Herein, an Internet of Things (IoT) system with remote reconfigurable wireless sensor network (WSN) nodes is presented and its application to measure group work activity in a classroom is discussed. This IoT system consists of wiki pages, bots, (defined as remotely controlled devices), gateways, and remotely reconfigurable WSN Nodes. The bots/gateways and WSN nodes of the IoT system are controlled by scripts written on wiki pages that are read by the bot/gateways, which then forward the commands contained in the scripts to the WSN nodes. Each WSN node then executes the commands, obtains the resulting sensor values, and then returns those values to the bot/gateways. The bot/gateways relay the values and write them onto the wiki page. Each WSN node is flexible and reconfigurable because its behavior can be changed by the script commands written onto the wiki page. Using this IoT system, we created a measurement system to evaluate activity levels of group work in a classroom. After developing the measurement system, we found it was possible to adjust the sampling rate for obtaining sensor values simply by rewriting the script on the wiki page without directly manipulating the WSN.
Distributed Data Flow for the Web of Things: Distributed Node-REDMichael Blackstock
Presentation at the Web of Things Workshop at the Iot 2014 conference at MIT on our proposal to create a distributed data flow architecture where sub flows are distributed between servers, gateways and devices
INOVA GIS Platform represents centralized Enterprise GIS (Geographical Information System) that enables seamless data access for any number of different departments within business organization and beyond. Data can be accessed for viewing, analyzing, editing, etc. Apart from that, data can be presented to wider audience with the possibility to control what type of data and to what extent it will be presented.
Design and Analysis of a Broadcast Network Using Logical SegmentationTELKOMNIKA JOURNAL
This study shows how the network performance of a flat switch network in the main library
complex of Ambrose Ali University (AAU), Ekpoma can greatly be improved by logical segmentation. A
survey of the flat switch network of the library complex was carried out to ascertain the physical and logical
topology of the network and the number of hosts and network devices available. The kind of traffic
transmitted over the network was also considered. Riverbed Modeler Academic Edition was used to
simulate two replicas of the library network. One of the simulated networks was logically segmented by
implementing Virtual Local Area Network (VLAN). Statistics like traffic dropped, traffic forwarded, traffic
received, broadcast traffic dropped and traffic sent in bits/sec or packets/sec were collected from both
simulations and the results were analyzed and compared. The results from the simulations showed that
the application of VLAN immensely enhanced the network performance by about 75%(depending on the
size of the network) because the logical segmentation increased the number of broadcast domain while
reducing each of the broadcast size. This further implied that poor network design and large broadcast
domain in a network, gravely affect the performance of a network.
Distributed Data Flow for the Web of Things: Distributed Node-REDMichael Blackstock
Presentation at the Web of Things Workshop at the Iot 2014 conference at MIT on our proposal to create a distributed data flow architecture where sub flows are distributed between servers, gateways and devices
INOVA GIS Platform represents centralized Enterprise GIS (Geographical Information System) that enables seamless data access for any number of different departments within business organization and beyond. Data can be accessed for viewing, analyzing, editing, etc. Apart from that, data can be presented to wider audience with the possibility to control what type of data and to what extent it will be presented.
Design and Analysis of a Broadcast Network Using Logical SegmentationTELKOMNIKA JOURNAL
This study shows how the network performance of a flat switch network in the main library
complex of Ambrose Ali University (AAU), Ekpoma can greatly be improved by logical segmentation. A
survey of the flat switch network of the library complex was carried out to ascertain the physical and logical
topology of the network and the number of hosts and network devices available. The kind of traffic
transmitted over the network was also considered. Riverbed Modeler Academic Edition was used to
simulate two replicas of the library network. One of the simulated networks was logically segmented by
implementing Virtual Local Area Network (VLAN). Statistics like traffic dropped, traffic forwarded, traffic
received, broadcast traffic dropped and traffic sent in bits/sec or packets/sec were collected from both
simulations and the results were analyzed and compared. The results from the simulations showed that
the application of VLAN immensely enhanced the network performance by about 75%(depending on the
size of the network) because the logical segmentation increased the number of broadcast domain while
reducing each of the broadcast size. This further implied that poor network design and large broadcast
domain in a network, gravely affect the performance of a network.
Configuring lifa for remote communication using web architectureVatsal N Shah
This paper presents remote transmission of Temperature parameters using web architecture based on LIFA to remote Engineer for analysis. Web services enable the invocation of a method on a remote target using standard Web-based protocols. A client sends a request to a remote server, which processes the request and replies with a response, which is then interpreted and displayed by the client application. One relies on this communication method for everyday activities such as browsing the Web, checking e-mails, etc. Online data from the sensors can viewed in graphical form showing changes with respect to time.
As network size continues to grow exponentially, there has been a proportionate increase in the number of nodes in the corresponding network. With the advent of Internet of things (IOT), it is assumed that many more devices will be connected to the existing network infrastructure. As a result, monitoring is expected to get more complex for administrators as networks tend to become more heterogeneous. Moreover, the addressing for IOTs would be more complex given the scale at which devices will be added to the network and hence monitoring is bound to become an uphill task due to management of larger range of addresses. This paper will throw light on what kind of monitoring mechanisms can be deployed in internet of things (IOTs) and their overall effectiveness.
In H2020 EU project symbIoTe (symbiosis of smart objects across IoT environments) we have been building IoT middleware based on microservices programmed in Java with Spring Boot and Spring Cloud components. Here I will present our experiences in developing such services in distributed team across EU and employed by 15 organizations. I will present organizational and technical advantages and drawbacks as well as our choices in building such system.
Building IoT Middleware with MicroservicesMario Kušek
In H2020 EU project symbIoTe (symbiosis of smart objects across IoT environments) we have been building IoT middleware based on microservices programmed in Java with Spring Boot and Spring Cloud components. Here I present our experiences in developing such services in distributed team across EU and employed by 15 organizations. I present organizational and technical advantages and drawbacks as well as our choices in building such system.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IoT縛りの勉強会! IoTLT vol.99 2023 5/24
横16 x 縦 75 x 奥行き 8 =9600ドットの3次元表示装置を製作中です。
立体像が空中に浮かんでいるように見えます。
静止画(静止像)、動画像、キャプチャした立体像(一応)の表示、一応、ひととおり、行うことができました。
アニメーション: https://www.youtube.com/shorts/LblIHZbRm2Y
静止像:https://www.youtube.com/shorts/eSV7Vu6nVxc
More Related Content
Similar to An IoT System with Remote Reconfigurable Wireless Sensor Network Nodes and its Application to Measurement of Classroom Activity@Eskm20180708 1
Configuring lifa for remote communication using web architectureVatsal N Shah
This paper presents remote transmission of Temperature parameters using web architecture based on LIFA to remote Engineer for analysis. Web services enable the invocation of a method on a remote target using standard Web-based protocols. A client sends a request to a remote server, which processes the request and replies with a response, which is then interpreted and displayed by the client application. One relies on this communication method for everyday activities such as browsing the Web, checking e-mails, etc. Online data from the sensors can viewed in graphical form showing changes with respect to time.
As network size continues to grow exponentially, there has been a proportionate increase in the number of nodes in the corresponding network. With the advent of Internet of things (IOT), it is assumed that many more devices will be connected to the existing network infrastructure. As a result, monitoring is expected to get more complex for administrators as networks tend to become more heterogeneous. Moreover, the addressing for IOTs would be more complex given the scale at which devices will be added to the network and hence monitoring is bound to become an uphill task due to management of larger range of addresses. This paper will throw light on what kind of monitoring mechanisms can be deployed in internet of things (IOTs) and their overall effectiveness.
In H2020 EU project symbIoTe (symbiosis of smart objects across IoT environments) we have been building IoT middleware based on microservices programmed in Java with Spring Boot and Spring Cloud components. Here I will present our experiences in developing such services in distributed team across EU and employed by 15 organizations. I will present organizational and technical advantages and drawbacks as well as our choices in building such system.
Building IoT Middleware with MicroservicesMario Kušek
In H2020 EU project symbIoTe (symbiosis of smart objects across IoT environments) we have been building IoT middleware based on microservices programmed in Java with Spring Boot and Spring Cloud components. Here I present our experiences in developing such services in distributed team across EU and employed by 15 organizations. I present organizational and technical advantages and drawbacks as well as our choices in building such system.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to An IoT System with Remote Reconfigurable Wireless Sensor Network Nodes and its Application to Measurement of Classroom Activity@Eskm20180708 1 (20)
Bot Computing using the Power of Wiki CollaborationTakashi Yamanoue
Bot computing using the power of Wiki collaboration and an experimental implementation of the bot running environment are discussed. While botnets are usually created for malicious purposes, the bot computing in this study aims to use bots for beneficial purposes. The massively parallel and persistence features of a botnet can enhance its computing power and high availability for beneficial computing. Bot computing can also enhance people’s collaboration by introducing dynamic Web pages to previously static Wiki networks. Parallel dynamic programming for solving a minimal path problem is shown as an example. Resources such as the number of bots and the number of web pages were proportional to the number of nodes, and the time to solve the minimal path problem was proportional to the number of arcs of the minimal path.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
By Design, not by Accident - Agile Venture Bolzano 2024
An IoT System with Remote Reconfigurable Wireless Sensor Network Nodes and its Application to Measurement of Classroom Activity@Eskm20180708 1
1. An IoT System with Remote Reconfigurable Wireless
Sensor Network Nodes and
its Application to Measurement of Classroom Activity
Takashi Yamanoue, Fukuyama University
IIAI AAI ESKM 2018, Yonago, Tottori, Japan, July, 2018.
3. Contents
• 1. Introduction
• 2. IoT System Overview
• 3. IoT System Reconfiguration Example
• 4. Related Work
• 5. Conclusions
• 6. Acknowledgments
#eskm2018
4. 1. Introduction (1/10)
• A typical Internet of Things (IoT) system consists of Internet servers,
Internet edge gateways, and devices with sensors/actuators that are
connected to those gateways by wires or wireless networks.
#eskm2018
5. 1. Introduction (2/10)
• When the number of components making up an IoT system
becomes very large, powerful managers must be used to
administer them effectively.
#eskm2018
6. • This issue is complicated by the fact that sensor/actuator-
equipped devices may be placed in a wide variety of
natural areas such as mountains, fields, rivers, the deep
sea, and even outer space.
1. Introduction (3/10)
7. • Alternatively, they can be found in urban settings,
such as the tops of buildings and towers, inside
buildings, or even within small spaces inside
machines.
1. Introduction (4/10)
8. • As a result, it is often hard, and sometimes even impossible, for a manager
to directly monitor and operate such devices.
• Nevertheless, IoT system managers still need the ability to change the
configurations of such devices when it is necessary to alter sensor
sensitivities, change sampling data frequencies, turn on/off devices, and
so on.
1. Introduction (5/10)
#eskm2018
9. • A wiki [16] page is a website that allows the
easy creation and editing of any number of
interlinked webpages via a web browser, and
can be used as a means of effective
collaboration and information sharing.
Wikipedia [17] is a well-known wiki site.
1. Introduction (6/10)
#eskm2018
10. • If a wiki is friendly to people, it will also be
friendly to machines. This means that if
machines can automatically read and write
data onto a wiki page, users can obtain much
more in the way of beneficial information.
Those users can also easily control machines
through the wiki page, thereby facilitating
machine-to-people, people-to-machine, as
well as machine-to-machine communication,
which would make the wiki much more useful.
• To confirm this, regarding the usefulness of
wikis, we developed an IoT system using wiki
software[4][5][6][7][9]. This system consists of
wiki pages using wiki software and bots
(defined herein as remotely controlled
devices).
#eskm2018
1. Introduction (7/10)
11. • This IoT system may have
wireless sensor network (WSN)
nodes[8].
• The bots used in our IoT system
are flexible and reconfigurable
because they are controlled by
commands and programs written
on wiki pages.
• The bot reads the command
sequence and program from the
wiki page and then executes them
periodically.
• WSN nodes are also flexible and
reconfigurable because their
behavior can be changed remotely
simply by revising the commands
written on the wiki page.
1. Introduction (8/10)
12. • By combining flexible bots and
flexible WSN nodes, IoT system
managers can configure, maintain,
and reconfigure many aspects of a
system, thereby identifying issues
and eliminating problems simply by
rewriting the system script on wiki
pages, without the need to
physically access the bots and WSN
nodes.
#eskm2018
Program/
Data
Wireless Sensor
Network
1. Introduction (9/10)
13. • We have created an activity
measurement system to evaluate
group work activity in a classroom
using our proposed IoT system.
• When developing our measurement
system, we focused on ensuring it
was possible to alter sensor
sensitivities, change sampling data
frequencies, turn on/off devices, and
so on, simply by rewriting the
command sequence and the
program on the wiki page without
directly manipulating the WSNs.
Program/
Data
Wireless Sensor
Network
1. Introduction (10/10)
14. 2. IoT System Over View
2-A Structure of the IoT system (1/3)
• This shows an overview of our system,
which consists of wiki pages, wiki
software, bots/gateways, and WSN
nodes.
• PukiWiki [13] was used for the wiki
software, and Raspberry Pi computers
[14] and ZigBee [20] transceiver modules
were used to provide the bot/gateways
and WSN nodes, respectively.
• The ZigBee devices are programmable
and equipped with sensors and actuators.
#eskm2018
15. • In operation, the bot/gateway reads/writes data
from/to the ZigBee devices, which are
connected by the ZigBee WSN.
• These collect and send sensor data to the wiki
page based on the script written on that page.
• The wiki page can also include a bot program
that reads data from Internet webpages and
WSN nodes can be placed anywhere the node
and WSN bot/gateway can establish and
maintain communication.
• Furthermore, it is possible to place nodes in
locations where it would be impossible for them
to communicate directly with the bot/gateway.
2. IoT System Over View
2-A Structure of the IoT system (2/3)
Program/
Data
ZigBee
Wiki Pages/
Web Pages
Page
16. • If a WSN node is equipped with
actuators, they can be operated
by the bot/gateways based on the
PukiWiki webpage script.
• Furthermore, depending on the
wiki page script, bots without the
WSN gateway function can be
used to analyze data on other wiki
pages (or other websites) and
report back the analysis results to
the originating wiki page. These
bots can run on any personal
computer (PC) that can execute
the required software.
2. IoT System Over View
2-A Structure of the IoT system (3/3)
#eskm2018
17. • Since the bot/gateways of our
IoT system are script
interpreters, bot behavior is
defined by the script. A wiki
page script consists of a
command sequence and a
program.
2. IoT System Over View
2-B Bot/Gateways (1/9)
Program/
Data
#eskm2018
18. • The bot hardware consists of a
Raspberry Pi combined with a
MONOSTICK [11] ZigBee transceiver
module.
• The bot/gateway communicates with wiki
software via the Internet using a local
area network (LAN) interface or the Wi-Fi
transceiver of the Raspberry Pi.
• In operation, the bot controls and reads
sensor data from WSN nodes using the
ZigBee transceiver
#eskm2018
2. IoT System Over View
2-B Bot/Gateways (2/9)Program/
Data
Bot/Gateway
Internet
ZigBee
#eskm2018
19. • This shows the behavior of the
bot/gateway. After starting, the
bot/gateway repeats the following
sequence:
• 1. Read the command sequence
and program on the wiki page. The
URL of the wiki page is written in the
bot setting file or input via the bot
graphical user interface (GUI).
• 2. Interpret and execute the
command sequence and program.
• 3. After executing the command
sequence lines and program, write
back the execution results to the wiki
page.
#eskm2018
2. IoT System Over View
2-B Bot/Gateways (3/9)
20. • This shows an example of the
program and command
sequence for the bot on a wiki
page.
#siguccs17
2. IoT System Over View
2-B Bot/Gateways (4/9)
#eskm2018
21. • When the data of one wiki page is very large, it is
hard for users to read as well as hard for the bot
to read and write.
• Partitioning provides an effective way to cope
with this problem. In order to partition the data to
several wiki pages, the command “set
pageName=“<next page name>”” can be used.
• When the bot reads this command, the wiki
software then reads the <next page name> wiki
page during the next read, instead of current
page.
• The <next page name> may also have <hour> or
<day> commands. In such cases, <hour> is
substituted for the current hour of execution and
<day> is substituted for the current day of the
execution.
#eskm2018
2. IoT System Over View
2-B Bot/Gateways (5/9)
24 wiki pages for
each hour…
set pageName=“page-<hour>”
commands
data
Writecommands
22. • Some bots in the IoT system use the same
commands and program. However, since it is
troublesome to write the same commands and
program to each wiki page, as in object-oriented
programming, the IoT system might also have a
class page for sharing common commands and
programs among the wiki pages of such objects.
• A wiki page consisting of objects is called an
object wiki page. An object page uses the
“include” command for a class wiki page when
sharing the common class among object pages.
• Our IoT system also facilitates high availability
by introducing “crossover including” to Wiki
pages and “crossover execution” to bots.
#eskm2018
2. IoT System Over View
2-B Bot/Gateways (6/9)
23. • The bot/gateway sends commands to the WSN nodes using this program function:
– ex(“pi4j”, “serial send ” <command for the WSN node>”.”)
#eskm2018
2. IoT System Over View
2-B Bot/Gateways (7/9)
Program/
Data
ZigBeeInternet
<command for the WSN node>
24. • When the WSN node receives a command, it executes the command and sends the results back to the
bot/gateway based on the conditions outlined in the command. The results appear in the following format:
– return a32=<receiver-id>, from=<sender-id>,
port=<analog/digital-input-port>, v=<value>,
event=<cause of the return>
#eskm2018
2. IoT System Over View
2-B Bot/Gateways (8/9)
Program/
Data
ZigBeeInternet
<sender-id>
<received-id>
25. • If the <receiver-id> of the bot/gateway receiving the results matches the bot/gateway’s ZigBee
transceiver module, the bot/gateway relays the results and writes the following back to the wiki page:
– device=sensorNetwork, Date=<date and time of received>,
a32=<receiver-id>, from=<sender-id>,
port=<analog/digital-input-port>, v=<value>,
event=<cause of the return>
#eskm2018
2. IoT System Over View
2-B Bot/Gateways (9/9)
Program/
Data
ZigBeeInternet
<sender-id><received-id>
26. • TWELITE DIP [15] programmable ZigBee
devices, which are equipped with sensors
and actuators, are used for WSN nodes.
• We programmed the command interpreter
to use the WSN nodes, a sample of which
is shown here.
• The dual inline package (DIP) shown on
the right side of the figure is the ZigBee
device, whereas the white spherical part is
a passive infra-red (PIR) sensor that can
detect the motion of a human body or
animal.
#eskm2018
2. IoT System Over View
2-C Wireless Sensor Network Node (1/4)
27. • Communications between all WSN nodes is realized by broadcasting.
• WSN nodes can interpret and execute received commands->WSN node behavior can be changed.
• Command:
– get <id> port <analog/digital input port>.
The value at the <analog/digital input port> is immediately returned to the bot/gateway, if the node
<id> received this command.
<id>=*| a32=<hex> | id=<number> | handle=<strconst>
#eskm2018
2. IoT System Over View
2-C Wireless Sensor Network Node (2/4)
28. • Command:
– set <id> sendif <analog/digital input port> interval <time-msec>.
When a node with the <id> node identifier receives this command, the node repeatedly returns the value
at the <analog/digital input port> at intervals of <time-msec>.
#eskm2018
2. IoT System Over View
2-C Wireless Sensor Network Node (3/4)
29. Other commands
– set <id> sendif <analog/digital input port> changed <value>.
– set <id> sendif <analog/digital input port> sendAccumulation <time-msec>.
– set <id> sendif <analog/digital input port> setmode <mode>.
– set <id> i2c <address in hex> <register in hex> <data-size> <value in hex>.
– get <id> i2c <address in hex> <register in hex> <data-size>.
#eskm2018
2. IoT System Over View
2-C Wireless Sensor Network Node (4/4)
30. • As an example of the usefulness of this flexibility, we show an
activity measurement system that measures activity of group
work in a classroom using our IoT system.
• On Nov. 20, 2014, The Central Council of the Educational
Committee of Japan reported the adoption of a new direction for the
twenty-first century that focused on ability as a key competency, as
well as the International Baccalaureate curriculum, and active
learning [1].
• We are now in the process of confirming the effectiveness of active
learning. However, in order to evaluate it effectively, a benchmark of
the “activeness” of active learning is needed. Accordingly, in an
attempt to measure the physical motions of participants in a group
work as a candidate benchmark such “activeness”, we adopted PIR
motion sensors, which are commonly used in home security systems,
automatic lighting control systems, and so on.
3. IoT System Reconfiguration Example(1/8)
31. • we developed an experimental activity
measurement system by combining our
reconfigurable IoT system and PIR sensors.
• This shows an outline of our combined
system being used to measure the group
work activity of individual groups in a
classroom.
• The system consists of Internet-based wiki
pages, a bot/gateway, and eight WSN nodes.
We created 24 wiki object pages for storing
hourly activity data and one wiki class page
for storing the script used for controlling the
bot and WSN nodes.
3. IoT System Reconfiguration Example(2/8)
#eskm2018
32. • This shows an example of the WSN nodes
that were placed at the center of the table for
each group in the classroom.
3. IoT System Reconfiguration Example(3/8)
#eskm2018
33. • We then measured the activity of group work
in a classroom using our measurement
system and compared activity transitions with
the video taken during the class in order to
determine the relationships between them.
• If motion within a group increased, the value
extracted from the measurement system
became larger.
• During the measurement system
development process, we were able to
improve the system by reconfiguring WSN
nodes without manipulating them directly,
simply by rewriting the script on the class
wiki page.
3. IoT System Reconfiguration Example(4/8)
#eskm2018
34. • This shows the wiki page of the measurement system before the improvement. This
figure shows that when the bot sent the “sendif D11 sendAccumulation 2000”
command to two of the WSN nodes of the measurement system at five-minute
intervals (300000 msec), two of the WSN nodes return accumulated values to the DI1
digital port at 20 sec (20000 msec) intervals.
• When eight WSN nodes were use, 1440 result lines were collected each hour.
However, this made the measurement system unstable because adding new data lines
to such a large text block consumes significant amounts of time.
• The line, “command: set reportLength=3000” indicates the setting for the max number
of lines after the “results:” line in the wiki page. However, 3000 was also too large for
the stable execution of the command sequence and the program. More specifically, if
there is no send interval setting command for the page, the bot will attempt to write the
buffered results to the wiki page immediately after executing the command sequence
and program. This was also found to cause unstable execution.
3. IoT System Reconfiguration Example(5/8)
#eskm2018
35. • This shows the improved class wiki page for the measurement
system. We rewrote the “sendif D11 sendAccumulation 2000”
command to “sendif D11 sendAccumulation 3000” in order to the
reduce the hourly number of results lines from 1440 to 960, set
the reportLength to 1000, and set the write back intervals to ten
minutes.
• We also added the “set pageName=“pir-1-<hour>”” command at
the end of the command sequence in order to partition the
results lines into hourly pages. It can be seen that these
improvements made the measurement system more stable.
3. IoT System Reconfiguration Example(6/8)
#eskm2018
36. • This shows the execution results on the object wiki page after the improvements.
Here, each line of the figure shows the returned information from a WSN node,
the identifier of which is the right-hand side of the equation of “a32=”. This value,
which shows the activity at each work group, is the right-hand side of the “v=”
equation.
• Once again, it should be noted that, except for starting them up and turning
them off, we did not manipulate the bot and WSN nodes directly.
3. IoT System Reconfiguration Example(7/8)
#eskm2018
37. 3. IoT System Reconfiguration Example(8/8)
#eskm2018
38. • A cloud service that provides APIs for IoT devices. The developer
writes the IoT device program using Xively’s APIs.
• Xively does not have a function for sending commands from its Xively
server to the IoT devices, program updates must be manually
performed by the developer at the device location in order to
reconfigure the IoT devices.
– Our IoT can be reconfigured by updating the wiki page script,
without requiring the developer to physically access the device.
4. Related Work
4-A Xively
#eskm2018
39. • Users must occasionally download updates from Microsoft [18] and Apple [10],
respectively. Normally require computer restarts when the process is complete.
– Our IoT system does not need restarting after the command sequence and program has
been updated on the wiki page.
• Windows and Apple update processes cannot change the behavior of the
computers while rewriting is taking place.
– The command sequence and program of our IoT system can be used to modify the
behavior of bots and WSN nodes while the system is operating.
• Windows and Apple software updates are seldom sent more than
once a day,
– while the wiki page reading frequency of the bot of our
IoT system can occur as often as every five minutes.
4. Related Work
4-B Windows and Apple Software Updates
#eskm2018
40. • Serviceable space satellites are usually equipped with in-orbit software
replacement functions for maintenance purposes [2] because it is
usually impossible to physically repair or update a satellite in space.
• This situation is similar to the WSN nodes of our IoT.
• Software updates for space satellites seldom occur more than once a
day,
– The wiki page reading frequency of the bot of our IoT system can occur as
often as every five minutes.
4. Related Work
4-C Space Satellites
#eskm2018
41. • Proposed a framework to dynamically reconfigure the WSN and
adapt its power consumption, transmission reliability, and data
throughput to the different requirements of the applications [3].
• Their framework configures the WSN automatically and adjusts the
data exchange frequencies.
• It is possible modify our IoT system to provide similar functions by
introducing similar algorithms to the program in the wiki page of our
IoT.
• Their framework is not suitable for changing IoT functions,
– Our IoT system permits function changes.
4. Related Work
4-D Szczodrak and others
#eskm2018
42. • Achieves the function of controlling IoT devices behind firewalls via
a HTTPS/WebSocket connection from IoT devices to Internet
servers.
• Very similar to the connection between a wiki page and bot in our
IoT system, even though our connection uses HTTP instead of
HTTPS/WebSocket.
• Both the NetNucleus Cloud Hub and our IoT system provides a
method for managers to control edge devices behind firewalls,
NetNucleus Cloud Hub does not have reconfigurable WSN nodes
– Our IoT system does.
4. Related Work
4-E NetNucleus Cloud Hub
#eskm2018
43. 5. Conclusions
• An IoT system with remotely reconfigurable bots and WSN nodes along with an
activity measurement system that was developed using our IoT system.
• How the flexibility of our IoT system makes it easy to improve the measurement
system.
• WSNs are not always reliable, IoT developers must plan for unforeseen events.
– For example, if actuators are connected to WSN nodes, IoT system malfunctions may cause
fires or other serious problems.
• Currently, our IoT system does not have functions that allow physical remote
reconfigurations, such like exchanging physical sensors and actuators after
device deployment, although we expect to address such issues in the future.
• Necessary to ensure the security of our IoT system before it can be deployed for
real world usage.
#eskm2018
44. Acknowledgements
• A part of this research was supported by
– JSPS KAKENHI Grant Number JP16K00197.
• Students who helped us to conduct the experiment.
#eskm2018
45. • In operation, the bot/gateway reads/writes data
from/to the ZigBee devices, which are
connected by the ZigBee WSN.
• These collect and send sensor data to the wiki
page based on the script written on that page.
• The wiki page can also include a bot program
that reads data from Internet webpages and
WSN nodes can be placed anywhere the node
and WSN bot/gateway can establish and
maintain communication.
• Furthermore, it is possible to place nodes in
locations where it would be impossible for them
to communicate directly with the bot/gateway.
2. IoT System Over View
2-A Structure of the IoT system (2/3)
Program/
Data
ZigBee
Wiki Pages/
Web Pages
Page