Skip to main content

A Wearable Computing Environment for the Security of a Large-Scale Factory

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4551))

Abstract

This paper studies the issue of using the wearable computer as a remote sensing device of a large-scale factory. The infrastructure of ubiquitous security environment to realize the remote sensing capability for the security guard is presented in this paper. This paper also scheme out a wearable computing scenario for the security guard under such a ubiquitous security environment. That is, through the help of the wearable computer, the security guard can remotely sensing the security status of each building when he is patrolling a large-scale factory. To achieve a seamless remote sensing environment, we use the wireless AP (Access Point) as the relay between static sensor networks installed inside each building and the mobile sensing device worn on the security guard. The AP enable the wearable computer to seamless receive security status of each building and upload the wearer status to the security control center at the same time. Furthermore, this research adopts the technology of embedded Linux to design a middleware for the wearable computer. The proposed architecture of the wearable computer is scalable, flexible and modular for the mobile computing system. Finally, this paper elaborates a seamless connection approach for the wearable computer within a ubiquitous security environment.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rhodes, B.J.: The wearable remembrance agent: a system for augmented memory. In: First International Symposium on Wearable Computers, pp. 123–128 (1997)

    Google Scholar 

  2. Mann, S.: Humanistic Intelligence: WearComp as a new framework for Intelligent Signal Processing. In: Proceedings of the IEEE, vol. 86(11), pp. 2123–2151, (November 1998)

    Google Scholar 

  3. Mohammad, A., Chen, A.: Seamless mobility requirements and mobility architectures, In: Global Telecommunications Conference, 2001. GLOBECOM 2001. IEEE, vol. 3, pp. 1950–1956, (November 25-29, 2001)

    Google Scholar 

  4. Badache, N., Tandjaoui, D.: A seamless handoff protocol for hierarchical Mobile IPv4. In: 4th International Workshop on Mobile and Wireless Communications Network, pp. 651–655 (September 9-11, 2002)

    Google Scholar 

  5. Ardizzone, E., La Cascia, M., Lo Re, G., Ortolani, M.: An integrated architecture for surveillance and monitoring in an archaeological site. In: Proc. ACM Workshop on Video Surveillance and Sensor Networks, pp. 79–86 (2005)

    Google Scholar 

  6. Ryan, A., Zennaro, M., Howell, A., Sengupta, R., Hedrick, J.K.: An overview of emerging results in cooperative UAV control. In: Proc. IEEE Conf. on Decision and Control, Atlantis, Paradise Island, Bahamas, December 14-17, 2004 pp. 602–607 (2004)

    Google Scholar 

  7. Akyildiz, I.F., Kasimoglu, I.H.: Wireless Sensor and Actor Networks: Research Challenges. Ad Hoc Networks Journal 2(4), 351–367 (2004)

    Article  Google Scholar 

  8. Starner, T.: The challenges of Wearable Computing. Part. 1 and 2, Micro, IEEE 21(4), 44–67 (2001)

    Google Scholar 

  9. WetPC: [Accessed online 02/07/2007], available at http://wetpc.com.au/html/technology/wearable.htm

  10. DeVaul, R., Sung, M., Gips, J., Pentland, A.: MIThril 2003: Applications and Architecture. In: Fensel, D., Sycara, K.P., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 4–11. Springer, Heidelberg (2003)

    Google Scholar 

  11. Narayanaswami, et al.: IBMs Linux Watch: The Challenge of Miniaturization, IEEE Computer, 33–41 (January 2002)

    Google Scholar 

  12. Bauer, M., Heiber, T., Kortuem, G., Segall, Z.: A Collaborative Wearable System with Remote Sensing. In: Proceedings Second International Symposium on Wearable Computers (ISWC’98) Oct 19-20, 1998 Pittsburgh, PA, pp. 10–17 (1998)

    Google Scholar 

  13. Richards, B., Brodersen, R.W.: InfoPad: The Design of a Portable Multimedia Terminal. In: Proceedings of the Mobile Multimedia Conference-2 (April 1995)

    Google Scholar 

  14. Dey, A.K., Salber, D., Abowd, G.D.: The Conference Assistant: Combining Context Awareness with Wearable Computing. In: IEEE Third International Symposium on Wearable Computers, pp. 21–28 (1999)

    Google Scholar 

  15. P802.11-Wireless LAN Medium Access Control (MAC) and Physical Specifications, IEEE, (June 1997) [Accessed online 01/18/2005], available at http://grouper.ieee.org/groups/802/11/index.html

  16. Lin, Y.B., Pang, A.C.: Comparing Soft and Hard Handoffs. IEEE Transactions on vehicular technology 49(3), 792–798 (2000)

    Article  Google Scholar 

  17. Chakravorty, R., Vidales, P., Subramanian, K., Pratt, I., Crowcroft, J.: Performance Issues with Vertical Handovers - Experiences from GPRS Cellular and WLAN Hot-spots Integration. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications (PERCOM 2004) [Accessed online 01/23/2005], available at http://www.cl.cam.ac.uk/coms/

  18. Sobrinho, J.L., Krishnakumar, A.S.: Real-Time Traffic over the IEEE 802.11 Medium Access Control Layer, Bell Labs Technical Journal Autumn, pp. 172–187 (1996)

    Google Scholar 

  19. Guo, C., Guo, Z., Zhang, Q., Zhu, W.: A seamless and Proactive End-to-End Mobility Solution for Roaming Across Heterogeneous Wireless Networks. IEEE Journal on selected areas in communications 22(5), 834–848 (2004)

    Article  Google Scholar 

  20. Wu, B.E., Yang, C.S.: Improving the Heterogeneous traffic Performance over wireless LAN IEEE 802.11, Institute of Computer and Information Engineering, National Sun Yat-sen University (2000)

    Google Scholar 

  21. Cali, F., Conti, M., Gregori, E.: Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit. IEEE/ACM Trans. on Networking 8, 785–799 (2000)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Julie A. Jacko

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Huang, Jy., Tsai, CH. (2007). A Wearable Computing Environment for the Security of a Large-Scale Factory. In: Jacko, J.A. (eds) Human-Computer Interaction. Interaction Platforms and Techniques. HCI 2007. Lecture Notes in Computer Science, vol 4551. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73107-8_122

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73107-8_122

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73106-1

  • Online ISBN: 978-3-540-73107-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics