2009 Fourth International Conference on Software Engineering Advances 2009
DOI: 10.1109/icsea.2009.33
|View full text |Cite
|
Sign up to set email alerts
|

Risk Management through Real-Time Wearable Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Considering the technology available for risk management, we have categorized technologies and their capabilities of addressing problems as follows: Health monitoring and wearable objects: Technologies for users’ health have seen many progresses through wearable objects , such as shoes, gloves, or clothes, which constantly monitor vital parameters (blood pressure or heart beating), evidencing anomalies and generating alarms in case of illness. Applied to industrial environments, the technology inserted in wearable objects permits an addition of functions that make the user perceive a higher usefulness and protection level.…”
Section: Engineering Issues For Risk Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…Considering the technology available for risk management, we have categorized technologies and their capabilities of addressing problems as follows: Health monitoring and wearable objects: Technologies for users’ health have seen many progresses through wearable objects , such as shoes, gloves, or clothes, which constantly monitor vital parameters (blood pressure or heart beating), evidencing anomalies and generating alarms in case of illness. Applied to industrial environments, the technology inserted in wearable objects permits an addition of functions that make the user perceive a higher usefulness and protection level.…”
Section: Engineering Issues For Risk Managementmentioning
confidence: 99%
“…To wrap up, in the prototype, for each use case, we have evaluated: The quality of the generated events and alarms in terms of precision, correctness of response times and of addressed workers; The volume of data generated by the simulator to detect and to react to the dangerous event; this allowed us to estimate the quantity of data that need to be stored in the RMS repository for reporting and off‐line analysis (we consider that the system is able to support risk analysis, as explained in our previous research work ); The correctness of the model, to understand what elements need to be considered in detail (e.g., the definition of user roles and profiles), and which elements have been neglected. For instance, the topology of the work environment is fundamental to fine tune the action, such as an escape action, to be undertaken in the face of a risk event.…”
Section: The Prototypementioning
confidence: 99%
“…Military applications might also use a sensor network in order to identify ground targets [8] or hidden snipers in a combat area [24]. Workers may also be localised in order to warn them that they are trespassing a dangerous area in a factory [9].The common aspect among all these scenarios is that they all need precise measurements of the target position. Indeed, this is possible only if the calibration of the heterogeneous sensors is known and accurate.…”
Section: Introductionmentioning
confidence: 99%