Search results

1 – 10 of 51
Open Access
Article
Publication date: 28 June 2022

Olli Väänänen and Timo Hämäläinen

Minimizing the energy consumption in a wireless sensor node is important for lengthening the lifetime of a battery. Radio transmission is the most energy-consuming task in a…

1154

Abstract

Purpose

Minimizing the energy consumption in a wireless sensor node is important for lengthening the lifetime of a battery. Radio transmission is the most energy-consuming task in a wireless sensor node, and by compressing the sensor data in the online mode, it is possible to reduce the number of transmission periods. This study aims to demonstrate that temporal compression methods present an effective method for lengthening the lifetime of a battery-powered wireless sensor node.

Design/methodology/approach

In this study, the energy consumption of LoRa-based sensor node was evaluated and measured. The experiments were conducted with different LoRaWAN data rate parameters, with and without compression algorithms implemented to compress sensor data in the online mode. The effect of temporal compression algorithms on the overall energy consumption was measured.

Findings

Energy consumption was measured with different LoRaWAN spreading factors. The LoRaWAN transmission energy consumption significantly depends on the spreading factor used. The other significant factors affecting the LoRa-based sensor node energy consumption are the measurement interval and sleep mode current consumption. The results show that temporal compression algorithms are an effective method for reducing the energy consumption of a LoRa sensor node by reducing the number of LoRa transmission periods.

Originality/value

This paper presents with a practical case that it is possible to reduce the overall energy consumption of a wireless sensor node by compressing sensor data in online mode with simple temporal compression algorithms.

Details

Sensor Review, vol. 42 no. 5
Type: Research Article
ISSN: 0260-2288

Keywords

Open Access
Article
Publication date: 15 March 2018

Moufida Maimour

Multipath routing holds a great potential to provide sufficient bandwidth to a plethora of applications in wireless sensor networks. In this paper, we consider the problem of…

360

Abstract

Multipath routing holds a great potential to provide sufficient bandwidth to a plethora of applications in wireless sensor networks. In this paper, we consider the problem of interference that can significantly affect the expected performances. We focus on the performance evaluation of the iterative paths discovery approach as opposed to the traditional concurrent multipath routing. Five different variants of multipath protocols are simulated and evaluated using different performance metrics. We mainly show that the iterative approach allows better performances when used jointly with an interference-aware metric or when an interference-zone marking strategy is employed. This latter appears to exhibit the best performances in terms of success ratio, achieved throughput, control messages overhead as well as energy consumption.

Details

Applied Computing and Informatics, vol. 16 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 11 September 2020

J. Ahmad, H. Larijani, R. Emmanuel, M. Mannion and A. Javed

Buildings use approximately 40% of global energy and are responsible for almost a third of the worldwide greenhouse gas emissions. They also utilise about 60% of the world’s…

2897

Abstract

Buildings use approximately 40% of global energy and are responsible for almost a third of the worldwide greenhouse gas emissions. They also utilise about 60% of the world’s electricity. In the last decade, stringent building regulations have led to significant improvements in the quality of the thermal characteristics of many building envelopes. However, similar considerations have not been paid to the number and activities of occupants in a building, which play an increasingly important role in energy consumption, optimisation processes, and indoor air quality. More than 50% of the energy consumption could be saved in Demand Controlled Ventilation (DCV) if accurate information about the number of occupants is readily available (Mysen et al., 2005). But due to privacy concerns, designing a precise occupancy sensing/counting system is a highly challenging task. While several studies count the number of occupants in rooms/zones for the optimisation of energy consumption, insufficient information is available on the comparison, analysis and pros and cons of these occupancy estimation techniques. This paper provides a review of occupancy measurement techniques and also discusses research trends and challenges. Additionally, a novel privacy preserved occupancy monitoring solution is also proposed in this paper. Security analyses of the proposed scheme reveal that the new occupancy monitoring system is privacy preserved compared to other traditional schemes.

Details

Applied Computing and Informatics, vol. 17 no. 2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Book part
Publication date: 4 May 2018

Yusman, Aidi Finawan and Rusli

Purpose – The purpose of this research is to design and build a wild animal pest repellent device with combination of passive infrared (PIR) sensor and ultrasonic signal based on…

Abstract

Purpose – The purpose of this research is to design and build a wild animal pest repellent device with combination of passive infrared (PIR) sensor and ultrasonic signal based on microcontroller as system controller. The PIR sensor is used to detect the presence of wild animal objects and ultrasonic signals to interfere with the hearing.

Design/Methodology/Approach – The design of the system is built based on microcontroller as the system controller. The system as a whole includes hardware and software. The design of hardware consists of the system design on the transmitter side and the system design on the receiver side, while the software in the of system are algorithms using C language programming.

Findings – The resulting repellent device can detect animals approaching up to a distance of 5 m and may interfere with its hearing with a 40 kHz ultrasonic frequency up to a distance of 20 m. The system also uses remote monitoring devices using 433 MHz radio frequency up to a distance of 60 m.

Research Limitations/Implications – Each animal has different hearing frequencies, as well as some wild animals, but the hearing frequencies of wild animals are generally at ultrasonic frequencies. The frequency of animal hearing may vary from audio frequency to ultrasonic frequency, so ultrasonic wave emission testing with varying frequencies is required.

Practical Implications – This research combines systems on transmitters and receivers, with real-time monitoring of wild animal positions, and it can be possible to monitor the position of more detailed animals by installing more types of sensors as well as increasing the number of sensors.

Originality/Value – This paper may provide additional insight into the hearing frequencies of animals and may also serve as comparable papers for similar studies.

Open Access
Article
Publication date: 25 September 2018

Ruwini Edirisinghe

The future construction site will be pervasive, context aware and embedded with intelligence. The purpose of this paper is to explore and define the concept of the digital skin of…

24630

Abstract

Purpose

The future construction site will be pervasive, context aware and embedded with intelligence. The purpose of this paper is to explore and define the concept of the digital skin of the future smart construction site.

Design/methodology/approach

The paper provides a systematic and hierarchical classification of 114 articles from both industry and academia on the digital skin concept and evaluates them. The hierarchical classification is based on application areas relevant to construction, such as augmented reality, building information model-based visualisation, labour tracking, supply chain tracking, safety management, mobile equipment tracking and schedule and progress monitoring. Evaluations of the research papers were conducted based on three pillars: validation of technological feasibility, onsite application and user acceptance testing.

Findings

Technologies learned about in the literature review enabled the envisaging of the pervasive construction site of the future. The paper presents scenarios for the future context-aware construction site, including the construction worker, construction procurement management and future real-time safety management systems.

Originality/value

Based on the gaps identified by the review in the body of knowledge and on a broader analysis of technology diffusion, the paper highlights the research challenges to be overcome in the advent of digital skin. The paper recommends that researchers follow a coherent process for smart technology design, development and implementation in order to achieve this vision for the construction industry.

Details

Engineering, Construction and Architectural Management, vol. 26 no. 2
Type: Research Article
ISSN: 0969-9988

Keywords

Open Access
Article
Publication date: 4 July 2018

C.E. Oude Weernink, E. Felix, P.J.E.M. Verkuijlen, A.T.M. Dierick-van Daele, J.K. Kazak and J. van Hoof

In the domain of healthcare, both process efficiency and the quality of care can be improved through the use of dedicated pervasive technologies. Among these applications are…

4166

Abstract

Purpose

In the domain of healthcare, both process efficiency and the quality of care can be improved through the use of dedicated pervasive technologies. Among these applications are so-called real-time location systems (RTLS). Such systems are designed to determine and monitor the location of assets and people in real time through the use of wireless sensor networks. Numerous commercially available RTLS are used in hospital settings. The nursing home is a relatively unexplored context for the application of RTLS and offers opportunities and challenges for future applications. The paper aims to discuss these issues.

Design/methodology/approach

This paper sets out to provide an overview of general applications and technologies of RTLS. Thereafter, it describes the specific healthcare applications of RTLS, including asset tracking, patient tracking and personnel tracking. These overviews are followed by a forecast of the implementation of RTLS in nursing homes in terms of opportunities and challenges.

Findings

By comparing the nursing home to the hospital, the RTLS applications for the nursing home context that are most promising are asset tracking of expensive goods owned by the nursing home in order to facilitate workflow and maximise financial resources, and asset tracking of personal belongings that may get lost due to dementia.

Originality/value

This paper is the first to provide an overview of potential application of RTLS technologies for nursing homes. The paper described a number of potential problem areas that can be addressed by RTLS.

Details

Journal of Enabling Technologies, vol. 12 no. 2
Type: Research Article
ISSN: 2398-6263

Keywords

Open Access
Article
Publication date: 22 April 2022

Kamalakshi Dayal and Vandana Bassoo

The performance of Wireless Sensor Networks (WSNs) applications is bounded by the limited resources of battery-enabled Sensor Nodes (SNs), which include energy and computational…

Abstract

Purpose

The performance of Wireless Sensor Networks (WSNs) applications is bounded by the limited resources of battery-enabled Sensor Nodes (SNs), which include energy and computational power; the combination of which existing research seldom focuses on. Although bio-inspired algorithms provide a way to control energy usage by finding optimal routing paths, those which converge slower require even more computational power, which altogether degrades the overall lifetime of SNs.

Design/methodology/approach

Hence, two novel routing protocols are proposed using the Red-Deer Algorithm (RDA) in a WSN scenario, namely Horizontal PEG-RDA Equal Clustering and Horizontal PEG-RDA Unequal Clustering, to address the limited computational power of SNs. Clustering, data aggregation and multi-hop transmission are also integrated to improve energy usage. Unequal clustering is applied in the second protocol to mitigate the hotspot problem in Horizontal PEG-RDA Equal Clustering.

Findings

Comparisons with the well-founded Ant Colony Optimisation (ACO) algorithm reveal that RDA converges faster by 85 and 80% on average when the network size and node density are varied, respectively. Furthermore, 33% fewer packets are lost using the unequal clustering approach which also makes the network resilient to node failures. Improvements in terms of residual energy and overall network lifetime are also observed.

Originality/value

Proposal of a bio-inspired algorithm, namely the RDA to find optimal routing paths in WSN and to enhance convergence rate and execution time against the well-established ACO algorithm. Creation of a novel chain cluster-based routing protocol using RDA, named Horizontal PEG-RDA Equal Clustering. Design of an unequal clustering equivalent of the proposed Horizontal PEG-RDA Equal Clustering protocol to tackle the hotspot problem, which enhances residual energy and overall network lifetime, as well as minimises packet loss.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 30 July 2024

Lin Li, Jiushan Wang and Shilu Xiao

The aim of this work is to research and design an expert diagnosis system for rail vehicle driven by data mechanism models.

Abstract

Purpose

The aim of this work is to research and design an expert diagnosis system for rail vehicle driven by data mechanism models.

Design/methodology/approach

The expert diagnosis system utilizes statistical and deep learning methods to model the real-time status and historical data features of rail vehicle. Based on data mechanism models, it predicts the lifespan of key components, evaluates the health status of the vehicle and achieves intelligent monitoring and diagnosis of rail vehicle.

Findings

The actual operation effect of this system shows that it has improved the intelligent level of the rail vehicle monitoring system, which helps operators to monitor the operation of vehicle online, predict potential risks and faults of vehicle and ensure the smooth and safe operation of vehicle.

Originality/value

This system improves the efficiency of rail vehicle operation, scheduling and maintenance through intelligent monitoring and diagnosis of rail vehicle.

Open Access
Article
Publication date: 14 May 2024

Moreno Frau and Tamara Keszey

Since previous literature provides fragmented and conflicting results about the use of digital data for product innovation, the article aims to comprehensively explore and shed…

Abstract

Purpose

Since previous literature provides fragmented and conflicting results about the use of digital data for product innovation, the article aims to comprehensively explore and shed light on how agri-food firms utilise external and internal digital data sources when dealing with different product innovations, such as incremental, architecture and radical innovation.

Design/methodology/approach

This paper adopts an exploratory multiple-case study and a theory-building process, focussing on the agri-food industry. We collected primary and secondary data from eight manufacturing companies.

Findings

The findings of this research show an empirical framework of six agri-food firms’ digital data utilisation behaviours: the supervisor, the passive supervisor, the developer, the passive developer, the pathfinder and the conjunction behaviour. These digital data utilisation behaviours vary according to a combination of data sources, such as internal data related to inside phenomenon measures (e.g. data generated by sensors installed in the production plan) or external data (e.g., market trends, overall sector sales), and innovation purposes.

Practical implications

This article offers guiding principles that assist agri-food companies when utilising internal and external digital data sources for specific product innovation outcomes such as incremental, architectural and radical innovation.

Originality/value

The significance of external and internal data sources in stimulating product innovation has garnered substantial attention within academic discussions, highlighting the critical importance of analysing digital data for driving such innovation. Nonetheless, the predominant approach is to study a single innovation outcome through the lens of digital technology. In contrast, our study stands out by adopting a fundamental perspective on data sources, enabling a more nuanced explanation of the overall product innovation outcomes within the agri-food sector.

Details

British Food Journal, vol. 126 no. 13
Type: Research Article
ISSN: 0007-070X

Keywords

Open Access
Article
Publication date: 22 July 2020

Nsikak P. Owoh and M. Mahinderjit Singh

The proliferation of mobile phones with integrated sensors makes large scale sensing possible at low cost. During mobile sensing, data mostly contain sensitive information of…

2246

Abstract

The proliferation of mobile phones with integrated sensors makes large scale sensing possible at low cost. During mobile sensing, data mostly contain sensitive information of users such as their real-time location. When such information are not effectively secured, users’ privacy can be violated due to eavesdropping and information disclosure. In this paper, we demonstrated the possibility of unauthorized access to location information of a user during sensing due to the ineffective security mechanisms in most sensing applications. We analyzed 40 apps downloaded from Google Play Store and results showed a 100% success rate in traffic interception and disclosure of sensitive information of users. As a countermeasure, a security scheme which ensures encryption and authentication of sensed data using Advanced Encryption Standard 256-Galois Counter Mode was proposed. End-to-end security of location and motion data from smartphone sensors are ensured using the proposed security scheme. Security analysis of the proposed scheme showed it to be effective in protecting Android based sensor data against eavesdropping, information disclosure and data modification.

Details

Applied Computing and Informatics, vol. 18 no. 1/2
Type: Research Article
ISSN: 2210-8327

Keywords

1 – 10 of 51