Open Source Platforms Integration for the Development of an Architecture of Collection and Presentation of Information in "Internet of Things" Projects
The goal of the Internet of Things (IoT) is to achieve the interconnection and interaction of all kind of everyday
objects. IoT architecture can be implemented in various ways. This paper presents a way to mount an IoT architecture using open source hardware and software platforms and shows that this is a viable option to collect information through various sensors and present it through a web page.
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
This paper provides a review of orchestration distributed systems for IoT smart services in fog computing. The cloud infrastructure alone cannot handle the flow of information with the abundance of data, devices and interactions. Thus, fog computing becomes a new paradigm to overcome the problem. One of the first challenges was to build the orchestration systems to activate the clouds and to execute tasks throughout the whole system that has to be considered to the situation in the large scale of geographical distance, heterogeneity and low latency to support the limitation of cloud computing. Some problems exist for orchestration distributed in fog computing are to fulfil with high reliability and low-delay requirements in the IoT applications system and to form a larger computer network like a fog network, at different geographic sites. This paper reviewed approximately 68 articles on orchestration distributed system for fog computing. The result shows the orchestration distribute system and some of the evaluation criteria for fog computing that have been compared in terms of Borg, Kubernetes, Swarm, Mesos, Aurora, heterogeneity, QoS management, scalability, mobility, federation, and interoperability. The significance of this study is to support the researcher in developing orchestration distributed systems for IoT smart services in fog computing focus on IR4.0 national agenda.
Architectural design of IoT-cloud computing integration platformTELKOMNIKA JOURNAL
An integration between the Internet of Things (IoT) and cloud computing can potentially leverage the
utilization of both sides. As the IoT based system is mostly composed by the interconnection of pervasive
and constrained devices, it can take a benefit of virtually unlimited resources of cloud entity i.e storage
and computation services to store and process its sensed data. On the other hand, the cloud computing
system may get benefit from IoT by broadening its reach to real world environment applications. In order
to incarnate this idea, a cloud software platform is needed to provide an integration layer between the IoT
and cloud computing taking into account the heterogenity of network communication protocols as well as the
security and data management issues. In this study, an architectural design of IoT-cloud platform for IoT and
cloud computing integration is presented. The proposed software platform can be decomposed into five main
components namely cloud-to-device interface, authentication, data management, and cloud-to-user interface
component. In general, the cloud-to-device interface acts as a data transmission endpoint between the whole
cloud platform system and its IoT devices counterpart. Before a session of data transmission established,
the communication interface contact the authentication component to make sure that the corresponding IoT
device is legitimate before it allowed for sending the sensor data to cloud environment. Notice that a valid IoT
device can be registered to the cloud system through web console component. The received sensor data
are then collected in data storage component. Any stored data can be further analyzed by data processing
component. User or any developed applications can then retrieve collected data, either raw or processed
data, through API data access and web console.
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...IJCNCJournal
Internet of Things (IoT) has been receiving a lot of interest around the world in academia, industry and telecommunication organizations. In IoT, many constrained devices can communicate with each other which generate a huge number of transferred packets. These packets have different priorities based on the applications which are supported by IoT technology. Emergency applications such as calling an ambulance in a car accident scenario need fast and reliable packets delivery in order to receive an immediate response from a service provider. When a client sends his request with specific requirements, fast and reliable return contents (packets) should be fulfilled, otherwise, the network resources may be wasted and undesirable circumstances may be counted. Content-Centric Networking (CCN) has become a promising network paradigm that satisfies the requirements of fast packets delivery for emergency applications of IoT. In this paper, we propose fast packets delivery techniques based on CCN for IoT environment, these techniques are suitable for urgent packets in emergency applications that need fast delivery. The simulation results show how the proposed techniques can achieve high throughput, a large number of request messages, fast response time and a low number of lost packets in comparison with the normal CCN.
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
This paper provides a review of orchestration distributed systems for IoT smart services in fog computing. The cloud infrastructure alone cannot handle the flow of information with the abundance of data, devices and interactions. Thus, fog computing becomes a new paradigm to overcome the problem. One of the first challenges was to build the orchestration systems to activate the clouds and to execute tasks throughout the whole system that has to be considered to the situation in the large scale of geographical distance, heterogeneity and low latency to support the limitation of cloud computing. Some problems exist for orchestration distributed in fog computing are to fulfil with high reliability and low-delay requirements in the IoT applications system and to form a larger computer network like a fog network, at different geographic sites. This paper reviewed approximately 68 articles on orchestration distributed system for fog computing. The result shows the orchestration distribute system and some of the evaluation criteria for fog computing that have been compared in terms of Borg, Kubernetes, Swarm, Mesos, Aurora, heterogeneity, QoS management, scalability, mobility, federation, and interoperability. The significance of this study is to support the researcher in developing orchestration distributed systems for IoT smart services in fog computing focus on IR4.0 national agenda.
Architectural design of IoT-cloud computing integration platformTELKOMNIKA JOURNAL
An integration between the Internet of Things (IoT) and cloud computing can potentially leverage the
utilization of both sides. As the IoT based system is mostly composed by the interconnection of pervasive
and constrained devices, it can take a benefit of virtually unlimited resources of cloud entity i.e storage
and computation services to store and process its sensed data. On the other hand, the cloud computing
system may get benefit from IoT by broadening its reach to real world environment applications. In order
to incarnate this idea, a cloud software platform is needed to provide an integration layer between the IoT
and cloud computing taking into account the heterogenity of network communication protocols as well as the
security and data management issues. In this study, an architectural design of IoT-cloud platform for IoT and
cloud computing integration is presented. The proposed software platform can be decomposed into five main
components namely cloud-to-device interface, authentication, data management, and cloud-to-user interface
component. In general, the cloud-to-device interface acts as a data transmission endpoint between the whole
cloud platform system and its IoT devices counterpart. Before a session of data transmission established,
the communication interface contact the authentication component to make sure that the corresponding IoT
device is legitimate before it allowed for sending the sensor data to cloud environment. Notice that a valid IoT
device can be registered to the cloud system through web console component. The received sensor data
are then collected in data storage component. Any stored data can be further analyzed by data processing
component. User or any developed applications can then retrieve collected data, either raw or processed
data, through API data access and web console.
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...IJCNCJournal
Internet of Things (IoT) has been receiving a lot of interest around the world in academia, industry and telecommunication organizations. In IoT, many constrained devices can communicate with each other which generate a huge number of transferred packets. These packets have different priorities based on the applications which are supported by IoT technology. Emergency applications such as calling an ambulance in a car accident scenario need fast and reliable packets delivery in order to receive an immediate response from a service provider. When a client sends his request with specific requirements, fast and reliable return contents (packets) should be fulfilled, otherwise, the network resources may be wasted and undesirable circumstances may be counted. Content-Centric Networking (CCN) has become a promising network paradigm that satisfies the requirements of fast packets delivery for emergency applications of IoT. In this paper, we propose fast packets delivery techniques based on CCN for IoT environment, these techniques are suitable for urgent packets in emergency applications that need fast delivery. The simulation results show how the proposed techniques can achieve high throughput, a large number of request messages, fast response time and a low number of lost packets in comparison with the normal CCN.
Towards Internet of Things: Survey and Future VisionCSCJournals
Internet of things is a promising research due to its importance in many commerce, industry, and education applications. Recently, new applications and research challenges in numerous areas of Internet of things are fired. In this paper, we discuss the history of Internet of things, different proposed architectures of Internet of things, research challenges and open problems related to the Internet of things. We also introduce the concept of Internet of things database and discuss about the future vision of Internet of things. These are the manuscript preparation guidelines used as a standard template for all journal submissions. Author must follow these instructions while preparing/modifying these guidelines.
Intelligent Internet of Things (IIoT): System Architectures and Communica...Raghu Nandy
Internet of Things (IoT) can be designed by various approaches with optimistic technology choices. This paper focuses on comparing recent studies on architectural choices and communication approaches for IoT Systems. Understanding Goals of an IoT system and inventing a general prototype for general IoT solutions is uniquely challenging. Existing research prototypes provide us information about IoT systems and their challenges. Existing architectures and communication approaches such as such as Service Oriented Architecture (SOA), Instant Messaging (XMPP) and Web-Sockets Service can be used to develop a general IoT System prototype. SOA provides centralized/decentralized IoT systems. Instant Message services such as XMPP can be used to build distributed and secure IoT platforms. Web-sockets also used to build scalable IoT systems. Overall the choice depends on IoT system Goal and limitations. Intelligent IoT (IIoT) Systems can be seen as decision making system. IoT systems can be built on Cloud infrastructures With Sensor Event as a Service (SEaaS) - Cloud Sensor networks can enable applications to access on-demand real-time sensor data. A generic IoT platform can be built and extended to newer applications and platforms.
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...Istabraq M. Al-Joboury
Internet of Things (IoT) evolves very rapidly over time, since everything such as sensors/actuators linked together from around the world with use of evolution of ubiquitous computing through the Internet. These devices have a unique IP address in order to communicate with each other and transmit data with features of wireless technologies. Fog computing or so called edge computing brings all Cloud features to embedded devices at edge network and adds more features to servers like pre-store data of Cloud, fast response, and generate overhasty users reporting. Fog mediates between Cloud and IoT devices and thus enables new types of computing and services. The future applications take the advantage of combing the two concepts Fog and Cloud in order to provide low delay Fog-based and high capacity of storage Cloud-based. This paper proposes an IoT architecture for healthcare network based on Fog to Cloud and Data in Motion (F2CDM). The proposed architecture is designed and implemented over three sites: Site 1 contains the embedded devices layer, Site 2 consists of the Fog network layer, while Site 3 consists of the Cloud network. The Fog layer is represented by a middleware server in Al-Nahrain University with temporary storage such that the data lives inside for 30 min. During this time, the selection of up-normality in behavior is send to the Cloud while the rest of the data is wiped out. On the other hand, the Cloud stores all the incoming data from Fog permanently. The F2CDM works using Message Queue Telemetry Transport (MQTT) for fast response. The results show that all data can be monitored from the Fog in real time while the critical data can be monitored from Cloud. In addition, the response time is evaluated using traffic generator called Tsung. It has been found that the proposed architecture reduces traffic on Cloud network and provides better data analysis.
Technology analysis for internet of things using big data learningeSAT Journals
Abstract The internet of things (IoT) is an internet among things through advanced communication protocols without human’s operation. The main idea of IoT is to reach and improve the common goal by their intelligent networking. The IoT is an integrated technology of several sub technologies, such as wireless sensor or semantic. The technology of IoT has been evolved according to the environment based on information communication technology and social infrastructure. So we need to know the technological evolution of IoT in the future. In this paper, we analyze the IoT technology to find its technological relationship. We use patents and papers related to the IoT, and consider big data learning as tool for the IoT technology analysis. To verify the performance of our proposed methodology, we perform and show our case study using collected the patent and paper documents. Keywords: Big data learning, Internet of things, Technology analysis, and Patent analysis
Grid computing or network computing is developed to make the available electric power in the similar way
as it is available for the grid. For that we just plug in the power and whoever needs power, may use it. In
grid computing if a system needs more power than available it can share the computing with other
machines connected in a grid. In this way we can use the power of a super computer without a huge cost
and the CPU cycles that were wasted previously can also be utilized. For performing grid computation in
joined computers through the internet, the software must be installed which supports grid computation on
each computer inside the VO. The software handles information queries, storage management, processing
scheduling, authentication and data encryption to ensure information security.
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...Amélie Gyrard
A Unified Semantic Engine for Internet of Things and Smart Cities: From Sensor Data to End-Users Applications
The 8th IEEE International Conference on Internet of Things (iThings 2015), 11-13 December 2015, Sydney, Australia
Amelie Gyrard, Martin Serrano
Dynamic Semantics for the Internet of Things PayamBarnaghi
Ontology Summit 2015 : Track A Session - Ontology Integration in the Internet of Things - Thu 2015-02-05,
http://ontolog-02.cim3.net/wiki/ConferenceCall_2015_02_05
Webinar: Study an online Master’s in Gender Studies, Linköping University, Sw...Web2Present
Linköping University offers you an international MSSc with a major in Gender studies, specialization Intersectionality and Change 120/60 ECTS credits.
This English language program is, mixing online and campus based education. The online part ensures flexibility, creativity and freedom. Three campus weeks per year are mandatory. This is to meet the teachers, for community building, and learning activities that work better in a live setting.
Towards Internet of Things: Survey and Future VisionCSCJournals
Internet of things is a promising research due to its importance in many commerce, industry, and education applications. Recently, new applications and research challenges in numerous areas of Internet of things are fired. In this paper, we discuss the history of Internet of things, different proposed architectures of Internet of things, research challenges and open problems related to the Internet of things. We also introduce the concept of Internet of things database and discuss about the future vision of Internet of things. These are the manuscript preparation guidelines used as a standard template for all journal submissions. Author must follow these instructions while preparing/modifying these guidelines.
Intelligent Internet of Things (IIoT): System Architectures and Communica...Raghu Nandy
Internet of Things (IoT) can be designed by various approaches with optimistic technology choices. This paper focuses on comparing recent studies on architectural choices and communication approaches for IoT Systems. Understanding Goals of an IoT system and inventing a general prototype for general IoT solutions is uniquely challenging. Existing research prototypes provide us information about IoT systems and their challenges. Existing architectures and communication approaches such as such as Service Oriented Architecture (SOA), Instant Messaging (XMPP) and Web-Sockets Service can be used to develop a general IoT System prototype. SOA provides centralized/decentralized IoT systems. Instant Message services such as XMPP can be used to build distributed and secure IoT platforms. Web-sockets also used to build scalable IoT systems. Overall the choice depends on IoT system Goal and limitations. Intelligent IoT (IIoT) Systems can be seen as decision making system. IoT systems can be built on Cloud infrastructures With Sensor Event as a Service (SEaaS) - Cloud Sensor networks can enable applications to access on-demand real-time sensor data. A generic IoT platform can be built and extended to newer applications and platforms.
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...Istabraq M. Al-Joboury
Internet of Things (IoT) evolves very rapidly over time, since everything such as sensors/actuators linked together from around the world with use of evolution of ubiquitous computing through the Internet. These devices have a unique IP address in order to communicate with each other and transmit data with features of wireless technologies. Fog computing or so called edge computing brings all Cloud features to embedded devices at edge network and adds more features to servers like pre-store data of Cloud, fast response, and generate overhasty users reporting. Fog mediates between Cloud and IoT devices and thus enables new types of computing and services. The future applications take the advantage of combing the two concepts Fog and Cloud in order to provide low delay Fog-based and high capacity of storage Cloud-based. This paper proposes an IoT architecture for healthcare network based on Fog to Cloud and Data in Motion (F2CDM). The proposed architecture is designed and implemented over three sites: Site 1 contains the embedded devices layer, Site 2 consists of the Fog network layer, while Site 3 consists of the Cloud network. The Fog layer is represented by a middleware server in Al-Nahrain University with temporary storage such that the data lives inside for 30 min. During this time, the selection of up-normality in behavior is send to the Cloud while the rest of the data is wiped out. On the other hand, the Cloud stores all the incoming data from Fog permanently. The F2CDM works using Message Queue Telemetry Transport (MQTT) for fast response. The results show that all data can be monitored from the Fog in real time while the critical data can be monitored from Cloud. In addition, the response time is evaluated using traffic generator called Tsung. It has been found that the proposed architecture reduces traffic on Cloud network and provides better data analysis.
Technology analysis for internet of things using big data learningeSAT Journals
Abstract The internet of things (IoT) is an internet among things through advanced communication protocols without human’s operation. The main idea of IoT is to reach and improve the common goal by their intelligent networking. The IoT is an integrated technology of several sub technologies, such as wireless sensor or semantic. The technology of IoT has been evolved according to the environment based on information communication technology and social infrastructure. So we need to know the technological evolution of IoT in the future. In this paper, we analyze the IoT technology to find its technological relationship. We use patents and papers related to the IoT, and consider big data learning as tool for the IoT technology analysis. To verify the performance of our proposed methodology, we perform and show our case study using collected the patent and paper documents. Keywords: Big data learning, Internet of things, Technology analysis, and Patent analysis
Grid computing or network computing is developed to make the available electric power in the similar way
as it is available for the grid. For that we just plug in the power and whoever needs power, may use it. In
grid computing if a system needs more power than available it can share the computing with other
machines connected in a grid. In this way we can use the power of a super computer without a huge cost
and the CPU cycles that were wasted previously can also be utilized. For performing grid computation in
joined computers through the internet, the software must be installed which supports grid computation on
each computer inside the VO. The software handles information queries, storage management, processing
scheduling, authentication and data encryption to ensure information security.
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...Amélie Gyrard
A Unified Semantic Engine for Internet of Things and Smart Cities: From Sensor Data to End-Users Applications
The 8th IEEE International Conference on Internet of Things (iThings 2015), 11-13 December 2015, Sydney, Australia
Amelie Gyrard, Martin Serrano
Dynamic Semantics for the Internet of Things PayamBarnaghi
Ontology Summit 2015 : Track A Session - Ontology Integration in the Internet of Things - Thu 2015-02-05,
http://ontolog-02.cim3.net/wiki/ConferenceCall_2015_02_05
Webinar: Study an online Master’s in Gender Studies, Linköping University, Sw...Web2Present
Linköping University offers you an international MSSc with a major in Gender studies, specialization Intersectionality and Change 120/60 ECTS credits.
This English language program is, mixing online and campus based education. The online part ensures flexibility, creativity and freedom. Three campus weeks per year are mandatory. This is to meet the teachers, for community building, and learning activities that work better in a live setting.
How marketing helps form our emotional relationship with foodKaren Fewell
I was thrilled to speak at Food Vision, which took place in Cannes, France on 2nd – 4th March 2016. It was very exciting to be part of an occasion that brought leaders in the global food, drink and nutrition industries together to discuss the future and share insights. I was particularly happy about the opportunity to discuss a subject I’m incredibly passionate about. My talk ‘Food for the heart’, looked at marketing’s power to form and alter our emotional relationships with food. This is something I’ve put a lot of thought into over the last year and I’m still on a mission to deepen my understanding of.
How marketing helps form our emotional relationship with food
Similar to Open Source Platforms Integration for the Development of an Architecture of Collection and Presentation of Information in "Internet of Things" Projects
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
An Event-based Middleware for Syntactical Interoperability in Internet of Th...IJECEIAES
Internet of Things (IoT) connecting sensors or devices that record physical observations of the environment and a variety of applications or other Internet services. Along with the increasing number and diversity of devices connected, there arises a problem called interoperability. One type of interoperability is syntactical interoperability, where the IoT should be able to connect all devices through various data protocols. Based on this problem, we proposed a middleware that capable of supporting interoperability by providing a multi-protocol gateway between COAP, MQTT, and WebSocket. This middleware is developed using event-based architecture by implementing publish-subscribe pattern. We also developed a system to test the performance of middleware in terms of success rate and delay delivery of data. The system consists of temperature and humidity sensors using COAP and MQTT as a publisher and web application using WebSocket as a subscriber. The results for data transmission, either from sensors or MQTT COAP has a success rate above 90%, the average delay delivery of data from sensors COAP and MQTT below 1 second, for packet loss rate varied between 0% - 25%. The interoperability testing has been done using Interoperability assessment methodology and found out that ours is qualified.
Cloud computing is a new technology which refers to an infrastructure where both software and hardware application are operate for the network with the help of internet. Cloud computing provide these services with the help of rule know as you pay as you go on. Internet of things (IoT) is a new technology which is growing rapidly in the field of telecommunications. The aim of IoT devices is to connect all things around us to the internet and thus provide us with smarter cities, intelligent homes and generally more comfortable lives. The combation of cloud computing and IoT devices make rapid development of both technologies. In this paper, we present information about IoT and cloud computing with a focus on the security issues of both technologies. Concluding we present the contribution of cloud computing to the IoT technology. Thus, it shows how the cloud computing technology improves the function of the IoT. Finally present the security challenges of both technologies IoT and cloud computing.
Towards Interoperable, Cognitive and Autonomic IoT Systems: an Agent-based Ap...Universita della Calabria,
Slides related to the conference paper Towards Interoperable, Cognitive and Autonomic IoT Systems: an Agent-based Approach. Claudio Savaglio, Giancarlo Fortino, Mengchu Zhou. IEEE 3rd Word Forum on IoT (WFIoT)
A unified ontology-based data integration approach for the internet of thingsIJECEIAES
Data integration enables combining data from various data sources in a standard format. Internet of things (IoT) applications use ontology approaches to provide a machine-understandable conceptualization of a domain. We propose a unified ontology schema approach to solve all IoT integration problems at once. The data unification layer maps data from different formats to data patterns based on the unified ontology model. This paper proposes a middleware consisting of an ontology-based approach that collects data from different devices. IoT middleware requires an additional semantic layer for cloud-based IoT platforms to build a schema for data generated from diverse sources. We tested the proposed model on real data consisting of approximately 160,000 readings from various sources in different formats like CSV, JSON, raw data, and XML. The data were collected through the file transfer protocol (FTP) and generated 960,000 resource description framework (RDF) triples. We evaluated the proposed approach by running different queries on different machines on SPARQL protocol and RDF query language (SPARQL) endpoints to check query processing time, validation of integration, and performance of the unified ontology model. The average response time for query execution on generated RDF triples on the three servers were approximately 0.144 seconds, 0.070 seconds, 0.062 seconds, respectively.
A unified ontology-based data integration approach for the internet of thingsIJECEIAES
Data integration enables combining data from various data sources in a standard format. Internet of things (IoT) applications use ontology approaches to provide a machine-understandable conceptualization of a domain. We propose a unified ontology schema approach to solve all IoT integration problems at once. The data unification layer maps data from different formats to data patterns based on the unified ontology model. This paper proposes a middleware consisting of an ontology-based approach that collects data from different devices. IoT middleware requires an additional semantic layer for cloud-based IoT platforms to build a schema for data generated from diverse sources. We tested the proposed model on real data consisting of approximately 160,000 readings from various sources in different formats like CSV, JSON, raw data, and XML. The data were collected through the file transfer protocol (FTP) and generated 960,000 resource description framework (RDF) triples. We evaluated the proposed approach by running different queries on different machines on SPARQL protocol and RDF query language (SPARQL) endpoints to check query processing time, validation of integration, and performance of the unified ontology model. The average response time for query execution on generated RDF triples on the three servers were approximately 0.144 seconds, 0.070 seconds, 0.062 seconds, respectively.
Internet of Things (IoT) integrates billions of the heterogeneous IoT things with the Internet in which the embedded systems such as sensors and actuators linked together to improve quality of life, and becomes the future of technologies in any field of human daily life. These IoT devices cooperate with each other and generate useful information to provide better services and applications to the governments and the society. Also, there is a need to store these data on Cloud for monitoring. This paper, surveys IoT applications, new challenges and issues arise in different fields and provides IoT architecture, focuses on explanation of IoT protocols and their operations and functionalities, presents different microcontroller types used by researchers. With the huge amount of data generated from IoT devices, the integrating Cloud and IoT may helpful, Therefore, a survey on open issues faced when these two concepts integrating together is discussed. The objective of this paper is to provide a survey for everything related to IoT and direct it to all beginners in this filed or academic researchers.
The Internet of things describes physical objects that are embedded with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.
Understand about the fundamentals of Internet of Things and its building blocks along with their
characteristics.
Understand the recent application domains of IoT in everyday life.
Gain insights about the current trends of Associated IOT technologoes and IOT Anlaytics.
Understand about the fundamentals of Internet of Things and its building blocks along with their
characteristics.
Understand the recent application domains of IoT in everyday life.
Gain insights about the current trends of Associated IOT technologoes and IOT Anlaytics.
RT-RCT: an online tool for real-time retrieval of connected thingsjournalBEEI
In recent years, internet of things (IoT) represents a giant and a promoter area in innovation and engineering fields. IoT devices are spread in various fields and offer advanced services which assist their users to monitor and control objects remotely. IoT has a set of special characteristics such as dynamic, variety of data and huge scale which introduces a great challenge in the field of retrieval technologies, more precisely real-time retrieval. This paper addresses the issue of real-time retrieval of connected things and tries to propose an innovative solution which allows the retrieval of these things and their descriptive data. The paper proposes an on-line tool for real-time retrieval of connected things and their descriptive data based on network port scanning technique. The performance of this tool proves to be powerful under normal conditions, however more tests must be implemented in the aim to improve the proposed solution. The tool resulted from this work appears to be promising and can be used as a reference by network administrators and IT security managers for the development of new security mechanisms and security reinforcement.
Similar to Open Source Platforms Integration for the Development of an Architecture of Collection and Presentation of Information in "Internet of Things" Projects (20)
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.
The cyber attacks have become most prevalent in the past few years. During this time, attackers have discovered new vulnerabilities to carry out malicious activities on the internet. Both the clients and the servers have been victimized by the attackers. Clickjacking is one of the attacks that have been adopted by the attackers to deceive the innocuous internet users to initiate some action. Clickjacking attack exploits one of the vulnerabilities existing in the web applications. This attack uses a technique that allows cross domain attacks with the help of userinitiated clicks and performs unintended actions. This paper traces out the vulnerabilities that make a website vulnerable to clickjacking attack and proposes a solution for the same.
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
The audio and video synchronization plays an important role in speech recognition and multimedia communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of various hardware components which introduces variable delay and software environments. The objective of the synchronization is used to preserve the temporal alignment between the audio and video signals. This paper proposes the audio-video synchronization using spreading codes delay measurement technique. The performance of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual
signature technique provides a significant reduction in audio-video sync problems and the performance analysis of audio and video synchronization in an effective way. This paper also implements an audio- video synchronizer and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and audio-video delay parameters. The simulation result is carried out using mat lab simulation tools and simulink. It is automatically estimating and correcting the timing relationship between the audio and video signals and maintaining the Quality of Service.
Due to the availability of complicated devices in industry, models for consumers at lower cost of resources are developed. Home Automation systems have been developed by several researchers. The limitations of home automation includes complexity in architecture, higher costs of the equipment, interface inflexibility. In this paper as we have proposed, the working protocol of PIC 16F72 technology is which is secure, cost efficient, flexible that leads to the development of efficient home automation systems. The system is operational to control various home appliances like fans, Bulbs, Tube light. The following paper describes about components used and working of all components connected. The home automation system makes use of Android app entitled “Home App” which gives
flexibility and easy to use GUI.
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
E-learning plays an important role in providing required and well formed knowledge to a learner. The medium of e- learning has achieved advancement in various fields such as adaptive e-learning systems. The need for enhancing e-learning semantically can enhance the retrieval and adaptability of the learning curriculum. This paper provides a semantically enhanced module based e-learning for computer science programme on a learnercentric perspective. The learners are categorized based on their proficiency for providing personalized learning environment for users. Learning disorders on the platform of e-learning still require lots of research. Therefore, this paper also provides a personalized assessment theoretical model for alphabet learning with learning objects for
children’s who face dyslexia.
Agriculture plays an important role in the economy of our country. Over 58 percent of the rural households depend on the agriculture sector as their means of livelihood. Agriculture is one of the major contributors to Gross Domestic Product(GDP). Seeds are the soul of agriculture. This application helps in reducing the time for the researchers as well as farmers to know the seedling parameters. The application helps the farmers to know about the percentage of seedlings that will grow and it is very essential in estimating the yield of that particular crop. Manual calculation may lead to some error, to minimize that error, the developed app is used. The scientist and farmers require the app to know about the physiological seed quality parameters and to take decisions regarding their farming activities. In this article a desktop app for seed germination percentage and vigour index calculation are developed in PHP scripting language.
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
Competition among adaptive video streaming players severely diminishes user-QoE. When players compete at a bottleneck link many do not obtain adequate resources. This imbalance eventually causes ill effects such as screen flickering and video stalling. There have been many attempts in recent years to overcome some of these problems. However, added to the competition at the bottleneck link there is also the possibility of varying network bandwidth which can make the situation even worse. This work focuses on such a situation. It evaluates current heuristic adaptive video players at a bottleneck link with time-varying bandwidth conditions. Experimental setup includes the TAPAS player and emulated network conditions. The results show PANDA outperforms FESTIVE, ELASTIC and the Conventional players.
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members was at high side, also logistics problem constitutes to loss of information in transit hence cut away some members from union activities. To curtail the problem identified, we proposed the
design of secure and dynamic website for spreading union activities among members and public. The proposed system was implemented using HTML5 technology, interface frameworks like Bootstrap and j query which enables the responsive feature of the application interface. The backend was designed using PHPMYSQL. It was discovered from the evaluation of the new system that cost of managing information has reduced considerably, and logistic problems identified in the old system has become a forgotten issue.
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
Nowadays organizations are using information systems for optimizing processes in order to increase coordination and interoperability across the organizations. Since Oil and Gas Industry is one of the large industries in whole of the world, there is a need to compatibility of its Information Systems (IS) which consists three categories of systems: Field IS, Plant IS and Enterprise IS to create interoperability and approach the
optimizing processes as its result. In this paper we introduce the different models of information systems integration, identify the types of information systems that are using in the upstream and downstream sectors of petroleum industry, and finally based on expert’s opinions will identify a suitable model for information systems integration in this industry.
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
This work illustrates the AOMDV routing protocol. Its ancestor, the AODV routing protocol is also described. This tutorial demonstrates how forward and reverse paths are created by the AOMDV routing protocol. Loop free paths formulation is described, together with node and link disjoint paths. Finally, the performance of the AOMDV routing protocol is investigated along link and node disjoint paths. The WSN with the AOMDV routing protocol using link disjoint paths is better than the WSN with the AOMDV routing protocol using node disjoint paths for energy consumption.
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
To identify the importance of node of a network, several centralities are used. Majority of these centrality measures are dominated by components' degree due to their nature of looking at networks’ topology. We propose a centrality to identification model, bridging centrality, based on information flow and topological aspects. We apply bridging centrality on real world networks including the transportation network and show that the nodes distinguished by bridging centrality are well located on the connecting positions between highly connected regions. Bridging centrality can discriminate bridging nodes, the nodes with more information flowed through them and locations between highly connected regions, while other centrality measures cannot.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
In past couple of decades, there is immediate growth in field of agricultural technology. Utilization of proper method of irrigation by drip is very reasonable and proficient. A various drip irrigation methods have been proposed, but they have been found to be very luxurious and dense to use. The farmer has to maintain watch on irrigation schedule in the conventional drip irrigation system, which is different for different types of crops. In remotely monitored embedded system for irrigation purposes have become a new essential for farmer to accumulate his energy, time and money and will take place only when there will be requirement of water. In this approach, the soil test for chemical constituents, water content, and salinity and fertilizer requirement data collected by wireless and processed for better drip irrigation plan. This paper reviews different monitoring systems and proposes an automatic monitoring system model using Wireless Sensor Network (WSN) which helps the farmer to improve the yield.
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered
in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
The financial services industry is experiencing rapid changes in services delivery and channels usage, and financial companies and users of financial services are looking at new technologies as they emerge and deciding whether or not to embrace them and the new opportunities to save and manage enormous time, cost and stress.
There is no doubt about the favourable and manifold impact of technology on e-banking as pictured in this review paper, almost all banks are with the least and most access e-banking Technological equipments like ATMs and Cards. On the other Hand cheap and readily available technology has opened a favourable competition in ebanking services business with a lot of wide range competitors competing with Commercial Banks in Cameroon in providing digital financial services.
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
Attribute or feature selection plays an important role in the process of data mining. In general the data set contains more number of attributes. But in the process of effective classification not all attributes are relevant.
Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a comparative evaluation study of classification algorithms before and after attribute selection using Waikato Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of the classification algorithm, improves after performing attribute selection. This will reduce the work of processing irrelevant attributes.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
In today’s world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
Microstrip patch antennas are recently used in wireless detection applications due to their low power consumption, low cost, versatility, field excitation, ease of fabrication etc. The microstrip patch antennas are also called as printed antennas which is suffer with an array elements of antenna and narrow bandwidth. To overcome the above drawbacks, Flame Retardant Material is used as the substrate. Rectangular shape of microstrip patch antenna with FR4 material as the substrate which is more suitable for the explosive detection applications. The proposed printed antenna was designed with the dimension of 60 x 60 mm2. FR-4 material has a dielectric constant value of 4.3 with thickness 1.56 mm, length and width 60 mm and 60 mm respectively. One side of the substrate contains the ground plane of dimensions 60 x60 mm2 made of copper and the other side of the substrate contains the patch which have dimensions 34 x 29 mm2 and thickness 0.03mm which is also made of copper. RMPA without slot, Vertical slot RMPA, Double horizontal slot RMPA and Centre slot RMPA structures were
designed and the performance of the antennas were analysed with various parameters such as gain, directivity, Efield, VSWR and return loss. From the performance analysis, double horizontal slot RMPA antenna provides a better result and it provides maximum gain (8.61dB) and minimum return loss (-33.918dB). Based on the E-field excitation value the SEMTEX explosive material is detected and it was simulated using CST software.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Epistemic Interaction - tuning interfaces to provide information for AI support
Open Source Platforms Integration for the Development of an Architecture of Collection and Presentation of Information in "Internet of Things" Projects
1. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 01 Pages: 2967-2972 (2016) ISSN: 0975-0290
2967
Open Source Platforms Integration for the
Development of an Architecture of Collection and
Presentation of Information in "Internet of
Things" Projects
A. Medina-Santiago
Center for Research, Development and Technological Innovation, University of Science and Technology Descartes,
Chiapas, México
Email: cidit@universidaddescartes.edu.mx
E. V. Toledo-Nuñez
Master of Technology in Computer Science, University of Science and Technology Descartes, Chiapas, México
Email: edertoledon@gmail.com
R. Soto-Alvarez
Master of Technology in Computer Science, University of Science and Technology Descartes, Chiapas, México
Email: rsotoa@prodigy.net.mx
F. R.Lopez-Estrada
Associated Professor. InstitutoTecnológico de Tuxtla Gutiérrez, Chiapas, México
Email: frlopez@ittg.edu.mx
----------------------------------------------------------------------ABSTRACT--------------------------------------------------------------
The goal of the Internet of Things (IoT) is to achieve the interconnection and interaction of all kind of everyday
objects. IoT architecture can be implemented in various ways. This paper presents a way to mount an IoT
architecture using open source hardware and software platforms and shows that this is a viable option to collect
information through various sensors and present it through a web page.
Keywords - Internet of Things, Open Source, IoT Architecture.
-----------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: July 06, 2016 Date of Acceptance: July 21, 2016
-----------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
The Internet of Things (IoT) tries to make everyday
objects smart, giving them the ability to detect various
conditions of their environment or of their own operation,
communicate and respond to real-world events [1, 2].
Although the concept of IoT has existed for several years,
the existing telecommunications infrastructure nowadays
has allowed a notable development in this area. This is
demonstrable, since the number of things connected to the
Internet in 2008 exceeded the number of inhabitants of the
planet [3], and analysts predict that by 2020 there will be
50 billion connected devices [1]. According to CISCO
Systems, in 2013 the turnover of the things connected to
the Internet amounted to approximately 475,000 million
and represents a global business of 10,900 billion Euros in
5 years [3].
IoT services demand is diversifying, so to meet these
needs there are some companies offering solutions that
pose a “Project Stack" architecture that allows building
and interacting with IoT projects [3]. Research has even
proposed WSAN (Wireless Sensor and Actuator Network)
solutions as network schemes for deployment scenarios
[4]. These solutions, however, have the disadvantage that a
rent that depends on the number of devices used has to be
paid.
One way to avoid this inconvenience is by implementing
IoT architectures that allow horizontal and vertical scaling,
with the help of open source hardware and software. In this
regard, in [5] a detailed explanation of the anatomy,
construction and architecture of IoT is given, while in [4] a
detailed analysis of various Open Source type hardware
platforms analysis is performed and culminates with
service-oriented software architecture for embedded
systems. Furthermore, in [6] a modular design Middleware
development for capture, storage and release is presented.
In Alfonso et al a Field Operational Test (FOTsis) project
is proposed, contributing to the deployment of an
environment with services involving a considerable
number of entities outside the vehicle, based on an
Intelligent Tutoring System (ITS), while Boubetaet al
propose a Service-Oriented Device Architecture (SODA
2.0) and Event-Driven Architecture (EDA). While the
aforementioned works propose architectures and analyze
open source platforms, they do not detail how conjoining
them.
2. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 01 Pages: 2967-2972 (2016) ISSN: 0975-0290
2968
In this work, two IoT platforms are developed using open
source hardware and software. Each collects information
from the surroundings and communicates with a server
through the Internet. It also shows a way to store, process
and present the information obtained by each of the
platforms. The diagrams, comparisons and example of IoT
architecture presented in this paper offer the opportunity to
identify the basic points for the collection and reporting of
information with such platforms.
II. METHODOLOGY
IoT architecture.
Given the characteristics and diversity of devices that can
be connected together, the IoT architectures over the years
have evolved and begun to contemplate different forms
and stages. However, it has come to generalize the idea
that it is necessary to have a decentralized and distributed
organization as to the manner in which the devices must be
connected, based on structures of only hop, star, cluster,
multi-hop or hierarchical [5].
Now, in order to establish the ways of how communication
between the devices should be done, a service-based and
event-driven orientation has been considered, thus
providing interoperability between different devices and
services [6] and, since devices and users connectivity is the
goal, it is necessary to have services that can be accessed
in various ways, for which it also considers the
management, security, data flow control and processing
within architectures [7].
The architecture proposed in this work includes the
collection, transportation, processing, storage and
reporting of information, to meet the challenges of
interconnection of objects and enable communication
between human and machine [8]. In Figure 1 the physical
and logical constituent elements are shown:1) Data
acquisition device (sensor), which collects information
from the real world, for example, temperature, humidity,
light, among others. 2) Wireless Communication, which
enable devices to perform data transfer via radio frequency
or Bluetooth.3) The micro controller card is responsible
for performing the processing of the data obtained by the
device, as well as granting access and control of these. It is
therefore necessary that it implements a logic and
processing unit that performs the processing of the
collected data in order to convert and transform them into
formats that will be useful for later reading and writing. 4)
Security Layer. Prevents other devices can handle data
reading and writing. 5) Firewall. It contains a series of
rules that allow, in the event of a strike, react and preserve
the logical integrity of the devices.6) Network connection
device, which is an Interface that provides communication
over the Internet with the use of TCP / IP protocols.7) API
Rest data transport. It provides a standardized way to
transport data. It has been widely used for its simplicity
and minimal data consumption at the time of the transfer.
8) Servers. They are the infrastructure that allows
receiving data from the various IoT devices, which are
accessible through the Internet and therefore require
security settings and a firewall.9) Data processing and
classification layer. When the server receives data from
different devices, it must be able to classify them based on
the one that sent them. To do this, it is necessary to
perform information processing. 10) Data Storage. When
received data are saved, it is possible to query and analyze
them at any time. 11) Local user interface. Provides access
to IoT device locally, i.e. performs direct interaction with
the device. 12) Remote user Interface. It provides access
to the device but using a connection through the Internet to
interact with it. 13) Devices control, analysis and
monitoring. It allows controlling IoT devices through
buttons and observing and analyzing collected data
through graphs and widgets.
The open source hardware and software proposed in this
paper (Arduino, Raspberry, Python, MongoDB,
PostgreSQL) have been considered given their
performance, active community, learning curve and
accessibility, so that that they can be easily implemented in
IoT projects.
Data scheme description.
Figure 2 shows how this architecture stores data through
an unstructured scheme that displays the captured basic
information and hierarchy under which storage is
considered. This information, after being processed
through a programming language like Python, can be
stored in a database like MongoDB.
Data presentation.
The way in which data that were captured, processed and
stored by the IoT devices are presented is a critical point.
This is done through platforms or screens and it is
necessary to consider the user experience (UX), taking into
account the behavior and actions that allow users to
understand the presented information [9].
In the platform developed in this work widgets are used.
They allow presenting simple information aesthetically and
understandably to the user
Development IoT Devices
To collect data two IoT devices were developed. Figure 3
shows the outline of Raspberry-based IoT I device, to
which the following devices are connected: Humidity and
temperature sensor, GPS transmitter, alcohol sensor, photo
resistor (LDR), soil humidity sensor, passive infrared
sensor (PIR), microphone, ultrasonic sensor and
potentiometer. Its location is fixed. In Figure 4 the
physical assembly of the device is shown.
In Figure 5 the scheme of IoT II device with a mobile
platform based on Arduino is presented. The following
devices have been used: Photo resistor (LDR), humidity
3. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 01 Pages: 2967-2972 (2016) ISSN: 0975-0290
2969
and temperature sensor, gas sensor, microphone,
potentiometer, GPS transmitter and gyroscope. Figure 6
corresponds to the physical mounting of this device.
These devices will be used to validate the case study
described below.
Case study.
To validate the methodology described in the previous
section, the following experiment was performed: Built
IoT devices were set in different geographical locations.
IoT I device in 22 del Bosque street, Col. Los Laureles del
Sur, 29290, San Cristobal de las Casas, Chiapas, Mexico,
with latitude: 16.705627 and longitude: -92.623613 and
IoT II device in 8 Indigenistas street, Col. 14 de
septiembre, 29210, San Cristobal de las Casas, Chiapas,
Mexico, with latitude: 16.746696 and longitude: -
92.634986, as shown in Figure 7.
With these devices a monitoring of different magnitudes,
such as relative humidity, temperature, light intensity and
noise was made. The information collected by each of
them, was sent to the server through a 2 Mbps Internet
connection.To this end, both IoT devices were connected
to the corresponding WiFi module. The information on the
server, can already be seen, manipulated and displayed
from any computer with an Internet connection.
III. RESULTS
When performing the experiment described in the previous
section, it was noted that the implementation of an IoT
architecture with open source hardware and software is
very practical, fast and flexible, as there is on the market a
variety of devices and sensors of all kinds at very
affordable price. There is also vast network information on
how to install and configure most of these devices.
In this project, the two IoT devices mounted (Arduino and
Raspberry), were able to interact without having observed
any difficulty.
In Figure 8 it can be seen that by the sum, since the
connection to the reception there are no more than 500
milliseconds and this is an acceptable time for the
processing and storage platform speed. As mentioned in
the previous section, an Internet connection of 2 Mbps was
used.However, evidence of transmission of more complex
data, such as photos or video was not performed.
In Figure 9 the temperature values (in Celsius degrees)
measured simultaneously by both IoT devices in a certain
time interval aredisplayed. The discrepancy of the values
obtained by Arduino and Raspberry devices shown
isbecause they are located in different places. The other
properties measured by the sensors of the IoT devices
exhibited similar behavior.
In Figure 10 some of the values measured by the sensors of
the IoT devices (potentiometer, temperature and relative
humidity gauge, distance, light intensity, noise)are
displayed. The presentation of data through widgets is
very nice and is considered adequate for displaying
information of various kinds, without causing confusion to
the user.
IoT devices could be located in any location with Internet
coverage, always getting very similar results, from which it
follows that the scope of IoT platforms is practically
unlimited.
IV. FIGURES AND TABLES
Figure 1. Architecture diagram for IoT projects.
Figure 2. Unstructured scheme for data storage.
4. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 01 Pages: 2967-2972 (2016) ISSN: 0975-0290
2970
Figure 3. Raspberry IoT I device scheme.
Figure 4. Construction of IoT I device with Raspberry.
Figure 5.Arduino IoT II device scheme.
Figure 6. Construction of IoT II device with Arduino.
Figure 7. Location of IoT devices.
Figure 8. Data saving request speed via the Internet.
5. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 01 Pages: 2967-2972 (2016) ISSN: 0975-0290
2971
Figure 9. Temperature monitoring by IoT devices graph.
Figure 10. Devices monitoring panel.
V. CONCLUSION
The architecture proposed in this paper was implemented
in a fast, economical and flexible way. The IoT devices
built functioned correctly, both to gather information
through its sensors and to send it to the server. Access to
information from any computer connected to the Internet,
was also very simple. It is worth mentioning that the data
handled by this platform were very simple, however, it is
intended to test transmission of images and video captured
using a VGA camera as it has been mounted to the mobile
platform shown in Figure 6, which will be reported later.
The potential in this area appears to be very large, given
the versatility of the platforms used and the large number
of devices that can be associated with them. Just an
Internet connection is needed to communicate any kind of
objects anywhere in the world. The breadth of this topic
enables the development of multiple lines of research, such
as the development of smart cities, for example.It is
necessary, however, to analyze the reliability of the IoT
architecture with open source hardware and software to
determine whether it is feasible to entrust it critical tasks.
REFERENCES
Journal Papers:
[7] Alfonso, J., Sánchez, N., Menendez, J. &Cacheiro, E.
(2015).Cooperative ITS communications architecture:
The FOTsis project approach and beyond. "IET
Intelligent Transport Systems", v. 9 (n. 6); pp. 1-8.
ISSN 1751-956X.
[8] Rodríguez, J., Montenegro, C. &Cueva, J. (2015).
Introduction to the Internet of Things.“Networks of
Engineering”, v. 6 (Special edition); pp. 53-59. E-
ISSN: 2248-762X (Spanish reference).
Books:
[1] Javed, A. (2016). Building Arduino Projects for the
Internet of Things. Experiments with Real-World
Applications. United States of America: Apress
Media, LLC.
[2] Waher, P. (2015). Learning Internet of Things.
Birmingham - Mumbai: Packt Publishing.
[6] Boubeta-Puig, J., Cubo, J., Nieto, A., Ortiz, G. &
Pimentel, E. (2015).Proposing a Device Architecture
and Services with Event Processing. Spain (Spanish
referente).
[9] Rowland, C., Goodman, E., Charlier, M., Light, A.
&Lui, A. (2015).Designing Connected Products.UX
for the Consumer Internet of Things. United States of
America: O’Reilly Media, Inc.
Theses:
[3] Everlet, A., Pastor, J. (2013). Introduction to the
Internet of Things. Building an IoT project. Spain.
Universidad Rey Juan Carlos (Spanish reference).
[4] Martínez, J. (2013). Open Technologies for
Prototyping the Internet of Things. Spain: Universidad
Politécnica de Madrid.
[5] Sosa, E. (2011).Contributions to the stablishment of a
global network of interconnected gíreles
sensors.Argentina: Universidad Nacional de La Plata
(Spanishreference).
6. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 01 Pages: 2967-2972 (2016) ISSN: 0975-0290
2972
Biographies
A. Medina-Santiago. Research Professor of CIDIT, Doctor
of Science in Electrical Engineering, Master of Science in
Electrical Engineering, Electronics Engineer, 2008, 2003
and 1999, respectively. His research is the development of
intelligent system with neural networks, fuzzy logic and
logic neurofuzzy hardware and software level. Currently it
develops intelligent system with applications in biomedical
signal processing.
E. V. Toledo-Nuñez. He earned his degree in Computer
Science at the InstitutoTecnológico Superior de Cintalapa,
Chiapas in 2013. Currently studies the
MasterofTechnology in ComputerScience, University of
Science and Technology Descartes of Mexico and serves
as a developer in "El Colegio de la Frontera Sur" in the
Infonomics area.
R. Soto-Alvarez. He earned his degree in Aeronautical
Engineering at the InstitutoPolitécnicoNacionalof Mexico
in 2009. Currently studies the MasterofTechnology in
ComputerScience, University of Science and Technology
Descartes of Mexico and Mathematics at the Universidad
Abierta y a Distancia de México.
F. R. Lopez-Estrada. He has a Ph.D in Automatic Control
from the Research Centre for Automatic Control of Nancy,
France, in 2014. He is also an Associated Professor in the
InsitutoTecnológico de Tuxtla Gutiérrez, Mexico. He
received his M.Sc. degree in Electronic Engineering in
Feb.2008 from the Centro Nacional de Investigación y
DesarrolloTecnológico (CENIDET), Mexico. His research
interests are in descriptor systems, linear parameter
varying systems, fault detection and fault tolerant control
systems, and UAVs.