The main objective is to achieve networking integration with a wide range of interconnected information space and depth of the physical world, and wireless sensor networks as a peripheral network of things, it is poss...
详细信息
ISBN:
(纸本)9781510821934
The main objective is to achieve networking integration with a wide range of interconnected information space and depth of the physical world, and wireless sensor networks as a peripheral network of things, it is possible on a larger spatial and temporal scale networking provides active physical perception of things It means the world. Wireless sensor network nodes with limited energy characteristics, and data transmission is the main source of energy consumption in wireless sensor nodes, on the other hand, the presence of Things pressing needs in terms of real time, and data transmission scheduling strategy is the impact of network transmission One of the main factors in the delay, therefore, has important practical significance to study wireless sensor network transmission and storage technologies. In this paper, based on Hadoop HBase is a distributed database that provides real-time read and write, random access, high scalability and high availability storage services. Use HBase to build two storage architectures, metadata are stored within the area sensor data and sensor data.
distributed database is not a new term in the current world. A distributed database is a set of several databases that are correlated to each other in a logical fashion over the network. Data is distributed as well as...
详细信息
ISBN:
(纸本)9781467394178
distributed database is not a new term in the current world. A distributed database is a set of several databases that are correlated to each other in a logical fashion over the network. Data is distributed as well as replicated at various locations in order to increase the availability. During recent years, data distribution has been evaluated as an important issue for databases. Since the data is distributed, it becomes necessary that all the copies be synchronized at the time of any data update, thus leaving all the copies with consistent data. This research paper will present a consistent concurrency algorithm which presents a solution to consistency problem of distributed databases.
Recent advances in wireless sensors technology applied to e-health allow the development of "personal medicine" concept, whose main goal is to identify specific therapies that make safe and effective individ...
详细信息
ISBN:
(纸本)9783319487465;9783319487458
Recent advances in wireless sensors technology applied to e-health allow the development of "personal medicine" concept, whose main goal is to identify specific therapies that make safe and effective individualized treatment of patients based, for example, in health status remote monitoring. Also the existence of multiple sensor devices in Hospital Units like ICUs (Intensive Care Units) constitute a big source of data, increasing the volume of health information to be analyzed in order to detect or predict abnormal situations in patients. In order to process this huge volume of information it is necessary to use Big Data and IoT technologies. In this paper, we present a general approach for sensor's information processing and analysis based on Big Data concepts and to describe the use of common tools and techniques for storing, filtering and processing data coming from sensors in an ICU using a distributed architecture based on cloud computing. The proposed system has been developed around Big Data paradigms using bio-signals sensors information and machine learning algorithms for prediction of outcomes.
Background: The provision of health and wellness care is undergoing an enormous transformation. A key element of this revolution consists in prioritizing prevention and proactivity based on the analysis of people39;...
详细信息
Background: The provision of health and wellness care is undergoing an enormous transformation. A key element of this revolution consists in prioritizing prevention and proactivity based on the analysis of people's conducts and the empowerment of individuals in their self-management. Digital technologies are unquestionably destined to be the main engine of this change, with an increasing number of domain-specific applications and devices commercialized every year;however, there is an apparent lack of frameworks capable of orchestrating and intelligently leveraging, all the data, information and knowledge generated through these systems. Methods: This work presents Mining Minds, a novel framework that builds on the core ideas of the digital health and wellness paradigms to enable the provision of personalized support. Mining Minds embraces some of the most prominent digital technologies, ranging from Big Data and Cloud computing to Wearables and internet of Things, as well as modern concepts and methods, such as context-awareness, knowledge bases or analytics, to holistically and continuously investigate on people's lifestyles and provide a variety of smart coaching and support services. Results: This paper comprehensively describes the efficient and rational combination and interoperation of these technologies and methods through Mining Minds, while meeting the essential requirements posed by a framework for personalized health and wellness support. Moreover, this work presents a realization of the key architectural components of Mining Minds, as well as various exemplary user applications and expert tools to illustrate some of the potential services supported by the proposed framework. Conclusions: Mining Minds constitutes an innovative holistic means to inspect human behavior and provide personalized health and wellness support. The principles behind this framework uncover new research ideas and may serve as a reference for similar initiatives.
The dangers of poor pilot performance as well as time and place conditions, low altitude and climate, damage critical aircraft control system. The use of Unmanned Aircraft Vehicle or (UAV) in sensitive and important O...
详细信息
Embodied interaction has the potential to provide users with uniquely engaging and meaningful experiences. m+m: Movement + Meaning middleware is an open source software framework that enables users to construct real-t...
详细信息
Recent advances in mobile device technology have triggered research on using their aggregate computational and/or storage resources to form edge-clouds. Whilst traditionally viewed as simple clients, smart-phones and ...
详细信息
ISBN:
(数字)9783319395777
ISBN:
(纸本)9783319395777;9783319395760
Recent advances in mobile device technology have triggered research on using their aggregate computational and/or storage resources to form edge-clouds. Whilst traditionally viewed as simple clients, smart-phones and tablets today have hardware resources that allow more sophisticated software to be installed, and can be used as thick clients or even thin servers. Simultaneously, new standards and protocols, such as Wi-Fi Direct and Wi-Fi TDLS (Tunneled Direct Link Setup), have been established that allow mobile devices to talk directly with each other, as opposed to over the internet or across Wi-Fi access points. This can, potentially, lead to ubiquitous, low-latency, device-to-device (D2D) communication. In this paper, we study whether D2D protocols can support mobile-edge clouds by benchmarking different protocols and configurations for a specific application. The results show that decentralized device-to-device techniques can be used to efficiently disseminate multimedia contents while diminishing contention in the wireless infrastructure, allowing for up to 65% traffic reduction at the access points.
A context-awareness (CA) for internet of things (IoT) has been recognized as a section of future net and omnipresent computing. It creates a real omnipresent or good atmosphere. It demands a posh distributed architect...
详细信息
Nowadays almost every website use a membership based portal in which each user have a series of permissions that allow him to conduct several actions, in order to check which user has which permissions they use a Sess...
详细信息
ISBN:
(数字)9783319480572
ISBN:
(纸本)9783319480572;9783319480565
Nowadays almost every website use a membership based portal in which each user have a series of permissions that allow him to conduct several actions, in order to check which user has which permissions they use a SessionID this ID allows the web portal to identify the user and grant him the permissions and the information that they need or paid for, this SessionID is sent by HTTP requests so if a third person is able to successfully sniff a package and extract the SessionID, this person will be able to access to the system using the permissions of that member. ARP Spoofing it's a well-known method for sniffing packets although there are effective and easy methods to protect it such as, Static ARP, IDS/IPS systems, port security and other mechanisms of protection. This paper aims to show a technique in sniffing data on a LAN environment without the use of ARP Spoofing in order to be undetectable, unpreventable and effective all focused on Session Hijacking.
internet of Things (IoT) paradigm is gaining immense importance in today39;s world of rapid connectivity. Mobile IoT scenario like Smart City is characterized by short and recurrent contact between IoT devices. The ...
详细信息
ISBN:
(纸本)9781467392075
internet of Things (IoT) paradigm is gaining immense importance in today's world of rapid connectivity. Mobile IoT scenario like Smart City is characterized by short and recurrent contact between IoT devices. The existence of contacts between the mobile and infrastructure devices is an enabler for nodes to discover their neighbors to relay data. A recent chapter in research aims at learning the mobility pattern of devices to improve efficiency of discovery. In this paper, various techniques that are available for neighbor discovery are discussed and it is shown that knowledge integration in the process of node discovery leads to efficient scheduling of resources.
暂无评论