hospital settings. The nursing home is a relatively unexplored context for the application of RTLS and offers opportunities and challenges for future applications. The paper aims to discuss these issues.

Design/methodology/approach

This paper sets out to provide an overview of general applications and technologies of RTLS. Thereafter, it describes the specific healthcare applications of RTLS, including asset tracking, patient tracking and personnel tracking. These overviews are followed by a forecast of the implementation of RTLS in nursing homes in terms of opportunities and challenges.

Findings

By comparing the nursing home to the hospital, the RTLS applications for the nursing home context that are most promising are asset tracking of expensive goods owned by the nursing home in order to facilitate workflow and maximise financial resources, and asset tracking of personal belongings that may get lost due to dementia.

Originality/value

This paper is the first to provide an overview of potential application of RTLS technologies for nursing homes. The paper described a number of potential problem areas that can be addressed by RTLS.

Details

Journal of Enabling Technologies, vol. 12 no. 2
Type: Research Article
ISSN: 2398-6263

Keywords

Open Access
Article
Publication date: 11 September 2020

J. Ahmad, H. Larijani, R. Emmanuel, M. Mannion and A. Javed

Buildings use approximately 40% of global energy and are responsible for almost a third of the worldwide greenhouse gas emissions. They also utilise about 60% of the world’s…

2897

Abstract

Buildings use approximately 40% of global energy and are responsible for almost a third of the worldwide greenhouse gas emissions. They also utilise about 60% of the world’s electricity. In the last decade, stringent building regulations have led to significant improvements in the quality of the thermal characteristics of many building envelopes. However, similar considerations have not been paid to the number and activities of occupants in a building, which play an increasingly important role in energy consumption, optimisation processes, and indoor air quality. More than 50% of the energy consumption could be saved in Demand Controlled Ventilation (DCV) if accurate information about the number of occupants is readily available (Mysen et al., 2005). But due to privacy concerns, designing a precise occupancy sensing/counting system is a highly challenging task. While several studies count the number of occupants in rooms/zones for the optimisation of energy consumption, insufficient information is available on the comparison, analysis and pros and cons of these occupancy estimation techniques. This paper provides a review of occupancy measurement techniques and also discusses research trends and challenges. Additionally, a novel privacy preserved occupancy monitoring solution is also proposed in this paper. Security analyses of the proposed scheme reveal that the new occupancy monitoring system is privacy preserved compared to other traditional schemes.

Details

Applied Computing and Informatics, vol. 17 no. 2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 14 August 2017

Jose Ignacio Tamayo Segarra, Bilal Al Jammal and Hakima Chaouchi

Internet of Things’ (IoT’s) first wave started with tracking services for better inventory management mainly using radio frequency identification (RFID) technology. Later on…

2985

Abstract

Purpose

Internet of Things’ (IoT’s) first wave started with tracking services for better inventory management mainly using radio frequency identification (RFID) technology. Later on, monitoring services became one of the major interests, including sensing technologies, and then more actuation for remote control-type of IoT applications such as smart homes, smart cities and Industry 4.0. In this paper, the authors focus on the RFID technology impairment. They propose to take advantage of the mature IoT technologies that offer native service discovery such as blutooth or LTE D2D ProSe or Wifi Direct. Using the automatic service discovery in the new framework will make heterogeneous readers aware of the presence of other readers and this will be used by the proposed distributed algorithm to better control the multiple RFID reader interference problem. The author clearly considers emerging Industry 4.0 use case, where RFID technology is of major interest for both identification and tracking. To enhance the RFID tag reading performance, collisions in the RFID frequency should be minimized with reader-to-reader coordination protocols. In this paper, the author proposes a simple distributed reader anti-collision protocol named DiSim that makes use of proximity services of IoT network and is compliant with the current RFID standards. The author evaluates the efficiency of the proposal via simulation.

Design/methodology/approach

In this paper, the author proposes a simple distributed reader anti-collision protocol named DiSim that makes use of proximity services of IoT network and is compliant with the current RFID standards. The author evaluates the efficiency of the proposal via simulation to study its behavior in very dense and heterogeneous RFID environments. Specifically, the author explores the coexistence of powerful static readers and small mobile readers, comparing the proposal with a standard ETSI CSMA method. The proposal reduces significantly the number of access attempts, which are resource-expensive for the readers. The results show that the objectives of DiSim are met, producing low reader collision probability and, however, having lower average readings per reader per time.

Findings

DiSim is evaluated with the ETSI standard LBT protocol for multi-reader environments in several environments with varied levels of reader and tag densities, having both static powerful RFID readers and heterogeneous randomly moving mobile RFID readers. It effectively reduces the number of backoffs or contentions for the RFID channel. This has high reading success rate due to the avoided collisions; however, the readers are put to wait, and DiSim has less average readings per reader per time. As an additional side evaluation, the ETSI standard LBT mechanism was found to present a good performance for low-density mid-coverage scenarios, however, with high variability on the evaluation results.

Research limitations/implications

To show more results, the author needs to do real experimentation in a warehouse, such as Amazon warehouse, where he expects to have more and more robots, start shelves, automatic item finding on the shelve, etc.

Practical implications

Future work considers experimentation in a real warehouse equipped with heterogeneous RFID readers and real-time analysis of RFID reading efficiency also combined with indoor localization and navigation for warehouse mobile robots.

Social implications

More automatization is expected in the future; this work makes the use of RFID technology more efficient and opens more possibilities for services deployment in different domains such as the industry which was considered not only in this paper but also in smart cites and smart homes.

Originality/value

Compared to the literature, the proposal offers the advantage to not be dependent on a centralized server controlling the RFID readers. It also offers the possibility for an existing RFID architecture to add new readers from a different manufacturer, as the readers using the approach will have the possibility to discover the capabilities of the new interaction other RFID readers. This solution takes advantage of the available proximity service that will be more and more offered by the IoT technologies.

Open Access
Article
Publication date: 28 June 2022

Olli Väänänen and Timo Hämäläinen

Minimizing the energy consumption in a wireless sensor node is important for lengthening the lifetime of a battery. Radio transmission is the most energy-consuming task in a…

1154

Abstract

Purpose

Minimizing the energy consumption in a wireless sensor node is important for lengthening the lifetime of a battery. Radio transmission is the most energy-consuming task in a wireless sensor node, and by compressing the sensor data in the online mode, it is possible to reduce the number of transmission periods. This study aims to demonstrate that temporal compression methods present an effective method for lengthening the lifetime of a battery-powered wireless sensor node.

Design/methodology/approach

In this study, the energy consumption of LoRa-based sensor node was evaluated and measured. The experiments were conducted with different LoRaWAN data rate parameters, with and without compression algorithms implemented to compress sensor data in the online mode. The effect of temporal compression algorithms on the overall energy consumption was measured.

Findings

Energy consumption was measured with different LoRaWAN spreading factors. The LoRaWAN transmission energy consumption significantly depends on the spreading factor used. The other significant factors affecting the LoRa-based sensor node energy consumption are the measurement interval and sleep mode current consumption. The results show that temporal compression algorithms are an effective method for reducing the energy consumption of a LoRa sensor node by reducing the number of LoRa transmission periods.

Originality/value

This paper presents with a practical case that it is possible to reduce the overall energy consumption of a wireless sensor node by compressing sensor data in online mode with simple temporal compression algorithms.

Details

Sensor Review, vol. 42 no. 5
Type: Research Article
ISSN: 0260-2288

Keywords

Open Access
Article
Publication date: 2 July 2024

James Meese, Kieran Hegarty, Rowan Wilken, Fan Yang and Catherine Middleton

As part of the 5G rollout, small cell base stations will be deployed across cities. This paper aims to identify an international effort to remove regulatory barriers around…

Abstract

Purpose

As part of the 5G rollout, small cell base stations will be deployed across cities. This paper aims to identify an international effort to remove regulatory barriers around deployment and outline emerging strategies Australian local governments are developing to ensure urban amenity in a deregulatory context.

Design/methodology/approach

This paper analyses existing legislation, policy frameworks and grey literature and has conducted eight interviews with participants from the local government sector.

Findings

This paper identifies a global deregulatory trend around small cell deployment and that councils are trying to renegotiate their relationship with telecommunications carriers as 5G is rolled out. Three strategies are identified: the design and installation of smart poles, network sharing and partnerships.

Originality/value

This research contributes to scholarship focused on the 5G rollout and offers one of the first accounts of the emerging tensions between regulatory frameworks, commercial imperatives and municipal authorities, identifying urban amenity as a key area of concern.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

Open Access
Article
Publication date: 28 October 2021

Eloise Atkinson, John Spillane, Jim Bradley and Tara Brooks

The purpose of this paper is to investigate the challenges faced with mobile information communication technology (M-ICT), more specifically tablet software, in the construction…

2213

Abstract

Purpose

The purpose of this paper is to investigate the challenges faced with mobile information communication technology (M-ICT), more specifically tablet software, in the construction phase of UK infrastructure projects. Quality assurance in the context of passive fire protection is scrutinised, where M-ICT use is prevalent, to provide an industry perspective.

Design/methodology/approach

The research design is founded on exploratory multiple case study approach. Specific themes are developed, based on a critical review of previous ICT studies. The themes identified are used to inform a qualitative interview protocol for investigating three large UK infrastructure projects. Each project is at different stages in the construction phase, with varying examples of M-ICT implementation in use. Participants are interviewed regarding their experiences of the implementation of M-ICT on each project.

Findings

Findings identify diverse experiences across each project. Single and multiple M-ICT platforms are currently being used, with individual stakeholders using ICT in isolation, and in some instances, multiple project stakeholders are using it together. Complete replacement of paper-based processes is evident in one case study, but more commonly, digital technology is being used in parallel to traditional paper-based processes. The challenges, although varied across each case study, can be categorised under the themes of Technology (IT support, ICT infrastructure, IT security, contractual, software), People (social aspects, user competency, safety), Technical Compliance (technical compliance evidence) and Process (conventional processes).

Originality/value

It is recommended that each theme be reviewed at project commencement, with all key stakeholders, to ensure key aspects are considered prior to M-ICT deployment. This will ensure avoidance of challenges reported and maximise the opportunities that are available through M-ICT in a multi-stakeholder infrastructure project.

Details

International Journal of Building Pathology and Adaptation, vol. 40 no. 3
Type: Research Article
ISSN: 2398-4708

Keywords

1 – 10 of 78