Design and deployment challenges in immersive and wearable technologies

ABSTRACT The current century has brought an unimaginable growth in information and communications technology (ICT) and needs of enormous computing. The advancements in computer hardware and software particularly helped fuel the requirements of human beings, and revolutionized the smart products as an outcome. The advent of wearable devices from their development till successful materialisation has only taken less than a quarter of a century. The huge benefits of these smart wearable technologies cannot be fully enjoyed until and unless the reliability of a complete system is ensured. The reliability can be increased by the consistent advancements in hardware and software in parallel. User expectations actually are the challenges that keep the advancements alive while improving at an unmatchable pace. The future of wearable and other smart devices depends on whether they can provide a timely solution that is reliable, richer in resources, smaller in size, and cheaper in price. This paper addresses the threats and opportunities in the development and the acceptance of immersive and wearable technologies. The hardware and software challenges for the purpose of development are discussed to demonstrate the bottlenecks of the current technologies and the limitations that impose those bottlenecks. For the purpose of adoption, social and commercial challenges related to innovation and acceptability are discussed. The paper proposes guidelines that are expected to be applicable in several considerable applications of wearable technologies, for example, social networks, healthcare, and banking.

[1]  Jean-Yves Fourniols,et al.  Smart wearable systems: Current status and future challenges , 2012, Artif. Intell. Medicine.

[2]  M. Petre,et al.  Wearables , 2014 .

[3]  Basit Shahzad,et al.  Maximization of Tweet's viewership with respect to time , 2014, 2014 World Symposium on Computer Applications & Research (WSCAR).

[4]  Joel J. P. C. Rodrigues,et al.  Analysis of mobile health applications for a broad spectrum of consumers: A user experience approach , 2014, Health Informatics J..

[5]  Robert Ilg,et al.  An efficient robotic tendon for gait assistance. , 2006, Journal of biomechanical engineering.

[6]  V. Venkatesh,et al.  AGE DIFFERENCES IN TECHNOLOGY ADOPTION DECISIONS: IMPLICATIONS FOR A CHANGING WORK FORCE , 2000 .

[7]  Kashif Saleem,et al.  Empirical Studies of Bio-Inspired Self-Organized Secure Autonomous Routing Protocol , 2014, IEEE Sensors Journal.

[8]  Bruno M. C. Silva,et al.  An IoT-based mobile gateway for intelligent personal assistants on mobile health environments , 2016, J. Netw. Comput. Appl..

[9]  Haider Abbas,et al.  Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges , 2016, IEEE Access.

[10]  Azween Abdullah,et al.  A probabilistic model for risk forecasting in medical informatics , 2011, ICSE 2011.

[11]  Abdelouahid Derhab,et al.  Low delay and secure M2M communication mechanism for eHealthcare , 2014, 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom).

[12]  Joel J. P. C. Rodrigues,et al.  On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications , 2015, 2015 17th International Conference on E-health Networking, Application & Services (HealthCom).

[13]  Cason D. Schmit,et al.  The Role of Law in Supporting Secondary Uses of Electronic Health Information , 2015, Journal of Law, Medicine & Ethics.

[14]  B. Shahzad,et al.  Enhanced Risk Analysis-Relative Impact Factorization , 2005, 2005 International Conference on Information and Communication Technologies.

[15]  Jeremy Straub,et al.  OpenOrbiter: A Low-Cost, Educational Prototype CubeSat Mission Architecture , 2013 .

[16]  Mehmet Rasit Yuce,et al.  Review of Medical Implant Communication System (MICS) band and network , 2016, ICT Express.

[17]  S. Led,et al.  Design of a Wearable Device for ECG Continuous Monitoring Using Wireless Technology , 2004, The 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[18]  Joel J. P. C. Rodrigues,et al.  Digital signature of network segment for healthcare environments support , 2014 .

[19]  Mehmet A. Orgun,et al.  Ideas and Challenges for Securing Wireless Implantable Medical Devices: A Review , 2017, IEEE Sensors Journal.

[20]  Helena M. Mentis,et al.  Strategies for conducting situated studies of technology use in hospitals , 2015, Cognition, Technology & Work.

[21]  Hsien-Hsin S. Lee,et al.  Test Challenges for 3D Integrated Circuits , 2009, IEEE Design & Test of Computers.

[22]  Tao Zhang,et al.  Software for Wearable Devices: Challenges and Opportunities , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.

[23]  Abdelouahid Derhab,et al.  Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society , 2015, Comput. Hum. Behav..

[24]  Abdullah S. Al-Mudimigh,et al.  Empirical selection of risk identification methodology in software , 2010, 2010 2nd IEEE International Conference on Information Management and Engineering.

[25]  Timm Faulwasser,et al.  Towards pervasive computing in health care – A literature review , 2008, BMC Medical Informatics Decis. Mak..

[26]  Saudi Arabia,et al.  Software Risk Management and Avoidance Strategy , 2011 .

[27]  Gengfa Fang,et al.  Multiple ECG Fiducial Points-Based Random Binary Sequence Generation for Securing Wireless Body Area Networks , 2017, IEEE Journal of Biomedical and Health Informatics.

[28]  Abdullah S. Al-Mudimigh,et al.  Risk Identification, Mitigation and Avoidance Model for Handling Software Risk , 2010, 2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks.

[29]  Kashif Saleem,et al.  An Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARP , 2011, CISIS.

[30]  Rachel V. Rose,et al.  Appreciating Healthcare Data Privacy Laws in Canada, the United Kingdom, and the United States , 2014 .

[31]  Blaine A. Price,et al.  Wearables: has the age of smartwatches finally arrived? , 2015, Commun. ACM.

[32]  Michael M. Resch,et al.  Distributed Computing in a Heterogeneous Computing Environment , 1998, PVM/MPI.

[33]  Sophia Alim,et al.  Impact of social media usage on students academic performance in Saudi Arabia , 2015, Comput. Hum. Behav..

[34]  Xiaolei Dong,et al.  Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions , 2015, IEEE Wireless Communications.

[35]  B. Betts All-wireless on the rise [enterprise workplace networked communications] , 2014 .

[36]  P Lukowicz,et al.  Wearable Systems for Health Care Applications , 2004, Methods of Information in Medicine.

[37]  Susan A. Brown Household technology adoption, use, and impacts: Past, present, and future , 2008, Inf. Syst. Frontiers.

[38]  Guangjie Han,et al.  Mobile cloud computing in 5G: Emerging trends, issues, and challenges [Guest Editorial] , 2015, IEEE Netw..

[39]  박현길 Wearable Device 시장은 매력적일까 , 2014 .

[40]  Hsiao-Cheng Yu,et al.  Challenges to Global RFID Adoption , 2006, 2006 Technology Management for the Global Future - PICMET 2006 Conference.

[41]  Emil Jovanov,et al.  Guest Editorial Introduction to the Special Section on M-Health: Beyond Seamless Mobility and Global Wireless Health-Care Connectivity , 2004, IEEE Transactions on Information Technology in Biomedicine.

[42]  Basit Shahzad,et al.  Identification of Risk Factors in Large Scale Software Projects: A Quantitative Study , 2014, Int. J. Knowl. Soc. Res..

[43]  Dirk Helbing,et al.  Thinking Ahead - Essays on Big Data, Digital Revolution, and Participatory Market Society , 2015, Springer International Publishing.

[44]  Fred D. Davis A technology acceptance model for empirically testing new end-user information systems : theory and results , 1985 .

[45]  Gary Gereffi,et al.  Manufacturing Miracles: Paths of Industrialization in Latin America and East Asia , 1990 .

[46]  Al-Sakib Khan Pathan Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .

[47]  Vibhor Sharma,et al.  Near Field Communication , 2013, Encyclopedia of Biometrics.

[48]  Hadi Hariyanto,et al.  Emergency broadband access network using low altitude platform , 2009, International Conference on Instrumentation, Communication, Information Technology, and Biomedical Engineering 2009.

[49]  Jyh-Yeong Chang,et al.  Gaming control using a wearable and wireless EEG-based brain-computer interface device with novel dry foam-based sensors , 2012, Journal of NeuroEngineering and Rehabilitation.

[50]  S. Broadberry,et al.  India and the great divergence: an Anglo-Indian comparison of GDP per capita, 1600–1871 , 2015 .

[51]  Viktor K. Prasanna,et al.  Heterogeneous computing: challenges and opportunities , 1993, Computer.

[52]  J. Iqbal,et al.  Iterative project scheduling - a time bound technique , 2006, 2006 International Conference on Computing & Informatics.

[53]  Sanjiv D. Vaidya,et al.  Challenges in the adoption of E-Commerce technologies in India: The role of organizational factors , 2006, Int. J. Inf. Manag..

[54]  A. Feld,et al.  Social Media in the Health-Care Setting: Benefits but Also a Minefield of Compliance and Other Legal Issues , 2014, The American Journal of Gastroenterology.

[55]  E. Coiera Four rules for the reinvention of health care , 2004, BMJ : British Medical Journal.

[56]  Basit Shahzad,et al.  Effective risk mitigation: a user prospective , 2008 .

[57]  V. C. Padaki,et al.  Smart Vest: wearable multi-parameter remote physiological monitoring system. , 2008, Medical engineering & physics.

[58]  Basit Shahzad,et al.  When are Tweets Better Valued? An Empirical Study , 2014, J. Univers. Comput. Sci..

[59]  Athanasios K. Tsakalidis,et al.  Enhanced healthcare personnel rostering solution using mobile technologies , 2015, J. Syst. Softw..

[60]  Basit Shahzad,et al.  Risk Mitigation And Management Scheme Based On Risk Priority , 2010 .

[61]  Paul Jen-Hwa Hu,et al.  Information Technology Acceptance by Individual Professionals: A Model Comparison Approach , 2001, Decis. Sci..

[62]  Paul Lukowicz,et al.  Design of the QBIC wearable computing platform , 2004, Proceedings. 15th IEEE International Conference on Application-Specific Systems, Architectures and Processors, 2004..

[63]  Jaegon Jung,et al.  The Uses of the Smartphone for Doctors: An Empirical Study from Samsung Medical Center , 2011, Healthcare informatics research.

[64]  Qing Hu,et al.  Positioning Error Analysis of Ranging-Mode Using AIS Signals in China , 2016, J. Sensors.

[65]  Joel J. P. C. Rodrigues,et al.  Mobile-health: A review of current state in 2015 , 2015, J. Biomed. Informatics.

[66]  Zahid Ullah,et al.  Statistical methods for sustainable risk identification methodologies , 2010, 2010 2nd IEEE International Conference on Information Management and Engineering.

[67]  Chris Greenhalgh,et al.  Social Access vs. Privacy in Wearable Computing: A Case Study of Autism , 2015, IEEE Pervasive Computing.

[68]  Izak Benbasat,et al.  Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..

[69]  Yoshiyuki Sankai,et al.  Development of noise resistant hybrid capacitive-resistive electrodes for wearable robotics, computing and welfare , 2013, 2013 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[70]  Basit Shahzad,et al.  Does a Change in Weekend Days Have an Impact on Social Networking Activity? , 2014, J. Univers. Comput. Sci..

[71]  B. Shahzad,et al.  Identification of Methodology for Analysis of the Risk Factors in Software Development Environment , 2010 .

[72]  Kashif Saleem,et al.  Biological inspired secure autonomous routing mechanism for wireless sensor networks , 2011, Int. J. Intell. Inf. Database Syst..