SMART PILL BOX SYSTEM FOR BIPOLAR DISORDER PEOPLE

 The main purpose of the Smart Pill Box System project is helping patients with bipolar disorder or other illnesses to create their motivation to take medicine. Moreover, caregivers can take care of the patients more conveniently. Patients can use the application to setup the notification time for medication. Then the application will send the prese...

SMART PILL BOX SYSTEM FOR BIPOLAR DISORDER PEOPLE

 The main purpose of the Smart Pill Box System project is helping patients with bipolar disorder or other illnesses to create their motivation to take medicine. Moreover, caregivers can take care of the patients more conveniently. Patients can use the application to setup the notification time for medication. Then the application will send the prese...

IOT BASED PATIENT MONITORING SYSTEM IN ICU

 Monitoring various parameters of the patient using internet of things. In the patient monitoring system based on Internet of things project, the real-time parameters of patient’s health are sent to cloud using Internet connectivity. These parameters are sent to a remote Internet location so that user can view these details from anywhere in the worl...

HAZARDOUS GAS AND TEMPERATURE DETECTION IN MINING USING IOT

 Eventually a day's a consequence of a general temperature alteration and atmosphere changes there are attempting conditions in field of coal mine. To decrease the cost and improve the productivity close by thing quality the atomization in the field of coal mine is irrefutably essential, which will in addition reduce the mine laborers endeavors. Thi...

IoT-based Smart Heart Attack Detection and Heart Rate Monitor

 This paper is intended to monitor Heart beat with android application which is used to measure the heart beat of different persons. It is built using Android Studio. It may also include the different modules based on the software specification, system requirement, hardware requirement and disk space....

IOT BASED COVID 19 PATIENT MONITORING SYSTEM FROM HOME

 Medical Surveillance Solutions are the most important in the brief developing country populace enhances demands for caretaking. Covid-19 is as a substitute contagious it is very important to quarantine covid-19 humans but at the equal time medical examiners need to check fitness of covid-19 sufferers moreover. With the boosting kind of instances it...

ABANDONED OBJECT DETECTION VIA TEMPORAL CONSISTENCY MODELING AND BACK TRACING VERIFICATION FOR VISUAL SURVEILLANCE THROUGH IOT

 This paper presents an effective approach for detecting abandoned luggage in surveillance videos. We combine short- and long-term background models to extract foreground objects, where each pixel in an input image is classified as a 2-bit code. Subsequently, we introduce a framework to identify static foreground regions based on the temporal transi...

COVID 19 PATIENT HEALTH MONITORING SYSTEM USING IOT

 Covid 19 Patients are facing a many problem of daily checkup like travelling, waiting in the queue. so we are developing this project. In this system a patient will be carrying hardware having sensors and android phone application, the sensors will sense the body temperature, Blood Pressure, Respiration rate and heart pulse rate of patient and thes...

COVID 19 PATIENT HEALTH MONITORING SYSTEM USING IOT

 Covid 19 Patients are facing a many problem of daily checkup like travelling, waiting in the queue. so we are developing this project. In this system a patient will be carrying hardware having sensors and android phone application, the sensors will sense the body temperature, Blood Pressure, Respiration rate and heart pulse rate of patient and thes...

EPILEPTIC SEIZURES PREDICTION USING IOT AND MACHINE LEARNING

 Epilepsy is a type of neurological disorder that causes abnormal brain activities and creates epileptic seizures.Traditionally epileptic seizure prediction is realized with a visual examination of Electroencephalogram (EEG) signals. But this technique needs a long time EEG monitoring. So, the automatic epileptic seizures prediction schemes become a...

EPILEPTIC SEIZURE DETECTION USING IOT

 Epilepsy is a chronic neurological disorder with several different types of seizures, some of them characterized by involuntary recurrent convulsions, which have a great impact on the everyday life of the patients. Several solutions have been proposed in the literature to detect this type of seizures and to monitor the patient; however, these appro...

Stress Detection Using GSR and IOT

 Stress is one of the factors that affect human health in many aspects. It is considered as one of the culprits in increasing the risk of getting sick that could probably lead to critical physical or mental illnesses. Stress can be experienced everywhere and in different circumstances. Hence, stress should be controlled and managed by monitoring its...

IOT BASED FAULT DETECTION OF UNDERGROUND CABLES THROUGH NODE MCU MODULE

 In the downtowns, underground cables are used rather than of overhead transmission lines. It is hard to go through the specific spot of the shortcomings. As India become prominent as a progression country, civilized field is too boosting every day. The underground lines are beat under the same circumstances its uses is additionally growing a result...

EEG Signal Based Seizures Detection using IOT

 Epilepsy is a chronic neurological disorder with several different types of seizures, some of them characterized by involuntary recurrent convulsions, which have a great impact on the everyday life of the patients. Several solutions have been proposed in the literature to detect this type of seizures and to monitor the patient; however, these appro...

DEVELOPMENT OF IOT BASED SMART ENERGY METER READING AND MONITORING SYSTEM

 In the most of the developing countries, the effort of collecting electricity utility meter reading and detecting illegal usage of electricity is a very difficult and time consuming task which requires a lot of human resources. Energy meter reading and monitoring system using Internet of Things (IoT) present an efficient and cost-effective way to t...

A Comprehensive Study on IoT Based Accident Detection Systems for Smart Vehicles

 With population growth, the demand for vehicles has increased tremendously, which has created an alarming situation in terms of traffic hazards and road accidents. The road accidents percentage is growing exponentially and so are the fatalities caused due to accidents. However, the primary cause of the increased rate of fatalities is due to the del...

Light Weight Access Control System for Constrained IOT Devices

 This paper presents a low cost and flexible home control and monitoring system using an embedded micro-web server, with IP connectivity for accessing and controlling devices and appliances remotely using Android based Smart phone app. The proposed system does not require a dedicated server PCwith respect to similar systems and offer...

Building Smart Cities Applications using IoT and Cloud-based Architectures

 The concept of a Smart City highlights the need to enhance quality, interconnection and performance of various urban services with the use of information and communication technologies (ICT). Smart City technologies promote cloud-based and Internet of Things (IoT) based services in which real-world user interfaces use smart phones, sensors and RFID...

An IoT-based system for collision detection on guardrails

 Wireless Sensor Networks (WSNs) have been employed in a wide range of applications due to the low-cost and ease of installation features. One of the applications is in the road safety and highways, in a wide range of scenarios. In this paper, an IoT-based system for collision detection on guardrails is presented. The developed system implements an ...

Time Scheduling and Energy Trading for Heterogeneous Wireless-Powered and Backscattering-based IoT Networks

 This article studies the strategic interactions between an IoT service provider (IoTSP) which consists of heterogeneous IoT devices and its energy service provider (ESP). To that end, we propose an economic framework using the Stackelberg game to maximize the network throughput and energy efficiency of both the IoTSP and ESP. To obtain the Stackelb...

Dynamic Age Minimization with Real-Time Information Preprocessing for Edge-Assisted IoT Devices with Energy Harvesting

 Age of information (AoI) is a newly proposed metric to quantify the freshness of system status. However, in many cases, the original raw data collected by IoT devices needs to be preprocessed in real-time to extract the hidden effective information, which is usually time consuming. To this end, we promote an edge computing assisted approach and aim...

Comparing Backscatter Communication and Energy Harvesting in Massive IoT Networks

 Backscatter communication (BC) and radio-frequency energy harvesting (RF-EH) are two promising technologies for extending the battery lifetime of wireless devices. Although there have been some qualitative comparisons between these two technologies, quantitative comparisons are still lacking, especially for massive IoT networks. In this paper, we a...

Smart Contract based Distributed IoT Security A Protocol for Autonomous Device Management

 The proliferation of IoT devices in society demands a renewed focus on securing the use and maintenance of such systems. IoT-based systems have a significant impact on society and therefore such systems must have guaranteed resilience. We introduce a solution as a protocol that utilizes smart contracts on the Ethereum blockchain to enforce a securi...

PPSF A Privacy-Preserving and Secure Framework using Blockchain-based Machine-Learning for IoT-driven Smart Cities

 With the evolution of the Internet of Things (IoT), smart cities have become the mainstream of urbanization. IoT networks allow distributed smart devices to collect and process data within smart city infrastructure using an open channel, the Internet. Thus, challenges such as centralization, security, privacy (e.g., performing data poisoning and in...

Energy Efficient Data Gathering in IoT Networks with Heterogeneous Traffic for Remote Area Surveillance Applications A Cross layer Approach

 In this paper, the problem of energy-efficient data gathering in an Internet of Things (IoT) based remote area surveillance application is addressed by designing a suitable MAC layer uplink solution. We follow the 3GPP specified scheduled access scheme for narrowband IoT (NB-IoT) and consider presence of both delay sensitive and delay tolerant traf...

Edge LSTM Towards Deep and Sequential Edge Computing for IoT Applications

 The time series data generated by massive sensors in Internet of Things (IoT) is extremely dynamic, heterogeneous, large scale and time-dependent. It poses great challenges (e.g. accuracy, reliability, stability) on the real-time analysis and decision making for different IoT applications. In this paper, we design, implement and evaluate EdgeLSTM, ...

A Fast Hierarchical Physical Topology Update Scheme for Edge-Cloud Collaborative IoT Systems

 The awareness of physical network topology in a large-scale Internet of Things (IoT) system is critical to enable location-based service provisioning and performance optimization. However, due to the dynamics and complexity of IoT networks, it is usually very difficult to discover and update the physical topology of the large-scale IoT systems in r...

A Consortium Blockchain-based Access Control Framework with Dynamic Orderer Node Selection for 5G-enabled Industrial IoT

 5G-enabled Industrial Internet of Things (IIoT) deployment will bring more severe security and privacy challenges, which puts forward higher requirements for access control. Blockchain-based access control method has become a promising security technology, but it still faces high latency in consensus process and weak adaptability to dynamic changes...

Online-offline Interactive Urban Crowd Flow Prediction toward IoT-based Smart City

 Urban crowd flow prediction is very challenging for public management and planning in smart city applications. Existing work mostly focuses on spatial and temporal dependence based flow prediction that are not well suited for predictions of instantaneous flow change usually due to social emergency incidents and accidents. In this paper, we propose ...

Multistatic Noncoherent Linear Complexity Miller Sequence Detection For Gen2 RFIDIoT

 Passive Gen2 radio frequency identification (RFID) tags work thanks to the utilization of line codes that balance their operation between two opposite states: absorbing RF (for energy harvesting) and reflecting RF (for backscattering/communications). Given the current RF harvesting technology, batteryless tags need to be located very close to an ac...

FLEAM A Federated Learning Empowered Architecture to Mitigate DDoS in Industrial IoT

 Due to resource constraints and working surroundings, many IIoT nodes are easily hacked and turn into zombies from which to launch attacks. It is challenging to detect such networked zombies. We combine federated learning (FL) and fog/edge computing to combat malicious codes. Our protocol trains a global optimized model based on distributed dataset...

DNNOff Offloading DNN-based Intelligent IoT Applications in Mobile Edge Computing

 Deep neural network (DNN) has become increasingly popular in industrial IoT scenarios. Due to high demands on computational capability, it is hard for DNN-based applications to directly run on intelligent end devices with limited resources. Computation offloading technology offers a feasible solution by offloading some computation-intensive tasks t...

Development of an Industrial IoT Based Monitoring System for Voltage Regulators

 The increase in electronic loads connected to electrical network became relevant requirements of the quality of supply. Among the equipment used in the power distribution system stands out regulators medium voltage installed over the grid to maintain voltage levels within indifferent operating range of the oscillations. Therefore, the quality of su...

A 2.4 GHz Power Receiver Embedded With a Low-Power Transmitter and PCE of 53.8%, for Wireless Charging of IoT Wearable Devices

 This article presents a 2.4 GHz and high-efficiency wireless power receiver (Rx) integrated with a low-power transmitter (Tx) for wireless charging of the Internet-of-Things (IoT) or wearable devices. A single pole double throw (SPDT) circuit isolates the operation of the Rx from Tx, thereby offering the capability of sharing antenna between them. ...

The Module Switching Mechanism for Power-Constrained Devices in LTE and NB-IoT Interworking Networks

 The dual mode technology has been adopted to support smart devices to connect to both the NB-IoT and the LTE simultaneously. How to reduce the power consumption of a smart device with limited battery capacity has been treated as an important issue. In this paper, we propose the Module Switching Mechanism (MSM) that consists of the PS scheme and the...

Miniaturized and IoT enabled Continuous-flow based Microfluidic PCR Device for DNA Amplification

 Herein, a continuous-flow driven microfluidic device has been designed and fabricated using the CO2 laser ablation method for polymerase chain reaction (PCR). The device consists of a polymethyl methacrylate (PMMA) microfluidic channel with 30 serpentine thermal cycles, an arduino board, two custom-made cartridge heaters, and thermocouple sensors. ...

LightIoT Lightweight and secure communication for energy-efficient IoT in health informatics

 Internet of Things (IoT) is considered as a key enabler of health informatics. IoT-enabled devices are used for in-hospital and in-home patient monitoring to collect and transfer biomedical data pertaining to blood pressure, electrocardiography (ECG), blood sugar levels, body temperature, etc. Among these devices, wearables have found their presenc...

Intelligent Security Performance Prediction for IoT-Enabled Healthcare Networks Using Improved CNN

 The global healthcare industry and artificial intelligence has promoted the development of the diversified intelligent healthcare applications. IoT will play an important role in meeting the high throughput requirements of diversified intelligent healthcare applications. However, the healthcare big data transmission is vulnerable to a potential att...

An Opportunistic Approach for Cloud Service based IoT Routing Framework Administering Data, Transaction, and Identity Security

 There has been an asymmetric shift towards harnessing cloud-based technologies as the world focuses on shifting operations remotely. Data security for remote operations is crucial for the protection and preservation of critical infrastructure. Furthermore, there has been an emerging trend to integrate IoT based devices with the expanding cloud infr...

A RISC-V ISA Extension for Ultra-Low Power IoT Wireless Signal Processing

 This work presents an instruction-set extension to the open-source RISC-V ISA (RV32IM) dedicated to ultra-low power (ULP) software-defined wireless IoT transceivers. The custom instructions are tailored to the needs of 8/16/32-bit integer complex arithmetic typically required by quadrature modulations. The proposed extension occupies only 2 major o...

Time Scheduling and Energy Trading for Heterogeneous Wireless-Powered and Backscattering-based IoT Networks

 This article studies the strategic interactions between an IoT service provider (IoTSP) which consists of heterogeneous IoT devices and its energy service provider (ESP). To that end, we propose an economic framework using the Stackelberg game to maximize the network throughput and energy efficiency of both the IoTSP and ESP. To obtain the Stackelb...

Multi-Objective Optimization for UAV-Assisted Wireless Powered IoT Networks Based on Extended DDPG Algorithm

 This paper studies an unmanned aerial vehicle (UAV)-assisted wireless powered IoT network, where a rotary-wing UAV adopts fly-hover-communicate protocol to successively visit IoT devices in demand. During the hovering periods, the UAV works on full-duplex mode to simultaneously collect data from the target device and charge other devices within its...

eICIC configuration of Downlink and Uplink Decoupling with SWIPT in 5G Dense IoT HetNets

 Interference management and power transfer can provide a significant improvement over the 5th generation mobile networks (5G) dense Internet of Things (IoT) heterogeneous networks (HetNets). In this paper, we present a novel approach to simultaneously manage inferences at the downlink (DL) and uplink (UL), and to identify opportunities for power tr...

A Security and Privacy-Preserving Approach Based on Data Disturbance for Collaborative Edge Computing in Social IoT Systems

 The Internet of things (IoT) has certainly become one of the hottest technology frameworks of the year. It is deep in many industries, affecting people's lives in all directions. The rapid development of the IoT technology accelerates the process of the era of ``Internet of everything'' but also changes the role of terminal equipment at the edge of...

A Hybrid Blockchain Consensus Algorithm Using Locational Marginal Pricing for Energy Applications

 Blockchain technology has recently witnessed a rapid proliferation across multiple industries and has the potential to evolve as a popular energy transaction platform for grid operators and general users. The current proof-of-work consensus algorithm used by many blockchain protocols suffer from vulnerabilities such as the majority attacks problem ...

A Group Discovery Method Based on Collaborative Filtering and Knowledge Graph for IoT Scenarios

 With the massive growth of Internet-of-Things (IoT) devices, how to provide users with recommendation services in the IoT environment has become a research hotspot. Group discovery, as a prerequisite step of group recommendation that can be used to assist groups of users to select services in IoT-enriched environments, has an important impact on re...

An Algorithm for Designing Value Propositions in the IoT Space Addressing the Challenges of Selecting the Initial Class in Reference Class Forecasting

 Developing products and entering new markets in the Internet of Things (IoT) and industry 4.0 space are challenging because value propositions and business models are complex. IoT products are fundamentally platform products, whose embedded components can measure a disparate set of characteristics for several user types. Deciding in advance which c...

Trustworthy Target Tracking with Collaborative Deep Reinforcement Learning in EdgeAI-Aided IoT

 In this paper, we propose DRL Track, a framework for target tracking with a collaborative deep reinforcement learning (C-DRL) in Edge-IoT with the aim to obtain high quality of tracking (QoT) and resource-efficient performance. In DRLTrack, a huge number of IoT devices are employed to collect data about a mobile target. One or two edge devices coor...

Trajectory and Resource Optimization in OFDM based UAV-Powered IoT Network

 The Internet of Things (IoT) is playing an increasingly vital role in multiple industries and our everyday life. A pressing practical problem of IoT devices (IoT-Ds) is their explosive growth of connectivity which leads to large energy consumption. One of the most promising solutions to achieve a sustainable green IoT network is unmanned aerial veh...

Energy-Efficient Offloading for DNN-based Smart IoT Systems in Cloud-Edge Environments

 Deep Neural Networks (DNNs) have become an essential and important supporting technology for smart Internet-of-Things (IoT) systems. Due to the high computational costs of large-scale DNNs, it might be infeasible to directly deploy them in energy-constrained IoT devices. Through offloading computation-intensive tasks to the cloud or edges, the comp...

A Two-Stage Feature Transformation-Based Fingerprint Authentication System for Privacy Protection in IoT

 Bio-features are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose of this investigation is to summaries the factors that hinder biometrics models’ development and deployment on a large scale, including human physiological (e.g., face, eyes, fingerprints-palm, or electrocardiogram) and behavioral features (e.g., s...

A Sub-µW Reversed-Body-Bias 8-bit Processor on 65-nm Silicon-On-Thin-Box (SOTB) for IoT Applications

 For most Internet-of-Things (IoT) applications, embedded processors typically execute lightweight tasks such as sensing and communication. The typical IoT program senses some information and sends them via a channel, usually a wireless channel with an RF circuit. These IoT nodes often require a system with networking capabilities and a low-power ha...

Throughput and Age of Information in a Cellular-based IoT Network

 This paper studies the interplay between device-to-device (D2D) communications and real-time monitoring systems in a cellular-based Internet of Things (IoT) network. In particular, besides the possibility that the IoT devices communicate directly with each other in a D2D fashion, we consider that they frequently send time-sensitive information/stat...

Nonnegative Matrix Factorization based Heterogeneous Graph Embedding Method for Trigger-Action Programming in IoT

 Nowadays, users can personalize IoT devices/Web services via Trigger-Action Programming (TAP). As the number of connected entities grows, the relations of triggers and actions become progressively complex (i.e., the heterogeneity of TAP), which becomes a challenge for existing models to completely preserve the heterogeneous data and semantic inform...

IEPSBP A Cost-efficient Image Encryption Algorithm based on Parallel Chaotic System for Green IoT

 With the fast development of the Internet of Things (IoT) technologies, more IoT devices are currently connected with the Internet, resulting in more exchange of information. However, data privacy and security threats have become emerging challenges of the IoT. In this paper, we are concerned about the security of image transmission in green IoT. I...

Data Collection Maximization in IoT-Sensor Networks Via an Energy-Constrained UAV

 In this paper, we study sensing data collection of IoT devices in a sparse IoT-sensor network, using an energy-constrained Unmanned Aerial Vehicle (UAV), where the sensory data is stored in IoT devices while the IoT devices may or may not be within the transmission range of each other. We formulate two novel data collection problems to fully or par...

Computation Offloading in Untrusted MEC-aided Mobile Blockchain IoT Systems

 Deploying a mobile edge computing (MEC) server in the mobile blockchain-enabled Internet of things (IoT) system is a promising approach to improve the system performance, however, it imposes a significant challenge on the trust of the MEC server. To address this problem, we first propose an untrusted MEC proof of work (PoW) scheme in mobile blockch...

A Transfer Learning Approach for Securing Resource-Constrained IoT Devices

 In recent years, Internet of Things (IoT) security has attracted significant interest by researchers due to new characteristics of IoT such as heterogeneity of devices, resource constraints, and new types of attacks targeting IoT. Intrusion detection, which is an indispensable part of a security system, is also included in these studies. In order t...

Exploiting Zero Knowledge Proof and Blockchain Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) on IoT

 In recent years, the Internet of Things (IoT) has been contemplated as the next technological advancement in the era of internet. This paper discloses the architecture of a multilayer, multimode security system for IoT. The proposed system is capable of providing multiple security solutions that support anonymous authentication, device privacy, dat...

Toward Secure Data Computation and Outsource for Multi-User Cloud-Based IoT

 Cloud computing has promoted the success of Internet of Things (IoT) with offering abundant storage and computation resources where the data from IoT sensors can be remotely outsourced to the cloud servers, whereas storing, exchanging and processing data collected through IoT sensors via centralised or decentralised cloud servers make cloud-based I...

SILedger A Block chain and ABE-based Access Control for Applications in SDN-IoT Networks

 The Software Defined Network in Internet of Things (SDN-IoT) is enjoying growing popularity due to its flexibility, automaticity and programmability. However, there still lack proper permission management on SDN-IoT applications (SIApps), especially when the SIApp’s required northbound interfaces are located in multiple heterogeneous controllers wi...

Multi-Agent DRL for Task Offloading and Resource Allocation in Multi-UAV Enabled IoT Edge Network

 The Internet of Things (IoT) edge network has connected lots of heterogeneous smart devices, thanks to unmanned aerial vehicles (UAVs) and their groundbreaking emerging applications. Limited computational capacity and energy availability have been major factors hindering the performance of edge user equipment (UE) and IoT devices in IoT edge networ...

Energy-Efficient Cross-layer Spectrum Sharing in CR Green IoT Networks

 Internet-of-Things (IoT) aims to connect intelligent things to the internet, enable thing-to-everything communication, and sustainability sensing and control. However, the exponential increase of connected IoT devices is resulting in tremendous demand on the limited spectrum. Cognitive radio (CR) technology is envisioned to be one of the main enabl...

An Efficient Signature Scheme Based on Mobile Edge Computing in the NDN-IoT Environment

 Named data networking (NDN) is an emerging information-centric networking paradigm, in which the Internet of Things (IoT) achieves excellent scalability. Recent literature proposes the concept of NDN-IoT, which maximizes the expansion of IoT applications by deploying NDN in the IoT. In the NDN, the security is built into the network by embedding a ...

Towards Blockchain for Suitable Efficiency and Data Integrity of IoT Ecosystem Transactions

 This article analyzes the effectiveness of deploying the Blockchain technology in the implementation of the IoT ecosystem database. To this end, we assess the processing efficiency of transactions originated by smart devices and the storeddata integrity. The processing-efficiency evaluation is carried out through queue-theory-based analytical model...

Optimal energy-aware task scheduling for batteryless IoT devices

 Today's IoT devices rely on batteries, which offer stable energy storage but contain harmful chemicals. Having billions of IoT devices powered by batteries is not sustainable for the future. As an alternative, batteryless devices run on long-lived capacitors charged using energy harvesters. The small energy storage capacity of capacitors results in...

Lightweight and Scalable DAG based distributed ledger for verifying IoT data integrity

 Verifying the integrity of IoT data in cloud-based IoT architectures is crucial for building reliable IoT applications. Traditional data integrity verification methods rely on a Trusted Third Party (TTP) that has issues of risk and operational cost by centralization. Distributed Ledger Technology (DLT) has a high potential to verify IoT data integr...

IoT-TEG 4.0 A New Approach 4.0 for Test Event Generation

 The Industry 4.0 (I4.0) is a paradigm settled down by the introduction of the Internet of things (IoT) into the production and manufacturing environment. I4.0 promotes the connection of physical items such as sensors, devices, and enterprise assets, to each other and to the Internet. The information that flows through these items is vital because i...

IoT based Smart Rationing System

 Public Distribution System is an essential part of life for the under-privileged people of the society. The traditional ration distribution system involves various malpractices. Ration card is the proof of citizenship since many decades. Government's subsidized food commodities and fuel are purchased using ration card by the people categorized as B...

GT-Chain A Fair Blockchain for Intelligent Industrial IoT Applications

 In Industrial Internet of Things (IIoT), a number of mutually untrusted devices with diverse computing resources and application requirements often need to work together to serve industrial production. When applying permissionless blockchain to process transactions among these devices, we are concerned with two types of fairness: mining fairness (i...

Comparative Analysis of the Impact of Blockchain On Blockchain Based IoT Application

 Blockchain is a safe technology for transaction as it keeps the information safe that it is impossible to change, hack or cheat. blockchain is a digital mode of transaction that is spread across the entire network of computer systems in blockchain. IoT devices allows to send information or useful data in the blockchain to the persons that are inter...

Biometric And IOT Technology Based Safety Transactions In ATM

 The ATM Fraudulence occurring in the society has become very common nowadays. Even though technology has boomed in various aspects it is being misused in different ways for stealing money through ATM’S. Skimming and Trapping of the ATM devices have been designed by many Burglars. Recognition based Verification system as been implemented for many AT...

A Deep Reinforcement Learning Approach for Composing Moving IoT Services

 We develop a novel framework for efficiently and effectively discovering crowdsourced services that move in close proximity to a user over a period of time. We introduce a moving crowdsourced service model which is modelled as a moving region. We propose a deep reinforcement learning-based composition approach to select and compose moving IoT servi...

Toward Secure Data Computation and Outsource for Multi-User Cloud-Based IoT

 Cloud computing has promoted the success of Internet of Things (IoT) with offering abundant storage and computation resources where the data from IoT sensors can be remotely outsourced to the cloud servers, whereas storing, exchanging and processing data collected through IoT sensors via centralised or decentralised cloud servers make cloud-based I...

Small Low-Contrast Target Detection Data-Driven Spatiotemporal Feature Fusion and Implementation

 Detecting small low-contrast targets in the airspace is an essential and challenging task. This article proposes a simple and effective data-driven support vector machine (SVM)-based spatiotemporal feature fusion detection method for small low-contrast targets. We design a novel pixel-level feature, called a spatiotemporal profile, to depict the di...

On Evolutionary Game of Dynamic Devices in NOMA-based IoT Networks

 In this paper, we consider an Internet-of-Things (IoT) network that supports two types of devices, namely static devices (SDs) and dynamic devices (DDs), with multiple channels. The notion of power-domain non-orthogonal multiple access (NOMA) is applied so that DDs can not only dynamically change channels, but also transmit signals with a high powe...

NPRACH-Aware Link Adaptation and Uplink Resource Allocation in NB-IoT Cellular Networks

 In narrowband Internet of Things (NB-IoT), a link adaptation technique can be performed, considering multiple resource unit types, repetition numbers, and modulation-coding schemes, to enhance transmission reliability. Then, a base station should allocate downlink and uplink resources for each device using the link adaptation decision to transmit d...

Intelligent Reflecting Surfaces Assisted UAV Communications for IoT Networks Performance Analysis

 The increasing demand for wireless connectivity and the emergence of the notion of the Internet of Everything require new communication paradigms that will ultimately enable a plethora of new applications and new disruptive technologies. In this context, the present contribution investigates the use of the recently introduced intelligent reflecting...

PMRSS Privacy-preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare

 In medical field, previous patients' cases are extremely private as well as intensely valuable to current disease diagnosis. Therefore, how to make full use of precious cases while not leaking out patients' privacy is a leading and promising work especially in future privacy-preserving intelligent medical period. In this paper, we investigate how t...

Forward Privacy Preservation in IoT enabled Healthcare Systems

 IoT-enabled smart healthcare systems has the characteristics of heterogeneous fusion, cross domain, collaborative autonomy, dynamic change and open interconnection, but they bring huge challenges in privacy issues. We proposed a scheme of forward privacy preserving for IoT-enabled healthcare systems, which mainly includes a searchable encryption sc...

Federated Tensor Decomposition-Based Feature Extraction Approach for Industrial IoT

 Data in modern industrial applications and data science presents multidimensional progressively, the dimension and the structural complexity of these data are becoming extremely high, which renders existing data analysis methods and machine learning algorithms inadequate to the extent. In addition, high-dimensional data in actual scenarios often sh...

Energy-efficient Edge Computing Framework for Decentralized Sensing in WSN-assisted IoT

 This paper addresses the problem of decentralized sensor selection in an energy-constrained wireless sensor network-based Internet-of-Things, for monitoring a spatio-temporally varying process. To do so, an adaptive edge computing framework and its variants are proposed which distributedly optimize a critical trade-off between sensing quality and r...

Deep-Green A Dispersed Energy-Efficiency Computing Paradigm for Green Industrial IoT

 The rapid development of the Industrial Internet of Things (IIoT) has led to the explosive growth of industrial control data. Cloud computing-based industrial control models cause vast energy consumption. Most existing solutions try to reduce the overall energy consumption by optimizing task scheduling and disregard how to reduce the load of comput...

Blockchain-based Privacy-Preserving Driver Monitoring for MaaS in the Vehicular IoT

 Driving behaviors are highly relevant to automotive statuses and on-board safety, which offer compelling shreds of evidence for mobility as a service (MaaS) providers to develop personalized rental prices and insurance products. However, the direct dissemination of driving behaviors may lead to violations of identity and location privacy. In this p...

Voltage Over-scaling-based Lightweight Authentication for IoT Security

  It is a challenging task to deploy lightweight security protocols in resource-constrained IoT applications. A hardware-oriented lightweight authentication protocol based on device signature generated during voltage over-scaling (VOS) was recently proposed to address this issue. VOS-based authentication employs the computation unit such as adder...

Optimal Radius for Enhanced Lifetime in IoT using Hybridization of Rider and Grey Wolf Optimization

 Connecting all devices through the Internet is now practical via the Internet of Things (IoT). IoT is characterized by using smart and self-configuring objects that can interact with each other via global network infrastructure. Clustering is the promising technique that effectively works on the enhancement of network lifetime. This paper intends t...

ITCN An Intelligent Trust Collaboration Network System in IoT

 Artificial Intelligence (AI) technology has been widely applied to Internet of Thing (IoT) and one of key applications is intelligence data collection from billions of IoT devices. However, many AI based data collection approaches lack security considerations leading to availability restricted. In this paper, an Intelligent Trust Collaboration Netw...

Contract-Theoretic Pricing for Security Deposits in Sharded Blockchain with Internet of Things (IoT)

 A sharded blockchain with the Proof-of-Stake (PoS) consensus protocol has advantages in increasing throughput and reducing energy consumption, enabling the resource-limited participants to manage transactions and in a decentralized way and obtain rewards at a lower cost, e.g., Internet-of-Things (IoT) users. However, the latest PoS (e.g., Casper) r...

An Integral Data Gathering Framework for Supervisory Control and Data Acquisition Systems in Green IoT

 In Green Internet of Things, energy consumption research is a hot topic. Our research focuses on Supervisory Control And Data Acquisition (SCADA) system, and it is a system consisting of a plurality of self-organized sensing networks. Live data gathering from numerous Sub-connected SCADA (S-SCADA) networks to make unified decisions based on collect...

A Privacy-Preserving Federated Learning for Multiparty Data Sharing in Social IoTs

 As 5G and mobile computing are growing rapidly, deep learning services in the Social Computing and Social Internet of Things (IoT) have enriched our lives over the past few years. Mobile devices and IoT devices with computing capabilities can join social computing anytime and anywhere. Federated learning allows for the full use of decentralized tra...

A 0.82 µW CIS-based Action Recognition SoC with Self-Adjustable Frame Resolution for Always-on IoT Devices

 An always-on video-based human action recognition (HAR) system on chip (SoC) integrated with a CMOS image sensor (CIS) is proposed for the Internet of Things (IoT) devices. The proposed SoC is the first always-on integrated circuit (IC) performing the full process of HAR in a single chip. To resolve large power consumption from vision sensor and co...

Low-complexity Data Collection Scheme for UAV sink nodes in Cellular IoT Networks

 Owing to the nature of battery-operated sensors, the residual energy of their battery should be considered when a sink node collects sensory data from them. If a sink attempts to collect data from a sensor that does not have sufficient residual energy to transmit data, the utilization of wireless communication resources may be degraded. However, re...

Energy-efficient Offloading for Mission-critical IoT Services Using EVT-embedded Intelligent Learning

 Mobile edge computing (MEC) is a promising technique to alleviate the energy limitation of Internet of things (IoT) devices, as it can offload local computing tasks to the edge server through a cellular network. By leveraging extreme value theory (EVT), this work proposes a priority-differentiated offloading strategy that takes into account the str...

Energy-Efficient and Reliable IoT Access without Radio Resource Reservation

 One of the major challenges for Internet-of-Things applications is that the existing cellular technologies do not support the uplink IoT traffic in an energy-efficient manner. There are two principal ways for serving the uplink IoT traffic: grant-based (i.e., scheduled) and grant-free (i.e., random access). Grant-based access provides fine-grained ...

Endogenous Trusted DRL-Based Service Function Chain Orchestration for IoT

 With the development of the Internet of Things, trust has become a limited factor in the integration of heterogeneous IoT networks. In this regard, we use the combination of blockchain technology and SDN/NFV to build a heterogeneous IoT network resource management model based on the consortium chain. In order to solve the efficiency problem caused ...

Enabling Finger-touch-based Mobile User Authentication via Physical Vibrations on IoT Devices

 This work enables mobile user authentication via finger inputs on ubiquitous surfaces leveraging low-cost physical vibration. The system we proposed extends finger-input authentication beyond touch screens to any solid surface for IoT devices (e.g., smart access systems and IoT appliances). Unlike passcode or biometrics-based solutions, it integrat...

Analysis of IoT-Based Load Altering Attacks Against Power Grids Using the Theory of Second-Order Dynamical Systems

 Recent research has shown that large-scale Internet of Things (IoT)-based load altering attacks can have a serious impact on power grid operations such as causing unsafe frequency excursions and destabilizing the grid’s control loops. In this work, we present an analytical framework to investigate the impact of IoT-based static/dynamic load alterin...

Resource Management for Latency-Sensitive IoT Applications with Satisfiability

 Satisfying the software requirements of emerging service-based Internet of Things (IoT) applications has become challenging for cloud-centric architectures, as applications demand fast response times and availability of computational resources closer to end-users. As such, meeting application demands must occur at runtime, facing uncertainty and in...

Probeware for the Modern Era IoT Dataflow System Design for Secondary Classrooms

 Sensor systems have the potential to make abstract science phenomena concrete for K–12 students. Internet of Things (IoT) sensor systems provide a variety of benefits for modern classrooms, creating the opportunity for global data production, orienting learners to the opportunities and drawbacks of distributed sensor and control systems, and reduci...

IoT Innovations and Forensic Engineering in the Digital Age

 Internet-of-Things (IoT) innovations produce interesting opportunities, impact ethical and social aspects toward human society, and influence operational and technical solutions toward the structural systems. This article discusses the impact of some relevant characteristics of the IoT innovations. Significant debated aspects are the product discon...

Fog-enabled Joint Computation, Communication and Caching Resource Sharing for Energy-Efficient IoT Data Stream Processing

 Fog/edge computing has been recently regarded as a promising approach for supporting emerging mission-critical Internet of Things (IoT) applications on capacity and battery constrained devices. By harvesting and collaborating a massive crowd of devices in close proximity for computation, communication and caching resource sharing (i.e., 3C resource...

EIHDP Edge-Intelligent Hierarchical Dynamic Pricing Based on Cloud-Edge-Client Collaboration for IoT Systems

 Nowadays, IoT systems can better satisfy the service requirements of users with effectively utilizing edge computing resources. Designing an appropriate pricing scheme is critical for users to obtain the optimal computing resources at a reasonable price and for service providers to maximize profits. This problem is complicated with incomplete infor...

AirSync Time Synchronization for Large-scale IoT Networks Using Aircraft Signals

 The prosperity of Internet of Things (IoT) brings forth the deployment of large-scale sensing systems such as smart cities. The distributed devices upload their local sensing data to the cloud and collaborate to fulfill the large-area tasks such as pollutant diffusion analysis and target tracking. To accomplish the collaboration, time synchronizati...

Resource Allocation in Uplink NOMA-IoT Networks A Reinforcement-Learning Approach

 Non-orthogonal multiple access (NOMA) exploits the potential of power domain to enhance the connectivity for Internet of Things (IoT). Due to time-varying communication channels, dynamic user clustering is a promising method to increase the throughput of NOMA-IoT networks. This paper develops an intelligent resource allocation scheme for uplink NOM...

Leveraging Graph Convolutional-LSTM for Energy Efficient Caching in Blockchain-based Green IoT

 Nowadays, adopting blockchain technology to Internet of Things has become a trend and it is important to minimize energy consumption while providing a high quality of service (QoS) in Blockchain-based IoT networks. Pre-caching popular and fresh IoT content avoids activating sensors frequently, thus effectively reducing network energy consumption. H...

Harvesting Devices’ Heterogeneous Energy Profiles and QoS Requirements in IoT WPT-NOMA vs BAC-NOMA

 The next generation Internet of Things (IoT) exhibits a unique feature that IoT devices have different energy profiles and quality of service (QoS) requirements. In this paper, two energy and spectrally efficient transmission strategies, namely wireless power transfer assisted non-orthogonal multiple access (WPT-NOMA) and backscatter communication ...

CrypSH A Novel IoT Data Protection Scheme Based on BGN Cryptosystem

 The Internet of Things (IoT) is an emerging paradigm and has penetrated deeply into our daily life. Due to the seamless connections of the IoT devices with the physical world through the Internet, the IoT applications use the cloud to store and provide ubiquitous access to collected data. Sharing of data with third party services and other users in...

Caching Popular Transient IoT Contents in an SDN-based Edge Infrastructure

 With more than 75 billions of objects connected by 2025, Internet of Things (IoT) is the catalyst for the digital revolution, contributing to the generation of big amounts of (transient) data, which calls into question the storage and processing performance of the conventional cloud. Moving storage resources at the edge can reduce the data retrieva...

Block AIM A Neural Network-Based Intelligent Middleware For Large-Scale IoT Data Placement Decisions

 Current Internet of Things (IoT) infrastructures rely on cloud storage however, relying on a single cloud provider puts limitations on the IoT applications and Service Level Agreement (SLA) requirements. Recently, multiple decentralized storage solutions (e.g., based on blockchains) have entered the market with distinct architecture, Quality of Ser...

XpulpNN Enabling Energy Efficient and Flexible Inference of Quantized Neural Networks on RISC-V based IoT End Nodes

 Strongly quantized fixed-point arithmetic is now considered a well-established solution to deploy Convolutional Neural Networks (CNNs) on limited-memory low-power IoT endnodes. Such a trend is challenging due to the lack of support for low bitwidth fixed-point instructions in the Instruction Set Architecture (ISA) of state-of-the-art embedded Micro...

RegPrice Region-Based Pricing Scheme for Provisioning Safety-as-a-Service in IoT Applications

 In this paper, we propose a region-based pricing scheme, named as RegPrice, for provisioning safety-related decisions dynamically to the end-users. Typically, heterogeneous type of sensor nodes are present in the device layer of Safe-aaS. Considering the case of safety in road transportation, we compute the fixed and variable costs incurred in proc...

Energy-aware Scheduling of Streaming Applications on Edge-devices in IoT based Healthcare

 The reliance on Network-on-Chip (NoC)-based Multiprocessor Systems-on-Chips (MPSoCs) is proliferating in modern embedded systems to satisfy the higher performance requirement of multimedia streaming applications. Task level coarse grained software pipeling also called re-timing when combined with Dynamic Voltage and Frequency Scaling (DVFS) has sho...

DORY Automatic End-to-End Deployment of Real-World DNNs on Low-Cost IoT MCUs

 The deployment of Deep Neural Networks (DNNs) on end-nodes at the extreme edge of the Internet-of-Things is a critical enabler to support pervasive Deep Learning-enhanced applications. Low-Cost MCU-based end-nodes have limited on-chip memory and often replace caches with scratchpads, to reduce area overheads and increase energy efficiency – requiri...

Deep Reinforcement Learning Based Resource Management for DNN Inference in Industrial IoT

 Performing deep neural network (DNN) inference in real time requires excessive network resources, which poses a great challenge to the resource-limited industrial Internet of things (IIoT) networks. To address the challenge, in this paper, we introduce an end-edge-cloud orchestration architecture, in which the inference task assignment and DNN mode...

A secure barrier coverage scheduling framework for WSN-based IoT applications

 Barrier coverage scheduling is an energy conservation scheme in which a subset of sensor nodes with overlapped sensing area (also called barrier) is activated to meet the key Quality of Service (QoS) requirements such as energy-efficiency, coverage, and connectivity. However, sudden and unexpected node failures in a barrier due to security attacks ...

Timely Detection and Mitigation of Stealthy DDoS Attacks via IoT Networks

 Internet of Things (IoT) networks consist of sensors, actuators, mobile and wearable devices that can connect to the Internet. With billions of such devices already in the market which have significant vulnerabilities, there is a dangerous threat to the Internet services and also some cyber-physical systems that are also connected to the Internet. ...

The Use of Blockchain to Support Distributed AI Implementation in IoT Systems

 This paper presents a distributed and decentralized architecture for the implementation of Distributed Artificial Intelligence (DAI) using hardware platforms provided by the Internet of Things (IoT). A trained DAI system has been implemented over the IoT, where each IoT device acts as one or more of the neurons within the DAI layers. This is accomp...

Single-Layer, Unidirectional, Broadside-Radiating Planar Quadrupole Antenna for 5G IoT Applications

 In this paper, an innovative quadrupole-based broadside-radiating unidirectional antenna is designed at 28.475 GHz for 5G IoT applications. The planar antenna is based on a single-layer technology and realized on a flexible substrate to facilitate conformal applications. It consists of a coax-fed driven dipole and two quadrupolar near-field resonan...

Privacy-Preserving Transactive Energy Management for IoT-aided Smart Homes via Blockchain

 With the booming of smart grid, The ubiquitously deployed smart meters constitutes an energy internet of things. This paper develops a novel blockchain-based transactive energy management system for IoT-aided smart homes. We consider a holistic set of options for smart homes to participate in transactive energy. Smart homes can interact with the gr...

Analysis and Optimization of Massive Access to the IoT Relying on Multi-Pair Two-Way Massive MIMO Relay Systems

 We investigate massive access in the Internet-ofThings (IoT) relying on multi-pair two-way amplify-and-forward (AF) relay systems using massive multiple-input multiple-output (MIMO). We utilize the approximate message passing (AMP) algorithm for joint device activity detection and channel estimation. Furthermore, we analyze the achievable rates for...

An Inductorless Wideband Gm-boosted Balun LNA with nMOS-pMOS Configuration and Capacitively Coupled Loads for sub-GHz IoT Applications

 This brief presents an inductorless gm-boosted wideband balun low noise amplifier (LNA) for low power sub-GHz IoT applications. The proposed common source (CS) -common gate (CG) based gm-boosted balun LNA uses nMOS-pMOS configuration for doubling the transconductance and gain efficiency. Loads of CS and CG stages are capacitively coupled to remove ...

Predictive Estimation of Optimal Signal Strength from Drones over IoT Frameworks in Smart Cities

 The integration of drones, IoT, and AI domains can produce exceptional solutions to today's complex problems in smart cities. A drone, which essentially is a data-gathering robot, can access geographical areas that are difficult, unsafe, or even impossible for humans to reach. In this paper, an intelligent technique is proposed to predict the signa...

Energy-Efficient Trajectory Optimization for UAV-Assisted IoT Networks

 In this paper, we propose and study an energy-efficient trajectory optimization scheme for unmanned aerial vehicle (UAV) assisted Internet of Things (IoT) networks. In such networks, a single UAV is powered by both solar energy and charging stations (CSs), resulting in sustainable communication services, while avoiding energy outage. In particular,...

Embedding Blockchain Technology into IoT for Security A Survey

 In recent years, the Internet of Things (IoT) has made great progress. The interconnection between IoT and the Internet enables real-time information processing and transaction implementation through heterogeneous intelligent devices. But the security, the privacy, and the reliability of IoT are key challenges that limit its development. The featur...

AFED-EF An Energy-efficient VM Allocation Algorithm for IoT Applications in a Cloud Data Center

 Cloud Data Centers (CDCs) have become a vital computing infrastructure for enterprises. However, CDCs consume substantial energy due to the increased demand for computing power, especially for the Internet of Things (IoT) applications. Although a great deal of research in green resource allocation algorithms have been proposed to reduce the energy ...

A Model for Verification and Validation of Law Compliance of Smart-Contracts in IoT Environment

 The interest of Industry 4.0 in Smart Contracts and blockchain technologies is growing up day by day. Smart Contracts have enabled new kinds of interactions whereby contractors can even fully automate processes they agree on. This technology is really appealing in Internet of Things (IoT) domain because smart devices generate events for software ag...

3-D-SIS A 3-D-Social Identifier Structure for Collaborative Edge Computing Based Social IoT

 The social Internet of Things (IoT) (SIoT) helps to enable an autonomous interaction between the two architectures that have already been established: social networks and the IoT. SIoT also integrates the concepts of social networking and IoT into collaborative edge computing (CEC), the so-called CEC-based SIoT architecture. In closer proximity, Io...

Performance Analysis of IoT-based Overlay Satellite-Terrestrial Networks under the Interference

 In this paper, we consider an overlay satellite-terrestrial network (OSTN) where an opportunistically selected terrestrial internet-of-things (IoT) network assists the primary satellite communications as well as accesses the spectrum for its own communications under hybrid interference received from extra-terrestrial sources (ETSs) and terrestrial ...

Multi-Perspective Trust Management Framework for Crowdsourced IoT Services

 We propose a novel generic trust management framework for crowdsourced IoT services. The framework exploits a multi-perspective trust model that captures the inherent characteristics of crowdsourced IoT services. Each perspective is defined by a set of attributes that contribute to the perspective’s influence on trust. The attributes are fed into a...

Energy-Efficient MAC for Cellular IoT State-of-the-Art, Challenges, and Standardization

 In the modern world, the connectivity-as-we-go model is gaining popularity. Internet-of-Things (IoT) envisions a future in which human beings communicate with each other and with devices that have identities and virtual personalities, as well as sensing, processing, and networking capabilities, which will allow the developing of smart environments ...

Elastic and Predictive Allocation of Computing Tasks in Energy Harvesting IoT Edge Networks

  We consider a distributed IoT edge network whose end nodes generate computation jobs that can be processed locally or be offloaded, in full or in part, to other IoT nodes and/or edge servers having the necessary computation and energy resources. That is, jobs can either be partitioned and executed at multiple nodes (including the originating no...

BEHAVE Behavior-Aware, Intelligent, and Fair Resource Management for Heterogeneous Edge-IoT Systems

 Data-driven approaches are envisioned to build future Edge-IoT systems that satisfy IoT devices demands for edge resources. However, significant challenges and technical barriers exist which complicate resource management of such systems. IoT devices can demonstrate a wide range of behaviors in the devices resource demand that are extremely difficu...

AFED-EF An Energy-efficient VM Allocation Algorithm for IoT Applications in a Cloud Data Center

 Cloud Data Centers (CDCs) have become a vital computing infrastructure for enterprises. However, CDCs consume substantial energy due to the increased demand for computing power, especially for the Internet of Things (IoT) applications. Although a great deal of research in green resource allocation algorithms have been proposed to reduce the energy ...

EIHDP Edge-Intelligent Hierarchical Dynamic Pricing Based on Cloud-Edge-Client Collaboration for IoT Systems

 Nowadays, IoT systems can better satisfy the service requirements of users with effectively utilizing edge computing resources. Designing an appropriate pricing scheme is critical for users to obtain the optimal computing resources at a reasonable price and for service providers to maximize profits. This problem is complicated with incomplete infor...

IoT BASED SMART FARMING USING MACHINE LEARNING

 The deficiency of water all throughout the planet compel us to limit the use of water. Over 75% of new water assets were utilizing for water system reason so productive use of water in water system framework with cutting edge strategy is required. This paper presents a cutting-edge innovation based savvy framework to anticipate the water system nec...

SMART IRRIGATION SYSTEM FOR AGRICULTURE USING IOT

  The IoT allows objects to be sensed or controlled remotely across existinginfrastructure, creating opportunities for more direct integration of the physical world into computer-based systems, and resulting in improved efficiency, accuracy and economic benefit in addition to reduced human intervention. The Internet of Things (IoT) i...

PATIENT HEALTH MONITORING SYSTEM USING IOT

 The Internet of Medical Things (IoMT) is the collection of medical devices and applications that connect to healthcare IT systems through online computer networks. Medical devices equipped with Wi-Fi allow the communication that is the basis of IoMT. IoMT devices link to cloud platforms such as Things Speak, Amazon Web Services, on which captured d...

AUTOMATIC BUS SEATS COUNT AND RF TRACKING USING IOT

 This project proposes a supervisory system based on WIFI technology, to improve the operation efficiency of bus monitoring system and realize intelligent transportation system. Using IR sensors to know the available seats in the bus. RF TRANSCEIVER is used to track the object(ie.bus) in certain regions. RF is used to convey the informations wh...

IoT based Fingerprint Voting System

 Biometric Fingerprint systems are used in the Voting machine for voter confirmation. fingerprint voting machine is designed where there is no need for the user to carry his ID which contains his essential details, so that the controller fetches the data from the fingerprint module and then compares it with already registered fingerprints of the vot...

Heart Attack Detection and Heart Rate Monitoring Using IoT

  This paper is intended to monitor Heart beat with android application which is used to measure the heart beat of different persons. It is built using Android Studio. It may also include the different modules based on the software specification, system requirement, hardware requirement and disk space....

Water Irrigation system using pic and IOT

 As water supply is becoming scarce in today’s world there is an urgency of adopting smart ways of irrigation. The project describes how irrigation can be handled smartly using IOT. This project aims at saving time and avoiding problems like constant vigilance. It also helps in conserving water by automatically providing w...

CLOUD BASED FOREST FIRE ALERT SYSTEM USING IOT

 In the present arena, wildlife and forest departments are facing the problem of movement of animals from forest area to residential area. The number of trees has reduced drastically from the forest that creates an unhealthy environment for animals to survive in the forest. It has been found in a survey that 80% losses are caused due to fire. This c...

Weather monitoring Using Iot temperature and Humidity

 The system proposed in this paper is an advanced solution for monitoring the weather conditions at a particular place and make the information visible anywhere in the world. The technology behind this is Internet of Things (IoT), which is an advanced and efficient solution for connecting the things to the internet and to connect the entire world of...

SECURITY GUARD SLEEPING ALERTING SYSTEM UISNG IOT

 The workload of the static security guards has doubled due to the Covid-19 outbreak. In addition to their regular duties, they undertake some additional tasks to evaluate each individual’s body temperature and welcome them with a hand sanitizer. In this scenario, their situational awareness is hugely desirable to perform these activities for the en...

LayerChain: A Hierarchical Edge-Cloud Block chain for Large-Scale Low-Delay IIoT Applications

 The combination of pervasive edge computing and block chain technologies opens up significant possibilities for Industrial Internet of Things (IIoT) applications, but there are several critical limitations regarding efficient storage and rapid response for large-scale low-delay IIoT scenarios. To address these limitations, we propose a hierarchical...

Edgence: A Block chain-Enabled Edge Computing Platform for Intelligent IoT-Based dApps

 Nowadays scalable IoT management is a bottleneck of IoT development due to the geographically dispersed distribution, fragmented ownerships, and ever growing population of IoT devices. To intelligently manage massive decentralized applications (dApps) in IoT use cases, Edgence (EDGe + intelligence) is proposed to use edge clouds to access IoT devic...

Edge-Cloud Computing for IoT Data Analytics: Embedding Intelligence in the Edge with Deep Learning

 Rapid growth in numbers of connected devices including sensors, mobile, wearable, and other Internet of Things (IoT) devices, is creating an explosion of data that are moving across the network. To carry out machine learning (ML), IoT data are typically transferred to the cloud or another centralized system for storage and processing; however, this...

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Mail us : info@nibode.com