scholarly journals Development of Prototype Low-Cost QTSS™ Wearable Flexible More Enviro-Friendly Pressure, Shear, and Friction Sensors for Dynamic Prosthetic Fit Monitoring

Sensors ◽  
2021 ◽  
Vol 21 (11) ◽  
pp. 3764
Author(s):  
Valter Dejke ◽  
Mattias P. Eng ◽  
Klas Brinkfeldt ◽  
Josephine Charnley ◽  
David Lussey ◽  
...  

There is a current healthcare need for improved prosthetic socket fit provision for the masses using low-cost and simple to manufacture sensors that can measure pressure, shear, and friction. There is also a need to address society’s increasing concerns regarding the environmental impact of electronics and IoT devices. Prototype thin, low-cost, and low-weight pressure, shear, and loss of friction sensors have been developed and assembled for trans-femoral amputees. These flexible and conformable sensors are simple to manufacture and utilize more enviro-friendly novel magnetite-based QTSS™ (Quantum Technology Supersensor™) quantum materials. They have undergone some initial tests on flat and curved surfaces in a pilot amputee trial, which are presented in this paper. These initial findings indicate that the prototype pressure sensor strip is capable of measuring pressure both on flat and curved socket surfaces in a pilot amputee trial. They have also demonstrated that the prototype shear sensor can indicate increasing shear forces, the resultant direction of the shear forces, and loss of friction/slippage events. Further testing, amputee trials, and ongoing optimization is continuing as part of the SocketSense project to assist prosthetic comfort and fit.

2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


2021 ◽  
Vol 10 (1) ◽  
pp. 13
Author(s):  
Claudia Campolo ◽  
Giacomo Genovese ◽  
Antonio Iera ◽  
Antonella Molinaro

Several Internet of Things (IoT) applications are booming which rely on advanced artificial intelligence (AI) and, in particular, machine learning (ML) algorithms to assist the users and make decisions on their behalf in a large variety of contexts, such as smart homes, smart cities, smart factories. Although the traditional approach is to deploy such compute-intensive algorithms into the centralized cloud, the recent proliferation of low-cost, AI-powered microcontrollers and consumer devices paves the way for having the intelligence pervasively spread along the cloud-to-things continuum. The take off of such a promising vision may be hurdled by the resource constraints of IoT devices and by the heterogeneity of (mostly proprietary) AI-embedded software and hardware platforms. In this paper, we propose a solution for the AI distributed deployment at the deep edge, which lays its foundation in the IoT virtualization concept. We design a virtualization layer hosted at the network edge that is in charge of the semantic description of AI-embedded IoT devices, and, hence, it can expose as well as augment their cognitive capabilities in order to feed intelligent IoT applications. The proposal has been mainly devised with the twofold aim of (i) relieving the pressure on constrained devices that are solicited by multiple parties interested in accessing their generated data and inference, and (ii) and targeting interoperability among AI-powered platforms. A Proof-of-Concept (PoC) is provided to showcase the viability and advantages of the proposed solution.


Sensors ◽  
2021 ◽  
Vol 21 (10) ◽  
pp. 3515
Author(s):  
Sung-Ho Sim ◽  
Yoon-Su Jeong

As the development of IoT technologies has progressed rapidly recently, most IoT data are focused on monitoring and control to process IoT data, but the cost of collecting and linking various IoT data increases, requiring the ability to proactively integrate and analyze collected IoT data so that cloud servers (data centers) can process smartly. In this paper, we propose a blockchain-based IoT big data integrity verification technique to ensure the safety of the Third Party Auditor (TPA), which has a role in auditing the integrity of AIoT data. The proposed technique aims to minimize IoT information loss by multiple blockchain groupings of information and signature keys from IoT devices. The proposed technique allows IoT information to be effectively guaranteed the integrity of AIoT data by linking hash values designated as arbitrary, constant-size blocks with previous blocks in hierarchical chains. The proposed technique performs synchronization using location information between the central server and IoT devices to manage the cost of the integrity of IoT information at low cost. In order to easily control a large number of locations of IoT devices, we perform cross-distributed and blockchain linkage processing under constant rules to improve the load and throughput generated by IoT devices.


2018 ◽  
Vol 10 (3) ◽  
pp. 61-83 ◽  
Author(s):  
Deepali Chaudhary ◽  
Kriti Bhushan ◽  
B.B. Gupta

This article describes how cloud computing has emerged as a strong competitor against traditional IT platforms by offering low-cost and “pay-as-you-go” computing potential and on-demand provisioning of services. Governments, as well as organizations, have migrated their entire or most of the IT infrastructure to the cloud. With the emergence of IoT devices and big data, the amount of data forwarded to the cloud has increased to a huge extent. Therefore, the paradigm of cloud computing is no longer sufficient. Furthermore, with the growth of demand for IoT solutions in organizations, it has become essential to process data quickly, substantially and on-site. Hence, Fog computing is introduced to overcome these drawbacks of cloud computing by bringing intelligence to the edge of the network using smart devices. One major security issue related to the cloud is the DDoS attack. This article discusses in detail about the DDoS attack, cloud computing, fog computing, how DDoS affect cloud environment and how fog computing can be used in a cloud environment to solve a variety of problems.


2015 ◽  
Vol 1115 ◽  
pp. 450-453 ◽  
Author(s):  
Moumen Idres ◽  
Burhani Makame ◽  
Bala Nabil Ahmad ◽  
Saleh Naji ◽  
Ahmad Safiuddin

Unmanned Aerial Vehicle (UAV) is becoming increasingly popular because it can perform variety of functions. These functions include surveillance, reconnaissance, monitoring, data collection and rescue operation. The purpose of this work is to design, fabricate and fly a low weight, low cost, small size UAV for a surveillance mission. The design is carried out based on Advanced Aircraft Analysis (AAA) software. The design process starts with the design specifications for a typical surveillance mission. Aircraft weight, wing loading and power loading were estimated in performance sizing process. Geometry was estimated using preliminary sizing. Aerodynamics of the aircraft was determined, which enabled the performance and stability to be analysed. If the desired performance is not achieved, the sizing is readjusted until a final design is reached. The aircraft was manufactured using foam, carbon rods, and fibreglass. The aircraft successfully flew at the first trial flight. This was followed by a successful flight with aerial photography. Keywords: UAV, design process, fabrication process, composite structure, flight test


2018 ◽  
Vol 7 (2) ◽  
pp. 110-112
Author(s):  
Sasikumar Gnanasekaran ◽  
Sivasangari Ayyappan

Natural fibres namely sisal, jute, kenaf, hemp, abaca and banana are mainly used in industries for developing Natural fibres composites. They find many applications such as automobiles, furniture, packing and construction due to many merits such as their low cost, good mechanical properties, non-toxic, low weight, less damage to processing equipment, improved surface finish, abundant and renewable resources. The objective of this paper is to review the applications of various kenaf fibre reinforced polymer composites which will provide a base for further research in this area.


Webology ◽  
2021 ◽  
Vol 18 (Special Issue 04) ◽  
pp. 733-751
Author(s):  
D.M. Sheeba

Internet of Things enables many industries to connect to end customers and provide seamless products and services delivery. Due to easy access to network, availability of devices, penetration of IoT services exponentially Growing. Meanwhile, Ensuring the Data Security and Integrity of devices connected to network is paramount. In this work, we bring the efficient way of implementing Secure Algorithm for low powered devices and enhancing the encryption and decryption process. In addition to the data security, to enhance node integrity with less power, Authenticator and intermediate network manager introduced which will acts as a firewall and manager of data flow. To demonstrate the approach, same is implemented using low cost Arduino Uno, Raspberry Pi boards. Arduino Uno used to demonstrate low powered encryption process using EDIA Algorithm and raspberry pi used as nodal manager to manage the integrity of nodes in a low-powered environment. Data Security and Integrity is ensured by the way of enhanced Algorithm and Integrity through BlockChain and results are provided and discussed. Finally result and future enhancement are explained.


2020 ◽  
Author(s):  
Shoumen Datta

Proposed SARS-CoV-2 surveillance tool using a mobile app for non-invasive monitoring of humans and animals. <p>Engineering a biomedical device as a low-cost, non-invasive, detection, and diagnostic platform for surveillance of infections in humans, and animals. The system embraces the IoT <i>“digital by design”</i> metaphor by incorporating elements of connectivity, data sharing and (secure) information arbitrage. Using an array of aptamers to bind viral targets may help in detection, diagnostics, and potentially prevention in case of SARS-CoV-2. The ADD tool may become part of a broader platform approach.</p>


Author(s):  
AP Pandit ◽  
Neha Bhagatkar ◽  
Mallika Ramachandran

ABSTRACT The potential size of India's dental market is vast and is expected to become one of the largest single country markets for overseas dental products and materials. The total market for the dental equipment and materials is estimated to be around US$ 90 million annually. There are more than 1, 80,000 dental professionals in India, 297 dental institutes and over 5,000 dental laboratories. Thus, there is a huge potential for the market of personal protective equipment (PPE) used for infection control in dentistry. India's market for dental products is extremely dynamic, with a current estimated growth rate of between 25 and 30%. Overall, the dental market is expected to grow by 20%.1 The personal protective equipment used in the practice of dentistry in India. Since dentistry is predominantly a surgical discipline, it leads to exposure to the pathogenic microorganisms harbored in blood, body fluids and other potentially infectious material. Thus, the use of adequate and good quality PPE is imperative for infection control in dental practice. With the growing potential of India's dental market, the growth of the market for PPE is inevitable. But, it is equally important to raise the awareness among dental community about good quality products adhering to required standards to prevent the usage of low-cost, uncertified and sub-standard products that decrease the safety levels of personnel. The present study is conducted with a view to observe the personal protective equipment used for infection control in dental practices. How to cite this article Pandit AP, Bhagatkar N, Ramachandran M. Personal Protective Equipment used for Infection Control in Dental Practices. Int J Res Foundation Hosp Healthc Adm 2015;3(1):10-12.


Sign in / Sign up

Export Citation Format

Share Document