فهرست:
چکیده.................................................................................................................................. 1
فصل اول – کلیات تحقیق
1-1 مقدمه............................................................................................................................ 3
1-1-1 تاریخچه رایانش ابری................................................................................................. 4
1-1-2 تاریخچه محاسبات ابری موبایل.................................................................................... 4
1-1-3 تاریخچه کامپیوترهای پوشیدنی.................................................................................... 4
1-2 بیان مسأله..................................................................................................................... 6
1-3 اهمیت و ضرورت تحقیق............................................................................................... 6
1-4 اهداف تحقیق................................................................................................................ 8
1-5 فرضیههای تحقیق........................................................................................................... 9
1-6 ساختار پایاننامه............................................................................................................. 9
فصل دوم- ادبیات و سابقه پژوهش
2-1 مقدمه......................................................................................................................... 11
2-2 ادبیات تحقیق.............................................................................................................. 12
2-2-1 کاربردهای محاسبات پوشیدنی.................................................................................. 12
2-2-2 تحملپذیری خطا در محاسبات پوشیدنی..................................................................... 14
2-3 اتکاپذیری................................................................................................................... 16
2-3-1 ویژگیهای اتکاپذیری یک سیستم............................................................................ 17
2-3-2 تهدیدها.................................................................................................................. 18
2-3-3 ابزارهای اتکاپذیری................................................................................................. 21
2-4 رهیافتهای تحملپذیری خطا....................................................................................... 22
2-5 جنبههای مختلف تحملپذیری خطا در محاسبات پوشیدنی................................................. 25
2-5-1 سختافزار.............................................................................................................. 26
2-5-1-1 کشف و جداسازی سنسورهای معیوب................................................................... 27
2-5-2 نرمافزار.................................................................................................................. 29
2-5-3 انرژی.................................................................................................................... 31
2-5-4 ارتباطات................................................................................................................ 33
2-5-5 معماری.................................................................................................................. 37
2-6 مدیریت منبع و نحوهی دسترسی به آن........................................................................... 37
2-7 self-healing.............................................................................................................. 38
2-8 نتیجهگیری................................................................................................................. 39
فصل سوم- معماری پیشنهادی
3-1 مقدمه......................................................................................................................... 41
3-2 معماری پیشنهادی....................................................................................................... 41
3-3 یک چارچوب تحمل خطا برای محاسبات پوشیدنی.......................................................... 48
3-3-1 Body Nodeها........................................................................................................ 48
3-3-2 Master Nodeها..................................................................................................... 64
3-3-2-1 Master Node فیزیکی........................................................................................ 64
3-3-2-2 Master Node مجازی......................................................................................... 70
3-3-2-3 شبکههای چند Master Nodeی........................................................................... 72
3-3-3 طراحی ارگونومی.................................................................................................... 78
3-3-4 تحمل خطای شفاف................................................................................................. 78
3-3-5 مدیریت خطا در معماری سه لایهای ارائه شده.................................................................... 79
3-3-6 Mobile Nodeها..................................................................................................... 80
فصل چهارم- جمعبندی و نتیجهگیری
4-1 مقدمه......................................................................................................................... 88
4-2 تعاریف پایه................................................................................................................ 88
4-3 اتکاپذیری................................................................................................................... 89
4-4 محاسبه اتکاپذیری با استفاده از بلوک دیاگرامهای قابلیت اطمینان................................... 90
4-5 افزونگی TMR............................................................................................................ 91
4-6 افزونگی standby........................................................................................................ 92
4-7 ارزیابی قابلیت اطمینان گره Body Node....................................................................... 95
4-8 ارزیابی قابلیت اطمینان گره Master Node................................................................... 99
4-9 ارزیابی قابلیت اطمینان معماری سه لایهای ارائه شده..................................................... 102
فصل پنجم- پیشنهادات و کارهای آتی
5-1 نتیجهگیری کلی........................................................................................................ 106
5-2 پیشنهادات................................................................................................................ 107
منابع و مآخذ.................................................................................................................... 110
منبع:
[1] V. Bajalan, F. A. Mohammadi, and A. Fathi, "Toward a Fault Tolerant Architecture for Wearable Computing," Submited, 2013.
[2] M. Aleksy, M. J. Rissanen, S. Maczey, and M. Dix, "Wearable Computing in Industrial Service Applications,"Procedia Computer Science, vol. 5, pp. 394-400, 2011.
[3] J. F. Knight and C. Baber, "Assessing the physical loading of wearable computers,"Appl Ergon, vol. 38, pp. 237-47, Mar 2007.
[4] M. Satyanarayanan, "Mobile computing: the next decade,"ACM SIGMOBILE Mobile Computing and Communications Review, vol. 15, pp. 2-10, 2011.
[5] N. Fernando, S. W. Loke, and W. Rahayu, "Mobile cloud computing: A survey,"Future Generation Computer Systems, vol. 29, pp. 84-106, 2013.
[6] O. Kuyoro'Shade, I. Frank, and A. Oludele, "Cloud Computing Security Issues and Challenges,"International Journal, vol. 3, 2011.
[7] B. L. Sahu and R. Tiwari, "A Comprehensive Study on Cloud Computing,"International Journal of Advanced Research in Computer Science and Software Engineering ISSN, vol. 2277, 2012.
[8] J. M. Chaquet, E. J. Carmona, and A. Fernández-Caballero, "A survey of video datasets for human action and activity recognition,"Computer Vision and Image Understanding, vol. 117, pp. 633-659, 2013.
[9] Y. Nam, S. Rho, and C. Lee, "Physical activity recognition using multiple sensors embedded in a wearable device,"ACM Transactions on Embedded Computing Systems, vol. 12, pp. 1-14, 2013.
[10] L. Wang, T. Gu, X. Tao, and J. Lu, "A hierarchical approach to real-time activity recognition in body sensor networks,"Pervasive and Mobile Computing, vol. 8, pp. 115-130, 2012.
[11] L. Wang, T. Gu, X. Tao, H. Chen, and J. Lu, "Recognizing multi-user activities using wearable sensors in a smart home,"Pervasive and Mobile Computing, vol. 7, pp. 287-298, 2011.
[12] A. C. Daniel Roggen1, Kilian Förster 1, Gerhard Tröster 1, Paul Lukowicz2,, A. F. David Bannach2, Marc Kurz 3, Gerold Hölzl3, Hesam Sagha4,, and J. d. R. M. Hamidreza Bayati4, Ricardo Chavarriaga 4, "Activity Recognition in Opportunistic Sensor Environments,"Procedia Computer Science, 2011.
[13] A. Boubezoul, S. Espié, B. Larnaudie, and S. Bouaziz, "A simple fall detection algorithm for powered two wheelers,"Control Engineering Practice, vol. 21, pp. 286-297, 2013.
[14] M. Mubashir, L. Shao, and L. Seed, "A survey on fall detection: Principles and approaches,"Neurocomputing, vol. 100, pp. 144-152, 2013.
[15] M. D. L.-J. A. F. V. Juan E. Garrido-Víctor M.R. Penichet, "Falls and Fainting Detection through MovementInteraction," Management, Design, Human Factors., 2012.
[16] R. Paoli, F. J. Fernández-Luque, G. Doménech, F. Martínez, J. Zapata, and R. Ruiz, "A system for ubiquitous fall monitoring at home via a wireless sensor network and a wearable mote,"Expert Systems with Applications, vol. 39, pp. 5566-5575, 2012.
[17] M. N. Nyan, F. E. Tay, and E. Murugasu, "A wearable system for pre-impact fall detection,"J Biomech, vol. 41, pp. 3475-81, Dec 5 2008.
[18] J. H. Bergmann, V. Chandaria, and A. McGregor, "Wearable and implantable sensors: the patient's perspective,"Sensors (Basel), vol. 12, pp. 16695-709, 2012.
[19] M. Vidal, J. Turner, A. Bulling, and H. Gellersen, "Wearable eye tracking for mental health monitoring,"Computer Communications, vol. 35, pp. 1306-1311, 2012.
[20] S. J.-T. Pederson, "A Wearable Kids’ Health Monitoring System onSmartphone,"Pervasive healthcare; Ubiquitous Computing; Wearablecomputing; Mobile computing; Health monitoring system., 2012.
[21] Y. Meng and H.-C. Kim, "Wearable Systems and Applications for Healthcare," pp. 325-330, 2011.
[22] E. Sardini and M. Serpelloni, "Instrumented wearable belt for wireless health monitoring,"Procedia Engineering, vol. 5, pp. 580-583, 2010.
[23] J. Rodriguez-Molina, J. F. Martinez, P. Castillejo, and L. Lopez, "Combining wireless sensor networks and semantic middleware for an Internet of Things-based sportsman/woman monitoring application,"Sensors (Basel), vol. 13, pp. 1787-835, 2013.
[24] M. Bächlin and G. Tröster, "Swimming performance and technique evaluation with wearable acceleration sensors,"Pervasive and Mobile Computing, vol. 8, pp. 68-81, 2012.
[25] S. Coyle, D. Morris, K.-T. Lau, D. Diamond, and N. Moyna, "Textile-Based Wearable Sensors for Assisting Sports Performance," presented at the Proceedings of the 2009 Sixth International Workshop on Wearable and Implantable Body Sensor Networks, 2009.
[26] T. Fukatsu and T. Nanseki, "Monitoring system for farming operations with wearable devices utilized sensor networks,"Sensors, vol. 9, pp. 6171-6184, 2009.
[27] M. J. Zieniewicz, D. C. Johnson, D. C. Wong, and J. D. Flatt, "The Evolution of Army Wearable Computers,"IEEE Pervasive Computing, vol. 1, pp. 30-40, 2002.
[28] A. D. Cheok and F. S. Wan, "Game-City: A Ubiquitous Large Area Multi-Interface Mixed Reality Game Space for Wearable Computers," presented at the Proceedings of the 6th IEEE International Symposium on Wearable Computers, 2002.
[29] A. Bondavalli, F. Brancati, A. Ceccarelli, and L. Falai, "Providing Safety-Critical and Real-Time Services for Mobile Devices in Uncertain Environment," in Self-Organization in Embedded Real-Time Systems, M. T. Higuera-Toledano, U. Brinkschulte, and A. Rettberg, Eds., ed: Springer New York, 2013, pp. 25-53.
[30] S. Chernbumroong, S. Cang, A. Atkins, and H. Yu, "Elderly activities recognition and classification for applications in assisted living,"Expert Systems with Applications, vol. 40, pp. 1662-1674, 2013.
[31] O. Banos, M. Damas, H. Pomares, A. Prieto, and I. Rojas, "Daily living activity recognition based on statistical feature quality group selection,"Expert Systems with Applications, vol. 39, pp. 8013-8021, 2012.
[32] C. Doukas, T. Petsatodis, C. Boukis, and I. Maglogiannis, "Automated sleep breath disorders detection utilizing patient sound analysis,"Biomedical Signal Processing and Control, vol. 7, pp. 256-264, 2012.
[33] M. Kranz, A. Möller, N. Hammerla, S. Diewald, T. Plötz, P. Olivier, et al., "The mobile fitness coach: Towards individualized skill assessment using personalized mobile devices,"Pervasive and Mobile Computing, vol. 9, pp. 203-215, 2013.
[34] G. Zhu, C. Xu, Q. Huang, W. Gao, and L. Xing, "Player action recognition in broadcast tennis video with applications to semantic analysis of sports game," presented at the Proceedings of the 14th annual ACM international conference on Multimedia, Santa Barbara, CA, USA, 2006.
[35] J. Hoey, C. Boutilier, P. Poupart, P. Olivier, A. Monk, and A. Mihailidis, "People, sensors, decisions,"ACM Transactions on Interactive Intelligent Systems, vol. 2, pp. 1-36, 2012.
[36] P. Augustyniak, "Wearable wireless heart rate monitor for continuous long-term variability studies,"J Electrocardiol, vol. 44, pp. 195-200, Mar-Apr 2011.
[37] A. Pantelopoulos and N. G. Bourbakis, "A Survey onWearable Sensor-Based Systems for Health Monitoring and Prognosis,"IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICs, vol. 40, 2010.
[38] P. B. Gastin, O. McLean, M. Spittle, and R. V. Breed, "Quantification of tackling demands in professional Australian football using integrated wearable athlete tracking technology,"J Sci Med Sport, Feb 20 2013.
[39] V. L. Hassan Ghasemzadeh, Eric Guenterberg, Roozbeh Jafari, "Sport Training Using Body Sensor Networks: A StatisticalApproach to Measure Wrist Rotation for Golf Swing,"Electrical Engineering and Computer Science, 2009.
[40] F. Buttussi and L. Chittaro, "MOPET: a context-aware and user-adaptive wearable system for fitness training,"Artif Intell Med, vol. 42, pp. 153-63, Feb 2008.
[41] A. Parbhu, "Wearable Computing Challenges."
[42] S. Von Itzstein and R. T. Smith, "Future Challenges to Actuate Wearable Computers."
[43] R. Seljak and M. Zaletel, "Measurement of data quality in the case of short term statistics," in European Conference on Quality and Methodology in Official Statistics (Q2004), Mainz, Germany, 2004, pp. 24-26.
[44] J. Arlat, Y. Crouzet, Y. Deswarte, J. C. Laprie, D. Powell, P. David, et al., "Fault tolerant computing,"Wiley Encyclopedia of Electrical and Electronics Engineering, 1999.
[45] A. Avizienis, "Toward systematic design of fault-tolerant systems,"Computer, vol. 30, pp. 51-58, 1997.
[46] K. Nørvåg, "An Introduction to Fault-Tolerant Systems," 2000.
[47] A. Khani, "Fault Tolerance Modeling Using Aspect-Oriented Programming," Shahid Beheshti University, 2011.
[48] A. Mahapatro and P. M. Khilar, "Fault Diagnosis in Body Sensor Networks,"International Journal of Computer Information Systems and Industrial Management Applications, vol. 5, 2012.
[49] P. Latchoumy and P. S. A. Khader, "Survey on fault tolerance in grid computing,"International Journal of Computer Science & Engineering Survey (IJCSES) Vol, vol. 2, 2011.
[50] D. Cheng, H. Song, and A. Messer, "Reliability, Diagnosis – Challenges to Pervasive Computing."
[51] M. S. M. H. Abadi, "helping, an approach for creating fault tolerance in wide systems," Tehran University, 2003.
[52] B. Courtois and B. Kaminska, "5B: emerging technologies-reliable and fault-tolerant wireless sensor networks," in VLSI Test Symposium, 2005. Proceedings. 23rd IEEE, 2005, p. 173.
[53] M. Lanthaler, "Self-Healing Wireless Sensor Network," in Seminar on Self-Healing Systems, Department of Computer Science, University of Helsinki, Spring, 2007.
[54] J. Park, J. Jung, S. Piao, and E. Lee, "Self-healing mechanism for reliable computing,"Self, vol. 3, 2008.
[55] H. Ghasemzadeh, N. Jain, M. Sgroi, and R. Jafari, "Communication Minimization for In-Network Processing in Body Sensor Networks: A Buffer Assignment Technique."
[56] T. Bourdenas and M. Sloman, "Towards Self-Healing in Wireless Sensor Networks," in Wearable and Implantable Body Sensor Networks, 2009. BSN 2009. Sixth International Workshop on, 2009, pp. 15-20.
[57] B. U. Kim, Y. Al-Nashif, S. Fayssal, S. Hariri, and M. Yousif, "Anomaly-based fault detection in pervasive computing system," presented at the Proceedings of the 5th international conference on Pervasive services, Sorrento, Italy, 2008.
[58] D.-J. Kim and B. Prabhakaran, "Motion fault detection and isolation in Body Sensor Networks,"Pervasive and Mobile Computing, vol. 7, pp. 727-745, 12// 2011.
[59] n. D.D. Geeta a and N. N. b. , Rajashekhar C. Biradar, "Fault tolerance in wireless sensor network using hand-off and dynamic power adjustment approach,"Network and Computer Applications, 2013.
[60] R. Sharifi and R. Langari, "Sensor fault diagnosis with a probabilistic decision process,"Mechanical Systems and Signal Processing, vol. 34, pp. 146-155, 2013.
[61] Z. Le, E. Becker, D. G. Konstantinides, C. Ding, and F. Makedon, "Modeling reliability for wireless sensor node coverage in assistive testbeds," presented at the Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments, Samos, Greece, 2010.
[62] M. Elhadef, A. Boukerche, and H. Elkadiki, "A distributed fault identification protocol for wireless and mobile ad hoc networks,"Journal of Parallel and Distributed Computing, vol. 68, pp. 321-335, 3// 2008.
[63] R. Morello and C. Capua, "A Measurement System Design Technique for Improving Performances and Reliability of Smart and Fault-Tolerant Biomedical Systems," in Wearable and Autonomous Biomedical Devices and Systems for Smart Environment. vol. 75, A. Lay-Ekuakille and S. Mukhopadhyay, Eds., ed: Springer Berlin Heidelberg, 2010, pp. 207-217.
[64] H. Sagha, J. e. d. R. Mill´an, and R. Chavarriaga, "Detecting and rectifying anomalies in body sensor networks."
[65] C. Haibin, P. Chao, and Z. Yue, "A Novel Framework of Self-Adaptive Fault-Tolerant for Pervasive Computing," in Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on, 2012, pp. 286-291.
[66] C. Haibin, P. Chao, J. Linhua, and Z. Yue, "A Novel Self-Adaptive Fault-Tolerant Mechanism and Its Application for a Dynamic Pervasive Computing Environment," in Object/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW), 2012 15th IEEE International Symposium on, 2012, pp. 48-52.
[67] Y. Yang, D. Shi, P. Zou, and X. Rao, "Adaptive Fault-Tolerance by Exposing Service Request Process as First-Class Object in Pervasive Computing," in Future Information Technology (FutureTech), 2010 5th International Conference on, 2010, pp. 1-5.
[68] X. Wenshuan, X. Yunwei, and L. Guizhang, "A Lightweight, Fault-Tolerant, Load Balancing Service Discovery and Invocation Algorithm for Pervasive Computing Environment," in Innovative Computing Information and Control, 2008. ICICIC '08. 3rd International Conference on, 2008, pp. 86-86.
[69] S. I. Ahamed and M. Sharmin, "A trust-based secure service discovery (TSSD) model for pervasive computing,"Computer Communications, vol. 31, pp. 4281-4293, 12/18/ 2008.
[70] M. Sharmin, S. Ahmed, and S. I. Ahamed, "SAFE-RD (secure, adaptive, fault tolerant, and efficient resource discovery) in pervasive computing environments," in Information Technology: Coding and Computing, 2005. ITCC 2005. International Conference on, 2005, pp. 271-276 Vol. 2.
[71] R. Williams, J. Srikant, E. Stern, and Y. A. Lussier, "Cascading policies provide fault tolerance for pervasive clinical communications," in Pervasive Computing and Communications Workshops, 2005. PerCom 2005 Workshops. Third IEEE International Conference on, 2005, pp. 209-212.
[72] Y. Peng, Q. Song, Y. Yu, and F. Wang, "Fault-tolerant routing mechanism based on network coding in wireless mesh networks,"Journal of Network and Computer Applications, vol. in press, 2013.
[73] W. Yu and H. Wu, "Replication-based efficient data delivery scheme (red) for delay/fault-tolerant mobile sensor network (DFT-MSN)," in Pervasive Computing and Communications Workshops, 2006. PerCom Workshops 2006. Fourth Annual IEEE International Conference on, 2006, pp. 5 pp.-489.
[74] L. Feng, W. Yu, and H. Wu, "Testbed implementation of delay/fault-tolerant mobile sensor network (DFT-MSN)," in Pervasive Computing and Communications Workshops, 2006. PerCom Workshops 2006. Fourth Annual IEEE International Conference on, 2006, pp. 6 pp.-327.
[75] W. Yu and H. Wu, "Delay/Fault-Tolerant Mobile Sensor Network (DFT-MSN): A New Paradigm for Pervasive Information Gathering,"Mobile Computing, IEEE Transactions on, vol. 6, pp. 1021-1034, 2007.
[76] G. Brettlecker and H. Schuldt, "Reliable distributed data stream management in mobile environments,"Information Systems, vol. 36, pp. 618-643, 5// 2011.
[77] C. Seo, S. Malek, G. Edwards, D. Popescu, N. Medvidovic, B. Petrus, et al., "Exploring the Role of Software Architecture in Dynamic and Fault Tolerant Pervasive Systems," presented at the Proceedings of the 1st International Workshop on Software Engineering for Pervasive Computing Applications, Systems, and Environments, 2007.
[78] W. Wu, J. Cao, and J. Yang, "A fault tolerant mutual exclusion algorithm for mobile ad hoc networks,"Pervasive and Mobile Computing, vol. 4, pp. 139-160, 2008.
[79] G. E. Arrobo and R. D. Gitlin, "New Approaches to Reliable Wireless Body Area Networks," 2011.
[80] E. Ko, "An Adaptive Fault Tolerance System for Ubiquitous Computing Environments: AFTS," in Computational Science and Its Applications - ICCSA 2006. vol. 3983, M. Gavrilova, O. Gervasi, V. Kumar, C. J. K. Tan, D. Taniar, A. Laganá, et al., Eds., ed: Springer Berlin Heidelberg, 2006, pp. 475-482.
[81] G. Wu, J. Ren, F. Xia, and Z. Xu, "An adaptive fault-tolerant communication scheme for body sensor networks," Sensors (Basel), vol. 10, pp. 9590-608, 2010.
[82] A. Fragopoulos, J. Gialelis, and D. Serpanos, "Security Framework for Pervasive Healthcare Architectures Utilizing MPEG-21 IPMP Components,"Int J Telemed Appl, vol. 2009, p. 461560, 2009.
[83] O. Aziz, L. Atallah, B. Lo, M. ElHelw, L. Wang, G. Z. Yang, et al., "A Pervasive Body Sensor Network for Measuring Postoperative Recovery at Home,"Surgical Innovation, vol. 14, pp. 83-90, 2007.
[84] A. Milenković, C. Otto, and E. Jovanov, "Wireless sensor networks for personal health monitoring: Issues and an implementation,"Computer Communications, vol. 29, pp. 2521-2533, 2006.
[85] E. DUBROVA, "FAULT TOLERANT DESIGN: AN INTRODUCTION," 2007.