Pub Date : 1900-01-01DOI: 10.1109/COMSNETS.2017.7945390
M. Roy, C. Chowdhury, N. Aslam
Advancement of medical science brings together new trend of proactive health care which gives rise to the era of Wireless Body Area Networks (WBAN). A number of issues including energy efficiency, reliability, optimal use of network bandwidth need to be considered for designing any multi-hop communication protocol for WBANs. Energy consumption depends on many factors like amount and frequency of forwarding traffic, node activity, distance from sink etc. Energy consumption gives rise to other issues like heated nodes. Existing routing protocols are mostly single hop or multi-hop, and generally focus on one issue ignoring the others. In this paper, we first identify the sources of energy drain, and then propose a 2-hop cost based energy efficient routing protocol for WBAN that formulates the energy drain of a node due to various reasons and incorporates it in the routing decision. Relative node mobility due to posture change is also considered here. The protocol is simulated in Castalia simulator and compared with state of the art protocols. It is found to outperform state of the art protocols in terms of packet delivery ratio for a given transmission power level. Moreover, only a small number of relays are found to be sufficient to stabilize packet delivery ratio.
{"title":"Designing an energy efficient WBAN routing protocol","authors":"M. Roy, C. Chowdhury, N. Aslam","doi":"10.1109/COMSNETS.2017.7945390","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945390","url":null,"abstract":"Advancement of medical science brings together new trend of proactive health care which gives rise to the era of Wireless Body Area Networks (WBAN). A number of issues including energy efficiency, reliability, optimal use of network bandwidth need to be considered for designing any multi-hop communication protocol for WBANs. Energy consumption depends on many factors like amount and frequency of forwarding traffic, node activity, distance from sink etc. Energy consumption gives rise to other issues like heated nodes. Existing routing protocols are mostly single hop or multi-hop, and generally focus on one issue ignoring the others. In this paper, we first identify the sources of energy drain, and then propose a 2-hop cost based energy efficient routing protocol for WBAN that formulates the energy drain of a node due to various reasons and incorporates it in the routing decision. Relative node mobility due to posture change is also considered here. The protocol is simulated in Castalia simulator and compared with state of the art protocols. It is found to outperform state of the art protocols in terms of packet delivery ratio for a given transmission power level. Moreover, only a small number of relays are found to be sufficient to stabilize packet delivery ratio.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121720733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/COMSNETS.2017.7945449
Akhil Shetty, Sharayu Moharir
Studies on creativity, largely recognized as a precursor to innovation, have rapidly multiplied in the recent past. In particular, the impact of social network parameters on creativity has received increased attention. As an individual's social network regulates access to diverse ideas and perspectives, it has been observed to play a pivotal role in influencing creativity. In this paper, we propose a model which encapsulates the relationship between creativity and several social network parameters. We show that our model is consistent with the results of empirical studies in this domain. We also suggest how organizations could use our model to modify their network structure so as to boost creativity.
{"title":"Modeling creativity in social networks","authors":"Akhil Shetty, Sharayu Moharir","doi":"10.1109/COMSNETS.2017.7945449","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945449","url":null,"abstract":"Studies on creativity, largely recognized as a precursor to innovation, have rapidly multiplied in the recent past. In particular, the impact of social network parameters on creativity has received increased attention. As an individual's social network regulates access to diverse ideas and perspectives, it has been observed to play a pivotal role in influencing creativity. In this paper, we propose a model which encapsulates the relationship between creativity and several social network parameters. We show that our model is consistent with the results of empirical studies in this domain. We also suggest how organizations could use our model to modify their network structure so as to boost creativity.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122700318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/COMSNETS.2017.7945404
N. Sharma, G. R. M. Reddy
In this paper, we propose a branch-and-bound based exact algorithm for allocating multi-dimensional variable sized VMs at the cloud data center. Further, an energy efficient VMs migration technique is proposed to reduce the energy consumption and thus avoids the Service Level Agreement (SLA) violation at the cloud data center.
{"title":"A novel approach for multi-dimensional variable sized virtual machine allocation and migration at cloud data center","authors":"N. Sharma, G. R. M. Reddy","doi":"10.1109/COMSNETS.2017.7945404","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945404","url":null,"abstract":"In this paper, we propose a branch-and-bound based exact algorithm for allocating multi-dimensional variable sized VMs at the cloud data center. Further, an energy efficient VMs migration technique is proposed to reduce the energy consumption and thus avoids the Service Level Agreement (SLA) violation at the cloud data center.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"668 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122965876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/COMSNETS.2017.7945392
Shilpa Rao, R. Shorey
Internet of things (IoT) encompass a plethora of connected smart devices and support diverse applications. IoT is likely to be an integral feature of next generation cellular systems. In the manufacturing and supply chain industry, the Industrial IoT (IIoT), which consists of sensors, actuators and machinery, is deployed for monitoring, data collection and analysis, asset management, maintenance planning, and plant control and optimization. In this work, we consider the uplink transmission of an IIoT system, in which the IoT devices transmit their data to the Base Station (BS) through User Equipments (UEs). The BS, in turn, transmits the data to the cloud for further processing. The UEs receive the data from the IoT devices, aggregate with their uplink data, and transmit the aggregated data to the BS. Our investigation shows that the IoT devices require less transmit energy when UEs are used as relays. We study the system when the IoT devices associate themselves with the UEs through the fixed, random, and greedy schemes, and evaluate the end-to-end outage probability at the devices for each of the three schemes. We show that the greedy association scheme has the minimum outage probability at the IoT device. We study the effect of the number of IoT devices, the number of UEs, the data arrival rates at the IoT devices, and the uplink data evolution process of UEs on the outage probability, and draw meaningful insights into IIoT system design.
{"title":"Efficient device-to-device association and data aggregation in industrial IoT systems","authors":"Shilpa Rao, R. Shorey","doi":"10.1109/COMSNETS.2017.7945392","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945392","url":null,"abstract":"Internet of things (IoT) encompass a plethora of connected smart devices and support diverse applications. IoT is likely to be an integral feature of next generation cellular systems. In the manufacturing and supply chain industry, the Industrial IoT (IIoT), which consists of sensors, actuators and machinery, is deployed for monitoring, data collection and analysis, asset management, maintenance planning, and plant control and optimization. In this work, we consider the uplink transmission of an IIoT system, in which the IoT devices transmit their data to the Base Station (BS) through User Equipments (UEs). The BS, in turn, transmits the data to the cloud for further processing. The UEs receive the data from the IoT devices, aggregate with their uplink data, and transmit the aggregated data to the BS. Our investigation shows that the IoT devices require less transmit energy when UEs are used as relays. We study the system when the IoT devices associate themselves with the UEs through the fixed, random, and greedy schemes, and evaluate the end-to-end outage probability at the devices for each of the three schemes. We show that the greedy association scheme has the minimum outage probability at the IoT device. We study the effect of the number of IoT devices, the number of UEs, the data arrival rates at the IoT devices, and the uplink data evolution process of UEs on the outage probability, and draw meaningful insights into IIoT system design.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"90-C 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123465704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/COMSNETS.2017.7945414
Dr. Mahadev A. Gawas, L. Gudino, K. Anupama
Cooperative communication in VANET has become the de-facto in enabling technology to improve safety and efficiency on inter-vehicle communication (IVC). The safety related messages broadcast on emergency must have a minimum delay and high reliability. This paper proposes a cross-layer approach to efficiently broadcast the safety messages by minimizing the message redundancy and maintaining low end-to-end communication delays. We propose a scheme to select a one-hop neighbor relay as a potential forwarder for relaying the broadcast messages to improve the transmission reliability in a platoon of vehicles. The relay selection metrics compose of vehicular density, velocity, and the geographical location. The selected relay controls the broadcast messages with minimum overhead and with minimum bandwidth consumption. Similarly, a multimedia emergency message needs high priority with a shorter transmission delay. To provide the service differentiation to different traffic classes, we adopt 802.11e MAC. The cross layer is further extended to the transport layer to dynamically adapt the data transmission rate based on the physical channel state. The extensive simulation analysis conducted reveals that the proposed cross-layer scheme effectively propagates the critical broadcast messages with lesser packet latency and higher packet delivery ratio.
{"title":"Cross layer approach for effective multi hop broadcast in VANET","authors":"Dr. Mahadev A. Gawas, L. Gudino, K. Anupama","doi":"10.1109/COMSNETS.2017.7945414","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945414","url":null,"abstract":"Cooperative communication in VANET has become the de-facto in enabling technology to improve safety and efficiency on inter-vehicle communication (IVC). The safety related messages broadcast on emergency must have a minimum delay and high reliability. This paper proposes a cross-layer approach to efficiently broadcast the safety messages by minimizing the message redundancy and maintaining low end-to-end communication delays. We propose a scheme to select a one-hop neighbor relay as a potential forwarder for relaying the broadcast messages to improve the transmission reliability in a platoon of vehicles. The relay selection metrics compose of vehicular density, velocity, and the geographical location. The selected relay controls the broadcast messages with minimum overhead and with minimum bandwidth consumption. Similarly, a multimedia emergency message needs high priority with a shorter transmission delay. To provide the service differentiation to different traffic classes, we adopt 802.11e MAC. The cross layer is further extended to the transport layer to dynamically adapt the data transmission rate based on the physical channel state. The extensive simulation analysis conducted reveals that the proposed cross-layer scheme effectively propagates the critical broadcast messages with lesser packet latency and higher packet delivery ratio.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"17 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132546584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/COMSNETS.2017.7945446
Romil Roy, Rajlakshmi Guha, S. D. Bhattacharya, J. Mukhopadhyay
College mental health is an area of significant importance. A number of stressors relating to career, relationships and life events collide during this life phase, when young adults learn to be autonomous. A major developmental task is making appropriate life choices in the face of freedom and contradictory messages from a wide range of sources. Thus identifying individuals in distress and building means to promote resilience would be relevant to any college setting. Resilience building has been a major area of concern to educators across the world. The main reason is that it is impossible to conduct face to face counselling on several occasions in a large college setting. This present study aims to build a web-based multi-step cognitive restructuring program to help young adults identify and deal with maladaptive, negative thoughts, and emotions, thereby effectively attempting to promote resilience, and improve psychological health among college students. Considering the sensitivity of the data present in the system, it has been developed following the multitier architecture with an intention to block access by unauthorized users. The system is meant to be interactive and regular feedback should be taken from the subjects. The counsellor should be given access to the full information of the subjects for evaluation. Additional tools for psychological assessment can be incorporated by the therapist into the system for an individual subject, if further evaluations are required. The system offers a generic platform for the development of other web-based interactive Computer Assisted Cognitive Behavioural Training programs addressing needs of specific populations.
{"title":"Building a web based cognitive restructuring program for promoting resilience in a college campus","authors":"Romil Roy, Rajlakshmi Guha, S. D. Bhattacharya, J. Mukhopadhyay","doi":"10.1109/COMSNETS.2017.7945446","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945446","url":null,"abstract":"College mental health is an area of significant importance. A number of stressors relating to career, relationships and life events collide during this life phase, when young adults learn to be autonomous. A major developmental task is making appropriate life choices in the face of freedom and contradictory messages from a wide range of sources. Thus identifying individuals in distress and building means to promote resilience would be relevant to any college setting. Resilience building has been a major area of concern to educators across the world. The main reason is that it is impossible to conduct face to face counselling on several occasions in a large college setting. This present study aims to build a web-based multi-step cognitive restructuring program to help young adults identify and deal with maladaptive, negative thoughts, and emotions, thereby effectively attempting to promote resilience, and improve psychological health among college students. Considering the sensitivity of the data present in the system, it has been developed following the multitier architecture with an intention to block access by unauthorized users. The system is meant to be interactive and regular feedback should be taken from the subjects. The counsellor should be given access to the full information of the subjects for evaluation. Additional tools for psychological assessment can be incorporated by the therapist into the system for an individual subject, if further evaluations are required. The system offers a generic platform for the development of other web-based interactive Computer Assisted Cognitive Behavioural Training programs addressing needs of specific populations.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131385400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/COMSNETS.2017.7945373
Madanagopal Ramachandran, K. Sivalingam
Service providers employ different transport technologies like PDH, SDH/SONET, WDM/DWDM, ATM, DSL etc. to support different types of traffic and service requirements. Dynamic service provisioning requires the use of on-line algorithms which automatically compute the path to be taken to satisfy the given service request. Transport networks are deployed such that they follow different topologies such as linear, ring, mesh, protected linear, dual homing etc. In this work, a new mechanism for path computation is proposed. Here, two types of graphs are considered: a super graph containing the topologies as nodes and common nodes as edges and the base graph containing network elements as nodes and physical links as edges. An algorithm to compute the best path taking into account the topologies present in the super graph and then finding the basic path from the topology path is proposed. It takes into account topologies with and without protection and protection path is found wherever required. When every edge in the network belongs to a topology, then the performance of the proposed algorithms is much better when compared with the traditional path computation algorithms. But, when many of the edges do not belong to any topology in the network, then the performance of the algorithms were poor when compared with the traditional path computation algorithms.
{"title":"Topology based path computation for provisioning in transport networks","authors":"Madanagopal Ramachandran, K. Sivalingam","doi":"10.1109/COMSNETS.2017.7945373","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945373","url":null,"abstract":"Service providers employ different transport technologies like PDH, SDH/SONET, WDM/DWDM, ATM, DSL etc. to support different types of traffic and service requirements. Dynamic service provisioning requires the use of on-line algorithms which automatically compute the path to be taken to satisfy the given service request. Transport networks are deployed such that they follow different topologies such as linear, ring, mesh, protected linear, dual homing etc. In this work, a new mechanism for path computation is proposed. Here, two types of graphs are considered: a super graph containing the topologies as nodes and common nodes as edges and the base graph containing network elements as nodes and physical links as edges. An algorithm to compute the best path taking into account the topologies present in the super graph and then finding the basic path from the topology path is proposed. It takes into account topologies with and without protection and protection path is found wherever required. When every edge in the network belongs to a topology, then the performance of the proposed algorithms is much better when compared with the traditional path computation algorithms. But, when many of the edges do not belong to any topology in the network, then the performance of the algorithms were poor when compared with the traditional path computation algorithms.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127660714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/COMSNETS.2017.7945419
K. Kumar, Shibu Manuel, Deepu Benson
Identifying influential nodes in complex networks has attracted much attention because of its great theoretical significance and wide application. The m-Ranking method takes into account degree of all nodes and weight of all edges to rank nodes of the network with different weight. This ranking method can be used for unweighted networks also by fixing the value of the parameter α = 1. In addition, we demonstrate our new method on a real air traffic network and show that the ranks calculated using the new method is more meaningful compared with other methods.
{"title":"The m-Ranking of nodes in complex networks","authors":"K. Kumar, Shibu Manuel, Deepu Benson","doi":"10.1109/COMSNETS.2017.7945419","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945419","url":null,"abstract":"Identifying influential nodes in complex networks has attracted much attention because of its great theoretical significance and wide application. The m-Ranking method takes into account degree of all nodes and weight of all edges to rank nodes of the network with different weight. This ranking method can be used for unweighted networks also by fixing the value of the parameter α = 1. In addition, we demonstrate our new method on a real air traffic network and show that the ranks calculated using the new method is more meaningful compared with other methods.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"10 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133086661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/COMSNETS.2017.7945388
Madanagopal Ramachandran, K. Sivalingam
Synchronous Digital Hierarchy (SDH) is a widely used technology in access and core networks for carrying different types of traffic. It defines a hierarchy for multiplexing lower rate traffic containers into higher rate traffic containers. Provisioning refers to the process of allocation of resources to carry a given traffic demand. Due to the continued expansion of the networks employing SDH technology, the power consumption of the network increases becoming a bottleneck for further expansion. Allocation of resources to traffic demands in power-efficient ways will therefore help in minimizing the capital and operational costs in running the network. In this work, the power consumed by a switch matrix having the capability to switch different traffic containers in different amounts is considered. The objective is to minimize the number of network elements deployed in the network by allocating resources to traffic demands in power-efficient ways. A formulation based on Integer Linear Programming (ILP) is presented; three different heuristic approaches, based on how higher order trails are used and the use of grooming, are proposed. It is found that the grooming-based heuristic performs better in terms of the total power consumption relative to the weighted number of requests accepted. It is also found that, for small networks, the grooming heuristic performs identical to the optimal solution found by an LP solver when the problem is feasible. It can be noted that the power-efficient design is also a cost-efficient design since the capacity of the switch matrix determines the number of network elements that are required for deployment in the network.
{"title":"Power efficient resource allocation algorithms for provisioning in SDH networks","authors":"Madanagopal Ramachandran, K. Sivalingam","doi":"10.1109/COMSNETS.2017.7945388","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945388","url":null,"abstract":"Synchronous Digital Hierarchy (SDH) is a widely used technology in access and core networks for carrying different types of traffic. It defines a hierarchy for multiplexing lower rate traffic containers into higher rate traffic containers. Provisioning refers to the process of allocation of resources to carry a given traffic demand. Due to the continued expansion of the networks employing SDH technology, the power consumption of the network increases becoming a bottleneck for further expansion. Allocation of resources to traffic demands in power-efficient ways will therefore help in minimizing the capital and operational costs in running the network. In this work, the power consumed by a switch matrix having the capability to switch different traffic containers in different amounts is considered. The objective is to minimize the number of network elements deployed in the network by allocating resources to traffic demands in power-efficient ways. A formulation based on Integer Linear Programming (ILP) is presented; three different heuristic approaches, based on how higher order trails are used and the use of grooming, are proposed. It is found that the grooming-based heuristic performs better in terms of the total power consumption relative to the weighted number of requests accepted. It is also found that, for small networks, the grooming heuristic performs identical to the optimal solution found by an LP solver when the problem is feasible. It can be noted that the power-efficient design is also a cost-efficient design since the capacity of the switch matrix determines the number of network elements that are required for deployment in the network.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131295649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/COMSNETS.2017.7945448
Anshul Basra, Bodhibrata Mukhopadhyay, Subrat Kar
Measurement of respiration rate is a vital parameter for adequate health monitoring. An abnormal respiration rate can indicate a variety of pathological conditions like respiratory, cardiovascular and metabolic disorders. We have developed a non-invasive, portable, easy to use and economic respiratory sensor. It measures the temperature difference between inhalation and exhalation phases of respiratory cycle. The difference in temperature has been converted into a digital signal using 8 bit microcontroller (Atmega 328). By analyzing the digital signal, we can detect abnormalities like tachypnea, bradypnea and apnea. To track the unusual or sudden change in respiratory rate a buzzer system has been incorporated with the device. Graphical recordings corresponding to the calculated respiratory rate has been simultaneously obtained for the reference. This device can be used to detect sleeping disorder and abnormal respiration rate.
{"title":"Temperature sensor based ultra low cost respiration monitoring system","authors":"Anshul Basra, Bodhibrata Mukhopadhyay, Subrat Kar","doi":"10.1109/COMSNETS.2017.7945448","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945448","url":null,"abstract":"Measurement of respiration rate is a vital parameter for adequate health monitoring. An abnormal respiration rate can indicate a variety of pathological conditions like respiratory, cardiovascular and metabolic disorders. We have developed a non-invasive, portable, easy to use and economic respiratory sensor. It measures the temperature difference between inhalation and exhalation phases of respiratory cycle. The difference in temperature has been converted into a digital signal using 8 bit microcontroller (Atmega 328). By analyzing the digital signal, we can detect abnormalities like tachypnea, bradypnea and apnea. To track the unusual or sudden change in respiratory rate a buzzer system has been incorporated with the device. Graphical recordings corresponding to the calculated respiratory rate has been simultaneously obtained for the reference. This device can be used to detect sleeping disorder and abnormal respiration rate.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115729405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}