Sensing Danger - Challenges in Supporting Health and Safety Compliance in the Field

Many workers operate in environments that are inherently hazardous and that are subject to strict health and safety rules and regulations. We envisage a world in which physical work artefacts such as tools, are augmented with intelligent mobile nodes that are able to observe the working activities taking place, evaluate compliance with health and safety regulations and assist or actively enforce compliance with these regulations. This vision creates a new field of work in the area of health and safety aware intelligent mobile sensor networks. In this paper we describe a number of new challenges faced when developing mobile systems for compliance with health and safety regulations.

[1]  Gerd Kortuem,et al.  Cooperative Artefacts: Assessing Real World Situations with Embedded Technology , 2004, UbiComp.

[2]  Wei Hong,et al.  TinyDB: an acquisitional query processing system for sensor networks , 2005, TODS.

[3]  Sanjeev Khanna,et al.  Data Provenance: Some Basic Issues , 2000, FSTTCS.

[4]  Kent Larson,et al.  Activity Recognition in the Home Using Simple and Ubiquitous Sensors , 2004, Pervasive.

[5]  Rong Zheng,et al.  Asynchronous wakeup for ad hoc networks , 2003, MobiHoc '03.

[6]  Emmanuel,et al.  Activity recognition in the home setting using simple and ubiquitous sensors , 2003 .

[7]  Deborah Estrin,et al.  The impact of data aggregation in wireless sensor networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.

[8]  David Kotz,et al.  Analysis of a Campus-Wide Wireless Network , 2002, MobiCom '02.

[9]  Kameswari Chebrolu,et al.  Wake-on-WLAN , 2006, WWW '06.

[10]  Michael C. Mozer,et al.  The Neural Network House: An Environment that Adapts to its Inhabitants , 1998 .

[11]  Jim E. Greer,et al.  Inspecting and Visualizing Distributed Bayesian Student Models , 2000, Intelligent Tutoring Systems.

[12]  Magdalena Balazinska,et al.  Characterizing mobility and network usage in a corporate wireless local-area network , 2003, MobiSys '03.

[13]  Nadine B. Sarter,et al.  Team Play with a Powerful and Independent Agent: Operational Experiences and Automation Surprises on the Airbus A-320 , 1997, Hum. Factors.

[14]  Suresh Singh,et al.  Greening of the internet , 2003, SIGCOMM '03.

[15]  Andreas Krause,et al.  Unsupervised, dynamic identification of physiological and activity context in wearable computing , 2003, Seventh IEEE International Symposium on Wearable Computers, 2003. Proceedings..

[16]  Aravind Srinivasan,et al.  A Client-Driven Approach for Channel Management in Wireless LANs , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[17]  Amin Vahdat,et al.  Managing energy and server resources in hosting centers , 2001, SOSP.

[18]  Bashar Nuseibeh,et al.  Keeping ubiquitous computing to yourself: A practical model for user control of privacy , 2005, Int. J. Hum. Comput. Stud..

[19]  Yogesh L. Simmhan,et al.  A survey of data provenance in e-science , 2005, SGMD.

[20]  Andrew Lum Scrutable User Models in Decentralised Adaptive Systems , 2003, User Modeling.