Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2013 Jan 31;13(2):1787-835.
doi: 10.3390/s130201787.

Combining wireless sensor networks and semantic middleware for an Internet of Things-based sportsman/woman monitoring application

Affiliations

Combining wireless sensor networks and semantic middleware for an Internet of Things-based sportsman/woman monitoring application

Jesús Rodríguez-Molina et al. Sensors (Basel). .

Abstract

Wireless Sensor Networks (WSNs) are spearheading the efforts taken to build and deploy systems aiming to accomplish the ultimate objectives of the Internet of Things. Due to the sensors WSNs nodes are provided with, and to their ubiquity and pervasive capabilities, these networks become extremely suitable for many applications that so-called conventional cabled or wireless networks are unable to handle. One of these still underdeveloped applications is monitoring physical parameters on a person. This is an especially interesting application regarding their age or activity, for any detected hazardous parameter can be notified not only to the monitored person as a warning, but also to any third party that may be helpful under critical circumstances, such as relatives or healthcare centers. We propose a system built to monitor a sportsman/woman during a workout session or performing a sport-related indoor activity. Sensors have been deployed by means of several nodes acting as the nodes of a WSN, along with a semantic middleware development used for hardware complexity abstraction purposes. The data extracted from the environment, combined with the information obtained from the user, will compose the basis of the services that can be obtained.

PubMed Disclaimer

Figures

Figure 1.
Figure 1.
Dependence relations among the main components of a ubiquitous system.
Figure 2.
Figure 2.
Ontology example.
Figure 3.
Figure 3.
Internetworking model within the Wireless Sensor Network.
Figure 4.
Figure 4.
Sequence diagram for a simple service.
Figure 5.
Figure 5.
Sequence diagram for a composed service.
Figure 6.
Figure 6.
Use cases of the scenario.
Figure 7.
Figure 7.
A holistic view of the system.
Figure 8.
Figure 8.
Subsystems diagram of our system.
Figure 9.
Figure 9.
User Interaction subsystem and its inner components.
Figure 10.
Figure 10.
Graphic User Interface of the Lifewear mobile application. Profile registration and body sensor checking procedures.
Figure 11.
Figure 11.
Graphic User Interface of the Lifewear mobile application. Login and training screenshots.
Figure 12.
Figure 12.
Graphic User Interface of the Lifewear mobile application. Real time data.
Figure 13.
Figure 13.
Service Management subsystem and its inner components.
Figure 14.
Figure 14.
Class diagram of the Broker.
Figure 15.
Figure 15.
Interrelating class diagram of the Orchestrator and Orchestrator alarms agents.
Figure 16.
Figure 16.
Context Data Collection subsystem and its inner components.
Figure 17.
Figure 17.
Class diagram of the temperature agents.
Figure 18.
Figure 18.
Bluetooth Management subsystem and its inner components.
Figure 19.
Figure 19.
Interrelating class diagrams of Zephyr and alarm agents.
Figure 20.
Figure 20.
Gymnasium deployment of the system.
Figure 21.
Figure 21.
Time used in setting up the WSN (25 attempts).
Figure 22.
Figure 22.
Time used to answer temperature requests.
Figure 23.
Figure 23.
Time used in completing body temperature request (25 attempts).
Figure 24.
Figure 24.
Time used in completing injury prevention service request (25 attempts).
Figure 25.
Figure 25.
Time used in completing temperature control service request (25 attempts).
Figure 26.
Figure 26.
Time used in completing a node reset (25 attempts).
Figure 27.
Figure 27.
Time used in establishing a ZephyrBT-Bioharness connection (10 attempts).
Figure 28.
Figure 28.
Time used in transferring an alarm from the node to the belt (10 attempts).

References

    1. Huang Y., Li G. A Semantic Analysis for Internet of Things. Proceeding of the International Conference on Intelligent Computation Technology and Automation; Changsha, China. 11–12 May 2010; pp. 336–339.
    1. Coetzee L., Eksteen J. The Internet of Things-Promise for the Future? An Introduction. Proceeding of the IST-Africa Conference; Gaborone, Botswana. 11–13 May 2011; pp. 1–9.
    1. Ma H.D. Internet of things: Objectives and scientific challenges. J. Comput. Sci. Technol. 2011;26:919–924.
    1. Song Z.F., Zhang Y.L., Wu C.M. A Reliable Transmission Scheme for Security and Protection System based on Internet of Things. Proceeding of the IET International Conference on Communication Technology and Application; Beijing, China. 14–16 October 2011; pp. 806–810.
    1. Gessner D., Olivereau A., Segura A.S., Serbanati A. Trustworthy Infrastructure Services for a Secure and Privacy-Respecting Internet of Things. Proceeding of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications; Liverpool, UK. 25– 27 June 2012; pp. 998–1003.

Publication types