Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

2019

Internet of Things

Discipline
Institution
Publication
Publication Type

Articles 1 - 20 of 20

Full-Text Articles in Engineering

Reputation-Aware Trajectory-Based Data Mining In The Internet Of Things (Iot), Samia Tasnim Nov 2019

Reputation-Aware Trajectory-Based Data Mining In The Internet Of Things (Iot), Samia Tasnim

FIU Electronic Theses and Dissertations

Internet of Things (IoT) is a critically important technology for the acquisition of spatiotemporally dense data in diverse applications, ranging from environmental monitoring to surveillance systems. Such data helps us improve our transportation systems, monitor our air quality and the spread of diseases, respond to natural disasters, and a bevy of other applications. However, IoT sensor data is error-prone due to a number of reasons: sensors may be deployed in hazardous environments, may deplete their energy resources, have mechanical faults, or maybe become the targets of malicious attacks by adversaries. While previous research has attempted to improve the quality of …


Trajectory Privacy Preservation And Lightweight Blockchain Techniques For Mobility-Centric Iot, Abdur Bin Shahid Nov 2019

Trajectory Privacy Preservation And Lightweight Blockchain Techniques For Mobility-Centric Iot, Abdur Bin Shahid

FIU Electronic Theses and Dissertations

Various research efforts have been undertaken to solve the problem of trajectory privacy preservation in the Internet of Things (IoT) of resource-constrained mobile devices. Most attempts at resolving the problem have focused on the centralized model of IoT, which either impose high delay or fail against a privacy-invading attack with long-term trajectory observation. These proposed solutions also fail to guarantee location privacy for trajectories with both geo-tagged and non-geo-tagged data, since they are designed for geo-tagged trajectories only. While a few blockchain-based techniques have been suggested for preserving trajectory privacy in decentralized model of IoT, they require large storage capacity …


Fog Computing Enabling Industrial Internet Of Things: State-Of-The-Art And Research Challenges, Rabeea Basir, Saad Qaisar, Mudassar Ali, Monther Aldwairi, Muhammad Ikram Ashraf, Aamir Mahmood, Mikael Gidlund Nov 2019

Fog Computing Enabling Industrial Internet Of Things: State-Of-The-Art And Research Challenges, Rabeea Basir, Saad Qaisar, Mudassar Ali, Monther Aldwairi, Muhammad Ikram Ashraf, Aamir Mahmood, Mikael Gidlund

All Works

© 2019 by the authors. Licensee MDPI, Basel, Switzerland. Industry is going through a transformation phase, enabling automation and data exchange in manufacturing technologies and processes, and this transformation is called Industry 4.0. Industrial Internet-of-Things (IIoT) applications require real-time processing, near-by storage, ultra-low latency, reliability and high data rate, all of which can be satisfied by fog computing architecture. With smart devices expected to grow exponentially, the need for an optimized fog computing architecture and protocols is crucial. Therein, efficient, intelligent and decentralized solutions are required to ensure real-time connectivity, reliability and green communication. In this paper, we provide a …


Development Of A National-Scale Big Data Analytics Pipeline To Study The Potential Impacts Of Flooding On Critical Infrastructures And Communities, Nattapon Donratanapat Oct 2019

Development Of A National-Scale Big Data Analytics Pipeline To Study The Potential Impacts Of Flooding On Critical Infrastructures And Communities, Nattapon Donratanapat

Theses and Dissertations

With the rapid development of the Internet of Things (IoT) and Big data infrastructure, crowdsourcing techniques have emerged to facilitate data processing and problem solving particularly for flood emergences purposes. A Flood Analytics Information System (FAIS) has been developed as a Python Web application to gather Big data from multiple servers and analyze flooding impacts during historical and real-time events. The application is smartly designed to integrate crowd intelligence, machine learning (ML), and natural language processing of tweets to provide flood warning with the aim to improve situational awareness for flood risk management and decision making. FAIS allows the user …


Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen Sep 2019

Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen

Houbing Song

With the rapid development of Internet of Things, massive mobile intelligent terminals are ready to access edge servers for real-time data calculation and interaction. However, the risk of private data leakage follows simultaneously. As the administrator of all intelligent terminals in a region, the edge server needs to clarify the ability of the managed intelligent terminals to defend against malicious attacks. Therefore, the security level classification for mobile intelligent terminals before accessing the network is indispensable. In this paper, we firstly propose a safety assessment method to detect the weakness of mobile intelligent terminals. Secondly, we match the evaluation results …


Predicting The Hardness Of Turf Surfaces From A Soil Moisture Sensor Using Iot Technologies, Ann Marie Mckeon Sep 2019

Predicting The Hardness Of Turf Surfaces From A Soil Moisture Sensor Using Iot Technologies, Ann Marie Mckeon

Other

In horseracing, “the going” is a term to describe the racetrack ground conditions. In Ireland presently, a groundskeeper or course clerk walks the racecourse poking it with a blackthorn stick, assesses conditions, and declares the going – it is a subjective measurement.

This thesis will propose using remote low-cost soil moisture sensors to gather high frequency data about the soil water content in the ground and to enable informed decisions to be made. This will remove the subjective element from the ground hardness, and look at the data in an objective way.

The soil moisture sensor will systematically collect high …


Development Of Smart Semiconductor Manufacturing: Operations Research And Data Science Perspectives, Marzieh Khakifirooz, Mahdi Fathi, Kan Wu Aug 2019

Development Of Smart Semiconductor Manufacturing: Operations Research And Data Science Perspectives, Marzieh Khakifirooz, Mahdi Fathi, Kan Wu

Bagley College of Engineering Publications and Scholarship

With advances in information and telecommunication technologies and data-enabled decision making, smart manufacturing can be an essential component of sustainable development. In the era of the smart world, semiconductor industry is one of the few global industries that are in a growth mode to smartness, due to worldwide demand. The important opportunities that can boost the cost reduction of productivity and improve quality in wafer fabrication are based on the simulations of actual environment in Cyber-Physical Space and integrate them with decentralized decision-making systems. However, this integration faced the industry with novel unique challenges. The stream of the data from …


Iot Ignorance Is Digital Forensics Research Bliss: A Survey To Understand Iot Forensics Definitions, Challenges And Future Research Directions, Tina Wu, Frank Breitinger, Ibrahim Baggili Aug 2019

Iot Ignorance Is Digital Forensics Research Bliss: A Survey To Understand Iot Forensics Definitions, Challenges And Future Research Directions, Tina Wu, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Interactions with IoT devices generates vast amounts of personal data that can be used as a source of evidence in digital investigations. Currently, there are many challenges in IoT forensics such as the difficulty in acquiring and analysing IoT data/devices and the lack IoT forensic tools. Besides technical challenges, there are many concepts in IoT forensics that have yet to be explored such as definitions, experience and capability in the analysis of IoT data/devices and current/future challenges. A deeper understanding of these various concepts will help progress the field. To achieve this goal, we conducted a survey which received 70 …


Cyber-Enabled Product Lifecycle Management: A Multi-Agent Framework, Vishwa V. Kumar, Avimanyu Sahoo, Frank W. Liou Aug 2019

Cyber-Enabled Product Lifecycle Management: A Multi-Agent Framework, Vishwa V. Kumar, Avimanyu Sahoo, Frank W. Liou

Mechanical and Aerospace Engineering Faculty Research & Creative Works

Trouble free use of a product and its associated services for a specified minimum period of time is a major factor to win the customer's trust in the product. Rapid and easy serviceability to maintain its functionalities plays a key role in achieving this goal. However, the sustainability of such a model cannot be promised unless the current health status of the product is monitored and condition-based maintenance is exercised. Internet of Things (IoT), an important connectivity paradigm of recent times, which connects physical objects to the internet for real-time information exchange and execution of physical actions via wired/wireless protocols. …


Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen Jul 2019

Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen

Publications

With the rapid development of Internet of Things, massive mobile intelligent terminals are ready to access edge servers for real-time data calculation and interaction. However, the risk of private data leakage follows simultaneously. As the administrator of all intelligent terminals in a region, the edge server needs to clarify the ability of the managed intelligent terminals to defend against malicious attacks. Therefore, the security level classification for mobile intelligent terminals before accessing the network is indispensable. In this paper, we firstly propose a safety assessment method to detect the weakness of mobile intelligent terminals. Secondly, we match the evaluation results …


The Post-Occupancy Digital Twin: A Quantitative Report On Data Standardisation And Dynamic Building Performance Evaluation, Bim Tudublin, Jonathan Rogers May 2019

The Post-Occupancy Digital Twin: A Quantitative Report On Data Standardisation And Dynamic Building Performance Evaluation, Bim Tudublin, Jonathan Rogers

Capstone Reports

As a process, originally defined by the UK Government, Level 2 Building Information Modelling (BIM) involves the creation of digital project information, following industry standard guidelines. Through the application of Level 2 BIM, the construction industry can now develop digital representations of physical assets. By combining BIM with digital technologies such as the Internet of Things (IoT), an opportunity is created to link integrated building sensors to these digital representations via advanced Computer Aided Facility Management (CAFM) systems. Successfully combining physical elements to digital elements through a CAFM system results in the creation of Digital Twins (DT), providing an opportunity …


Examining Effectiveness Of Web-Based Internet Of Things Honeypots, Lukas A. Stafira Mar 2019

Examining Effectiveness Of Web-Based Internet Of Things Honeypots, Lukas A. Stafira

Theses and Dissertations

The Internet of Things (IoT) is growing at an alarming rate. It is estimated that there will be over 25 billion IoT devices by 2020. The simplicity of their function usually means that IoT devices have low processing power, which prevent them from having intricate security features, leading to vulnerabilities. This makes IoT devices the prime target of attackers in the coming years. Honeypots are intentionally vulnerable machines that run programs which appear as a vulnerable device to a would-be attacker. They are placed on a network to entice and trap an attacker and then gather information on them, including …


The Scientific Information Exchange General Model At Digital Library Context: Internet Of Things, Nayere Soleimanzade, Asefeh Asemi, Mozafar Cheshmehsohrabi, Ahmad Shabani Jan 2019

The Scientific Information Exchange General Model At Digital Library Context: Internet Of Things, Nayere Soleimanzade, Asefeh Asemi, Mozafar Cheshmehsohrabi, Ahmad Shabani

Library Philosophy and Practice (e-journal)

Introduction: This paper aims to develop a Scientific Information Exchange General Model at Digital Library in Context of Internet of things, which would enable automated and efficient library services. To accomplish its objective, the main classes (Concepts), sub-classes, attributes are identified in order to introduce an appropriate model.

Methodology: The approach of this study is basic, exploratory, and developmental and is run through a mixed method consisting of documentary, Delphi, and data modeling methods. The study population in the documentary section includes the study of information resources retrieved in related subjects. The study population in the Delphi section is …


Everything-As-A-Thing For Abstracting The Internet-Of-Things, Zakaria Maamar, Noura Faci, Mohamed Sellami, Emir Ugljanin, Ejub Kajan Jan 2019

Everything-As-A-Thing For Abstracting The Internet-Of-Things, Zakaria Maamar, Noura Faci, Mohamed Sellami, Emir Ugljanin, Ejub Kajan

All Works

Copyright © 2018 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved This paper discusses Everything-as-a-Thing (*aaT) as a novel way for abstracting the Internet-of-Things (IoT) applications. Compared to other forms of abstraction like Everything-as-a-Service (*aaS) and Everything-as-a-Resource (*aaR), *aaT puts emphasis on living things, on top of non-living things, that populate these applications. On the one hand, living things take over roles that are defined in terms of rights and duties. On the other hand, non-living things offer capabilities that are defined in terms of functional and non-functional properties. Interactions that occur between living and non-living things …


A Study Of Cooperative Spectrum Sharing Schemes For Internet Of Things Systems, Adham Hagag Jan 2019

A Study Of Cooperative Spectrum Sharing Schemes For Internet Of Things Systems, Adham Hagag

Electronic Theses and Dissertations

The Internet of Things (IoT) has gained much attention in recent years with the massive increase in the number of connected devices. Cognitive Machine-to-Machine (CM2M) communications is a hot research topic in which a cognitive dimension allows M2M networks to overcome the challenges of spectrum scarcity, interference, and green requirements. In this paper, we propose a Generalized Cooperative Spectrum Sharing (GCSS) scheme for M2M communication. Cooperation extends the coverage of wireless networks as well as increasing their throughput while reducing the energy consumption of the connected low power devices. We study the outage performance of the proposed GCSS scheme for …


Exploring Cyber-Physical Systems, Misbah Uddin Mohammed Jan 2019

Exploring Cyber-Physical Systems, Misbah Uddin Mohammed

Graduate Research Theses & Dissertations

The advances in IOT, Computer Vision, AI and Machine Learning have made these technologies ubiquitous to our daily lives. From Smart Phones to Connected Vehicles, Cyber Physical systems have been interspersed into everything we interact in today’s world. The aim or this thesis was to explore these advances in Cyber Physical Systems and analyze the different sectors they were affecting. We then hand-picked certain domains and explored further by carrying out practical projects using some of the latest software and hardware resources available. Technologies like Amazon Alexa services, NVIDIA Jetson boards, TensorFlow, OpenCV, NodeJS were heavily employed in our various …


Unmanned Aerial Vehicles Enabled Iot Platform For Disaster Management, Waleed Ejaz, Muhammad Awais Azam, Salman Saadat, Farkhund Iqbal, Abdul Hanan Jan 2019

Unmanned Aerial Vehicles Enabled Iot Platform For Disaster Management, Waleed Ejaz, Muhammad Awais Azam, Salman Saadat, Farkhund Iqbal, Abdul Hanan

All Works

© 2019 by the authors. Efficient and reliable systems are required to detect and monitor disasters such as wildfires as well as to notify the people in the disaster-affected areas. Internet of Things (IoT) is the key paradigm that can address the multitude problems related to disaster management. In addition, an unmanned aerial vehicles (UAVs)-enabled IoT platform connected via cellular network can further enhance the robustness of the disaster management system. The UAV-enabled IoT platform is based on three main research areas: (i) ground IoT network; (ii) communication technologies for ground and aerial connectivity; and (iii) data analytics. In this …


Increasing Bluetooth Low Energy Communication Efficiency By Presetting Protocol Parameters, Dusan Hatvani, Dominik Macko Jan 2019

Increasing Bluetooth Low Energy Communication Efficiency By Presetting Protocol Parameters, Dusan Hatvani, Dominik Macko

Turkish Journal of Electrical Engineering and Computer Sciences

Standard protocols are important regarding the compatibility of devices provided by different vendors. However, specific applications have various requirements and do not always need all features offered by standard protocols, making them inefficient. This paper focuses on standard Bluetooth Low Energy modifications, reducing control overhead for the intended healthcare application. Specifically, the connection establishment, device pairing, and connection parameter negotiations have been targeted. The simulation-based experiments showed over 20 times reduction of control-overhead time preceding a data transmission. It does not just directly increase the energy efficiency of communication; it also prolongs the time for sensor-based end devices to spend …


Enabling Space Time Division Multiple Access In Ietf 6tisch Protocol, Sedat Görmüş, Sercan Külcü Jan 2019

Enabling Space Time Division Multiple Access In Ietf 6tisch Protocol, Sedat Görmüş, Sercan Külcü

Turkish Journal of Electrical Engineering and Computer Sciences

IETF 6TiSCH standard aims to create reliable, deterministic, and low-power networks by scheduling bandwidth resources in time and frequency domains. The main emphasis of 6TiSCH protocol is that it creates Internet of things (IoT) networks with a deterministic and controllable delay. However, many of its benefits are tied to the ability of the 6TiSCH scheduler to optimally distribute radio resources among wireless nodes which may not be possible when the number of frequency resources are limited and several other wireless technologies share the same frequency band (e.g., WiFi, Bluetooth and IEEE 802.15.4). Here the integration of a low-complexity directional antenna …


Big Five Technologies In Aeronautical Engineering Education: Scoping Review, Ruth Martinez-Lopez Jan 2019

Big Five Technologies In Aeronautical Engineering Education: Scoping Review, Ruth Martinez-Lopez

International Journal of Aviation, Aeronautics, and Aerospace

The constant demands that technology creates in aerospace engineering also influence education. The identification of the technologies with practical application in aerospace engineering is of current interest to decision makers in both universities and industry. A social network approach enhances this scoping review of the research literature to identify the main topics using the Big Five technologies in aerospace engineering education. The conceptual structure of the dataset (n=447) was analyzed from different approaches: at macro-level, a comparative of the digital technology identified by cluster analysis with the number of co-words established in 3 and 8 and, a keyword central structure …