This document proposes a project to evaluate using the XMPP protocol for Internet of Things applications. It discusses IoT challenges around power, scalability, interoperability, updates and security. It introduces XMPP and several XMPP extensions for IoT including for control, sensor data, concentrators, provisioning and discovery. The project would implement these extensions and test scalability and security. Milestones include implementing basic protocols, adding concentrators, provisioning and discovery with corresponding tests. The goal is to determine if XMPP can effectively address major IoT challenges.
The project titled ’IoT Home Automation System’ is designed and implemented using Arduino, PHP and MySQL. The project aims provide user with an automated means to control the devices in their homes using a web application from anywhere on the planet.
The project titled ’IoT Home Automation System’ is designed and implemented using Arduino, PHP and MySQL. The project aims provide user with an automated means to control the devices in their homes using a web application from anywhere on the planet.
Introduction to TinyML - Solomon Muhunyo GithuSolomon Githu
What is TinyML? Why so tiny?
This presentation simplifies what TinyML is about. It describes the importance of this technology and also shares some basic guidelines on how it is implemented.
Smart Home Using IOT simulation In cisco packet tracerKhyathiNandankumar
IoT projects are rare and the smart devices working with the help of IoT is afuture scope method,we can have bright future with this power saving method.
I am building voice assistant using Python and his different module. this presentation is a overview of main project.
for Voice recognition I use Pyttsx3, Pyaudio and speech recognition module. it have more than 20+ functions, like greetings , telling time and date, weather report , map etc.
IOT is connecting every physical object in the world using wireless technologies to track and control them from every where in the world...Every object is uniquely identified using ip addresses(IPv6)
Smart Note Taker is a helpful product that satisfies the needs of the people in today's technologic and fast life. This product can be used in many ways. The Smart Note Taker provides taking fast and easy note making to people who are busy with one's self.
With the help of Smart Note Taker, people will be able to write notes in air, while being busy with their work. The written note will be stored in the memory chip of the pen, and will be able to read in digital medium after the job is done. This saves time and facilitate life.
This product is simple but powerful. It has the ability to sense 3D shapes and motions that the user tries to draw. The sensed information will be processed and transferred to the memory chip and then will be monitored on the display device. The shape that is drawn can be broadcasted to the network or sent to a mobile device.
Human Computer Interaction, Gesture provides a way for computers to understand human body language, Deals with the goal of interpreting hand gestures via mathematical algorithms, Enables humans to interface with the machine (HMI) and interact naturally without any mechanical devices
Slides for keynote "Social Media and AI: Don’t forget the users" at WWW 2017 workshop "International Workshop on Modeling Social Media: Machine Learning and AI for Modeling and Analyzing Social Media". I am arguing that we need consider two things: the source of what we use to make good algorithms and whether users are impacted the way we want to impact them. The talk is based on two uses cases around providing diversity (something many of us believe is good) to users:
1. Engaging through diversity: serendipity (same algorithm, different sources)
2. Engaging through diversity: awareness (effective algorithm, perception)
My goal is to say, we may have the best AI, but we may get it wrong if we forget the users. I don't have answers, but it is important that we ask the right questions in today's world.
Most of the people are having trouble in switching off their home appliances. Then there is only one thing to say," damn it ....I forgot "
here come the need of home automation using iot
The Role of the Communication Protocols in the IoT: Pitfalls and AdvantagesFabio Gatti
IoT solutions should rely on solid basis in order to provide a step for the future. One of the foundation of building IoT solutions is identifying the appropriate communication protocol to use. Choosing among the different communication protocols may be a challenging task due to the fact that some protocols may be the right fit for one scenario but not necessarily for all.
In this session, we will examine the communication protocols including their pitfalls an advantages and how to choose the right one for your solution.
Introduction to TinyML - Solomon Muhunyo GithuSolomon Githu
What is TinyML? Why so tiny?
This presentation simplifies what TinyML is about. It describes the importance of this technology and also shares some basic guidelines on how it is implemented.
Smart Home Using IOT simulation In cisco packet tracerKhyathiNandankumar
IoT projects are rare and the smart devices working with the help of IoT is afuture scope method,we can have bright future with this power saving method.
I am building voice assistant using Python and his different module. this presentation is a overview of main project.
for Voice recognition I use Pyttsx3, Pyaudio and speech recognition module. it have more than 20+ functions, like greetings , telling time and date, weather report , map etc.
IOT is connecting every physical object in the world using wireless technologies to track and control them from every where in the world...Every object is uniquely identified using ip addresses(IPv6)
Smart Note Taker is a helpful product that satisfies the needs of the people in today's technologic and fast life. This product can be used in many ways. The Smart Note Taker provides taking fast and easy note making to people who are busy with one's self.
With the help of Smart Note Taker, people will be able to write notes in air, while being busy with their work. The written note will be stored in the memory chip of the pen, and will be able to read in digital medium after the job is done. This saves time and facilitate life.
This product is simple but powerful. It has the ability to sense 3D shapes and motions that the user tries to draw. The sensed information will be processed and transferred to the memory chip and then will be monitored on the display device. The shape that is drawn can be broadcasted to the network or sent to a mobile device.
Human Computer Interaction, Gesture provides a way for computers to understand human body language, Deals with the goal of interpreting hand gestures via mathematical algorithms, Enables humans to interface with the machine (HMI) and interact naturally without any mechanical devices
Slides for keynote "Social Media and AI: Don’t forget the users" at WWW 2017 workshop "International Workshop on Modeling Social Media: Machine Learning and AI for Modeling and Analyzing Social Media". I am arguing that we need consider two things: the source of what we use to make good algorithms and whether users are impacted the way we want to impact them. The talk is based on two uses cases around providing diversity (something many of us believe is good) to users:
1. Engaging through diversity: serendipity (same algorithm, different sources)
2. Engaging through diversity: awareness (effective algorithm, perception)
My goal is to say, we may have the best AI, but we may get it wrong if we forget the users. I don't have answers, but it is important that we ask the right questions in today's world.
Most of the people are having trouble in switching off their home appliances. Then there is only one thing to say," damn it ....I forgot "
here come the need of home automation using iot
The Role of the Communication Protocols in the IoT: Pitfalls and AdvantagesFabio Gatti
IoT solutions should rely on solid basis in order to provide a step for the future. One of the foundation of building IoT solutions is identifying the appropriate communication protocol to use. Choosing among the different communication protocols may be a challenging task due to the fact that some protocols may be the right fit for one scenario but not necessarily for all.
In this session, we will examine the communication protocols including their pitfalls an advantages and how to choose the right one for your solution.
Introduction to IoT
Defining IoT,
Characteristics of IoT,
Physical design of IoT,
Logical design of IoT,
Functional blocks of IoT,
Brief review of applications of IoT.
Smart Object
Definition,
Characteristics and Trends
Text Book
1. Arsheep Bahga (Author), Vijay Madisetti, Internet Of Things: A Hands-On Approach
Paperback, Universities Press,
Reprint 2020
2. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, Jerome Henry,
IoT Fundamentals Networking Technologies, Protocols, and Use Cases for the Internet of
Things CISCO.
Internet of Things.
CSDLO5013
IETF building block in the LwM2M Ecosystem (IoT World 2017 Workshop)Open Mobile Alliance
This presentation is delivered by Hannes Tschofening, ARM and Co-chair of IETF ACE & OAuth WGs.
IETF has developed a Constrained Application Protocol (CoAP) which is designed to easily translate to HTTP for simplified integration with the web. It is intended for use in resource constrained internet devices. OMA LwM2M uses CoAP as a transport mechanism. In this presentation, our speaker from IETF will provide you with an introduction to CoAP:
● What is CoAP
● How CoAP works
● What other IETF standards are used by LwM2M
● What is next for IETF in this space
Slides for protocol layering and network applicationsjajinekkanti
why and how Protocol layering is done in TCP/IP protocol suite, how multiplexing and demultiplexing can be done in different protocol layers in TCP\IP.
Test Execution Infrastructure for IoT Quality analysisAxel Rennoch
Recently IoT testing becomes a popular topic in the industry and academic context. New challenges have been identified and existing test methods and techniques need to be collected, optimized and applied. Furthermore, innovative software development approaches are under consideration and partly implemented. However automated test execution still need powerful means and infrastructure. Open source projects like the Eclipse IoT-Testware project can provide valuable tools for advanced testing in IoT. The presentation gives an overview and first results with our IoT test Infrastructure.
Modification of l3 learning switch code for firewall functionality in pox con...eSAT Journals
Abstract Software-Defined Networking (SDN) is the new trend in the networking field. The separation of the control plane from the forwarding plane has enabled the complete programmability of the network, since the control plane and the forwarding plane are decoupled. An API for POX controller is firewall. A modification of the Learning layer 3 switch code for POX controller is done for a tree topology of depth 3 by using mininet network emulator and the packet flow between the hosts is controlled according to the rules inserted in the Learning switch using OpenFlow controller. Keywords:-POX, SDN, Controller, rules, topology, Learning switch, Firewall
An Approach to Detecting Writing Styles Based on Clustering Techniquesambekarshweta25
An Approach to Detecting Writing Styles Based on Clustering Techniques
Authors:
-Devkinandan Jagtap
-Shweta Ambekar
-Harshit Singh
-Nakul Sharma (Assistant Professor)
Institution:
VIIT Pune, India
Abstract:
This paper proposes a system to differentiate between human-generated and AI-generated texts using stylometric analysis. The system analyzes text files and classifies writing styles by employing various clustering algorithms, such as k-means, k-means++, hierarchical, and DBSCAN. The effectiveness of these algorithms is measured using silhouette scores. The system successfully identifies distinct writing styles within documents, demonstrating its potential for plagiarism detection.
Introduction:
Stylometry, the study of linguistic and structural features in texts, is used for tasks like plagiarism detection, genre separation, and author verification. This paper leverages stylometric analysis to identify different writing styles and improve plagiarism detection methods.
Methodology:
The system includes data collection, preprocessing, feature extraction, dimensional reduction, machine learning models for clustering, and performance comparison using silhouette scores. Feature extraction focuses on lexical features, vocabulary richness, and readability scores. The study uses a small dataset of texts from various authors and employs algorithms like k-means, k-means++, hierarchical clustering, and DBSCAN for clustering.
Results:
Experiments show that the system effectively identifies writing styles, with silhouette scores indicating reasonable to strong clustering when k=2. As the number of clusters increases, the silhouette scores decrease, indicating a drop in accuracy. K-means and k-means++ perform similarly, while hierarchical clustering is less optimized.
Conclusion and Future Work:
The system works well for distinguishing writing styles with two clusters but becomes less accurate as the number of clusters increases. Future research could focus on adding more parameters and optimizing the methodology to improve accuracy with higher cluster values. This system can enhance existing plagiarism detection tools, especially in academic settings.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
Project Proposal: Internet of Things uxing XMPP
1. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
Project Proposal
The Internet of Things using XMPP
******** *************
******** *******
April 23, 2014
2. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
TABLE OF CONTENTS I
INTRODUCTION
BACKGROUND
Internet of Things (IoT)
XMPP
XMPP EXTENDED PROTOCOLS
Base IoT Protocols
Extra IoT Protocols
PROJECT
Research Question
Implementation
Tests
MILESTONES
Realistic
Caffeine
Adderall
CONCLUSION
4. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
IOT: DEFINITION
“The Internet of Things represents a vision in which the
Internet extends into the real world embracing everyday
objects. Physical items are no longer disconnected from the
virtual world, but can be controlled remotely and can act as
physical access points.”[1]
5. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
IOT: PROBLEMS
Lower Power
Scalability
Interoperability
Rolling Updates
Security
6. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
PROBLEM: LOW POWER
Good batteries don’t exist yet
Want any potential device to be able to connect to the
network and stay connected
Physically small like a wrist watch
Limited battery space and mW hours with possibly
infrequent charging like an umbrella
7. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
PROBLEM: SCALABILITY
Expected every person is connected to the Internet
Each person reasonable to have at least 5 devices
connected to the Internet at any given time
Needs to scale to Billions of devices
Layer 1 - 3 needs to be able to handle number of active
devices being routed and addressable
IoT protocols need to be able to be inherently cache-able,
distributable, and redundant
8. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
PROBLEM: INTEROPERABILITY
Need to be able to communicate with functionally
compatible protocols
Protocol needs to work on tiny devices
Agnostic of Layers 1-3
9. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
PROBLEM: ROLLING UPDATES
Even harder to change once as widely adopted as IPv4
Infinite backwards compatibility shouldn’t be expected
Goal having the same quality of service as mainframes
with 0% downtime
10. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
PROBLEM: SECURITY
Privacy
Anonymity
Robust protocol
Fail close protocol
Semantics of protocol need to be as simple as possible not
Turing Comlete
Protocol pushes for better coding practices if where-ever
possible
11. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
XMPP
Extensible Messaging and Presence Protocol
Communications protocol for message-oriented
middleware based on XML
Core Features
Channel Encryption
Authentication
Error Handling
Communication primitives for messaging
Network Availability
Request-Response interactions
12. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
XMPP: PROTOCOL OVERVIEW
1. Determine IP and port to connect
2. Open TCP Connection
3. Open XML Stream over TCP (TLS Optional)
4. Authenticate using Simple Authentication and Security
Layer (SASL) mechanism
5. Bind resource to the stream
6. Exchange XML Data
7. Close XML Stream and TCP Connection
13. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
XEP-0325: IOT CONTROL
IoT requires all devices to have actuators
Devices that can be controlled through the network and act
as with outside world
Example - Control door locks
14. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
XEP-0323: IOT SENSOR DATA
Basic operations and data structures for sensor data
communication
Sensor networks contain many different architectures
Temperature Sensor - Analog Value value with
precision/physical unit
Annoying censors on CSL doors - digital value (0 or 1)
XEP 0323 is designed to be simple due to different
architectures and scalability
15. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
XPE-0326: IOT CONCENTRATORS
Used for concentrating management of a sub set of devices
(usually sensors) to one point
Devices will be of different makes and models
XEP 0326 has a small set of reduced operations for basic
maintenance and interoperability
Set of devices can be
Small connecting all the windows in a house
Medium all of the locks at a business
Large all the devices at a college campus
Massive all of the sensors and actuators at a power plant
Convenience
Ability to work with massive quantities of entities
Effective syncronization between interested parties
16. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
XPE-0324: IOT PROVISIONING
Used for efficient management of access rights and
privileges
What things can read data from what other things, and
what data
User Control and privileges But wait! Not all sensors can
provide a user interface to control privileges
Distributed third party
Provide rich user interface and configurable options
Control communication and available content Relies on
Sensor Data & Control XMPP Extensions
Example- Only the owner of the car may tell the car to start
17. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
XEP-0347: DISCOVERY
Used for secure installation, configuration, and connection
of massive amounts of things
Goal is for 0 configuration networking
Trade off is simplicity vs security
18. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
RESEARCH QUESTION
Does the existing XEP IoT protocols solve the the major
problems of IoT?
19. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
XMPP IMPLEMENTATION
Use existing XMPP base code
Implement XEP 0325 - Control
Implement XEP 0323 - Sensor Data
Note: Protocols are experimental and were updated last
week.
20. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
TEST BED
NS-3
Form of WAN and LAN emulation (e.g. CORE)
21. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
SCALABILITY TESTS
Test overhead of protocol for data
Test how many devices can simultaneously be connected
to one XMPP Server
22. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
SECURITY TESTS
Test how identifiable a person/device is from plain text
and TLS encryption
Test where can privacy can be broken, most likely
assuming compromised server or concentrator
23. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
REALISTIC: MILESTONE 1
Implement Sensor/Control XEPs
Scalability no concentrators
Security anonymity and privacy no concentrators
24. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
CAFFEINATED: MILESTONE 2
Implement Concentrator
Test scalability improvements with concentrators
Test Security with concentrators
25. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
CAFFEINATED: MILESTONE 3
Implement Provisioning
Test Scalability what additional traffic added?
Test Security what data is leaked by provisioning?
26. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
ADDERALL: MILESTONE 4
Implement Discovery
Test Scalability what additional traffic added?
Test Security what data is leaked by provisioning?
28. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
COMMENTS & QUESTIONS
What do you think?
29. INTRODUCTION BACKGROUND XMPP EXTENDED PROTOCOLS PROJECT MILESTONES CONCLUSION
REFERENCES I
C. F. Friedman Mattern, “From the internet of computer to
the internet of things,” Distributed Systems Group.