Sensing Danger - Challenges in Supporting Health and Safety Compliance in the Field

Many workers operate in environments that are inherently hazardous and that are subject to strict health and safety rules and regulations. We envisage a world in which physical work artefacts such as tools, are augmented with intelligent mobile nodes that are able to observe the working activities taking place, evaluate compliance with health and safety regulations and assist or actively enforce compliance with these regulations. This vision creates a new field of work in the area of health and safety aware intelligent mobile sensor networks. In this paper we describe a number of new challenges faced when developing mobile systems for compliance with health and safety regulations.

[1]  Gerd Kortuem,et al.  Cooperative Artefacts: Assessing Real World Situations with Embedded Technology , 2004, UbiComp.

[2]  Bashar Nuseibeh,et al.  Keeping ubiquitous computing to yourself: A practical model for user control of privacy , 2005, Int. J. Hum. Comput. Stud..

[3]  Yogesh L. Simmhan,et al.  A survey of data provenance in e-science , 2005, SGMD.

[4]  Andreas Krause,et al.  Unsupervised, dynamic identification of physiological and activity context in wearable computing , 2003, Seventh IEEE International Symposium on Wearable Computers, 2003. Proceedings..

[5]  Deborah Estrin,et al.  The impact of data aggregation in wireless sensor networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.

[6]  Michael C. Mozer,et al.  The Neural Network House: An Environment that Adapts to its Inhabitants , 1998 .

[7]  Andrew Lum Scrutable User Models in Decentralised Adaptive Systems , 2003, User Modeling.

[8]  Nadine B. Sarter,et al.  Team Play with a Powerful and Independent Agent: Operational Experiences and Automation Surprises on the Airbus A-320 , 1997, Hum. Factors.

[9]  Emmanuel,et al.  Activity recognition in the home setting using simple and ubiquitous sensors , 2003 .

[10]  Sanjeev Khanna,et al.  Data Provenance: Some Basic Issues , 2000, FSTTCS.

[11]  Rong Zheng,et al.  Asynchronous wakeup for ad hoc networks , 2003, MobiHoc '03.

[12]  Jim E. Greer,et al.  Inspecting and Visualizing Distributed Bayesian Student Models , 2000, Intelligent Tutoring Systems.

[13]  Wei Hong,et al.  TinyDB: an acquisitional query processing system for sensor networks , 2005, TODS.