Search results
1 – 10 of 78Lin Li, Jiushan Wang and Shilu Xiao
The aim of this work is to research and design an expert diagnosis system for rail vehicle driven by data mechanism models.
Abstract
Purpose
The aim of this work is to research and design an expert diagnosis system for rail vehicle driven by data mechanism models.
Design/methodology/approach
The expert diagnosis system utilizes statistical and deep learning methods to model the real-time status and historical data features of rail vehicle. Based on data mechanism models, it predicts the lifespan of key components, evaluates the health status of the vehicle and achieves intelligent monitoring and diagnosis of rail vehicle.
Findings
The actual operation effect of this system shows that it has improved the intelligent level of the rail vehicle monitoring system, which helps operators to monitor the operation of vehicle online, predict potential risks and faults of vehicle and ensure the smooth and safe operation of vehicle.
Originality/value
This system improves the efficiency of rail vehicle operation, scheduling and maintenance through intelligent monitoring and diagnosis of rail vehicle.
Details
Keywords
Multipath routing holds a great potential to provide sufficient bandwidth to a plethora of applications in wireless sensor networks. In this paper, we consider the problem of…
Abstract
Multipath routing holds a great potential to provide sufficient bandwidth to a plethora of applications in wireless sensor networks. In this paper, we consider the problem of interference that can significantly affect the expected performances. We focus on the performance evaluation of the iterative paths discovery approach as opposed to the traditional concurrent multipath routing. Five different variants of multipath protocols are simulated and evaluated using different performance metrics. We mainly show that the iterative approach allows better performances when used jointly with an interference-aware metric or when an interference-zone marking strategy is employed. This latter appears to exhibit the best performances in terms of success ratio, achieved throughput, control messages overhead as well as energy consumption.
Details
Keywords
Strategies for teaching engineering in the United Arab Emirates (UAE) have been evolving over the past decades due to innovations in technology, as well as the development of…
Abstract
Strategies for teaching engineering in the United Arab Emirates (UAE) have been evolving over the past decades due to innovations in technology, as well as the development of educational methodologies. In the recent past, the focus for engineering faculty has been not only on promoting the skills needed to raise the level of employability of Emirati graduates, but increasingly on new educational methodologies, e-learning and wireless networked laptop technology. Students in the UAE exhibit certain characteristics emerging from a variety of cultural and historical traditions, as well as from methodologies of education used at the pre-tertiary levels. These characteristics include expecting to be passive recipients of taught information, and lack of independence in their approach to problem solving. In this paper I discuss the development of strategies to facilitate the transition of students from passive to active learning; examine the role of technology-driven educational methodologies in promoting independent and group-centered learning skills; and use a case study to explore the instruction of Engineering Design and Computer-Aided Design (CAD) and to examine how classroom management techniques have changed as a result of the growing use of technology.
The purpose of this paper is to investigate the legal issues of simultaneous Internet transmission of broadcasting programs of the Open University of Japan (OUJ) and to take legal…
Abstract
Purpose
The purpose of this paper is to investigate the legal issues of simultaneous Internet transmission of broadcasting programs of the Open University of Japan (OUJ) and to take legal measures to promote the mutual utilization of open university courses in Japan, the UK, China and Korea.
Design/methodology/approach
The author examines the legal relationship regarding Internet simultaneous distribution of broadcast courses at the OUJ. The author then considers the legal relationship between the UK, China and South Korea regarding the simultaneous transmission of broadcast courses over the internet. Based on that consideration, this paper clarifies legal measures to promote its utilization.
Findings
Internet transmission of broadcasting courses will be webcasting. Arguably, it can be assumed to be streaming and on-demand, albeit controversial. Webcasting will be publicly transmitted, but there is only an on-demand provision for Internet transmission. As webcasting is streaming and on-demand, it involves reproduction of broadcasting courses. Therefore, webcasting needs to provide streaming provision for public transmission rights and associate them with reproduction right.
Originality/value
The originality of this paper lies in clarifying the legal response of the object, subject and rights of webcasting from the perspective of the OUJ, in order to dispel legal problems that may arise in the future against this unexplored phenomenon. Additionally, this paper is valuable in that it presents legal consistency from the point of view of the comparative laws of Japan, the UK, China and South Korea, based on an examination of the legal response in Japan.
Details
Keywords
C.E. Oude Weernink, E. Felix, P.J.E.M. Verkuijlen, A.T.M. Dierick-van Daele, J.K. Kazak and J. van Hoof
In the domain of healthcare, both process efficiency and the quality of care can be improved through the use of dedicated pervasive technologies. Among these applications are…
Abstract
Purpose
In the domain of healthcare, both process efficiency and the quality of care can be improved through the use of dedicated pervasive technologies. Among these applications are so-called real-time location systems (RTLS). Such systems are designed to determine and monitor the location of assets and people in real time through the use of wireless sensor networks. Numerous commercially available RTLS are used in hospital settings. The nursing home is a relatively unexplored context for the application of RTLS and offers opportunities and challenges for future applications. The paper aims to discuss these issues.
Design/methodology/approach
This paper sets out to provide an overview of general applications and technologies of RTLS. Thereafter, it describes the specific healthcare applications of RTLS, including asset tracking, patient tracking and personnel tracking. These overviews are followed by a forecast of the implementation of RTLS in nursing homes in terms of opportunities and challenges.
Findings
By comparing the nursing home to the hospital, the RTLS applications for the nursing home context that are most promising are asset tracking of expensive goods owned by the nursing home in order to facilitate workflow and maximise financial resources, and asset tracking of personal belongings that may get lost due to dementia.
Originality/value
This paper is the first to provide an overview of potential application of RTLS technologies for nursing homes. The paper described a number of potential problem areas that can be addressed by RTLS.
Details
Keywords
J. Ahmad, H. Larijani, R. Emmanuel, M. Mannion and A. Javed
Buildings use approximately 40% of global energy and are responsible for almost a third of the worldwide greenhouse gas emissions. They also utilise about 60% of the world’s…
Abstract
Buildings use approximately 40% of global energy and are responsible for almost a third of the worldwide greenhouse gas emissions. They also utilise about 60% of the world’s electricity. In the last decade, stringent building regulations have led to significant improvements in the quality of the thermal characteristics of many building envelopes. However, similar considerations have not been paid to the number and activities of occupants in a building, which play an increasingly important role in energy consumption, optimisation processes, and indoor air quality. More than 50% of the energy consumption could be saved in Demand Controlled Ventilation (DCV) if accurate information about the number of occupants is readily available (Mysen et al., 2005). But due to privacy concerns, designing a precise occupancy sensing/counting system is a highly challenging task. While several studies count the number of occupants in rooms/zones for the optimisation of energy consumption, insufficient information is available on the comparison, analysis and pros and cons of these occupancy estimation techniques. This paper provides a review of occupancy measurement techniques and also discusses research trends and challenges. Additionally, a novel privacy preserved occupancy monitoring solution is also proposed in this paper. Security analyses of the proposed scheme reveal that the new occupancy monitoring system is privacy preserved compared to other traditional schemes.
Details
Keywords
Jose Ignacio Tamayo Segarra, Bilal Al Jammal and Hakima Chaouchi
Internet of Things’ (IoT’s) first wave started with tracking services for better inventory management mainly using radio frequency identification (RFID) technology. Later on…
Abstract
Purpose
Internet of Things’ (IoT’s) first wave started with tracking services for better inventory management mainly using radio frequency identification (RFID) technology. Later on, monitoring services became one of the major interests, including sensing technologies, and then more actuation for remote control-type of IoT applications such as smart homes, smart cities and Industry 4.0. In this paper, the authors focus on the RFID technology impairment. They propose to take advantage of the mature IoT technologies that offer native service discovery such as blutooth or LTE D2D ProSe or Wifi Direct. Using the automatic service discovery in the new framework will make heterogeneous readers aware of the presence of other readers and this will be used by the proposed distributed algorithm to better control the multiple RFID reader interference problem. The author clearly considers emerging Industry 4.0 use case, where RFID technology is of major interest for both identification and tracking. To enhance the RFID tag reading performance, collisions in the RFID frequency should be minimized with reader-to-reader coordination protocols. In this paper, the author proposes a simple distributed reader anti-collision protocol named DiSim that makes use of proximity services of IoT network and is compliant with the current RFID standards. The author evaluates the efficiency of the proposal via simulation.
Design/methodology/approach
In this paper, the author proposes a simple distributed reader anti-collision protocol named DiSim that makes use of proximity services of IoT network and is compliant with the current RFID standards. The author evaluates the efficiency of the proposal via simulation to study its behavior in very dense and heterogeneous RFID environments. Specifically, the author explores the coexistence of powerful static readers and small mobile readers, comparing the proposal with a standard ETSI CSMA method. The proposal reduces significantly the number of access attempts, which are resource-expensive for the readers. The results show that the objectives of DiSim are met, producing low reader collision probability and, however, having lower average readings per reader per time.
Findings
DiSim is evaluated with the ETSI standard LBT protocol for multi-reader environments in several environments with varied levels of reader and tag densities, having both static powerful RFID readers and heterogeneous randomly moving mobile RFID readers. It effectively reduces the number of backoffs or contentions for the RFID channel. This has high reading success rate due to the avoided collisions; however, the readers are put to wait, and DiSim has less average readings per reader per time. As an additional side evaluation, the ETSI standard LBT mechanism was found to present a good performance for low-density mid-coverage scenarios, however, with high variability on the evaluation results.
Research limitations/implications
To show more results, the author needs to do real experimentation in a warehouse, such as Amazon warehouse, where he expects to have more and more robots, start shelves, automatic item finding on the shelve, etc.
Practical implications
Future work considers experimentation in a real warehouse equipped with heterogeneous RFID readers and real-time analysis of RFID reading efficiency also combined with indoor localization and navigation for warehouse mobile robots.
Social implications
More automatization is expected in the future; this work makes the use of RFID technology more efficient and opens more possibilities for services deployment in different domains such as the industry which was considered not only in this paper but also in smart cites and smart homes.
Originality/value
Compared to the literature, the proposal offers the advantage to not be dependent on a centralized server controlling the RFID readers. It also offers the possibility for an existing RFID architecture to add new readers from a different manufacturer, as the readers using the approach will have the possibility to discover the capabilities of the new interaction other RFID readers. This solution takes advantage of the available proximity service that will be more and more offered by the IoT technologies.
Details
Keywords
Olli Väänänen and Timo Hämäläinen
Minimizing the energy consumption in a wireless sensor node is important for lengthening the lifetime of a battery. Radio transmission is the most energy-consuming task in a…
Abstract
Purpose
Minimizing the energy consumption in a wireless sensor node is important for lengthening the lifetime of a battery. Radio transmission is the most energy-consuming task in a wireless sensor node, and by compressing the sensor data in the online mode, it is possible to reduce the number of transmission periods. This study aims to demonstrate that temporal compression methods present an effective method for lengthening the lifetime of a battery-powered wireless sensor node.
Design/methodology/approach
In this study, the energy consumption of LoRa-based sensor node was evaluated and measured. The experiments were conducted with different LoRaWAN data rate parameters, with and without compression algorithms implemented to compress sensor data in the online mode. The effect of temporal compression algorithms on the overall energy consumption was measured.
Findings
Energy consumption was measured with different LoRaWAN spreading factors. The LoRaWAN transmission energy consumption significantly depends on the spreading factor used. The other significant factors affecting the LoRa-based sensor node energy consumption are the measurement interval and sleep mode current consumption. The results show that temporal compression algorithms are an effective method for reducing the energy consumption of a LoRa sensor node by reducing the number of LoRa transmission periods.
Originality/value
This paper presents with a practical case that it is possible to reduce the overall energy consumption of a wireless sensor node by compressing sensor data in online mode with simple temporal compression algorithms.
Details
Keywords
James Meese, Kieran Hegarty, Rowan Wilken, Fan Yang and Catherine Middleton
As part of the 5G rollout, small cell base stations will be deployed across cities. This paper aims to identify an international effort to remove regulatory barriers around…
Abstract
Purpose
As part of the 5G rollout, small cell base stations will be deployed across cities. This paper aims to identify an international effort to remove regulatory barriers around deployment and outline emerging strategies Australian local governments are developing to ensure urban amenity in a deregulatory context.
Design/methodology/approach
This paper analyses existing legislation, policy frameworks and grey literature and has conducted eight interviews with participants from the local government sector.
Findings
This paper identifies a global deregulatory trend around small cell deployment and that councils are trying to renegotiate their relationship with telecommunications carriers as 5G is rolled out. Three strategies are identified: the design and installation of smart poles, network sharing and partnerships.
Originality/value
This research contributes to scholarship focused on the 5G rollout and offers one of the first accounts of the emerging tensions between regulatory frameworks, commercial imperatives and municipal authorities, identifying urban amenity as a key area of concern.
Details
Keywords
Eloise Atkinson, John Spillane, Jim Bradley and Tara Brooks
The purpose of this paper is to investigate the challenges faced with mobile information communication technology (M-ICT), more specifically tablet software, in the construction…
Abstract
Purpose
The purpose of this paper is to investigate the challenges faced with mobile information communication technology (M-ICT), more specifically tablet software, in the construction phase of UK infrastructure projects. Quality assurance in the context of passive fire protection is scrutinised, where M-ICT use is prevalent, to provide an industry perspective.
Design/methodology/approach
The research design is founded on exploratory multiple case study approach. Specific themes are developed, based on a critical review of previous ICT studies. The themes identified are used to inform a qualitative interview protocol for investigating three large UK infrastructure projects. Each project is at different stages in the construction phase, with varying examples of M-ICT implementation in use. Participants are interviewed regarding their experiences of the implementation of M-ICT on each project.
Findings
Findings identify diverse experiences across each project. Single and multiple M-ICT platforms are currently being used, with individual stakeholders using ICT in isolation, and in some instances, multiple project stakeholders are using it together. Complete replacement of paper-based processes is evident in one case study, but more commonly, digital technology is being used in parallel to traditional paper-based processes. The challenges, although varied across each case study, can be categorised under the themes of Technology (IT support, ICT infrastructure, IT security, contractual, software), People (social aspects, user competency, safety), Technical Compliance (technical compliance evidence) and Process (conventional processes).
Originality/value
It is recommended that each theme be reviewed at project commencement, with all key stakeholders, to ensure key aspects are considered prior to M-ICT deployment. This will ensure avoidance of challenges reported and maximise the opportunities that are available through M-ICT in a multi-stakeholder infrastructure project.
Details