Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Databases and Information Systems

Integration Of Internet Of Things And Health Recommender Systems, Moonkyung Yang Dec 2021

Integration Of Internet Of Things And Health Recommender Systems, Moonkyung Yang

Electronic Theses, Projects, and Dissertations

The Internet of Things (IoT) has become a part of our lives and has provided many enhancements to day-to-day living. In this project, IoT in healthcare is reviewed. IoT-based healthcare is utilized in remote health monitoring, observing chronic diseases, individual fitness programs, helping the elderly, and many other healthcare fields. There are three main architectures of smart IoT healthcare: Three-Layer Architecture, Service-Oriented Based Architecture (SoA), and The Middleware-Based IoT Architecture. Depending on the required services, different IoT architecture are being used. In addition, IoT healthcare services, IoT healthcare service enablers, IoT healthcare applications, and IoT healthcare services focusing on Smartwatch …


A High-Accuracy And Power-Efficient Self-Optimizing Wireless Water Level Monitoring Iot Device For Smart City, Tsun-Kuang Chi, Hsiao-Chi Chen, Shih-Lun Chen, Patricia Angela R. Abu Mar 2021

A High-Accuracy And Power-Efficient Self-Optimizing Wireless Water Level Monitoring Iot Device For Smart City, Tsun-Kuang Chi, Hsiao-Chi Chen, Shih-Lun Chen, Patricia Angela R. Abu

Department of Information Systems & Computer Science Faculty Publications

In this paper; a novel self-optimizing water level monitoring methodology is proposed for smart city applications. Considering system maintenance; the efficiency of power consumption and accuracy will be important for Internet of Things (IoT) devices and systems. A multi-step measurement mechanism and power self-charging process are proposed in this study for improving the efficiency of a device for water level monitoring applications. The proposed methodology improved accuracy by 0.16–0.39% by moving the sensor to estimate the distance relative to different locations. Additional power is generated by executing a multi-step measurement while the power self-optimizing process used dynamically adjusts the settings …


Strategies To Protect Against Security Violations During The Adoption Of The Internet Of Things By Manufacturers, Sixtus Anayochukwu Ekwo Jan 2021

Strategies To Protect Against Security Violations During The Adoption Of The Internet Of Things By Manufacturers, Sixtus Anayochukwu Ekwo

Walden Dissertations and Doctoral Studies

Security violations have been one of the key factors affecting manufacturers in adopting the Internet of Things (IoT). The corporate-level information technology (IT) leaders in the manufacturing industry encounter issues when adopting IoT due to security concerns because they lack strategies to protect against security violations. Grounded in Roger’s diffusion of innovations theory, the purpose of this qualitative multiple case study was to explore strategies corporate-level IT leaders use in protecting against security violations while adopting IoT for manufacturers. The participants were senior IT leaders in the eastern region of the United States. The data collection process included interviews with …