Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Electrical and Computer Engineering (36)
- Computer Engineering (33)
- Physical Sciences and Mathematics (26)
- Digital Communications and Networking (16)
- Computer Sciences (15)
-
- Systems and Communications (13)
- Earth Sciences (10)
- Environmental Sciences (10)
- Soil Science (10)
- Sustainability (9)
- Water Resource Management (9)
- Other Environmental Sciences (7)
- Social and Behavioral Sciences (7)
- Information Security (5)
- Library and Information Science (4)
- Signal Processing (4)
- Databases and Information Systems (3)
- Engineering Education (3)
- Other Computer Engineering (3)
- Software Engineering (3)
- Artificial Intelligence and Robotics (2)
- Civil and Environmental Engineering (2)
- Computer and Systems Architecture (2)
- Data Science (2)
- Data Storage Systems (2)
- Forensic Science and Technology (2)
- Legal Studies (2)
- Mechanical Engineering (2)
- Operations Research, Systems Engineering and Industrial Engineering (2)
- Institution
-
- Purdue University (11)
- Technological University Dublin (6)
- Florida International University (5)
- University of Nebraska - Lincoln (5)
- Embry-Riddle Aeronautical University (4)
-
- Zayed University (4)
- Missouri University of Science and Technology (3)
- University of Kentucky (3)
- University of South Carolina (3)
- Edith Cowan University (2)
- University of New Haven (2)
- Boise State University (1)
- Georgia Southern University (1)
- Liberty University (1)
- Mississippi State University (1)
- Old Dominion University (1)
- Rowan University (1)
- Singapore Management University (1)
- Syracuse University (1)
- Utah State University (1)
- Virginia Commonwealth University (1)
- Publication
-
- Faculty Publications (10)
- Publications (7)
- FIU Electronic Theses and Dissertations (5)
- All Works (4)
- Articles (3)
-
- Library Philosophy and Practice (e-journal) (3)
- Electrical & Computer Engineering and Computer Science Faculty Publications (2)
- Electrical and Computer Engineering Faculty Publications (2)
- Electrical and Computer Engineering Faculty Research & Creative Works (2)
- Information Science Faculty Publications (2)
- Research outputs 2022 to 2026 (2)
- 11th IMHRC Proceedings (Milwaukee, Wisconsin. USA – 2010) (1)
- Bagley College of Engineering Publications and Scholarship (1)
- Capstone Reports (1)
- Computer Science Publications (1)
- Department of Agricultural and Biological Systems Engineering: Dissertations, Theses, and Student Research (1)
- Department of Electrical and Computer Engineering Faculty Publications (1)
- Department of Electrical and Computer Engineering: Faculty Publications (1)
- Dissertations (1)
- Electrical and Computer Engineering Faculty Publications and Presentations (1)
- Engineering Technology Faculty Publications (1)
- English Language Institute (1)
- Henry M. Rowan College of Engineering Faculty Scholarship (1)
- Mechanical and Aerospace Engineering Faculty Research & Creative Works (1)
- Other (1)
- Research Collection School Of Computing and Information Systems (1)
- Senior Honors Theses (1)
Articles 1 - 30 of 58
Full-Text Articles in Engineering
Renovating The Ipmu Via Internet Of Things For Pollutant Emission Estimations In Poultry Facilities, Joshua Dotto
Renovating The Ipmu Via Internet Of Things For Pollutant Emission Estimations In Poultry Facilities, Joshua Dotto
Department of Agricultural and Biological Systems Engineering: Dissertations, Theses, and Student Research
The emissions of ammonia (NH3), particulate matter (PM2.5), and carbon dioxide (CO2) are major concerns in poultry facilities. They can pose environmental concerns and nuances. Robust and affordable measurement systems are needed to accurately measure in-barn concentrations and quantify the emissions.
The Intelligent Portable Monitoring Unit (iPMU or PMU3) developed in 2016 was reconstructed into PMU4 to include upgraded NH3 and PM2.5 sensors and wireless connectivity for a low-cost, robust, and accurate air quality monitoring device with contactless data transfer using the concept of Internet of Things (IoT). In addition, a user-friendly …
Distributed Detection Over Blockchain-Aided Internet Of Things In The Presence Of Attacks, Yiming Jiang, Jiangfan Zhang
Distributed Detection Over Blockchain-Aided Internet Of Things In The Presence Of Attacks, Yiming Jiang, Jiangfan Zhang
Electrical and Computer Engineering Faculty Research & Creative Works
Distributed detection over a blockchain-aided Internet of Things (BIoT) network in the presence of attacks is considered, where the integrated blockchain is employed to secure data exchanges over the BIoT as well as data storage at the agents of the BIoT. We consider a general adversary model where attackers jointly exploit the vulnerability of IoT devices and that of the blockchain employed in the BIoT. The optimal attacking strategy which minimizes the Kullback-Leibler divergence is pursued. It can be shown that this optimization problem is nonconvex, and hence it is generally intractable to find the globally optimal solution to such …
Opportunities Of Iot In Fog Computing For High Fault Tolerance And Sustainable Energy Optimization, A. Reyana, Sandeep Kautish, Khalid Abdulaziz Alnowibet, Hossam Zawbaa, Ali Wagdy Mohamed
Opportunities Of Iot In Fog Computing For High Fault Tolerance And Sustainable Energy Optimization, A. Reyana, Sandeep Kautish, Khalid Abdulaziz Alnowibet, Hossam Zawbaa, Ali Wagdy Mohamed
Articles
Today, the importance of enhanced quality of service and energy optimization has promoted research into sensor applications such as pervasive health monitoring, distributed computing, etc. In general, the resulting sensor data are stored on the cloud server for future processing. For this purpose, recently, the use of fog computing from a real-world perspective has emerged, utilizing end-user nodes and neighboring edge devices to perform computation and communication. This paper aims to develop a quality-of-service-based energy optimization (QoS-EO) scheme for the wireless sensor environments deployed in fog computing. The fog nodes deployed in specific geographical areas cover the sensor activity performed …
Development Of A Data Science Curriculum For An Engineering Technology Program, Salih Sarp, Murat Kuzlu, Otilia Popescu, Vukica M. Jovanovic, Zafer Acar
Development Of A Data Science Curriculum For An Engineering Technology Program, Salih Sarp, Murat Kuzlu, Otilia Popescu, Vukica M. Jovanovic, Zafer Acar
Engineering Technology Faculty Publications
Data science has gained the attention of various industries, educators, parents, and students thinking about their future careers. Statistics departments have traditionally offered data science courses for a long time. The main objective of these courses is to examine the fundamental concepts and theories. However, teaching data science courses has also expanded to other disciplines due to the vast amount of data being collected by numerous modern applications. Also, someone needs to learn how to collect and process data, especially from industrial devices, because of the recent development of Internet of Things (IoT) technologies. Hence, integrating data science into the …
A Provable Secure And Efficient Authentication Framework For Smart Manufacturing Industry, Muhammad Hammad, Akhtar Badshah, Ghulam Abbas, Hisham Alasmary, Muhammad Waqas, Wasim A. Khan
A Provable Secure And Efficient Authentication Framework For Smart Manufacturing Industry, Muhammad Hammad, Akhtar Badshah, Ghulam Abbas, Hisham Alasmary, Muhammad Waqas, Wasim A. Khan
Research outputs 2022 to 2026
Smart manufacturing is transforming the manufacturing industry by enhancing productivity and quality, driving growth in the global economy. The Internet of Things (IoT) has played a crucial role in realizing Industry 4.0, where machines can communicate and interact in real-time. Despite these advancements, security remains a major challenge in developing and deploying smart manufacturing. As cyber-attacks become more prevalent, researchers are making security a top priority. Although IoT and Industrial IoT (IIoT) are used to establish smart industries, these systems remain vulnerable to various types of attacks. To address these security issues, numerous authentication methods have been proposed. However, many …
Monitoring Of Renewable Energy Systems By Iot-Aided Scada System, Ohirul Qays, Musse M. Ahmed, M. A. Parvez Mahmud, Ahmed Abu-Siada, S. M. Muyeen, Liton Hossain, Farhana Yasmin, Momtazur Rahman
Monitoring Of Renewable Energy Systems By Iot-Aided Scada System, Ohirul Qays, Musse M. Ahmed, M. A. Parvez Mahmud, Ahmed Abu-Siada, S. M. Muyeen, Liton Hossain, Farhana Yasmin, Momtazur Rahman
Research outputs 2022 to 2026
With the rapid increase of renewable energy generation worldwide, real-time information has become essential to manage such assets, especially for systems installed offshore and in remote areas. To date, there is no cost-effective condition monitoring technique that can assess the state of renewable energy sources in real-time and provide suitable asset management decisions to optimize the utilization of such valuable assets and avoid any full or partial blackout due to unexpected faults. Based on the Internet of Things scheme, this paper represents a new application for the Supervisory Control and Data Acquisition (SCADA) system to monitor a hybrid system comprising …
Graph-Based Heuristic Solution For Placing Distributed Video Processing Applications On Moving Vehicle Clusters, Kanika Sharma, Bernard Butler, Brendan Jennings
Graph-Based Heuristic Solution For Placing Distributed Video Processing Applications On Moving Vehicle Clusters, Kanika Sharma, Bernard Butler, Brendan Jennings
Articles
Vehicular fog computing (VFC) is envisioned as an extension of cloud and mobile edge computing to utilize the rich sensing and processing resources available in vehicles. We focus on slow-moving cars that spend a significant time in urban traffic congestion as a potential pool of onboard sensors, video cameras, and processing capacity. For leveraging the dynamic network and processing resources, we utilize a stochastic mobility model to select nodes with similar mobility patterns. We then design two distributed applications that are scaled in real-time and placed as multiple instances on selected vehicular fog nodes. We handle the unstable vehicular environment …
Assessing Security Risks With The Internet Of Things, Faith Mosemann
Assessing Security Risks With The Internet Of Things, Faith Mosemann
Senior Honors Theses
For my honors thesis I have decided to study the security risks associated with the Internet of Things (IoT) and possible ways to secure them. I will focus on how corporate, and individuals use IoT devices and the security risks that come with their implementation. In my research, I found out that IoT gadgets tend to go unnoticed as a checkpoint for vulnerability. For example, often personal IoT devices tend to have the default username and password issued from the factory that a hacker could easily find through Google. IoT devices need security just as much as computers or servers …
An Intelligent Distributed Ledger Construction Algorithm For Iot, Charles Rawlins, Jagannathan Sarangapani
An Intelligent Distributed Ledger Construction Algorithm For Iot, Charles Rawlins, Jagannathan Sarangapani
Electrical and Computer Engineering Faculty Research & Creative Works
Blockchain is the next generation of secure data management that creates near-immutable decentralized storage. Secure cryptography created a niche for blockchain to provide alternatives to well-known security compromises. However, design bottlenecks with traditional blockchain data structures scale poorly with increased network usage and are extremely computation-intensive. This made the technology difficult to combine with limited devices, like those in Internet of Things networks. In protocols like IOTA, replacement of blockchain's linked-list queue processing with a lightweight dynamic ledger showed remarkable throughput performance increase. However, current stochastic algorithms for ledger construction suffer distinct trade-offs between efficiency and security. This work proposed …
Reflecting On Recurring Failures In Iot Development, Dharun Anandayuvaraj, James C. Davis
Reflecting On Recurring Failures In Iot Development, Dharun Anandayuvaraj, James C. Davis
Department of Electrical and Computer Engineering Faculty Publications
As IoT systems are given more responsibility and autonomy, they offer greater benefits, but also carry greater risks. We believe this trend invigorates an old challenge of software engineering: how to develop high-risk software-intensive systems safely and securely under market pressures? As a first step, we conducted a systematic analysis of recent IoT failures to identify engineering challenges. We collected and analyzed 22 news reports and studied the sources, impacts, and repair strategies of failures in IoT systems. We observed failure trends both within and across application domains. We also observed that failure themes have persisted over time. To alleviate …
An Analysis On Network Flow-Based Iot Botnet Detection Using Weka, Cian Porteous
An Analysis On Network Flow-Based Iot Botnet Detection Using Weka, Cian Porteous
Dissertations
Botnets pose a significant and growing risk to modern networks. Detection of botnets remains an important area of open research in order to prevent the proliferation of botnets and to mitigate the damage that can be caused by botnets that have already been established. Botnet detection can be broadly categorised into two main categories: signature-based detection and anomaly-based detection. This paper sets out to measure the accuracy, false-positive rate, and false-negative rate of four algorithms that are available in Weka for anomaly-based detection of a dataset of HTTP and IRC botnet data. The algorithms that were selected to detect botnets …
Ee-Acml: Energy-Efficient Adiabatic Cmos/Mtj Logic For Cpa-Resistant Iot Devices, Zachary Kahleifeh, Himanshu Thapliyal
Ee-Acml: Energy-Efficient Adiabatic Cmos/Mtj Logic For Cpa-Resistant Iot Devices, Zachary Kahleifeh, Himanshu Thapliyal
Electrical and Computer Engineering Faculty Publications
Internet of Things (IoT) devices have strict energy constraints as they often operate on a battery supply. The cryptographic operations within IoT devices consume substantial energy and are vulnerable to a class of hardware attacks known as side-channel attacks. To reduce the energy consumption and defend against side-channel attacks, we propose combining adiabatic logic and Magnetic Tunnel Junctions to form our novel Energy Efficient-Adiabatic CMOS/MTJ Logic (EE-ACML). EE-ACML is shown to be both low energy and secure when compared to existing CMOS/MTJ architectures. EE-ACML reduces dynamic energy consumption with adiabatic logic, while MTJs reduce the leakage power of a circuit. …
Class-Incremental Learning For Wireless Device Identification In Iot, Yongxin Liu, Jian Wang, Jianqiang Li, Shuteng Niu, Houbing Song
Class-Incremental Learning For Wireless Device Identification In Iot, Yongxin Liu, Jian Wang, Jianqiang Li, Shuteng Niu, Houbing Song
Publications
Deep Learning (DL) has been utilized pervasively in the Internet of Things (IoT). One typical application of DL in IoT is device identification from wireless signals, namely Noncryptographic Device Identification (NDI). However, learning components in NDI systems have to evolve to adapt to operational variations, such a paradigm is termed as Incremental Learning (IL). Various IL algorithms have been proposed and many of them require dedicated space to store the increasing amount of historical data, and therefore, they are not suitable for IoT or mobile applications. However, conventional IL schemes can not provide satisfying performance when historical data are not …
Machine Learning Meets Internet Of Things: From Theory To Practice, Bharath Sudharsan, Pankesh Patel
Machine Learning Meets Internet Of Things: From Theory To Practice, Bharath Sudharsan, Pankesh Patel
Publications
Standalone execution of problem-solving Artificial Intelligence (AI) on IoT devices produces a higher level of autonomy and privacy. This is because the sensitive user data collected by the devices need not be transmitted to the cloud for inference. The chipsets used to design IoT devices are resource-constrained due to their limited memory footprint, fewer computation cores, and low clock speeds. These limitations constrain one from deploying and executing complex problem-solving AI (usually an ML model) on IoT devices. Since there is a high potential for building intelligent IoT devices, in this tutorial, we teach researchers and developers; (i) How to …
Zero-Bias Deep Learning Enabled Quick And Reliable Abnormality Detection In Iot, Yongxin Liu, Jian Wang, Jianqiang Li, Shuteng Niu, Houbing Song
Zero-Bias Deep Learning Enabled Quick And Reliable Abnormality Detection In Iot, Yongxin Liu, Jian Wang, Jianqiang Li, Shuteng Niu, Houbing Song
Publications
Abnormality detection is essential to the performance of safety-critical and latency-constrained systems. However, as systems are becoming increasingly complicated with a large quantity of heterogeneous data, conventional statistical change point detection methods are becoming less effective and efficient. Although Deep Learning (DL) and Deep Neural Networks (DNNs) are increasingly employed to handle heterogeneous data, they still lack theoretic assurable performance and explainability. This paper integrates zero-bias DNN and Quickest Event Detection algorithms to provide a holistic framework for quick and reliable detection of both abnormalities and time-dependent abnormal events in Internet of Things (IoT).We first use the zero bias dense …
A Bibliometric Analysis On Optimization Of Application Layer Protocols In The Internet Of Things, Sagar Jaikar
A Bibliometric Analysis On Optimization Of Application Layer Protocols In The Internet Of Things, Sagar Jaikar
Library Philosophy and Practice (e-journal)
Internet of Things (IoT), getting popular day by day, thanks to the every object that has been made intelligent and started communicated among themselves with ease. These objects are equipped with sensors and capable of connecting and exchanging the application data over the Internet. While the application data is getting exchanged among these intelligent objects smoothly, there are various concerns with these intelligent objects like they are constrained when it comes to resources like memory, processing capability, power consumption etc. In this regard many attempts are made to enhance or to optimize existing messaging protocols so that we can get …
A Survey On Subsurface Signal Propagation, Usman Raza, Abdul Salam
A Survey On Subsurface Signal Propagation, Usman Raza, Abdul Salam
Faculty Publications
Wireless Underground Communication (WUC) is an emerging field that is being developed continuously. It provides secure mechanism of deploying nodes underground which shields them from any outside temperament or harsh weather conditions. This paper works towards introducing WUC and give a detail overview of WUC. It discusses system architecture of WUC along with the anatomy of the underground sensor motes deployed in WUC systems. It also compares Over-the-Air and Underground and highlights the major differences between the both type of channels. Since, UG communication is an evolving field, this paper also presents the evolution of the field along with the …
Demystifying Artificial Intelligence Based Digital Twins In Manufacturing- A Bibliometric Analysis Of Trends And Techniques, Satish Kumar, Shruti Patil, Arunkumar Bongale, Ketan Kotecha, Anup Kumar M. Bongale, Pooja Kamat
Demystifying Artificial Intelligence Based Digital Twins In Manufacturing- A Bibliometric Analysis Of Trends And Techniques, Satish Kumar, Shruti Patil, Arunkumar Bongale, Ketan Kotecha, Anup Kumar M. Bongale, Pooja Kamat
Library Philosophy and Practice (e-journal)
Nowadays, data is considered as a new life force for operations of physical systems in various domains such as manufacturing, healthcare, transportations, etc. However, the hugely generated data, which mirrors the working essence of the product life cycle, is still underutilised. Digital Twin (DT), a collective representation of active and passive captured data, is a virtual counterpart of the physical resources that could help prevent effective preventive maintenance in any applied domain. Currently, lots of research is going on about the applicability of digital twin in smart IOT based manufacturing industry 4.0 environment. Still, it lacks a formal study, which …
A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jaouad A. Mouloud
A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jaouad A. Mouloud
Information Science Faculty Publications
The privacy of users and information are becoming increasingly important with the growth and pervasive use of mobile devices such as wearables, mobile phones, drones, and Internet of Things (IoT) devices. Today many of these mobile devices are equipped with cameras which enable users to take pictures and record videos anytime they need to do so. In many such cases, bystanders’ privacy is not a concern, and as a result, audio and video of bystanders are often captured without their consent. We present results from a user study in which 21 participants were asked to use a wearable system called …
Zero-Bias Deep Learning For Accurate Identification Of Internet Of Things (Iot) Devices, Yongxin Liu, Houbing Song, Thomas Yang, Jian Wang, Jianqiang Li, Shuteng Niu, Zhong Ming
Zero-Bias Deep Learning For Accurate Identification Of Internet Of Things (Iot) Devices, Yongxin Liu, Houbing Song, Thomas Yang, Jian Wang, Jianqiang Li, Shuteng Niu, Zhong Ming
Publications
The Internet of Things (IoT) provides applications and services that would otherwise not be possible. However, the open nature of IoT makes it vulnerable to cybersecurity threats. Especially, identity spoofing attacks, where an adversary passively listens to the existing radio communications and then mimic the identity of legitimate devices to conduct malicious activities. Existing solutions employ cryptographic signatures to verify the trustworthiness of received information. In prevalent IoT, secret keys for cryptography can potentially be disclosed and disable the verification mechanism. Noncryptographic device verification is needed to ensure trustworthy IoT. In this article, we propose an enhanced deep learning framework …
Decision Agriculture, Abdul Salam, Usman Raza
Decision Agriculture, Abdul Salam, Usman Raza
Faculty Publications
In this chapter, the latest developments in the field of decision agriculture are discussed. The practice of management zones in digital agriculture is described for efficient and smart faming. Accordingly, the methodology for delineating management zones is presented. Modeling of decision support systems is explained along with discussion of the issues and challenges in this area. Moreover, the precision agriculture technology is also considered. Moreover, the chapter surveys the state of the decision agriculture technologies in the countries such as Bulgaria, Denmark, France, Israel, Malaysia, Pakistan, United Kingdom, Ukraine, and Sweden. Finally, different field factors such as GPS accuracy and …
Electromagnetic Characteristics Of The Soil, Abdul Salam, Usman Raza
Electromagnetic Characteristics Of The Soil, Abdul Salam, Usman Raza
Faculty Publications
The electromagnetic characteristics of the soil are discussed in this chapter. The characteristics of porous bedrock, soil medium, and impacts of rain attenuations are also presented. The models of dielectric soil properties are studied with a rigorous focus on the constitutive parameters of subsurface soil medium. Moreover, the permittivity and wavenumber in soil are explained. In addition, the frequency-dependent dielectric properties such as dispersion in soil, absorption characteristic, and penetration depth versus frequency are reviewed. Furthermore, the effective permittivity of soil–water mixture for through-the soil-propagation mechanism is analyzed thoroughly.
Underground Phased Arrays And Beamforming Applications, Abdul Salam, Usman Raza
Underground Phased Arrays And Beamforming Applications, Abdul Salam, Usman Raza
Faculty Publications
This chapter presents a framework for adaptive beamforming in underground communication. The wireless propagation is thoroughly analyzed to develop a model using the soil moisture as an input parameter to provide feedback mechanism while enhancing the system performance. The working of array element in the soil is analyzed. Moreover, the effect of soil texture and soil moisture on the resonant frequency and return loss is studied in detail. The wave refraction from the soil–air interface highly degrades the performance of the system. Furthermore, to beam steering is done to achieve high gain for lateral component improving the UG communication. The …
Signals In The Soil: Underground Antennas, Abdul Salam, Usman Raza
Signals In The Soil: Underground Antennas, Abdul Salam, Usman Raza
Faculty Publications
Antenna is a major design component of Internet of Underground Things (IOUT) communication system. The use of antenna, in IOUT, differs from traditional communication in that it is buried in the soil. Therefore, one of the main challenges, in IOUT applications, is to establish a reliable communication. To that end, there is a need of designing an underground-specific antenna. Three major factors that can impact the performance of a buried antenna are: (1) effect of high soil permittivity changes the wavelength of EM waves, (2) variations in soil moisture with time affecting the permittivity of the soil, and (3) difference …
Soil Moisture And Permittivity Estimation, Abdul Salam, Usman Raza
Soil Moisture And Permittivity Estimation, Abdul Salam, Usman Raza
Faculty Publications
The soil moisture and permittivity estimation is vital for the success of the variable rate approaches in the field of the decision agriculture. In this chapter, the development of a novel permittivity estimation and soil moisture sensing approach is presented. The empirical setup and experimental methodology for the power delay measurements used in model are introduced. Moreover, the performance analysis is explained that includes the model validation and error analysis. The transfer functions are reported as well for soil moisture and permittivity estimation. Furthermore, the potential applications of the developed approach in different disciplines are also examined.
Current Advances In Internet Of Underground Things, Abdul Salam, Usman Raza
Current Advances In Internet Of Underground Things, Abdul Salam, Usman Raza
Faculty Publications
The latest developments in Internet of Underground Things are covered in this chapter. First, the IOUT Architecture is discussed followed by the explanation of the challenges being faced in this paradigm. Moreover, a comprehensive coverage of the different IOUT components is presented that includes communications, sensing, and system integration with the cloud. An in-depth coverage of the applications of the IOUT in various disciplines is also surveyed. These applications include areas such as decision agriculture, pipeline monitoring, border control, and oil wells.
Signals In The Soil: Subsurface Sensing, Abdul Salam, Usman Raza
Signals In The Soil: Subsurface Sensing, Abdul Salam, Usman Raza
Faculty Publications
In this chapter, novel subsurface soil sensing approaches are presented for monitoring and real-time decision support system applications. The methods, materials, and operational feasibility aspects of soil sensors are explored. The soil sensing techniques covered in this chapter include aerial sensing, in-situ, proximal sensing, and remote sensing. The underlying mechanism used for sensing is also examined as well. The sensor selection and calibration techniques are described in detail. The chapter concludes with discussion of soil sensing challenges.
Autonomous Irrigation Management In Decision Agriculture, Abdul Salam, Usman Raza
Autonomous Irrigation Management In Decision Agriculture, Abdul Salam, Usman Raza
Faculty Publications
In this chapter, the important application of autonomous irrigation management in the field decision agriculture is discussed. The different types of sensor-guided irrigation systems are presented that includes center pivot systems and drip irrigation systems. Their sensing and actuator components are with detailed focus on real-time decision-making and integration to the cloud. This chapter also presents irrigation control systems which takes, as an input, soil moisture and temperature from IOUT and weather data from Internet and communicate with center pivot based irrigation systems. Moreover, the system architecture is explored where development of the nodes including sensing and actuators is presented. …
Variable Rate Applications In Decision Agriculture, Abdul Salam, Usman Raza
Variable Rate Applications In Decision Agriculture, Abdul Salam, Usman Raza
Faculty Publications
In this chapter, the variable rate applications (VRA) are presented for the field of decision agriculture. The characteristics of VRA control systems are described along with control hardware. Different types of VRA systems are discussed (e.g., liquid VRA systems and dry VRA systems). A case study is also explored in this regard. Moreover, recent advances and future trends are also outlined. Accordingly, a sustainable variable-rate irrigation scheduling is studied where different hardware and software component of the cyber-physical system are considered. Finally, chapter is concluded with a novel sensor deployment methodology.
How Can 5g Make Our Lives Better?, Firas Slewa Dawod
How Can 5g Make Our Lives Better?, Firas Slewa Dawod
English Language Institute
Our lives will be significantly improved with the advent of the new cellular wireless technology due to all its new features and applications. This Poster discusses the main features and application of 5G technology and its positive impact on society, in particular facilitating interactive and smart communities.