In recent times and as far as technological advancement goes, the Internet of
Things is the trending topic in the world. Internet of Things popularly called IoT is the
internetworking of interconnected devices over the internet to enable interaction
between those devices without any human interference. Cisco predicts at least 50
billion of such devices to be available by the year 2020. This leaves a huge gap as to
the appropriate awareness and literacy of the world as a collective to be receptive of
the massive IoT technology overhaul coming in the nearest future. This paper gives a
little insight into the basics of IoT, its core fundamentals, its architecture and
furthermore contributes to knowledge the application of IoT to the education sector.
Considering the number of connected devices expected to be produced, it is expected
also that sufficient amount of personnel are trained in IoT systems adequately to meet
with the rising demand
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
The Internet of Things (IoT), is a concept that describes how objects that we are used in daily life will interact and negotiate with other objects over the internet. The amount of devices with Wi-Fi capabilities and built-in sensors keeps on increasing. IoT combines smart devices to provide smart services and applications like smart cities, smart healthcare, smart home, and digital farm etc. But it is very crucial to secure connected IoT devices and networks because of the nature of IoT system. In this paper, the existing works are analyzed and an IoT based
healthcare system architecture is proposed. An authentication scheme to enhance the security of the proposed healthcare system is also present.
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
Internet of things (IoT) is a concept that has been widely used to improve business efficiency and customer’s experience. It involves resource constrained devices connecting to each other with a capability of sending data, and some with receiving data at the same time. The IoT environment enhances user experience by giving room to a large number of smart devices to connect and share information. However, with the sophistication of technology has resulted in IoT applications facing with malware threat. Therefore, it becomes highly imperative to give an understanding of existing state-of-the-art techniques developed to address malware threat in IoT applications. In this paper, we studied extensively the adoption of static, dynamic and hybrid malware analyses in proffering solution to the security problems plaguing different IoT applications. The success of the reviewed analysis techniques were observed through case studies from smart homes, smart factories, smart gadgets and IoT application protocols. This study gives a better understanding of the holistic approaches to malware threats in IoT applications and the way forward for strengthening the protection defense in IoT applications.
With rapid growth of science and information technology, Internet of things (IoT) becomes as an integral part of daily life. The applications of IoT are expanded starting from connected cars, wearables, connected health, smart retail and healthcare. However, security issues are increasing with the increase of its use. Lack of compliances on the part of IoT manufacturers, lack of user knowledge and awareness, device update and management, lack of physical hardening and botnet attacks are considered as the major reasons for security issues in IoT based applications. In this aspect, it becomes important to analyze security issues involved with IoT and its impact on the users that has been performed in the present study
Security Issues & Threats in IoT InfrastructureIJAEMSJORNAL
IoT (Internet of Things) expands the future Internet, and has drawn much attention. As more and more gadgets (i.e. Things) connected to the Internet, the huge amount of data exchanged has reached an unprecedented level.IoT today has a wide scope and researches say that IoT will definitely be a huge reason in the change of human lifestyle. But irrespective of the scope of IoT, we cannot be sure enough to implement it due to the security concerns. There is a genuine need to secure IoT, which has therefore resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper discusses about the flaws in the security structure of IoT, it is a study about the various layers of IoT and how differentattacks are possible in those layers.
Towards Internet of Things: Survey and Future VisionCSCJournals
Internet of things is a promising research due to its importance in many commerce, industry, and education applications. Recently, new applications and research challenges in numerous areas of Internet of things are fired. In this paper, we discuss the history of Internet of things, different proposed architectures of Internet of things, research challenges and open problems related to the Internet of things. We also introduce the concept of Internet of things database and discuss about the future vision of Internet of things. These are the manuscript preparation guidelines used as a standard template for all journal submissions. Author must follow these instructions while preparing/modifying these guidelines.
Study on Issues in Managing and Protecting Data of IOTijsrd.com
This paper discusses variety of issues for preserving and managing data produced by IoT. Every second large amount of data are added or updated in the IoT databases across the heterogeneous environment. While managing the data each phase of data processing for IoT data is exigent like storing data, querying, indexing, transaction management and failure handling. We also refer to the problem of data integration and protection as data requires to be fit in single layout and travel securely as they arrive in the pool from diversified sources in different structure. Finally, we confer a standardized pathway to manage and to defend data in consistent manner.
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
The Internet of Things (IoT), is a concept that describes how objects that we are used in daily life will interact and negotiate with other objects over the internet. The amount of devices with Wi-Fi capabilities and built-in sensors keeps on increasing. IoT combines smart devices to provide smart services and applications like smart cities, smart healthcare, smart home, and digital farm etc. But it is very crucial to secure connected IoT devices and networks because of the nature of IoT system. In this paper, the existing works are analyzed and an IoT based
healthcare system architecture is proposed. An authentication scheme to enhance the security of the proposed healthcare system is also present.
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
Internet of things (IoT) is a concept that has been widely used to improve business efficiency and customer’s experience. It involves resource constrained devices connecting to each other with a capability of sending data, and some with receiving data at the same time. The IoT environment enhances user experience by giving room to a large number of smart devices to connect and share information. However, with the sophistication of technology has resulted in IoT applications facing with malware threat. Therefore, it becomes highly imperative to give an understanding of existing state-of-the-art techniques developed to address malware threat in IoT applications. In this paper, we studied extensively the adoption of static, dynamic and hybrid malware analyses in proffering solution to the security problems plaguing different IoT applications. The success of the reviewed analysis techniques were observed through case studies from smart homes, smart factories, smart gadgets and IoT application protocols. This study gives a better understanding of the holistic approaches to malware threats in IoT applications and the way forward for strengthening the protection defense in IoT applications.
With rapid growth of science and information technology, Internet of things (IoT) becomes as an integral part of daily life. The applications of IoT are expanded starting from connected cars, wearables, connected health, smart retail and healthcare. However, security issues are increasing with the increase of its use. Lack of compliances on the part of IoT manufacturers, lack of user knowledge and awareness, device update and management, lack of physical hardening and botnet attacks are considered as the major reasons for security issues in IoT based applications. In this aspect, it becomes important to analyze security issues involved with IoT and its impact on the users that has been performed in the present study
Security Issues & Threats in IoT InfrastructureIJAEMSJORNAL
IoT (Internet of Things) expands the future Internet, and has drawn much attention. As more and more gadgets (i.e. Things) connected to the Internet, the huge amount of data exchanged has reached an unprecedented level.IoT today has a wide scope and researches say that IoT will definitely be a huge reason in the change of human lifestyle. But irrespective of the scope of IoT, we cannot be sure enough to implement it due to the security concerns. There is a genuine need to secure IoT, which has therefore resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper discusses about the flaws in the security structure of IoT, it is a study about the various layers of IoT and how differentattacks are possible in those layers.
Towards Internet of Things: Survey and Future VisionCSCJournals
Internet of things is a promising research due to its importance in many commerce, industry, and education applications. Recently, new applications and research challenges in numerous areas of Internet of things are fired. In this paper, we discuss the history of Internet of things, different proposed architectures of Internet of things, research challenges and open problems related to the Internet of things. We also introduce the concept of Internet of things database and discuss about the future vision of Internet of things. These are the manuscript preparation guidelines used as a standard template for all journal submissions. Author must follow these instructions while preparing/modifying these guidelines.
Study on Issues in Managing and Protecting Data of IOTijsrd.com
This paper discusses variety of issues for preserving and managing data produced by IoT. Every second large amount of data are added or updated in the IoT databases across the heterogeneous environment. While managing the data each phase of data processing for IoT data is exigent like storing data, querying, indexing, transaction management and failure handling. We also refer to the problem of data integration and protection as data requires to be fit in single layout and travel securely as they arrive in the pool from diversified sources in different structure. Finally, we confer a standardized pathway to manage and to defend data in consistent manner.
A Study on Device Oriented Security Challenges in Internet of Things (IoT)Eswar Publications
Internet of Things (IoT) basically discusses about the connection of various physical devices through a network
and let them take an active part by exchanging information through Internet. This paper presents important applications of IoT and the different challenges of IoT. Out of the various challenges, attacks on the devices used in IoT are of serious concern. Device oriented attacks and the defensive mechanisms are studied in this paper. A comparison is done for the specific malicious attacks on the M2M communicating devices.
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
When Internet of Things (IoT) applications become a part of people’s daily life, security issues in IoT have caught substantial attention in both academia and industry. Compared to traditional computing systems, IoT systems have more inherent vulnerabilities, and in the intervening time, could have higher security requirements. However, the current design of IoT does not successfully address the higher security requirements postured by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to defend this emerging system. This paper purposes to examine security challenges resulted from the special characteristics of the IoT systems and the new features of the IoT applications. This could help pave the road to better security solution design. Furthermore, three architectural security designs are suggested and analyzed. Examples of how to implement these designs are discussed. Finally, for each layer in IoT architecture, open issues are also identified.
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
Today with advancement in Information Communication Technology (ICT) the way the education is being delivered is seeing a paradigm shift from boring classroom lectures to interactive applications such as 2-D and 3-D learning content, animations, live videos, response systems, interactive panels, education games, virtual laboratories and collaborative research (data gathering and analysis) etc. Engineering is emerging with more innovative solutions in the field of education and bringing out their innovative products to improve education delivery. The academic institutes which were once hesitant to use such technology are now looking forward to such innovations. They are adopting the new ways as they are realizing the vast benefits of using such methods and technology. The benefits are better comprehensibility, improved learning efficiency of students, and access to vast knowledge resources, geographical reach, quick feedback, accountability and quality research. This paper focuses on how engineering can leverage the latest technology and build a collaborative learning environment which can then be integrated with the national e-learning grid.
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
In the era of computing technology, Internet of Things (IoT) devices are now popular in each and every domains like e-governance, e-Health, e-Home, e-Commerce, and e-Trafficking etc. Iot is spreading from small to large applications in all fields like Smart Cities, Smart Grids, Smart Transportation. As on one side IoT provide facilities and services for the society. On the other hand, IoT security is also a crucial issues.IoT security is an area which totally concerned for giving security to connected devices and networks in the IoT .As, IoT is vast area with usability, performance, security, and reliability as a major challenges in it. The growth of the IoT is exponentially increases as driven by market pressures, which proportionally increases the security threats involved in IoT The relationship between the security and billions of devices connecting to the Internet cannot be described with existing mathematical methods. In this paper, we explore the opportunities possible in the IoT with security threats and challenges associated with it.
Wearables are small electronic devices, often comprising one or more sensors and having computational capability. Devices such as wrist watches, pens, and glasses with installed cameras are now available at cheap prices for user to purchase to monitor or securing themselves. The Nigerian state at this period is faced with a lot of kidnapping activities in schools, homes and abduction for the purpose of ransomed collection and other illegal activities necessitate these reviews. The success of the wearable technology in medical uses prompted the research into application into security uses. The method of research is the use of case studies and literature search. This paper takes a look at the possible applications of the wearable technology to combat the cases of abduction and kidnapping in Nigeria.
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of
the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating
interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn
significant attention during the past few years, the pace at which new devices are being integrated into the
system will profoundly impact the world in a good way but also poses some severe queries about security
and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most
significant concerns of IoT is to provide security assurance for the data exchange because data is
vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where
each layer provides a service. The security needs vary from layer to layer as each layer serves a different
purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks
have been discussed along with some existing and proposed countermeasures.
Proposed T-Model to cover 4S quality metrics based on empirical study of root...IJECEIAES
There are various root causes of software failures. Few years ago, software used to fail mainly due to functionality related bugs. That used to happen due to requirement misunderstanding, code issues and lack of functional testing. A lot of work has been done in past on this and software engineering has matured over time, due to which software’s hardly fail due to functionality related bugs. To understand the most recent failures, we had to understand the recent software development methodologies and technologies. In this paper we have discussed background of technologies and testing progression over time. A survey of more than 50 senior IT professionals was done to understand root cause of their software project failures. It was found that most of the softwares fail due to lack of testing of non-functional parameters these days. A lot of research was also done to find most recent and most severe software failures. Our study reveals that main reason of software failures these days is lack of testing of non-functional requirements. Security and Performance parameters mainly constitute non-functional requirements of software. It has become more challenging these days due to lots of development in the field of new technologies like Internet of things (IoT), Cloud of things (CoT), Artificial Intelligence, Machine learning, robotics and excessive use of mobile and technology in everything by masses. Finally, we proposed a software development model called as T-model to ensure breadth and depth of software is considered while designing and testing of software.
FUTURE AND CHALLENGES OF INTERNET OF THINGS ijcsit
The world is moving forward at a fast pace, and the credit goes to ever growing technology. One such
concept is IOT (Internet of things) with which automation is no longer a virtual reality. IOT connects
various non-living objects through the internet and enables them to share information with their community
network to automate processes for humans and makes their lives easier. The paper presents the future
challenges of IoT , such as the technical (connectivity , compatibility and longevity , standards , intelligent
analysis and actions , security), business ( investment , modest revenue model etc. ), societal (changing
demands , new devices, expense, customer confidence etc. ) and legal challenges ( laws, regulations,
procedures, policies etc. ). A section also discusses the various myths that might hamper the progress of
IOT, security of data being the most critical factor of all. An optimistic approach to people in adopting the
unfolding changes brought by IOT will also help in its growth.
State regulation of the IoT in the Russian Federation: Fundamentals and chall...IJECEIAES
The purpose of this section is to study the problems with implementing technical and legal regulations for the development of public administration functions in the Russian Federation when using the internet of things (IoT). The introduction is based on an analysis of regulatory legal acts and presents the main strategic directions for the development of public administration functions in the Russian federation when using IoT. State reports, scientific literature, a system of technical and legal regulation are analyzed, and the main problems of implementing the IoT that impede the achievement of effective public administration are studied. The Russian practice of using IoT in various economic areas is investigated. Based on an analysis of the mechanisms for ensuring data safety of information technology users in the Russian federation, problems were investigated, such as the collecting data through IoT, including publicly available personal data in order to profile human activities, and creating of a digital twin of a person. The social constraints for introducing distributed registry technologies are users' distrust in the field of data privacy protection and mathematical algorithms that are used to establish trust in a digital environment instead of trusted centralized intermediaries; these problems were also analyzed. The Russian approach was analyzed in comparison to European experience in this field. To ensure information security and the possibility of its distribution, the IoT is revealed.
In the networking field, Internet of Things (IoT) can be referred to technological e-learning advancements. It is seen that through the internet, nowadays it becomes easier to be connected with the real world affairs by being acknowledges about the all-around happenings. Even everyone is aware about communicating with each other all over world. ‘Things’ can be specified as the objects which are connected through internet.Over the internet, the specific kind of interconnection of different things can serve its capability through the information which can be utilized in receiving and sending of evaluated data. It is said to be specialized in almost every field that can be determined in numerous manner for implementing wide range of applications format. Wide ranges can be mentioned aseducation, business, transportation, agriculture, healthcare and management. In a generalized manner, in this article specifically and mainly the discussion is being held over the Internet of Things (IoT). Specific emphasis on E-learning is said to be implemented as a source of information applied for its readers. By the utilization of smart learning as the IOT the smart techniques can also be represented shown by e-learning methods. by Vishal Dineshkumar Soni 2019. IOT connected with e-learning . International Journal on Integrated Education. 2, 5 (Oct. 2019), 273-277. DOI:https://doi.org/10.31149/ijie.v2i5.496. https://journals.researchparks.org/index.php/IJIE/article/view/496/477 https://journals.researchparks.org/index.php/IJIE/article/view/496
A Study on Device Oriented Security Challenges in Internet of Things (IoT)Eswar Publications
Internet of Things (IoT) basically discusses about the connection of various physical devices through a network
and let them take an active part by exchanging information through Internet. This paper presents important applications of IoT and the different challenges of IoT. Out of the various challenges, attacks on the devices used in IoT are of serious concern. Device oriented attacks and the defensive mechanisms are studied in this paper. A comparison is done for the specific malicious attacks on the M2M communicating devices.
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
When Internet of Things (IoT) applications become a part of people’s daily life, security issues in IoT have caught substantial attention in both academia and industry. Compared to traditional computing systems, IoT systems have more inherent vulnerabilities, and in the intervening time, could have higher security requirements. However, the current design of IoT does not successfully address the higher security requirements postured by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to defend this emerging system. This paper purposes to examine security challenges resulted from the special characteristics of the IoT systems and the new features of the IoT applications. This could help pave the road to better security solution design. Furthermore, three architectural security designs are suggested and analyzed. Examples of how to implement these designs are discussed. Finally, for each layer in IoT architecture, open issues are also identified.
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
Today with advancement in Information Communication Technology (ICT) the way the education is being delivered is seeing a paradigm shift from boring classroom lectures to interactive applications such as 2-D and 3-D learning content, animations, live videos, response systems, interactive panels, education games, virtual laboratories and collaborative research (data gathering and analysis) etc. Engineering is emerging with more innovative solutions in the field of education and bringing out their innovative products to improve education delivery. The academic institutes which were once hesitant to use such technology are now looking forward to such innovations. They are adopting the new ways as they are realizing the vast benefits of using such methods and technology. The benefits are better comprehensibility, improved learning efficiency of students, and access to vast knowledge resources, geographical reach, quick feedback, accountability and quality research. This paper focuses on how engineering can leverage the latest technology and build a collaborative learning environment which can then be integrated with the national e-learning grid.
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
In the era of computing technology, Internet of Things (IoT) devices are now popular in each and every domains like e-governance, e-Health, e-Home, e-Commerce, and e-Trafficking etc. Iot is spreading from small to large applications in all fields like Smart Cities, Smart Grids, Smart Transportation. As on one side IoT provide facilities and services for the society. On the other hand, IoT security is also a crucial issues.IoT security is an area which totally concerned for giving security to connected devices and networks in the IoT .As, IoT is vast area with usability, performance, security, and reliability as a major challenges in it. The growth of the IoT is exponentially increases as driven by market pressures, which proportionally increases the security threats involved in IoT The relationship between the security and billions of devices connecting to the Internet cannot be described with existing mathematical methods. In this paper, we explore the opportunities possible in the IoT with security threats and challenges associated with it.
Wearables are small electronic devices, often comprising one or more sensors and having computational capability. Devices such as wrist watches, pens, and glasses with installed cameras are now available at cheap prices for user to purchase to monitor or securing themselves. The Nigerian state at this period is faced with a lot of kidnapping activities in schools, homes and abduction for the purpose of ransomed collection and other illegal activities necessitate these reviews. The success of the wearable technology in medical uses prompted the research into application into security uses. The method of research is the use of case studies and literature search. This paper takes a look at the possible applications of the wearable technology to combat the cases of abduction and kidnapping in Nigeria.
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of
the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating
interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn
significant attention during the past few years, the pace at which new devices are being integrated into the
system will profoundly impact the world in a good way but also poses some severe queries about security
and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most
significant concerns of IoT is to provide security assurance for the data exchange because data is
vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where
each layer provides a service. The security needs vary from layer to layer as each layer serves a different
purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks
have been discussed along with some existing and proposed countermeasures.
Proposed T-Model to cover 4S quality metrics based on empirical study of root...IJECEIAES
There are various root causes of software failures. Few years ago, software used to fail mainly due to functionality related bugs. That used to happen due to requirement misunderstanding, code issues and lack of functional testing. A lot of work has been done in past on this and software engineering has matured over time, due to which software’s hardly fail due to functionality related bugs. To understand the most recent failures, we had to understand the recent software development methodologies and technologies. In this paper we have discussed background of technologies and testing progression over time. A survey of more than 50 senior IT professionals was done to understand root cause of their software project failures. It was found that most of the softwares fail due to lack of testing of non-functional parameters these days. A lot of research was also done to find most recent and most severe software failures. Our study reveals that main reason of software failures these days is lack of testing of non-functional requirements. Security and Performance parameters mainly constitute non-functional requirements of software. It has become more challenging these days due to lots of development in the field of new technologies like Internet of things (IoT), Cloud of things (CoT), Artificial Intelligence, Machine learning, robotics and excessive use of mobile and technology in everything by masses. Finally, we proposed a software development model called as T-model to ensure breadth and depth of software is considered while designing and testing of software.
FUTURE AND CHALLENGES OF INTERNET OF THINGS ijcsit
The world is moving forward at a fast pace, and the credit goes to ever growing technology. One such
concept is IOT (Internet of things) with which automation is no longer a virtual reality. IOT connects
various non-living objects through the internet and enables them to share information with their community
network to automate processes for humans and makes their lives easier. The paper presents the future
challenges of IoT , such as the technical (connectivity , compatibility and longevity , standards , intelligent
analysis and actions , security), business ( investment , modest revenue model etc. ), societal (changing
demands , new devices, expense, customer confidence etc. ) and legal challenges ( laws, regulations,
procedures, policies etc. ). A section also discusses the various myths that might hamper the progress of
IOT, security of data being the most critical factor of all. An optimistic approach to people in adopting the
unfolding changes brought by IOT will also help in its growth.
State regulation of the IoT in the Russian Federation: Fundamentals and chall...IJECEIAES
The purpose of this section is to study the problems with implementing technical and legal regulations for the development of public administration functions in the Russian Federation when using the internet of things (IoT). The introduction is based on an analysis of regulatory legal acts and presents the main strategic directions for the development of public administration functions in the Russian federation when using IoT. State reports, scientific literature, a system of technical and legal regulation are analyzed, and the main problems of implementing the IoT that impede the achievement of effective public administration are studied. The Russian practice of using IoT in various economic areas is investigated. Based on an analysis of the mechanisms for ensuring data safety of information technology users in the Russian federation, problems were investigated, such as the collecting data through IoT, including publicly available personal data in order to profile human activities, and creating of a digital twin of a person. The social constraints for introducing distributed registry technologies are users' distrust in the field of data privacy protection and mathematical algorithms that are used to establish trust in a digital environment instead of trusted centralized intermediaries; these problems were also analyzed. The Russian approach was analyzed in comparison to European experience in this field. To ensure information security and the possibility of its distribution, the IoT is revealed.
In the networking field, Internet of Things (IoT) can be referred to technological e-learning advancements. It is seen that through the internet, nowadays it becomes easier to be connected with the real world affairs by being acknowledges about the all-around happenings. Even everyone is aware about communicating with each other all over world. ‘Things’ can be specified as the objects which are connected through internet.Over the internet, the specific kind of interconnection of different things can serve its capability through the information which can be utilized in receiving and sending of evaluated data. It is said to be specialized in almost every field that can be determined in numerous manner for implementing wide range of applications format. Wide ranges can be mentioned aseducation, business, transportation, agriculture, healthcare and management. In a generalized manner, in this article specifically and mainly the discussion is being held over the Internet of Things (IoT). Specific emphasis on E-learning is said to be implemented as a source of information applied for its readers. By the utilization of smart learning as the IOT the smart techniques can also be represented shown by e-learning methods. by Vishal Dineshkumar Soni 2019. IOT connected with e-learning . International Journal on Integrated Education. 2, 5 (Oct. 2019), 273-277. DOI:https://doi.org/10.31149/ijie.v2i5.496. https://journals.researchparks.org/index.php/IJIE/article/view/496/477 https://journals.researchparks.org/index.php/IJIE/article/view/496
A Novel Security Approach for Communication using IOTIJEACS
The Internet of Things (IOT) is the arrangement of physical articles or "things" introduced with equipment, programming, sensors, and framework accessibility, which enables these things to accumulate and exchange data. Here outlining security convention for the Internet of Things, and execution of this relating security convention on the inserted gadgets. This convention will cover the honesty of messages and verification of every customer by giving a productive confirmation component. By this venture the protected correspondence is executed on implanted gadgets.
Internet of Things (IoT) is becoming an emerging trend superseding other technologies and researchers considered it as the future of internet. As now the connectivity to the World Wide Web is becoming highly available cost is drastically decreasing so everyone can afford the technology. As Internet of Things provides a great opportunity to develop an important industrial systems and applications with the help of various kind of sensors that can sense out the environment using number of devices that is connected to the internet, usage of IoT is drastically increasing and becoming a common thing. With this sky-rocketed usage and the demand, Communication and storing of the information faces serious security issues as the security of IoT devices become just an afterthought when manufacturing most of the devices. This study tries to summarize this IoT security issues in terms of primary information security concepts confidentiality, integrity and availability with regards to its architecture.
In this era of Digitization and Automation, the life of human beings is getting simpler as almost everything is automatic, replacing the old manual systems. Nowadays humans have made internet an integral part of their everyday life without which they are helpless. Internet of things IOT provides a platform that allows devices to connect, sensed and controlled remotely across a network infrastructure. Our project basically focuses on Laboratory automation using smart phone and computer. The IOT devices controls and monitors the electronic electrical and the mechanical systems used in various types of buildings. The devices connected to the cloud server are controlled by a single admin which facilitate a number of users to which a number of sensor and control nodes are connected. The system designed is economical and can be expanded as it allows connection and controlling of a number of different devices. Deepak Adhav | Rahul Pagar | Ravi Sonawane | Sachin Tawade ""Smart Laboratory"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd22840.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/22840/smart-laboratory/deepak-adhav
Internet of Things (IoT) plays a vital role in our
day to day life and normally used in our houses, in industry,
schools and in hospitals which implemented outside to manage
and control for taking report the changes in location prevent
from dangers and many more favorable things. Moreover all
other advantages can approach of big risks of privacy loss and
security issues. To protect the IoT devices, so many research
works have been measure to find those problems and locate a
best way to eradicate those risks or at least to reduce their effect
on the security and privacy requirement. Formation the concept
of device to device (D2D) communication technology, IoT plays
the information transfer from one end to another end as node of
interconnection. This paper examines the constraints and
security challenges posed by IoT connected devices and the
ability to connect, communicate with, and remotely manage an
incalculable number of networked, automated devices via the
Internet is becoming pervasive.
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsINFOGAIN PUBLICATION
Internet of Things (IoT) is a novel communication standard and it is researcher’s preferred topic, which integrates heterogeneous systems seamlessly. Designing a universal architecture for IoT is a challenging task due to the integration of wide variety of the devices. The main objective of this paper is to provide comprehensive knowledge on challenges, applications, Security issues, and different communication models of IoT. This paper also focuses on the marketing trends of IoT with respect to variety of application with the end users. This motivates the researchers to contribute more productive work in this field by analyzing various parameters.
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn significant attention during the past few years, the pace at which new devices are being integrated into the system will profoundly impact the world in a good way but also poses some severe queries about security and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most significant concerns of IoT is to provide security assurance for the data exchange because data is vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where each layer provides a service. The security needs vary from layer to layer as each layer serves a different purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks have been discussed along with some existing and proposed countermeasures.
Similar to INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND DELIVERY (20)
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
2. A. M. Alalade J. O. Ejemeyovwi E. E. Ekong and D. Adeyemo
http://www.iaeme.com/IJMET/index.asp 49 editor@iaeme.com
Cite this Article: A. M. Alalade J. O. Ejemeyovwi E. E. Ekong and D. Adeyemo,
Internet of Things as A Tool For Enhancement of Education Administration and
Delivery, International Journal of Mechanical Engineering and Technology 10(5),
2019, pp. 48-62.
http://www.iaeme.com/IJMET/issues.asp?JType=IJMET&VType=10&IType=5
1. INTRODUCTION
The phrase "Internet of Things" or “IoT” is commonly heard of and used in today's world and
very few are strangers to the concept of IoT and it is very important because it represents the
first real evolution of the internet. IoT technology differs from past innovations as it is
ubiquitous, and encourages solutions to be intelligent and autonomous and its achievements
are already ground-breaking. According to the journal [1] the Internet of Things (IoT) is a
global physical network which connects devices, objects and things seamlessly to the Internet
infrastructure to communicate or interact with the internal and the external environment, for
the purpose of exchanging information. Another definition is IoT is a system of
internetworked computing devices, mechanical and digital machines, objects, animals or
people that are tagged with unique identifiers with the ability to send data over networks
without necessarily depending upon human-to-human or human-to-computer interaction [2]
IoT is the interconnection of several devices on a network to the internet that can exchange
information without any necessary human interference. IoT has been breaking grounds, due to
accomplishments in telecommunications such as the expansion of broad bands, IPv6 protocol,
and the possibility of nanotech being incorporated into countless electronic devices,
irrespective of the size. The internet of things allows people and devices to be connected
anytime, across any distance and with anyone through the use of any path/network and any
service. Example of things in IoT include, a sugar level monitor implant, biochip
transponders, built-in automobile sensors for low pressure alerts in tires, or essentially any
natural body or man-made item that can be designated an IP address and be equipped with the
ability to send and receive data over a network [2]. IoT enables people and things to be
connected anytime, at any place with anything and anyone, ideally using any path/network
and any service.
Figure 1 Definition of Internet of Things
Source; http://www.iotworkshops.in/definition-of-iot
3. Internet of Things as A Tool For Enhancement of Education Administration and Delivery
http://www.iaeme.com/IJMET/index.asp 50 editor@iaeme.com
This article is divided into five main sections. The next section presents the relevant
technology for IoT in education. In Section 3, we conduct a technical review on previous
works on IoT in education. We discuss some of the applications of IoT in education and
lastly, in Section 4 and 5 we conclude the paper.
2. RELEVANT TECHNOLOGY FOR IOT IN EDUCATION
2.1. Building blocks of IoT
At the very core of IoT, there are four building blocks very important to the general
functioning and implementation of the internet of things. They are the Sensors, Processors,
Gateways and Applications [3].
2.1.1. Sensors
Sensors make up the top-most layer of IoT-compliant devices; from the Internet of Things,
sensors make up the things. The main function of sensors is to gather data from their
surroundings and environment or send data to their surroundings in form of actuators. Sensors
have to be able to actively collect data in real-time. They should be able to work
autonomously but still be influenced by input from the user. Examples of sensors include
temperature sensors, air humidity sensor, motion sensors, etc. Sensors are attached to devices
that have each a different IP address so they can be specifically identified over vast and
multiple networks.
2.1.2. Processors
The processor is the brain and center of an IoT system. Its major function is collecting
captured data from the sensors, process them and extract only the useful data from the bulk of
the raw numerous data collected by the sensor. It can be said that the processor gives the
sensor data intelligence [4]. The processor is also responsible for security via encryption and
decryption because of how sensitive sensor data is. Processors are embedded hardware
devices like microcontrollers that are mounted in the end user devices. Common types of
processors used in IoT are Arduino, Raspberry Pi, etc.
2.1.3. Gateways
Gateways are the devices that control how processed data is routed and also send the data to
their intended destinations for appropriate utilization. Gateways are the devices responsible
for the back and forth communication of data in IoT, it is responsible for network connectivity
in IoT. Some examples of gateways are LAN, WAN, etc.
2.1.4. Applications
Applications are responsible for appropriate utilization of the data collected, processed and
selected. Applications are controlled by end users or specific personnel and are the delivery
points for specific and unique services. An example of an IoT application is a home system
automation app.
2.2. IoT Architecture layers
It should be noted that there are different proposed standards for IoT architecture but in this
paper, treats a very widely accepted and standard architecture. The four major layers in IoT
are; the physical layer, the network layer, service management layer and application layer [3].
2.2.1. Physical and connectivity layer
At this layer, we start with the things themselves in the form of sensors and actuators. This
layer is responsible for the sensing of data, its collection, processing and storage. The storage
provided on the device is for very limited significant data, the bulk of the data is either
discarded or sent to the cloud for further processing [4]. This layer also consists of
4. A. M. Alalade J. O. Ejemeyovwi E. E. Ekong and D. Adeyemo
http://www.iaeme.com/IJMET/index.asp 51 editor@iaeme.com
connectivity technologies responsible for communicating data between two or more devices
thereby enabling Machine-to-Machine (M2M) communications. It is also responsible for
communicating data from the device to the gateway. Examples of devices on this layer are
RFID tags, WSNs, Bluetooth LE etc.
2.2.2. Network layer
This layer is solely in control of routing data from the physical and connectivity layer to the
cloud and application layer. It consists of the gateways IoT needs to transport data over
different networks. There are numerous network protocols used in IoT, all these protocols are
aggregated in this layer.
2.2.3. Management service layer
This layer handles data management which consists of data analytics, stream analytics, and
security analytics. The requirement of data management is to select valuable information from
the quantum of raw data captured by various sensors to generate actionable data i.e. data with
real value [4]. This layer is also responsible for the swift response in certain cases where data
needs to be quickly processed and a particular action carried out. On this layer also exists;
data mining, text mining, service analytics, etc.
2.2.4. Application layer
This layer makes up the uppermost layer of IoT architecture and is the reason for the
execution of the intended use of the collected data. Some examples of IoT applications are; e-
health, smart home automation, etc.
Figure 2 Building blocks of the IoT Architecture layers
2.3. IoT technologies for communication
The very core functionality of IoT lies in the ability of devices to exchange information
without any necessary human interference, this phenomenon is tagged Machine-to-Machine
(M2M) communication [4]. To enable M2M communications, some connectivity technologies
have to be utilized, some already existing, others developed to meet the challenges faced with
IoT. Some of these technologies include; RFIDs (Radio-Frequency Identification), WSNs
(Wireless Sensor Network), BLE (Bluetooth Low Energy), ZigBee, LTE-A (Long Term
Evolution-Advanced), etc.
5. Internet of Things as A Tool For Enhancement of Education Administration and Delivery
http://www.iaeme.com/IJMET/index.asp 52 editor@iaeme.com
2.3.1. RFIDs
In the context of IoT, RFID tags are used mainly as information tags capable of exchanging
and sharing data between themselves. This interaction between RFID tags are autonomous
needing no form of alignment by being in the same line of sight (LoS) or having physical
contact. It utilizes Automatic Identification and Data Capture (AIDC) which uses wireless
technology. AIDC involves mechanisms that automatically pin-point objects, draw out
valuable information from them, and access their computer systems without the need of
human tampering [5].
2.3.2. WSNs
Wireless sensor networks or WSNs as they are commonly called are configurations of
independent nodes utilizing wireless technology and whose communications happen over
limited frequency and bandwidth [5]. The independent nodes in WSN are; the sensor,
microcontroller, memory, radio transceiver and the battery. Basically what a WSN does is to
acquire data via the sensor node, process it to filter out valuable data and send it wirelessly
over a distance to another device or to its intended destination.
2.3.4. Bluetooth-LE
Bluetooth Low-Energy (BLE) is the same as the well-known Bluetooth technology which
utilizes the 2.4GHz wireless communications protocol but advantageous over it as it is a low-
power version [6]. It is fashioned particularly to handle communications that extend to not
over 100 meters. It is more appropriately fitting for devices which only transmit minimal
amounts of data in surges. Examples of devices that use this technology include; fitness
trackers, wearable health, among many others.
2.3.5. ZigBee
This technology also utilizes the 2.4GHz wireless communication frequency band just like the
BLE, the major difference is that ZigBee has a longer range of 100 meters more than BLE and
also has a slightly lower data rate of about 250kbps compared to the 270kpbs of BLE. ZigBee
was fashioned for building and home automation devices, such as light controls [6]. Another
similar technology that operates like ZigBee is Z-wave which uses the same technologies and
protocols as ZigBee.
2.3.6. LTE-A
LTE Advanced or LTE-A, possesses a significant upgrade to LTE technology in the form of
an increase in its coverage radius, and a reduction in its latency and a raise in the throughput.
LTE-A gives IoT an exceptional boost in power through expansion of its functionality within
a larger coverage area with its most notable applications being vehicles, Unmanned Aerial
Vehicles (UAV), and similar communications [6].
6. A. M. Alalade J. O. Ejemeyovwi E. E. Ekong and D. Adeyemo
http://www.iaeme.com/IJMET/index.asp 53 editor@iaeme.com
Figure 3 The IoT Connectivity
2.4. IoT and cloud computing
Cloud computing refers to a means of accessing data and programs from a centralized pool of
computer resources that can be ordered and consumed on demand [4]. The sensors in
“Things” collect so much data that it has been tagged “Big Data” and an end device will
usually have very limited processing to account for the device‟s portability. Also due to the
portability and compactness of the device, the storage is also very limited and cannot store all
incoming real-time data from the sensors. This is where cloud computing comes in, the cloud
provides more than enough computer resources which can be used on demand by IoT devices
for remote processing and storage of big data. The cloud also houses some applications
designed for very specific uses, in the sense that on collecting certain data input from IoT
devices, certain outputs are instantly generated and sent back to the end user. IoT devices
connect to the cloud via gateways. The advent of cloud computing is a major factor in the
wide implementation of IoT today.
2.5. IoT and big data analytics
One core expectation of an IoT system is its seamless and efficient productivity in a very
timely manner. I will explain this sub-topic with an example; a motion sensor is set up in a
room to detect all movements in and out of a room, for every passing second the sensor
records whether there is movement or not, say 1‟s for movement and 0‟s for no movement.
This goes on in real-time for every 60 seconds, in every 60 minutes, in every 24 hours every
day. This accumulated over a period of a week or even a month is a lot of data and will be too
much to be process on the housing device thus the data is sent to the cloud. On the bulk of
information getting to the cloud, this is where big data analytics comes in. Big data analytics
refers to advanced analytics techniques used for very large data sets whose size and type is
beyond the ability of traditional relational databases to capture manage and process. This data
can be as much as Terabytes or even range to Zettabytes and they have three characteristics,
high velocity, high volume and high variety [7]. The advanced analytics techniques used
include; text analytics, machine learning, predictive analytics, data mining, statistics and
natural language processing. The results of these techniques lead to faster and better decisions
of machines.
7. Internet of Things as A Tool For Enhancement of Education Administration and Delivery
http://www.iaeme.com/IJMET/index.asp 54 editor@iaeme.com
3. THEORETICAL ANALYSIS ON PREVIOUS WORKS ON IOT IN
EDUCATION
[8], discussed the significance and utilizations of IoT in education. Moreover, the approach
taken in the paper tried to present the recent research works, problems associated and the
impact of IoT on education in the future. IoT technology is discussed as being a strong pillar
for the forward-movement of education at all levels from the elementary schools all the way
to the university pedagogy from student to teacher, classroom to campus, the whole of
education benefitting from this technology. This journal categorized IoT as can be applied to
different sectors of academia, which were;
IoT-based Smart classroom; this involved the use of IoT devices and technology for
lecturing and learning processes in academic organizations all over the world which provides
new innovative approaches to education and classroom management. Examples of IoT devices
found in a classroom to further education include; Interactive Whiteboards, Tablets and
Mobile devices, Student ID Cards, 3-D Printers, Wireless door locks, Temperature Sensors,
Security Cameras, Electric Lighting, Smart HVAC systems, Attendance Tracking Systems,
Room Temperature Sensors, etc.
IoT-based Smart lab
IoT-based Smart Campus
This paper concluded by pointing out the benefit of the inclusion of technology, majorly
IoT in education having paved the way for new and cutting-edge ideas, to bring ease and an
elevated standard in the lives of both students and teachers with the only disadvantage being
the security and privacy concerns accompanied with IoT systems.
According to [9], “IoT” can be defined as a new paradigm providing anytime and
anywhere access to information in innovative approaches, bringing people, processes, data
and things together in unique ways. This paper analyzed the effects of using IoT mechanics
on an administrative system in engineering education via a pragmatic and technical method.
On conduction of the research, it could be drawn that the incorporation of the new IoT
technologies into lecturing and learning advertently raised the effectiveness of education in
engineering in the case study considered, it also guaranteed that knowledge would be retained
over a very long time and also, skills developed would be well-suited to providing solutions
necessary to tackle real world problems.
The major impact of the IoT based learning environments is that the traditional teacher
and student roles change significantly. Students can gain access to their courses or laboratory
exercises any time they want to and from anywhere. This way, the online training is
immediate, cost effective and easily affordable. Furthermore, they can review lectures, engage
in conversations, voice comments or participate in note sharing with one another to help
expedite learning between numerous individuals in groups. The paper pointed out that with
IoT incorporated in education, the key to success is in students‟ ability to concentrate and to
effectively use their time [9].
IoT is described as a tsechnological revolution that enables pervasive interaction between
objects, people and environments in [10]. This paper analyzed how IoT is modifying
academic institutions tremendously by the insertion of embedded sensors in devices,
integration of cloud computing, augmented and virtual reality, wearable computing
technologies and big data. It also looks out how several metrics of the academic environment
can be quantified and analyzed to give valuable information. The authors also looked at how
IoT has paved the way for new interactions between the students, teachers and the
environment in academic organizations. This research as conducted, based on the recent IoT
ventures in education, four categories in the utilization of IoT in academics came about;
8. A. M. Alalade J. O. Ejemeyovwi E. E. Ekong and D. Adeyemo
http://www.iaeme.com/IJMET/index.asp 55 editor@iaeme.com
improvement of lecturing and learning, classroom access control, energy management and
real time ecosystem monitoring, and monitoring student‟s healthcare.
In [11], IoT is seen as an interconnection of devices involving not just a small-scale
amount of robust computing devices such as computers, laptops, and tablets, but rather, a
large-scale amount of devices, which are not necessarily as robust, such devices could
include; wrist-watches, light bulbs, heat regulators among many others. This paper took a
particular university as a case study (Riga Technical University) and described how IoT, a
gravitational and somewhat new technology, is utilized there for educational purposes.
[12], took a unique approach in the integration of IoT devices into education. The paper
first described Wearable Computing as the incorporation of IoT devices such as smart
watches and smart glasses that allows users to communicate with devices either on their
clothing, underneath it or on top of it. The focus of the paper was on integrating wearable
technology into e-learning structures, so that ubiquitous learning could be achieved through,
interaction of the devices and collaborative work. An integration model capable of achieving
this was proposed. This proposed model consists of the physical wearable technology
infrastructure, the software that runs the devices and then a cloud computing platform.
Wearable devices and software differ according to their purposes from when a student uses
them or when a teacher uses them. The Cloud computing platform performs the function of an
intermediary between the students and teachers in a classroom. The platform is comprised of
web services, storage, management interfaces and LMS. The major goal of this cloud
computing infrastructure is to collect data from the students and lecturers, and to convey
particular teaching materials to desired devices. It is also used to accomplish authentication
and authorization of each user and enable them access desired learning courses or sessions
thus enabling lecturers have direct control over students and their experience whilst offering
their courses/programs.
Examining the research carried out in [13], IoT is simply illustrated as a networked
connection of physical objects. This paper is aimed at the coalition of two very different super
and disruptive technologies, IoT and cloud computing and how they can be integrated to make
Education very seamless and effective. Cloud computing is described as the delivery of on-
demand computing resources including software ranging from applications to hardware such
as data centers over the Internet. This paper also discusses IoT and the means in which the
Cloud provides all required facilities like infrastructure, platform, and software. The paper
highlighted the key major benefits of incorporating cloud IoT paradigm in education;
Augmented Learning Experiences and Results
Enhanced Operational Efficiency
More Secure Campus Designs
A description of IoT as an inter-network of all different kinds of electronic devices
embedded with sensors, IoT software, etc. connected to the Internet, in compliance with ITU's
Global Standards Initiative. The authors of this paper observed the enormous gap in the
number of IoT trained personnel available as compared to 50 billion devices predicted to be
connected via IoT by 2020. The authors discussed IoT in e-Learning and instructional design,
building knowledge of staff on IoT systems, six skills for the utilization of IoT, Internet of
Learning Things (IoLT), potentials of IoT to revolutionize education, and also to improve
student engagement in academics and overall student performance [14]
[15] states that IoT is a revolutionizing process in various phases of our daily life. IoT
technologies vary enormously from former innovations as they are pervasive, and bring about
more autonomous and intelligent solutions. The installation and utilization of IoT systems in
academic organizations will improve outcomes of learning by delivering more elegant
9. Internet of Things as A Tool For Enhancement of Education Administration and Delivery
http://www.iaeme.com/IJMET/index.asp 56 editor@iaeme.com
learning programs, enhanced practicable productivity, and by gaining real-time, actionable
perception into the levels of academic engagement and performance of the students. This
study was conducted to discover the outcomes of IoT in academics and how to magnify its
perks and also minimize the dangers involved with the system. Supplementary endeavors
were essential to achieving the total capabilities of IoT systems and technologies, hence, this
paper presented findings about the effects of IoT on tertiary education i.e. universities. There
is enormous potential for higher academic organizations; if well planned, that will establish an
epidemic through successful application by the whole body of an academic institution.
Furthermore, this paper shows evidences about the future of IoT in the academia during in the
nearest future, which was obtained from a few research organizations and enterprises. The
authors concluded the paper by outlining the potential risks and pitfalls with IoT in education.
[16] elaborates on the problems of IoT to say that much of the time is wasted while
entering the classroom in queue, students picking up their own materials, sit up and down
while answering to questions and it makes very much difficult for teachers to handle huge
number of students without any technology. As stated by the author, on an average, an
American student spends about 1025 hours each year just for following instructions given to
him/her. Connected devices and emerging trending technologies will help teachers to focus on
student‟s learning needs rather than wasting time for managing large group procedures
because of which they cannot give enough time for developing some extra qualities in
students. Connected devices would definitely help teachers to transform classroom
experience. This paper consists of some practical scenarios of about how I.O.T can be
implemented for a better classroom experience and how teachers can focus on student‟s skills
and which will help to save the time of both.
In [17], IoE is defined as the next step in the evolution of smart objects-interconnected
things in which the line between the physical object and digital information about the object is
blurred. Some key elements in the area of IoE were discussed such as;
The effect of connecting unconventional devices on learning
The enhancements of mobile devices, their availability, how they have made 24/7 connectivity
a reality, and how developing economies can profit from it.
The invention of virtual and augmented reality, cloud computing, Big data analytics, wearable
computing devices and how they all integrate with IoE.
The interconnection between people, data, processes and things and how to exploit the value
of this interconnection.
This paper concluded that “IoE" brings people, process, data, and things together and this
interconnection makes networked connections more significant and invaluable than ever,
making information actionable thus creating new applications, richer experiences, and
remarkable economic opportunities for academics.
As stated in [18], IoT is a modern paradigm which is trending and rapidly expanding,
because of groundbreaking achievements in telecommunications such as the speed of broad-
band technology, IPv6 protocol and the integration of nanotechnology into numerous
electronic devices, from mobile devices to home and office appliances to vehicles, to heavy
factory machinery, etc. The authors describe the idea of the Internet of Objects as the
integration of all these connected objects into a network, so interaction with them from the
internet can exist and successively give data in real-time (we gain instantaneous knowledge of
their status and features) and furthermore grant uninterrupted communication with the users.
The authors proposed a model that enables student‟s interaction with some particular sets of
physical objects around them. Every single one of these objects is associated with one or more
other virtual objects granting access to information enabling the student to attain fulfilment in
10. A. M. Alalade J. O. Ejemeyovwi E. E. Ekong and D. Adeyemo
http://www.iaeme.com/IJMET/index.asp 57 editor@iaeme.com
learning, as to understanding the workings, the utilization, etc. This system used was built
with several technologies such as RFID tags, QRCODE tags, NFC readers, Tablet PCs,
Samsung Galaxy S3 Smartphone using NFC technology, Nokia 700 using NFC technology,
Wi-Fi, and a Web Server containing the augmented objects, designed in such a way that
students using reading devices could scan tags placed on several “IoT” devices, receive
information on tasks required of them to do. This system delivers associated augmented
objects that utilize engineered video or animations portraying devices at work to the mobile
devices while the student interacts with the various objects. In essence, these augmented
objects elaborates the workings and operation of every hardware component, their installation,
etc. The results obtained from the experiment conducted shows that the Internet of things
(objects), put into practice as a support to teaching systems, boosts with solid evidence, the
performance of all the students academically. In addition, the utilization of real objects and
their association as a learning and teaching asset by means of the Internet of Objects expedites
substantial and purposeful learning.
[19] states that the global distribution of mobile and pervasive computing in smart things
ushers in the concept of IoT which offers new outlines for learning mechanisms. This paper
presented a basic design for intercommunication and a set of models that were created and
were also justified as part of a primordial framework of an IoT system in a learning
environment. The major focus of the paper was on a specific technology for the distribution of
IoT recognized as Near Field Communication (NFC) and it surveys some early outlines and
applications to be implemented in environments for learning. Models were created in the
framework of the MOSAIC Project, with the use of a NOKIA 6131 NFC mobile phone and
RFID tags. The models constituted touching notes, touching cabinets, and touching campuses
which could be interacted with via intercommunicative NFC panels. To use these panels, a
mobile phone has to touch the surface and exchange data only by touching with the phone.
The NFC intercommunicative Panel makes use of the Bluetooth and NFC of a phone. NFC
provides the touch and Bluetooth provides communication. In essentiality, the paper
established that because of the ubiquity of mobile phones, and students always in possession
of these phones, total incorporation of IoT into learning could be made possible by the use of
these with the NFC technology the devices possess.
[20] proposed an application framework for the integration of IoT environment with
Learning Management System (LMS) seeing how IoT could be applied seamlessly in
ubiquitous learning environments. LMS as described by the authors is an online learning
platform with lot of components to learn in an effectual manner. This paper aimed at creating
an IoT environment using QR Code, NFC and Raspberry Pi3 to enable effectual
intercommunication with the LMS to equip learners to obtain information for grasping a
learning actualization on understanding the environment. There were three diverse
frameworks created respectively for the Admin Role, the User Role and the Course Creator
Role. In essentiality, the LMS was exhibited as an IoT object and made accessible via NFC
and QR code. This experiment waived the issue of achieving effectual communication
between tutors and students by the application IoT systems using NFC and QR code. The
results the experiment show significant usability and also compelling appreciation on the total
expectancy of the users.
The research work carried out in [21], proposes that students‟ interaction and
collaboration i.e. their attention to learning is measured with the aid of an IoT-based
interoperable model to achieve convenience. With the emergence of multiple learning styles,
methods of assessment also have to be developed to ensure active engagement of the students
and optimum performance thereof. This paper focused on developing the IoT-based
interoperable model for analysis of different students‟ response to e-Learning. The model
11. Internet of Things as A Tool For Enhancement of Education Administration and Delivery
http://www.iaeme.com/IJMET/index.asp 58 editor@iaeme.com
comprised remote video lectures students had to login to access, an attention scoring
algorithm, its workflow, and a mathematical formula that smartly assesses each student‟s
learning experience once logged in. the physical setup for the model included a data collection
program, the webcam able to able to collect face and eye patterns while student were
streaming lectures to study learning behaviors. The collected data then stored in a dataset for
added evaluation. The analyzed and derived results of the datasets can then further be
integrated into newer e-Learning styles to assess students learning behaviors and response to
the learning style.
[22] also focused on the application of IoT specifically on medical education. The authors
state that Case-Based Learning (CBL) is now an effectual learning system for students in
medical education which is essentially for persistent patient cases and also utilization of the
concepts of flipped learning and IoT together with CBL will enhance learning capacity by
provision of real evolutionary medical cases A framework was proposed; an IoT-based Flip
Learning Platform (IoT-FLiP), in which an IoT model is used to reinforce flipped-CBL in a
cloud domain supported with the most advanced level security and privacy systems for
sensitive medical information. This incorporation of IoT in CBL is made possible because
sensor devices can now be acquired cheaply and can be in very small sizes. Also,
advancements in flipped learning make CBL a genuine possibility for medical students‟
pedagogy. Real-time information from IoTs objects in the form of wearable devices on the
patients are aggregated to produce a real-world case for the medical experts and students
using an Interactive Case-Based Flipped Learning Tool (ICBFLT). The ICBFLT is being built
around on the CBL practices in use. All of these collected data from the ICBFLT enables
students develop certainty in their decision making, and adeptly improves synergy in the
medical learning ecosystem.
4. APPLICATION OF IoT IN EDUCATION
4.1. IoT in education enhancement
The internet in general has influenced education in many ways including but not limited to,
creation of innovative works, publishing and storing of research works, laboratory
experiments, smart experiences in a classroom, etc. With the advent of IoT, not only can
learners capture and analyze data, they can make that data do something – e.g. trigger a
reaction when a given threshold is reached [23]. Since IoT is a collection of a vast amount of
smaller, more defined devices and sensors connected mostly wirelessly to each other and then
to the Internet, these devices broaden existing education internet applications and services and
allow the creation of new ones [24].The IoT application in education aims to establish an
ecosystem in which students and teachers can achieve a deeper, pragmatic-based
understanding of their environs and can activate changes through the utilization of the IoT.
There are two ways IoT has influenced education, from easy accessibility of any one over any
network from any device popularly called “Ubiquitous Connectedness” and the actual
incorporation of different end user devices (things) into education.
4.2. Ubiquitous connectedness and education
The invention of the internet has been a very disruptive influence on Education as anyone can
access the internet from anywhere, via any device over any network; this is “Ubiquitous
Connectedness” in a nutshell. Ubiquitous Connectedness is the reason why a student in Africa
can partake in an online class in the USA in real-time. This disruptive technology made
education outgrow its traditional methods and embrace a more seamless and effective
approach. Ubiquitous connectedness also provides a bypass to traditional and conventional
teaching methods as now, instead of the use of lecture rooms for administering lectures,
12. A. M. Alalade J. O. Ejemeyovwi E. E. Ekong and D. Adeyemo
http://www.iaeme.com/IJMET/index.asp 59 editor@iaeme.com
virtual meeting places for lecturers and students can be arranged over the internet and
transference of knowledge still carried out effectively. Nowadays, with the bulk of the world‟s
population now in possession of internet accessible phones and schools providing Wi-Fi
networks for staff and students, education has truly been made ubiquitous and more
interactive.
4.3. IoT in various sections of academia
IoT being the interconnection of numerous devices physically, which are autonomous in
operation over different networks, provides different physical applications in the Information
and Communication technology field across various sections. The internetworking of each
physically enhanced sector leads to a more unified structure.
4.3.1. IoT in the classroom
In recent times, classes now make use of a very powerful teaching platform called Smart
Boards. Smart boards incorporate IoT perfectly into the classroom. It helps the teachers to
explain lectures more easily with the help of online presentations and videos. Also, interactive
tools such as educational games and exercises are made possible via smart boards and this
goes a long way in effective education in students. Web-based tools and programs help to
teach the students better in real-time as compared to the pre-existent chalkboards. Smart
technology enables teachers and students surf the web, edit videos and share exercises and
assignments during lectures. Smart marker is another way IoT is incorporating into education.
A smart marker consists of a normal marker and a receiver. The Smart marker receiver
captures everything being written as it is being written, and then delivers the captured data it
in real time to a remote app on the user‟s PC or smartphone. To start a new document, the
user presses a round button in the center of the receiver, and a fresh page instantly launches in
the app. Another game-changing incorporation of IoT in education involves the use of smart
cameras in a classroom. Smart cameras are used to record classes so students can partake in
classes virtually in real-time. They are autonomous in the sense that they upload recorded data
without any interference thereby enabling real-time participation.
4.3.2. IoT in the library
Many schools already use RFID tags to keep track of library books, or other pieces of
inventory checked in and out by teachers and students. Access cards for entering the school
library building also makes use of RFID technology incorporated in the identity card. With
the use of cameras placed strategically in the library and pressure pad sensors installed
underneath walkways in the library, movement around the library can be monitored and
insight into commonly researched areas can be provided so as to enable the library better
suited to catering for those needs. Also a new technology by the name of Magic Mirror is on
the rise and is very assistive in the library environment [25]. When any piece of literature
located within the library is held up to the magic mirror, on the screen, all information as
regards that literature is displayed, information such as; Title, Author, publishing date, all
other similar literature on the particular study, all other works by the same author, etc.
4.4.3. IoT in academic research
Academic research is very vital to institutions and nations as a whole, it is commonly said that
without research, there is no progress or breakthrough. At one point or another, every scholar
must be faced with one or more research problems. IoT being a disruptive technology that it
is, has broken into every sector of life making tedious and cumbersome processes somewhat
easy. IoT being the installation of various sensors depending on what needs to be sensed,
incorporates this into research perfectly. In fields like Biology and Geography where wildlife
needs to be monitored or climate change as the case maybe, instead of being subjected to
harsh conditions for hours on end, devices with IoT capability can be used instead i.e. sensors,
13. Internet of Things as A Tool For Enhancement of Education Administration and Delivery
http://www.iaeme.com/IJMET/index.asp 60 editor@iaeme.com
smart cameras, actuators that store data in a remote location. Ubiquitous connectedness which
is also a form of IoT makes online publications and research very ground-breaking.
4.4.4. IoT in e-Learning
IoT has continued to achieve and transform e-Learning and is anticipated to usher in more
connectedness, smart classrooms and smarter campuses as time goes on. One unique property
of a smart campus is the capability to capture and synchronize notes from lecture rooms to
school servers. In such a smart situation, the lecture room, geared up with smart cameras and
recorders can record the lectures autonomously and transfer them to the servers on
completion. The idea of scribblings written on boards being captured to create an image of the
notes that gets transferred could also be a possibility in the nearest future.
4.4.5 IoT in academia security
School administrators are always seeking out ways to make the school environs very much
secure and guarded as it of very high importance for all shareholders in the academic sector.
The utilization of IoT to monitor students and other academic personnel drastically improves
safety and security on many levels. GPS trackers fitted on academic transportation vehicles
can provide transmitted data that can assist parents, guardians and staff to conveniently be
aware of the location of their children at all times, wherever they may be. All of this
information collected from various IoT devices assist the academic staff in process of decision
making during urgent situations take drastic action like notification of appropriate security
specialists should the need arise.
5. CONCLUSION
Information and communication technology (ICT) has been empirically proven to have
impact on human development and agriculture sector [26, 27]. The utilization of ICT
technology in academics, particularly IoT, in the field of education has paved the way for new
and innovative concepts to enhance simplicity, betterment and effectiveness to the activities in
the academic environment. The enhancements IoT has incorporated into education cannot be
overstated and it will only get better. IoT stands to alter drastically the way academia works,
and improve student performance and engagements in many fields and at whatever level. The
applications of IoT in academics are boundless and is already evident in many smart schools
in the present day. Moreover, as far as learning applications go, there is still so much to be
unraveled. In the remote future, mining and refining the data gathered from IoT sensors will
definitely improve safety, security and bolster the learning environment for the tutors and the
students.
Of all sectors in which IoT has been implemented, education has been the slowest to catch
which for many is a belief that there is still many ground-breaking heights to reach. Research
is being conducted in designing more advanced and state-of the-art IoT-centered teaching
programs which include smart classrooms, smart labs and entire smart campuses. Though the
advantages of IoT in education are uncountable, there is still some major disadvantages that
counters it all, the issue of privacy and security. Research is still on-going so as to put those
concerns to rest permanently and in the long-term, techniques will be ushered in to deal with
all these challenges. Another disadvantage of IoT devices is the requirement for enormous
amounts of capital investments. Hence, ICT investments are necessary because the
profitability will definitely surpass the deficiencies in the future [27].
14. A. M. Alalade J. O. Ejemeyovwi E. E. Ekong and D. Adeyemo
http://www.iaeme.com/IJMET/index.asp 61 editor@iaeme.com
ACKNOWLEDGEMENTS
This paper is a research work from the collaboration between a faculty in the Department of
Economics and Development Studies and postgraduate students of the department of
Electrical and Information Engineering, Covenant University. Hence, suggestions and
comments from the faculty are acknowledged. In addition, the authors appreciate publication
support from Covenant University Centre for Research, Innovation and Development
(CUCRID).
REFERENCES
[1] M. P. Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, Internet of Things (IoT): A
vision, architectural elements, and future directions. Melbourne,Aaustralia, 2013.
[2] D. McFarlane, “The Origin of the Internet of Things,” 2013. [Online]. Available:
https://www.redbite.com/the-origin-of-the-internet-of-things/. [Accessed: 13-Nov-2017].
[3] M. Sukanya, “Internet of Things (IoT) - (Building Blocks & Architecture),” 2015.
[Online]. Available: http://www.c-sharpcorner.com/UploadFile/f88748/internet-of-things-
part-2/. [Accessed: 08-Dec-2017].
[4] J. Bernadette, “The Tech Behind the IoT,” 2014. [Online]. Available:
https://computer.howstuffworks.com/internet-of-things2.htm. [Accessed: 16-Nov-2017].
[5] Á. Monares, S. F. Ochoa, R. Santos, J. Orozco, and R. Meseguer, “Modeling IoT-based
solutions using human-centric wireless sensor networks,” Sensors (Switzerland), vol. 14,
no. 9, pp. 15687–15713, 2014.
[6] G. S. Vedang Ratan Vatsa, “A Literature Review on Internet of Things (IoT),” Int. J.
Comput. Syst. ISSN 2394-1065, vol. 02, no. 08, p. 04, 2015.
[7] H. J. Watson, “Tutorial: Big data analytics: Concepts, technologies, and applications,”
Commun. Assoc. Inf. Syst., vol. 34, no. 1, pp. 1247–1268, 2014.
[8] S. Gul, M. Asif, S. Ahmad, M. Yasir, M. Majid, and M. S. A. Malik, “A Survey on role of
Internet of Things in education,” IJCSNS Int. J. Comput. Sci. Netw. Secur., vol. 17, no. 5,
pp. 159–165, 2017.
[9] V. Vujović and M. Maksimović, “The impact of the „Internet of Things‟ on engineering
education,” in The Second International Conference on Open and Flexible Education
(ICOFE 2015), 2015, p. 20.
[10] M. Bagheri and S. H. Movahed, “The Effect of the Internet of Things (IoT) on Education
Business Model,” Proc. - 12th Int. Conf. Signal Image Technol. Internet-Based Syst.
SITIS 2016, pp. 435–441, 2017.
[11] K. Pinka, J. Kampars, and V. Minkevičs, “Case Study: IoT Data Integration for Higher
Education Institution,” Inf. Technol. Manag. Sci., vol. 19, no. 1, pp. 71–77, 2016.
[12] A. Labus, M. Milutinović, Đ. Stepanić, M. Stevanović, and S. Milinović, “Wearable
Computing in E-Education,” J. Univers. Excell., vol. 4, no. 1, pp. 39–51, 2015.
[13] K. S. A. Venna, and B.Manjulatha, “A Study on the Integration of IOT and Cloud
Computing for Education System,” Int. J. Innov. Res. Comput. Commun. Eng., vol. 4, no.
6, p. 6, 2016.
[14] S. Charmonman, P. Mongkhonvanit, V. N. Dieu, and N. van der Linden, “Applications of
Internet of Things in E-Learning,” Int. J. Comput. Internet Manag., vol. 23, no. 3, pp. 1–4,
2020.
[15] H. Aldowah, S. Ghazal, S. U. Rehman, and I. N. Umar, “Internet of Things in Higher
Education: A Study on Future Learning Internet of Things in Higher Education View
project Economic Denial of Sustainability (Edos) Attack Mitigation Mechanism In Cloud
Computing Environments View project Internet of Things in ,” J. Phys. Conf. Ser. Pap. •
Open Access IOP Conf. Ser. J. Phys. Conf. Ser., vol. 892, p. 12017, 2017.
15. Internet of Things as A Tool For Enhancement of Education Administration and Delivery
http://www.iaeme.com/IJMET/index.asp 62 editor@iaeme.com
[16] A. R Temkar, M Gupte, and S. Kalgaonkar, “Internet of Things for Smart Classrooms,”
Int. Res. J. Eng. Technol., vol. 3, no. 7, p. 5, 2016.
[17] A. M. Selinger, A. Sepulveda, J. Buchan, “Education And The Internet of Everything
(IOE).” p. 15, 2013.
[18] J. Martín-Gutiérrez, C. E. Mora, B. Añorbe-Díaz, and A. González-Marrero, “Virtual
Technologies Trends in Education,” EURASIA J. Math. Sci. Technol. Educ., vol. 13, no.
2, p. 18, 2016.
[19] G. R. González, M. M. Organero, and C. D. Kloos, “Early infrastructure of an Internet of
things in spaces for learning,” Proc. - 8th IEEE Int. Conf. Adv. Learn. Technol. ICALT
2008, pp. 381–383, 2008.
[20] S. Kanagarajana and S. Ramakrishnanb, “Development of IoT Environment to Interact
with Learning Management Systems,” Int. J. Control Theory Appl., vol. 10, no. 23, p. 8,
2017.
[21] M. Farhan, S. Jabbar, M. Aslam, S. Khalid, M. Hammoudeh, M. Khan and K. Han, “IoT-
based students interaction framework using attention-scoring assessment in eLearning,”
Futur. Gener. Comput. Syst., vol. 79, no. October, pp. 909–919, 2018.
[22] M. Ali, HSM. Bilal, MA. Razzaq, J. Khan, S. Lee, M. Idris, M. Aazam, T. Choi, SC. Han
and BH. Kang, “IoTFLiP: IoT-based flipped learning platform for medical education,”
Digit. Commun. Networks, vol. 3, no. 3, pp. 188–194, 2017.
[23] A. Das, A. Hazari, and R. Karmakar, “IOT In Modern Day Education : A Study,” no. 1,
pp. 331–336.
[24] A. T. H Shivaraj-kumar, T. A. Sriraksha, N. U. Saba, “An IOT Based Secured Smart e-
Campus,” Int. J. Humanit. Soc. Sci. Invent., vol. 6, no. 3, p. 6, 2017.
[25] G. Ramírez-González, M. M. Organero, C. Delgado-Kloos, “Early infrastructure of an
Internet of Things in Spaces for Learning,” in Eighth IEEE International Conference on
Advanced Learning Technologies, 2009, p. 3.
[26] J. O. Ejemeyovwi, A. Akhigbemidu., W. Agharevba, V. Arome, , O. Akaraiwe, T.
Ogunlusi, , and I.Owuama. Can ICT Adoption Aid Crop Production in Nigeria? (Smart-
Agriculture) International Journal of English Literature and Social Sciences. vol 2
no 6, 1 – 8, 2017.
[27] J. O. Ejemeyovwi, E. S. Osabuohien, O. D. Johnson, & Bowale, K. E. Internet Usage and
Inclusive Growth in West Africa. Journal of Economic Structures. In Press, 2019.
[28] J. O. Ejemeyovwi, , E. S. Osabuohien, , & R. Osabuohien,. Investment in Technology and
Human Capital Development in ECOWAS Int. J. Economics and Business Research, vol
15 no 4. 463 - 474, 2018.