Continuous communication and information technology advancements facilitate the modernization of the conventional energy grid into an integrated platform. Internet-of-Things (IoT) incorporates power systems, particularly smart grid features and the delivery of new services from the utility side to the end user over a two-way communication channel.
...
|
Electric Power Systems (EPSs) are among the most critical infrastructures of any society, since they significantly impact other infrastructures. Recently, there has been a trend toward implementing modern technologies, such as Industrial Internet of Things (IIoT), in EPSs to enhance their real-time monitoring, control, situational awareness, and in...
|
Design an autonomous water surface cleaning robot, to automate the task of cleaning water surfaces. These robots are particularly useful in environmental protection efforts, as they can perform high-efficiency cleaning without human intervention. It can be autonomous or remote-controlled. The robot needs to be lightweight and flexible for easy tran...
|
Enhancing Patient Care with Advanced Ventilation System intends to revolutionize mechanical ventilation by creating an automated ventilator that uses an Ambu bag and has complete monitoring features.
The system precisely sets and controls respiratory parameters such as tidal volume, respiratory rate, minute ventilation, peak and plateau pressures...
|
To help consumers enjoy healthy food, technology investigation for food freshness sensing is conducted. In this study meat is selected as the detection target based on a consumer survey CO2, TVOC, and MQ135 are investigated.
The results showed that CO2 and TVOC could be a used for food freshness sensing in a closed space such as box. In today's w...
|
Background: As per the census 2011, Disability is more common in elderly people. One of the major reasons for disability among the elderly people is falls. Every year, one-third of community-dwelling older adults (adults aged 65 and older) experience a fall.
Falls, defined as “unexpected event[s] in which the participant comes to rest on the grou...
|
Background: Disaster response agencies often stuggle to gather timely and specific information about emergencies from various sources. Social media platforms serve as a valuable repository of such data, but manually monitoring and sorting through the vast amount of information is inefficient and resource-intensive.
Description: There is a pressin...
|
Background: Glacial Lake Outburst Floods (GLOFs) occur when the dam containing a glacial lake fails, releasing large volumes of water suddenly and causing catastrophic downstream flooding. Climate change is increasing the number and size of glacial lakes, heightening the risk of GLOFs. Curent monitoring and prediction methods can be improved with a...
|
Background: Yoga has gained global recognition for its numerous health benefits, including physical fitness, mental well-being, and stress reduction. As part of India's ancient heritage, yoga is a key component of the AYUSH (Ayurveda, Yoga & Naturopathy, Unani, Siddha, and Homoeopathy) systems of medicine, promoting holistic health practices.
In ...
|
Background: As per the census 2011, Disability is more common in elderly people. One of the major reasons for disability among the elderly people is falls. Every year, one-third of community-dwelling older adults (adults aged 65 and older) experience a fall.
Falls, defined as “unexpected event[s] in which the participant comes to rest on the grou...
|
This paper presents an IoT based fall detection monitoring and alarm system for the elderly using 3-axis Accelerometer. In elderly, injuries induced by fall, becomes fatal sometimes, if timely medical interventions do not take place.
Therefore, we aim to design a system to detect the fall and alert the medical experts about the incidents of dis...
|
Background: Water scarcity is a major challenge in agriculture, leading to inefficient water use and reduced crop yields. Traditional irrigation methods often result in overuse or underuse of water. Description: Develop a smart irrigation system that utilizes sensors and IoT technology to monitor soil moisture levels and weather conditions.
This ...
|
Background: Water scarcity is a major challenge in agriculture, leading to inefficient water use and reduced crop yields. Traditional irrigation methods often result in overuse or underuse of water. Description: Develop a smart irrigation system that utilizes sensors and IoT technology to monitor soil moisture levels and weather conditions.
This ...
|
Background: Himachal Pradesh, a northern state in India, is renowned for its apple production, contributing significantly to the local economy and livelihoods. With an annual apple production of approximately 600,000 metric tons, the region's apple orchards face challenges related to tree health monitoring, nutrient management, pest and disease con...
|
Background: lndia has emerged as leading milk producer country in the world, however productivity of dairy animals is very low. To improve the productivity of animals a major focus area is to breed these animals using semen from high genetic merit bulls through Artificial lnsemination (Al).
Al enables farmers to access the best bull (male) geneti...
|
The air quality in cities is degrading as a result of a complex interaction between natural and artificial environmental conditions.
With the increase in urbanization and industrialization and lack of control on emissions and use of catalytic converters, a great amount of particulate and toxic gases are produced.
The objective of this project i...
|
The on-load tap changing (OLTC) regulators have been widely used in various industry. The main function of OLTC is to change the turns of transformer winding, so that the voltage variations are limited without interrupting the secondary current. In other word the voltage can be regulated with the changer without any supply interruption using ANN co...
|
The on-load tap changing (OLTC) regulators have been widely used in various industry. The main function of OLTC is to change the turns of transformer winding, so that the voltage variations are limited without interrupting the secondary current. In other word the voltage can be regulated with the changer without any supply interruption using ANN co...
|
The project work aims at designing a student attendance system which could effectively manage attendance of students of the department of Computer Science and Engineering at Jatiya Kabi Kazi Nazrul Islam University. In this project work, attendance is marked after student’s biometric identification.
For student identification, a fingerprint recog...
|
Face recognition based smart attendance system using IoT is a tool for recognizing the students face while taking attendance by using face biometrics based on monitor camera image capturing.
In our face recognition based smart attendance project, a raspberry pi system will be able to find and recognize human faces fast and precisely in images. ...
|
About 33,000 people die because the ambulance cannot reach them in time. It is not necessary that when you call an ambulance, the nearest ambulance will reach you.
The paper describe a model to track the nearest free ambulance in the area using global positioning system and bring it to the person in distress.
The GPS device continuously mov...
|
Hazards from landslides are everywhere. Landslides are more likely to occur on steeply sloped hillsides. For several case studies throughout the globe, researchers have performed landslide prediction, detection, and monitoring.
The major goal of researching landslide detection is to stop natural disasters by seeing their early movement. This wi...
|
IoT-enabled smart healthcare systems has the characteristics of heterogeneous fusion, cross domain, collaborative autonomy, dynamic change and open interconnection, but they bring huge challenges in privacy issues. We proposed a scheme of forward privacy preserving for IoT-enabled healthcare systems, which mainly includes a searchable encryptio...
|
Epilepsy is a chronic neurological disorder with several different types of seizures, some of them characterized by involuntary recurrent convulsions, which have a great impact on the everyday life of the patients. Several solutions have been proposed in the literature to detect this type of seizures and to monitor the patient; however, these a...
|
Internet-of-Things (IoT) devices have a strict necessity for power consumption to achieve the expected battery life. Therefore, measuring and optimizing the energy consumption of IoT nodes are essential.
IoT nodes feature extreme current consumption range over 100 dB between their operating modes. The main focus of this article is to design and...
|
The need for efficient fire detection systems is highlighted by the substantial threats that forest fires pose to both human lives and the ecosystem. Limited coverage, high false alarm rates, and delays in signal transmission are just a few of the problems traditional methods for detecting forest fires sometimes encounter.
This research stu...
|
In India economy is mainly based on agriculture still we are not able to make it profitable and make sustainable use of our land resources. Main reason is lack of knowledge regarding soil. There are many types of soil present and each type of soil has different characteristics. So it is necessary to test soil characteristics. There are different to...
|
Quantum computing is envisaged as an evolving paradigm for solving computationally complex optimization problems with a large-number factorization and exhaustive search.Recently, there has been a proliferating growth of the size of multi-dimensional datasets, the input-output space dimensionality, and data structures. Hence, the conventional machin...
|
Machine learning (ML) algorithms are nowadays widely adopted in different contexts to perform autonomous decisions and predictions. Due to the high volume of data shared in the recent years, ML algorithms are more accurate and reliable since training and testing phases are more precise. An important concept to analyze when defining ML algorithms co...
|
Drowsiness in driving causes the major road accidents. Now a day’s drowsiness due to drunken driving is increasing. If driver is found to be drowsiness in eyes more than 5 secs, then the eye blink sensor senses the blink rate. If the eyes are found to be closed, then the speed of the car slows down. In our proposed system, along with drowsiness, al...
|
The fault occurred in transmission line is very much dangerous for the locality. In HV and EHV transmission line there are less fault occurrence but in locality the fault occurrence is more as compared to outer transmission line. In our prototype we design a model which is to be detect the fault in transmission line by comparing the voltage signal ...
|
The increasing numbers of the private car cause the road traffic congestion. That is becoming important problems in the big cities. Another solution to reduce the traffic jam is developing intelligent transportation system such as intelligent traffic light system. However, the solution of such problems is one of the mandatory concern. In recent yea...
|
In modern world, the IoT is at its peak. The world is becoming smarter, the home automation is emerging. Smart Door control system is a latest technology in home automation. The main purpose of smart Door technology is to provide a complete security to the door, ease and comfort for users. The aim of this paper is to enlarge the door automation tec...
|
Cables are put underground to stay away from pointless obstruction. These force cables convey electrical force and when these cables are put underground it is extremely hard to decide the specific area of the deficiency happened. There are numerous elements or purposes behind a deficiency to happen as, for example, burrowing, tremor, development wo...
|
Air pollution is a growing issue these days. It is necessary to monitor air quality and keep it under control for a better future and healthy living for all. Here we propose an air quality monitoring system that allows us to monitor and check live air quality in a particular area through IOT. System uses air sensors to sense presence of harmful gas...
|
Environmental monitoring is must for all industries as its conditions majorly affect our prosperity, solace and efficiency. Because it is such an essential aspect that have an immense effect on health of operating personnel & other parameters like fire, smoke, dust and intruder detection along with weather forecasting in industries. But the systems...
|
The Internet of Things is most useful in communicating devices (things) with each other by using the internet nowadays. Most of sensor device is connected with IoT is more popular in recent times. In this paper a model based in IoT is proposed with aim to prevent accidents due to drink-driving and drowsiness of driver. It includes analysis of alcoh...
|
There is something that we still don’t see: food wasted by restaurants, shops or industries. There is also something we can see: food wasted by ourselves. This is the range focus of communities, through the management of wasted products of catering firms. Now a days people are aware of importance of food but there are no platform to share informati...
|
Monitoring various parameters of the patient using internet of things. In the patient monitoring system based on Internet of things project, the real-time parameters of patient’s health are sent to cloud using Internet connectivity. These parameters are sent to a remote Internet location so that user can view these details from anywhere in the worl...
|
Eventually a day's a consequence of a general temperature alteration and atmosphere changes there are attempting conditions in field of coal mine. To decrease the cost and improve the productivity close by thing quality the atomization in the field of coal mine is irrefutably essential, which will in addition reduce the mine laborers endeavors. Thi...
|
Medical Surveillance Solutions are the most important in the brief developing country populace enhances demands for caretaking. Covid-19 is as a substitute contagious it is very important to quarantine covid-19 humans but at the equal time medical examiners need to check fitness of covid-19 sufferers moreover. With the boosting kind of instances it...
|
This paper presents an effective approach for detecting abandoned luggage in surveillance videos. We combine short- and long-term background models to extract foreground objects, where each pixel in an input image is classified as a 2-bit code. Subsequently, we introduce a framework to identify static foreground regions based on the temporal transi...
|
Mobile crowd-sensing (MCS) has appeared as a prospective solution for large-scale data collection, leveraging built-in sensors and social applications in mobile devices that enables a variety of Internet of Things (IoT) services. However, the human involvement in MCS results in a high possibility for unintentionally contributing corrupted and falsi...
|
Covid 19 Patients are facing a many problem of daily checkup like travelling, waiting in the queue. so we are developing this project. In this system a patient will be carrying hardware having sensors and android phone application, the sensors will sense the body temperature, Blood Pressure, Respiration rate and heart pulse rate of patient and thes...
|
Covid 19 Patients are facing a many problem of daily checkup like travelling, waiting in the queue. so we are developing this project. In this system a patient will be carrying hardware having sensors and android phone application, the sensors will sense the body temperature, Blood Pressure, Respiration rate and heart pulse rate of patient and thes...
|
The primary objective is to detect the vitals of the body by using non invasive measures. It will filled with multiple sensors which will measure body temperature, heart rate, Accelerometer to health condition and upload in database. When the device senses a level of heart rate , it will alert the player who will be able to take measures to prevent...
|
Epilepsy is a type of neurological disorder that causes abnormal brain activities and creates epileptic seizures.Traditionally epileptic seizure prediction is realized with a visual examination of Electroencephalogram (EEG) signals. But this technique needs a long time EEG monitoring. So, the automatic epileptic seizures prediction schemes become a...
|
Epilepsy is a chronic neurological disorder with several different types of seizures, some of them characterized by involuntary recurrent convulsions, which have a great impact on the everyday life of the patients. Several solutions have been proposed in the literature to detect this type of seizures and to monitor the patient; however, these appro...
|
About 33,000 people die because the ambulance cannot reach them in time. It is not necessary that when you call an ambulance, the nearest ambulance will reach you. The paper describe a model to track the nearest free ambulance in the area using global positioning system and bring it to the person in distress. The GPS device continuously moves with ...
|
The dedicated short-range communication (DSRC) is an emerging technique to push the intelligent transportation system into our daily life. The DSRC standards generally adopt FM0 and Manchester codes to reach dcbalance, enhancing the signal reliability. Nevertheless, the coding-diversity between the FM0 and Manchester codes seriously limits the pote...
|
Stress is one of the factors that affect human health in many aspects. It is considered as one of the culprits in increasing the risk of getting sick that could probably lead to critical physical or mental illnesses. Stress can be experienced everywhere and in different circumstances. Hence, stress should be controlled and managed by monitoring its...
|
In the downtowns, underground cables are used rather than of overhead transmission lines. It is hard to go through the specific spot of the shortcomings. As India become prominent as a progression country, civilized field is too boosting every day. The underground lines are beat under the same circumstances its uses is additionally growing a result...
|
Mobility for blind and elderly people is a problem as they have to face many difficulties in their day to day life. Most commonly, stick is use by blind and elderly people as a support for their body to stand and walk. The most common disadvantage of walking stick is user should have to be in close proximity of obstacle so that he can sense the loc...
|
Wireless sensor networks (WSN) are integral part of Industrial Internet of Things (IIOT), the said networks comprise of elements possessing low power processors. WSNs are used for gathering data in the monitoring region, using which vital information about the sensor and the monitoring region can be attained (placement of the sensor node is critica...
|
Epilepsy is a chronic neurological disorder with several different types of seizures, some of them characterized by involuntary recurrent convulsions, which have a great impact on the everyday life of the patients. Several solutions have been proposed in the literature to detect this type of seizures and to monitor the patient; however, these appro...
|
In the most of the developing countries, the effort of collecting electricity utility meter reading and detecting illegal usage of electricity is a very difficult and time consuming task which requires a lot of human resources. Energy meter reading and monitoring system using Internet of Things (IoT) present an efficient and cost-effective way to t...
|
With population growth, the demand for vehicles has increased tremendously, which has created an alarming situation in terms of traffic hazards and road accidents. The road accidents percentage is growing exponentially and so are the fatalities caused due to accidents. However, the primary cause of the increased rate of fatalities is due to the del...
|
In recent years, EEG brainwave-reading device is used more and more in various academic fields and real life. Analyzing brainwave from drivers, we divide the brainwave data into light fatigue, medium fatigue and severe fatigue. Once the driver's Low-a <;0.7, High-a <;0.5, ?>0.5, or attention and meditation less than 40 degrees, then the system is d...
|
This paper deals with a novel sensor network system designed for gathering disaster information including physical environmental information and potential signals of survivers. The system consists of numerous sensor probes and a central database server. The sensor probes organize their own ZigBee network, which is managed by the central database se...
|
Health monitoring systems have rapidly evolved recently, and smart systems have been proposed to monitor patient current health conditions, in our proposed and implemented system, we focus on monitoring the patient’s blood pressure, and his body temperature. Based on last decade statistics of medical records, death rates due to hypertensive heart d...
|
This paper presents a smart home management system in which a community broker role is used for integrating community services, thereby reducing the workload of community management staff, providing electronic information services, and deepening the community’s integration with the surrounding environment. At the home end, a home intranet was creat...
|
This paper presents a low cost and flexible home control and monitoring system using an embedded micro-web server, with IP connectivity for accessing and controlling devices and appliances remotely using Android based Smart phone app. The proposed system does not require a dedicated server PCwith respect to similar systems and offer...
|
In today’s world Automatic system is ubiquitous communication over manual system. The IoT can assist in integration of communications, control, and information processing across various systems. The Internet of Things allows objects to be sensed and controlled remotely. Wireless Home Automation system(WHAS) using I...
|
Now a day, technology rapidly growth, but also people do not survive his/her life after road accident because there is no emergency facilities available in our country. So we design a technology which facilitates the emergency facilities. This project inform about an accident that is occurred to vehicle to rescue team and the family members of the ...
|
The concept of a Smart City highlights the need to enhance quality, interconnection and performance of various urban services with the use of information and communication technologies (ICT). Smart City technologies promote cloud-based and Internet of Things (IoT) based services in which real-world user interfaces use smart phones, sensors and RFID...
|
Wireless Sensor Networks (WSNs) have been employed in a wide range of applications due to the low-cost and ease of installation features. One of the applications is in the road safety and highways, in a wide range of scenarios. In this paper, an IoT-based system for collision detection on guardrails is presented. The developed system implements an ...
|
With new technological advancement in controlled-environment agriculture systems, the level of productivity has significantly increased. Agriculture systems are now more capable, reliable, and provide enhanced productivity. An agriculture environment can range from a single plant in a house, a backyard garden, a small farm, to a large farming facil...
|
Recently, the frequent coal mine safety accidents have caused serious casualties and huge economic losses. It is urgent for the global mining industry to increase operational efficiency and improve overall mining safety. This paper proposes a lightweight mashup middleware to achieve remote monitoring and control automation of underground physical s...
|
Sudden Infant Death Syndrome (SIDS) is one of the major causes of death among infants during their sleep. To increase the safety of the infants, we matched different emergent research fields for the development of Baby Night Watch. This Smart Wearable System (SWS), developed under the context of the European Texas Instruments Innovation Challenge (...
|
A home automation system for smart grid is designed and implemented. The system monitors temperature and humidity and controls air conditioning, lights and appliances. The Message Queuing Telemetry Transport protocol and Djanjo web framework are used. A graphical user interface is developed to enable the user to control the devices remotely via a w...
|
Nowadays, home appliances manufacturers are increasingly relying on wireless sensor network and single chip embedded technologies to build smart environment. Many existing systems are already in the market, however, they were designed without envisioning the need of residents with special needs. This work presents a framework that enables the integ...
|
Internet of Things (IoT) based smart devices are the core elements for any smart environment. The sensors and actuators make the life easier when they are connected to one another and to the Internet. The Smart city and ‘Swach Bharath Abhiyan’ projects introduced by the Government of India tried to promote clean and hygienic Environment. The consta...
|
Agriculture is the backbone of Indian economy. Due to global warming and climate change traditional farming in the regular months have been distorted and crops have been ruined is the most common phrase seen today. This not only gives economic losses but also the main reason for farmer sucide. Now agriculture needs support, time has come for techno...
|
Agriculture is the backbone of Indian economy. Due to global warming and climate change traditional farming in the regular months have been distorted and crops have been ruined is the most common phrase seen today. This not only gives economic losses but also the main reason for farmer sucide. Now agriculture needs support, time has come for techno...
|
In modern days, people are getting too busy in their works but still they need to spend time in shopping malls. In Shopping malls, customers face a difficulty to follow a queue for the process of billing, which takes a long time under huge crowd. Customer thought that, to avoid the standing time in the billing section at shopping malls. To overcome...
|
With the increase in the consumption of energy and population, there is a great need to conserve energy in every way possible. The inability to access and control the appliances from remote locations is one of the major reasons for energy wastage in Ghana. This project presents the development and implementation of a Global System for Mobile Commun...
|
Parenting is not an easy task. Good parenting requires the parent to quickly respond to the needs of their child. Constant monitoring of the child also becomes a necessity, especially up to an age of 18 months. In this work, a mobile robotic device has been designed and developed. This device can help a parent to keep track of their baby and its su...
|
The integration of multi-access edge computing (MEC) and RAFT consensus makes it feasible to deploy blockchain on trustful base stations and gateways to provide efficient and tamper-proof edge data services for Internet of Things (IoT) applications. However, reducing the latency of storing data on blockchain remains a challenge, especially when an ...
|
A novel carrier sense multiple access strategy with collision avoidance (CSMA/CA) balancing contention probability and channel access time is proposed. The approach can be applied to any context where the computational simplicity of the MAC must be preferred to the complexity of the channel access strategy. Our MAC, called Delay-Collision CSMA (DC-...
|
Federated Learning (FL) is a distributed learning framework that can deal with the distributed issue in machine learning and still guarantee high learning performance. However, it is impractical that all users will sacrifice their resources to join the FL algorithm. This motivates us to study the incentive mechanism design for FL. In this paper, we...
|
In this paper, a multiple cluster-based transmission diversity scheme is proposed for asynchronous joint transmissions (JT) in private networks. The use of multiple clusters or small cells is adopted to reduce the transmission distance to users thereby increasing data-rates and reducing latency. To further increase the spectral efficiency and achie...
|
This article studies the strategic interactions between an IoT service provider (IoTSP) which consists of heterogeneous IoT devices and its energy service provider (ESP). To that end, we propose an economic framework using the Stackelberg game to maximize the network throughput and energy efficiency of both the IoTSP and ESP. To obtain the Stackelb...
|
Future of massive Internet-of-things (IoT) and low latency applications hinges on delivering fresh information on time. Thus, to analyse data freshness for time critical use cases in future networks, the age of information (AoI) measure is introduced. Besides, energy harvesting is also essential to improve energy sustainability and lifetime of a po...
|
Unmanned aerial vehicle (UAV)-enabled wireless power transfer (WPT) has recently emerged as a promising technique to provide sustainable energy supply for widely distributed low-power ground devices (GDs) in large-scale wireless networks. Compared with the energy transmitters (ETs) in conventional WPT systems which are deployed at fixed locations, ...
|
This paper presents a cost-effective, ultra-low-power and highly sensitive wake-up receiver (WuRX) to reduce overall power consumption of Wireless Sensor Networks (WSN). The proposed tuned radio frequency (TRF) receiver (RX) analogue front-end (AFE) incorporates a 400-MHz, low-power, low-noise amplifier (LNA) with a high voltage gain of 50 dB as we...
|
In this modern era, each and every individual needs to utilize the communication medium for sending and receiving the respective data between source and destination entities. A Wireless Sensor Network (WSN) environments provide such facility to clients to perform a successful and range free communication between source and destination. This paper u...
|
Wireless Sensors Networks (WSN) is the self-configured wireless network which consists of a huge measure of resource-restrained Sensor Nodes (SN). In WSN, the key parameters are effectual energy utilization and security. The adversary could send false information because of the Malicious Nodes' (MNs') presence. Thus, to shun security threats, it is...
|
Wireless blockchain network is proposed to enable a decentralized and safe wireless networks for various blockchain applications. To achieve blockchain consensus in wireless network, one of the important steps is to broadcast new block using wireless channel. Under wireless network protocols, the block transmitting will be affected significantly. I...
|
This paper presents wChain, a blockchain protocol specifically designed for multihop wireless networks that deeply integrates wireless communication properties and blockchain technologies under the realistic SINR model. We adopt a hierarchical spanner as the communication backbone to address medium contention and achieve fast data aggregation withi...
|
This paper presents a machine learning strategy that tackles a distributed optimization task in a wireless network with an arbitrary number of randomly interconnected nodes. Individual nodes decide their optimal states with distributed coordination among other nodes through randomly varying backhaul links. This poses a technical challenge in distri...
|
Age of information (AoI) is a newly proposed metric to quantify the freshness of system status. However, in many cases, the original raw data collected by IoT devices needs to be preprocessed in real-time to extract the hidden effective information, which is usually time consuming. To this end, we promote an edge computing assisted approach and aim...
|
Backscatter communication (BC) and radio-frequency energy harvesting (RF-EH) are two promising technologies for extending the battery lifetime of wireless devices. Although there have been some qualitative comparisons between these two technologies, quantitative comparisons are still lacking, especially for massive IoT networks. In this paper, we a...
|
The proliferation of IoT devices in society demands a renewed focus on securing the use and maintenance of such systems. IoT-based systems have a significant impact on society and therefore such systems must have guaranteed resilience. We introduce a solution as a protocol that utilizes smart contracts on the Ethereum blockchain to enforce a securi...
|
With the evolution of the Internet of Things (IoT), smart cities have become the mainstream of urbanization. IoT networks allow distributed smart devices to collect and process data within smart city infrastructure using an open channel, the Internet. Thus, challenges such as centralization, security, privacy (e.g., performing data poisoning and in...
|
In this paper, the problem of energy-efficient data gathering in an Internet of Things (IoT) based remote area surveillance application is addressed by designing a suitable MAC layer uplink solution. We follow the 3GPP specified scheduled access scheme for narrowband IoT (NB-IoT) and consider presence of both delay sensitive and delay tolerant traf...
|
The time series data generated by massive sensors in Internet of Things (IoT) is extremely dynamic, heterogeneous, large scale and time-dependent. It poses great challenges (e.g. accuracy, reliability, stability) on the real-time analysis and decision making for different IoT applications. In this paper, we design, implement and evaluate EdgeLSTM, ...
|
The awareness of physical network topology in a large-scale Internet of Things (IoT) system is critical to enable location-based service provisioning and performance optimization. However, due to the dynamics and complexity of IoT networks, it is usually very difficult to discover and update the physical topology of the large-scale IoT systems in r...
|
5G-enabled Industrial Internet of Things (IIoT) deployment will bring more severe security and privacy challenges, which puts forward higher requirements for access control. Blockchain-based access control method has become a promising security technology, but it still faces high latency in consensus process and weak adaptability to dynamic changes...
|
Passive Gen2 radio frequency identification (RFID) tags work thanks to the utilization of line codes that balance their operation between two opposite states: absorbing RF (for energy harvesting) and reflecting RF (for backscattering/communications). Given the current RF harvesting technology, batteryless tags need to be located very close to an ac...
|
Due to resource constraints and working surroundings, many IIoT nodes are easily hacked and turn into zombies from which to launch attacks. It is challenging to detect such networked zombies. We combine federated learning (FL) and fog/edge computing to combat malicious codes. Our protocol trains a global optimized model based on distributed dataset...
|
Deep neural network (DNN) has become increasingly popular in industrial IoT scenarios. Due to high demands on computational capability, it is hard for DNN-based applications to directly run on intelligent end devices with limited resources. Computation offloading technology offers a feasible solution by offloading some computation-intensive tasks t...
|
The increase in electronic loads connected to electrical network became relevant requirements of the quality of supply. Among the equipment used in the power distribution system stands out regulators medium voltage installed over the grid to maintain voltage levels within indifferent operating range of the oscillations. Therefore, the quality of su...
|
This article presents a 2.4 GHz and high-efficiency wireless power receiver (Rx) integrated with a low-power transmitter (Tx) for wireless charging of the Internet-of-Things (IoT) or wearable devices. A single pole double throw (SPDT) circuit isolates the operation of the Rx from Tx, thereby offering the capability of sharing antenna between them. ...
|
The dual mode technology has been adopted to support smart devices to connect to both the NB-IoT and the LTE simultaneously. How to reduce the power consumption of a smart device with limited battery capacity has been treated as an important issue. In this paper, we propose the Module Switching Mechanism (MSM) that consists of the PS scheme and the...
|
Herein, a continuous-flow driven microfluidic device has been designed and fabricated using the CO2 laser ablation method for polymerase chain reaction (PCR). The device consists of a polymethyl methacrylate (PMMA) microfluidic channel with 30 serpentine thermal cycles, an arduino board, two custom-made cartridge heaters, and thermocouple sensors. ...
|
Internet of Things (IoT) is considered as a key enabler of health informatics. IoT-enabled devices are used for in-hospital and in-home patient monitoring to collect and transfer biomedical data pertaining to blood pressure, electrocardiography (ECG), blood sugar levels, body temperature, etc. Among these devices, wearables have found their presenc...
|
The global healthcare industry and artificial intelligence has promoted the development of the diversified intelligent healthcare applications. IoT will play an important role in meeting the high throughput requirements of diversified intelligent healthcare applications. However, the healthcare big data transmission is vulnerable to a potential att...
|
There has been an asymmetric shift towards harnessing cloud-based technologies as the world focuses on shifting operations remotely. Data security for remote operations is crucial for the protection and preservation of critical infrastructure. Furthermore, there has been an emerging trend to integrate IoT based devices with the expanding cloud infr...
|
This work presents an instruction-set extension to the open-source RISC-V ISA (RV32IM) dedicated to ultra-low power (ULP) software-defined wireless IoT transceivers. The custom instructions are tailored to the needs of 8/16/32-bit integer complex arithmetic typically required by quadrature modulations. The proposed extension occupies only 2 major o...
|
This article studies the strategic interactions between an IoT service provider (IoTSP) which consists of heterogeneous IoT devices and its energy service provider (ESP). To that end, we propose an economic framework using the Stackelberg game to maximize the network throughput and energy efficiency of both the IoTSP and ESP. To obtain the Stackelb...
|
This paper studies an unmanned aerial vehicle (UAV)-assisted wireless powered IoT network, where a rotary-wing UAV adopts fly-hover-communicate protocol to successively visit IoT devices in demand. During the hovering periods, the UAV works on full-duplex mode to simultaneously collect data from the target device and charge other devices within its...
|
Interference management and power transfer can provide a significant improvement over the 5th generation mobile networks (5G) dense Internet of Things (IoT) heterogeneous networks (HetNets). In this paper, we present a novel approach to simultaneously manage inferences at the downlink (DL) and uplink (UL), and to identify opportunities for power tr...
|
The Internet of things (IoT) has certainly become one of the hottest technology frameworks of the year. It is deep in many industries, affecting people's lives in all directions. The rapid development of the IoT technology accelerates the process of the era of ``Internet of everything'' but also changes the role of terminal equipment at the edge of...
|
With the massive growth of Internet-of-Things (IoT) devices, how to provide users with recommendation services in the IoT environment has become a research hotspot. Group discovery, as a prerequisite step of group recommendation that can be used to assist groups of users to select services in IoT-enriched environments, has an important impact on re...
|
Developing products and entering new markets in the Internet of Things (IoT) and industry 4.0 space are challenging because value propositions and business models are complex. IoT products are fundamentally platform products, whose embedded components can measure a disparate set of characteristics for several user types. Deciding in advance which c...
|
In this paper, we propose DRL Track, a framework for target tracking with a collaborative deep reinforcement learning (C-DRL) in Edge-IoT with the aim to obtain high quality of tracking (QoT) and resource-efficient performance. In DRLTrack, a huge number of IoT devices are employed to collect data about a mobile target. One or two edge devices coor...
|
The Internet of Things (IoT) is playing an increasingly vital role in multiple industries and our everyday life. A pressing practical problem of IoT devices (IoT-Ds) is their explosive growth of connectivity which leads to large energy consumption. One of the most promising solutions to achieve a sustainable green IoT network is unmanned aerial veh...
|
Deep Neural Networks (DNNs) have become an essential and important supporting technology for smart Internet-of-Things (IoT) systems. Due to the high computational costs of large-scale DNNs, it might be infeasible to directly deploy them in energy-constrained IoT devices. Through offloading computation-intensive tasks to the cloud or edges, the comp...
|
Bio-features are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose of this investigation is to summaries the factors that hinder biometrics models’ development and deployment on a large scale, including human physiological (e.g., face, eyes, fingerprints-palm, or electrocardiogram) and behavioral features (e.g., s...
|
For most Internet-of-Things (IoT) applications, embedded processors typically execute lightweight tasks such as sensing and communication. The typical IoT program senses some information and sends them via a channel, usually a wireless channel with an RF circuit. These IoT nodes often require a system with networking capabilities and a low-power ha...
|
This paper studies the interplay between device-to-device (D2D) communications and real-time monitoring systems in a cellular-based Internet of Things (IoT) network. In particular, besides the possibility that the IoT devices communicate directly with each other in a D2D fashion, we consider that they frequently send time-sensitive information/stat...
|
Nowadays, users can personalize IoT devices/Web services via Trigger-Action Programming (TAP). As the number of connected entities grows, the relations of triggers and actions become progressively complex (i.e., the heterogeneity of TAP), which becomes a challenge for existing models to completely preserve the heterogeneous data and semantic inform...
|
With the fast development of the Internet of Things (IoT) technologies, more IoT devices are currently connected with the Internet, resulting in more exchange of information. However, data privacy and security threats have become emerging challenges of the IoT. In this paper, we are concerned about the security of image transmission in green IoT. I...
|
In this paper, we study sensing data collection of IoT devices in a sparse IoT-sensor network, using an energy-constrained Unmanned Aerial Vehicle (UAV), where the sensory data is stored in IoT devices while the IoT devices may or may not be within the transmission range of each other. We formulate two novel data collection problems to fully or par...
|
Deploying a mobile edge computing (MEC) server in the mobile blockchain-enabled Internet of things (IoT) system is a promising approach to improve the system performance, however, it imposes a significant challenge on the trust of the MEC server. To address this problem, we first propose an untrusted MEC proof of work (PoW) scheme in mobile blockch...
|
In recent years, Internet of Things (IoT) security has attracted significant interest by researchers due to new characteristics of IoT such as heterogeneity of devices, resource constraints, and new types of attacks targeting IoT. Intrusion detection, which is an indispensable part of a security system, is also included in these studies. In order t...
|
In recent years, the Internet of Things (IoT) has been contemplated as the next technological advancement in the era of internet. This paper discloses the architecture of a multilayer, multimode security system for IoT. The proposed system is capable of providing multiple security solutions that support anonymous authentication, device privacy, dat...
|
Cloud computing has promoted the success of Internet of Things (IoT) with offering abundant storage and computation resources where the data from IoT sensors can be remotely outsourced to the cloud servers, whereas storing, exchanging and processing data collected through IoT sensors via centralised or decentralised cloud servers make cloud-based I...
|
The Software Defined Network in Internet of Things (SDN-IoT) is enjoying growing popularity due to its flexibility, automaticity and programmability. However, there still lack proper permission management on SDN-IoT applications (SIApps), especially when the SIApp’s required northbound interfaces are located in multiple heterogeneous controllers wi...
|
The Internet of Things (IoT) edge network has connected lots of heterogeneous smart devices, thanks to unmanned aerial vehicles (UAVs) and their groundbreaking emerging applications. Limited computational capacity and energy availability have been major factors hindering the performance of edge user equipment (UE) and IoT devices in IoT edge networ...
|
Internet-of-Things (IoT) aims to connect intelligent things to the internet, enable thing-to-everything communication, and sustainability sensing and control. However, the exponential increase of connected IoT devices is resulting in tremendous demand on the limited spectrum. Cognitive radio (CR) technology is envisioned to be one of the main enabl...
|
Named data networking (NDN) is an emerging information-centric networking paradigm, in which the Internet of Things (IoT) achieves excellent scalability. Recent literature proposes the concept of NDN-IoT, which maximizes the expansion of IoT applications by deploying NDN in the IoT. In the NDN, the security is built into the network by embedding a ...
|
This article analyzes the effectiveness of deploying the Blockchain technology in the implementation of the IoT ecosystem database. To this end, we assess the processing efficiency of transactions originated by smart devices and the storeddata integrity. The processing-efficiency evaluation is carried out through queue-theory-based analytical model...
|
Today's IoT devices rely on batteries, which offer stable energy storage but contain harmful chemicals. Having billions of IoT devices powered by batteries is not sustainable for the future. As an alternative, batteryless devices run on long-lived capacitors charged using energy harvesters. The small energy storage capacity of capacitors results in...
|
Verifying the integrity of IoT data in cloud-based IoT architectures is crucial for building reliable IoT applications. Traditional data integrity verification methods rely on a Trusted Third Party (TTP) that has issues of risk and operational cost by centralization. Distributed Ledger Technology (DLT) has a high potential to verify IoT data integr...
|
The Industry 4.0 (I4.0) is a paradigm settled down by the introduction of the Internet of things (IoT) into the production and manufacturing environment. I4.0 promotes the connection of physical items such as sensors, devices, and enterprise assets, to each other and to the Internet. The information that flows through these items is vital because i...
|
Public Distribution System is an essential part of life for the under-privileged people of the society. The traditional ration distribution system involves various malpractices. Ration card is the proof of citizenship since many decades. Government's subsidized food commodities and fuel are purchased using ration card by the people categorized as B...
|
In Industrial Internet of Things (IIoT), a number of mutually untrusted devices with diverse computing resources and application requirements often need to work together to serve industrial production. When applying permissionless blockchain to process transactions among these devices, we are concerned with two types of fairness: mining fairness (i...
|
Blockchain is a safe technology for transaction as it keeps the information safe that it is impossible to change, hack or cheat. blockchain is a digital mode of transaction that is spread across the entire network of computer systems in blockchain. IoT devices allows to send information or useful data in the blockchain to the persons that are inter...
|
The ATM Fraudulence occurring in the society has become very common nowadays. Even though technology has boomed in various aspects it is being misused in different ways for stealing money through ATM’S. Skimming and Trapping of the ATM devices have been designed by many Burglars. Recognition based Verification system as been implemented for many AT...
|
We develop a novel framework for efficiently and effectively discovering crowdsourced services that move in close proximity to a user over a period of time. We introduce a moving crowdsourced service model which is modelled as a moving region. We propose a deep reinforcement learning-based composition approach to select and compose moving IoT servi...
|
This paper presents V-Sight, a network monitoring framework for programmable virtual networks in clouds. Network virtualization based on software-defined networking (SDN-NV) in clouds makes it possible to realize programmable virtual networks; consequently, this technology offers many benefits to cloud services for tenants. However, to the best of ...
|
Mobile edge computing (MEC), extending computing services from cloud to edge, is recognized as one of key pillars to facilitate real-time services and tackle backhaul bottleneck. However, it is not economically efficient to attach intensive security appliances to every MEC node to defend application-level DDoS attacks and ensure the availability of...
|
In the edge computing environment, app vendors can cache their data on a large number of geographically distributed edge servers to serve their users. However, those cached data are particularly vulnerable to both intentional and accidental corruption, which makes data security a major concern in the EC environment. Given limited computing resource...
|
Delivering cloud-like computing facilities at the network edge provides computing services with ultra-low-latency access, yielding highly responsive computing services to application requests. The concept of fog computing has emerged as a computing paradigm that adds layers of computing nodes between the edge and the cloud, also known as cloudlets,...
|
Fog computing extends cloud computing capabilities to the edge of the network and reduces high latency and network congestion. This paradigm enables portions of a transaction to be executed at a fog server and other portions at the cloud. Fog servers are generally not as robust as cloud servers; at peak loads, the data that cannot be processed by f...
|
Network storage services have benefited countless users worldwide due to the notable features of convenience, economy and high availability. Since a single service provider is not always reliable enough, more complex multi-cloud storage systems are developed for mitigating the data corruption risk. While a data auditing scheme is still needed in mu...
|
Fog computing is an emerging computing paradigm that uses processing and storage capabilities located at the edge, in the cloud, and possibly in between. Testing and benchmarking fog applications, however, is hard since runtime infrastructure will typically be in use or may not exist, yet. While approaches for the emulation of infrastructure testbe...
|
Cloud computing has promoted the success of Internet of Things (IoT) with offering abundant storage and computation resources where the data from IoT sensors can be remotely outsourced to the cloud servers, whereas storing, exchanging and processing data collected through IoT sensors via centralised or decentralised cloud servers make cloud-based I...
|
In recent years, edge computing has attracted significant attention because it can effectively support many delay-sensitive applications. Despite such a salient feature, edge computing also faces many challenges, especially for efficiency and security, because edge devices are usually heterogeneous and may be untrustworthy. To address these challen...
|
Recent advances in smart connected vehicles and Intelligent Transportation Systems (ITS) are based upon the capture and processing of large amounts of sensor data. Modern vehicles contain many internal sensors to monitor a wide range of mechanical and electrical systems and the move to semi-autonomous vehicles adds outward looking sensors such as c...
|
In this paper, we consider an Internet-of-Things (IoT) network that supports two types of devices, namely static devices (SDs) and dynamic devices (DDs), with multiple channels. The notion of power-domain non-orthogonal multiple access (NOMA) is applied so that DDs can not only dynamically change channels, but also transmit signals with a high powe...
|
In narrowband Internet of Things (NB-IoT), a link adaptation technique can be performed, considering multiple resource unit types, repetition numbers, and modulation-coding schemes, to enhance transmission reliability. Then, a base station should allocate downlink and uplink resources for each device using the link adaptation decision to transmit d...
|
The increasing demand for wireless connectivity and the emergence of the notion of the Internet of Everything require new communication paradigms that will ultimately enable a plethora of new applications and new disruptive technologies. In this context, the present contribution investigates the use of the recently introduced intelligent reflecting...
|
In medical field, previous patients' cases are extremely private as well as intensely valuable to current disease diagnosis. Therefore, how to make full use of precious cases while not leaking out patients' privacy is a leading and promising work especially in future privacy-preserving intelligent medical period. In this paper, we investigate how t...
|
IoT-enabled smart healthcare systems has the characteristics of heterogeneous fusion, cross domain, collaborative autonomy, dynamic change and open interconnection, but they bring huge challenges in privacy issues. We proposed a scheme of forward privacy preserving for IoT-enabled healthcare systems, which mainly includes a searchable encryption sc...
|
Data in modern industrial applications and data science presents multidimensional progressively, the dimension and the structural complexity of these data are becoming extremely high, which renders existing data analysis methods and machine learning algorithms inadequate to the extent. In addition, high-dimensional data in actual scenarios often sh...
|
This paper addresses the problem of decentralized sensor selection in an energy-constrained wireless sensor network-based Internet-of-Things, for monitoring a spatio-temporally varying process. To do so, an adaptive edge computing framework and its variants are proposed which distributedly optimize a critical trade-off between sensing quality and r...
|
The rapid development of the Industrial Internet of Things (IIoT) has led to the explosive growth of industrial control data. Cloud computing-based industrial control models cause vast energy consumption. Most existing solutions try to reduce the overall energy consumption by optimizing task scheduling and disregard how to reduce the load of comput...
|
Driving behaviors are highly relevant to automotive statuses and on-board safety, which offer compelling shreds of evidence for mobility as a service (MaaS) providers to develop personalized rental prices and insurance products. However, the direct dissemination of driving behaviors may lead to violations of identity and location privacy. In this p...
|
It is a challenging task to deploy lightweight security protocols in resource-constrained IoT applications. A hardware-oriented lightweight authentication protocol based on device signature generated during voltage over-scaling (VOS) was recently proposed to address this issue. VOS-based authentication employs the computation unit such as adder...
|
Connecting all devices through the Internet is now practical via the Internet of Things (IoT). IoT is characterized by using smart and self-configuring objects that can interact with each other via global network infrastructure. Clustering is the promising technique that effectively works on the enhancement of network lifetime. This paper intends t...
|
Artificial Intelligence (AI) technology has been widely applied to Internet of Thing (IoT) and one of key applications is intelligence data collection from billions of IoT devices. However, many AI based data collection approaches lack security considerations leading to availability restricted. In this paper, an Intelligent Trust Collaboration Netw...
|
A sharded blockchain with the Proof-of-Stake (PoS) consensus protocol has advantages in increasing throughput and reducing energy consumption, enabling the resource-limited participants to manage transactions and in a decentralized way and obtain rewards at a lower cost, e.g., Internet-of-Things (IoT) users. However, the latest PoS (e.g., Casper) r...
|
In Green Internet of Things, energy consumption research is a hot topic. Our research focuses on Supervisory Control And Data Acquisition (SCADA) system, and it is a system consisting of a plurality of self-organized sensing networks. Live data gathering from numerous Sub-connected SCADA (S-SCADA) networks to make unified decisions based on collect...
|
As 5G and mobile computing are growing rapidly, deep learning services in the Social Computing and Social Internet of Things (IoT) have enriched our lives over the past few years. Mobile devices and IoT devices with computing capabilities can join social computing anytime and anywhere. Federated learning allows for the full use of decentralized tra...
|
An always-on video-based human action recognition (HAR) system on chip (SoC) integrated with a CMOS image sensor (CIS) is proposed for the Internet of Things (IoT) devices. The proposed SoC is the first always-on integrated circuit (IC) performing the full process of HAR in a single chip. To resolve large power consumption from vision sensor and co...
|
Owing to the nature of battery-operated sensors, the residual energy of their battery should be considered when a sink node collects sensory data from them. If a sink attempts to collect data from a sensor that does not have sufficient residual energy to transmit data, the utilization of wireless communication resources may be degraded. However, re...
|
Mobile edge computing (MEC) is a promising technique to alleviate the energy limitation of Internet of things (IoT) devices, as it can offload local computing tasks to the edge server through a cellular network. By leveraging extreme value theory (EVT), this work proposes a priority-differentiated offloading strategy that takes into account the str...
|
One of the major challenges for Internet-of-Things applications is that the existing cellular technologies do not support the uplink IoT traffic in an energy-efficient manner. There are two principal ways for serving the uplink IoT traffic: grant-based (i.e., scheduled) and grant-free (i.e., random access). Grant-based access provides fine-grained ...
|
With the development of the Internet of Things, trust has become a limited factor in the integration of heterogeneous IoT networks. In this regard, we use the combination of blockchain technology and SDN/NFV to build a heterogeneous IoT network resource management model based on the consortium chain. In order to solve the efficiency problem caused ...
|
This work enables mobile user authentication via finger inputs on ubiquitous surfaces leveraging low-cost physical vibration. The system we proposed extends finger-input authentication beyond touch screens to any solid surface for IoT devices (e.g., smart access systems and IoT appliances). Unlike passcode or biometrics-based solutions, it integrat...
|
Satisfying the software requirements of emerging service-based Internet of Things (IoT) applications has become challenging for cloud-centric architectures, as applications demand fast response times and availability of computational resources closer to end-users. As such, meeting application demands must occur at runtime, facing uncertainty and in...
|
Sensor systems have the potential to make abstract science phenomena concrete for K–12 students. Internet of Things (IoT) sensor systems provide a variety of benefits for modern classrooms, creating the opportunity for global data production, orienting learners to the opportunities and drawbacks of distributed sensor and control systems, and reduci...
|
Internet-of-Things (IoT) innovations produce interesting opportunities, impact ethical and social aspects toward human society, and influence operational and technical solutions toward the structural systems. This article discusses the impact of some relevant characteristics of the IoT innovations. Significant debated aspects are the product discon...
|
Fog/edge computing has been recently regarded as a promising approach for supporting emerging mission-critical Internet of Things (IoT) applications on capacity and battery constrained devices. By harvesting and collaborating a massive crowd of devices in close proximity for computation, communication and caching resource sharing (i.e., 3C resource...
|
Nowadays, IoT systems can better satisfy the service requirements of users with effectively utilizing edge computing resources. Designing an appropriate pricing scheme is critical for users to obtain the optimal computing resources at a reasonable price and for service providers to maximize profits. This problem is complicated with incomplete infor...
|
The prosperity of Internet of Things (IoT) brings forth the deployment of large-scale sensing systems such as smart cities. The distributed devices upload their local sensing data to the cloud and collaborate to fulfill the large-area tasks such as pollutant diffusion analysis and target tracking. To accomplish the collaboration, time synchronizati...
|
Non-orthogonal multiple access (NOMA) exploits the potential of power domain to enhance the connectivity for Internet of Things (IoT). Due to time-varying communication channels, dynamic user clustering is a promising method to increase the throughput of NOMA-IoT networks. This paper develops an intelligent resource allocation scheme for uplink NOM...
|
Nowadays, adopting blockchain technology to Internet of Things has become a trend and it is important to minimize energy consumption while providing a high quality of service (QoS) in Blockchain-based IoT networks. Pre-caching popular and fresh IoT content avoids activating sensors frequently, thus effectively reducing network energy consumption. H...
|
The next generation Internet of Things (IoT) exhibits a unique feature that IoT devices have different energy profiles and quality of service (QoS) requirements. In this paper, two energy and spectrally efficient transmission strategies, namely wireless power transfer assisted non-orthogonal multiple access (WPT-NOMA) and backscatter communication ...
|
The Internet of Things (IoT) is an emerging paradigm and has penetrated deeply into our daily life. Due to the seamless connections of the IoT devices with the physical world through the Internet, the IoT applications use the cloud to store and provide ubiquitous access to collected data. Sharing of data with third party services and other users in...
|
With more than 75 billions of objects connected by 2025, Internet of Things (IoT) is the catalyst for the digital revolution, contributing to the generation of big amounts of (transient) data, which calls into question the storage and processing performance of the conventional cloud. Moving storage resources at the edge can reduce the data retrieva...
|
Current Internet of Things (IoT) infrastructures rely on cloud storage however, relying on a single cloud provider puts limitations on the IoT applications and Service Level Agreement (SLA) requirements. Recently, multiple decentralized storage solutions (e.g., based on blockchains) have entered the market with distinct architecture, Quality of Ser...
|
Strongly quantized fixed-point arithmetic is now considered a well-established solution to deploy Convolutional Neural Networks (CNNs) on limited-memory low-power IoT endnodes. Such a trend is challenging due to the lack of support for low bitwidth fixed-point instructions in the Instruction Set Architecture (ISA) of state-of-the-art embedded Micro...
|
In this paper, we propose a region-based pricing scheme, named as RegPrice, for provisioning safety-related decisions dynamically to the end-users. Typically, heterogeneous type of sensor nodes are present in the device layer of Safe-aaS. Considering the case of safety in road transportation, we compute the fixed and variable costs incurred in proc...
|
The reliance on Network-on-Chip (NoC)-based Multiprocessor Systems-on-Chips (MPSoCs) is proliferating in modern embedded systems to satisfy the higher performance requirement of multimedia streaming applications. Task level coarse grained software pipeling also called re-timing when combined with Dynamic Voltage and Frequency Scaling (DVFS) has sho...
|
The deployment of Deep Neural Networks (DNNs) on end-nodes at the extreme edge of the Internet-of-Things is a critical enabler to support pervasive Deep Learning-enhanced applications. Low-Cost MCU-based end-nodes have limited on-chip memory and often replace caches with scratchpads, to reduce area overheads and increase energy efficiency – requiri...
|
Performing deep neural network (DNN) inference in real time requires excessive network resources, which poses a great challenge to the resource-limited industrial Internet of things (IIoT) networks. To address the challenge, in this paper, we introduce an end-edge-cloud orchestration architecture, in which the inference task assignment and DNN mode...
|
Barrier coverage scheduling is an energy conservation scheme in which a subset of sensor nodes with overlapped sensing area (also called barrier) is activated to meet the key Quality of Service (QoS) requirements such as energy-efficiency, coverage, and connectivity. However, sudden and unexpected node failures in a barrier due to security attacks ...
|
Internet of Things (IoT) networks consist of sensors, actuators, mobile and wearable devices that can connect to the Internet. With billions of such devices already in the market which have significant vulnerabilities, there is a dangerous threat to the Internet services and also some cyber-physical systems that are also connected to the Internet. ...
|
This paper presents a distributed and decentralized architecture for the implementation of Distributed Artificial Intelligence (DAI) using hardware platforms provided by the Internet of Things (IoT). A trained DAI system has been implemented over the IoT, where each IoT device acts as one or more of the neurons within the DAI layers. This is accomp...
|
In this paper, an innovative quadrupole-based broadside-radiating unidirectional antenna is designed at 28.475 GHz for 5G IoT applications. The planar antenna is based on a single-layer technology and realized on a flexible substrate to facilitate conformal applications. It consists of a coax-fed driven dipole and two quadrupolar near-field resonan...
|
With the booming of smart grid, The ubiquitously deployed smart meters constitutes an energy internet of things. This paper develops a novel blockchain-based transactive energy management system for IoT-aided smart homes. We consider a holistic set of options for smart homes to participate in transactive energy. Smart homes can interact with the gr...
|
We investigate massive access in the Internet-ofThings (IoT) relying on multi-pair two-way amplify-and-forward (AF) relay systems using massive multiple-input multiple-output (MIMO). We utilize the approximate message passing (AMP) algorithm for joint device activity detection and channel estimation. Furthermore, we analyze the achievable rates for...
|
This brief presents an inductorless gm-boosted wideband balun low noise amplifier (LNA) for low power sub-GHz IoT applications. The proposed common source (CS) -common gate (CG) based gm-boosted balun LNA uses nMOS-pMOS configuration for doubling the transconductance and gain efficiency. Loads of CS and CG stages are capacitively coupled to remove ...
|
The integration of drones, IoT, and AI domains can produce exceptional solutions to today's complex problems in smart cities. A drone, which essentially is a data-gathering robot, can access geographical areas that are difficult, unsafe, or even impossible for humans to reach. In this paper, an intelligent technique is proposed to predict the signa...
|
In this paper, we propose and study an energy-efficient trajectory optimization scheme for unmanned aerial vehicle (UAV) assisted Internet of Things (IoT) networks. In such networks, a single UAV is powered by both solar energy and charging stations (CSs), resulting in sustainable communication services, while avoiding energy outage. In particular,...
|
In recent years, the Internet of Things (IoT) has made great progress. The interconnection between IoT and the Internet enables real-time information processing and transaction implementation through heterogeneous intelligent devices. But the security, the privacy, and the reliability of IoT are key challenges that limit its development. The featur...
|
Cloud Data Centers (CDCs) have become a vital computing infrastructure for enterprises. However, CDCs consume substantial energy due to the increased demand for computing power, especially for the Internet of Things (IoT) applications. Although a great deal of research in green resource allocation algorithms have been proposed to reduce the energy ...
|
The interest of Industry 4.0 in Smart Contracts and blockchain technologies is growing up day by day. Smart Contracts have enabled new kinds of interactions whereby contractors can even fully automate processes they agree on. This technology is really appealing in Internet of Things (IoT) domain because smart devices generate events for software ag...
|
The social Internet of Things (IoT) (SIoT) helps to enable an autonomous interaction between the two architectures that have already been established: social networks and the IoT. SIoT also integrates the concepts of social networking and IoT into collaborative edge computing (CEC), the so-called CEC-based SIoT architecture. In closer proximity, Io...
|
In this paper, we consider an overlay satellite-terrestrial network (OSTN) where an opportunistically selected terrestrial internet-of-things (IoT) network assists the primary satellite communications as well as accesses the spectrum for its own communications under hybrid interference received from extra-terrestrial sources (ETSs) and terrestrial ...
|
We propose a novel generic trust management framework for crowdsourced IoT services. The framework exploits a multi-perspective trust model that captures the inherent characteristics of crowdsourced IoT services. Each perspective is defined by a set of attributes that contribute to the perspective’s influence on trust. The attributes are fed into a...
|
In the modern world, the connectivity-as-we-go model is gaining popularity. Internet-of-Things (IoT) envisions a future in which human beings communicate with each other and with devices that have identities and virtual personalities, as well as sensing, processing, and networking capabilities, which will allow the developing of smart environments ...
|
We consider a distributed IoT edge network whose end nodes generate computation jobs that can be processed locally or be offloaded, in full or in part, to other IoT nodes and/or edge servers having the necessary computation and energy resources. That is, jobs can either be partitioned and executed at multiple nodes (including the originating no...
|
Data-driven approaches are envisioned to build future Edge-IoT systems that satisfy IoT devices demands for edge resources. However, significant challenges and technical barriers exist which complicate resource management of such systems. IoT devices can demonstrate a wide range of behaviors in the devices resource demand that are extremely difficu...
|
Big-data frameworks such as MapReduce/Hadoop or Spark have many performance-critical configuration parameters which may interact with each other in a complex way. Their optimal values for an application on a given cluster are affected by not only the application itself but also its input data. This makes offline auto-configuration approaches hard t...
|
Cloud Data Centers (CDCs) have become a vital computing infrastructure for enterprises. However, CDCs consume substantial energy due to the increased demand for computing power, especially for the Internet of Things (IoT) applications. Although a great deal of research in green resource allocation algorithms have been proposed to reduce the energy ...
|
Edge computing has emerged as a new paradigm to bring cloud applications closer to users for increased performance. Unlike back-end cloud systems which consolidate their resources in a centralized data center location with virtually unlimited capacity, edge-clouds comprise distributed resources at various computation spots, each with very limited c...
|
To increase the flexibility and the dynamism of communication networks, Software Defined Networking (SDN) has emerged as the challenging approach to decouple control and data planes, using a logically centralized controller able to manage the underlying network resources. However, traditional network solutions can not be always used in SDN. In this...
|
This Special Section on ‘`Cloud-Edge Computing for Cyber-Physical Systems and Internet-of-Things’' is oriented to the dissemination of a few of those latest research and innovation results, covering many aspects of design, optimization, implementation, and evaluation of emerging cloud-edge solutions for CPS and IoT applications. The selected high-q...
|
In contrast to the traditional cloud-based IoT structure, which imposes high computation and storage demands on the central cloud server, edge computing can process data at the network edge. In this paper, we present an edge computing data storage protocol employing the blockchain and the group signature, where the blockchain works as the trusted t...
|
Nowadays, IoT systems can better satisfy the service requirements of users with effectively utilizing edge computing resources. Designing an appropriate pricing scheme is critical for users to obtain the optimal computing resources at a reasonable price and for service providers to maximize profits. This problem is complicated with incomplete infor...
|
Cloud computing enables enterprises and individuals to outsource and share their data. This way, cloud computing eliminates the heavy workload of local information infrastructure. Attribute-based encryption has become a promising solution for encrypted data access control in clouds due to the ability to achieve one-to-many encrypted data shari...
|
In recent years, the investigations on Cyber-Physical Systems~(CPS) have become increasingly popular in both academia and industry. A primary obstruction against the booming deployment of CPS applications lies in how to process and manage large amounts of generated data for decision making. To tackle this predicament, researchers advocate the idea ...
|
In this paper, the impact of imperfect beam alignment (IBA) on millimeter wave (mmWave) wireless power transfer (WPT) is investigated. We consider a mmWave WPT network, where the location of the energy transmitters follows a Poisson point process. Instead of the mostly used flat-top antenna model, we adopt the Gaussian antenna model suggested by th...
|
Wireless Multimedia Sensor Network (WMSN) is increasingly being deployed for surveillance, monitoring and Internet-of-Things (IoT) sensing applications where a set of cameras capture and compress local images and then transmit the data to a remote controller. Such captured local images may also be compressed in a multi-view fashion to reduce the re...
|
This paper presents an integrated ultra-low-power (ULP) wireless sensor system-on-chip (SoC) that can be used for voltage sensing in both Internet of Things applications and bio-potential monitoring. In order to increase the energy efficiency of the analog front-end (AFE), we propose a noise and power efficient push-pull low noise instrumentation a...
|
Edge computing promises to facilitate the collaboration of smart sensors at the network edge, in order to satisfying the delay constraints of certain requests, and decreasing the transmission of large-volume sensory data from the edge to the cloud. Generally, the functionalities provided by smart sensors are encapsulated as services, and the satisf...
|
The diffusion of toxic gas, biochemical material, and radio-active contamination, known as continuous objects, endangers the safe production of petrochemical and nuclear industry. Industrial wireless sensor networks are a new paradigm, which shows great potential in monitoring evolving hazardous phenomena in unfriendly industrial field. To prolong ...
|
Wireless sensor networks have wide applications in monitoring applications. However, sensors' energy and processing power constraints, as well as the limited network bandwidth, constitute significant obstacles to near-real-time requirements of modern IoT applications. Offloading sensor data on an edge computing infrastructure instead of in-cloud or...
|
With the increasing demand of users for personalized social services, social recommendation (SR) has been an important concern in academia. However, current research on SR universally faces two main challenges. On the one hand, SR lacks the considerable ability of robust online data management. On the other hand, SR fails to take the ambiguity of p...
|
In this paper, we present an Online Learning Artificial Neural Network (ANN) model that is able to predict the performance of tasks in lower frequency levels and safely optimize real-time embedded systems' power saving operations. The proposed ANN model is supported by feature selection, which provides the most relevant variables to describe shared...
|
The deficiency of water all throughout the planet compel us to limit the use of water. Over 75% of new water assets were utilizing for water system reason so productive use of water in water system framework with cutting edge strategy is required. This paper presents a cutting-edge innovation based savvy framework to anticipate the water system nec...
|
In this paper, a design is proposed using IR and LDR sensor for automation of lights and fans using PIC with Internet of Things for smart homes. Nowadays we’re having automation of every little electrical device in our homes. Internet of Things is the concept of basically connecting any device with an on and off switch to the internet. IOT is mo...
|
The IoT allows objects to be sensed or controlled remotely across existinginfrastructure, creating opportunities for more direct integration of the physical world into computer-based systems, and resulting in improved efficiency, accuracy and economic benefit in addition to reduced human intervention. The Internet of Things (IoT) i...
|
The Internet of Medical Things (IoMT) is the collection of medical devices and applications that connect to healthcare IT systems through online computer networks. Medical devices equipped with Wi-Fi allow the communication that is the basis of IoMT. IoMT devices link to cloud platforms such as Things Speak, Amazon Web Services, on which captured d...
|
This project proposes a supervisory system based on WIFI technology, to improve the operation efficiency of bus monitoring system and realize intelligent transportation system.
Using IR sensors to know the available seats in the bus.
RF TRANSCEIVER is used to track the object(ie.bus) in certain regions.
RF is used to convey the informations wh...
|
Concept of Smart cities have gained great popularity. Thanks to the evolution of Internet of things the idea of smart city now seems to be achievable.
In this paper, we proposed Smart Parking system consists of an on-site deployment of an IoT module which is combination of Raspberry pi 3 and Arduino Uno and HC-SRO4 Sonars that is used to monito...
|
The Vehicle-to-Grid (V2G) network is, where the battery-powered vehicles provide energy to the power grid, is highly emerging. A robust, scalable, and cost-optimal mechanism that can support the increasing number of transactions in a V2Gnetwork is required.
Existing studies use traditional block chain as to achieve this requirement. Block chain-en...
|
Biometric Fingerprint systems are used in the Voting machine for voter confirmation. fingerprint voting machine is designed where there is no need for the user to carry his ID which contains his essential details, so that the controller fetches the data from the fingerprint module and then compares it with already registered fingerprints of the vot...
|
In this paper, heart disease prediction modeled using partially observable Markova decision process (POMDP) is proposed. In emergency, the patient is alerted through the doctor by fog computing. Ambulance sent to the location of patient at critical situations. The doctor gets the data through fog computing iFogSim. Fog computing in healthcare is a ...
|
This paper is intended to monitor Heart beat with android application which is used to measure the heart beat of different persons. It is built using Android Studio. It may also include the different modules based on the software specification, system requirement, hardware requirement and disk space....
|
This paper we propose a security patrolling robot that uses night vision camera for securing any premises. The robotic vehicle moves at particular intervals and is equipped with night vision camera and sound sensors. It uses a predefined line to follow its path while patrolling. It stops at particular points and moves to next points if sound are de...
|
In this paper, the concept o 2-Layer routing for wireless 5G networks is presented. New fifth generations of the network along with the platform known asthe Internet of Things (IoT) are an upcoming trend not only in the commercial market but also in the research area. The 5G networks and IoT will be part of smart homes, smart cities and every aspec...
|
As water supply is becoming scarce in today’s world there is an urgency of adopting smart ways of irrigation. The project describes how irrigation can be handled smartly using IOT. This project aims at saving time and avoiding problems like constant vigilance. It also helps in conserving water by automatically providing w...
|
About 33,000 people die because the ambulance cannot reach them in time. It is not necessary that when you call an ambulance, the nearest ambulance will reach you. The paper describe a model to track the nearest free ambulance in the area using global positioning system and bring it to the person in distress. The GPS device continuously moves with ...
|
In the present arena, wildlife and forest departments are facing the problem of movement of animals from forest area to residential area. The number of trees has reduced drastically from the forest that creates an unhealthy environment for animals to survive in the forest. It has been found in a survey that 80% losses are caused due to fire. This c...
|
The evolution of multipurpose sensors over the last decades has been investigated with the aim of developing innovative devices with applications in several ?elds of technology, including in the food industry. The integration of such sensors in food packaging technology has paved the way for intelligent food packaging. These integrated systems are ...
|
The system proposed in this paper is an advanced solution for monitoring the weather conditions at a particular place and make the information visible anywhere in the world. The technology behind this is Internet of Things (IoT), which is an advanced and efficient solution for connecting the things to the internet and to connect the entire world of...
|
The workload of the static security guards has doubled due to the Covid-19 outbreak. In addition to their regular duties, they undertake some additional tasks to evaluate each individual’s body temperature and welcome them with a hand sanitizer. In this scenario, their situational awareness is hugely desirable to perform these activities for the en...
|
Today, the growth of technology is rapid and provides all necessary and effective solutions for the requirements. One of the most important areas of concern is security. In this scenario, IOT Asset tracking system is developed to increase the safety of women, children, people with mental disorder and any valuable items through the technology of Rad...
|
The combination of pervasive edge computing and block chain technologies opens up significant possibilities for Industrial Internet of Things (IIoT) applications, but there are several critical limitations regarding efficient storage and rapid response for large-scale low-delay IIoT scenarios. To address these limitations, we propose a hierarchical...
|
Nowadays scalable IoT management is a bottleneck of IoT development due to the geographically dispersed distribution, fragmented ownerships, and ever growing population of IoT devices. To intelligently manage massive decentralized applications (dApps) in IoT use cases, Edgence (EDGe + intelligence) is proposed to use edge clouds to access IoT devic...
|
Rapid growth in numbers of connected devices including sensors, mobile, wearable, and other Internet of Things (IoT) devices, is creating an explosion of data that are moving across the network. To carry out machine learning (ML), IoT data are typically transferred to the cloud or another centralized system for storage and processing; however, this...
|
Fog computing as an extension of the cloud based infrastructure, provides a better computing platform than cloud computing for mobile computing, Internet of Things, etc. One of the problems is how to make full use of the resources of the fog so that more requests of applications can be executed on the edge, reducing the pressure on the network and ...
|
Edge computing is a new computing paradigm, which aims at enhancing user experience by bringing computing resources closer to where data is produced by Internet of Things (IoT). Edge services are provided by small data centers located at the edge of the network, called cloudlets. However, IoT users often face strict Quality of Service (QoS) constra...
|
Cloud computing has significantly enhanced the growth of the Internet of Things (IoT) by ensuring and supporting the Quality of Service (QoS) of IoT applications. However, cloud services are still far from IoT devices. Notably, the transmission of IoT data experiences network issues, such as high latency. In this case, the cloud platforms cannot sa...
|