ISCC 2013 Conference Keynote on Internet of Things scope and requirements, illustrations and specific use case energy efficiency in office buildings with personal eco-feedback application POEM (Personal Office Energy Monitor)
AmI 2015 - Definition of Ambient IntelligenceFulvio Corno
The document defines ambient intelligence and discusses its key characteristics. It provides several definitions of ambient intelligence from different perspectives. Ambient intelligence systems are sensitive to their environment, can recognize and respond to the presence of users, and are adaptive. They incorporate technologies like sensing, reasoning, acting and interacting. Examples of application areas are given like smart homes and public buildings. Architectures for ambient intelligence require integrating diverse systems and standardization.
iThings-2012, Besançon, France, 20 November, 2012Charith Perera
Charith Perera, Arkady Zaslavsky, Peter Christen, Dimitrios Georgakopoulos, CA4IOT: Context Awareness for Internet of Things, Proceedings of the IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing (iThings/CPSCom/GreenCom), Besancon, France, November, 2012
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
AmI 2015 - Definition of Ambient IntelligenceFulvio Corno
The document defines ambient intelligence and discusses its key characteristics. It provides several definitions of ambient intelligence from different perspectives. Ambient intelligence systems are sensitive to their environment, can recognize and respond to the presence of users, and are adaptive. They incorporate technologies like sensing, reasoning, acting and interacting. Examples of application areas are given like smart homes and public buildings. Architectures for ambient intelligence require integrating diverse systems and standardization.
iThings-2012, Besançon, France, 20 November, 2012Charith Perera
Charith Perera, Arkady Zaslavsky, Peter Christen, Dimitrios Georgakopoulos, CA4IOT: Context Awareness for Internet of Things, Proceedings of the IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing (iThings/CPSCom/GreenCom), Besancon, France, November, 2012
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
The document is a call for papers for the International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC). It provides details about the journal, including that it is a bi-monthly peer-reviewed journal covering topics related to ad hoc computing, sensor networks, and ubiquitous computing. Authors are invited to submit original papers by July 31, 2021, with notification of acceptance by August 25, 2021 and final manuscripts due by August 30, 2021. The journal aims to provide an international forum for sharing knowledge and results in ad hoc, sensor, and ubiquitous computing.
Internet of Things (IoT) based Solar Energy System security considerationsBohitesh Misra, PMP
Simpa sells solar power systems on financing to households and shops in rural India to address the problems of 100 million households without electricity access and 500 million people relying on kerosene for lighting. Their goal is to create 10 million solar rooftops in 10 years. Simpa has reached 29,500 customers as of February 2017 and provides various solar home systems and products. Their smart panel IoT solution includes features like GSM/GPRS connectivity, sensors, and flash memory to enable pay-as-you-go solar access and monitor usage. However, IoT security risks must be addressed like using encryption, secure updates, and preventing default passwords due to issues like devices being hacked and added to botnets.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) ijasuc
The document is a call for papers for the International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC). IJASUC is a bi-monthly peer-reviewed journal that provides an international forum for sharing knowledge and results in ad hoc and ubiquitous computing theory, methodology and applications. The journal invites authors to submit original papers on topics related to ad hoc computing, sensor networks, and ubiquitous computing by August 28, 2021. Notifications will be sent by September 25, 2021 and final manuscripts will be due by October 2, 2021.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) ijasuc
The document is a call for papers for the International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC). IJASUC is a bi-monthly peer-reviewed journal that provides an international forum for sharing knowledge and results in ad hoc and ubiquitous computing theory, methodology and applications. The journal invites authors to submit original papers by July 24, 2021 on topics related to ad hoc networks, sensor networks, and ubiquitous computing, including architectures, protocols, algorithms, security, and applications. Notifications of paper acceptance will be sent by August 24, 2021.
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
Accelerating the development of AI-enabled Digital Twins.pptxAntonino Sirchia
Employees Comfort measurement in offices is really important to increase the productivity of the teams.
Digital Twins enable Building Managers to interact with building 3D models, monitor environmental data, implement cost savings sustainable models and create what-if simulation scenarios.
During this talk a real world use case of Digital Twin implementation will be presented deep diving on the architectural choices and considerations that made the implementation fast and easy only through Open source solutions.
Presentatiestandaard nevap 28 juni 2019 property technologyDWA
This document discusses digital twins and smart buildings. It defines a digital twin as a virtual representation of a physical asset that can monitor performance, detect inefficiencies, diagnose issues, make adjustments, and alert staff. Empathic or smart buildings aim to deliver better sustainability, wellbeing, productivity and costs through features like HVAC control, lighting management, occupancy monitoring and leak detection. Truly smart buildings also utilize indoor location systems, room reservations, consumption monitoring and elderly care systems. The value of digital twins and smart contracts is explored through a case study on automatically resolving tenant complaints. Key aspects of digital twin implementation include modularity, scalability, interconnectivity, standardization, data quality and organizational accessibility.
Industrial production is becoming increasingly interlinked with modern information and communication technology. From the foundation of intelligent digitally-networked systems, a largely self-organized production will be possible. In Industrie4.0, people, machinery, plants, logistics and products will communicate and cooperate directly. To connect these different strands, a unified, flexible, high-performance system is needed to provide company-wide, real-time, information flow.
To target these issues, we developed enterprise:inmation.
It securely and efficiently gathers data from manufacturing, process control and IT systems all around the globe, contextualizes it and transforms it into actionable information, which is presented to every decision-maker on any device, anytime, at any location.
Software made by industrial system integration pros, in close cooperation with industry leaders. Business performance in real-time, anytime, anywhere, for all decision- makers -that is enterprise:inmation.
This document provides an overview of the subject of Human-Computer Interaction (HCI). It discusses the historical evolution of HCI from early computers to modern interfaces. It also covers key concepts like interactive system design, usability engineering, and the relationship between HCI and software engineering. The document outlines several topics that are important to HCI like GUI design, prototyping techniques, and research areas in HCI including ubiquitous computing and embedded systems.
RECAP at ETSI Experiential Network Intelligence (ENI) MeetingRECAP Project
This presentation was delivered by Johan Forsman (Tieto), Jörg Domaschka (UULM) and Paolo Casari (IMDEA Networks) at the ETSI Experiential Network Intelligence (ENI) Meeting in Warsaw, Poland, on April 12th, 2019. ETSI Experiential Networked Industry Specification Group (ENI ISG) work on defining a Cognitive Network Management architecture using Artificial Intelligence (AI) techniques and context-aware policies to adjust offered services based on changes in user needs, environmental conditions and business goals. The intention is that the use of Artificial Intelligence techniques in the network management system should solve some of the problems of future network deployment and operations. For more information, see https://www.etsi.org/technologies/experiential-networked-intelligence.
It is an exciting time in computing with the sea-change happening both on the technology fronts and application fronts. Networked sensors and embedded platforms with significant computational capabilities with access to backend utility computing resources, offer a tremendous opportunity to realize large-scale cyber-physical systems (CPS) to address the many societal challenges including emergency response, disaster recovery, surveillance, and transportation. Referred to as Situation awareness applications, they are latency-sensitive, data intensive, involve heavy-duty processing, run 24x7, and result in actuation with possible retargeting of sensors. Examples include surveillance deploying large-scale distributed camera networks, and personalized traffic alerts in vehicular networks using road and traffic sensing. This talk covers ongoing research in Professor Ramachandran’s embedded pervasive lab to provide system support for Internet of Things.
This document discusses the history and evolution of the Internet of Things (IoT) from its origins in 2005 to modern applications. It describes key characteristics of IoT including sensing, processing, connectivity, and intelligence. Examples of early IoT projects are provided that highlight challenges overcome like lack of standards and limited scalability. The document also discusses user-centric approaches to IoT design and future directions like integrating AI and ensuring privacy and user acceptance.
The document discusses the key stages in the IoT product life cycle: design, deployment, ongoing management, and decommissioning. It notes that design is the most important stage as developers must consider requirements for all subsequent stages to ensure ease of support. Deployment involves proof-of-concepts, pilots and commercial roll-out and requires access by multiple stakeholders. Ongoing management, the longest stage, allows remote monitoring, maintenance and updates. Decommissioning is often overlooked but properly planning for end-of-life supports transitioning to new models.
Basic introduction,working(steps involved and hierarchy as how IoT works) description on applications related to IoT and casual examples on the applications and the hype cycle of IoT. At the end there is a formal conclusion regarding IoT and the future related.
1) The document proposes an IoT-based home automation system that monitors environmental conditions, controls devices, and detects and corrects faults automatically.
2) It collects sensor data to understand the environment and detect device issues. A home PC monitors sensors and controls devices, reporting problems to the cloud server.
3) The cloud server applies data mining to notify the appropriate technician via SMS/email when issues arise based on registered service providers. This allows for flexible, energy efficient home automation with self-learning capabilities.
Internet of Things(IoT):
Exploring The World of The Internet of Things.
Internet of Things, refers to a network of physical objects embedded with sensors, software, and connectivity capabilities, allowing them to collect and exchange data. These interconnected devices, ranging from everyday objects to industrial machinery, communicate with each other and with the internet, enabling automation, remote monitoring, and intelligent decision-making.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
The document is a call for papers for the International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC). It provides details about the journal, including that it is a bi-monthly peer-reviewed journal covering topics related to ad hoc computing, sensor networks, and ubiquitous computing. Authors are invited to submit original papers by July 31, 2021, with notification of acceptance by August 25, 2021 and final manuscripts due by August 30, 2021. The journal aims to provide an international forum for sharing knowledge and results in ad hoc, sensor, and ubiquitous computing.
Internet of Things (IoT) based Solar Energy System security considerationsBohitesh Misra, PMP
Simpa sells solar power systems on financing to households and shops in rural India to address the problems of 100 million households without electricity access and 500 million people relying on kerosene for lighting. Their goal is to create 10 million solar rooftops in 10 years. Simpa has reached 29,500 customers as of February 2017 and provides various solar home systems and products. Their smart panel IoT solution includes features like GSM/GPRS connectivity, sensors, and flash memory to enable pay-as-you-go solar access and monitor usage. However, IoT security risks must be addressed like using encryption, secure updates, and preventing default passwords due to issues like devices being hacked and added to botnets.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) ijasuc
The document is a call for papers for the International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC). IJASUC is a bi-monthly peer-reviewed journal that provides an international forum for sharing knowledge and results in ad hoc and ubiquitous computing theory, methodology and applications. The journal invites authors to submit original papers on topics related to ad hoc computing, sensor networks, and ubiquitous computing by August 28, 2021. Notifications will be sent by September 25, 2021 and final manuscripts will be due by October 2, 2021.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) ijasuc
The document is a call for papers for the International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC). IJASUC is a bi-monthly peer-reviewed journal that provides an international forum for sharing knowledge and results in ad hoc and ubiquitous computing theory, methodology and applications. The journal invites authors to submit original papers by July 24, 2021 on topics related to ad hoc networks, sensor networks, and ubiquitous computing, including architectures, protocols, algorithms, security, and applications. Notifications of paper acceptance will be sent by August 24, 2021.
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
Accelerating the development of AI-enabled Digital Twins.pptxAntonino Sirchia
Employees Comfort measurement in offices is really important to increase the productivity of the teams.
Digital Twins enable Building Managers to interact with building 3D models, monitor environmental data, implement cost savings sustainable models and create what-if simulation scenarios.
During this talk a real world use case of Digital Twin implementation will be presented deep diving on the architectural choices and considerations that made the implementation fast and easy only through Open source solutions.
Presentatiestandaard nevap 28 juni 2019 property technologyDWA
This document discusses digital twins and smart buildings. It defines a digital twin as a virtual representation of a physical asset that can monitor performance, detect inefficiencies, diagnose issues, make adjustments, and alert staff. Empathic or smart buildings aim to deliver better sustainability, wellbeing, productivity and costs through features like HVAC control, lighting management, occupancy monitoring and leak detection. Truly smart buildings also utilize indoor location systems, room reservations, consumption monitoring and elderly care systems. The value of digital twins and smart contracts is explored through a case study on automatically resolving tenant complaints. Key aspects of digital twin implementation include modularity, scalability, interconnectivity, standardization, data quality and organizational accessibility.
Industrial production is becoming increasingly interlinked with modern information and communication technology. From the foundation of intelligent digitally-networked systems, a largely self-organized production will be possible. In Industrie4.0, people, machinery, plants, logistics and products will communicate and cooperate directly. To connect these different strands, a unified, flexible, high-performance system is needed to provide company-wide, real-time, information flow.
To target these issues, we developed enterprise:inmation.
It securely and efficiently gathers data from manufacturing, process control and IT systems all around the globe, contextualizes it and transforms it into actionable information, which is presented to every decision-maker on any device, anytime, at any location.
Software made by industrial system integration pros, in close cooperation with industry leaders. Business performance in real-time, anytime, anywhere, for all decision- makers -that is enterprise:inmation.
This document provides an overview of the subject of Human-Computer Interaction (HCI). It discusses the historical evolution of HCI from early computers to modern interfaces. It also covers key concepts like interactive system design, usability engineering, and the relationship between HCI and software engineering. The document outlines several topics that are important to HCI like GUI design, prototyping techniques, and research areas in HCI including ubiquitous computing and embedded systems.
RECAP at ETSI Experiential Network Intelligence (ENI) MeetingRECAP Project
This presentation was delivered by Johan Forsman (Tieto), Jörg Domaschka (UULM) and Paolo Casari (IMDEA Networks) at the ETSI Experiential Network Intelligence (ENI) Meeting in Warsaw, Poland, on April 12th, 2019. ETSI Experiential Networked Industry Specification Group (ENI ISG) work on defining a Cognitive Network Management architecture using Artificial Intelligence (AI) techniques and context-aware policies to adjust offered services based on changes in user needs, environmental conditions and business goals. The intention is that the use of Artificial Intelligence techniques in the network management system should solve some of the problems of future network deployment and operations. For more information, see https://www.etsi.org/technologies/experiential-networked-intelligence.
It is an exciting time in computing with the sea-change happening both on the technology fronts and application fronts. Networked sensors and embedded platforms with significant computational capabilities with access to backend utility computing resources, offer a tremendous opportunity to realize large-scale cyber-physical systems (CPS) to address the many societal challenges including emergency response, disaster recovery, surveillance, and transportation. Referred to as Situation awareness applications, they are latency-sensitive, data intensive, involve heavy-duty processing, run 24x7, and result in actuation with possible retargeting of sensors. Examples include surveillance deploying large-scale distributed camera networks, and personalized traffic alerts in vehicular networks using road and traffic sensing. This talk covers ongoing research in Professor Ramachandran’s embedded pervasive lab to provide system support for Internet of Things.
This document discusses the history and evolution of the Internet of Things (IoT) from its origins in 2005 to modern applications. It describes key characteristics of IoT including sensing, processing, connectivity, and intelligence. Examples of early IoT projects are provided that highlight challenges overcome like lack of standards and limited scalability. The document also discusses user-centric approaches to IoT design and future directions like integrating AI and ensuring privacy and user acceptance.
The document discusses the key stages in the IoT product life cycle: design, deployment, ongoing management, and decommissioning. It notes that design is the most important stage as developers must consider requirements for all subsequent stages to ensure ease of support. Deployment involves proof-of-concepts, pilots and commercial roll-out and requires access by multiple stakeholders. Ongoing management, the longest stage, allows remote monitoring, maintenance and updates. Decommissioning is often overlooked but properly planning for end-of-life supports transitioning to new models.
Basic introduction,working(steps involved and hierarchy as how IoT works) description on applications related to IoT and casual examples on the applications and the hype cycle of IoT. At the end there is a formal conclusion regarding IoT and the future related.
1) The document proposes an IoT-based home automation system that monitors environmental conditions, controls devices, and detects and corrects faults automatically.
2) It collects sensor data to understand the environment and detect device issues. A home PC monitors sensors and controls devices, reporting problems to the cloud server.
3) The cloud server applies data mining to notify the appropriate technician via SMS/email when issues arise based on registered service providers. This allows for flexible, energy efficient home automation with self-learning capabilities.
Internet of Things(IoT):
Exploring The World of The Internet of Things.
Internet of Things, refers to a network of physical objects embedded with sensors, software, and connectivity capabilities, allowing them to collect and exchange data. These interconnected devices, ranging from everyday objects to industrial machinery, communicate with each other and with the internet, enabling automation, remote monitoring, and intelligent decision-making.
This document provides an overview of the Internet of Things (IoT) including:
1) A definition of IoT and discussion of its vision to create a network of billions of connected devices.
2) Descriptions of the key enablers that allow IoT to function such as smart devices, communication networks, cloud computing, and sensors.
3) An outline of some of the major challenges with IoT including handling big data, security, bandwidth issues, standardization, and power consumption.
4) Examples of applications of IoT in areas like healthcare, infrastructure, automotive, and connected vehicles.
This document discusses methods for harnessing big data. It describes how sensors collect Internet of Things (IoT) data and how Volvo applies analytics. It also summarizes three methods: 1) The US Air Force uses an integrated data warehouse and geospatial analysis to track assets globally. 2) Siemens uses data discovery processes to predict train failures by analyzing sensor and failure report data. 3) Yahoo uses Hadoop as a data lake to store and analyze large amounts of user data from various sources like social media and clickstreams. The document emphasizes that no single technology is a silver bullet for big data.
This document provides an overview of Industry 4.0, which represents the fourth industrial revolution through increased automation and data exchange in manufacturing technologies. It discusses enabling technologies like cyber-physical systems, the internet of things, and cloud computing. Key principles of Industry 4.0 include interoperability, decentralization, real-time capability and modularity. Examples are given of Industry 4.0 implementations by companies like Siemens, Trumpf, and General Electric.
This document discusses Internet of Things (IoT). It defines IoT and explains that IoT allows internet connectivity and computing capability to extend to various objects and devices. It describes key characteristics of IoT including use of sensors, connectivity models like device-to-device and device-to-cloud, applications across various domains like healthcare, transportation, utilities and more. It also outlines advantages and disadvantages of IoT as well as security and other challenges in deploying IoT solutions at scale.
1. A smart street uses IoT sensors and connectivity to optimize traffic flow, parking, and public safety. It integrates elements like smart street lights, traffic lights, parking systems, and pedestrian and cyclist prioritization.
2. Key components of a smart street include a connectivity corridor, smart street information systems using sensors, and adaptive traffic and transit management systems using sensors and automated barriers.
3. Smart street furniture plays an important role, and can include intelligent lamp posts, kiosks, benches, bins, and street cleaning robots, which also help provide connectivity, charging, and environmental monitoring.
The document discusses the key components of implementing an Internet of Things (IoT) system, including sensors, networks, standards, and intelligent data analysis. Sensors are used to collect device and environmental data, while networks transmit the sensor data. Standards are needed for aggregating and managing the large amounts of data. Intelligent data analysis then extracts insights from the data through techniques like artificial intelligence. Challenges include power consumption, security, interoperability, data volume and variety, and regulatory standards.
This document provides a summary of David Raila's background and experience. He has over 25 years of experience developing innovative technology systems in collaboration with researchers and technology companies. His expertise includes software engineering, Linux systems, high-performance computing, networking, and technology commercialization. He has led several startup ventures and currently works as a systems administrator at the University of Illinois.
The quest for realizing Smart Environments has taken place for the last 30 years. Diverse adaptations of the original UbiComp vision have been developed, each highlighting diverse aspects who have been considered critical to enable a wider and more acceptable adoption of Smart Environments. Notable examples of such interesting adaptations are Context-aware Computing, Sentient Computing, Ambient Intelligence, Ambient Assisted Living and Internet of Everything. Under those different umbrella terms, researchers have explored the 3 stage enabling equation for Smart Environments, i.e. “SENSE + PROCESS = ACT”, i.e. spaces where the environment is aware of the needs, profiles and preferences from the sensed users and accommodates its behaviour to ease their daily interactions. Contributions around these different perspectives and applied to distinct environments, i.e. Smart Offices, Smart Homes, Smart Factories or Smart Cities, have been produced, all addressing the challenges posed by ever more complex systems of systems populated by multiple users. This talk will exemplify research results on how to accomplish these three core steps. Firstly, in the SENSE part, the importance of location sensing and the spread of low cost highly dense sensing environments (RFID, NFC or low range Bluetooth) will be described. Secondly, the PROCESS stage where ever more sophisticated analytics mechanisms to take into account historic and real-time data are considered, combining domain-driven (rules) and data-driven solutions, will be analysed. Thirdly, the ACT stage will be explored, considering the evolution from reactive to learning persuasive environments which aim to collaborate with their users. Thus, a middle ground fostering collaboration between smart things and people will be defended giving place to Smarter environments. The implications of the Smarter environments approach will be illustrated with use cases in the Open Government and Efficient Energy Management domains.
Makers: Shubham Yadav, Aniket Dwivedi, Vedant Babade
presentation on internet of things (IOT) for seminar presentation and school projects.
included future of iot with its different application history and many more things.
Similar to ISCC 2013 keynote "Pervasive Sensing and IoT Cooking Recipe: Just add People and Applications" (20)
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
SAP S/4 HANA sourcing and procurement to Public cloud
ISCC 2013 keynote "Pervasive Sensing and IoT Cooking Recipe: Just add People and Applications"
1. 1
Pervasive Sensing and IoT
Cooking Recipe: Just Add People
and Applications
Milan Milenkovic,
Intel Corporation (Intel Labs),
Santa Clara, CA, USA
milan@intel.com
2. 2
Outline
• The Big Picture
• Pervasive sensing on Internet: ICT transformational and inflection point
• Why that matters and what needs to be built to make it work?
• Reduce to Practice (and learn something while you do it)
• Smart-building use case, prototype and deployment
• Sensors and people and applications (and web technologies)
• Insights and learnings
• Call to action: let’s collaborate on building and deploying (IoT) systems
3. 3
The Big Picture: Add Sensors to get
Internet of Everything, Why and How?
4. 4
Sensors and Internet (“of things, of everything”)
• Growing number and variety of physical-world sensors are connected to the
Internet
• Recent smart phone sensors: light, Hall, barometer, temperature, humidity,
geomagnetic, accelerometer, gyro, proximity, gesture, GPS, wifi and radios
• Smart cities: air quality, traffic, people, water, road conditions, hazards
• Manufacturing, buildings, home, agriculture, health and fitness, buildings, cars IVI
• (research) WSNs galore
• Why is that important or interesting?
• Everything you know and love on the Internet +
• Transformational change: sensory/sensing Internet, real-world “aware” ICT
• New applications, services, user benefits, business opportunities
6. 6
Need Universal (Pervasive) Sensing Platform: Reqs
• Goal: pervasive sensing fabric for smart cities, IoT
• Facilitate new uses and applications across devices and domains
• Support variety of sensors and sources
• Wireless, embedded anywhere, e.g. agriculture, fitness
• Built-in, legacy: e.g. building-management systems (BMS), traffic
• Built into devices: Phones, tablets, laptops, PCs, STBs, cars
• Software sensors, e.g. user activity, energy monitor, weather svc
• People as sensors: direct feedback, preferences (control, actuation)
• Common: naming, data formats and protocols, storage & access, meta-data
• No big data or analytics on fragmented, undecipherable data
• Also security, manageability, discovery <tackled elsewhere>
7. 7
Reduce to practice: Smart Buildings and
POEM (Personal Office Energy Manager)
project
8. 8
Use Case Smart Buildings: Reimagined IT
Buildings consume 40% of energy, 72% of electricity
Regulatory and social pressure to reduce consumption
Efficient energy use = savings & user comfort
Our approach: enhance IT by
• Adding sensors to ICT, holistic building control
• Engaging users via eco-feedback app (POEM)
Result
• Energy efficient new and legacy buildings
• Increased occupant comfort, participation
12. 12
POEM Pilot Tests
4 months, 40 “real” office users, Paris
5 months, 50 “real” office users, Tokyo
239 sensor boards prepared for
firmware flash and packaging
Sensor kit with USB cable attached to
the back of laptop
User Experience, POEM UI
http://youtu.be/nKS45p5cjd0
Managing Director in end-
user baseline interviews
in France
13. 13
“Novel” Sensor Addition: Platform-Integrated Sensors
• Sensors built into or attached to platforms, such as laptops and printers
• energy (sw), temperature, humidity, light, location (including indoor)
• Key advantages:
• Low cost, x10: (re)use host’s processor, power, storage, connectivity
• Ease of enterprise deployment
• Use existing IT infrastructure (WiFi), deployment processes
• … custom WSN have no existing deployment path, battery issues
• Personalization – proximity to user, data from where I am now
14. 14
Pilots: Platform-Integrated Sensor Accuracy
Platform sensor 24.28 C +/- 1.35 C
NIST Reference 24.04 C +/- 1.56 C
Difference in the mean <1%
Off-hour Office Temperature Lab Tests
Difference <0.2%
Difference <0.7%
Gradual temperature drop at night
Fast temperature rise in the morning
16. 16
Initial Learnings and Insights
• Engaging end-users both as consumers and sources of information is vital
• User participation is fun and changes behaviors, impact (e.g. energy)
• Application/service has to be useful and meaningful to the end user to
keep attention and interest
• Proper visualization and data representation, easy to use is hard to do
• People are great sensors, data aggregators/analyzers
• Use of web technologies is the right approach
• Availability, connectivity, tooling, scalability
• Rapid prototype, test, revise and repeat cycle (x long-lead IT approach)
18. 18
Universal Sensing Prototype and Design (“web-age SCADA”)
• Web-compliant sensor data format, sMAP (UCB)
• HTTP protocol, interoperability, familiarity, tools, extensible
• Web technologies, middleware (rant!!), and programming style
• RESTful web services, sensor publish-subscribe
• Sensor database for the web
• Archival storage, searching and queries, analytics, reports
• Scalability, throughput (ours is NoSQL, document based)
• Run locally or as a cloud service
• Meta-data, personalization, manageability
19. 19
Summary and Call to Action
• IoT is here! (also useful and fun)
• Design feasibility and business value test: smart-building and POEM
• Demonstrate usefulness: increase building energy efficiency and user comfort
• Benefits of end-user engagement
• Platform-integrated sensors, sensor-enhanced IT on internet edge
• Benefits: cost, enterprise deployability, personalization
• Universal sensing platform, IoT : call to action, collaboration
• Inclusive and interoperable, across devices and domains
• User-centered: personalization and visualization
• Collaboration opportunity for industry and academia: naming, formats, meta-data
• Build-Test-Deploy-Evaluate and REPEAT
20. POEM team [in order of appearance]: Milan Milenkovic, Scott Shull, Yves Aillerie, Ulf
Hanebutte, Sylvain Sauty, Thanh Dang, Mark Chang, Catherine Huang, Sailaja
Parthasarathy and BLR team, Jun Takei, David Prendergast, Han Pham, Kiyoshi Sakon,
Kazuhide Yamamoto, Wei Thomson
Questions?