This report studies various technologies which can be used for people tracking and crowd management. During any pilgrimage session, the events like losing a group member, medical emergencies, and stampede are very common. In case of disasters like flood, fire, earthquake pilgrims are often left stranded as they have a little knowledge about that area. To address these concerns, the authorities need information about the location and direction of movement of the pilgrims. Sometime, it may be necessary to identify a person in cases like a lost child, unconscious or dead person. Researchers have proposed a number of solutions using the wireless technology which includes RFID tags, NFC, GPS, Bluetooth and Wi-Fi. An introduction about the technologies and how they can be used to design systems for people identification and tracking is presented. The various systems using a set of technologies have been studied in terms of their effectiveness and the cost.
IEEE PRESENTATION ON WIRELESS PILGRIM TRACKINGSOUMYA PANDA
This document summarizes a presentation about a wireless sensor network system developed for pilgrim tracking in Hajj. The system uses mobile and fixed sensor units to monitor the location of pilgrims in real-time. It was tested on a small group of pilgrims in Hajj with 5m accuracy. The system aims to address issues like identification, medical emergencies, and congestion management for pilgrims. Future work will focus on improving efficiency and scalability of the mobile units to expand tracking to all pilgrims in Hajj.
Part 2: Technical Specification HAJJ Pilgrims Tracking SystemSazzad Hossain
A study analyzed wireless tracking systems for pilgrims using various technologies like RFID, NFC, Bluetooth, Wi-Fi and GPS. RFID tags were considered but had short read ranges and interference issues. Smartphone GPS provides long-range real-time tracking but requires an app and internet. Bluetooth and Wi-Fi methods don't need internet but drain batteries. The study concluded no single method was optimal and scalability was an issue for large pilgrim numbers.
A review monitoring and safety of pilgrims using stampede detection and pilgr...eSAT Journals
Abstract At present, there are so many problems regarding the crowd control, medical emergencies, security issues, identification and tracking of the pilgrims in the holy areas. Especially during pilgrimage, the pilgrimage authority finds it difficult to manage the situation. Thus, in order to identify, track and monitor pilgrims a system is needed. In this system camera is used to monitor continuously and to find high density with the help of image processing. The communication with base station is done through GSM. As soon as pre-stamped starts, people around pre-stamped, camera detect the picture and compare the density and message is send to the police if very high density is found. This embedded system is divided into two parts stamped detection and pilgrim monitoring unit. In Stamped detection unit continuous monitoring of the stamped scenario using Image processing via MATLAB software is implemented. The MATLAB software continuously takes snapshot at every 10 seconds and will analyse the scenario for stamped threshold. If the people gathered in a particular area are more than the threshold then stamped warning is sent to ARM microcontroller via RS232 and simultaneously we send an indication to the Pilgrim unit via GSM. In Pilgrim monitoring unit continuous monitoring of the status of pilgrim using the health parameters of pilgrim and sending the GPS Co-ordinates along with the health parameters is initiated. Keywords: Matlab; ARM; GSM; GPS
A Study of Wireless Technology Based Pilgrim Tracking Systemsdeepakiitr15
This report studies various technologies which can be used for people tracking and crowd management. During any pilgrimage session, the events like losing a group member, medical emergencies, and stampede are very common. In case of disasters like flood, fire, earthquake pilgrims are often left stranded as they have a little knowledge about that area. To address these concerns, the authorities need information about the location and direction of movement of the pilgrims. Sometime, it may be necessary to identify a person in cases like a lost child, unconscious or dead person. Researchers have proposed a number of solutions using the wireless technology which includes RFID tags, NFC, GPS, Bluetooth and Wi-Fi. An introduction about the technologies and how they can be used to design systems for people identification and tracking is presented. The various systems using a set of technologies have been studied in terms of their effectiveness and the cost.
Smart sensors represent the next generation of tools for monitoring the environment. They contain embedded processing capabilities that allow them to perform complex sensing, data interpretation from multiple sensors, and intelligent interaction with their surroundings. Large networks of interconnected smart sensors have potential applications in areas like environmental monitoring, transportation systems, health care, surveillance, and landmine detection. However, challenges remain in optimizing resources, addressing limitations in sensors, and managing network congestion in dense deployments.
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKSEditor IJMTER
The document summarizes a novel approach to detect target movement in wireless sensor networks. It proposes a prediction-based target tracking and sleep scheduling protocol (PPSS) to improve energy efficiency. The protocol reduces actively awakened nodes and controls their active time. It uses a related neighborhood graph to divide the area into non-overlapping faces for target tracking. An edge detection algorithm identifies polygon locations and wakes nodes before a target crosses to continuously monitor mobile targets. The approach achieves high tracking accuracy while reducing energy costs in wireless sensor networks.
A Survey on Localization of Wireless SensorsKarthik Mohan
The document summarizes localization techniques for wireless sensor nodes. It discusses several common localization methods including known location-based using GPS, proximity-based using signal strength, angle-based using angle of arrival, and range-based using time of arrival or time difference of arrival. It also covers some challenges with each approach like accuracy limitations and environmental factors. Finally, it provides a brief comparison of the localization techniques and their typical accuracy ranges from 1-15 meters depending on the method.
Wireless sensor networks localization algorithms a comprehensive surveyIJCNCJournal
Wireless sensor networks (WSNs) have recently gained a lot of attention by scientific community. Small
and inexpensive devices with low energy consumption and limited computing resources are increasingly
being adopted in different application scenarios including environmental monitoring, target tracking and
biomedical health monitoring. In many such applications, node localization is inherently one of the system
parameters. Localization process is necessary to report the origin of events, routing and to answer
questions on the network coverage ,assist group querying of sensors. In general, localization schemes are
classified into two broad categories: range-based and range-free. However, it is difficult to classify hybrid
solutions as range-based or range-free. In this paper we make this classification easy, where range-based
schemes and range-free schemes are divided into two types: fully schemes and hybrid schemes. Moreover,
we compare the most relevant localization algorithms and discuss the future research directions for
wireless sensor networks localization schemes.
IEEE PRESENTATION ON WIRELESS PILGRIM TRACKINGSOUMYA PANDA
This document summarizes a presentation about a wireless sensor network system developed for pilgrim tracking in Hajj. The system uses mobile and fixed sensor units to monitor the location of pilgrims in real-time. It was tested on a small group of pilgrims in Hajj with 5m accuracy. The system aims to address issues like identification, medical emergencies, and congestion management for pilgrims. Future work will focus on improving efficiency and scalability of the mobile units to expand tracking to all pilgrims in Hajj.
Part 2: Technical Specification HAJJ Pilgrims Tracking SystemSazzad Hossain
A study analyzed wireless tracking systems for pilgrims using various technologies like RFID, NFC, Bluetooth, Wi-Fi and GPS. RFID tags were considered but had short read ranges and interference issues. Smartphone GPS provides long-range real-time tracking but requires an app and internet. Bluetooth and Wi-Fi methods don't need internet but drain batteries. The study concluded no single method was optimal and scalability was an issue for large pilgrim numbers.
A review monitoring and safety of pilgrims using stampede detection and pilgr...eSAT Journals
Abstract At present, there are so many problems regarding the crowd control, medical emergencies, security issues, identification and tracking of the pilgrims in the holy areas. Especially during pilgrimage, the pilgrimage authority finds it difficult to manage the situation. Thus, in order to identify, track and monitor pilgrims a system is needed. In this system camera is used to monitor continuously and to find high density with the help of image processing. The communication with base station is done through GSM. As soon as pre-stamped starts, people around pre-stamped, camera detect the picture and compare the density and message is send to the police if very high density is found. This embedded system is divided into two parts stamped detection and pilgrim monitoring unit. In Stamped detection unit continuous monitoring of the stamped scenario using Image processing via MATLAB software is implemented. The MATLAB software continuously takes snapshot at every 10 seconds and will analyse the scenario for stamped threshold. If the people gathered in a particular area are more than the threshold then stamped warning is sent to ARM microcontroller via RS232 and simultaneously we send an indication to the Pilgrim unit via GSM. In Pilgrim monitoring unit continuous monitoring of the status of pilgrim using the health parameters of pilgrim and sending the GPS Co-ordinates along with the health parameters is initiated. Keywords: Matlab; ARM; GSM; GPS
A Study of Wireless Technology Based Pilgrim Tracking Systemsdeepakiitr15
This report studies various technologies which can be used for people tracking and crowd management. During any pilgrimage session, the events like losing a group member, medical emergencies, and stampede are very common. In case of disasters like flood, fire, earthquake pilgrims are often left stranded as they have a little knowledge about that area. To address these concerns, the authorities need information about the location and direction of movement of the pilgrims. Sometime, it may be necessary to identify a person in cases like a lost child, unconscious or dead person. Researchers have proposed a number of solutions using the wireless technology which includes RFID tags, NFC, GPS, Bluetooth and Wi-Fi. An introduction about the technologies and how they can be used to design systems for people identification and tracking is presented. The various systems using a set of technologies have been studied in terms of their effectiveness and the cost.
Smart sensors represent the next generation of tools for monitoring the environment. They contain embedded processing capabilities that allow them to perform complex sensing, data interpretation from multiple sensors, and intelligent interaction with their surroundings. Large networks of interconnected smart sensors have potential applications in areas like environmental monitoring, transportation systems, health care, surveillance, and landmine detection. However, challenges remain in optimizing resources, addressing limitations in sensors, and managing network congestion in dense deployments.
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKSEditor IJMTER
The document summarizes a novel approach to detect target movement in wireless sensor networks. It proposes a prediction-based target tracking and sleep scheduling protocol (PPSS) to improve energy efficiency. The protocol reduces actively awakened nodes and controls their active time. It uses a related neighborhood graph to divide the area into non-overlapping faces for target tracking. An edge detection algorithm identifies polygon locations and wakes nodes before a target crosses to continuously monitor mobile targets. The approach achieves high tracking accuracy while reducing energy costs in wireless sensor networks.
A Survey on Localization of Wireless SensorsKarthik Mohan
The document summarizes localization techniques for wireless sensor nodes. It discusses several common localization methods including known location-based using GPS, proximity-based using signal strength, angle-based using angle of arrival, and range-based using time of arrival or time difference of arrival. It also covers some challenges with each approach like accuracy limitations and environmental factors. Finally, it provides a brief comparison of the localization techniques and their typical accuracy ranges from 1-15 meters depending on the method.
Wireless sensor networks localization algorithms a comprehensive surveyIJCNCJournal
Wireless sensor networks (WSNs) have recently gained a lot of attention by scientific community. Small
and inexpensive devices with low energy consumption and limited computing resources are increasingly
being adopted in different application scenarios including environmental monitoring, target tracking and
biomedical health monitoring. In many such applications, node localization is inherently one of the system
parameters. Localization process is necessary to report the origin of events, routing and to answer
questions on the network coverage ,assist group querying of sensors. In general, localization schemes are
classified into two broad categories: range-based and range-free. However, it is difficult to classify hybrid
solutions as range-based or range-free. In this paper we make this classification easy, where range-based
schemes and range-free schemes are divided into two types: fully schemes and hybrid schemes. Moreover,
we compare the most relevant localization algorithms and discuss the future research directions for
wireless sensor networks localization schemes.
Abstract: Wireless location finding is one of the key technologies for wireless sensor networks. GPS is the technology used but it can be used for the outdoor location. When we deal with the indoor locations GPS does not work. Indoor locations include buildings like supermarkets, big malls, parking, universities, and locations under the same roof. In these areas the accuracy of the GPS location is greatly reduced. Location showed on the map in not correct when the GPS is used under the indoor environments. But for the indoor localization it requires the higher accuracy sp GPS is not feasible for the current view. And also when the GPS is used in the mobile device it consumes a lot of the mobile battery to run the application which causes the drainage of the mobile battery within some hours. So to find out the accurate location for indoor environment we use the RSSI based trilateral localization algorithm. The algorithm has the low cost and the algorithm does not require any additional hardware support and moreover the algorithm is easy to understand. The algorithm consumes very less battery as compared to the battery consumption of the GPS. Because of these this algorithm has become the mainstream localization algorithm in the wireless sensor networks. With the development of the wireless sensor networks and the smart devices the WIFI access points are also increasing. The mobile smart devices detect three or more known WIFI hotspots positions. And using the values from the WIFI routers it calculates the current location of the mobile device. In this paper we have proposed a system so that we can find out the exact location of the mobile device under the indoor environment and can navigate to the destination using the navigation function and also can enable the low consumption of the smart mobile battery for the tracking purpose.
Goals:
1. Useful at the places where GPS cannot work
2. Reduces the battery consumption
3. Routers are used.
4. Provides the path as well as the information of the location as per the requirement of user.
This document provides an overview of wireless body area networks (WBANs), including a definition, description of components, architecture, technologies used, advantages, applications, challenges, and security considerations. A WBAN allows integration of low-power sensor nodes on or around the human body to monitor biological functions. It has a 3-tier architecture consisting of body sensors, a personal server, and a medical server. Technologies used include ZigBee, Bluetooth Low Energy, and IEEE 802.15.4. WBANs enable various healthcare and fitness applications but also face challenges related to interference, integration, and security of medical data.
IRJET - Enhancing Indoor Mobility for Visually Impaired: A System with Real-T...IRJET Journal
The document presents a system to enhance indoor mobility for visually impaired people using real-time obstacle detection with QR codes and audio feedback. The system uses an ultrasonic sensor to detect obstacles and QR codes placed in locations to provide context through audio feedback to the user via headphones or speakers. When an obstacle is detected or a QR code is scanned, the microcontroller processes the data and triggers the voice recorder module to provide navigation assistance through audio cues to the user. The goal is to allow visually impaired individuals to safely and independently maneuver indoor environments.
The document summarizes a research paper on forming virtual groups in wireless body area networks (WBANs) for healthcare monitoring. It describes the need for improved patient monitoring to enable timely emergency response. The proposed system uses WBANs to automatically send patient medical data wirelessly to a central server. This allows forming virtual groups between patient, nurse, and doctor devices to enable remote analysis of patient data. The system was modeled and evaluated using the NS-2 network simulator. Key findings from the simulation include the impact of packet size on throughput and delay. The system shows potential for improved emergency response by enabling real-time monitoring of high-risk patients.
This document describes a proposed system called the Hampered Serving Bot, which aims to help physically challenged people by allowing wheelchair control through either voice recognition or gesture control. The system uses an accelerometer sensor to detect hand gestures and control the wheelchair's movement accordingly. It also uses a mobile application connected to a Bluetooth module to recognize voice commands and send them to a microcontroller to control the wheelchair. The system is intended to help both people who cannot walk but can speak, as well as those who cannot walk or speak. It provides an innovative way to control a wheelchair through natural human gestures or voice without needing one's hands.
IRJET- Emergency Navigation System using Mobile ComputingIRJET Journal
This document describes a proposed emergency navigation system using mobile computing and wireless sensor networks. The system would detect emergency situations through sensors and provide navigation guidance to mobile users via their devices. When an emergency occurs, sensors would detect it and notify the network. The network would then determine the safest exit route while avoiding the hazardous area and provide turn-by-turn navigation instructions to users' mobile devices to guide them to safety. The proposed system aims to address issues with existing emergency navigation that do not consider congestion or provide alternative routes.
This document provides an overview of wireless body area networks (WBANs) for health monitoring applications. It discusses the history and components of WBANs, including wearable and implanted sensors, network architecture with intra-body, inter-body and beyond-body communication tiers, and common radio technologies like Bluetooth and Zigbee. It also examines MAC protocols, security requirements, applications, and concludes by discussing the benefits of continuous health monitoring using WBANs.
The document discusses wireless body area networks and wireless sensor networks. It describes the goals of the project which are to implement the Tate pairing and Weil pairing protocols, analyze their performance with respect to time and memory consumption, and implement the better performing one for security purposes. The document provides background on sensor network technology, including how sensors have evolved from large specialized systems to smaller low-power devices. It outlines some of the applications of wireless sensor networks.
This document summarizes and reviews several models for ubiquitous computing systems. It begins by defining ubiquitous computing and describing the need for context awareness, wireless networks, and mobility in ubiquitous environments. It then examines three specific models:
1) SenSay, a context-aware mobile phone that adapts its behavior based on the user's environment and state.
2) HOMEROS, a middleware architecture that allows flexibility for heterogeneous devices and users across three layers.
3) Mobile Gaia, a middleware for ad-hoc pervasive computing networks.
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN) IAEME Publication
A Body Area Network is a system of computing devices located in close proximityto the human body which coordinates and cooperates for the benefit of the user. Body
Area Networks have evolved out of sensor network technology and biomedicalengineering. In this paper we discuss various aspects of Body Area Networks,introduction section deals with various concepts associated with computer networks
and some supporting technologies of Wireless Body Area Networks (WBANs). Section
2 deals with the various definitions of Body Area Networks(BANs) followed by the
types of BAN in section 3 and system architecture in section 4. Section 5 gives the
draft guidelines by IEEE 802.15.6 for a communicationsstandard for BAN, the next
two sections list out the applications and current researctrends of BAN followed bythe conclusion.
The seminar covered data security, privacy, and applications in emerging body area networks (BANs). Key topics included typical BAN applications in healthcare, research challenges around frequency bands and hardware, and models proposed for secure data storage and access control. Four models were described in detail: one based on redundant residue number systems, one using erasure coding, one using constant data motion, and one using attribute-based encryption to implement fine-grained access control of encrypted health data in BANs.
This document discusses wireless body area networks (WBANs) and their applications. It first describes how WBANs can continuously monitor health and share information with remote care providers. There are two types of WBAN applications - medical and non-medical. Medical sensors include wearable sensors like pulse oximeters and electrocardiography sensors, as well as implantable sensors like glucose monitors and neural stimulators. The document also discusses WBAN challenges like power efficiency and security protocols. It concludes that WBANs have potential to improve healthcare by enabling early problem detection and improving quality of life.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Smart body sensors can integrate into clothing and track physiological attributes. They can monitor lifestyle activities, vital organs, and record data like a black box. A body sensor object comprises sensors, computing, and communication modules. It uses virtualization and APIs to access data over networks. A body sensor network object architecture connects sensors and transfers encrypted data to databases for remote storage and preventive actions. Markov chain models can represent sensor monitoring states. Experiments showed sensor networks can transfer data with minimal loss using cluster-based virtualization and computing. Future work may involve personalized sensors, self-destructing sensors, and mobile cloud management of body sensor networks.
Reliable Data Aggregation Protocol (RDAT) uses functional reputation to improve data reliability in wireless sensor networks. It assigns separate reputation values for sensing, routing, and aggregation actions. Nodes monitor neighbors and exchange reputation tables. Before transmitting data, nodes evaluate aggregators' aggregation reputation to detect compromised ones. Aggregators run the Reliable Data Aggregation algorithm to further ensure integrity by using routing and sensing reputation to identify false reports. Simulation results show RDAT significantly improves data reliability over attacked networks compared to existing trust systems.
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Shreyas Tote
The empowerment in wireless communication technologies and sensors have developed the Wireless Body Area Network (WBAN). The rapid growth in physiological sensors, low-power integrated circuits, and wireless communication has enabled a new invention of wireless sensor networks, now used for purposes such as monitoring traffic and health etc. Wireless body area network (BAN) is a promising technology for real-time monitoring of physiological signals to support medical applications. A security system to secure medical information communications using biometric features of the body in WBAN. In order to ensure the trustworthy and reliable gathering of patient’s critical health information, it is essential to provide node authentication servicing a BAN, which prevents an attacker from impersonation and false data/command injection. Biometrics refers to or metrics) related to human characteristics and traits. Biometrics identification (or biometric authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance. Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are unique to individuals, they are more reliable in verifying identity than other method like token. Many different aspects of human physiology, chemistry or behavior can be used for biometric authentication.
Wireless sensor networks use large numbers of small, low-cost sensors that communicate wirelessly to monitor conditions like temperature, sound, pollution levels, pressure, etc. Sensors collect data and pass it to a base station, which can be accessed through the internet. Wireless sensor networks can be used for applications like environmental monitoring, smart grids, healthcare, agriculture, and more. They face challenges related to power efficiency, security, scalability and operating in different environments.
3D Localization Algorithms for Wireless Sensor NetworksIOSR Journals
This document discusses localization algorithms for 3D wireless sensor networks. It begins by explaining that localization in 3D spaces poses unique challenges compared to 2D, as strategies used in 2D do not directly extend to 3D. It then reviews common range-based localization methods like received signal strength and time-based methods, as well as range-free methods like centroid and DV-HOP algorithms. The document aims to address the problem of localization for sensor networks deployed in 3D surfaces.
Wireless Body Area Networks for healthcare (Wban)no0orcom
This document discusses wireless body area networks (WBANs) for healthcare applications. It begins with an introduction that outlines the need for improved healthcare services and how WBANs address this need by allowing patients to be monitored without restricting mobility. Major challenges for WBANs are then discussed, including reliability, energy efficiency, security and privacy, and network coexistence. Solutions to these challenges are also proposed, such as more energy efficient communication protocols and network coding to improve reliability. The document concludes by discussing directions for future work to further address challenges like energy consumption and improve data access and delivery.
IRJET- Implementing a Method for Stampede Detection and Safety of Pilgrim...IRJET Journal
This document discusses a proposed system for stampede detection and pilgrim tracking during religious pilgrimages. The system would use cameras to continuously monitor crowds and detect high densities using image processing. When high densities are detected near a potential stampede area, a message would be sent to police via Global System for Mobile Communications (GSM). The system would also use software to analyze camera snapshots every 10 seconds and compare crowd conditions to a stampede threshold. This would help detect stampede conditions early to prevent injuries or deaths. A GPS/GSM system would also be used to precisely track pilgrim locations and allow high-speed communication in case of medical emergencies or lost pilgrims. The goal is to improve crowd control, security
This work aims to provide a practical guide to assist students of Computer Science
courses and related fields to conduct a systematic literature review. The steps proposed
in this paper to conduct a systematic review were extracted from a technical report
published by the researcher Bárbara Kitchenham [1] and arranged in a more objective
format, in order to make information more accessible and practical, especially for those
who are having their first contact with this technique.
Abstract: Wireless location finding is one of the key technologies for wireless sensor networks. GPS is the technology used but it can be used for the outdoor location. When we deal with the indoor locations GPS does not work. Indoor locations include buildings like supermarkets, big malls, parking, universities, and locations under the same roof. In these areas the accuracy of the GPS location is greatly reduced. Location showed on the map in not correct when the GPS is used under the indoor environments. But for the indoor localization it requires the higher accuracy sp GPS is not feasible for the current view. And also when the GPS is used in the mobile device it consumes a lot of the mobile battery to run the application which causes the drainage of the mobile battery within some hours. So to find out the accurate location for indoor environment we use the RSSI based trilateral localization algorithm. The algorithm has the low cost and the algorithm does not require any additional hardware support and moreover the algorithm is easy to understand. The algorithm consumes very less battery as compared to the battery consumption of the GPS. Because of these this algorithm has become the mainstream localization algorithm in the wireless sensor networks. With the development of the wireless sensor networks and the smart devices the WIFI access points are also increasing. The mobile smart devices detect three or more known WIFI hotspots positions. And using the values from the WIFI routers it calculates the current location of the mobile device. In this paper we have proposed a system so that we can find out the exact location of the mobile device under the indoor environment and can navigate to the destination using the navigation function and also can enable the low consumption of the smart mobile battery for the tracking purpose.
Goals:
1. Useful at the places where GPS cannot work
2. Reduces the battery consumption
3. Routers are used.
4. Provides the path as well as the information of the location as per the requirement of user.
This document provides an overview of wireless body area networks (WBANs), including a definition, description of components, architecture, technologies used, advantages, applications, challenges, and security considerations. A WBAN allows integration of low-power sensor nodes on or around the human body to monitor biological functions. It has a 3-tier architecture consisting of body sensors, a personal server, and a medical server. Technologies used include ZigBee, Bluetooth Low Energy, and IEEE 802.15.4. WBANs enable various healthcare and fitness applications but also face challenges related to interference, integration, and security of medical data.
IRJET - Enhancing Indoor Mobility for Visually Impaired: A System with Real-T...IRJET Journal
The document presents a system to enhance indoor mobility for visually impaired people using real-time obstacle detection with QR codes and audio feedback. The system uses an ultrasonic sensor to detect obstacles and QR codes placed in locations to provide context through audio feedback to the user via headphones or speakers. When an obstacle is detected or a QR code is scanned, the microcontroller processes the data and triggers the voice recorder module to provide navigation assistance through audio cues to the user. The goal is to allow visually impaired individuals to safely and independently maneuver indoor environments.
The document summarizes a research paper on forming virtual groups in wireless body area networks (WBANs) for healthcare monitoring. It describes the need for improved patient monitoring to enable timely emergency response. The proposed system uses WBANs to automatically send patient medical data wirelessly to a central server. This allows forming virtual groups between patient, nurse, and doctor devices to enable remote analysis of patient data. The system was modeled and evaluated using the NS-2 network simulator. Key findings from the simulation include the impact of packet size on throughput and delay. The system shows potential for improved emergency response by enabling real-time monitoring of high-risk patients.
This document describes a proposed system called the Hampered Serving Bot, which aims to help physically challenged people by allowing wheelchair control through either voice recognition or gesture control. The system uses an accelerometer sensor to detect hand gestures and control the wheelchair's movement accordingly. It also uses a mobile application connected to a Bluetooth module to recognize voice commands and send them to a microcontroller to control the wheelchair. The system is intended to help both people who cannot walk but can speak, as well as those who cannot walk or speak. It provides an innovative way to control a wheelchair through natural human gestures or voice without needing one's hands.
IRJET- Emergency Navigation System using Mobile ComputingIRJET Journal
This document describes a proposed emergency navigation system using mobile computing and wireless sensor networks. The system would detect emergency situations through sensors and provide navigation guidance to mobile users via their devices. When an emergency occurs, sensors would detect it and notify the network. The network would then determine the safest exit route while avoiding the hazardous area and provide turn-by-turn navigation instructions to users' mobile devices to guide them to safety. The proposed system aims to address issues with existing emergency navigation that do not consider congestion or provide alternative routes.
This document provides an overview of wireless body area networks (WBANs) for health monitoring applications. It discusses the history and components of WBANs, including wearable and implanted sensors, network architecture with intra-body, inter-body and beyond-body communication tiers, and common radio technologies like Bluetooth and Zigbee. It also examines MAC protocols, security requirements, applications, and concludes by discussing the benefits of continuous health monitoring using WBANs.
The document discusses wireless body area networks and wireless sensor networks. It describes the goals of the project which are to implement the Tate pairing and Weil pairing protocols, analyze their performance with respect to time and memory consumption, and implement the better performing one for security purposes. The document provides background on sensor network technology, including how sensors have evolved from large specialized systems to smaller low-power devices. It outlines some of the applications of wireless sensor networks.
This document summarizes and reviews several models for ubiquitous computing systems. It begins by defining ubiquitous computing and describing the need for context awareness, wireless networks, and mobility in ubiquitous environments. It then examines three specific models:
1) SenSay, a context-aware mobile phone that adapts its behavior based on the user's environment and state.
2) HOMEROS, a middleware architecture that allows flexibility for heterogeneous devices and users across three layers.
3) Mobile Gaia, a middleware for ad-hoc pervasive computing networks.
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN) IAEME Publication
A Body Area Network is a system of computing devices located in close proximityto the human body which coordinates and cooperates for the benefit of the user. Body
Area Networks have evolved out of sensor network technology and biomedicalengineering. In this paper we discuss various aspects of Body Area Networks,introduction section deals with various concepts associated with computer networks
and some supporting technologies of Wireless Body Area Networks (WBANs). Section
2 deals with the various definitions of Body Area Networks(BANs) followed by the
types of BAN in section 3 and system architecture in section 4. Section 5 gives the
draft guidelines by IEEE 802.15.6 for a communicationsstandard for BAN, the next
two sections list out the applications and current researctrends of BAN followed bythe conclusion.
The seminar covered data security, privacy, and applications in emerging body area networks (BANs). Key topics included typical BAN applications in healthcare, research challenges around frequency bands and hardware, and models proposed for secure data storage and access control. Four models were described in detail: one based on redundant residue number systems, one using erasure coding, one using constant data motion, and one using attribute-based encryption to implement fine-grained access control of encrypted health data in BANs.
This document discusses wireless body area networks (WBANs) and their applications. It first describes how WBANs can continuously monitor health and share information with remote care providers. There are two types of WBAN applications - medical and non-medical. Medical sensors include wearable sensors like pulse oximeters and electrocardiography sensors, as well as implantable sensors like glucose monitors and neural stimulators. The document also discusses WBAN challenges like power efficiency and security protocols. It concludes that WBANs have potential to improve healthcare by enabling early problem detection and improving quality of life.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Smart body sensors can integrate into clothing and track physiological attributes. They can monitor lifestyle activities, vital organs, and record data like a black box. A body sensor object comprises sensors, computing, and communication modules. It uses virtualization and APIs to access data over networks. A body sensor network object architecture connects sensors and transfers encrypted data to databases for remote storage and preventive actions. Markov chain models can represent sensor monitoring states. Experiments showed sensor networks can transfer data with minimal loss using cluster-based virtualization and computing. Future work may involve personalized sensors, self-destructing sensors, and mobile cloud management of body sensor networks.
Reliable Data Aggregation Protocol (RDAT) uses functional reputation to improve data reliability in wireless sensor networks. It assigns separate reputation values for sensing, routing, and aggregation actions. Nodes monitor neighbors and exchange reputation tables. Before transmitting data, nodes evaluate aggregators' aggregation reputation to detect compromised ones. Aggregators run the Reliable Data Aggregation algorithm to further ensure integrity by using routing and sensing reputation to identify false reports. Simulation results show RDAT significantly improves data reliability over attacked networks compared to existing trust systems.
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Shreyas Tote
The empowerment in wireless communication technologies and sensors have developed the Wireless Body Area Network (WBAN). The rapid growth in physiological sensors, low-power integrated circuits, and wireless communication has enabled a new invention of wireless sensor networks, now used for purposes such as monitoring traffic and health etc. Wireless body area network (BAN) is a promising technology for real-time monitoring of physiological signals to support medical applications. A security system to secure medical information communications using biometric features of the body in WBAN. In order to ensure the trustworthy and reliable gathering of patient’s critical health information, it is essential to provide node authentication servicing a BAN, which prevents an attacker from impersonation and false data/command injection. Biometrics refers to or metrics) related to human characteristics and traits. Biometrics identification (or biometric authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance. Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are unique to individuals, they are more reliable in verifying identity than other method like token. Many different aspects of human physiology, chemistry or behavior can be used for biometric authentication.
Wireless sensor networks use large numbers of small, low-cost sensors that communicate wirelessly to monitor conditions like temperature, sound, pollution levels, pressure, etc. Sensors collect data and pass it to a base station, which can be accessed through the internet. Wireless sensor networks can be used for applications like environmental monitoring, smart grids, healthcare, agriculture, and more. They face challenges related to power efficiency, security, scalability and operating in different environments.
3D Localization Algorithms for Wireless Sensor NetworksIOSR Journals
This document discusses localization algorithms for 3D wireless sensor networks. It begins by explaining that localization in 3D spaces poses unique challenges compared to 2D, as strategies used in 2D do not directly extend to 3D. It then reviews common range-based localization methods like received signal strength and time-based methods, as well as range-free methods like centroid and DV-HOP algorithms. The document aims to address the problem of localization for sensor networks deployed in 3D surfaces.
Wireless Body Area Networks for healthcare (Wban)no0orcom
This document discusses wireless body area networks (WBANs) for healthcare applications. It begins with an introduction that outlines the need for improved healthcare services and how WBANs address this need by allowing patients to be monitored without restricting mobility. Major challenges for WBANs are then discussed, including reliability, energy efficiency, security and privacy, and network coexistence. Solutions to these challenges are also proposed, such as more energy efficient communication protocols and network coding to improve reliability. The document concludes by discussing directions for future work to further address challenges like energy consumption and improve data access and delivery.
IRJET- Implementing a Method for Stampede Detection and Safety of Pilgrim...IRJET Journal
This document discusses a proposed system for stampede detection and pilgrim tracking during religious pilgrimages. The system would use cameras to continuously monitor crowds and detect high densities using image processing. When high densities are detected near a potential stampede area, a message would be sent to police via Global System for Mobile Communications (GSM). The system would also use software to analyze camera snapshots every 10 seconds and compare crowd conditions to a stampede threshold. This would help detect stampede conditions early to prevent injuries or deaths. A GPS/GSM system would also be used to precisely track pilgrim locations and allow high-speed communication in case of medical emergencies or lost pilgrims. The goal is to improve crowd control, security
This work aims to provide a practical guide to assist students of Computer Science
courses and related fields to conduct a systematic literature review. The steps proposed
in this paper to conduct a systematic review were extracted from a technical report
published by the researcher Bárbara Kitchenham [1] and arranged in a more objective
format, in order to make information more accessible and practical, especially for those
who are having their first contact with this technique.
This document summarizes a research paper that proposes a system to detect uncontrolled crowd motion behavior using computer vision techniques. The system analyzes surveillance videos from mass gatherings using a holistic approach, where the crowd is treated as a single entity rather than tracking individuals. Optical flow is computed using the Lucas-Kanade method to estimate velocities across subsections of video frames. Congested areas where crowd movement is slow or stopped can be identified based on low optical flow magnitudes. The system was developed using MATLAB and could help security personnel monitor crowds and prevent disasters by detecting dangerous crowd conditions. Future work may include using multiple camera views and improved tracking techniques.
Expelling Information of Events from Critical Public Space using Social Senso...ijtsrd
Open foundation frameworks give a significant number of the administrations that are basic to the wellbeing, working, and security of society. A considerable lot of these frameworks, in any case, need persistent physical sensor checking to have the option to recognize disappointment occasions or harm that has struck these frameworks. We propose the utilization of social sensor enormous information to recognize these occasions. We center around two primary framework frameworks, transportation and vitality, and use information from Twitter streams to identify harm to spans, expressways, gas lines, and power foundation. Through a three step filtering approach and assignment to geographical cells, we are able to filter out noise in this data to produce relevant geo located tweets identifying failure events. Applying the strategy to real world data, we demonstrate the ability of our approach to utilize social sensor big data to detect damage and failure events in these critical public infrastructures. Samatha P. K | Dr. Mohamed Rafi "Expelling Information of Events from Critical Public Space using Social Sensor Big Data" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25350.pdfPaper URL: https://www.ijtsrd.com/engineering/computer-engineering/25350/expelling-information-of-events-from-critical-public-space-using-social-sensor-big-data/samatha-p-k
The document discusses natural disasters in India and Asia, and how remote sensing and GIS technologies can help mitigate disasters. Space technology, including communication and earth observation satellites, provides disaster warning, relief coordination, and data for pre- and post-disaster planning. GIS integrates spatial and non-spatial data and allows analysis for various stages of disaster management. Remote sensing provides historical data on past hazards to assess risk and aid mitigation planning.
IRJET- A Survey on Indoor Navigation for Blind PeopleIRJET Journal
The document summarizes several existing indoor navigation systems that have been developed to assist visually impaired people. It describes 6 different systems that use sensors and devices like smart sticks, smart phones, guiding glasses, and RGB-D cameras to detect obstacles, provide navigation guidance, and describe the person's location and surroundings. The systems provide feedback through audio commands or vibrations. The comparison table evaluates each system based on the type of collision avoidance and object detection used, the guidance feedback method and devices/sensors, and key features. Overall, the document reviews and compares different technical approaches that have been studied to help visually impaired individuals safely navigate indoor environments.
A SOS BASED APPLICATION FOR TRAVELERS TO TRAVEL ALONEvivatechijri
A traveler is a person who is traveling different places and enjoy the personal growth that occurs within the experience and people they meet. Now a days travelling in historical places and wild nature is more trending for travelers specially the solo traveler is attracted the most towards it. To interact with people, know and learn the cultures of different places, making friends solo travelling is something interesting to do, meeting People, nature, weather, etc. But at a same time, it is really dangerous to travel alone in unknown places and being a stranger all around, it is like doing something out of comfort zone which is dangerous and also expensive. There are no certain applications built for solo travelers with multiple functionalities like exploring places due to help rating security and cab sharing which can reduce their expenses. To overcome the problem’s, we are building an application name ‘Smart Travel’ application where all these functionalities will be implemented.
AN INTELLIGENT SYSTEM FOR THE ENHANCEMENT OF VISUALLY IMPAIRED NAVIGATION AND...ijgca
Technological advancement has brought the masses unprecedented convenience, but unnoticed by many, a
population neglected through the age of technology has been the visually impaired population. The visually
impaired population has grown through ages with as much desire as everyone else to adventure but lack
the confidence and support to do so. Time has transported society to a new phase condensed in big data,
but to the visually impaired population, this quick-pace living lifestyle, along with the unpredictable nature
of natural disaster and COVID-19 pandemic, has dropped them deeper into a feeling of disconnection from
the society. Our application uses the global positioning system to support the visually impaired in
independent navigation, alerts them in face of natural disasters, and reminds them to sanitize their devices
during the COVID-19 pandemic
AN INTELLIGENT SYSTEM FOR THE ENHANCEMENT OF VISUALLY IMPAIRED NAVIGATION AND...ijgca
The document describes an intelligent system that uses geo-based positioning and machine learning to enhance navigation and provide disaster assistance for visually impaired users. It aims to 1) collect obstruction data during walks to predict frequencies at locations, 2) determine indoor/outdoor locations to send alerts during disasters, and 3) remind users to sanitize their device after a certain frequency. The system provides navigation assistance, disaster alerts, and COVID-19 reminders to promote independence for visually impaired users. It experiments with support vector machines and regression models to determine the best machine learning approach.
Final year project report final sem.pdfAmaanAhmed55
This document is a thesis submitted for the degree of Bachelor of Technology in Electronics and Communication Engineering at Maulana Abul Kalam Azad University of Technology. It describes the development of a GPS enabled location tracking digital band by a group of five students - Aditi, Akash Shaw, Dona Chakraborty, Durba Kundu, and Subhrojyoti Das - under the supervision of Prof. Tarun Kumar Das at Future Institute of Engineering & Management. The thesis includes certificates of recommendation, approval, acknowledgement, index, and literature survey sections. It aims to design a wireless and portable location tracking system using a microcontroller interfaced with a GPS module and Bluetooth to allow caregivers
Shodh - A platform for finding missing peopleIRJET Journal
This document describes a system called "Shodh" that uses face recognition technology to help find missing people. The system allows authorized users like police to upload photos of missing people to a database. Members of the public can then use the system to try and match photos of unidentified people to the missing persons database. The system uses convolutional neural networks and ResNet models to analyze and compare facial features between photos to find potential matches. The goal is to expedite the process of identifying missing people and notifying their contacts. The document outlines the proposed system design, methodology, and results of testing the face recognition models.
Such a large number of patients in India lose their lives because the ambulance does not arrive on time or delay in the treatment. Also, in view of the increasing technology and other factors, it is necessary to be aware of such technologies to reduce this problem. A survey conducted in St Petersburg found that the rest of the countries are aware of the technology to find out where the ambulance is and alert the patient to get the crisis vehicle at the ideal time. For this, algorithms like weighted graphs, Dijkstra's algorithm, ant colony algorithm, dynamic shortest path have been used in that system. These algorithms are reduced the traveling time by 20%. Therefore, the chances of patient saving increased. In this system only 2 smartphones will have for conversation between patient and ambulance and it is fully automated. As we have found in India, if there is a accident at any spot, we are called complementary number or crisis number. After informing where the accident took place on that call, the ambulance is then dispatched from the control room at that particular place, and then the control room gives the details of the nearest hospital and then informs to the hospital. With this proposed system, the ambulance can be transported without delay from the accident site to the hospital we can easily find the shortest route between the accident site and the hospital reduce wasting time. The user no longer need to call and check the availability of the ambulance. So basically this system uses IoT, GPS and GSM, Dijkstra's algorithm. It uses IoT principle using rest API to check traffic, as well as IoT for traffic signal checking. The RF transmitter is installed in the ambulance and the RF receiver is installed in the traffic light. This changes the signal for a short time to get to the ambulance. In addition, the ambulance finding route is helps by the dijkstra's algorithm to find the shortest path. In this, the android app understands the location of the patient or the crash site, then the system checks which ambulance is within 5 kilometers and sends an alert or request to one of the ambulances and then after accepting the request, the driver understands the location of the crash site.
The aim of this paper is to help the blind people to identify and catch the public transport vehicles with the help of Light Fidelity technology. It is a Navigation aid. When the bus arrives at the bus stand, transmitter in the bus transmits the light signals and receiver in the stick, receives the light signals and a sound signal is generated through the speaker present in the stick. The sound message contains the bus number and the destination of the bus. In addition to this, if the person is absconded or lost, details of the location will be sent to his/her family members by pressing a button. This is made possible with the help of Global System for Mobile (GSM). Finally, presence of water can be detected along the blind person’s path, with the help of water sensors.
Methodologies and evaluation of electronic travel aids for the visually impai...journalBEEI
Technological advancements have widely contributed to navigation aids. However, their large-scale adaptation for navigation solutions for visually impaired people haven’t been realized yet. Less participation of the visually impaired subject produces a designer-oriented navigation system which overshadows consumer necessity. The outcome results in trust and safety issues, hindering the navigation aids from really contribute to the safety of the targeted end user. This study categorizes electronic travel aids (ETAs) based on experimental evaluations, highlights the designer-centred development of navigation aids with insufficient participation of the visual impaired community. First the research breaks down the methodologies to achieve navigation, followed by categorization of the test and experimentation done to evaluate the systems and ranks it by maturity order. From 70 selected research articles, 51.4% accounts for simulation evaluation, 24.3% involve blindfolded-sighted humans, 22.9% involve visually impaired people and only 1.4% makes it into production and commercialization. Our systematic review offers a bird’s eye view on ETA development and evaluation and contributes to construction of navigational aids which really impact the target group of visually impaired people.
This document describes a travel planning application called TravelMore. The application aims to help users efficiently plan trips and business visits by generating personalized itineraries based on travel dates, budget, and destination entered by the user. It utilizes APIs to retrieve relevant travel data and accommodation information. Key features include user authentication, itinerary creation, attraction suggestions, accommodation booking, itinerary management, and weather predictions. The document discusses limitations of existing travel planning systems and how TravelMore aims to address them by providing real-time weather updates, consolidating travel information in one place, allowing users to create customized itineraries, and enabling experience sharing between travelers.
This document describes a proposed voice-based navigation system for blind people using RFID technology. The system would help blind users find the shortest path from their current location to a destination using embedded RFID tags read by an RFID reader attached to a cane. It would also help users if they get lost by automatically detecting their location and recalculating a new route. The system aims to provide spoken directions to blind users to help them navigate indoor environments like buildings and museums. It uses freely available software components where possible.
The document describes a proposed system called SRAVIP (Smart Robot Assistant for Visually Impaired Persons) that aims to assist visually impaired individuals in navigating indoor environments. SRAVIP includes two subsystems: 1) an initialization system to create an environment map and register users, and 2) a real-time operation system to navigate the mobile robot and communicate with users through speech or text. The robot utilizes sensors and simultaneous localization and mapping to safely guide a registered user to their desired location indoors. The system was tested successfully using a Turtlebot3 robot at a university campus.
Technology Used By Geographers summarizes some key technologies used by geographers, including remote sensing which uses satellites to scan the Earth and relay data back to processing centers, and GPS which uses satellites to pinpoint the location of vehicles and give directions. Geographers utilize remote sensing to map various features across the world and GPS most commonly for transportation purposes by locating a vehicle's current position and providing directions.
This document provides safety guidelines for land-based adventure activities in Maharashtra, India. It was prepared by an expert committee for the Akhil Maharashtra Giryarohan Mahasangh (AMGM), the apex body for mountaineering clubs in Maharashtra, in response to a court order to regulate unregistered adventure organizations. The document defines various adventure activities and outlines its scope and applicability. It is applicable to organizations conducting activities like trekking, rock climbing, rappelling camps in Maharashtra and the Himalayas. It excludes activities like caving and motor sports. The guidelines are mandatory for unregistered commercial/non-commercial organizations as well as registered profit/non-profit organizations conducting public adventure
Similar to A Study of Wireless Technology Based Pilgrim Tracking Systems (20)
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMHODECEDSIET
Time Division Multiplexing (TDM) is a method of transmitting multiple signals over a single communication channel by dividing the signal into many segments, each having a very short duration of time. These time slots are then allocated to different data streams, allowing multiple signals to share the same transmission medium efficiently. TDM is widely used in telecommunications and data communication systems.
### How TDM Works
1. **Time Slots Allocation**: The core principle of TDM is to assign distinct time slots to each signal. During each time slot, the respective signal is transmitted, and then the process repeats cyclically. For example, if there are four signals to be transmitted, the TDM cycle will divide time into four slots, each assigned to one signal.
2. **Synchronization**: Synchronization is crucial in TDM systems to ensure that the signals are correctly aligned with their respective time slots. Both the transmitter and receiver must be synchronized to avoid any overlap or loss of data. This synchronization is typically maintained by a clock signal that ensures time slots are accurately aligned.
3. **Frame Structure**: TDM data is organized into frames, where each frame consists of a set of time slots. Each frame is repeated at regular intervals, ensuring continuous transmission of data streams. The frame structure helps in managing the data streams and maintaining the synchronization between the transmitter and receiver.
4. **Multiplexer and Demultiplexer**: At the transmitting end, a multiplexer combines multiple input signals into a single composite signal by assigning each signal to a specific time slot. At the receiving end, a demultiplexer separates the composite signal back into individual signals based on their respective time slots.
### Types of TDM
1. **Synchronous TDM**: In synchronous TDM, time slots are pre-assigned to each signal, regardless of whether the signal has data to transmit or not. This can lead to inefficiencies if some time slots remain empty due to the absence of data.
2. **Asynchronous TDM (or Statistical TDM)**: Asynchronous TDM addresses the inefficiencies of synchronous TDM by allocating time slots dynamically based on the presence of data. Time slots are assigned only when there is data to transmit, which optimizes the use of the communication channel.
### Applications of TDM
- **Telecommunications**: TDM is extensively used in telecommunication systems, such as in T1 and E1 lines, where multiple telephone calls are transmitted over a single line by assigning each call to a specific time slot.
- **Digital Audio and Video Broadcasting**: TDM is used in broadcasting systems to transmit multiple audio or video streams over a single channel, ensuring efficient use of bandwidth.
- **Computer Networks**: TDM is used in network protocols and systems to manage the transmission of data from multiple sources over a single network medium.
### Advantages of TDM
- **Efficient Use of Bandwidth**: TDM all
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Recycled Concrete Aggregate in Construction Part II
A Study of Wireless Technology Based Pilgrim Tracking Systems
1. A seminar report
on
A Study of Wireless Technology Based Pilgrim Tracking Systems
Submitted in partial fulfilment of the requirements for the award of course credits for
INTEGRATED DUAL DEGREE
in
COMPUTER SCIENCE AND ENGINEERING
(with specialization in Information Technology)
Submitted by
DEEPAK KUMAR
IDD-CSE
(Enrollment No: 10211009)
Under the guidance of
Dr. Dhaval Patel
Assistant Professor
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
INDIAN INSTITUTE OF TECHNOLOGY
ROORKEE – 247667
August, 2014
2. ii
ABSTRACT
This report studies various technologies which can be used for people tracking and crowd management. During any pilgrimage session, the events like losing a group member, medical emergencies, and stampede are very common. In case of disasters like flood, fire, earthquake pilgrims are often left stranded as they have a little knowledge about that area. To address these concerns, the authorities need information about the location and direction of movement of the pilgrims. Sometime, it may be necessary to identify a person in cases like a lost child, unconscious or dead person. Researchers have proposed a number of solutions using the wireless technology which includes RFID tags, NFC, GPS, Bluetooth and Wi-Fi. An introduction about the technologies and how they can be used to design systems for people identification and tracking is presented. The various systems using a set of technologies have been studied in terms of their effectiveness and the cost.
3. iii
TABLE OF CONTENTS
1. INTRODUCTION ............................................................................................................................. 1
1.1 Motivation .................................................................................................................................... 1
1.2 Background .................................................................................................................................. 2
2. WIRELESS TECHNOLOGIES......................................................................................................... 3
2.1 Radio Frequency Identification (RFID) ....................................................................................... 3
2.1.1 Categorising RFID tags......................................................................................................... 3
2.1.2 Effects of operating frequency on RFID tags ....................................................................... 4
2.1.3 Ultra-Wideband RFID tags ................................................................................................... 5
2.2 Near field communication (NFC) ................................................................................................ 5
2.3 Wi-Fi ............................................................................................................................................ 6
2.3.1 Passive Wi-Fi Tracking......................................................................................................... 6
2.3.2 Active Wi-Fi tracking ........................................................................................................... 7
2.4 Bluetooth ...................................................................................................................................... 8
2.4.1 Inquiry or scan based tracking .............................................................................................. 9
2.4.2 Inquiry-free tracking ............................................................................................................. 9
2.5 GPS ............................................................................................................................................ 10
3. SYSTEM DESIGNS ........................................................................................................................ 11
3.1 Integrated Mobile and RFID System ......................................................................................... 11
3.2 Smartphone GPS ........................................................................................................................ 12
3.2.1 Updating Location .............................................................................................................. 12
3.3 Wireless Sensor Network (WSN) .............................................................................................. 13
3.4 Bluetooth .................................................................................................................................... 14
3.5 Wi-Fi .......................................................................................................................................... 15
4. SUMMARY ..................................................................................................................................... 16
5. CONCLUSION ................................................................................................................................ 18
6. REFERENCES ................................................................................................................................ 19
4. iv
LIST OF TABLES
Table 2.1: Ranges and costs of RFID tags ............................................................................................. 5
Table 4.1: Comparison of wireless technologies ................................................................................. 16
LIST OF FIGURES
Figure 2.1: Waterproof RFID Wristband ............................................................................................... 3
Figure 2.2: Process of associating with an access point ........................................................................ 8
Figure 3.1: Architecture of a system using RFID and Smartphone GPS............................................. 12
Figure 3.2: HajjLocator Architecture ................................................................................................... 13
5. 1
1. INTRODUCTION
1.1 Motivation
Pilgrimage has a great significance in India. Each pilgrimage session attracts a huge crowd. Usually the pilgrims move simultaneously in a large group. Getting lost in the crowd is very common. Finding the lost person among thousands of pilgrims causes a lot of trouble for his relatives and the helping teams. As the pilgrims come from across the country, communication problems may also arise due to lack of a common language, which makes it hard to get the help from the helping teams.
Overcrowding at a specific site often results in stampede which leaves many people dead and injured. Sometimes the dead persons cannot be identified. The medical history of an injured person can provide better treatment and his family members should be notified as soon as possible. We can get the home address and medical history about a person only after that person is identified and we have that information already stored.
The problem of identifying and locating a pilgrim can be solved if a device can be associated with the pilgrim. The device can be monitored to get the location trajectory of the pilgrim. Having the trajectories of the movements of all persons, the crowd management can be made easy. It can help in preparing traffic plans. We can get the statistics about the most visited places, the duration of staying at a site and the way pilgrims disperse. The number of pilgrims at a specific site can be restricted to a safe limit. The group in which a person is moving can be identified automatically and the lost situations can be predicted if the system detects that the distance of a person is increasing from his group.
The disasters like flood, fire, and earthquake leave the people stranded. The need may arise to quickly relocate the pilgrims. Having an estimate of the number of pilgrims, their direction and speed of movement may help in quickly relocate the pilgrims. The trajectory data can be used to find some anomalies like people going from an alternate route which may be due to broken bridge or traffic jam. Crowd gathering at unexpected place can also be detected which may be due to an accident or their path is blocked due to flood. Ambulances or other moving objects can also be tracked by using methods similar to tracking pilgrims.
In this report, a survey of various systems designed using wireless technologies for pilgrim tracking is presented. Some other systems for tracking people in general are also studied, which can be utilized for the purpose of tracking pilgrims. The technologies and system designs are studied for the features they can provide like identifying or tracking a person, the infrastructure cost, scalability and the ease of deployment.
6. 2
1.2 Background
Tracking and monitoring the pilgrims in a crowded area is a difficult task. Researchers have tried a lot of solutions using smartphones [1] [2], RFID [3], wireless sensor networks (WSN) [4] or a combination of them [5] [6]. Some of them deeply studied the protocol of Wi-Fi and Bluetooth to track the smartphones using unconventional techniques [7].
Today smartphones come equipped with GPS, Wi-Fi, Bluetooth, NFC, accelerometer, compass and other sensors. Most of the systems utilize only the GPS and the mobile network available in smartphones, using Wi-Fi, Bluetooth, NFC and other sensors like accelerometer and compass remain unused. These systems have a server maintaining the database of locations of each pilgrim and a smartphone application for the pilgrims which get the coordinates using GPS and uploads it to the server using GPRS, 3G or short message service (SMS). The mobile app can be used by a pilgrim to request help or locate the helping team and officers easily. Section 2.2 explains that the NFC technology can also be used to identify pilgrims.
RFID based systems are most suitable for the purpose of identifying a large number of pilgrims. Because RFID tags are cheaper they can be provided to each pilgrims and the tag can be read using a RFID reader, which can also provide the information about a pilgrim. But RFID readers are costly, using them to track the pilgrims requires installation of a number of readers along the path. Also the passive RFID readers have a short range, so the pilgrim must be close to reader. Active RFID tags can be read from a larger distance but they are significantly more costly than passive tags. Researchers have faced many difficulties in the system designed using RFID and they found it to be impractical with the crowd [2]. Section 2.1 provides a detailed overview of RFID technology and how it can be used in pilgrim tracking and management.
Systems based on Wi-Fi or Bluetooth require the mobile device to have Wi-Fi or Bluetooth enabled all the time. Wi-Fi monitors or Bluetooth monitors are installed similar to RFID readers in RFID based systems. When the mobile device comes near a monitor, it captures the packets transmitted from the mobile device and extracts it MAC address. The MAC address uniquely identifies a device and it can be associated with a pilgrim at the time of registration. Section 2.3 and 2.4 discuss the Wi-Fi and Bluetooth technology to monitor the pilgrims.
Tracking millions of pilgrims in real time requires a highly available, cost effective and robust system. So the technology must be selected carefully. Existing technologies are surveyed for their practicality in pilgrim management taking into account the cost and features supported. Chapter 3 discusses various systems proposed by researchers.
7. 3
2. WIRELESS TECHNOLOGIES
2.1 Radio Frequency Identification (RFID)
RFID is a technology which uses radio-frequency waves for automated identification of objects from a distance. In RFID systems an object is marked with a tag. These RFID tags are small, wireless devices that store an identification number, which is typically a pointer to database entry. An RFID reader does the work of scanning these tags, when they come in its read range. Deployment of RFID systems is increasing due to cost reduction. Now they provide longer read range and higher data transfer rate. RFID tags are also available as waterproof wristbands. Section 3.1 discusses the system designed for tracking pilgrims using RFID tags.
Figure 2.1: Waterproof RFID Wristband (Courtesy of [8])
2.1.1 Categorising RFID tags
RFID tags can be categorised depending on their source of power or the technology used to transfer the power and energy:
Based on source of power
1. Passive: Passive tags are most popular due to their very low cost starting from around ₹10 per tag. They get their energy by harvesting the RF energy, which comes from the reader when it tries to read the tag. They can operate only when a reader is trying to read.
2. Semi-Passive: They have their own power source but they can transmit information only when read by the reader. Due to having battery for power, semi-passive tags are significantly more costly than passive tags, and their size is also larger.
3. Active: They have their own power source and can transmit information automatically or when asked by a reader. Having battery provides significantly longer read range than passive tags, but makes it most costly tag. The chip inside tag consumes very less amount of power (less than 1 mW), so most of the tags have battery life or around 5 years.
8. 4
Based on power and data transfer
RFID tags can be divided in two categories based on power transfer from reader to tag and data transfer from tag to reader: [9]
1. Near-field RFID: The energy is transferred using magnetic induction. The RFID reader generates alternating magnetic field which produces an alternating voltage in the tag coil. The generated voltage is then rectified and a capacitor attached to it accumulates the charge. This charge is used to power the chip inside tag. Load modulation technique is used for transferring the tag id to the reader. Current in the tag coil produces its own magnetic field which opposes the reader’s magnetic field. This will change the current flow in reader’s coil which can be detected by the reader. The range for using magnetic induction is approximately 푐/2휋푓, so the read range decreases on increasing the frequency. This technique is used for tags operating at less than 100 MHz.
2. Far-field RFID: The tag has a dipole antenna which captures the EM waves transmitted from the dipole antenna of a reader. The energy received in the tag is in the form of alternating potential difference. The rectified voltage is applied to capacitor which stores the charge. The data transfer is done using back scattering. The tag reflects the part of received energy by changing the impedance. The tag’s ID can be encoded by changing the impedance over time. The reader receives this reflected signal, so the energy received is proportional to 1/푟4, where r is the distance between reader and the tag. So the read range of passive tags using this technology is around 3 to 6 meters. This technique is used for tags operating in the UHF band.
2.1.2 Effects of operating frequency on RFID tags
1. As we increase the frequency, the energy contained in radio frequency waves also increases, so the passive tags can harvest more energy, resulting in higher read range. Passive UHF tags can have read range more than 3 meters, while LF and HF tags have few centimetres.
2. At high frequencies radio reflective materials impede the scanning of tags. So UHF tags will be affected by beverages and metals. The human body has lot of liquid, so UHF tags may not work properly near humans.
3. At higher frequency the data transfer rate is also high. So UHF and UWB tags have high data transfer speed, so the tag id can have more number of bits and more number of tags can be read in a fixed time.
4. Tags operating in UHF are cheaper than the tags operating in high frequency or lower frequency.
9. 5
Table 2.1 compares passive and active tags operating in different categories with regard to their range and cost. Empty field indicates that the tags falling in that category is not commercially available.
Table 2.1: Ranges and costs of RFID tags (adapted from [10])
Frequency
Passive
Active
Range Cost Range Cost
125-134.3 kHz
Low Frequency (LF)
10 cm – 30 cm
$1
13.56 MHz High Frequency (HF) 10 cm – 1.5 m $5
865-867 MHz
Ultra High Frequency (UHF)
1 m – 15 m
$0.15
50 m
$20 2.45 or 5.8 GHz Microwave 3 m 30 m $25
3.1–10 GHz
Ultra Wide Band
NA
up to 200 m
$5
2.1.3 Ultra-Wideband RFID tags
This technology is relatively new. UWB tags operate in 3.1 to 10 GHz band, by transmitting low power signals on a large range of frequencies instead of transmitting a strong signal on a particular frequency. UWB tags are energy efficient and they provide a very long read range. Since they use a broad range of frequencies, the interference is very less. So, they can be used nearby liquids, metals and humans. They do not interfere with any other device because of weak signal on a particular frequency. So the UWB tags can be the best among active RFID tags for tracking pilgrims.
2.2 Near field communication (NFC)
NFC is a wireless technology for short range communications between the devices which are held together for a short time. Using NFC mobile devices can communicate with the nearby devices in both directions. The theoretical distance of working is up to 20 cm, while practically the devices should be within 5 cm [11]. NFC is based on RFID technology and the NFC standard is compatible with already deployed contactless solutions [12]. Mobile phones have embedded tags within them. The NFC technology uses magnetic induction for data transfer and powering the tag. An unpowered NFC chip or passive tag can communicate to an NFC device. NFC has slow data transfer rate with maximum theoretical rate being 424 kbps. The typical data transfer rate is from 30 to 60 kbps [11].
10. 6
NFC can be used for identification, if we already have the details about the person and the device. It can be used for tracking purpose also, if the pilgrims are required to tap their phones at the check post. The device can be identified even when the phone is switched off. A smartphone with NFC capability can read the high frequency RFID tags operating in 13.56 MHz frequency. So the pilgrims can be given low cost passive RFID tags which can be read using a smartphone and the information about the pilgrim can be accessed using Internet or stored in the tag.
NFC can be used to transfer data. When using GPS to log the location trajectory of the user, the logged data can be transferred to another device seamlessly. It requires only to touch another device, both of the devices can transfer data using Bluetooth or Wi-Fi. For data transfer using Bluetooth, first we need to activate the Bluetooth on both devices, then search for the other device and then pair. These functions may not be easily accessible in the menu system. The updated Bluetooth standard supports paring the devices via NFC. This whole process can be replaced by momentarily holding the devices close to each other. In the similar way NFC can be used to connect to a Wi-Fi hotspot or transfer the data using Wi-Fi Direct.
2.3 Wi-Fi
Wi-Fi operates in 2.4 GHz and 5 GHz frequency bands. It provides longer range and very high data transfer rate compared to Bluetooth. Research has been done on tracking smartphones without modification in their software using Wi-Fi [13] or Bluetooth [7]. Researchers have also compared Bluetooth and Wi-Fi in terms of architecture, discovery time and signal strength [14]. This section discusses how we can use Wi-Fi to track a smartphone, and the next section describes the use of Bluetooth for tracking.
Wi-Fi enabled devices transmit messages even when they are not connected to a network. For detecting available access point within range, probe request frames are transmitted periodically on every supported channel. These frames can be detected by using Wi-Fi monitoring equipment in the region of interest, which can provide coarse-grained location for the phones nearby monitoring device. Each frame transmitted consists of a MAC header, payload and frame check sequence (FCS). The MAC header contains the MAC address of the Wi-Fi device along with other fields. Following sections discuss tracking a Wi-Fi enabled phone passively and actively, in order.
2.3.1 Passive Wi-Fi Tracking
During passive tracking no frames are transmitted. A Wi-Fi monitor listens silently for the packets transmitted from the phone. As the smartphone software is not modified, the message transmission occurs on the discretion of phone, for example when the phone is searching for other Wi-Fi networks.
11. 7
These transmissions can be detected from 20 meters to 300 meters depending on the transmission power and other environmental factors. These frames contain the MAC address of sender. By associating this MAC address with a pilgrim, the location information of can be logged in the database.
The performance of the Wi-Fi monitoring system can be improved by increasing the number of frames transmitted from a device. More number of transmissions helps in getting more devices detected and their trajectories can be obtained more accurately. A phone may not get detected by Wi-Fi monitors. One of the possible reason can be that the phone is not transmitting any probe message. Also a message transmitted may not be correctly detected by the monitor due to environmental factor or long range. The next section uses active tracking approach to get more transmission from the smartphone.
2.3.2 Active Wi-Fi tracking
Active tracking involves transmissions of frames from a Wi-Fi monitors. A smartphone can be tricked to connect to a virtual hotspot or reply to a query, which involves transmission of frames and increases the number of devices detected and the accuracy of localizing the device. Following three techniques can be used to increase the number of frames transmitted.
Advertising popular access point’ SSID
At some places like airport, few companies provide free Wi-Fi. The hotspots from AT&T use “attwifi” as their SSID. Once a phone is connected to an “attwifi” hotspot, it can automatically connect to any other hotspot with “attwifi” as its SSID. To boost the number of frames received from a device, a beacon frame is transmitted with the SSID of a popular hotspot. If the phone has already been connected once to the hotspot with this SSID, the phone then sends an association request to this virtual access point.
To get even more frames transmitted from each device, a fully functional access point can be emulated. Providing Internet connectivity is not necessary. The smartphone occasionally transmits null frames to notify the access point about it power state, which can be used for tracking.
Opportunistic Access Point Emulation
A phone which has been associated to a particular SSID will transmit directed probe requests for it. If the phone recognizes a hotspot with that SSID, it will make attempts for connecting to the hotspot. The recognition process relies on the security protocol, which is not contained in the probe request. In case of open access point it gets associated completely, and we will get more frames.
For secured networks the phone will not attempt to associate if the security protocol doesn’t match with already remembered credentials. For associating using secure protocols like WPA, 4-way
12. 8
handshake is required. This 4-way handshake cannot be completed because we don’t have the required credentials for a successful handshake, and we don’t try to complete. But as shown in Figure 2.2, if the access point does not initiate the handshake process (step C), after association response (step A), the phone will transmit null packets (step B) for around 10 seconds to check if AP is still there and after that it will repeat the association attempt. These continuous null packets can provide better trajectory.
Figure 2.2: Process of associating with an access point (Courtesy of [13])
Sending RTS packets to detected phones
This method does not require association of a phone with the emulated access points. To boost the number of frames transmitted from a phone, an RTS (request to send) frame can be sent. IEEE 802.11 standard requires that if a station receives an RTS frame and if the channel is free, then it should send a CTS (clear to send) frame. An RTS frame has both receiver address (RA) as well as transmitter address (TA), but CTS frame has only the receiver address. So a CTS frame transmitted from a device does not identify it. To solve this problem, we can specify unique transmitter address (TA) in RTS frame for each phone. So the phone will transmit CTS with the unique transmitter address as its receiver address, which can be intercepted by the Wi-Fi monitor.
2.4 Bluetooth
Almost every phone comes with Bluetooth. It consumes less power and provides decent data transfer rate. Most Bluetooth devices are battery powered class 2 devices using 2.5 mW of power. Its practical
13. 9
operating range is about 10 m to 30 m, which makes is suitable for tracking the persons passing nearby a Bluetooth monitoring device. Bluetooth technology operates in 2.4 to 2.485 GHz (ISM) band, it uses Frequency Hopping Spread Spectrum technology at a nominal rate of 1600 hops per second. [15]
Connecting two Bluetooth enabled devices involves inquiry and paging, this process is called paring. Inquiry procedure is used to discover all the devices in range and get their device addresses and clocks. Paging procedure is used to establish the connection. During paging the master device transmits search packets (called pages) targeted to a slave device until master gets a reply.
In android Bluetooth can be enabled programmatically, which we can use to transfer the data when we are nearby some check post, which we can detect with the help of geo-fencing. And we can turn it off when leaving the geo-fence.
2.4.1 Inquiry or scan based tracking
To discover the nearby devices, a master device transmits a discovery packet on some predefined 32 channels. If a device is configured to be discoverable, it will respond to this packet which can be used to identify the device. It might take around 10 seconds to discover all the devices in range because the response will be transmitted after a random delay which minimizes the probability of response collisions from other devices. The scanning process also disrupts the current channels which are in use.
Using above method anybody can track mobile devices by sending discovery packets continuously. Considering that as privacy risk, nowadays Bluetooth is set in discoverable mode only for a limited time or when the user is on specific page as is the case in Windows Phone. A scan packet originating from a mobile device is not required to have source address, so it cannot be used for tracking the phone when it searches for other devices to communicate.
2.4.2 Inquiry-free tracking
The authors have described a system for tracking the Bluetooth devices without discoverability, which is connection based. It requires a Bluetooth device to be already connected to a Bluetooth monitor by paring. Paring insures that an unpaired device cannot track a Bluetooth enabled phone. The Bluetooth monitor sends an inquiry which is targeted for a particular device instead of all devices. It will require multiple inquiry messages for tracking a number of devices, but the advantage is that a specific device can be targeted quickly. Section 3.4 describes a system using Bluetooth for tracking persons.
14. 10
2.5 GPS
Global positioning system is a navigation system which provides position, velocity and time information anywhere on earth. GPS uses the signal incoming from more than 4-5 satellites to calculate its position. But to send this location to the server it requires other means of connectivity like Wi-Fi, Bluetooth, 3G etc. Accuracy of GPS is from 2 to 10 meters, but due to weather conditions or indoors it may be more than 100 meters, so the indoor use of GPS is very limited.
The Global Navigation Satellite System (GLONASS) also works similar to GPS. In most of the smartphones having Snapdragon processor, both satellite networks GPS as well as GLONASS can be accessed, which improves the location services in terms of reliability, increased accuracy and faster fix on location [16]. Standalone GPS takes time to get its first location fix which may be up to 30-40 seconds. This time can be reduce by using assisted GPS (A-GPS) which gets the almanac and ephemeris data from the Internet instead of getting it from the satellites by utilizing the cell phone tower’s id (Cell ID).
Getting real time position from a smartphone requires an application to be developed, which gets the position from GPS device, aggregates or stores the data and then transfer it to the central server when the network connectivity is available. Section 3.2 describes a system designed for tracking pilgrims using smartphone GPS.
15. 11
3. SYSTEM DESIGNS
Various systems have been designed by the researchers using the GPS of a smartphone, RFID, standalone GPS with wireless communication for tracking the pilgrims. Some systems have been designed to monitor presence of people in an area using Wi-Fi or Bluetooth, not specifically for tracking pilgrims, but they can be customized to track pilgrims.
The system should be scalable to handle real time location updates of millions of pilgrims. The system should also be inter-operable and should integrate with other systems. It must be designed by keeping in mind the duration of time it will be used. Using expensive infrastructure for an infrequent event cannot be justified.
System designed for tracking people usually incorporate location based services (LBS) and geographic information system (GIS). Location based services are services which use the location of an object or person to control the features it provides. For example: finding nearby ATM, getting route to it and traffic information, advertising, road traffic optimization, emergency call positioning. Location of a device can be obtained using a wide range of complementary technologies including GPS, Assisted GPS, RFID, cell identification, Wi-Fi positioning system. Following sections discuss the various system designs possible for tracking pilgrims.
3.1 Integrated Mobile and RFID System
This system is designed for tracking the pilgrims during Hajj. In this system, an RFID tag is given to each pilgrim. Pilgrims having smartphone with GPS can use location based services by installing an app. These services include locating family members or friends, requesting urgent help, a map of important locations. To be able to transmit the current position, the app must be running in the phone. RFID readers are also installed in different regions to scan the tags.
The control centre provides features like visualizing the location of all the pilgrims on a map, searching for pilgrim based on several criteria like region, age, etc. Sending notification to the mobile device, maintaining the database of places like hospitals, location history and personal information about pilgrims. Smartphones use web services and the RFID readers use a middleware software to interface with the control centre. The overall architecture is depicted in Figure 3.1.
16. 12
Figure 3.1: Architecture of a system using RFID and Smartphone GPS (Courtesy of [6])
This system faced problems with RFID tags and readers. The read range of the RFID reader was low, it was also affected by the environmental factors. The signal between the RFID tag and the reader was getting blocked by the tag holder’s own body, also the read range was affected by the angle with reader. So they decided to not have a wristband RFID tag.
3.2 Smartphone GPS
A system called “HajjLocator” [1], has been designed to track pilgrims during Hajj. The system uses the GPS built into smartphone. The data transfer is done preferably using Wi-Fi or 3G, but the system can also use SMS to send the data in emergency situations. A pilgrim is required to install an app on his smartphone, which provides several features and sends his location to the server.
3.2.1 Updating Location
The frequency of location update must be decided carefully as it affects the power consumption and the network bandwidth. We can update the location after a certain time period or after the user has moved a certain distance. Choosing time based method to update the location guarantees that we will have the updated location after a particular duration. But if a user is stationary or he is moving slowly, then the frequent location updates will be redundant and will drain the battery and increase the network
17. 13
traffic. If we choose location based method, then we have to continuously keep track of the current position and the last sent position. If the distance between current position and the last sent location is greater than a threshold value, send the current position and store it as last sent location. If a user moves very fast then the distance based method will update more frequently.
The server uses PHP and MySQL. Authorities can login into the web server using a browser to get the position of pilgrims which is displayed in either a tabular form or in Google maps.
Figure 3.2: HajjLocator Architecture (Courtesy of [1])
They conclude that the distance-based update is recommended for tracking pilgrims [1]. Also an option was provided to the user to send his location manually. They also reported that the accuracy in open or semi-opened places was fine, but sometimes the server did not receive any data, why may due to unavailability of a location fix. In some cases, the location obtained from GPS was very far from the user’s actual location. Using the previous location records of a user, these erroneous locations can be adjusted and corrected.
3.3 Wireless Sensor Network (WSN)
In this system each pilgrim is given a sensor unit which contains a GPS for getting the current location of the pilgrim, a microcontroller which executes the program to send the location to fixed sensor units, a battery to power this matchbox sized sensor unit. It also includes ZigBee radio which is used to transfer the data to a network of fixed master units deployed in the region of interest. The tracked mobile units can be much more than fixed sensing nodes. The designers of this system have developed
18. 14
an RFID based system in the past, which provided only the identification of pilgrims. This system is designed to track pilgrims as well as identify them.
The wireless sensor nodes transmit their unique identification number, its current position as obtained from the GPS and the time periodically or on request from tracking station. The data transfer takes place opportunistically using ad-hoc network. The sensor units transmit the data using flooding protocol, so the same data is sent to all the nearby fixed sensors. This data is stored for some time and then multi-hop routing is used to transfer this data. The system designed can tolerate failure of a few fixed sensor nodes. The positions of pilgrims is mapped onto Google map similar to other systems.
For querying the location of a pilgrim, the server sends query by using optimal route utilizing the last known location. The system also supports routing multiple queries in parallel. Battery powered wireless sensor units should have power efficient hardware and software. The data transfer should also be minimum. The increased frequency of updating the location affects power consumption and bandwidth, but it reduces the time taken to find a pilgrim.
3.4 Bluetooth
A number of class 2 Bluetooth devices connected to a host machine are distributed in the area of interest. All of these host machines are networked together. This setup can be simply adding a Bluetooth dongle to a laptop or desktop. A central system which is connected to all these hosts maintains a database which contains the information about the ID of device, the owner of device, etc. This central system also maintains a model of the current positions of all the persons. This information is used to ask a host machine (Bluetooth monitor) to scan for the device IDs of the persons who can be there. For example, if a person leaves one checkpoint, he will probably go to next check point, so the next check point can be ordered to scan the ID of that person’s device.
The system requires frequent connection and disconnection, so the connection time should be minimum. The connection time depends on the clock synchronization between the devices. Once a host knows the clock difference between its attached Bluetooth device’s clock and a Bluetooth device’s clock, it can distribute that information to other hosts. To work this properly, the hosts must have their clocks synchronized. It can tolerate an error of up to 10.24 seconds. This level of accuracy for time synchronization can be achieved by using NTP. The time offset between the hosts as well as their Bluetooth devices’ clock offset needs to be synchronized. This technique enables us to get an expected connection time of 0.64 seconds.
19. 15
3.5 Wi-Fi
Smartphone users are increasing in India. Almost every smartphone comes with at least Wi-Fi. A system was designed for tracking the smartphones on a busy street for traffic flow or congestion monitoring using Wi-Fi. To track smartphones in an area, Wi-Fi monitors with a single radio device are installed. These are standard access points with custom firmware. The power usage of a Wi-Fi monitor was around 7W. The monitors collect the MAC address and the signal strength received. The system can store the data for retrieving it later or it can upload the real time data.
The system takes care of stationary devices also. If a device is present continuously during scan, it is put in a blacklist. If a device is not being observed for a long time, then it is removed from the blacklist. This system used all three techniques to increase the number of frames transmitted as described in section 2.3.2. The active tracking results in 3 to 5 times more packet transmissions compared to passive tracking. The RTS technique has less effect than the others. In their experiment the mean error was under 70 meters and the monitors were 400 meters apart [13].
20. 16
4. SUMMARY
Passive RFID based systems are best suitable for identifying, while active RFID based systems can track pilgrims as well as identify them. Active tags also provide a long read range, but they are more costly. If multiple tags are placed together, sometimes not all of them will be detected. RFID tags operating in ultra-high frequency are susceptible to interference from human body. However, recent ultra-wideband RFID tags are supposed to immunity to interference from the human body and provide long read range. Passive tags compatible with NFC can be the best choice for identifying pilgrims with a smartphone.
Using GPS device on a smartphone can provide more accurate and real time data, but this data needs to be transferred to a central server. According to a study 50 percent of Indian smartphone users do not have data connection. So assuming that a smartphone will always have an Internet connection is not good. Users may disable Internet to reduce the data cost or to save battery. Similarly Bluetooth and Wi-Fi can also be turned off to save battery. So smartphone alone cannot be used to track all the pilgrims. Table 4.1 compares various wireless technologies which can be used for tracking pilgrims.
Table 4.1: Comparison of wireless technologies
Technology
Distance
Power consumed
Cost
Remarks RFID (Passive) < 3 m No battery Very Low Best suited for identification
RFID (Active)
~ 100 m
Very Low
Low
Interference from human body NFC ~ 4 cm No battery High Available only in high end smartphones.
Bluetooth
10 m – 30 m
Low
High
High availability in phones Wi-Fi 20 m – 200 m High High Drains battery of smartphone
GPS + Networking
Anywhere on earth surface
High
Very High
Requires an application to be installed in smartphone
The systems designed so far do not utilize all the sensors available in the smartphone. As Bluetooth is cheaper and available in most of the phone, the systems utilizing Bluetooth in addition to RFID, can be cost efficient. A system can use more than one technologies, for example, having Wi-Fi monitors in addition to Bluetooth monitor can provide more data about the position of pilgrims. The researchers
21. 17
point out the lack of interactivity and facilities in the websites of Hajj [5]. GIS should be incorporated into any pilgrim tracking system. NFC enabled smartphones can be used to scan high frequency RFID tags, which is the most convenient way. It can also be used to quickly setup Bluetooth or Wi-Fi to transfer data.
22. 18
5. CONCLUSION
Using wireless technologies along with smartphones can provide a fast and convenient solution for tracking and managing pilgrims. Using Bluetooth and Wi-Fi capability of a smartphone, along with GPS can provide most efficient solution. Passive RFID tags operating in high frequency which are compatible with NFC, can be read by an NFC enabled smartphone. Active RFID tags are costly which increases the total infrastructure cost as the number of pilgrims are in millions. Practical deployments of RFID based solutions have experienced problems due to body mass and short read range.
Using Bluetooth or Wi-Fi monitors in place of RFID readers can provide more accurate trajectories. Utilizing the built-in Bluetooth or Wi-Fi on a smartphone is cost effective as we don’t have to buy any extra equipment for pilgrims. Also Bluetooth and Wi-Fi monitors are very cheap compared to RFID readers. The location accuracy provided by RFID, Bluetooth or Wi-Fi based solution depends on the number of readers or monitors installed in an area. These systems can only tell whether a person is inside the region of a monitor or not.
The GPS enabled smartphones can provide highly accurate and real time location updates. It requires Internet or other wireless networks to send the location data to central server. Also the battery consumption is high, because an application must be running, GPS device is also on and the data must be transferred using networking. Smartphone applications can be used to access several location based services, like the map of important places nearby, viewing positions of group members on map.
The location data obtained from the RFID reader, Bluetooth or Wi-Fi monitors and the GPS can provide several statistics. The trajectory data of pilgrims can be used for planning traffic, inferring peak hours or restricting the number of pilgrims at a site, providing better crowd management.
23. 19
6. REFERENCES
[1]
T. Mantoro, A. D. Jaafar, M. F. M. Aris and M. A. Ayu, “HajjLocator: A Hajj Pilgrimage Tracking Framework in Crowded Ubiquitous Environment,” in International Conference on Multimedia Computing and Systems (ICMCS), 2011.
[2]
M. Mohandes, “Pilgrim tracking and identification using the mobile phone,” in International Symposium on Consumer Electronics (ISCE), 2011.
[3]
M. Mohandes, “Sustainable Radio Frequency Identification Solutions,” in A case study of an RFID-based system for pilgrims identification and tracking, INTECH, 2010, p. 356.
[4]
M. Mohandes, M. A. Haleem, A. Abul-Hussain and K. Balakrishnan, “Pilgrims Tracking Using Wireless Sensor Network,” in International Conference on Advanced Information Networking and Applications (WAINA), Biopolis, 2011.
[5]
A. Touir, A. Al-Owaisheg and H. Mathkour, “The Architecture and the Design of a Pilgrim Tracking System,” in Information and Communication Technologies From Theory to Applications (ICTTA), Damascus, 2008.
[6]
R. O. Mitchell, H. Rashid, F. Dawood and A. AlKhalidi, “Hajj Crowd Management and Navigation System,” in International Conference on Computer Applications in Technology (ICCAT), 2013.
[7]
S. Hay and R. Harle, “Bluetooth Tracking without Discoverability,” in Location and Context Awareness, Tokyo, Japan, Springer Berlin Heidelberg, 2009, pp. 120-137.
[8]
“Waterproof Silicone RFID Wristband,” Shenzhen Chuangxinjia Smart Card Co.,Ltd, [Online]. Available: http://en.asiadcp.com/company/productinfo.php?pid=60658&upcid=10482&id=128214. [Accessed 28 8 2014].
[9]
R. Want, “An Introduction to RFID technology,” Pervasive Computing, IEEE, vol. 5, no. 1, pp. 25-33, 2006.
24. 20
[10]
S. A. Weis, “RFID (Radio Frequency Identification): Principles and Applications,” MIT CSAIL, 2007.
[11]
Microsoft, “Proximity for Windows Phone: Near Field Communication,” [Online]. Available: http://msdn.microsoft.com/en-us/library/windows/apps/jj207060%28v=vs.105%29.aspx. [Accessed 27 8 2014].
[12]
Nokia, Near Field Communication (White Paper), Nokia Corporation, 2007.
[13]
A. Musa and J. Eriksson, “Tracking Unmodified Smartphones Using Wi-Fi Monitors,” in ACM Conference on Embedded Networked Sensor Systems (SenSys), 2012.
[14]
N. Abedi, A. Bhaskar and E. Chung, “Bluetooth and Wi-Fi MAC address based crowd data collection and monitoring : benefits, challenges and enhancement,” in 36th Australasian Transport Research Forum (ATRF), Brisbane, Australia, 2013.
[15]
Bluetooth Special Intereset Group, “Bluetooth Basics,” Bluetooth SIG, Inc., [Online]. Available: http://www.bluetooth.com/Pages/Basics.aspx. [Accessed 22 8 2014].
[16]
P. Jacobowitz, “GPS and GLONASS: "Dual-core" Location For Your Phone,” Qualcomm, 15 12 2011. [Online]. Available: https://www.qualcomm.com/news/onq/2011/12/15/gps-and- glonass-dual-core-location-your-phone. [Accessed 25 8 2014].
[17]
A. Juels, “RFID Security and Privacy: A Research Survey,” Selected Areas in Communications, IEEE Journal, vol. 24, no. 2, pp. 381-394, 2006.