Open Access. Powered by Scholars. Published by Universities.®
Databases and Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
- Publication
- Publication Type
Articles 1 - 3 of 3
Full-Text Articles in Databases and Information Systems
Integration Of Internet Of Things And Health Recommender Systems, Moonkyung Yang
Integration Of Internet Of Things And Health Recommender Systems, Moonkyung Yang
Electronic Theses, Projects, and Dissertations
The Internet of Things (IoT) has become a part of our lives and has provided many enhancements to day-to-day living. In this project, IoT in healthcare is reviewed. IoT-based healthcare is utilized in remote health monitoring, observing chronic diseases, individual fitness programs, helping the elderly, and many other healthcare fields. There are three main architectures of smart IoT healthcare: Three-Layer Architecture, Service-Oriented Based Architecture (SoA), and The Middleware-Based IoT Architecture. Depending on the required services, different IoT architecture are being used. In addition, IoT healthcare services, IoT healthcare service enablers, IoT healthcare applications, and IoT healthcare services focusing on Smartwatch …
A High-Accuracy And Power-Efficient Self-Optimizing Wireless Water Level Monitoring Iot Device For Smart City, Tsun-Kuang Chi, Hsiao-Chi Chen, Shih-Lun Chen, Patricia Angela R. Abu
A High-Accuracy And Power-Efficient Self-Optimizing Wireless Water Level Monitoring Iot Device For Smart City, Tsun-Kuang Chi, Hsiao-Chi Chen, Shih-Lun Chen, Patricia Angela R. Abu
Department of Information Systems & Computer Science Faculty Publications
In this paper; a novel self-optimizing water level monitoring methodology is proposed for smart city applications. Considering system maintenance; the efficiency of power consumption and accuracy will be important for Internet of Things (IoT) devices and systems. A multi-step measurement mechanism and power self-charging process are proposed in this study for improving the efficiency of a device for water level monitoring applications. The proposed methodology improved accuracy by 0.16–0.39% by moving the sensor to estimate the distance relative to different locations. Additional power is generated by executing a multi-step measurement while the power self-optimizing process used dynamically adjusts the settings …
Strategies To Protect Against Security Violations During The Adoption Of The Internet Of Things By Manufacturers, Sixtus Anayochukwu Ekwo
Strategies To Protect Against Security Violations During The Adoption Of The Internet Of Things By Manufacturers, Sixtus Anayochukwu Ekwo
Walden Dissertations and Doctoral Studies
Security violations have been one of the key factors affecting manufacturers in adopting the Internet of Things (IoT). The corporate-level information technology (IT) leaders in the manufacturing industry encounter issues when adopting IoT due to security concerns because they lack strategies to protect against security violations. Grounded in Roger’s diffusion of innovations theory, the purpose of this qualitative multiple case study was to explore strategies corporate-level IT leaders use in protecting against security violations while adopting IoT for manufacturers. The participants were senior IT leaders in the eastern region of the United States. The data collection process included interviews with …