This document summarizes an implementation of a vehicle ventilation system using a NodeMCU microcontroller as an Internet of Things platform. Temperature and rain sensors connected to the microcontroller collect data on vehicle conditions. A mobile application allows users to remotely monitor sensor readings and control vehicle accessories like windows and fans. Test results found that activating the ventilation system reduced average vehicle temperature by up to 12.4 degrees Celsius. The system provides a low-cost solution for remote monitoring of vehicle temperature.
This document summarizes a proposed multi-tenant healthcare system called Mi-HealthCare that uses a containerized microservices architecture. Key points include:
- Mi-HealthCare uses a multi-tenant architecture to allow multiple healthcare providers (tenants) to access the system using a single codebase and shared infrastructure.
- Containers are used instead of virtual machines for their higher performance and scalability. Docker Swarm is used for container orchestration.
- The system provides features like patient management, clinical documentation, and prescription management. It is designed to meet regulations like HIPAA and GDPR.
Experience in the implementation of wi fi community solution for rural in kiu...Conference Papers
Ā
This document summarizes a project to implement a wireless community network in Kiulu, Sabah, Malaysia. The project aimed to bridge the digital divide and provide free Wi-Fi internet access in the rural area, which previously had no internet access. The network design involved comprehensive site surveys to identify suitable locations for wireless mesh nodes. 18 nodes were installed across locations like schools, community halls, and government buildings to provide connectivity. The network uses MIMOS' locally developed Mi-MESA wireless mesh devices along with antennas, switches, routers, and other infrastructure to deliver internet access to the Kiulu community.
Real time vehicle counting in complex scene for traffic flow estimation using...Journal Papers
Ā
This document presents a multi-level convolutional neural network (mCNN) framework for real-time vehicle counting and classification in complex traffic scenes. The mCNN framework includes five main modules: pre-processing, object detection, tracking, object classification, and quantification. In the pre-processing stage, images are cropped to remove irrelevant details. A CNN is then used for initial object detection and pre-classification. Detected objects are tracked across frames and a second CNN is used for refined classification before vehicle counts are generated. The mCNN framework is tested on 585 minutes of highway video and achieves an average vehicle counting accuracy of 97.53% and weighted average counting with classification accuracy of 91.5%, demonstrating its effectiveness for real-time
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
Ā
Using mobile and Internet of Things (IoT) applications is becoming very popular and obtained researchersā interest and commercial investment, in order to fulfill future vision and the requirements for smart cities. These applications have common demands such as fast response, distributed nature, and awareness of service location. However, these requirementsā nature cannot be satisfied by central systems services that reside in the clouds. Therefore, edge computing paradigm has emerged to satisfy such demands, by providing an extension for cloud resources at the network edge, and consequently, they become closer to end-user devices. In this paper, exploiting edge resources is studied; therefore, a cooperative-hierarchical approach for executing the pre-partitioned applicationsā modules between edges resources is proposed, in order to reduce traffic between the network core and the cloud, where this proposed approach has a polynomial-time complexity. Furthermore, edge computing increases the efficiency of providing services, and improves end-user experience. To validate our proposed cooperative-hierarchical approach for modules placement between edge nodesā resources, iFogSim toolkit is used. The obtained simulation results show that the proposed approach reduces networkās load and the total delay compared to a baseline approach for modulesā placement, moreover, it increases the networkās overall throughput.
Review of big data analytics (bda) architecture trends and analysis Conference Papers
Ā
This document reviews big data analytics (BDA) architecture trends and analysis. It discusses the evolution of data analytics from ancient times to modern technologies like Hadoop and Spark. It describes key features of BDA like flexibility, scalability, and fault tolerance. Common BDA architectures like lambda and kappa architectures are summarized. The lambda architecture uses batch, speed, and serving layers to handle both real-time and batch processing. The kappa architecture simplifies this by removing the batch layer and handling all processing through streaming. Overall, the document provides a high-level overview of BDA architectures and technologies.
A heterogeneous short-range communication platform for Internet of Vehicles IJECEIAES
Ā
The automotive industry is rapidly accelerating toward the development of innovative industry applications that feature management capabilities for data and applications alike in cars. In this regard, more internet of vehicles solutions are emerging through advancements of various wireless medium access-control technologies and the internet of things. In the present work, we develop a short-range communicationābased vehicular system to support vehicle communication and remote car control. We present a combined hardware and software testbed that is capable of controlling a vehicleās start up, operation and several related functionalities covering various vehicle metric data. The testbed is built from two microcontrollers, Arduino and Raspberry Pi 3, each of which individually controls certain functions to improve the overall vehicle control. The implementation of the heterogeneous communication module is based on the IEEE 802.11 and IEEE 802.15 medium access control technologies. Further, a control module on a smartphone was designed and implemented for efficient management. Moreover, we study the system connectivity performance by measuring various important parameters including the coverage distance, signal strength, download speed and latency. This study covers the use of this technology setup in different geographical areas over various time spans.
Smart automatic petrol pump system based on internet of things IJECEIAES
Ā
IoT is that a rapid expanding program presently for blend all equipment things like (sensors, gadgets, hardware and so on) assemble and embed those with programming creating our own gadgets use The petroleum pump is these days running physically. It's an activity that fundamentally a drawnout time and requires more workforce. Additionally, put fuel stations in away zones is extermely costly. So achievement an automatic fuel filling system using web technology to solve these problems. There are dense proposed systems which goal to improve the fueling operation so as to form it less difficulty and more dependabl and more-safe, guarinte that the purchaser gets the same quantity of fuel in interchange for what he/she pays, so assist to end fraud at different fuel stations. These systems take human-software interaction by the web-enabeled procedure, thus keep off all errors made by people. The fundamental objective of this review paper is to survey of recent projects in design protype of smart petro pump based on RFID as payment tool and control on it remotely with high security level and concluded with future potential direction in design of smart petrol pump system.
High precision location tracking technology in ir4.0Journal Papers
Ā
1) The document discusses deploying an Ultra-Wideband (UWB) indoor positioning system (IPS) in a manufacturing factory for high-precision location tracking as part of Industry 4.0 initiatives.
2) Key challenges in deploying UWB IPS in a factory environment include radio signal reflections off metal surfaces, ensuring line-of-sight between tags and sensors, and strategic sensor placement and tag wearing.
3) Techniques to improve positioning accuracy include implementing Kalman filtering on position data and considering factors like tag placement, sensor density, and signal obstructions. The UWB IPS framework incorporates hardware, positioning algorithms, and a dashboard interface.
This document summarizes a proposed multi-tenant healthcare system called Mi-HealthCare that uses a containerized microservices architecture. Key points include:
- Mi-HealthCare uses a multi-tenant architecture to allow multiple healthcare providers (tenants) to access the system using a single codebase and shared infrastructure.
- Containers are used instead of virtual machines for their higher performance and scalability. Docker Swarm is used for container orchestration.
- The system provides features like patient management, clinical documentation, and prescription management. It is designed to meet regulations like HIPAA and GDPR.
Experience in the implementation of wi fi community solution for rural in kiu...Conference Papers
Ā
This document summarizes a project to implement a wireless community network in Kiulu, Sabah, Malaysia. The project aimed to bridge the digital divide and provide free Wi-Fi internet access in the rural area, which previously had no internet access. The network design involved comprehensive site surveys to identify suitable locations for wireless mesh nodes. 18 nodes were installed across locations like schools, community halls, and government buildings to provide connectivity. The network uses MIMOS' locally developed Mi-MESA wireless mesh devices along with antennas, switches, routers, and other infrastructure to deliver internet access to the Kiulu community.
Real time vehicle counting in complex scene for traffic flow estimation using...Journal Papers
Ā
This document presents a multi-level convolutional neural network (mCNN) framework for real-time vehicle counting and classification in complex traffic scenes. The mCNN framework includes five main modules: pre-processing, object detection, tracking, object classification, and quantification. In the pre-processing stage, images are cropped to remove irrelevant details. A CNN is then used for initial object detection and pre-classification. Detected objects are tracked across frames and a second CNN is used for refined classification before vehicle counts are generated. The mCNN framework is tested on 585 minutes of highway video and achieves an average vehicle counting accuracy of 97.53% and weighted average counting with classification accuracy of 91.5%, demonstrating its effectiveness for real-time
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
Ā
Using mobile and Internet of Things (IoT) applications is becoming very popular and obtained researchersā interest and commercial investment, in order to fulfill future vision and the requirements for smart cities. These applications have common demands such as fast response, distributed nature, and awareness of service location. However, these requirementsā nature cannot be satisfied by central systems services that reside in the clouds. Therefore, edge computing paradigm has emerged to satisfy such demands, by providing an extension for cloud resources at the network edge, and consequently, they become closer to end-user devices. In this paper, exploiting edge resources is studied; therefore, a cooperative-hierarchical approach for executing the pre-partitioned applicationsā modules between edges resources is proposed, in order to reduce traffic between the network core and the cloud, where this proposed approach has a polynomial-time complexity. Furthermore, edge computing increases the efficiency of providing services, and improves end-user experience. To validate our proposed cooperative-hierarchical approach for modules placement between edge nodesā resources, iFogSim toolkit is used. The obtained simulation results show that the proposed approach reduces networkās load and the total delay compared to a baseline approach for modulesā placement, moreover, it increases the networkās overall throughput.
Review of big data analytics (bda) architecture trends and analysis Conference Papers
Ā
This document reviews big data analytics (BDA) architecture trends and analysis. It discusses the evolution of data analytics from ancient times to modern technologies like Hadoop and Spark. It describes key features of BDA like flexibility, scalability, and fault tolerance. Common BDA architectures like lambda and kappa architectures are summarized. The lambda architecture uses batch, speed, and serving layers to handle both real-time and batch processing. The kappa architecture simplifies this by removing the batch layer and handling all processing through streaming. Overall, the document provides a high-level overview of BDA architectures and technologies.
A heterogeneous short-range communication platform for Internet of Vehicles IJECEIAES
Ā
The automotive industry is rapidly accelerating toward the development of innovative industry applications that feature management capabilities for data and applications alike in cars. In this regard, more internet of vehicles solutions are emerging through advancements of various wireless medium access-control technologies and the internet of things. In the present work, we develop a short-range communicationābased vehicular system to support vehicle communication and remote car control. We present a combined hardware and software testbed that is capable of controlling a vehicleās start up, operation and several related functionalities covering various vehicle metric data. The testbed is built from two microcontrollers, Arduino and Raspberry Pi 3, each of which individually controls certain functions to improve the overall vehicle control. The implementation of the heterogeneous communication module is based on the IEEE 802.11 and IEEE 802.15 medium access control technologies. Further, a control module on a smartphone was designed and implemented for efficient management. Moreover, we study the system connectivity performance by measuring various important parameters including the coverage distance, signal strength, download speed and latency. This study covers the use of this technology setup in different geographical areas over various time spans.
Smart automatic petrol pump system based on internet of things IJECEIAES
Ā
IoT is that a rapid expanding program presently for blend all equipment things like (sensors, gadgets, hardware and so on) assemble and embed those with programming creating our own gadgets use The petroleum pump is these days running physically. It's an activity that fundamentally a drawnout time and requires more workforce. Additionally, put fuel stations in away zones is extermely costly. So achievement an automatic fuel filling system using web technology to solve these problems. There are dense proposed systems which goal to improve the fueling operation so as to form it less difficulty and more dependabl and more-safe, guarinte that the purchaser gets the same quantity of fuel in interchange for what he/she pays, so assist to end fraud at different fuel stations. These systems take human-software interaction by the web-enabeled procedure, thus keep off all errors made by people. The fundamental objective of this review paper is to survey of recent projects in design protype of smart petro pump based on RFID as payment tool and control on it remotely with high security level and concluded with future potential direction in design of smart petrol pump system.
High precision location tracking technology in ir4.0Journal Papers
Ā
1) The document discusses deploying an Ultra-Wideband (UWB) indoor positioning system (IPS) in a manufacturing factory for high-precision location tracking as part of Industry 4.0 initiatives.
2) Key challenges in deploying UWB IPS in a factory environment include radio signal reflections off metal surfaces, ensuring line-of-sight between tags and sensors, and strategic sensor placement and tag wearing.
3) Techniques to improve positioning accuracy include implementing Kalman filtering on position data and considering factors like tag placement, sensor density, and signal obstructions. The UWB IPS framework incorporates hardware, positioning algorithms, and a dashboard interface.
Performance analysis of software defined network using intent monitor and rer...journalBEEI
Ā
Software defined network (SDN) provides high service flexibility to optimize network configuration based on network traffic. Traffic management able to solve traffic density in SDN. However, it will misuse the network bandwidth and links. One variant of the SDN controller, namely open network operating system (ONOS), provides an intent monitor and reroute (IMR) method that can optimize traffic management based on the description of an object in the ONOS application. This method can optimize the network bandwidth and links of SDN. The IMR can monitor the network and reconfigure the network to restore network connectivity by maximizing the use of each link when transmitting data. This study examines the impact of using IMR with a custom topology on ONOS to find the best scenario by performing traffic management on a data plane consisting of switches totaling 8-12 switches. The parameters measured in this study are bandwidth usage and quality of service (QoS). The results obtained in this study are IMR able to optimize the use of each link and maximize bandwidth usage in a network when distributing data and following TIPHON standards.
Energy Meters using Internet of Things PlatformIRJET Journal
Ā
This document proposes an architecture and implementation for integrating energy meters with an Internet of Things (IoT) platform. The key aspects of the approach are: 1) Integrating smart grid applications and home applications using a common IoT infrastructure, 2) Collecting data from different sensor communication protocols, 3) Providing secure and customized data access, and 4) Mapping sensors and actuators to a common abstraction layer to enable multiple concurrent applications. The proposed system was demonstrated with a kit using Zigbee meters and gateways connected to an IoT server and custom user interface.
Conceptual Model of Real Time Infrastructure Within Cloud Computing EnvironmentCSCJournals
Ā
Cloud computing is a new and most demandable technology in communication environment. Where computing resources such as hardware or/and software are processed as service over networks. SCADA implementation within cloud environment is relatively new and demandable over real time infrastructure (industrial infrastructure).The shifting (moving) of SCADA system (applications and resources) within cloud based infrastructure,meanfully overcome the cost and improve the reliability and performance of whole system. Cloud computing provides on-demand network access and batch of computing services for SCADA system. The current research paper takes two conceptual ideas to implement SCADA system within cloud computing (Hybrid Cloud) environment. In the first phase, SCADA applications are processed entirely inside the hybrid cloud. In the second phase, SCADA applications are running in separate application server directly connected to devices in a SCADA network and rest of paper discusses the security related to SCADA and cloud computing communication.
Interoperability framework for data exchange between legacy and advanced mete...Alexander Decker
Ā
This document discusses interoperability between legacy and advanced metering infrastructure (AMI). It proposes a solution that allows applications from different manufacturers to access standardized metered data. A novel approach is presented for accessing meter metadata without manually inputting address parameters, reducing development time for deploying AMI head-ends. The solution aims to make legacy infrastructure and AMI interoperable during the transition to fully advanced technology, allowing data exchange between heterogeneous systems from multiple vendors.
Interoperability framework for data exchange between legacy and advanced mete...Alexander Decker
Ā
This document discusses interoperability between legacy metering infrastructure and advanced metering infrastructure (AMI). It proposes a solution that allows applications from different manufacturers to access standardized metered data. The solution also provides a way to access meter metadata without manually inputting address parameters, reducing development time for deploying AMI head-ends. The document analyzes challenges of integrating heterogeneous systems and standards like IEC 61850 that can help enable interoperability and data exchange between applications.
This document provides an overview of wireless communication network architectures and sensor networks. It discusses the need for reliable communication networks to support electric utility automation applications. A hybrid communication network architecture is proposed that combines a high-speed core network (e.g. internet VPN) with various last mile connectivity options like power line communication, satellite communication, optical fiber communication and wireless communication. Each connectivity option has advantages and disadvantages for use in electric utility automation. The document also discusses design considerations and challenges for implementing effective wireless communication networks to support various automation applications in the electric system.
This document provides a detailed report on a project studying the Air India network. It begins with an acknowledgement section thanking those who provided support and guidance. The abstract then introduces that Air India was formed by merging two airlines and will operate under a single brand, designator, and accounting code. The body of the report contains an in-depth analysis of Air India's network infrastructure, including hardware, software, connectivity, protocols, management, and security. Diagrams and tables are provided to aid understanding.
IRJET- Design of a High Performance IoT QoS Transmission Mechanism and Middle...IRJET Journal
Ā
The document proposes an Efficient Power-Consumption (IoT) middleware based on the oneM2M communication standard. The middleware provides two mechanisms: 1) A Dynamic Duplication Avoidance Transmission Control mechanism that reduces transmission traffic by avoiding unnecessary duplicated data transmissions between sensors, gateways and servers. 2) A Dynamic Power Adaptation mechanism that dynamically adjusts the power consumption and sleep intervals of sensor devices based on factors like data quality, battery level, and sensor variation, to efficiently manage power consumption while maintaining data quality. The mechanisms aim to build an efficient IoT middleware platform for applications like environmental monitoring.
Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...IJERA Editor
Ā
The recent advancement in cloud computing in cloud computing is leading to and excessive growth of the mobile devices that can become powerful means for the information access and mobile applications. This introducing a latent technology called Mobile cloud computing. Smart phone device supports wide range of mobile applications which require high computational power, memory, storage and energy but these resources are limited in number so act as constraints in smart phone devices. With the integration of cloud computing and mobile applications it is possible to overcome these constraints by offloading the complex modules on cloud. These restrictions may be alleviated by computation offloading: sending heavy computations to resourceful servers and receiving the results from these servers. Many issues related to offloading have been investigated in the past decade.
International journal of engineering issues vol 2015 - no 2 - paper2sophiabelthome
Ā
This document presents a home energy management system that enables remote management of electrical consumption through optimization. It establishes secure communication between a user interface application and modules in the home using 4G cellular networks. The system architecture includes physical components like appliances, sensors and actuators. A Zigbee module provides communication between these and the network layer. 4G cellular networks transfer data about energy consumption from a gateway to the user device and commands from the user to the gateway. A mobile application displays energy usage for the user to monitor and control appliances. The system aims to optimize energy use, reduce costs, and provide secure communication via 4G networks.
Development of a portable community video surveillance systemIJECEIAES
Ā
In 2016, a crime rate has been evidently increasing particularly in Kuala Lumpur areas, including reports on house break-ins, car thefts, motorcycle thefts and robbery. One way of deterring such cases is by installing CCTV monitoring system in premises such as houses or shops, but this usually requires expensive equipment and installation fees. In this paper a cheaper alternative of a portable community video surveillance system running on Raspberry Pi 3 utilizing OpenCV is presented. The system will detect motion based on image subtraction algorithm and immediately inform users when intruders are detected by sending a live video feed to a Telegram group chat, as well as sound the buzzer alarm on the Raspberry Pi. Additionally, any Telegram group members can request images and recorded videos from the system at any time by sending a get request in Telegram which will be handled by Telegram Bot. This system uses the Pi NoIR camera module as the image acquisition device equipped with a 36 LED infrared illuminator for night vision capability. In addition to the Python language, OpenCV, a computer vision simulation from Intel is also used for image processing tasks. The performance analysis of the completed system is also presented computational complexity while offering improved flexibility. The performance time is also presented, where the whole process is run with a noticeable 3 seconds delay in getting the final output.
IRJET- Smart Home Application using Internet of ThingsIRJET Journal
Ā
This document summarizes a research paper on using Internet of Things (IoT) technology to create a smart home application. It discusses how an Arduino board, Bluetooth module, sensors, relays and other components were used to remotely control lights, HVAC, a doorbell, water pump and more via a smartphone app from up to 10 meters away. It also explores how the operating range could be increased using technologies like Zigbee, Wi-Fi or IP-based networks. In conclusion, the paper demonstrates how IoT can enhance home security, convenience and comfort by enabling remote control of various smart home appliances and systems.
Energy Optimized Link Selection Algorithm for Mobile Cloud ComputingEswar Publications
Ā
Mobile cloud computing is the revolutionary distributed computing research area which consists of three different domains: cloud computing, wireless networks and mobile computing targeting to improve the task computational capabilities of the mobile devices in order to minimize the energy consumption. Heavy computations can be offloaded to the cloud to decrease energy consumption for the mobile device. In some mobile cloud applications, it has been more energy inefficient to use the cloud compared to the conventional computing conducted in the local device. Despite mobile cloud computing being a reliable idea, still faces several
problems for mobile phones such as storage, short battery life and so on. One of the most important concerns for mobile devices is low energy consumption. Different network links has different bandwidths to uplink and downlink task as well as data transmission from mobile to cloud or vice-versa. In this paper, a novel optimal link selection algorithm is proposed to minimize the mobile energy. In the first phase, all available networks are
scanned and then signal strength is calculated. All the calculated signals along with network locations are given
input to the optimal link selection algorithm. After the execution of link selection algorithm, an optimal network link is selected.
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
Ā
This document discusses secure authorization for cloud computing using smartphones. It proposes a distributed framework that uses a Unit Transaction Permission Coin (UTPC) as a security token for cloud user authorization. The UTPC is generated using a hash function like SHA or MD5, making it difficult for intruders to break. The framework registers and authenticates trusted smartphone devices using their IMEI and IMSI identifiers in an untrusted computing environment. The resulting UTPC-based authorization method is lightweight and compatible with real-time cloud applications.
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIESijcsit
Ā
Wireless network implementation is a viable option for building network infrastructure in rural communities. Rural people lack network infrastructures for information services and socio-economic development. The aim of this study was to develop a wireless network infrastructure architecture for network services to rural dwellers. A user-centered approach was applied in the study and a wireless network infrastructure was designed and deployed to cover five rural locations. Data was collected and
analyzed to assess the performance of the network facilities. The results shows that the system had been performing adequately without any downtime with an average of 200 users per month and the quality of service has remained high. The transmit/receive rate of 300Mbps was thrice as fast as the normal Ethernet transmit/receive specification with an average throughput of 1 Mbps. The multiple output/multiple input
(MIMO) point-to-multipoint network design increased the network throughput and the quality of service experienced by the users.
Design and development of handover simulator model in 5G cellular network IJECEIAES
Ā
In the modern era of technology, the high speed internet is the most important part of human life. The current available network is reckoned to be slow in speed and not be up to snuff for data transmission regarding business applications. The objective of handover mechanism is to reassign the current session handle by internet gadget. The globe needs the next generation high mobility and throughput performance based internet model. This research paper explains the proposed method of design and development for handover based 5G cellular network. In comparison to the traditional method, we propose to control the handovers between base-stations using a concentric method. The channel simulator is applied over the range of the frequencies from 500 MHz to 150 GHz and radio frequency for the 700 MHz bandwidth. The performance of the simulation system is calculated on the basis of handover preparation and completion time regarding base station as well as number of users. From this experiment we achieve the 7.08 ms handover preparation time and 9.98 ms handover completion time. The author recommended the minimum handover completion time, perform the high speed for 5G cellular networks.
Performance Evaluation of VEnodeb Using Virtualized Radio Resource ManagementJIEMS Akkalkuwa
Ā
This paper proposes implementing a virtualized eNodeB component called Radio Resource Management (RRM) to improve performance of cellular networks. The authors capture spectrum utilization data and develop an analytical model for call admission control. They implement a virtual RRM using SDN and NFV technologies and compare the performance to a traditional base station. Results show the virtual RRM can increase network utilization by 60% and reduce energy consumption by 33%, but is susceptible to violating service level agreements during spikes in network traffic due to its reactive nature. The work presents opportunities for future research using machine learning for predictive analysis and combining virtual RRM with cognitive cellular networks.
This document proposes a novel three-tier vehicle cloud architecture to provide real-time services for cloud computing enabled vehicle networks. The three tiers include the device level, communication level, and service level. The device level includes sensors that can form an in-vehicle body area sensor network. The communication level allows vehicle-to-vehicle and vehicle-to-infrastructure communication. The service level provides context-based, communication-based, and customized services using cloud computing, such as real-time road traffic monitoring and driver healthcare monitoring. The architecture aims to improve safety, convenience, and comfort for drivers.
Implementation of vehicle ventilation system using NodeMCU ESP8266 for remote...journalBEEI
Ā
In this paper, an implementation of vehicle ventilation system using microcontroller NodeMCU is described, as an internet of things (IoT) platform. A low-cost wireless fidelity (Wi-Fi) microchip ESP8266 integrated with NodeMCU provides full-stack transmission control protocol/internet protocol (TCP/IP) to communicate between mobile applications. This chip is capable to monitor and control sensor devices connected to the IoT platform. In this reserach, data was collected from a temperature sensor integrated to the platform, which then monitored using Blynk application. The vehicle ventilation system was activated/deactivated through mobile application and controlled using ON/OFF commands sent to the connected devices. From the results, the vehicle ventilation system built using NodeMCU microcontroller is capable to provide near real-time data monitoring for temperature in the car before and after the ventilation system was applied.
IOT Cloud Based Real Time Automobile Monitoring SystemDr. Amarjeet Singh
Ā
This document describes an Internet of Things (IoT) cloud-based real-time automobile monitoring system that uses sensors and modules to monitor various metrics of a vehicle and track its location. The system monitors metrics like fuel level, battery level, engine temperature, speed, and the driver's alcohol level using sensors. It uses an Arduino, GPS module, RFID technology, WiFi module, and cloud storage to monitor the metrics, track the vehicle's location, provide keyless entry, and allow remote viewing of data. The system is meant to improve vehicle security, enable remote monitoring of metrics, and alert owners if any metrics cross a threshold.
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...IRJET Journal
Ā
This document describes a home appliance controlling and monitoring system using an IoT mobile application. The system allows users to control home appliances like fans, lights, and AC remotely via an Android app connected to a microcontroller over WiFi. Sensors like a DHT11 temperature and humidity sensor are connected to the microcontroller to monitor environmental conditions. The microcontroller is programmed to connect to the local WiFi router and send messages to the Android app. Relays connect appliances to the microcontroller so they can be turned on/off remotely. The system provides convenience, energy savings, and increased home security by allowing remote monitoring and control of appliances via a mobile device connected to the IoT network.
NRF based wireless light and Fan dimmer controlling system.IRJET Journal
Ā
This document discusses the design and implementation of a wireless light and fan dimmer controlling system using Near Field Communication (NRF) technology. It presents the circuit diagrams and working of the NRF transmitter, receiver for controlling a light bulb, and receiver for controlling a fan speed. The transmitter uses a digital rotor for providing input to control the light and fan remotely. The receivers use relays and TRIACs respectively to switch the light and control the fan speed based on signals received from the transmitter. The system allows wireless control of home appliances like lights and fans to enable home automation.
Performance analysis of software defined network using intent monitor and rer...journalBEEI
Ā
Software defined network (SDN) provides high service flexibility to optimize network configuration based on network traffic. Traffic management able to solve traffic density in SDN. However, it will misuse the network bandwidth and links. One variant of the SDN controller, namely open network operating system (ONOS), provides an intent monitor and reroute (IMR) method that can optimize traffic management based on the description of an object in the ONOS application. This method can optimize the network bandwidth and links of SDN. The IMR can monitor the network and reconfigure the network to restore network connectivity by maximizing the use of each link when transmitting data. This study examines the impact of using IMR with a custom topology on ONOS to find the best scenario by performing traffic management on a data plane consisting of switches totaling 8-12 switches. The parameters measured in this study are bandwidth usage and quality of service (QoS). The results obtained in this study are IMR able to optimize the use of each link and maximize bandwidth usage in a network when distributing data and following TIPHON standards.
Energy Meters using Internet of Things PlatformIRJET Journal
Ā
This document proposes an architecture and implementation for integrating energy meters with an Internet of Things (IoT) platform. The key aspects of the approach are: 1) Integrating smart grid applications and home applications using a common IoT infrastructure, 2) Collecting data from different sensor communication protocols, 3) Providing secure and customized data access, and 4) Mapping sensors and actuators to a common abstraction layer to enable multiple concurrent applications. The proposed system was demonstrated with a kit using Zigbee meters and gateways connected to an IoT server and custom user interface.
Conceptual Model of Real Time Infrastructure Within Cloud Computing EnvironmentCSCJournals
Ā
Cloud computing is a new and most demandable technology in communication environment. Where computing resources such as hardware or/and software are processed as service over networks. SCADA implementation within cloud environment is relatively new and demandable over real time infrastructure (industrial infrastructure).The shifting (moving) of SCADA system (applications and resources) within cloud based infrastructure,meanfully overcome the cost and improve the reliability and performance of whole system. Cloud computing provides on-demand network access and batch of computing services for SCADA system. The current research paper takes two conceptual ideas to implement SCADA system within cloud computing (Hybrid Cloud) environment. In the first phase, SCADA applications are processed entirely inside the hybrid cloud. In the second phase, SCADA applications are running in separate application server directly connected to devices in a SCADA network and rest of paper discusses the security related to SCADA and cloud computing communication.
Interoperability framework for data exchange between legacy and advanced mete...Alexander Decker
Ā
This document discusses interoperability between legacy and advanced metering infrastructure (AMI). It proposes a solution that allows applications from different manufacturers to access standardized metered data. A novel approach is presented for accessing meter metadata without manually inputting address parameters, reducing development time for deploying AMI head-ends. The solution aims to make legacy infrastructure and AMI interoperable during the transition to fully advanced technology, allowing data exchange between heterogeneous systems from multiple vendors.
Interoperability framework for data exchange between legacy and advanced mete...Alexander Decker
Ā
This document discusses interoperability between legacy metering infrastructure and advanced metering infrastructure (AMI). It proposes a solution that allows applications from different manufacturers to access standardized metered data. The solution also provides a way to access meter metadata without manually inputting address parameters, reducing development time for deploying AMI head-ends. The document analyzes challenges of integrating heterogeneous systems and standards like IEC 61850 that can help enable interoperability and data exchange between applications.
This document provides an overview of wireless communication network architectures and sensor networks. It discusses the need for reliable communication networks to support electric utility automation applications. A hybrid communication network architecture is proposed that combines a high-speed core network (e.g. internet VPN) with various last mile connectivity options like power line communication, satellite communication, optical fiber communication and wireless communication. Each connectivity option has advantages and disadvantages for use in electric utility automation. The document also discusses design considerations and challenges for implementing effective wireless communication networks to support various automation applications in the electric system.
This document provides a detailed report on a project studying the Air India network. It begins with an acknowledgement section thanking those who provided support and guidance. The abstract then introduces that Air India was formed by merging two airlines and will operate under a single brand, designator, and accounting code. The body of the report contains an in-depth analysis of Air India's network infrastructure, including hardware, software, connectivity, protocols, management, and security. Diagrams and tables are provided to aid understanding.
IRJET- Design of a High Performance IoT QoS Transmission Mechanism and Middle...IRJET Journal
Ā
The document proposes an Efficient Power-Consumption (IoT) middleware based on the oneM2M communication standard. The middleware provides two mechanisms: 1) A Dynamic Duplication Avoidance Transmission Control mechanism that reduces transmission traffic by avoiding unnecessary duplicated data transmissions between sensors, gateways and servers. 2) A Dynamic Power Adaptation mechanism that dynamically adjusts the power consumption and sleep intervals of sensor devices based on factors like data quality, battery level, and sensor variation, to efficiently manage power consumption while maintaining data quality. The mechanisms aim to build an efficient IoT middleware platform for applications like environmental monitoring.
Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...IJERA Editor
Ā
The recent advancement in cloud computing in cloud computing is leading to and excessive growth of the mobile devices that can become powerful means for the information access and mobile applications. This introducing a latent technology called Mobile cloud computing. Smart phone device supports wide range of mobile applications which require high computational power, memory, storage and energy but these resources are limited in number so act as constraints in smart phone devices. With the integration of cloud computing and mobile applications it is possible to overcome these constraints by offloading the complex modules on cloud. These restrictions may be alleviated by computation offloading: sending heavy computations to resourceful servers and receiving the results from these servers. Many issues related to offloading have been investigated in the past decade.
International journal of engineering issues vol 2015 - no 2 - paper2sophiabelthome
Ā
This document presents a home energy management system that enables remote management of electrical consumption through optimization. It establishes secure communication between a user interface application and modules in the home using 4G cellular networks. The system architecture includes physical components like appliances, sensors and actuators. A Zigbee module provides communication between these and the network layer. 4G cellular networks transfer data about energy consumption from a gateway to the user device and commands from the user to the gateway. A mobile application displays energy usage for the user to monitor and control appliances. The system aims to optimize energy use, reduce costs, and provide secure communication via 4G networks.
Development of a portable community video surveillance systemIJECEIAES
Ā
In 2016, a crime rate has been evidently increasing particularly in Kuala Lumpur areas, including reports on house break-ins, car thefts, motorcycle thefts and robbery. One way of deterring such cases is by installing CCTV monitoring system in premises such as houses or shops, but this usually requires expensive equipment and installation fees. In this paper a cheaper alternative of a portable community video surveillance system running on Raspberry Pi 3 utilizing OpenCV is presented. The system will detect motion based on image subtraction algorithm and immediately inform users when intruders are detected by sending a live video feed to a Telegram group chat, as well as sound the buzzer alarm on the Raspberry Pi. Additionally, any Telegram group members can request images and recorded videos from the system at any time by sending a get request in Telegram which will be handled by Telegram Bot. This system uses the Pi NoIR camera module as the image acquisition device equipped with a 36 LED infrared illuminator for night vision capability. In addition to the Python language, OpenCV, a computer vision simulation from Intel is also used for image processing tasks. The performance analysis of the completed system is also presented computational complexity while offering improved flexibility. The performance time is also presented, where the whole process is run with a noticeable 3 seconds delay in getting the final output.
IRJET- Smart Home Application using Internet of ThingsIRJET Journal
Ā
This document summarizes a research paper on using Internet of Things (IoT) technology to create a smart home application. It discusses how an Arduino board, Bluetooth module, sensors, relays and other components were used to remotely control lights, HVAC, a doorbell, water pump and more via a smartphone app from up to 10 meters away. It also explores how the operating range could be increased using technologies like Zigbee, Wi-Fi or IP-based networks. In conclusion, the paper demonstrates how IoT can enhance home security, convenience and comfort by enabling remote control of various smart home appliances and systems.
Energy Optimized Link Selection Algorithm for Mobile Cloud ComputingEswar Publications
Ā
Mobile cloud computing is the revolutionary distributed computing research area which consists of three different domains: cloud computing, wireless networks and mobile computing targeting to improve the task computational capabilities of the mobile devices in order to minimize the energy consumption. Heavy computations can be offloaded to the cloud to decrease energy consumption for the mobile device. In some mobile cloud applications, it has been more energy inefficient to use the cloud compared to the conventional computing conducted in the local device. Despite mobile cloud computing being a reliable idea, still faces several
problems for mobile phones such as storage, short battery life and so on. One of the most important concerns for mobile devices is low energy consumption. Different network links has different bandwidths to uplink and downlink task as well as data transmission from mobile to cloud or vice-versa. In this paper, a novel optimal link selection algorithm is proposed to minimize the mobile energy. In the first phase, all available networks are
scanned and then signal strength is calculated. All the calculated signals along with network locations are given
input to the optimal link selection algorithm. After the execution of link selection algorithm, an optimal network link is selected.
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
Ā
This document discusses secure authorization for cloud computing using smartphones. It proposes a distributed framework that uses a Unit Transaction Permission Coin (UTPC) as a security token for cloud user authorization. The UTPC is generated using a hash function like SHA or MD5, making it difficult for intruders to break. The framework registers and authenticates trusted smartphone devices using their IMEI and IMSI identifiers in an untrusted computing environment. The resulting UTPC-based authorization method is lightweight and compatible with real-time cloud applications.
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIESijcsit
Ā
Wireless network implementation is a viable option for building network infrastructure in rural communities. Rural people lack network infrastructures for information services and socio-economic development. The aim of this study was to develop a wireless network infrastructure architecture for network services to rural dwellers. A user-centered approach was applied in the study and a wireless network infrastructure was designed and deployed to cover five rural locations. Data was collected and
analyzed to assess the performance of the network facilities. The results shows that the system had been performing adequately without any downtime with an average of 200 users per month and the quality of service has remained high. The transmit/receive rate of 300Mbps was thrice as fast as the normal Ethernet transmit/receive specification with an average throughput of 1 Mbps. The multiple output/multiple input
(MIMO) point-to-multipoint network design increased the network throughput and the quality of service experienced by the users.
Design and development of handover simulator model in 5G cellular network IJECEIAES
Ā
In the modern era of technology, the high speed internet is the most important part of human life. The current available network is reckoned to be slow in speed and not be up to snuff for data transmission regarding business applications. The objective of handover mechanism is to reassign the current session handle by internet gadget. The globe needs the next generation high mobility and throughput performance based internet model. This research paper explains the proposed method of design and development for handover based 5G cellular network. In comparison to the traditional method, we propose to control the handovers between base-stations using a concentric method. The channel simulator is applied over the range of the frequencies from 500 MHz to 150 GHz and radio frequency for the 700 MHz bandwidth. The performance of the simulation system is calculated on the basis of handover preparation and completion time regarding base station as well as number of users. From this experiment we achieve the 7.08 ms handover preparation time and 9.98 ms handover completion time. The author recommended the minimum handover completion time, perform the high speed for 5G cellular networks.
Performance Evaluation of VEnodeb Using Virtualized Radio Resource ManagementJIEMS Akkalkuwa
Ā
This paper proposes implementing a virtualized eNodeB component called Radio Resource Management (RRM) to improve performance of cellular networks. The authors capture spectrum utilization data and develop an analytical model for call admission control. They implement a virtual RRM using SDN and NFV technologies and compare the performance to a traditional base station. Results show the virtual RRM can increase network utilization by 60% and reduce energy consumption by 33%, but is susceptible to violating service level agreements during spikes in network traffic due to its reactive nature. The work presents opportunities for future research using machine learning for predictive analysis and combining virtual RRM with cognitive cellular networks.
This document proposes a novel three-tier vehicle cloud architecture to provide real-time services for cloud computing enabled vehicle networks. The three tiers include the device level, communication level, and service level. The device level includes sensors that can form an in-vehicle body area sensor network. The communication level allows vehicle-to-vehicle and vehicle-to-infrastructure communication. The service level provides context-based, communication-based, and customized services using cloud computing, such as real-time road traffic monitoring and driver healthcare monitoring. The architecture aims to improve safety, convenience, and comfort for drivers.
Implementation of vehicle ventilation system using NodeMCU ESP8266 for remote...journalBEEI
Ā
In this paper, an implementation of vehicle ventilation system using microcontroller NodeMCU is described, as an internet of things (IoT) platform. A low-cost wireless fidelity (Wi-Fi) microchip ESP8266 integrated with NodeMCU provides full-stack transmission control protocol/internet protocol (TCP/IP) to communicate between mobile applications. This chip is capable to monitor and control sensor devices connected to the IoT platform. In this reserach, data was collected from a temperature sensor integrated to the platform, which then monitored using Blynk application. The vehicle ventilation system was activated/deactivated through mobile application and controlled using ON/OFF commands sent to the connected devices. From the results, the vehicle ventilation system built using NodeMCU microcontroller is capable to provide near real-time data monitoring for temperature in the car before and after the ventilation system was applied.
IOT Cloud Based Real Time Automobile Monitoring SystemDr. Amarjeet Singh
Ā
This document describes an Internet of Things (IoT) cloud-based real-time automobile monitoring system that uses sensors and modules to monitor various metrics of a vehicle and track its location. The system monitors metrics like fuel level, battery level, engine temperature, speed, and the driver's alcohol level using sensors. It uses an Arduino, GPS module, RFID technology, WiFi module, and cloud storage to monitor the metrics, track the vehicle's location, provide keyless entry, and allow remote viewing of data. The system is meant to improve vehicle security, enable remote monitoring of metrics, and alert owners if any metrics cross a threshold.
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...IRJET Journal
Ā
This document describes a home appliance controlling and monitoring system using an IoT mobile application. The system allows users to control home appliances like fans, lights, and AC remotely via an Android app connected to a microcontroller over WiFi. Sensors like a DHT11 temperature and humidity sensor are connected to the microcontroller to monitor environmental conditions. The microcontroller is programmed to connect to the local WiFi router and send messages to the Android app. Relays connect appliances to the microcontroller so they can be turned on/off remotely. The system provides convenience, energy savings, and increased home security by allowing remote monitoring and control of appliances via a mobile device connected to the IoT network.
NRF based wireless light and Fan dimmer controlling system.IRJET Journal
Ā
This document discusses the design and implementation of a wireless light and fan dimmer controlling system using Near Field Communication (NRF) technology. It presents the circuit diagrams and working of the NRF transmitter, receiver for controlling a light bulb, and receiver for controlling a fan speed. The transmitter uses a digital rotor for providing input to control the light and fan remotely. The receivers use relays and TRIACs respectively to switch the light and control the fan speed based on signals received from the transmitter. The system allows wireless control of home appliances like lights and fans to enable home automation.
Energy Management with Disaster Intimation and Control using IoTIJEACS
Ā
In the area of digitization and automation, the life of
human being is getting simpler as almost everything is
automated. Nowadays humans have made internet an integral
part of their everyday life without which they are helpless.
Internet of things (IoT) gives a platform which allows different
devices to inter-connect, sense and control the things remotely
across a network infrastructure without any limitation to the
coverage area. In our proposed work, we stress on Wireless-
Home-Automation-System (WHAS) using IoT, it is a system uses
computers or smart phone to control basic home functions and
features automatically through internet from anywhere around
the world, an automated home is sometimes called a smart home.
The proposed system is able to monitor the entire things
connected to the internet and also to be maintaining the status of
individual devices for further action. We have built the home
automation with several devices and sensors, here sensor help to
monitor the device status and intimate the authorized person to
take particular action.
IRJET- Home Automation using IoT: ReviewIRJET Journal
Ā
This document summarizes research on using Internet of Things (IoT) technology for home automation and security. It discusses how IoT allows devices in the home to be controlled remotely through a smartphone app and can automate tasks. The document also reviews different approaches others have taken to implement smart home security systems using sensors and microcontrollers connected to the Internet. It describes the typical architecture of an IoT system including sensor, network, and application layers. Finally, it summarizes several research papers on developing smart home and kitchen monitoring systems using technologies like Arduino, Raspberry Pi, and sensors for functions like detecting fires, gas leaks, and intruders.
Design and implement WSN/IOT smart parking management system using microcontr...IJECEIAES
Ā
With the dramatic expansion of new networks such as Wireless Sensor Network (WSN) and Internet-of-Things (IoT), tremendous opportunities have been emerged to incorporate such technologies for valuable tasks. One of these tasks is the smart car parking where there is an imperative demand to manage the parking in various facilities, which may help drivers to save their time. Several research studies have addressed this task using wide range of approaches. However, the energy consumption is still a serious concern. This paper proposes a smart car parking based on cloud-based approach along with variety of sensors. Passive Infrared Sensors (PIRs) have been used to sense the object motion. While Light Dependent Resistor (LDR) sensors have been utilized to sense the light of the parking alarm and display information regarding the occupied and non-occupied parking lots. Finally, multi-micro controller of Arduino have been exploited in order to transmit the information collected to the server. Finally, a prototype Android application has been developed in order to receive the information from the server. Results of simulation showed the efficacy of the proposed method.
IRJET - IoT based Advanced Home AutomationIRJET Journal
Ā
This document describes an IoT-based home automation system that allows users to control home appliances remotely through either a website or voice commands. The system uses a PIC microcontroller connected to sensors, relays for appliances, and a GSM module for internet connectivity. It provides comfort features like voice-controlled lights and fans. Security features include a burglar alarm and gas detection. The system aims to help elderly or disabled people control home devices easily through voice commands.
Development of web-based surveillance system for Internet of Things (IoT) app...journalBEEI
Ā
With the advancement of wireless technology, our dependency on smart system has increases to a higher level than before. Without doubt, integration between different technologies becomes inevitable in order create affordable surveillance system. This paper presents the development of with web-based surveillance system with a dedicated Android-based mobile application using a Raspberry Pi and its supporting components i.e., Pi-Camera, PIR motion sensor, Ultrasonic sensor, web-based & mobile application. The designed system also utilizes Node-Red development tools as the platform to integrate all components of the system, MQTT as the communication protocol for data acquisition and ThingSpeak as the middleware. The proposed system can be implemented over the internet using any computer and mobile devices, at anywhere and anytime. The system can automatically stream live video viewed from the Android mobile application and the Raspberry Pi device can send an alert notification to users via email and SMS. The system can be one possible features in smart home system and is considered as an affordable solution, customizable and easy to implement in comparison with other commercial surveillance system products such as CCTV or IP Camera
Smart home system is very popular in current days that give many kind of application that make all simple and easy to control. In modern day, home machines are using wireless equipment and can be retrieved by internet that will make populations life easier and organized. It based Home Computerization System is designed to assist the people with physical debilities and elderly to provide support as well as to control the electrical usages and monitor the room infection using mobile application. The design is using surrounded controller board and the home appliances are physically associated to output ports of this board via relays. The Home Automation is a wireless home computerization system that is supposed to be executed in existing home environments, without any variations in the infrastructure. Arun Kumar. N | Sathiyabama. T "Smart Security System (IOT)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29337.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/29337/smart-security-system-iot/arun-kumar-n
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOTIRJET Journal
Ā
This document presents a vehicle anti-theft detection and protection system using image capture and IoT. The system uses an ESP32 microcontroller and ESP32 camera to capture images of unauthorized persons attempting to use the vehicle. A BLYNK app is used to monitor and control the vehicle remotely, including starting and stopping the vehicle motor. The system notifies the owner if an incorrect password is entered on the push button keypad, and captures an image of the person. The system aims to securely protect vehicles using innovative IoT technologies.
Office Automation & Attendance System using IoTIRJET Journal
Ā
This document describes an office automation and attendance system using Internet of Things (IoT) technology. The system allows users to remotely control and monitor office appliances like lights and fans using a mobile app. It also implements an RFID-based employee attendance tracking system where employees scan RFID cards to record entry and exit times. The data is sent to a cloud database using an ESP8266 WiFi module. The system aims to automate office tasks and provide remote monitoring capabilities using low-cost IoT components like NodeMCU microcontrollers.
Office Automation & Attendance System using IoTIRJET Journal
Ā
This document describes an office automation and attendance tracking system using Internet of Things (IoT) technology. The system allows remote control of office appliances like lights and fans using a mobile app. It also uses RFID cards and readers to track employee attendance by time of entry and exit. The RFID data is sent to a cloud database using an ESP8266 WiFi module. This provides a contactless, secure way to track attendance. The system aims to automate office tasks and make appliance control and attendance tracking more efficient using IoT connectivity.
IRJET- Smart Home Automation using IoT with Security FeaturesIRJET Journal
Ā
This document summarizes a research paper on designing a smart home automation system using IoT with security features. The proposed system uses an Arduino board connected to various sensors and appliances via relays to allow remote control and monitoring via a mobile app and cloud server. Security features like motion detection, alarms, and cameras are included to monitor the home remotely. The system is designed to be low cost while providing flexibility and security in controlling devices within the home using WiFi and password protection.
Android Operated Application Based Smart Eye for Home Automation System Using...IJMTST Journal
Ā
` In recent years, the number of network enabled digital devices and services at homes has been increasing
fast. With the rapid increase of the Internet, the owners have been requesting remote control and monitoring
of these in-home appliances. This application leads to networking these appliances to form a kind of home
automation system. In this paper, an Android based home automation system that allows multiple users to
control the appliances by an Android application developed as well as using a web server is created. The
system used has three hardware components: raspberry pi a local connected device to transfer signals to
home appliances, a Web server to store customer records and support services to the other components, and
a smart mobile phone smart device running Android application developed. Distributed cloud platforms
systems and services of Google are used to support messaging between the components. The prototype
implementation of the proposed system is evaluated based on the criteria considered after the requirement
analysis for an adequate home automation system. The aim of this paper is to define the research of home
automation systems using android application, to provide home automation system using android
application operation also by creating a web server connected to ARM 7 board and Raspberry Pi 2.
IOT Based Smart Home System TechnologiesIJERDJOURNAL
Ā
ABSTRACT:- The IoT allows objects to be sensed and/or controlled remotely across existing network infrastructure, creating opportunities for more direct integration of the physical world into computer-based systems. It results improved efficiency, accuracy and economic benefit in addition to reduced human intervention. On the other hand, IoT systems could also be responsible for performing actions, not just sensing the things. Intelligent Shopping systems, for example could monitor specific users purchasing habits in a store by tracking their specific mobile phones. Other applications that the Internet of Things can provide enabling extended home security features and home automation. This paper relates smart home or home automation which induce technology for home atmosphere which is usage to provide ease and protection to its occupants.
A major problem in day to day life is parking of vehicles especially the car parking at an appropriate place. And this issue indirectly leads to traffic congestion. This paper presents the basic concept of using server or cloud based smart parking services in smart cities as an important application of the Internet of Things (IoT) paradigm. This system will be accessible through a mobile app or through the webpage provided and can be used to monitor or find the empty slots in that area.
Monitoring behavior, numerous actions, or any such information is considered
as surveillance and is done for information gathering, influencing, managing,
or directing purposes. Citizens employ surveillance to safeguard their
communities. Governments do this for the purposes of intelligence collection,
including espionage, crime prevention, the defense of a method, a person, a
group, or an item; or the investigation of criminal activity. Using an internet
of things (IoT) rover, the area will be secured with better secrecy and
efficiency instead of humans, will provide an additional safety step. In this
paper, there is a discussion about an IoT rover for remote surveillance based
around a Raspberry Pi microprocessor which will be able to monitor a
closed/open space. This rover will allow safer survey operations and would
help to reduce the risks involved with it.
Design and Implementation of a Wi-Fi Controlled Car Using NodeMCU, Arduino UN...IRJET Journal
Ā
This document describes a project to design and implement a Wi-Fi controlled car using NodeMCU, Arduino UNO, and Blynk IoT. The car uses a NodeMCU microcontroller board with built-in Wi-Fi to connect to a mobile app via the Blynk IoT platform. Commands sent from the app are received by NodeMCU and sent to an Arduino UNO board to control four gear motors and move the car. The project aims to demonstrate how IoT enables remote control of physical devices and has applications in areas like robotics, automation, and education.
Similar to Implementation of vehicle ventilation system using node mcu esp8266 for remote monitoring (20)
The document describes an AI-driven Occupational Skills Generator (AIOSG) that aims to automate the process of creating occupational skills reference documents. The AIOSG utilizes an intelligent web crawler, natural language processing, neural networks, and a blockchain to gather data on occupational skills from various sources, analyze the data, and generate standardized skills reference documents. It is meant to make the document creation process more efficient, data-driven, and able to incorporate rapidly changing skills demands compared to the traditional manual process. The system architecture and key components of data collection, analysis, skills ontology construction, and reference document generation are outlined.
Advanced resource allocation and service level monitoring for container orche...Conference Papers
Ā
This document proposes an architecture for advanced resource allocation and service level monitoring for container orchestration platforms. It begins with background on containerization and different container orchestration platforms like Docker Swarm, Kubernetes, and Mesos. It then discusses the need for resource-aware container placement and SLA-based monitoring to minimize container migration and ensure performance. The proposed architecture consists of different components like a request manager, information collector, policy manager, and resource manager to enable advanced scheduling and monitoring of containers on Kubernetes. The proposed solution aims to analyze future resource utilization to improve placement decisions and reduce issues after deployment.
Adaptive authentication to determine login attempt penalty from multiple inpu...Conference Papers
Ā
This document proposes an adaptive authentication solution that determines login penalties based on multiple input sources. It describes adding an IP address checker module to the existing Trust Engine component of the Mi-UAP authentication platform. The IP address checker would identify the source type of a user's IP address and apply the appropriate penalty, such as requiring additional authentication methods or blocking the user, depending on factors like whether the IP is on a blacklist database. The document outlines the process flow and provides examples of how penalties would be applied based on the identified source type.
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...Conference Papers
Ā
- The document analyzes the absorption spectrum of dentine sialophosphoprotein (DSPP) in gingival crevicular fluid (GCF) samples from orthodontic patients to develop a model for detecting orthodontic-induced inflammatory root resorption (OIIRR).
- GCF samples were collected from orthodontic patients at different treatment periods (3, 6, 12 months) and from non-orthodontic patients. Absorption spectroscopy found DSPP absorbance spectra increased with longer treatment duration, indicating more DSPP released due to more OIIRR.
- A qualitative model using SIMCA analysis accurately classified GCF samples into orthodontic and non-orthodont
A deployment scenario a taxonomy mapping and keyword searching for the appl...Conference Papers
Ā
This document discusses developing a taxonomy to map relationships between applications, virtual machines, hosts, and clients when performing upgrades and patches. It proposes creating a taxonomy based on analyzing errors that occur during application execution to understand dependencies. The methodology involves backing up configurations, testing connectivity between virtual networks and clusters before and after upgrades, and analyzing issues that arise. The goal is to establish structures for troubleshooting by classifying relationships between applications, libraries, operating systems, and browsers involved. This may improve determining the root cause of errors during upgrades involving virtualization.
Automated snomed ct mapping of clinical discharge summary data for cardiology...Conference Papers
Ā
The document discusses an approach to automatically map clinical terms in clinical discharge summary data from Malaysian hospitals to SNOMED CT terminology in order to improve the accuracy of queries for cardiology-related cases. Natural language processing techniques are used to preprocess the free-text discharge notes by removing formatting tags and identifying clinical terms, which are then mapped to SNOMED CT concepts using techniques like synonym matching, subsumption relationships, and identifying and excluding negative statements. The goal is to enrich the query results by standardizing the clinical terms to SNOMED CT and taking relationships like synonyms, subsumption, and negation into account to provide more accurate analytic results for monitoring and planning related to heart disease in Malaysia.
Automated login method selection in a multi modal authentication - login meth...Conference Papers
Ā
The document proposes an intelligent model to automatically select the login authentication method in a multi-modal authentication system based on user behavior profiling. It analyzes user behavior data from login sessions to minimize real-time processing and prevent untrusted attempts, while facilitating a frictionless user experience. The system determines the user, retrieves their behavioral historical data, matches the user profile based on data retrieval, and selects the authentication method based on evaluating the user profile and environmental parameters. It then updates the user profile with new successful login session data for future evaluations.
An enhanced wireless presentation system for large scale content distribution Conference Papers
Ā
An enhanced wireless presentation system (eWPS) was developed to distribute presentation content to larger audiences over WiFi networks. The eWPS uses multiple access points connected via a high-speed Ethernet switch to provide WiFi coverage to audiences. It captures screenshots of presentations and stores them on an external web server for access by audience devices through a web browser. Testing showed the eWPS could serve over 125 audience devices with an average delay of 1.74ms per page load. System resources on the web server remained mostly idle, indicating it could potentially serve a much larger audience size.
An analysis of a large scale wireless image distribution system deploymentConference Papers
Ā
This document describes two setups of a wireless image distribution system:
1. A setup using commercial network equipment like access points and an access controller, which supported over 125 connected devices and provided sufficient bandwidth for the system load in an auditorium with 159 seats.
2. A setup using a wireless mesh network of three NerveNet nodes, which provided a quick and easy setup without wired connections but needs further performance improvements. Results from tests of both setups were analyzed to evaluate the network technologies for smart community applications.
Validation of early testing method for e government projects by requirement ...Conference Papers
Ā
The document describes a validation study of an Early Requirement Testing Method (ERTM) for e-government projects. Test engineers used the ERTM, which involves reviewing requirements documents and providing feedback, on six e-government projects. The number of defects found before and after applying the ERTM and providing interventions was compared using a statistical test. The results showed that overall, there was a statistically significant reduction in the number of defects found after applying the ERTM, suggesting it is useful for improving requirements documentation. However, one project saw an increase in defects due to additional requirements added later in the project.
The design and implementation of trade finance application based on hyperledg...Conference Papers
Ā
This document describes the design and implementation of a trade finance application built on the Hyperledger Fabric permissioned blockchain platform. It discusses the architecture of blockchain-based applications in general and this trade finance application specifically. Key aspects covered include identifying different types of software connectors (linkage, arbitrator, event, adaptor) that are important building blocks in the architecture. The trade finance application uses connectors like the blockchain facade connector and block/transaction event connector to interface between layers and handle asynchronous event propagation. Overall the document aims to provide insights into architectural considerations and best practices for developing blockchain-based applications.
Unified theory of acceptance and use of technology of e government services i...Conference Papers
Ā
This document describes a study that developed and validated a survey instrument to understand technology acceptance of an e-Government system called MYGOVSVC among Malaysian government employees. A literature review was conducted on previous studies applying the Unified Theory of Acceptance and Use of Technology (UTAUT) model to e-Government systems. A 21-item survey was developed containing questions on performance expectancy, effort expectancy, hedonic motivation, and facilitating conditions. The survey was translated to Malay and validated with stakeholders. It was administered to 419 government employees and results found the survey to be reliable in measuring acceptance of the MYGOVSVC system. The validated survey can be used to help improve e-Government services for Malaysian citizens.
Towards predictive maintenance for marine sector in malaysiaConference Papers
Ā
This research uses machine learning on sensor data from ships to predict failures of components and their remaining useful life. Interviews with marine experts identified significant maintenance items to prioritize for ship supply chains. The results were analyzed to provide recommendations to a government company on implementing predictive analytics and supply chain strategies for ship maintenance in Malaysia.
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...Conference Papers
Ā
This document describes the development of a lead ion-selective electrode (Pb2+-ISE) sensor based on a poly-tetrahydrofurfuryl acrylate (pTHFA) membrane without plasticizers using photo-polymerization. The sensor demonstrated a linear range of 0.1-10-5 M, Nernstian slope of 26.5-29.8 mV/decade, limit of detection of 3.24-3.98 x 10-6 M, and good selectivity against interfering ions. Sensor characterization showed comparable results to measurements using atomic absorption spectroscopy on artificial and real samples. Optimization of the lipophilic salt potassium tetrakis(4-chlorophenyl)borate and lead ionophore
This document summarizes security definitions for searchable symmetric encryption (SSE) schemes. It reviews the indistinguishability and semantic security game definitions, noting that attacks have succeeded against published schemes. It then proposes a new security game definition against distribution-based query recovery attacks, to better capture practical adversary capabilities. The goal is to define security in a way that implies the current indistinguishability and semantic security definitions.
This document discusses the implementation challenges of autonomous things and proposes a high-level architecture for a cloud robotics infrastructure to address these challenges. It explores existing platforms for autonomous things and identifies three main areas of complexity: development, execution, and operation. A proposed architecture is presented using the TOGAF framework, with core services for integrated development/testing/simulation and operation/monitoring/maintenance, and application services and technologies to realize these, including cloud, edge and robotics computing with virtualization and ROS. The architecture aims to ease autonomous things implementation through a super-converged system.
Study on performance of capacitor less ldo with different types of resistorConference Papers
Ā
The document summarizes a study on the performance of a capacitor-less low dropout (LDO) voltage regulator using different types of resistors. A 1.8V LDO voltage regulator was designed and simulated using five different resistor types in Cadence. The performance metrics compared included output voltage accuracy, phase margin, unity gain bandwidth, and power supply rejection ratio. Simulation results showed differences in LDO performance depending on the resistor type. The LDO with hpoly resistor had the best stability performance, while the LDO with pdiffb resistor produced the highest power supply rejection ratio. In conclusion, the type of resistor used can significantly impact key performance characteristics of a capacitor-less LDO regulator.
Stil test pattern generation enhancement in mixed signal designConference Papers
Ā
This document describes a process for generating STIL test patterns from mixed signal design simulations in order to test digital blocks on an SoC. It involves simulating the mixed signal design, sampling the waveforms to generate test vectors, and converting those vectors into an ATPG-compliant STIL format using an automation program. This was implemented successfully at MIMOS Berhad, generating STIL test patterns that passed 100% of stuck-at tests.
The document discusses the implementation of an on-premise AI platform at MIMOS Berhad, a Malaysian research institute. The platform makes use of existing on-premise services such as a private cloud, distributed storage, and authentication platform. It provides an AI training facility using containers on VMs, with distributed training and GPU/CPU support. A version management system stores AI models and applications in Docker images. Deployment is supported on the private cloud and edge devices using containers. The goal is to enable internal development and hosting of AI projects in a secure, customizable manner.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
Ā
An English š¬š§ translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech šØšæ version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
"What does it really mean for your system to be available, or how to define w...Fwdays
Ā
We will talk about system monitoring from a few different angles. We will start by covering the basics, then discuss SLOs, how to define them, and why understanding the business well is crucial for success in this exercise.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
"Choosing proper type of scaling", Olena SyrotaFwdays
Ā
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
What is an RPA CoE? Session 2 ā CoE RolesDianaGray10
Ā
In this session, we will review the players involved in the CoE and how each role impacts opportunities.
Topics covered:
ā¢ What roles are essential?
ā¢ What place in the automation journey does each role play?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
Ā
š Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
š Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
š» Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
š Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Ā
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Ā
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
Ā
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
Ā
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Ā
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
āTemporal Event Neural Networks: A More Efficient Alternative to the Transfor...Edge AI and Vision Alliance
Ā
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the āTemporal Event Neural Networks: A More Efficient Alternative to the Transformerā tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChipās Akida neuromorphic hardware IP further enhances TENNsā capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Implementation of vehicle ventilation system using node mcu esp8266 for remote monitoring
1. Bulletin of Electrical Engineering and Informatics
Vol. 9, No. 6, December 2020, pp. xx~xx
ISSN: 2302-9285, DOI: 10.11591/eei.v9i6.xxxx ļ² 1
Journal homepage: http://beei.org
Implementation of Vehicle Ventilation System using NodeMCU
ESP8266 for Remote Monitoring
Amirun Murtaza Abd Jalil1
, Roslina Mohamad1
, Nuzli Mohamad Anas2
, Murizah Kassim1
, Saiful
Izwan Suliman1
1
Faculty of Electrical Engineering, Universiti Teknologi MARA, 40450 Shah Alam, Selangor, Malaysia
2
Wireless Innovation, MIMOS Berhad, 57000 Kuala Lumpur, Wilayah Persekutuan, Malaysia
Article Info ABSTRACT
Article history:
Received Jun x, 20xx
Revised Nov x, 20xx
Accepted Dec x, 20xx
In this paper, an implementation of vehicle ventilation system using
microcontroller NodeMCU is described, as a internet of things (IoT) platform.
A low-cost wireless fidelity (Wi-Fi) microchip ESP8266 integrated with
NodeMCU provides full-stack transmission control protocol/internet protocol
(TCP/IP) to communicate between mobile applications. This chip is capable
to monitor and control sensor devices connected to the IoT platform. In this
reserach, data was collected from a temperature sensor integrated to the
platform, which then monitored using Blynk application. The vehicle
ventilation system was activated/deactivated through mobile application and
controlled using ON/OFF commands sent to the connected devices. From the
results, the vehicle ventilation system built using NodeMCU microcontroller
is capable to provide near real-time data monitoring for temperature in the car
before and after the ventilation system was applied.
Keywords:
Internet of things
Remote monitoring
Vehicle ventilation
Temperature and rain sensors
Embedded controller
NodeMCU ESP8266 This is an open access article under the CC BY-SA license.
Corresponding Author:
Roslina Mohamad,
Faculty of Electrical Engineering,
Universiti Teknologi MARA,
40450 Shah Alam, Selangor, Malaysia.
Email: roslina780@uitm.edu.my
1. INTRODUCTION
In the era of information technology, Internet of Things (IoT) helps many devices to stay connected.
With the help of the internet network, every smart device can communicate with each other. Internet is used
everywhere from small mobiles till high end data servers. There are many types of devices which can be
accessed or connected using IoT [1-3] such as smart television (TV), smart speaker, toys and smart appliances.
The IoT has created the revolution all over the world and fascinatingly it has become integral part of life [4,
5]. There are several examples of IoT applications such as IoT for connected home [6], smart cities, industrial
automation [7, 8], retail, healthcare [9], agriculture [10, 11] and automotive.
An intelligent vehicle security framework empowers user to control vehicle naturally without any
limitation. Various security with the basic apparatuses or advancement equipments have been produced in the
vehicle to respond to the vehicle burglaries today. For instance, keys to the four-wheel vehicles were designed
as the standard security [12, 13]. Authors in [14] combined the global positioning system (GPS) technology
and IoT phrasing by utilizing an Arduino microcontroller. In [15], security frameworks for vehicles was created
by designing tracking systems utilizing few sensors arrange modernization, and in [16] a security framework
was built utilizing global system of mobile (GSM) network and multimedia messaging service (MMS) or short
message service (SMS) to track missing vehicles. Furthermore, the alert feature can be provided, for example
using SMS among many other technologies [17, 18].
2. ļ² ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 6, December 2020 : xx ā xx
2
In this paper, the implementation of a vehicle ventilation system using microcontroller NodeMCU is
presented. The idea is to develop an IoT application framework consisting wireless link in order to connect to
a cloud server. An alert messaging system is integrated to the framework to provide real-time monitoring and
controlling the vehicleās sensor devices. The rest of this paper is organized as follows: Section II provides
literature review of several similar IoT applications, as well as defining the scope of the vehicle ventilation
system framework. Section III describes the hardware and software design implemented in this IoT platform.
The results of the monitoring and alert system of the vehicle ventilation system are discussed in Section IV,
while the concluding remarks were given in the end.
2. LITERATURE REVIEW
The entire IoT system must have properties such as confidentiality, integrity, authentication,
authorization, availability and privacy to guarantee security in IoT [19, 20]. Figure 1 depicts the major
challenges in enhancing security in IoT environment. This section provides review on the security aspects
implemented in two IoT applications, specifically vehicle and home security system.
Figure 1. Security Issues in IoT System [19].
2.1. Vehicle Alert System
Vehicle alert system with tracking capability and identifying the car theft utilizing the comprehensive
system for mobile communications such as using global system of mobile GSM and the global positioning
system (GPS) technologies in Raspberry Pi [16, 18]. The system was a framework that expanded vehicle
security, as it tracked area of the lost vehicle, and enable authority to had trustworthy proof that the vehicle
was stolen. The task utilized the GSM and the GPS technology, which incorporated the utilization of wireless
local area networking (WLAN or Wi-Fi) module, Raspberry Pi camera, sensors, android phone and Raspberry
Pi as its essential segments. The owner received an alert, when the vehicle was moved in the lock mode through
Wi-Fi module connected to the Raspberry Pi kit which was kept inside the vehicle. It also integrated a
Raspberry Pi camera that take pictures when the vehicle was lock or unlock mode and gyro sensor that
measured or maintained the orientation. The system gave the solution for tracking and identifying the vehicle
by giving an alert in the web page with face recognition. Figure 2 shows the system diagram of the vehicle
security system with tracking capability and identifying the car theft using GSM and GPS Technologies.
Figure 2. System Diagram of the Vehicle Security System using GSM and GPS Technologies [16]
3. Bulletin of Electr Eng & Inf ISSN: 2302-9285 ļ²
Title of manuscript is short and clear, implies research results (First Author)
3
Authors in [21] focused on the method and performance of a microcontroller based smart car security
system with SMS or utilizing portable application intrusion alert capability. In the event that the auto entryway
was wrongly opened or the auto was vibrated, an alert flag proposed and it sent SMS message to the owner's
mobile phone quickly. A micro-controller Arduino Uno R3, radio frequency identification (RFID) reader,
RFID label data and a GSM modem were used for the hardware implementation of the system. The satellite
recognized the closeness of a GPS recipient and transmitted data in National Marine Electronics Association
(NMEA) organize and Global Positioning System Fix or Accuracy Data (GGA). The data was then process
into Arduino Uno R3. Output subsystem comprised of minimum output, relay action and GSM communication
subsystems. There were light-emitting diode (LED) and buzzer on minimum output subsystems as pointers
that showed the data and a liquid-crystal display (LCD) to demonstrate the data watcher yield. Figure 3 shows
the block diagram of an smart vehicle security system.
Figure 3. Block Diagram of a Smart Vehicle Security System [21].
2.2. Home Alert System
Design and implementation of Raspberry Pi based monitoring and controlling home automation
system from an android application has been presented in [22]. This system used Wi-Fi technology to connect
the system components between the internal network communication and external network communication.
Android application in smartphone acted to give orders to the units to control the home appliances. Raspberry
Pi functioned to coordinate the sensors and appliances of a home automation system and communicated it with
android application through wireless technology. Python was used and written in the system for running the
server on Raspberry Pi device. The objective of this system was to reduce the total energy consumed by the
home appliances.
Authors in [23] presented a system for the users to control home electronic appliances with the security
system using mobile platform. Internet network helped the devices to be controlled in the Raspberry Pi micro-
controller. The micro-controller board received commands (orders) sent by the user from an android mobile
application to turn home appliances ON and OFF. This user-friendly android application had several buttons
to control the appliances remotely. The Raspberry Pi connected to the home appliances using relays and a
communication module interfaced to a cloud service of Microsoft azure. To connect with Raspberry Piās
general purpose input output (IO) pins, the Python GPIO library provides the interface to the IoT platform,
such that the ON or OFF states were controlled by the Raspberry Pi through an electromagnetic relay. The
objective of this system was to optimize the energy consumption based on the calculation of the total power
consumption of the home appliances that had been made. Figure 4 shows the system diagram for Raspberry Pi
subsystem remote control using android application.
4. ļ² ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 6, December 2020 : xx ā xx
4
Figure 4. System Diagram for Raspberry Pi Remote Control using Android Application [23].
An algorithm for smart home automation system based on IoT using sensor nodes was proposed in
[24], which were directly connected to Arduino Nano. The user turned ON or OFF the lights based on the
motion sensor and the alarm generated based on the gas sensor. The communication was interfaced between
the Arduino Mega and web server to monitor the power consumption of different home appliances. This home
automation system helps to provide a low cost and efficient solution to the users. The results showed that the
system was able handle to control and monitor the function of home. The energy consumption flow of real time
algorithm for the smart home automation based on the IoT is shown in Figure 5.
Figure 5. The Energy Consumption Flow of Real Time Algorithm for the Smart Home Automation [24].
3. SYSTEM DESIGN AND IMPLEMENTATION
The vehicle ventilation system utilized microcontroller based on the NodeMCU ESP8266, connected
to sensors as well as the vehicle accessories. It was connected to Wi-Fi in order to store the sensed data in a
cloud server [10, 25]. As depicted in Figure 6, DHT11 and rain sensor were connected to the microcontroller
to sense the temperature in the vehicle and to detect rain. Then, the vehicle accessories such as power window
and fan were controlled via a mobile device. The relay and motor were connected as the actuator to the fan and
vehicle power window, respectively, powered using 12V voltage. Figure 7 depicts the actual setup.
5. Bulletin of Electr Eng & Inf ISSN: 2302-9285 ļ²
Title of manuscript is short and clear, implies research results (First Author)
5
Figure 6. The Vehicle Ventilation System Connection
Figure 7. Hardware Construction and Testing
Blynk, a hardware-agnostic IoT platform had been integrated in this vehicle ventilation system. It can
control supported hardware remotely, stored the sensed data and visualize it with built-in tools. Figures 8(a)
depicts the components provided in the Blynk to develop a mobile application. Button, slider and timer are
among of the widgets available in the application. Figure 8(b) gives an example to configure the setting of
Button Widget. The output pin was configured to link up using Android development software installed in the
NodeMCU ESP8266. A Firebase Library installed in the Android to provid cloud services to the mobile
application. Furthermore, Firebase provides functionality like analytics, databases, messaging and crash
reporting which are recommended for future work. Figure 9 shows the Firebase configuration for this
implementation.
6. ļ² ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 6, December 2020 : xx ā xx
6
(a) (b)
Figure 8. Blynk Application a) Components of the Widget Box b) Settings of Button Widget
Figure 9. The Firebase Platform
4. SYSTEM MONITORING AND PRESENTATION
A mobile application was developed for the vehicle ventilation system that includes an alert messaging
system. The mobile application was developed using Blynk while the measured data from the temperature
sensors were presented in the Reading Temperature page, as shown in Figure 9 (a). Figure 9(b) shows the
Control Accessories page, as defined, to control the vehicle accessories connected to the NodeMCU controller.
Notifications were sent to the mobile plaltform whenever the temperature exceeds a pre-defined threshold
and/or rain starts to fall. These would allow the users to control the vehicle accessories according to the received
notifications. Figures 10 (a) and (b) depict the notification when the temperature exceeds 35 o
C and when rain
starts to fall.
Graph in Figure 11 presents the results obtained by collecting the temperature reading in a vehicle.
The average temperature before the ventilation system in the morning is 28.5Ā°C while after the ventilation, its
average is 24.2Ā°C which about 4.3Ā°C difference. In the noon, the average temperature is 51.2Ā°C before the
ventilation system and 38.8Ā°C after the ventilation which about 12.4Ā°C difference. The average temperature
stated that in evening is 40.4Ā°C while is 33.3Ā°C after turning on the ventilation system with 7.1Ā°C difference.
The temperature is reduced about 19.8%.
7. Bulletin of Electr Eng & Inf ISSN: 2302-9285 ļ²
Title of manuscript is short and clear, implies research results (First Author)
7
(a) (b)
Figure 9. The Blynk Platform a) Reading Temperature Page b) Control Accesorries Page
(a) (b)
Figure 10. Alert Messaging System
Figure 11. The Graph for the Temperature in the Car before and after the Ventilation System.
8. ļ² ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 6, December 2020 : xx ā xx
8
5. CONCLUSION
This paper describes the design and implementaton of vehicle ventilation system that monitor the
indoor temperature and users able to control the vehicle accesories. The system testbed was developed using
NodeMCU ESP8266 microcontroller and was integrated with temperature and rain sensors. Furthermore, the
microcontroller was able to control the vehicle power window remotely. This was done by integrating the
testbed with the network module so that it can comunicate to the Firebase cloud service. A mobile IoT plarform
had been developed to ease the users in monitoring and controlling the vehicle ventilation system. This paper
suggests a future work by improving the vehicle ventilation system such as by adding and analytics module to
act upon the temperature reading by the sensors, rather than manually control by the users which prone to
security break. Hence, additional security features is also suggested to be added.
REFERENCES
[1] Sachin Kumar, et al., "Internet of Things is a revolutionary approach for future technology enhancement: a review,"
Journal of Big Data, vol. 6, pp. 1ā21, 2019.
[2] Noura, M., Atiquzzaman, M. & Gaedke, M., "Interoperability in Internet of Things: Taxonomies and Open
Challenges," Mobile Network Application, vol. 24, pp. 796ā809, 2019.
[3] IoT application areas. https://iot-analytics.com/top-10-iot-project-application-areas-q3-2016/ Accessed 8 Apr 2020.
[4] S. Wadhwani, U. Singh, P. Singh, and S. Dwivedi, āSmart Home Automation and Security System using Arduino
and IOT,ā Int. Research Journal of Engineering and Technology (IRJET), vol. 5, pp. 1357ā1359, 2018.
[5] Sharmad Pasha, "Thingspeak Based Sensing and Monitoring System for IoT with Matlab Analysis," Int. Journal of
New Technology and Research (IJNTR), vol.2, pp. 19ā23, 2016.
[6] Tolga KiliƧ, and Esra Bayir, "An Investigation on Internet of Things Technology (IoT) In Smart Houses," Int. Journal
of Engineering Research and Development, vol. 9, pp. 197ā206, Dec 2017.
[7] A. C. Seyit and S. S. Hakki, "An application of building automation system based on wireless sensor/actuator
networks," 9th Int. Conf. on Application of Information and Communication Technologies (AICT), October 2015.
[8] N. A. Wahab, N. A. Sahril, et al., āPerformance of Environmental and Energy Audit for Manufacturing Industrial
Buildingsā Indonesian Journal of Electrical Eng. and Computer Science (IJEECS) Vol. 12, pp. 534~541, 2018
[9] S. Chaudhury, D. Paul, R. Mukherjee, and S. Haldar, āInternet of Thing based healthcare monitoring system,ā 2017
8th Ind. Autom. Electromechanical Eng. Conf. (IEMECON) 2017, pp. 346ā349, 2017.
[10] P. Visconti, et al. "IoT-oriented software platform applied to sensors-based farming facility with smartphone farmer
app," Bulletin of Electrical Engineering and Informatics (BEEI), vol. 9, pp. 1095-1105, June 2020.
[11] N. A. J. Salih, I. J. Hasan, et al., "Design and implementation of a smart monitoring system for water quality of fish
farms", Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), Vol. 14(1), pp. 44-50, 2019.
[12] J. Van De Moosdijk and D. Visser, āCar securityāÆ: remote keyless ā entry and goā Revision 232 , no. June, 2009.
[13] Stephen Mason, Barrister "Vehicle remote keyless entry systems and engine immobilisers: Do not believe the insurer
that this technology is perfect," Computer Law & Security Review, vol. 28, pp. 195-200, 2012.
[14] R. Agarwal and P. Boominathan, āVehicle Security System Using IoT Application,ā Int. Research Journal of
Engineering and Technology (IRJET), vol. 5, no. 4, pp. 4ā6, 2018.
[15] T. C. Leelavathi, B. G. Shivaleelavathi, and B. Shubha, āIoT for Smart Car using Raspberry PI,ā International
Research Journal of Engineering and Technology (IRJET), vol. 3, pp. 6ā9, 2016.
[16] H. Rathod, et al., āVehicular Security using IOT,ā Int. J. Sci. Res., vol. 6, pp. 2664ā2666, 2017.
[17] T. Saleh, M. Raisuddin Khan, M. Bhuiyan, M. A. Ali, A. Mannan, and M. Latief, āRemote Interior Temperature
Control of Parked Vehicles,ā Adv. Mater. Res., vol. 1115, pp. 494ā498, 2015.
[18] S. Kumar Reddy Mallidi and V. V. Vineela, "IoT Based Smart Vehicle Monitoring System," Int. Journal of
Advanced Research in Computer Science, vol 9, pp.738-741, 2018.
[19] R. S. M. Joshitta and L. Arockiam, āSecurity in IoT EnvironmentāÆ: A Survey,ā Int. Journal of Information Technology
& Mechanical Engineering (IJITME), vol. 2, pp. 1ā8, 2016.
[20] R. Dorothy and S. Sasilatha, "Smart Grid Systems Based Survey on Cyber Security Issues," Bulletin of Electrical
Engineering and Informatics (BEEI), vol. 6, pp. 337-342, 2017.
[21] B. G. Girish, A. D. Gowda, H. Amreen, and K. M. A. Singh, āIOT based security system for smart vehicle,ā Int.
Research Journal of Engineering and Technology (IRJET), vol. 5, 2018.
[22] Prachi Bhure, Naziya Pathan and Mr. Shyam Dubey, āAndroid Based Automation System for the next Generation of
Technology using Wi-Fi,ā Int. Journal of Science Technology & Engineering (IJSTE) , vol. 3, pp. 1ā6, 2016.
[23] V. K. Upadhye, āRemote Control of Home Appliances with Smart Energy Efficient Model Using Android
Application Based on Raspberry Pi Embedded Linux Board,ā Int. Research Journal of Engineering and Technology
(IRJET), vol. 4, no. 6, pp. 1640ā1646, 2017.
[24] S. A. Khan, A. Farhad, M. Ibrar, M. Arif, and I. Technology, āAutomation Based on the Internet of Things,ā Int.
Journal of Computer Science and Information Security (IJCSIS), vol. 14, pp. 94ā99, 2016.
[25] I. A. Salami, et al. "Intelligent flood disaster warning on the fly: developing IoT-based management platform and
using 2-class neural network to predict flood status," Bulletin of Electrical Engineering and Informatics, Vol. 8, pp.
706-717, 2019.
9. Bulletin of Electr Eng & Inf ISSN: 2302-9285 ļ²
Title of manuscript is short and clear, implies research results (First Author)
9
BIOGRAPHIES OF AUTHORS (10 PT)
A. M. A. Jalil obtained the B. Eng. degree in Electrical Engineering from Universiti
Teknologi MARA, Shah Alam in 2020. From 2020 until now, he is with electrical and
electronic manufacturing company at Wistron Technology (Malaysia) Sdn Bhd, as
Engineer (A2) . He is involved with ICT test program development and cooperates
with ICT fixture suppliers to solve fixture problems. His research interests are in ICT
competencies and role of ICT in daily life, system performance analysis, theory of
computation, and wireless communication.
Roslina Mohamad obtained the B. Eng. degree in Electrical Engineering and M. Eng. Science
degree from Universiti Malaya, Kuala Lumpur in 2003 and 2008 respectively. She received the
PhD. degree in Aerospace Engineering from Universiti Putra Malaysia, in 2016. From 2006 until
now, she is with Faculty of Electrical Engineering, Universiti Teknologi MARA, as a senior
lecturer. She has been appointed as a Head of Computer Engineering Studies at the same institution
since 2018. Her research interests are in computing algorithm and digital signal processing for
deep space communication, channel coding, theory of computation, and wireless communication.
Nuzli Mohamad Anas (SMā14) received his B.Eng. and M.Eng. in electrical engineering from the
Universiti Teknologi Malaysia, in 2000 and 2013, respectively. From 2008, He works as Senior
Researcher at Wireless Communication Lab in MIMOS Berhad. He is currently pursuing his PhD
in Computer and Communication System Engineering at Universiti Putra Malaysia. His research
interest in the areas of wireless mobile communications and signal processing, especially on
cognitive radio and physical-MAC layer communication design.
Murizah Kassim is currently working as senior lecturer at Faculty of Electrical Engineering,
Universiti Teknologi MARA, Shah Alam, Selangor. She received her PhD in Electronic, Electrical
and System Engineering in 2016 from the Faculty of Built Environment and Engineering,
Universiti Kebangsaan Malaysia (UKM), Malaysia. She has published many papers related to
computer network, Internet of Things (IoT), Web and mobile development applications research.
She has experienced about 19 years in technical team at the Centre for Integrated Information
System, UiTM Shah Alam. She is also the member of Enabling Internet of Things Technologies
(ElIoTT) research group UiTM. She joined the academic since January 2009 and currently
member of IEEE, IET, IAENG and IACSIT organization.
Saiful Izwan Suliman is a senior lecturer at the Faculty of Electrical Engineering, Universiti
Teknologi MARA (UiTM), Malaysia. He obtained 1st class degree in Artificial Intelligence in
2002 and Master of Science (Electrical Engineering) from UiTM in 2006. His Phd was awarded
by The University of Nottingham, UK in 2015. His research interest is mainly in the area or
artificial intelligence, optimization and pattern recognition algorithm, metaheuristic approach,
frequency bandwidth spectrum and power system operations. He has published papers in many
international conferences as well as reputable journals. He is a certified Professional Technologist
and Chartered Engineer (CEng) with IET, UK. He is currently the head of ICT Unit, Institute of
Research Management and Innovation at UiTM