Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 33

Full-Text Articles in Engineering

Renovating The Ipmu Via Internet Of Things For Pollutant Emission Estimations In Poultry Facilities, Joshua Dotto Dec 2023

Renovating The Ipmu Via Internet Of Things For Pollutant Emission Estimations In Poultry Facilities, Joshua Dotto

Department of Agricultural and Biological Systems Engineering: Dissertations, Theses, and Student Research

The emissions of ammonia (NH3), particulate matter (PM2.5), and carbon dioxide (CO2) are major concerns in poultry facilities. They can pose environmental concerns and nuances. Robust and affordable measurement systems are needed to accurately measure in-barn concentrations and quantify the emissions.

The Intelligent Portable Monitoring Unit (iPMU or PMU3) developed in 2016 was reconstructed into PMU4 to include upgraded NH3 and PM2.5 sensors and wireless connectivity for a low-cost, robust, and accurate air quality monitoring device with contactless data transfer using the concept of Internet of Things (IoT). In addition, a user-friendly …


Graph-Based Heuristic Solution For Placing Distributed Video Processing Applications On Moving Vehicle Clusters, Kanika Sharma, Bernard Butler, Brendan Jennings May 2022

Graph-Based Heuristic Solution For Placing Distributed Video Processing Applications On Moving Vehicle Clusters, Kanika Sharma, Bernard Butler, Brendan Jennings

Articles

Vehicular fog computing (VFC) is envisioned as an extension of cloud and mobile edge computing to utilize the rich sensing and processing resources available in vehicles. We focus on slow-moving cars that spend a significant time in urban traffic congestion as a potential pool of onboard sensors, video cameras, and processing capacity. For leveraging the dynamic network and processing resources, we utilize a stochastic mobility model to select nodes with similar mobility patterns. We then design two distributed applications that are scaled in real-time and placed as multiple instances on selected vehicular fog nodes. We handle the unstable vehicular environment …


Assessing Security Risks With The Internet Of Things, Faith Mosemann Apr 2022

Assessing Security Risks With The Internet Of Things, Faith Mosemann

Senior Honors Theses

For my honors thesis I have decided to study the security risks associated with the Internet of Things (IoT) and possible ways to secure them. I will focus on how corporate, and individuals use IoT devices and the security risks that come with their implementation. In my research, I found out that IoT gadgets tend to go unnoticed as a checkpoint for vulnerability. For example, often personal IoT devices tend to have the default username and password issued from the factory that a hacker could easily find through Google. IoT devices need security just as much as computers or servers …


Reflecting On Recurring Failures In Iot Development, Dharun Anandayuvaraj, James C. Davis Jan 2022

Reflecting On Recurring Failures In Iot Development, Dharun Anandayuvaraj, James C. Davis

Department of Electrical and Computer Engineering Faculty Publications

As IoT systems are given more responsibility and autonomy, they offer greater benefits, but also carry greater risks. We believe this trend invigorates an old challenge of software engineering: how to develop high-risk software-intensive systems safely and securely under market pressures? As a first step, we conducted a systematic analysis of recent IoT failures to identify engineering challenges. We collected and analyzed 22 news reports and studied the sources, impacts, and repair strategies of failures in IoT systems. We observed failure trends both within and across application domains. We also observed that failure themes have persisted over time. To alleviate …


An Analysis On Network Flow-Based Iot Botnet Detection Using Weka, Cian Porteous Jan 2022

An Analysis On Network Flow-Based Iot Botnet Detection Using Weka, Cian Porteous

Dissertations

Botnets pose a significant and growing risk to modern networks. Detection of botnets remains an important area of open research in order to prevent the proliferation of botnets and to mitigate the damage that can be caused by botnets that have already been established. Botnet detection can be broadly categorised into two main categories: signature-based detection and anomaly-based detection. This paper sets out to measure the accuracy, false-positive rate, and false-negative rate of four algorithms that are available in Weka for anomaly-based detection of a dataset of HTTP and IRC botnet data. The algorithms that were selected to detect botnets …


Machine Learning Meets Internet Of Things: From Theory To Practice, Bharath Sudharsan, Pankesh Patel Apr 2021

Machine Learning Meets Internet Of Things: From Theory To Practice, Bharath Sudharsan, Pankesh Patel

Publications

Standalone execution of problem-solving Artificial Intelligence (AI) on IoT devices produces a higher level of autonomy and privacy. This is because the sensitive user data collected by the devices need not be transmitted to the cloud for inference. The chipsets used to design IoT devices are resource-constrained due to their limited memory footprint, fewer computation cores, and low clock speeds. These limitations constrain one from deploying and executing complex problem-solving AI (usually an ML model) on IoT devices. Since there is a high potential for building intelligent IoT devices, in this tutorial, we teach researchers and developers; (i) How to …


A Bibliometric Analysis On Optimization Of Application Layer Protocols In The Internet Of Things, Sagar Jaikar Jan 2021

A Bibliometric Analysis On Optimization Of Application Layer Protocols In The Internet Of Things, Sagar Jaikar

Library Philosophy and Practice (e-journal)

Internet of Things (IoT), getting popular day by day, thanks to the every object that has been made intelligent and started communicated among themselves with ease. These objects are equipped with sensors and capable of connecting and exchanging the application data over the Internet. While the application data is getting exchanged among these intelligent objects smoothly, there are various concerns with these intelligent objects like they are constrained when it comes to resources like memory, processing capability, power consumption etc. In this regard many attempts are made to enhance or to optimize existing messaging protocols so that we can get …


Demystifying Artificial Intelligence Based Digital Twins In Manufacturing- A Bibliometric Analysis Of Trends And Techniques, Satish Kumar, Shruti Patil, Arunkumar Bongale, Ketan Kotecha, Anup Kumar M. Bongale, Pooja Kamat Nov 2020

Demystifying Artificial Intelligence Based Digital Twins In Manufacturing- A Bibliometric Analysis Of Trends And Techniques, Satish Kumar, Shruti Patil, Arunkumar Bongale, Ketan Kotecha, Anup Kumar M. Bongale, Pooja Kamat

Library Philosophy and Practice (e-journal)

Nowadays, data is considered as a new life force for operations of physical systems in various domains such as manufacturing, healthcare, transportations, etc. However, the hugely generated data, which mirrors the working essence of the product life cycle, is still underutilised. Digital Twin (DT), a collective representation of active and passive captured data, is a virtual counterpart of the physical resources that could help prevent effective preventive maintenance in any applied domain. Currently, lots of research is going on about the applicability of digital twin in smart IOT based manufacturing industry 4.0 environment. Still, it lacks a formal study, which …


A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jaouad A. Mouloud Oct 2020

A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jaouad A. Mouloud

Information Science Faculty Publications

The privacy of users and information are becoming increasingly important with the growth and pervasive use of mobile devices such as wearables, mobile phones, drones, and Internet of Things (IoT) devices. Today many of these mobile devices are equipped with cameras which enable users to take pictures and record videos anytime they need to do so. In many such cases, bystanders’ privacy is not a concern, and as a result, audio and video of bystanders are often captured without their consent. We present results from a user study in which 21 participants were asked to use a wearable system called …


Zero-Bias Deep Learning For Accurate Identification Of Internet Of Things (Iot) Devices, Yongxin Liu, Houbing Song, Thomas Yang, Jian Wang, Jianqiang Li, Shuteng Niu, Zhong Ming Aug 2020

Zero-Bias Deep Learning For Accurate Identification Of Internet Of Things (Iot) Devices, Yongxin Liu, Houbing Song, Thomas Yang, Jian Wang, Jianqiang Li, Shuteng Niu, Zhong Ming

Publications

The Internet of Things (IoT) provides applications and services that would otherwise not be possible. However, the open nature of IoT makes it vulnerable to cybersecurity threats. Especially, identity spoofing attacks, where an adversary passively listens to the existing radio communications and then mimic the identity of legitimate devices to conduct malicious activities. Existing solutions employ cryptographic signatures to verify the trustworthiness of received information. In prevalent IoT, secret keys for cryptography can potentially be disclosed and disable the verification mechanism. Noncryptographic device verification is needed to ensure trustworthy IoT. In this article, we propose an enhanced deep learning framework …


Decision Agriculture, Abdul Salam, Usman Raza Aug 2020

Decision Agriculture, Abdul Salam, Usman Raza

Faculty Publications

In this chapter, the latest developments in the field of decision agriculture are discussed. The practice of management zones in digital agriculture is described for efficient and smart faming. Accordingly, the methodology for delineating management zones is presented. Modeling of decision support systems is explained along with discussion of the issues and challenges in this area. Moreover, the precision agriculture technology is also considered. Moreover, the chapter surveys the state of the decision agriculture technologies in the countries such as Bulgaria, Denmark, France, Israel, Malaysia, Pakistan, United Kingdom, Ukraine, and Sweden. Finally, different field factors such as GPS accuracy and …


Underground Phased Arrays And Beamforming Applications, Abdul Salam, Usman Raza Aug 2020

Underground Phased Arrays And Beamforming Applications, Abdul Salam, Usman Raza

Faculty Publications

This chapter presents a framework for adaptive beamforming in underground communication. The wireless propagation is thoroughly analyzed to develop a model using the soil moisture as an input parameter to provide feedback mechanism while enhancing the system performance. The working of array element in the soil is analyzed. Moreover, the effect of soil texture and soil moisture on the resonant frequency and return loss is studied in detail. The wave refraction from the soil–air interface highly degrades the performance of the system. Furthermore, to beam steering is done to achieve high gain for lateral component improving the UG communication. The …


Signals In The Soil: Underground Antennas, Abdul Salam, Usman Raza Aug 2020

Signals In The Soil: Underground Antennas, Abdul Salam, Usman Raza

Faculty Publications

Antenna is a major design component of Internet of Underground Things (IOUT) communication system. The use of antenna, in IOUT, differs from traditional communication in that it is buried in the soil. Therefore, one of the main challenges, in IOUT applications, is to establish a reliable communication. To that end, there is a need of designing an underground-specific antenna. Three major factors that can impact the performance of a buried antenna are: (1) effect of high soil permittivity changes the wavelength of EM waves, (2) variations in soil moisture with time affecting the permittivity of the soil, and (3) difference …


Soil Moisture And Permittivity Estimation, Abdul Salam, Usman Raza Aug 2020

Soil Moisture And Permittivity Estimation, Abdul Salam, Usman Raza

Faculty Publications

The soil moisture and permittivity estimation is vital for the success of the variable rate approaches in the field of the decision agriculture. In this chapter, the development of a novel permittivity estimation and soil moisture sensing approach is presented. The empirical setup and experimental methodology for the power delay measurements used in model are introduced. Moreover, the performance analysis is explained that includes the model validation and error analysis. The transfer functions are reported as well for soil moisture and permittivity estimation. Furthermore, the potential applications of the developed approach in different disciplines are also examined.


Current Advances In Internet Of Underground Things, Abdul Salam, Usman Raza Aug 2020

Current Advances In Internet Of Underground Things, Abdul Salam, Usman Raza

Faculty Publications

The latest developments in Internet of Underground Things are covered in this chapter. First, the IOUT Architecture is discussed followed by the explanation of the challenges being faced in this paradigm. Moreover, a comprehensive coverage of the different IOUT components is presented that includes communications, sensing, and system integration with the cloud. An in-depth coverage of the applications of the IOUT in various disciplines is also surveyed. These applications include areas such as decision agriculture, pipeline monitoring, border control, and oil wells.


Signals In The Soil: Subsurface Sensing, Abdul Salam, Usman Raza Aug 2020

Signals In The Soil: Subsurface Sensing, Abdul Salam, Usman Raza

Faculty Publications

In this chapter, novel subsurface soil sensing approaches are presented for monitoring and real-time decision support system applications. The methods, materials, and operational feasibility aspects of soil sensors are explored. The soil sensing techniques covered in this chapter include aerial sensing, in-situ, proximal sensing, and remote sensing. The underlying mechanism used for sensing is also examined as well. The sensor selection and calibration techniques are described in detail. The chapter concludes with discussion of soil sensing challenges.


Autonomous Irrigation Management In Decision Agriculture, Abdul Salam, Usman Raza Aug 2020

Autonomous Irrigation Management In Decision Agriculture, Abdul Salam, Usman Raza

Faculty Publications

In this chapter, the important application of autonomous irrigation management in the field decision agriculture is discussed. The different types of sensor-guided irrigation systems are presented that includes center pivot systems and drip irrigation systems. Their sensing and actuator components are with detailed focus on real-time decision-making and integration to the cloud. This chapter also presents irrigation control systems which takes, as an input, soil moisture and temperature from IOUT and weather data from Internet and communicate with center pivot based irrigation systems. Moreover, the system architecture is explored where development of the nodes including sensing and actuators is presented. …


Variable Rate Applications In Decision Agriculture, Abdul Salam, Usman Raza Aug 2020

Variable Rate Applications In Decision Agriculture, Abdul Salam, Usman Raza

Faculty Publications

In this chapter, the variable rate applications (VRA) are presented for the field of decision agriculture. The characteristics of VRA control systems are described along with control hardware. Different types of VRA systems are discussed (e.g., liquid VRA systems and dry VRA systems). A case study is also explored in this regard. Moreover, recent advances and future trends are also outlined. Accordingly, a sustainable variable-rate irrigation scheduling is studied where different hardware and software component of the cyber-physical system are considered. Finally, chapter is concluded with a novel sensor deployment methodology.


How Can 5g Make Our Lives Better?, Firas Slewa Dawod Aug 2020

How Can 5g Make Our Lives Better?, Firas Slewa Dawod

English Language Institute

Our lives will be significantly improved with the advent of the new cellular wireless technology due to all its new features and applications. This Poster discusses the main features and application of 5G technology and its positive impact on society, in particular facilitating interactive and smart communities.


Sensing, Computing, And Communications For Energy Harvesting Iots: A Survey, Dong Ma, Guohao Lan, Mahbub Hassan, Wen Hu, Sajal K. Das Jun 2020

Sensing, Computing, And Communications For Energy Harvesting Iots: A Survey, Dong Ma, Guohao Lan, Mahbub Hassan, Wen Hu, Sajal K. Das

Research Collection School Of Computing and Information Systems

With the growing number of deployments of Internet of Things (IoT) infrastructure for a wide variety of applications, the battery maintenance has become a major limitation for the sustainability of such infrastructure. To overcome this problem, energy harvesting offers a viable alternative to autonomously power IoT devices, resulting in a number of battery-less energy harvesting IoTs (or EH-IoTs) appearing in the market in recent years. Standards activities are also underway, which involve wireless protocol design suitable for EH-IoTs as well as testing procedures for various energy harvesting methods. Despite the early commercial and standards activities, IoT sensing, computing and communications …


Reputation-Aware Trajectory-Based Data Mining In The Internet Of Things (Iot), Samia Tasnim Nov 2019

Reputation-Aware Trajectory-Based Data Mining In The Internet Of Things (Iot), Samia Tasnim

FIU Electronic Theses and Dissertations

Internet of Things (IoT) is a critically important technology for the acquisition of spatiotemporally dense data in diverse applications, ranging from environmental monitoring to surveillance systems. Such data helps us improve our transportation systems, monitor our air quality and the spread of diseases, respond to natural disasters, and a bevy of other applications. However, IoT sensor data is error-prone due to a number of reasons: sensors may be deployed in hazardous environments, may deplete their energy resources, have mechanical faults, or maybe become the targets of malicious attacks by adversaries. While previous research has attempted to improve the quality of …


Trajectory Privacy Preservation And Lightweight Blockchain Techniques For Mobility-Centric Iot, Abdur Bin Shahid Nov 2019

Trajectory Privacy Preservation And Lightweight Blockchain Techniques For Mobility-Centric Iot, Abdur Bin Shahid

FIU Electronic Theses and Dissertations

Various research efforts have been undertaken to solve the problem of trajectory privacy preservation in the Internet of Things (IoT) of resource-constrained mobile devices. Most attempts at resolving the problem have focused on the centralized model of IoT, which either impose high delay or fail against a privacy-invading attack with long-term trajectory observation. These proposed solutions also fail to guarantee location privacy for trajectories with both geo-tagged and non-geo-tagged data, since they are designed for geo-tagged trajectories only. While a few blockchain-based techniques have been suggested for preserving trajectory privacy in decentralized model of IoT, they require large storage capacity …


Predicting The Hardness Of Turf Surfaces From A Soil Moisture Sensor Using Iot Technologies, Ann Marie Mckeon Sep 2019

Predicting The Hardness Of Turf Surfaces From A Soil Moisture Sensor Using Iot Technologies, Ann Marie Mckeon

Other

In horseracing, “the going” is a term to describe the racetrack ground conditions. In Ireland presently, a groundskeeper or course clerk walks the racecourse poking it with a blackthorn stick, assesses conditions, and declares the going – it is a subjective measurement.

This thesis will propose using remote low-cost soil moisture sensors to gather high frequency data about the soil water content in the ground and to enable informed decisions to be made. This will remove the subjective element from the ground hardness, and look at the data in an objective way.

The soil moisture sensor will systematically collect high …


Iot Ignorance Is Digital Forensics Research Bliss: A Survey To Understand Iot Forensics Definitions, Challenges And Future Research Directions, Tina Wu, Frank Breitinger, Ibrahim Baggili Aug 2019

Iot Ignorance Is Digital Forensics Research Bliss: A Survey To Understand Iot Forensics Definitions, Challenges And Future Research Directions, Tina Wu, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Interactions with IoT devices generates vast amounts of personal data that can be used as a source of evidence in digital investigations. Currently, there are many challenges in IoT forensics such as the difficulty in acquiring and analysing IoT data/devices and the lack IoT forensic tools. Besides technical challenges, there are many concepts in IoT forensics that have yet to be explored such as definitions, experience and capability in the analysis of IoT data/devices and current/future challenges. A deeper understanding of these various concepts will help progress the field. To achieve this goal, we conducted a survey which received 70 …


Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen Jul 2019

Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen

Publications

With the rapid development of Internet of Things, massive mobile intelligent terminals are ready to access edge servers for real-time data calculation and interaction. However, the risk of private data leakage follows simultaneously. As the administrator of all intelligent terminals in a region, the edge server needs to clarify the ability of the managed intelligent terminals to defend against malicious attacks. Therefore, the security level classification for mobile intelligent terminals before accessing the network is indispensable. In this paper, we firstly propose a safety assessment method to detect the weakness of mobile intelligent terminals. Secondly, we match the evaluation results …


The Scientific Information Exchange General Model At Digital Library Context: Internet Of Things, Nayere Soleimanzade, Asefeh Asemi, Mozafar Cheshmehsohrabi, Ahmad Shabani Jan 2019

The Scientific Information Exchange General Model At Digital Library Context: Internet Of Things, Nayere Soleimanzade, Asefeh Asemi, Mozafar Cheshmehsohrabi, Ahmad Shabani

Library Philosophy and Practice (e-journal)

Introduction: This paper aims to develop a Scientific Information Exchange General Model at Digital Library in Context of Internet of things, which would enable automated and efficient library services. To accomplish its objective, the main classes (Concepts), sub-classes, attributes are identified in order to introduce an appropriate model.

Methodology: The approach of this study is basic, exploratory, and developmental and is run through a mixed method consisting of documentary, Delphi, and data modeling methods. The study population in the documentary section includes the study of information resources retrieved in related subjects. The study population in the Delphi section is …


Machine Learning For Internet Of Things Data Analysis: A Survey, Mohammad Saeid Mahdavinejad, Mohammadreza Rezvan, Mohammadamin Barekatain, Peyman Adibi, Payam Barnaghi, Amit Sheth Aug 2018

Machine Learning For Internet Of Things Data Analysis: A Survey, Mohammad Saeid Mahdavinejad, Mohammadreza Rezvan, Mohammadamin Barekatain, Peyman Adibi, Payam Barnaghi, Amit Sheth

Publications

Rapid developments in hardware, software, and communication technologies have facilitated the emergence of Internet-connected sensory devices that provide observations and data measurements from the physical world. By 2020, it is estimated that the total number of Internet-connected devices being used will be between 25 and 50 billion. As these numbers grow and technologies become more mature, the volume of data being published will increase. The technology of Internet-connected devices, referred to as Internet of Things (IoT), continues to extend the current Internet by providing connectivity and interactions between the physical and cyber worlds. In addition to an increased volume, the …


Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally Jul 2018

Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally

Information Science Faculty Publications

One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments of small scale smart sensors in WBSNs, security, and privacy guarantees (e.g., security and safety-critical data, sensitive private information) are becoming a challenging issue because these sensor nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious tampering) using the secure hash algorithm 3 (SHA-3) when smart sensors in WBSNs communicate with each other using the Internet. Due to the limited resources (i.e., storage, …


A Simplified Secure Programming Platform For Internet Of Things Devices, Halim Burak Yesilyurt Jun 2018

A Simplified Secure Programming Platform For Internet Of Things Devices, Halim Burak Yesilyurt

FIU Electronic Theses and Dissertations

The emerging Internet of Things (IoT) revolution has introduced many useful applications that are utilized in our daily lives. Users can program these devices in order to develop their own IoT applications; however, the platforms and languages that are used during development are abounding, complicated, and time-consuming. The software solution provided in this thesis, PROVIZ+, is a secure sensor application development software suite that helps users create sophisticated and secure IoT applications with little software and hardware experience. Moreover, a simple and efficient domain-specific programming language, namely Panther language, was designed for IoT application development to unify existing programming languages. …


Forensic State Acquisition From Internet Of Things (Fsaiot): A General Framework And Practical Approach For Iot Forensics Through Iot Device State Acquisition, Christopher S. Meffert, Devon R. Clark, Ibrahim Baggili, Frank Breitinger Aug 2017

Forensic State Acquisition From Internet Of Things (Fsaiot): A General Framework And Practical Approach For Iot Forensics Through Iot Device State Acquisition, Christopher S. Meffert, Devon R. Clark, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

IoT device forensics is a difficult problem given that manufactured IoT devices are not standardized, many store little to no historical data, and are always connected; making them extremely volatile. The goal of this paper was to address these challenges by presenting a primary account for a general framework and practical approach we term Forensic State Acquisition from Internet of Things (FSAIoT). We argue that by leveraging the acquisition of the state of IoT devices (e.g. if an IoT lock is open or locked), it becomes possible to paint a clear picture of events that have occurred. To this end, …