The course objectives are to: 1) introduce the vision and market perspective of the Internet of Things (IoT); 2) understand how devices, data, and knowledge are managed in IoT technologies; 3) learn about state-of-the-art IoT architectures; and 4) examine real-world IoT design constraints and applications in industrial automation and commercial building automation. The course covers these topics over 5 units spanning 11 hours, with expected outcomes of understanding the global context and vision of IoT, determining the IoT market perspective, and applying IoT principles in industrial and commercial settings.
The internet of things (io t) for issa v1.3Caston Thomas
The Internet of Things (IoT) is getting a lot of hype, some of it valid. The underlying issue for organizations is how do we prepare, from a security standpoint, for "Things" that we can't anticipate coming onto our networks. This presentation covers some of the ways that we can "prepare for the unpreparable".
MongoDB IoT CITY Tour LONDON: How M2M and IoT are changing the playing field ...MongoDB
Presented by, Emil Berthelsen, Principal Analyst at Machina Research.
Emil discusses the market landscape for M2M and IoT, and the impact of these market developments on database requirements.
MongoDB IoT CITY Tour STUTTGART: The IoT Market Landscape, Machina ResearchMongoDB
Presented by, Emil Berthelsen, Principal Analyst at Machina Research.
Emil discusses the market landscape for M2M and IoT, and the impact of these market developments on database requirements.
MongoDB IoT CITY Tour EINDHOVEN: Machina ResearchMongoDB
Emil Berthelsen, Principal Analyst at Machina Research, discusses the market landscape for M2M and IoT, and the impact of these market developments on database requirements.
The internet of things (io t) for issa v1.3Caston Thomas
The Internet of Things (IoT) is getting a lot of hype, some of it valid. The underlying issue for organizations is how do we prepare, from a security standpoint, for "Things" that we can't anticipate coming onto our networks. This presentation covers some of the ways that we can "prepare for the unpreparable".
MongoDB IoT CITY Tour LONDON: How M2M and IoT are changing the playing field ...MongoDB
Presented by, Emil Berthelsen, Principal Analyst at Machina Research.
Emil discusses the market landscape for M2M and IoT, and the impact of these market developments on database requirements.
MongoDB IoT CITY Tour STUTTGART: The IoT Market Landscape, Machina ResearchMongoDB
Presented by, Emil Berthelsen, Principal Analyst at Machina Research.
Emil discusses the market landscape for M2M and IoT, and the impact of these market developments on database requirements.
MongoDB IoT CITY Tour EINDHOVEN: Machina ResearchMongoDB
Emil Berthelsen, Principal Analyst at Machina Research, discusses the market landscape for M2M and IoT, and the impact of these market developments on database requirements.
The Role of Cloud-MANET Framework in the Internet of Things (IoT)AlAtfat
In the next generation of computing, Mobile ad-hoc network
(MANET) will play a very important role in the Internet of Things (IoT). The
MANET is a kind of wireless networks that are self-organizing and auto
connected in a decentralized system. Every device in MANET can be moved
freely from one location to another in any direction. They can create a network
with their neighbors’ smart devices and forward data to another device. The IoTCloud-MANET framework of smart devices is composed of IoT, cloud
computing, and MANET. This framework can access and deliver cloud services
to the MANET users through their smart devices in the IoT framework where all
computations, data handling, and resource management are performed. The smart
devices can move from one location to another within the range of the MANET
network. Various MANETs can connect to the same cloud, they can use cloud
service in a real time. For connecting the smart device of MANET to cloud needs
integration with mobile apps. My main contribution in this research links a new
methodology for providing secure communication on the internet of smart
devices using MANET Concept in 5G. The research methodology uses the
correct and efficient simulation of the desired study and can be implemented in a
framework of the Internet of Things in 5G.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
The common vision of smart systems today, is by and large associated with one single concept,
the internet of things (IoT), where the whole physical infrastructure is linked with intelligent
monitoring and communication technologies through the use of wireless sensors. In such an
intelligent vibrant system, sensors are connected to send useful information and control
instructions via distributed sensor networks. Wireless sensors have an easy deployment and
better flexibility of devices contrary to wired setup. With the rapid technological development of
sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an
invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also
important to consider whether the sensors of a WSN should be completely integrated into IoT or
not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a
number of security primitives that can be taken to protect their data over the internet.
Future Internet: Challenge And Research TrendIJERA Editor
This article first presents the Challenges of the current Internet and concept of Future Internet Research, motivation for future Internet. Challenges and limitations of Current Internet are reason of Future Internet Researches. In order to provide Future Internet’s service, the Future Internet testbed must be deployed as foundation, and many countries such as USA, Europe and Asia are striving research of Future Internet and deployment of the Future Internet. This paper describe countries which are active on Future Internet research and summarizes the Trends of the Future Internet.
This course provides an introduction in concepts, challenges, and recent developments around the IoT and M2M. The students will be exposed to the fundamental issues that arise in the operation, design and management of IoT networks.
Towards Internet of Things: Survey and Future VisionCSCJournals
Internet of things is a promising research due to its importance in many commerce, industry, and education applications. Recently, new applications and research challenges in numerous areas of Internet of things are fired. In this paper, we discuss the history of Internet of things, different proposed architectures of Internet of things, research challenges and open problems related to the Internet of things. We also introduce the concept of Internet of things database and discuss about the future vision of Internet of things. These are the manuscript preparation guidelines used as a standard template for all journal submissions. Author must follow these instructions while preparing/modifying these guidelines.
Autonomic and cognitive architectures for the Internet of Things, Claudio Sav...Universita della Calabria,
Slides related to the conference paper Autonomic and cognitive architectures for the Internet of Things, Claudio Savaglio and Giancarlo Fortino, IDCS2015. Slide author: Claudio Savaglio
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm.
It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet.
fsdfgList of Course Work Subjects
S.NO SEM SUBJECT CODE SUBJECT TITLE ELECTIVE/CORE CREDIT
1 1 22MC202 MACHINE LEARNING
TECHNIQUES CORE 3
2 1 22PRM01
RESEARCH METHODOLOGY AND
IPR CORE 3
3 1 22MC302
ADVANCED ARTIFICIAL
INTELLIGENCE ELECTIVE 3
4 3 22MC209 ADVANCED INTERNET OF THINGS CORE 3
5 3
22PVD30 SYSTEM LEVEL HARDWARE SOFTWARE CODESIGN ELECTIVE 3
6 3 22MC324
INFORMATION RETRIEVAL
TECHNIQUES ELECTIVE 3
22MC202 MACHINE LEARNING TECHNIQUES
Course Objective 1. To introduce students to the basic concepts and techniques of Machine Learning.
2. To have a thorough understanding of the Supervised and Unsupervised learning techniques
3. To implement linear and non-linear learning models
4. To implement distance-based clustering techniques
5. To understand graphical models of machine learning algorithms
Unit I FUNDAMENTALS OF MACHINE LEARNING 9
Learning – Types of Machine Learning – Supervised Learning – The Brain and the Neuron – Design a Learning System – Perspectives and Issues in Machine Learning – Concept Learning Task – Concept Learning as Search – Finding a Maximally Specific Hypothesis – Version Spaces and the Candidate Elimination Algorithm – Linear Discriminants – Perceptron – Linear Separability – Linear regression.
Unit II LINEAR MODELS 9
Multi-layer Perceptron – Going Forwards – Going Backwards: Back Propagation Error – Multi-layer Perceptron in Practice – Examples of using the MLP – Overview – Deriving Back-Propagation – Radial Basis Functions and Splines – Concepts – RBF Network – Curse of Dimensionality – Interpolations and Basis Functions – Support Vector Machines
Unit III DISTANCE-BASED MODELS 9
Nearest neighbor models – K-means – clustering around medoids – silhouettes – hierarchical clustering
– Density based methods- Grid based methods- Advanced cluster analysis- k-d trees – locality sensitive hashing – non-parametric regression – bagging and random forests – boosting – meta learning
Unit IV
TREE AND RULE MODELS
9
Decision trees – learning decision trees – ranking and probability estimation trees – regression trees
– clustering trees – learning ordered rule lists – learning unordered rule lists – descriptive rule
learning – Mining Frequent patterns, Association and Correlations, advanced association rule techniques-first order rule learning
Unit V
REINFORCEMENT LEARNING AND GRAPHICAL MODELS
9
Reinforcement Learning – Overview – Getting Lost Example – Markov Decision Process, Markov Chain Monte Carlo Methods – Sampling – Proposal Distribution – Markov Chain Monte Carlo – Graphical Models – Bayesian Networks – Markov Random Fields – Hidden Markov Models –
Tracking Methods.
TOTAL HOURS: 45 PERIODS
CO1 Understanding distinguish between, supervised, unsupervised and semi- supervised learning
CO2 Apply the appropriate machine learning strategy for any given problem
Course Outcome
CO3 Suggestion of using supervised, unsupervised or semi-superv
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
The Role of Cloud-MANET Framework in the Internet of Things (IoT)AlAtfat
In the next generation of computing, Mobile ad-hoc network
(MANET) will play a very important role in the Internet of Things (IoT). The
MANET is a kind of wireless networks that are self-organizing and auto
connected in a decentralized system. Every device in MANET can be moved
freely from one location to another in any direction. They can create a network
with their neighbors’ smart devices and forward data to another device. The IoTCloud-MANET framework of smart devices is composed of IoT, cloud
computing, and MANET. This framework can access and deliver cloud services
to the MANET users through their smart devices in the IoT framework where all
computations, data handling, and resource management are performed. The smart
devices can move from one location to another within the range of the MANET
network. Various MANETs can connect to the same cloud, they can use cloud
service in a real time. For connecting the smart device of MANET to cloud needs
integration with mobile apps. My main contribution in this research links a new
methodology for providing secure communication on the internet of smart
devices using MANET Concept in 5G. The research methodology uses the
correct and efficient simulation of the desired study and can be implemented in a
framework of the Internet of Things in 5G.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
The common vision of smart systems today, is by and large associated with one single concept,
the internet of things (IoT), where the whole physical infrastructure is linked with intelligent
monitoring and communication technologies through the use of wireless sensors. In such an
intelligent vibrant system, sensors are connected to send useful information and control
instructions via distributed sensor networks. Wireless sensors have an easy deployment and
better flexibility of devices contrary to wired setup. With the rapid technological development of
sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an
invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also
important to consider whether the sensors of a WSN should be completely integrated into IoT or
not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a
number of security primitives that can be taken to protect their data over the internet.
Future Internet: Challenge And Research TrendIJERA Editor
This article first presents the Challenges of the current Internet and concept of Future Internet Research, motivation for future Internet. Challenges and limitations of Current Internet are reason of Future Internet Researches. In order to provide Future Internet’s service, the Future Internet testbed must be deployed as foundation, and many countries such as USA, Europe and Asia are striving research of Future Internet and deployment of the Future Internet. This paper describe countries which are active on Future Internet research and summarizes the Trends of the Future Internet.
This course provides an introduction in concepts, challenges, and recent developments around the IoT and M2M. The students will be exposed to the fundamental issues that arise in the operation, design and management of IoT networks.
Towards Internet of Things: Survey and Future VisionCSCJournals
Internet of things is a promising research due to its importance in many commerce, industry, and education applications. Recently, new applications and research challenges in numerous areas of Internet of things are fired. In this paper, we discuss the history of Internet of things, different proposed architectures of Internet of things, research challenges and open problems related to the Internet of things. We also introduce the concept of Internet of things database and discuss about the future vision of Internet of things. These are the manuscript preparation guidelines used as a standard template for all journal submissions. Author must follow these instructions while preparing/modifying these guidelines.
Autonomic and cognitive architectures for the Internet of Things, Claudio Sav...Universita della Calabria,
Slides related to the conference paper Autonomic and cognitive architectures for the Internet of Things, Claudio Savaglio and Giancarlo Fortino, IDCS2015. Slide author: Claudio Savaglio
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm.
It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet.
fsdfgList of Course Work Subjects
S.NO SEM SUBJECT CODE SUBJECT TITLE ELECTIVE/CORE CREDIT
1 1 22MC202 MACHINE LEARNING
TECHNIQUES CORE 3
2 1 22PRM01
RESEARCH METHODOLOGY AND
IPR CORE 3
3 1 22MC302
ADVANCED ARTIFICIAL
INTELLIGENCE ELECTIVE 3
4 3 22MC209 ADVANCED INTERNET OF THINGS CORE 3
5 3
22PVD30 SYSTEM LEVEL HARDWARE SOFTWARE CODESIGN ELECTIVE 3
6 3 22MC324
INFORMATION RETRIEVAL
TECHNIQUES ELECTIVE 3
22MC202 MACHINE LEARNING TECHNIQUES
Course Objective 1. To introduce students to the basic concepts and techniques of Machine Learning.
2. To have a thorough understanding of the Supervised and Unsupervised learning techniques
3. To implement linear and non-linear learning models
4. To implement distance-based clustering techniques
5. To understand graphical models of machine learning algorithms
Unit I FUNDAMENTALS OF MACHINE LEARNING 9
Learning – Types of Machine Learning – Supervised Learning – The Brain and the Neuron – Design a Learning System – Perspectives and Issues in Machine Learning – Concept Learning Task – Concept Learning as Search – Finding a Maximally Specific Hypothesis – Version Spaces and the Candidate Elimination Algorithm – Linear Discriminants – Perceptron – Linear Separability – Linear regression.
Unit II LINEAR MODELS 9
Multi-layer Perceptron – Going Forwards – Going Backwards: Back Propagation Error – Multi-layer Perceptron in Practice – Examples of using the MLP – Overview – Deriving Back-Propagation – Radial Basis Functions and Splines – Concepts – RBF Network – Curse of Dimensionality – Interpolations and Basis Functions – Support Vector Machines
Unit III DISTANCE-BASED MODELS 9
Nearest neighbor models – K-means – clustering around medoids – silhouettes – hierarchical clustering
– Density based methods- Grid based methods- Advanced cluster analysis- k-d trees – locality sensitive hashing – non-parametric regression – bagging and random forests – boosting – meta learning
Unit IV
TREE AND RULE MODELS
9
Decision trees – learning decision trees – ranking and probability estimation trees – regression trees
– clustering trees – learning ordered rule lists – learning unordered rule lists – descriptive rule
learning – Mining Frequent patterns, Association and Correlations, advanced association rule techniques-first order rule learning
Unit V
REINFORCEMENT LEARNING AND GRAPHICAL MODELS
9
Reinforcement Learning – Overview – Getting Lost Example – Markov Decision Process, Markov Chain Monte Carlo Methods – Sampling – Proposal Distribution – Markov Chain Monte Carlo – Graphical Models – Bayesian Networks – Markov Random Fields – Hidden Markov Models –
Tracking Methods.
TOTAL HOURS: 45 PERIODS
CO1 Understanding distinguish between, supervised, unsupervised and semi- supervised learning
CO2 Apply the appropriate machine learning strategy for any given problem
Course Outcome
CO3 Suggestion of using supervised, unsupervised or semi-superv
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Unit 8 - Information and Communication Technology (Paper I).pdf
309815972-Iot.pdf
1. SUBJECT TITLE: Internet of Things (IoT)
Course Objectives:
The objective of the course is to:
1. Vision and Introduction to IoT.
2. Understand IoT Market perspective.
3. Data and Knowledge Management and use of Devices in IoT Technology.
4. Understand State of the Art – IoT Architecture.
5. Real World IoT Design Constraints, Industrial Automation and Commercial Building
Automation in IoT.
Unit
No
Syllabus Content
No. of
Hours
1
M2M to IoT-The Vision-Introduction, From M2M to IoT, M2M towards
IoT-the global context, A use case example, Differing Characteristics.
10
2
M2M to IoT – A Market Perspective– Introduction, Some Definitions,
M2M Value Chains, IoT Value Chains, An emerging industrial structure
for IoT, The international driven global value chain and global
information monopolies. M2M to IoT-An Architectural Overview–
Building an architecture, Main design principles and needed capabilities,
An IoT architecture outline, standards considerations.
10
3
M2M and IoT Technology Fundamentals- Devices and gateways,
Local and wide area networking, Data management, Business
processes in IoT, Everything as a Service(XaaS), M2M and IoT
Analytics, Knowledge Management
11
4 IoT Architecture-State of the Art – Introduction, State of the 10
2. art,Architecture Reference Model- Introduction, Reference Model and
architecture, IoT reference Model
5
IoT Reference Architecture- Introduction, Functional View, Information
View, Deployment and Operational View, Other Relevant architectural
views. Real-World Design Constraints- Introduction, Technical Design
constraints-hardware is popular again, Data representation and
visualization, Interaction and remote control.Industrial
Automation- Service-oriented architecture-based device integration,
SOCRADES: realizing the enterprise integrated Web of Things, IMC-
AESOP: from the Web of Things to the Cloud of Things,Commercial
Building Automation- Introduction, Case study: phase one-commercial
building automation today, Case study: phase two- commercial building
automation in the future.
11
Textbook:
Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis Karnouskos,
David Boyle, “From Machine-to-Machine to the Internet of Things: Introduction to a New Age
of Intelligence”, 1st
Edition, Academic Press, 2014.
Reference Books:
Vijay Madisetti and Arshdeep Bahga, “Internet of Things (A Hands-on-
Approach)”, 1st
Edition, VPT, 2014.
Francis daCosta, “Rethinking the Internet of Things: A Scalable Approach to
Connecting Everything”, 1st
Edition, Apress Publications, 2013
NOTE: One question each from units 1, 2 and 4.
Two questions from unit-3
Two questions from unit-5
Course Outcomes:
At the end of the course the student will be able to:
1. Understand the vision of IoT from a global context.
3. 2. Determine the Market perspective of IoT.
3. Use of Devices, Gateways and Data Management in IoT.
4. Building state of the art architecture in IoT.
5. Application of IoT in Industrial and Commercial Building Automation and Real World Design
Constraints.