Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet of Things

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 129

Full-Text Articles in Engineering

Shape Memory Alloy Capsule Micropump For Drug Delivery Applications, Youssef Mohamed Kotb Jun 2024

Shape Memory Alloy Capsule Micropump For Drug Delivery Applications, Youssef Mohamed Kotb

Theses and Dissertations

Implantable drug delivery devices have many benefits over traditional drug administration techniques and have attracted a lot of attention in recent years. By delivering the medication directly to the tissue, they enable the use of larger localized concentrations, enhancing the efficacy of the treatment. Passive-release drug delivery systems, one of the various ways to provide medication, are great inventions. However, they cannot dispense the medication on demand since they are nonprogrammable. Therefore, active actuators are more advantageous in delivery applications. Smart material actuators, however, have greatly increased in popularity for manufacturing wearable and implantable micropumps due to their high energy …


Security Fusion Method Of Physical Fitness Training Data Based On The Internet Of Things, Bin Zhou May 2024

Security Fusion Method Of Physical Fitness Training Data Based On The Internet Of Things, Bin Zhou

Turkish Journal of Electrical Engineering and Computer Sciences

Physical fitness training, an important way to improve physical fitness, is the basic guarantee for forming combat effectiveness. At present, the evaluation types of physical fitness training are mostly conducted manually. It has problems such as low efficiency, high consumption of human and material resources, and subjective factors affecting the evaluation results. ”Internet+” has greatly expanded the traditional network from the perspective of technological convergence and network coverage objects. It has expedited and promoted the rapid development of Internet of Things (IoT) technology and its applications. The IoT with many sensor nodes shows the characteristics of acquisition information redundancy, node …


Improving Wifi Sensor Network Security Through Unassociated Device Communication Using Wireless Latency Shift Keying, Jacob Edward Johnson Apr 2024

Improving Wifi Sensor Network Security Through Unassociated Device Communication Using Wireless Latency Shift Keying, Jacob Edward Johnson

Theses and Dissertations

IEEE 802.11 (WiFi) only has two modes of trust--complete trust or complete untrust. The lack of nuance leaves no room for sensors that a user does not fully trust, but wants to connect to their network, such as a WiFi sensor. Solutions exist, but they require advanced knowledge of network administration. We solve this problem by introducing a new way of modulating data in the latency of the network, called Latency Shift Keying. We use specific characteristics of the WiFi protocol to carefully control the latency of just one device on the network. We build a transmitter, receiver, and modulation …


Smart Agriculture Based On Iot Using Drones: A Survey, Shymaa G. Eladl, Hanaa Y. Zaineldin, Amira Y. Haikal, Mahmoud M. Saafan Jan 2024

Smart Agriculture Based On Iot Using Drones: A Survey, Shymaa G. Eladl, Hanaa Y. Zaineldin, Amira Y. Haikal, Mahmoud M. Saafan

Mansoura Engineering Journal

Researchers have studied the potential of unmanned aerial vehicles (UAVs) for real-time visual data acquisition and processing using potent deep learning (DL) algorithms over the past few decades. In this regard, drone use in smart cities has become one of the most common uses for them in recent years. UAVs and the Internet of Things (IoTs) are two popular technologies being used in smart agriculture that are ushering in a new era of agriculture by replacing traditional farming methods. The combination of drones and IoT has the potential to drastically change our lives through real-time data collection and analysis that …


Securing Internet Of Things (Iot) Data Storage, Savannah Malo Jan 2024

Securing Internet Of Things (Iot) Data Storage, Savannah Malo

Honors Theses and Capstones

Internet of Things (IoT) devices are commonly known to be susceptible to security attacks, which can lead to the leakage, theft, or erasure of data. Despite similar attack methods used on conventional technologies, IoT devices differ in how they consist of a small amount of hardware, limited networking capability, and utilize NoSQL databases. IoT solutions prefer NoSQL databases since they are compatible for larger datasets, unstructured and time-series data. However, these implementations are less likely to employ critical security features, like authentication, authorization, and encryption. The purpose of this project is to understand why those security measures are not strictly …


Multi-Dimensional Qos And Collaborative Mac Layer Design For Dense, Diverse, And Dynamic Iot Network, Jiyang Bai Dec 2023

Multi-Dimensional Qos And Collaborative Mac Layer Design For Dense, Diverse, And Dynamic Iot Network, Jiyang Bai

Electronic Thesis and Dissertation Repository

With the ubiquitous proliferation of Internet of Thing (IoT) devices, Access Points (APs) of future Wireless Fidelity (Wi-Fi) networks are expected to support dense Stations (STAs) with diverse Quality-of-Service (QoS) requirements under dynamic channel conditions. On account of high access collision and optimization problem complexity, the performance degradation brings new challenges to the existing Media Access Control (MAC) layer design in Wi-Fi. This thesis proposes novel technologies to enable low-latency high-performance MAC layer designs, which support dense access of STAs with real-time solutions of resource allocation and link adaptation problems. Both grouping and collaborative architectures are utilized based on game …


Renovating The Ipmu Via Internet Of Things For Pollutant Emission Estimations In Poultry Facilities, Joshua Dotto Dec 2023

Renovating The Ipmu Via Internet Of Things For Pollutant Emission Estimations In Poultry Facilities, Joshua Dotto

Department of Biological Systems Engineering: Dissertations and Theses

The emissions of ammonia (NH3), particulate matter (PM2.5), and carbon dioxide (CO2) are major concerns in poultry facilities. They can pose environmental concerns and nuances. Robust and affordable measurement systems are needed to accurately measure in-barn concentrations and quantify the emissions.

The Intelligent Portable Monitoring Unit (iPMU or PMU3) developed in 2016 was reconstructed into PMU4 to include upgraded NH3 and PM2.5 sensors and wireless connectivity for a low-cost, robust, and accurate air quality monitoring device with contactless data transfer using the concept of Internet of Things (IoT). In addition, a user-friendly …


Digitizing Work Instructions Through Technology Using Internet Of Things (Iot), Priscila Balanzar Almazan May 2023

Digitizing Work Instructions Through Technology Using Internet Of Things (Iot), Priscila Balanzar Almazan

Open Access Theses & Dissertations

Smart manufacturing is fundamentally changing the industry so fast; for this reason, modern industrial processes must be intelligently and digitally automated. Digitalization of work instructions has taken an important role in improving the efficiency of industry and traditional manufacturing processes. TULIP is a frontline operations platform that allows users to digitize operations using friendly apps that operators can deploy in their daily shopfloor processes. This Industry 4.0 tool is important because it optimizes the development of processes by enabling IoT with the use of sensors, connectors, and machines to collect real-time production data. In this research, a manufacturing station equipped …


Enhanced Iot-Based Electrocardiogram Monitoring System With Deep Learning, Jian Ni May 2023

Enhanced Iot-Based Electrocardiogram Monitoring System With Deep Learning, Jian Ni

UNLV Theses, Dissertations, Professional Papers, and Capstones

Due to the rapid development of computing and sensing technologies, Internet of Things (IoT)-based cardiac monitoring plays a crucial role in providing patients with cost-efficient solutions for long-term, continuous, and pervasive electrocardiogram (ECG) monitoring outside a hospital setting. In a typical IoT-based ECG monitoring system, ECG signals are picked up by sensors located on the edge, and then uploaded to the remote cloud servers. ECG interpretation is performed for the collected ECGs in the cloud servers and the analysis results can be made instantly available to the patients as well as their healthcare providers.In this dissertation, we first examine the …


Proposed Mitigation Framework For The Internet Of Insecure Things, Mahmoud M. Elgindy, Sally M. Elghamrawy, Ali I. El-Desouky Apr 2023

Proposed Mitigation Framework For The Internet Of Insecure Things, Mahmoud M. Elgindy, Sally M. Elghamrawy, Ali I. El-Desouky

Mansoura Engineering Journal

Intrusion detection systems IDS are increasingly utilizing machine learning methods. IDSs are important tools for ensuring the security of network data and resources. The Internet of Things (IoT) is an expanding network of intelligent machines and sensors. However, they are vulnerable to attackers because of the ubiquitous and extensive IoT networks. Datasets from intrusion detection systems (IDS) have been analyzed deep learning methods such as Bidirectional long-short term memory (BiLSTM). This research presents an BiLSTM intrusion detection framework with Principal Component Analysis PCA (PCA-LSTM-IDS). The PCA-LSTM-IDS is comprised of two layers: extracting layer which using PCA, and the anomaly BiLSTM …


Systems Thinking As A Method For Leveraging Smart Classrooms, Jazmyne V. Del Hierro Apr 2023

Systems Thinking As A Method For Leveraging Smart Classrooms, Jazmyne V. Del Hierro

Open Access Theses & Dissertations

Digital technologies have revolutionized enterprises across our personal lives, and most major industries. The digital transformation can be considered a strategic response to digital trends (Vial, 2019), encompassing substantial changes in society and industry caused by technology development (Taj, et al., 2010). It is a complex journey that needs to be guided by clear strategy. Digital transformation is more about people, than it is about technology (Frankiewiczz, B., 2020). It requires organizational changes that are backed by leadership and driven by challenges to culture (Abbu, H., 2022). Digital transformation requires leaders to build trust (Mugge, Abbu, and Gudergan 2021; Gudergan …


Distributed Detection Over Blockchain-Aided Internet Of Things In The Presence Of Attacks, Yiming Jiang, Jiangfan Zhang Jan 2023

Distributed Detection Over Blockchain-Aided Internet Of Things In The Presence Of Attacks, Yiming Jiang, Jiangfan Zhang

Electrical and Computer Engineering Faculty Research & Creative Works

Distributed detection over a blockchain-aided Internet of Things (BIoT) network in the presence of attacks is considered, where the integrated blockchain is employed to secure data exchanges over the BIoT as well as data storage at the agents of the BIoT. We consider a general adversary model where attackers jointly exploit the vulnerability of IoT devices and that of the blockchain employed in the BIoT. The optimal attacking strategy which minimizes the Kullback-Leibler divergence is pursued. It can be shown that this optimization problem is nonconvex, and hence it is generally intractable to find the globally optimal solution to such …


Development Of A Data Science Curriculum For An Engineering Technology Program, Salih Sarp, Murat Kuzlu, Otilia Popescu, Vukica M. Jovanovic, Zafer Acar Jan 2023

Development Of A Data Science Curriculum For An Engineering Technology Program, Salih Sarp, Murat Kuzlu, Otilia Popescu, Vukica M. Jovanovic, Zafer Acar

Engineering Technology Faculty Publications

Data science has gained the attention of various industries, educators, parents, and students thinking about their future careers. Statistics departments have traditionally offered data science courses for a long time. The main objective of these courses is to examine the fundamental concepts and theories. However, teaching data science courses has also expanded to other disciplines due to the vast amount of data being collected by numerous modern applications. Also, someone needs to learn how to collect and process data, especially from industrial devices, because of the recent development of Internet of Things (IoT) technologies. Hence, integrating data science into the …


Opportunities Of Iot In Fog Computing For High Fault Tolerance And Sustainable Energy Optimization, A. Reyana, Sandeep Kautish, Khalid Abdulaziz Alnowibet, Hossam Zawbaa, Ali Wagdy Mohamed Jan 2023

Opportunities Of Iot In Fog Computing For High Fault Tolerance And Sustainable Energy Optimization, A. Reyana, Sandeep Kautish, Khalid Abdulaziz Alnowibet, Hossam Zawbaa, Ali Wagdy Mohamed

Articles

Today, the importance of enhanced quality of service and energy optimization has promoted research into sensor applications such as pervasive health monitoring, distributed computing, etc. In general, the resulting sensor data are stored on the cloud server for future processing. For this purpose, recently, the use of fog computing from a real-world perspective has emerged, utilizing end-user nodes and neighboring edge devices to perform computation and communication. This paper aims to develop a quality-of-service-based energy optimization (QoS-EO) scheme for the wireless sensor environments deployed in fog computing. The fog nodes deployed in specific geographical areas cover the sensor activity performed …


A Provable Secure And Efficient Authentication Framework For Smart Manufacturing Industry, Muhammad Hammad, Akhtar Badshah, Ghulam Abbas, Hisham Alasmary, Muhammad Waqas, Wasim A. Khan Jan 2023

A Provable Secure And Efficient Authentication Framework For Smart Manufacturing Industry, Muhammad Hammad, Akhtar Badshah, Ghulam Abbas, Hisham Alasmary, Muhammad Waqas, Wasim A. Khan

Research outputs 2022 to 2026

Smart manufacturing is transforming the manufacturing industry by enhancing productivity and quality, driving growth in the global economy. The Internet of Things (IoT) has played a crucial role in realizing Industry 4.0, where machines can communicate and interact in real-time. Despite these advancements, security remains a major challenge in developing and deploying smart manufacturing. As cyber-attacks become more prevalent, researchers are making security a top priority. Although IoT and Industrial IoT (IIoT) are used to establish smart industries, these systems remain vulnerable to various types of attacks. To address these security issues, numerous authentication methods have been proposed. However, many …


Human Blood Grup And Rhesus Detection Tool Prototype Design Based On Iot, Trisiani Dewi Hendrawati, Inzaghi Hasanudin Dec 2022

Human Blood Grup And Rhesus Detection Tool Prototype Design Based On Iot, Trisiani Dewi Hendrawati, Inzaghi Hasanudin

Elinvo (Electronics, Informatics, and Vocational Education)

Currently, medical practitioners carry out blood type and rhesus examinations by directly observing the agglutination reaction and depending on the examiner's eye. Meanwhile, the effects of eye fatigue and saturation will cause inaccurate data. Therefore, a detection device was made which aims to display information about reading human blood type and rhesus on a digital display which can also store the data into a database. The ABO and rhesus systems were used in this study. This research was made using a real-time method based on the internet of things (IoT). sending data in real-time using WiFi Module ESP-01 and other …


Recent Technical Breakthroughs Enable Smart Manufacturing: A Review, Manish Kumar, Shanu Pandey, Kanchan Upadhyay, Pritibala Taunk, Raunak Kumar Tamrakar Dec 2022

Recent Technical Breakthroughs Enable Smart Manufacturing: A Review, Manish Kumar, Shanu Pandey, Kanchan Upadhyay, Pritibala Taunk, Raunak Kumar Tamrakar

Al-Bahir Journal for Engineering and Pure Sciences

In human culture, machine learning has long been used to address complicated issues. Machine learning is successful because of the help provided by computational power and sensing technology. Data-driven strategies and the development of artificial intelligence will soon have a significant impact on the industry. Common examples include search engines, picture recognition, biometrics, speech and handwriting recognition, natural language processing, as well as medical diagnostics and credit scores. It is obvious that when artificial intelligence permeates our globe and, more precisely, our lives, numerous challenges will become public. According to predictions, Industry 4.0 or Smart Manufacturing will be the next …


Investigation Into The Economic Viability Of Industry 4.0 Practices In A Small Start-Up Setting: A Case Study, Joseph Lindley Dec 2022

Investigation Into The Economic Viability Of Industry 4.0 Practices In A Small Start-Up Setting: A Case Study, Joseph Lindley

Open Access Theses & Dissertations

Industry 4.0 has been a hot button topic since the first rumouringâ??s of a fourth industrial revolution taking place in the early 2010s. Since that time many companies have attempted to transform their process, procedures, and systems to become streamlined, efficient, and overall, more profitable. An example of this can be seen in companies such as Microsoft and IBM, Mitsubishi and Siemens who have gained a stronger foothold in their respective markets by their efficient implementation of Industry 4.0. Before we can address how small start-up companies can begin to compete with these behemoths, we must address the question; what …


Low Overhead And Application-Oriented Synchronization In Heterogeneous Internet Of Things Systems, Haide Wang Nov 2022

Low Overhead And Application-Oriented Synchronization In Heterogeneous Internet Of Things Systems, Haide Wang

Electronic Thesis and Dissertation Repository

Recent evolution in the Internet of Things (IoT) and Cyber–physical systems (CPS) is expected to change everyday life of its users by enabling low latency and reliable communication, coordinated task execution and real time data processing among pervasive intelligence through the communication network. Precise time synchronization, as a prerequisite for a chronological ordering of information or synchronous execution, has become a vital constituent for many time-sensitive applications.

On one hand, Internet of Things (IoT) systems rely heavily on the temporal coherence among its distributed constituents during data fusion and analysis, however the existing solutions for data synchronization, do not easily …


Optimized And Automated Machine Learning Techniques Towards Iot Data Analytics And Cybersecurity, Li Yang Aug 2022

Optimized And Automated Machine Learning Techniques Towards Iot Data Analytics And Cybersecurity, Li Yang

Electronic Thesis and Dissertation Repository

The Internet-of-Things (IoT) systems have emerged as a prevalent technology in our daily lives. With the wide spread of sensors and smart devices in recent years, the data generation volume and speed of IoT systems have increased dramatically. In most IoT systems, massive volumes of data must be processed, transformed, and analyzed on a frequent basis to enable various IoT services and functionalities. Machine Learning (ML) approaches have shown their capacity for IoT data analytics. However, applying ML models to IoT data analytics tasks still faces many difficulties and challenges. The first challenge is to process large amounts of dynamic …


Monitoring Of Renewable Energy Systems By Iot-Aided Scada System, Ohirul Qays, Musse M. Ahmed, M. A. Parvez Mahmud, Ahmed Abu-Siada, S. M. Muyeen, Liton Hossain, Farhana Yasmin, Momtazur Rahman Jun 2022

Monitoring Of Renewable Energy Systems By Iot-Aided Scada System, Ohirul Qays, Musse M. Ahmed, M. A. Parvez Mahmud, Ahmed Abu-Siada, S. M. Muyeen, Liton Hossain, Farhana Yasmin, Momtazur Rahman

Research outputs 2022 to 2026

With the rapid increase of renewable energy generation worldwide, real-time information has become essential to manage such assets, especially for systems installed offshore and in remote areas. To date, there is no cost-effective condition monitoring technique that can assess the state of renewable energy sources in real-time and provide suitable asset management decisions to optimize the utilization of such valuable assets and avoid any full or partial blackout due to unexpected faults. Based on the Internet of Things scheme, this paper represents a new application for the Supervisory Control and Data Acquisition (SCADA) system to monitor a hybrid system comprising …


Graph-Based Heuristic Solution For Placing Distributed Video Processing Applications On Moving Vehicle Clusters, Kanika Sharma, Bernard Butler, Brendan Jennings May 2022

Graph-Based Heuristic Solution For Placing Distributed Video Processing Applications On Moving Vehicle Clusters, Kanika Sharma, Bernard Butler, Brendan Jennings

Articles

Vehicular fog computing (VFC) is envisioned as an extension of cloud and mobile edge computing to utilize the rich sensing and processing resources available in vehicles. We focus on slow-moving cars that spend a significant time in urban traffic congestion as a potential pool of onboard sensors, video cameras, and processing capacity. For leveraging the dynamic network and processing resources, we utilize a stochastic mobility model to select nodes with similar mobility patterns. We then design two distributed applications that are scaled in real-time and placed as multiple instances on selected vehicular fog nodes. We handle the unstable vehicular environment …


The Applications Of The Internet Of Things In The Medical Field, Cody Repass May 2022

The Applications Of The Internet Of Things In The Medical Field, Cody Repass

Theses and Dissertations

The Internet of Things (IoT) paradigm promises to make “things” include a more generic set of entities such as smart devices, sensors, human beings, and any other IoT objects to be accessible at anytime and anywhere. IoT varies widely in its applications, and one of its most beneficial uses is in the medical field. However, the large attack surface and vulnerabilities of IoT systems needs to be secured and protected. Security is a requirement for IoT systems in the medical field where the Health Insurance Portability and Accountability Act (HIPAA) applies.

This work investigates various applications of IoT in healthcare …


Assessing Security Risks With The Internet Of Things, Faith Mosemann Apr 2022

Assessing Security Risks With The Internet Of Things, Faith Mosemann

Senior Honors Theses

For my honors thesis I have decided to study the security risks associated with the Internet of Things (IoT) and possible ways to secure them. I will focus on how corporate, and individuals use IoT devices and the security risks that come with their implementation. In my research, I found out that IoT gadgets tend to go unnoticed as a checkpoint for vulnerability. For example, often personal IoT devices tend to have the default username and password issued from the factory that a hacker could easily find through Google. IoT devices need security just as much as computers or servers …


Exploiting The Iot Through Network-Based Covert Channels, Kyle S. Harris Mar 2022

Exploiting The Iot Through Network-Based Covert Channels, Kyle S. Harris

Theses and Dissertations

Information leaks are a top concern to industry and government leaders. The IoT is a technology capable of sensing real-world events. A method for exfiltrating data from these devices is by covert channel. This research designs a novel IoT CTC without the need for inter-packet delays to encode data. Instead, it encodes data within preexisting network information, namely ports or addresses. Additionally, the CTC can be implemented in two different modes: Stealth and Bandwidth. Performance is measured using throughput and detectability. The Stealth methods mimic legitimate traffic captures while the Bandwidth methods forgo this approach for maximum throughput. Detection results …


An Intelligent Distributed Ledger Construction Algorithm For Iot, Charles Rawlins, Jagannathan Sarangapani Jan 2022

An Intelligent Distributed Ledger Construction Algorithm For Iot, Charles Rawlins, Jagannathan Sarangapani

Electrical and Computer Engineering Faculty Research & Creative Works

Blockchain is the next generation of secure data management that creates near-immutable decentralized storage. Secure cryptography created a niche for blockchain to provide alternatives to well-known security compromises. However, design bottlenecks with traditional blockchain data structures scale poorly with increased network usage and are extremely computation-intensive. This made the technology difficult to combine with limited devices, like those in Internet of Things networks. In protocols like IOTA, replacement of blockchain's linked-list queue processing with a lightweight dynamic ledger showed remarkable throughput performance increase. However, current stochastic algorithms for ledger construction suffer distinct trade-offs between efficiency and security. This work proposed …


Reflecting On Recurring Failures In Iot Development, Dharun Anandayuvaraj, James C. Davis Jan 2022

Reflecting On Recurring Failures In Iot Development, Dharun Anandayuvaraj, James C. Davis

Department of Electrical and Computer Engineering Faculty Publications

As IoT systems are given more responsibility and autonomy, they offer greater benefits, but also carry greater risks. We believe this trend invigorates an old challenge of software engineering: how to develop high-risk software-intensive systems safely and securely under market pressures? As a first step, we conducted a systematic analysis of recent IoT failures to identify engineering challenges. We collected and analyzed 22 news reports and studied the sources, impacts, and repair strategies of failures in IoT systems. We observed failure trends both within and across application domains. We also observed that failure themes have persisted over time. To alleviate …


An Analysis On Network Flow-Based Iot Botnet Detection Using Weka, Cian Porteous Jan 2022

An Analysis On Network Flow-Based Iot Botnet Detection Using Weka, Cian Porteous

Dissertations

Botnets pose a significant and growing risk to modern networks. Detection of botnets remains an important area of open research in order to prevent the proliferation of botnets and to mitigate the damage that can be caused by botnets that have already been established. Botnet detection can be broadly categorised into two main categories: signature-based detection and anomaly-based detection. This paper sets out to measure the accuracy, false-positive rate, and false-negative rate of four algorithms that are available in Weka for anomaly-based detection of a dataset of HTTP and IRC botnet data. The algorithms that were selected to detect botnets …


A Framework For Enterprise Systems Based On Process Improvement, Abdulrahman Alharthi Jan 2022

A Framework For Enterprise Systems Based On Process Improvement, Abdulrahman Alharthi

All ETDs from UAB

We introduce a framework for enterprise systems based on process-centered analysis. Because technology has drastically altered many aspects of our lives, such as work, leisure, travel, government, and company interactions worldwide, companies must strategically consider the Internet of Things in order to thrive in the new economy. Tanik and Jololian offered early work in this area, and included an analysis of the T-Strategy introduced by R.T. Yeh et al. in their book “Zero-time.” Our approach builds on this decade-old work, and involves the introduction of information flow analysis to process improvement [1]. We have identified two key points: centralization and …


Crowd Detection System Using Blimp Drones As An Effort To Mitigate The Spread Of Covid-19 Based On Internet Of Things, Mashoedah Mashoedah, Oktaf Agni Dhewa, Zulhakim Seftiyana Roviyan, Dheni Leo, Silvia Larasatul Masyitoh Dec 2021

Crowd Detection System Using Blimp Drones As An Effort To Mitigate The Spread Of Covid-19 Based On Internet Of Things, Mashoedah Mashoedah, Oktaf Agni Dhewa, Zulhakim Seftiyana Roviyan, Dheni Leo, Silvia Larasatul Masyitoh

Elinvo (Electronics, Informatics, and Vocational Education)

The application of health protocols is a regulation that is applied to prevent the spread of Covid-19. Public awareness of the implementation of health protocols is still lacking. This study aims to determine the performance of the detection system using the Blimp Drone as an effort to mitigate the spread of Covid-19 based on the Internet of Things. The method used in system development consists of literature review, needs analysis, design, manufacture, and testing. This system uses the Blimp Drone as a vehicle to carry out flight missions. Raspberry pi camera as a component for distance detection in …