2012
DOI: 10.1016/j.eswa.2011.11.061
|View full text |Cite
|
Sign up to set email alerts
|

A system for ubiquitous fall monitoring at home via a wireless sensor network and a wearable mote

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0
1

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 57 publications
(19 citation statements)
references
References 13 publications
0
18
0
1
Order By: Relevance
“…In Brezmes, Gorricho, and Cotrina (2009), it can be observed that the accelerometer sensor is placed in a glove and a multitude of activities are recognized depending on the movement of the hand. In contrast, other studies use either various sensors placed on many parts of the body (Bicocchi, Mamei, & Zambonelli, 2010;Lepri, Mana, Cappelletti, Pianesi, & Zancanaro, 2010) or a wearable wireless sensor node with a static wireless non-intrusive sensory infrastructure (Paoli, Fernández-Luque, & Zapata, 2011) to recognize these activities. According to certain comparative studies and previous research based on multiple sensors, these last two types of sensors provide greater accuracy.…”
Section: Introductionmentioning
confidence: 99%
“…In Brezmes, Gorricho, and Cotrina (2009), it can be observed that the accelerometer sensor is placed in a glove and a multitude of activities are recognized depending on the movement of the hand. In contrast, other studies use either various sensors placed on many parts of the body (Bicocchi, Mamei, & Zambonelli, 2010;Lepri, Mana, Cappelletti, Pianesi, & Zancanaro, 2010) or a wearable wireless sensor node with a static wireless non-intrusive sensory infrastructure (Paoli, Fernández-Luque, & Zapata, 2011) to recognize these activities. According to certain comparative studies and previous research based on multiple sensors, these last two types of sensors provide greater accuracy.…”
Section: Introductionmentioning
confidence: 99%
“…1 T , 2 T , 3 T are the boundary constraints, which meet the QoS constraints in cloud computing environment.…”
Section: Ant Colony Algorithm With Three Constraint Conditionsmentioning
confidence: 99%
“…For the cloud of job scheduling, Guo proposed the Meta-scheduling model and the Meta-scheduling policy of a cloud environment. The model and job scheduling strategy can ensure that the entire data center's power consumption or carbon dioxide emissions minimum [1]. Alrokayan uses the cloud to expand the cluster to deal with the local cluster resource scarcity, and use some job scheduling strategy to evaluate the performance of the job, analyze the resource cost.…”
Section: Introductionmentioning
confidence: 99%
“…By using the new technique, only legitimate users know the account name and password, so they can manipulate the data, no matter when and where customers are; they can obtain the adaptive sensing information as long as the readers which can be fixed or mobile are connected to the network [13].…”
Section: Introductionmentioning
confidence: 99%