SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2288
A Inference Model for Environment Detection using IoT and SVM
Miss. Dhawane Shrutika B.1, Dr. V. V. Mandhare2
1Miss. Dhawane Shrutika B., Dept. of Computer Engineering, PREC, Loni, Maharashtra, India
2Dr. V. V. Mandhare, Dept. of Computer Engineering, PREC, Loni, Maharashtra, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Today internet is getting faster and cheap to use
with the introduction of 4G. This aspect can be usedtoconnect
the human with the machine using Internet of Things (IoT)
concept. IoT can be used in vast applications that can be used
to simplify the needs of human beings. The IoT can be
implemented in fields like Smart cities, homes, healthcare etc.
It can become an integral part of our system if analyzed
properly and used intelligently. Today millions ofdevicesdaily
use smartphones which can be integrated withtheIoTtobuild
smart applications with the help of cloud ascentralmediumof
communication between a IoT based device and the
smartphone of a user. But with IoT there is a problem as it
generates large amount of data every which is not easy to
analyze by a human. It overflows a cloud space with
unnecessary data. So we thought of designing a project which
will decrease the large amount of data generated by the IoT
device and that is sent to the cloud. So a smart inference filter
will be designed which will filter the amount of data that is
sent to the cloud. The data originating from a IoT device can
be analyzed by using machine learning approachandSupport
Vector Machine (SVM) algorithm. Only the harmful
categorized data by the SVM will be sent to the cloud and the
whole on thus decreasing the amount of data sent to the cloud
tremendously. Thus only the needed data that is to be viewed
by the concerned authority will be sent to the cloud which can
be viewed on a smartphone. The concernedauthoritythancan
take steps to improve the environment condition.
Key Words: IoT, MQ2, MQ7,ESP8266,Android,Arduino,
Spreadsheet, SVM, Cloud, Smartphone.
1. INTRODUCTION
Humans have a limited capacity of grasping and
analyzing the large amount of data thatcanbegeneratedand
hammered by day to day IoT devices. However, sensors
connected to a IoT Device can collect a large amount of data
that has to be analyzed for proper decision making by a
given application. This forms the heart of Internet of Things
(IoT) concept. Thus with the help of inference model and
machine learning a large amount ofdata canbeanalyzedand
help in easy decision making. ThusIoTcanbecomea integral
part of various services such as smart buildings, intelligent
transport systems, industrial automation, pervasive
healthcare, smart grid, self-driving vehicles,smartcities, etc.
thus promising a revolution in social and industrial sectors
and the way they can be handled for better productivity.
The growth of IoT is jaw dropping and ever
increasing. As per the study in 2016 there were more than
17 billion devices and which will increase and cross 50
billion mark by 2020 more than six times the human
population. This will lead to explosion of data that will be
generated by IoT Devices. This amount of data cannot be
handled by cloud services if uploaded fully. However, the
Inference models trained and appliedwithmachinelearning
will decrease the amount of data sent to the cloud
tremendously. Thus various machine learning approaches
has to be implemented and studied to decrease the load on
the cloud which is heart of a IoT revolution. Thus ourproject
will be organized into steps such as
1) Literature Survey which will explain the existing
works and their limitations.
2) Proposed System which will explain the steps to
achieve a successful implementation.
3) Results and Discussion which will explain the
outcomes of the project.
4) Conclusion which will explain the overall
achievement of the project.
5) References which will list the papers that are to be
referred.
2. REVIEW OF LITERATURE
This topic describesthefundamentalsof IOTmodel.
It helps in understanding various ideas put forward by
various technical papers published by various publishers.
A. M. Nia etal. [1] authored a paper which studies
the security related to Internet of Things (IoT), also referred
to as the Internet of Objects, is viewed as a translating
approach for providing numerous services. This paper
explains how cyber-attacks on various IoT structures have
increased and how loss of data and money increased. The
first goal of this paper was to, brief describe three widely-
known IoT reference models and dene security in the
context of IoT platform. Secondly the applications that arise
from the use of IoT and potential motivations of the
attackers who target this new architecture where discussed
briefly. Third different attacks and threats that arise from
the use of IoT where discussed briefly. Fourth, be possible
security measures that can avoid attacks where discussed
briefly. The drawback of this paper is that it only
concentrates on security and not on cloud as well.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2289
Dhananjay Singh etal. [2] authored a paper which
studies Internet-of-Things (IoT) and present a approach
which will make it more smart and intelligent. This paper
presents a unique model for IoT with the help of Semantic
Fusion Model (SFM). This SFM model introduces the use of
Smart Semantic framework to extract and analyze the
processed information from sensor networks and the data
generated by it. It introduces a smart embedded system is
having linguistic logic and linguistic valuebasedInformation
to make the system an intelligent system and smarter than
the those explained in the paper. This paper also discussion
IoT applications, services, visual aspect and challenges for
IoT using RFID, 6lowpan and sensor networks. The
drawback of this paper is that it only concentrates on
embedded systems not on cloud as well.
Dae-Man Han etal. [3] explains the use of WPAN,
WSN and ZigBee networks. This paper designs and explains
smart home device descriptions and standard practices for
demand response and load management “Smart Energy”
applications needed in a smart energy based residential or
light commercial environment using ZigBee networks. It
explains the design and implementation of control
application domains included in this initial version are
sensing device control, pricing and demand response and
load control applications etc. In this paper they design and
implement a smart home interfaces anddevicedefinitionsto
allow interoperability among ZigBee devices produced by
various manufacturers of electrical equipment, meters, and
smart energy enabling products. It introduces and
implements the proposed home energy control systems
design that provides intelligent services for users and we
demonstrate its implementation using a real testbed. The
drawback of this paper is that it only concentratesonZigBee
devices and ZigBee networks and not on cloud as well.
Nomusa DLODLO etal. [4] authored a paper which
mainly concentrates on building smart cities. This paper
explains the implementation and design of smart cities
applications as applied to the domains of smart transport,
smart tourism and recreation, smart health, crime
prevention and community safety, governance, monitoring
and infrastructure, disaster management, environment
management, refuse collection and sewer management,
smart homes and smart energy and thus handling the day to
day and improving the user experience of IoT devices. The
paper presents a technical solution for energy control and
comfort in a home for proof of concept of a smart city
infrastructure application usingIoT devices.Itdemonstrates
how smart applications can manage energy control and
comfort in a room that has a varied number of people and
electrical appliances, with each being a source of heat and
having a separate IoT device to handle it. The drawback of
this paper is that it only concentrates on building smart
homes and not on cloud that has to handle the data to
achieve it.
Praveen Kumar etal. [5] authored a paper which
mainly concentratesonmonitoringand control ofappliances
that can be used in a Smart Home. This paper explains a
technique of home automation technology which provides
provides smart monitoring and control of the home
appliances as well as doorpermissionsystemtodifferentiate
between a owner and visitor of a home. This paper
implements control and monitoring thestatusi.e.ON/OFFof
the appliances thus implementing Internet,electrical switch,
and GUI. Using the technology and implementation of the
concept of this paper, the consumer can reduce the wastage
of electrical powerby regularmonitoringofhomeappliances
or the proper ON/OFF scheduling of the devices. The
drawback of this paper is that it only concentrates on
building smart homes and not on cloud that has to handle
the data to achieve it.
Igor Miladinovic etal. [6] authored a paper which
mainly concentrates on to provide a new architecture to
cope with the expected increase in data generation by IoT
devices. Network function virtualization (NFV) providesthe
architecture necessary for IoT services by enabling the
automated control, management and orchestration of
network resources using Web. The drawback ofthispaperis
that it only concentrates on sending all the data to web and
the data is not inferred to send only the needed data.
Lu´ıs N´obrega etal. [7] authored a paper which
mainly proposes an animal behavior monitoring platform,
based on IoT technologies and its use. In this paper the
animals are monitored and all the data is sent to the cloud.
The drawback of this paper is that it only concentrates on
sending all the data to web and the data is not inferred to
send only the needed data.
Dweepayan Mishra etal. [8] authoreda paperwhich
mainly proposes a programmed water system with
framework for the terrains which will reduce manual labor
and optimizing water usage increasingproductivityofcrops.
The data from the sensors are sent to the cloud. The
drawback of this paper is that it only concentrates on
sending all the data to web and the data is not infered to
send only the needed data.
Preeti Yadav etal. [9] authored a paper which
mainlyproposed a framework for brilliantcityimprovement
in lightof IoT utilizing the investigation of Huge Information
The data from the sensors are sent to the cloud. The
drawback of this paper is that it only concentrates on
sending all the data to web and the data is not inferred to
send only the needed data.
Sai Sreekar Siddula etal. [10] authored a paper hich
mainly proposes a novel idea of collecting and sharingreal-
time information about water levels to anauthorizedcentral
command center through far field communication. The data
from the sensors are sent to the cloud. The drawback of this
paper is that it only concentrates on sending all the data to
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2290
web and the data is not inferred to send only the needed
data.
3. PROPOSED METHODOLOGY
In the traditional system all the data from the
sensors are sent to the cloud. Due to this there is congestion
as large amount of data reaches cloud every few seconds. So
to avoid this we propose a inference model which will only
send the data which is of a certain parameter to the cloud
and not the whole one using machine learning with IoT.
3.1 Architecture
Fig -1: Proposed System Architecture
First figure showstheproposedsystemarchitecture
which see in brief as follows:
1) Sensors: Here various environment detection sensorsare
connected to Adriano Board.
2) IoT: Here sensor data is gathered from the sensors and
sent to Arduino.
3) Wi-Fi: Here a Wi-Fi communication of client server is
made between Arduino and Desktop using Esp8266 module
and the sensor data is sent from Arduino to Server for
further analysis.
4) Desktop: Here the Sensor data is received and the data is
shown on desktop as shown below.
5) Training Dataset: Here the training dataset is generated
using two class harmful and healthy.
6) Testing Dataset: Here the testing dataset is generated
using two classes harmful and healthy.
7) SVM: Here machine learning algorithm SVM is applied on
training and testing datasets and the environment
parameters are found.
8) Upload: Here of the environment parameters are under
harmful category than only the data is end on the cloud for
the concerned authority to view it.
9) Mobile: Here the harmful data can be viewed by the user
and necessary command is sent to the IoT.
3.2 Algorithm
In machine learning, support vector machines
(SVMs, also supportvectornetworksaresupervisedlearning
and non-supervised learning classification types. Givena set
of training examples, each marked as belongingtooneor the
other of two categories specified while training. An SVM
training algorithm builds a model thatassignsnewexamples
to one category or the other, making it a non-probabilistic
binary linear classification problem. An SVM model is a
representation of the training data as points in space,
mapped so that the examples of the separate categories are
divided by a clear gap that is as wide as possible in two
planes. New examples are then mapped intothatsamespace
and predicted to belong to a category based on which side of
the gap they fall on respective planes.
 Start
 Initialize Sensors and Arduino
 Read Sensors Data
 Send Readings to Desktop
if(send success==0)
then
-Return to Step 3.
else
-Store Readings
-Continue
 Generate Training Dataset
-Enter readings for Safe Class.
-Enter readings for Unsafe Class.
- Create Training dataset.
 Apply SVM
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2291
-Read Training Dataset
-Read Sensor data from variable
-Generate Testing Dataset
-Apply SVM
-Get Precision of SVM
if(Pre>Pre1)
then
-Data safe
else if(Pre<Pre1)
-Data unsafe
-View Results
-Send Results to Cloud
-View SMS Alert
 View Unsafe Readings
-Login in Mobile App.
-View Unsafe Readings
 Close
3.3 Mathematical Model
Fig -2: Set Theory
Second figure shows the Mathematical model with
two sets and the entities in it
Fig -3: Venn Diagram for Intersection of Sets
Third figure shows the Intersection of two sets in
the form of vein diagram
4. RESULT ANALYSIS AND DISCUSSION
4.1 Results of Sensor data on Desktop
Fig-4: Sensor Data on Desktop
1) Desktop: Fourth figure shows how the data will be
retrieved from the Arduino side via Wi-Fi and how
it will be visible on the desktop side.
Fig-5:To see environment readings click on view
environment readings
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2292
4.2 Discussion for MQ2 and MQ7 sensor data
Fig -6: MQ2 and MQ7 Sensor data with four readings
1) Bar-Chat: Fifth figure shows the data via Bar-Chart
which will be seen on the Desktop side. The data is
in PPM which is reading for the sensor attached.
Fig -7: MQ2 and MQ7 Sensor data with four
readings
2) Line-Chat: Sixth figure shows the data via Line-
Chart which will be seen on the Desktop side. The
data is in PPM which is reading for the sensor
attached.
5. CONCLUSION
In this paper, we have studied variousconceptsthat
have been used by other users and thus developing a unique
IoT inference model using IoT, Machine Learning, Cloud
Computing and Smart phone together as new architecture.
This project mainly concentrates on detecting the
environment around us taking in to account twoparameters
mainly Healthy environment and Harmful environment. We
are going to assemble various data from sensors connected
to IoT and then analyze the data. If the data is found harmful
than only it will be sent to the cloud for concerned
authorities to view it on the smart phone. Thus it will
decrease the amount of data sent to the cloud and full blown
inference model for data on the cloud. Themaindrawback of
this framework is that if the sensors does not properly take
readings it will create a failure of the system.
REFERENCES
1)“A comprehensive study of securityofInternet-of-Things,”
by A. M. Nia and N. K. Jha, in IEEE Trans. Emerging
Topics in Computing, vol. 5, no. 4, pp. 586–602, Oct.
2017.
2)“A survey of Internet-of-Things: Future vision,
architecture, challenges and services,” by Dhananjay
Singh ; Gaurav Tripathi ; Antonio J. Jara , in 2014 IEEE
World Forum on Internet of Things (WF-IoT), March.
2014.
3)“Smart home energy management system using IEEE
802.15.4 and zigbee,” by Dae-ManHan,Jae-HyunLim,in
IEEE Transactions on Consumer Electronics archive
Volume 56 Issue 3, August 2010.
4)“Internet of Things Technologies in Smart Cities,” by
Nomusa DLODLO , Oscar Gcaba, Andrew Smith , in 2016
IEEE.
5)“IoT Based Monitoring and Control of Appliances for
Smart Home,” by Praveen Kumar, Umesh Chandra Pati,
in 2016 IEEE.
6)“NFV Enabled IoT Architecture for an Operating Room
Environment,” by Igor Miladinovic , Sigrid Schefer-
Wenzl, in 2018 IEEE.
7)“Animal monitoring based on IoT technologies,” by Lu´ıs
N´obrega, Andr´e Tavares, Ant´onio Cardoso, Pedro
Gonc¸alves , in 2018 IEEE.
8)“Automated Irrigation System-IoT Based Approach ,” by
Dweepayan Mishra ,Arzeena Khan, Rajeev Tiwari,
Shuchi Upadhay , in 2018 IEEE.
9)“Application of Internet of Things and Big Data towards a
Smart City,” by Preeti Yadav ; Sandeep Vishwakarma, in
2018 IEEE.
10)“Water Level Monitoring andManagementofDamsusing
IoT ,” by Sai Sreekar Siddula, Phaneendra Babu,P.C.Jain,
in 2018 IEEE.

More Related Content

What's hot

A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry PowerIOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry PowerData Con LA
 
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYRPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYijasuc
 
FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS ijcsit
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...IRJET Journal
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...IRJET Journal
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
AI is the Catalyst of IoT
AI is the Catalyst of IoTAI is the Catalyst of IoT
AI is the Catalyst of IoTAhmed Banafa
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018Ahmed Banafa
 
An IOT Based Low Power Health Monitoring with Active Personal Assistance
An IOT Based Low Power Health Monitoring with Active Personal AssistanceAn IOT Based Low Power Health Monitoring with Active Personal Assistance
An IOT Based Low Power Health Monitoring with Active Personal Assistanceijtsrd
 
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Sudha Jamthe
 
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...IRJET Journal
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsRyan Smith
 

What's hot (17)

A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry PowerIOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry Power
 
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYRPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
 
FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...
IRJET- Enabling Distributed Intelligence Assisted Future Internet of thing Co...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
IOT Unit-2 by Durgacharan
IOT Unit-2 by DurgacharanIOT Unit-2 by Durgacharan
IOT Unit-2 by Durgacharan
 
AI is the Catalyst of IoT
AI is the Catalyst of IoTAI is the Catalyst of IoT
AI is the Catalyst of IoT
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
An IOT Based Low Power Health Monitoring with Active Personal Assistance
An IOT Based Low Power Health Monitoring with Active Personal AssistanceAn IOT Based Low Power Health Monitoring with Active Personal Assistance
An IOT Based Low Power Health Monitoring with Active Personal Assistance
 
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
 
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 

Similar to IoT Environment Detection Using SVM

Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
 
E-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure CloudE-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure CloudIRJET Journal
 
General Overview of IOT Empower Technology
General Overview of IOT Empower TechnologyGeneral Overview of IOT Empower Technology
General Overview of IOT Empower TechnologyIRJET Journal
 
IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...
IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...
IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...IRJET Journal
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
IRJET - Smart Classroom Automation based on IoT
IRJET -  	  Smart Classroom Automation based on IoTIRJET -  	  Smart Classroom Automation based on IoT
IRJET - Smart Classroom Automation based on IoTIRJET Journal
 
IRJET - Energy Efficient Approach for Data Aggregation in IoT
IRJET -  	  Energy Efficient Approach for Data Aggregation in IoTIRJET -  	  Energy Efficient Approach for Data Aggregation in IoT
IRJET - Energy Efficient Approach for Data Aggregation in IoTIRJET Journal
 
Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...IJCNCJournal
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET Journal
 
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...IRJET Journal
 
Home security based on Internet of things Review paper
Home security based on Internet of things Review paperHome security based on Internet of things Review paper
Home security based on Internet of things Review paperIRJET Journal
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoTIRJET Journal
 
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONSA REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONSIRJET Journal
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyLightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyIRJET Journal
 
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYRPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYijasuc
 
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYRPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYijasuc
 
IRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human LifeIRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human LifeIRJET Journal
 
IRJET - Smart Home with Power Consumed Statistics using Android Application
IRJET - Smart Home with Power Consumed Statistics using Android ApplicationIRJET - Smart Home with Power Consumed Statistics using Android Application
IRJET - Smart Home with Power Consumed Statistics using Android ApplicationIRJET Journal
 

Similar to IoT Environment Detection Using SVM (20)

Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
E-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure CloudE-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure Cloud
 
General Overview of IOT Empower Technology
General Overview of IOT Empower TechnologyGeneral Overview of IOT Empower Technology
General Overview of IOT Empower Technology
 
IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...
IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...
IRJET- Exploring the Nuances of Internet of Things in Health Care Assisting S...
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
IRJET - Smart Classroom Automation based on IoT
IRJET -  	  Smart Classroom Automation based on IoTIRJET -  	  Smart Classroom Automation based on IoT
IRJET - Smart Classroom Automation based on IoT
 
IRJET - Energy Efficient Approach for Data Aggregation in IoT
IRJET -  	  Energy Efficient Approach for Data Aggregation in IoTIRJET -  	  Energy Efficient Approach for Data Aggregation in IoT
IRJET - Energy Efficient Approach for Data Aggregation in IoT
 
Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
 
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
 
Home security based on Internet of things Review paper
Home security based on Internet of things Review paperHome security based on Internet of things Review paper
Home security based on Internet of things Review paper
 
FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
 
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONSA REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyLightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
 
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYRPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
 
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYRPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
 
lee2015.pdf
lee2015.pdflee2015.pdf
lee2015.pdf
 
IRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human LifeIRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human Life
 
IRJET - Smart Home with Power Consumed Statistics using Android Application
IRJET - Smart Home with Power Consumed Statistics using Android ApplicationIRJET - Smart Home with Power Consumed Statistics using Android Application
IRJET - Smart Home with Power Consumed Statistics using Android Application
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 

Recently uploaded (20)

★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 

IoT Environment Detection Using SVM

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2288 A Inference Model for Environment Detection using IoT and SVM Miss. Dhawane Shrutika B.1, Dr. V. V. Mandhare2 1Miss. Dhawane Shrutika B., Dept. of Computer Engineering, PREC, Loni, Maharashtra, India 2Dr. V. V. Mandhare, Dept. of Computer Engineering, PREC, Loni, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Today internet is getting faster and cheap to use with the introduction of 4G. This aspect can be usedtoconnect the human with the machine using Internet of Things (IoT) concept. IoT can be used in vast applications that can be used to simplify the needs of human beings. The IoT can be implemented in fields like Smart cities, homes, healthcare etc. It can become an integral part of our system if analyzed properly and used intelligently. Today millions ofdevicesdaily use smartphones which can be integrated withtheIoTtobuild smart applications with the help of cloud ascentralmediumof communication between a IoT based device and the smartphone of a user. But with IoT there is a problem as it generates large amount of data every which is not easy to analyze by a human. It overflows a cloud space with unnecessary data. So we thought of designing a project which will decrease the large amount of data generated by the IoT device and that is sent to the cloud. So a smart inference filter will be designed which will filter the amount of data that is sent to the cloud. The data originating from a IoT device can be analyzed by using machine learning approachandSupport Vector Machine (SVM) algorithm. Only the harmful categorized data by the SVM will be sent to the cloud and the whole on thus decreasing the amount of data sent to the cloud tremendously. Thus only the needed data that is to be viewed by the concerned authority will be sent to the cloud which can be viewed on a smartphone. The concernedauthoritythancan take steps to improve the environment condition. Key Words: IoT, MQ2, MQ7,ESP8266,Android,Arduino, Spreadsheet, SVM, Cloud, Smartphone. 1. INTRODUCTION Humans have a limited capacity of grasping and analyzing the large amount of data thatcanbegeneratedand hammered by day to day IoT devices. However, sensors connected to a IoT Device can collect a large amount of data that has to be analyzed for proper decision making by a given application. This forms the heart of Internet of Things (IoT) concept. Thus with the help of inference model and machine learning a large amount ofdata canbeanalyzedand help in easy decision making. ThusIoTcanbecomea integral part of various services such as smart buildings, intelligent transport systems, industrial automation, pervasive healthcare, smart grid, self-driving vehicles,smartcities, etc. thus promising a revolution in social and industrial sectors and the way they can be handled for better productivity. The growth of IoT is jaw dropping and ever increasing. As per the study in 2016 there were more than 17 billion devices and which will increase and cross 50 billion mark by 2020 more than six times the human population. This will lead to explosion of data that will be generated by IoT Devices. This amount of data cannot be handled by cloud services if uploaded fully. However, the Inference models trained and appliedwithmachinelearning will decrease the amount of data sent to the cloud tremendously. Thus various machine learning approaches has to be implemented and studied to decrease the load on the cloud which is heart of a IoT revolution. Thus ourproject will be organized into steps such as 1) Literature Survey which will explain the existing works and their limitations. 2) Proposed System which will explain the steps to achieve a successful implementation. 3) Results and Discussion which will explain the outcomes of the project. 4) Conclusion which will explain the overall achievement of the project. 5) References which will list the papers that are to be referred. 2. REVIEW OF LITERATURE This topic describesthefundamentalsof IOTmodel. It helps in understanding various ideas put forward by various technical papers published by various publishers. A. M. Nia etal. [1] authored a paper which studies the security related to Internet of Things (IoT), also referred to as the Internet of Objects, is viewed as a translating approach for providing numerous services. This paper explains how cyber-attacks on various IoT structures have increased and how loss of data and money increased. The first goal of this paper was to, brief describe three widely- known IoT reference models and dene security in the context of IoT platform. Secondly the applications that arise from the use of IoT and potential motivations of the attackers who target this new architecture where discussed briefly. Third different attacks and threats that arise from the use of IoT where discussed briefly. Fourth, be possible security measures that can avoid attacks where discussed briefly. The drawback of this paper is that it only concentrates on security and not on cloud as well.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2289 Dhananjay Singh etal. [2] authored a paper which studies Internet-of-Things (IoT) and present a approach which will make it more smart and intelligent. This paper presents a unique model for IoT with the help of Semantic Fusion Model (SFM). This SFM model introduces the use of Smart Semantic framework to extract and analyze the processed information from sensor networks and the data generated by it. It introduces a smart embedded system is having linguistic logic and linguistic valuebasedInformation to make the system an intelligent system and smarter than the those explained in the paper. This paper also discussion IoT applications, services, visual aspect and challenges for IoT using RFID, 6lowpan and sensor networks. The drawback of this paper is that it only concentrates on embedded systems not on cloud as well. Dae-Man Han etal. [3] explains the use of WPAN, WSN and ZigBee networks. This paper designs and explains smart home device descriptions and standard practices for demand response and load management “Smart Energy” applications needed in a smart energy based residential or light commercial environment using ZigBee networks. It explains the design and implementation of control application domains included in this initial version are sensing device control, pricing and demand response and load control applications etc. In this paper they design and implement a smart home interfaces anddevicedefinitionsto allow interoperability among ZigBee devices produced by various manufacturers of electrical equipment, meters, and smart energy enabling products. It introduces and implements the proposed home energy control systems design that provides intelligent services for users and we demonstrate its implementation using a real testbed. The drawback of this paper is that it only concentratesonZigBee devices and ZigBee networks and not on cloud as well. Nomusa DLODLO etal. [4] authored a paper which mainly concentrates on building smart cities. This paper explains the implementation and design of smart cities applications as applied to the domains of smart transport, smart tourism and recreation, smart health, crime prevention and community safety, governance, monitoring and infrastructure, disaster management, environment management, refuse collection and sewer management, smart homes and smart energy and thus handling the day to day and improving the user experience of IoT devices. The paper presents a technical solution for energy control and comfort in a home for proof of concept of a smart city infrastructure application usingIoT devices.Itdemonstrates how smart applications can manage energy control and comfort in a room that has a varied number of people and electrical appliances, with each being a source of heat and having a separate IoT device to handle it. The drawback of this paper is that it only concentrates on building smart homes and not on cloud that has to handle the data to achieve it. Praveen Kumar etal. [5] authored a paper which mainly concentratesonmonitoringand control ofappliances that can be used in a Smart Home. This paper explains a technique of home automation technology which provides provides smart monitoring and control of the home appliances as well as doorpermissionsystemtodifferentiate between a owner and visitor of a home. This paper implements control and monitoring thestatusi.e.ON/OFFof the appliances thus implementing Internet,electrical switch, and GUI. Using the technology and implementation of the concept of this paper, the consumer can reduce the wastage of electrical powerby regularmonitoringofhomeappliances or the proper ON/OFF scheduling of the devices. The drawback of this paper is that it only concentrates on building smart homes and not on cloud that has to handle the data to achieve it. Igor Miladinovic etal. [6] authored a paper which mainly concentrates on to provide a new architecture to cope with the expected increase in data generation by IoT devices. Network function virtualization (NFV) providesthe architecture necessary for IoT services by enabling the automated control, management and orchestration of network resources using Web. The drawback ofthispaperis that it only concentrates on sending all the data to web and the data is not inferred to send only the needed data. Lu´ıs N´obrega etal. [7] authored a paper which mainly proposes an animal behavior monitoring platform, based on IoT technologies and its use. In this paper the animals are monitored and all the data is sent to the cloud. The drawback of this paper is that it only concentrates on sending all the data to web and the data is not inferred to send only the needed data. Dweepayan Mishra etal. [8] authoreda paperwhich mainly proposes a programmed water system with framework for the terrains which will reduce manual labor and optimizing water usage increasingproductivityofcrops. The data from the sensors are sent to the cloud. The drawback of this paper is that it only concentrates on sending all the data to web and the data is not infered to send only the needed data. Preeti Yadav etal. [9] authored a paper which mainlyproposed a framework for brilliantcityimprovement in lightof IoT utilizing the investigation of Huge Information The data from the sensors are sent to the cloud. The drawback of this paper is that it only concentrates on sending all the data to web and the data is not inferred to send only the needed data. Sai Sreekar Siddula etal. [10] authored a paper hich mainly proposes a novel idea of collecting and sharingreal- time information about water levels to anauthorizedcentral command center through far field communication. The data from the sensors are sent to the cloud. The drawback of this paper is that it only concentrates on sending all the data to
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2290 web and the data is not inferred to send only the needed data. 3. PROPOSED METHODOLOGY In the traditional system all the data from the sensors are sent to the cloud. Due to this there is congestion as large amount of data reaches cloud every few seconds. So to avoid this we propose a inference model which will only send the data which is of a certain parameter to the cloud and not the whole one using machine learning with IoT. 3.1 Architecture Fig -1: Proposed System Architecture First figure showstheproposedsystemarchitecture which see in brief as follows: 1) Sensors: Here various environment detection sensorsare connected to Adriano Board. 2) IoT: Here sensor data is gathered from the sensors and sent to Arduino. 3) Wi-Fi: Here a Wi-Fi communication of client server is made between Arduino and Desktop using Esp8266 module and the sensor data is sent from Arduino to Server for further analysis. 4) Desktop: Here the Sensor data is received and the data is shown on desktop as shown below. 5) Training Dataset: Here the training dataset is generated using two class harmful and healthy. 6) Testing Dataset: Here the testing dataset is generated using two classes harmful and healthy. 7) SVM: Here machine learning algorithm SVM is applied on training and testing datasets and the environment parameters are found. 8) Upload: Here of the environment parameters are under harmful category than only the data is end on the cloud for the concerned authority to view it. 9) Mobile: Here the harmful data can be viewed by the user and necessary command is sent to the IoT. 3.2 Algorithm In machine learning, support vector machines (SVMs, also supportvectornetworksaresupervisedlearning and non-supervised learning classification types. Givena set of training examples, each marked as belongingtooneor the other of two categories specified while training. An SVM training algorithm builds a model thatassignsnewexamples to one category or the other, making it a non-probabilistic binary linear classification problem. An SVM model is a representation of the training data as points in space, mapped so that the examples of the separate categories are divided by a clear gap that is as wide as possible in two planes. New examples are then mapped intothatsamespace and predicted to belong to a category based on which side of the gap they fall on respective planes.  Start  Initialize Sensors and Arduino  Read Sensors Data  Send Readings to Desktop if(send success==0) then -Return to Step 3. else -Store Readings -Continue  Generate Training Dataset -Enter readings for Safe Class. -Enter readings for Unsafe Class. - Create Training dataset.  Apply SVM
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2291 -Read Training Dataset -Read Sensor data from variable -Generate Testing Dataset -Apply SVM -Get Precision of SVM if(Pre>Pre1) then -Data safe else if(Pre<Pre1) -Data unsafe -View Results -Send Results to Cloud -View SMS Alert  View Unsafe Readings -Login in Mobile App. -View Unsafe Readings  Close 3.3 Mathematical Model Fig -2: Set Theory Second figure shows the Mathematical model with two sets and the entities in it Fig -3: Venn Diagram for Intersection of Sets Third figure shows the Intersection of two sets in the form of vein diagram 4. RESULT ANALYSIS AND DISCUSSION 4.1 Results of Sensor data on Desktop Fig-4: Sensor Data on Desktop 1) Desktop: Fourth figure shows how the data will be retrieved from the Arduino side via Wi-Fi and how it will be visible on the desktop side. Fig-5:To see environment readings click on view environment readings
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2292 4.2 Discussion for MQ2 and MQ7 sensor data Fig -6: MQ2 and MQ7 Sensor data with four readings 1) Bar-Chat: Fifth figure shows the data via Bar-Chart which will be seen on the Desktop side. The data is in PPM which is reading for the sensor attached. Fig -7: MQ2 and MQ7 Sensor data with four readings 2) Line-Chat: Sixth figure shows the data via Line- Chart which will be seen on the Desktop side. The data is in PPM which is reading for the sensor attached. 5. CONCLUSION In this paper, we have studied variousconceptsthat have been used by other users and thus developing a unique IoT inference model using IoT, Machine Learning, Cloud Computing and Smart phone together as new architecture. This project mainly concentrates on detecting the environment around us taking in to account twoparameters mainly Healthy environment and Harmful environment. We are going to assemble various data from sensors connected to IoT and then analyze the data. If the data is found harmful than only it will be sent to the cloud for concerned authorities to view it on the smart phone. Thus it will decrease the amount of data sent to the cloud and full blown inference model for data on the cloud. Themaindrawback of this framework is that if the sensors does not properly take readings it will create a failure of the system. REFERENCES 1)“A comprehensive study of securityofInternet-of-Things,” by A. M. Nia and N. K. Jha, in IEEE Trans. Emerging Topics in Computing, vol. 5, no. 4, pp. 586–602, Oct. 2017. 2)“A survey of Internet-of-Things: Future vision, architecture, challenges and services,” by Dhananjay Singh ; Gaurav Tripathi ; Antonio J. Jara , in 2014 IEEE World Forum on Internet of Things (WF-IoT), March. 2014. 3)“Smart home energy management system using IEEE 802.15.4 and zigbee,” by Dae-ManHan,Jae-HyunLim,in IEEE Transactions on Consumer Electronics archive Volume 56 Issue 3, August 2010. 4)“Internet of Things Technologies in Smart Cities,” by Nomusa DLODLO , Oscar Gcaba, Andrew Smith , in 2016 IEEE. 5)“IoT Based Monitoring and Control of Appliances for Smart Home,” by Praveen Kumar, Umesh Chandra Pati, in 2016 IEEE. 6)“NFV Enabled IoT Architecture for an Operating Room Environment,” by Igor Miladinovic , Sigrid Schefer- Wenzl, in 2018 IEEE. 7)“Animal monitoring based on IoT technologies,” by Lu´ıs N´obrega, Andr´e Tavares, Ant´onio Cardoso, Pedro Gonc¸alves , in 2018 IEEE. 8)“Automated Irrigation System-IoT Based Approach ,” by Dweepayan Mishra ,Arzeena Khan, Rajeev Tiwari, Shuchi Upadhay , in 2018 IEEE. 9)“Application of Internet of Things and Big Data towards a Smart City,” by Preeti Yadav ; Sandeep Vishwakarma, in 2018 IEEE. 10)“Water Level Monitoring andManagementofDamsusing IoT ,” by Sai Sreekar Siddula, Phaneendra Babu,P.C.Jain, in 2018 IEEE.