Abstract
This paper studies the issue of using the wearable computer as a remote sensing device of a large-scale factory. The infrastructure of ubiquitous security environment to realize the remote sensing capability for the security guard is presented in this paper. This paper also scheme out a wearable computing scenario for the security guard under such a ubiquitous security environment. That is, through the help of the wearable computer, the security guard can remotely sensing the security status of each building when he is patrolling a large-scale factory. To achieve a seamless remote sensing environment, we use the wireless AP (Access Point) as the relay between static sensor networks installed inside each building and the mobile sensing device worn on the security guard. The AP enable the wearable computer to seamless receive security status of each building and upload the wearer status to the security control center at the same time. Furthermore, this research adopts the technology of embedded Linux to design a middleware for the wearable computer. The proposed architecture of the wearable computer is scalable, flexible and modular for the mobile computing system. Finally, this paper elaborates a seamless connection approach for the wearable computer within a ubiquitous security environment.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Rhodes, B.J.: The wearable remembrance agent: a system for augmented memory. In: First International Symposium on Wearable Computers, pp. 123–128 (1997)
Mann, S.: Humanistic Intelligence: WearComp as a new framework for Intelligent Signal Processing. In: Proceedings of the IEEE, vol. 86(11), pp. 2123–2151, (November 1998)
Mohammad, A., Chen, A.: Seamless mobility requirements and mobility architectures, In: Global Telecommunications Conference, 2001. GLOBECOM 2001. IEEE, vol. 3, pp. 1950–1956, (November 25-29, 2001)
Badache, N., Tandjaoui, D.: A seamless handoff protocol for hierarchical Mobile IPv4. In: 4th International Workshop on Mobile and Wireless Communications Network, pp. 651–655 (September 9-11, 2002)
Ardizzone, E., La Cascia, M., Lo Re, G., Ortolani, M.: An integrated architecture for surveillance and monitoring in an archaeological site. In: Proc. ACM Workshop on Video Surveillance and Sensor Networks, pp. 79–86 (2005)
Ryan, A., Zennaro, M., Howell, A., Sengupta, R., Hedrick, J.K.: An overview of emerging results in cooperative UAV control. In: Proc. IEEE Conf. on Decision and Control, Atlantis, Paradise Island, Bahamas, December 14-17, 2004 pp. 602–607 (2004)
Akyildiz, I.F., Kasimoglu, I.H.: Wireless Sensor and Actor Networks: Research Challenges. Ad Hoc Networks Journal 2(4), 351–367 (2004)
Starner, T.: The challenges of Wearable Computing. Part. 1 and 2, Micro, IEEE 21(4), 44–67 (2001)
WetPC: [Accessed online 02/07/2007], available at http://wetpc.com.au/html/technology/wearable.htm
DeVaul, R., Sung, M., Gips, J., Pentland, A.: MIThril 2003: Applications and Architecture. In: Fensel, D., Sycara, K.P., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 4–11. Springer, Heidelberg (2003)
Narayanaswami, et al.: IBMs Linux Watch: The Challenge of Miniaturization, IEEE Computer, 33–41 (January 2002)
Bauer, M., Heiber, T., Kortuem, G., Segall, Z.: A Collaborative Wearable System with Remote Sensing. In: Proceedings Second International Symposium on Wearable Computers (ISWC’98) Oct 19-20, 1998 Pittsburgh, PA, pp. 10–17 (1998)
Richards, B., Brodersen, R.W.: InfoPad: The Design of a Portable Multimedia Terminal. In: Proceedings of the Mobile Multimedia Conference-2 (April 1995)
Dey, A.K., Salber, D., Abowd, G.D.: The Conference Assistant: Combining Context Awareness with Wearable Computing. In: IEEE Third International Symposium on Wearable Computers, pp. 21–28 (1999)
P802.11-Wireless LAN Medium Access Control (MAC) and Physical Specifications, IEEE, (June 1997) [Accessed online 01/18/2005], available at http://grouper.ieee.org/groups/802/11/index.html
Lin, Y.B., Pang, A.C.: Comparing Soft and Hard Handoffs. IEEE Transactions on vehicular technology 49(3), 792–798 (2000)
Chakravorty, R., Vidales, P., Subramanian, K., Pratt, I., Crowcroft, J.: Performance Issues with Vertical Handovers - Experiences from GPRS Cellular and WLAN Hot-spots Integration. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications (PERCOM 2004) [Accessed online 01/23/2005], available at http://www.cl.cam.ac.uk/coms/
Sobrinho, J.L., Krishnakumar, A.S.: Real-Time Traffic over the IEEE 802.11 Medium Access Control Layer, Bell Labs Technical Journal Autumn, pp. 172–187 (1996)
Guo, C., Guo, Z., Zhang, Q., Zhu, W.: A seamless and Proactive End-to-End Mobility Solution for Roaming Across Heterogeneous Wireless Networks. IEEE Journal on selected areas in communications 22(5), 834–848 (2004)
Wu, B.E., Yang, C.S.: Improving the Heterogeneous traffic Performance over wireless LAN IEEE 802.11, Institute of Computer and Information Engineering, National Sun Yat-sen University (2000)
Cali, F., Conti, M., Gregori, E.: Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit. IEEE/ACM Trans. on Networking 8, 785–799 (2000)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Huang, Jy., Tsai, CH. (2007). A Wearable Computing Environment for the Security of a Large-Scale Factory. In: Jacko, J.A. (eds) Human-Computer Interaction. Interaction Platforms and Techniques. HCI 2007. Lecture Notes in Computer Science, vol 4551. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73107-8_122
Download citation
DOI: https://doi.org/10.1007/978-3-540-73107-8_122
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73106-1
Online ISBN: 978-3-540-73107-8
eBook Packages: Computer ScienceComputer Science (R0)