Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Sensing, Computing, And Communications For Energy Harvesting Iots: A Survey, Dong Ma, Guohao Lan, Mahbub Hassan, Wen Hu, Sajal K. Das Jun 2020

Sensing, Computing, And Communications For Energy Harvesting Iots: A Survey, Dong Ma, Guohao Lan, Mahbub Hassan, Wen Hu, Sajal K. Das

Research Collection School Of Computing and Information Systems

With the growing number of deployments of Internet of Things (IoT) infrastructure for a wide variety of applications, the battery maintenance has become a major limitation for the sustainability of such infrastructure. To overcome this problem, energy harvesting offers a viable alternative to autonomously power IoT devices, resulting in a number of battery-less energy harvesting IoTs (or EH-IoTs) appearing in the market in recent years. Standards activities are also underway, which involve wireless protocol design suitable for EH-IoTs as well as testing procedures for various energy harvesting methods. Despite the early commercial and standards activities, IoT sensing, computing and communications …


Reputation-Aware Trajectory-Based Data Mining In The Internet Of Things (Iot), Samia Tasnim Nov 2019

Reputation-Aware Trajectory-Based Data Mining In The Internet Of Things (Iot), Samia Tasnim

FIU Electronic Theses and Dissertations

Internet of Things (IoT) is a critically important technology for the acquisition of spatiotemporally dense data in diverse applications, ranging from environmental monitoring to surveillance systems. Such data helps us improve our transportation systems, monitor our air quality and the spread of diseases, respond to natural disasters, and a bevy of other applications. However, IoT sensor data is error-prone due to a number of reasons: sensors may be deployed in hazardous environments, may deplete their energy resources, have mechanical faults, or maybe become the targets of malicious attacks by adversaries. While previous research has attempted to improve the quality of …