scholarly journals Potentials of Internet of Things (IoT) in Malaysian Construction Industry

2018 ◽  
Vol 2 (4) ◽  
pp. 44-52 ◽  
Author(s):  
Syamsul H. Mahmud ◽  
Laromi Assan ◽  
Rashidul Islam

IoT is a man-made technology conceptualized by intelligent virtual objects, which capable of knowing all things and allows the devices around themselves to interact automatically without human control. Every year, the number of IoT devices usage is exponentially increasing and estimated as much as 75.44 billion devices will be connected in IoT network. In line with the expansion of the IoT network, the construction industry should take into consideration as otherwise the construction industry will be left behind by other industries. This is because the construction industry should utilize the applications offered by IoT to ensure the smoothness of the construction industry in the project. Therefore, the objective of this study is to identify the types of IoT applications used in the construction industry in Malaysia. The research method used to identify the types of IoT applications used is through the questionnaire method. The questionnaire was analysed using nominal analysis. A study was conducted on construction industry players which comprising of government agencies, developers, architects, engineers, quantity surveyors and class G7 contractors covering all states in Malaysia. The findings show that among the many types of IoT applications used by construction industry players are social media such as WhatsApp, Telegram and Facebook for discussion and communication purposes, the use of email for information and communication exchange and website usage as a source of reference to obtain data on company profiles, acts and policy, price quotes and so on.

2020 ◽  
Vol 10 (1) ◽  
pp. 1-10 ◽  
Author(s):  
Sanjay P. Ahuja ◽  
Nathan Wheeler

Fog computing has been rising in popularity over the last few years due in part to the many benefits that Fog confers upon Internet of Things (IoT) applications. Fog Computing extends the Cloud to the IoT devices. In this paper, the author explore IoT, Fog, and Cloud, as well as the benefits that are possible and have been realized by utilizing the 3 technologies in a 3-tier architecture. A reference architecture is provided, applications of the 3-tier architecture from the literature are discussed, and recommendations are made for future work.


2019 ◽  
Vol 11 (21) ◽  
pp. 5952 ◽  
Author(s):  
Faisal Mehmood ◽  
Shabir Ahmad ◽  
DoHyeun Kim

An internet of things (IoT) platform is a multi-layer technology that enables automation of connected devices within IoT. IoT platforms serve as a middle-ware solution and act as supporting software that is able to connect different hardware devices, access points, and networks to other parts of the value chain. Virtual objects have become a vital component in every IoT platform. Virtual objects are the digital representation of a physical entity. In this paper, we design and implement a cloud-centric IoT platform that serves a purpose for registration and initialization of virtual objects so that technology tinkerers can consume them via the IoT marketplace and integrate them to build IoT applications. The proposed IoT platform differs from existing IoT platforms in the sense that they provide hardware and software services on the same platform that users can plug and play. The proposed IoT platform is separate from the IoT marketplace where users can consume virtual objects to build IoT applications. Experiments are conducted for IoT platform and interworking IoT marketplace based on virtual objects in CoT. The proposed IoT platform provides a user-friendly interface and is secure and reliable. An IoT testbed is developed and a case study is performed for a domestic environment to reuse virtual objects on the IoT marketplace. It also provides the discovery and sharing of virtual objects. IoT devices can be monitored and controlled via virtual objects. We have conducted a comparative analysis of the proposed IoT platform with FIWARE. Results conclude that the proposed system performs marginally better than FIWARE.


Internet of Things (IoT) is the most emerging field in Information Technology. IoT will make real-world objects into virtual objects and allows them to be sensed remotely. The IoT biological community is changing and getting to be appealing over a more extensive scope of controls, consequently their development in prevalent innovation. Security and protection are the key issues for IoT applications and still face some huge difficulties. Pervasive IoT gadgets have genuine security suggestions as they happen in extensive numbers, are topographically dispersed and can be hard to physically verify. These gadgets may contain touchy or economically profitable information making them appealing to different types of assault. It is discovered that a large portion of the gadgets is defenseless against assaults on hardware, firmware as well as web interface level. In this paper, vulnerabilities due to Insufficient Security Configurability, Insecure Firmware, Security Misconfiguration of IoT devices, recommendations for those vulnerabilities and an approach to reproduce those attacks is explained so as to provide better security to IoT Devices.


2021 ◽  
Vol 10 (1) ◽  
pp. 13
Author(s):  
Claudia Campolo ◽  
Giacomo Genovese ◽  
Antonio Iera ◽  
Antonella Molinaro

Several Internet of Things (IoT) applications are booming which rely on advanced artificial intelligence (AI) and, in particular, machine learning (ML) algorithms to assist the users and make decisions on their behalf in a large variety of contexts, such as smart homes, smart cities, smart factories. Although the traditional approach is to deploy such compute-intensive algorithms into the centralized cloud, the recent proliferation of low-cost, AI-powered microcontrollers and consumer devices paves the way for having the intelligence pervasively spread along the cloud-to-things continuum. The take off of such a promising vision may be hurdled by the resource constraints of IoT devices and by the heterogeneity of (mostly proprietary) AI-embedded software and hardware platforms. In this paper, we propose a solution for the AI distributed deployment at the deep edge, which lays its foundation in the IoT virtualization concept. We design a virtualization layer hosted at the network edge that is in charge of the semantic description of AI-embedded IoT devices, and, hence, it can expose as well as augment their cognitive capabilities in order to feed intelligent IoT applications. The proposal has been mainly devised with the twofold aim of (i) relieving the pressure on constrained devices that are solicited by multiple parties interested in accessing their generated data and inference, and (ii) and targeting interoperability among AI-powered platforms. A Proof-of-Concept (PoC) is provided to showcase the viability and advantages of the proposed solution.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5260
Author(s):  
Yi-Bing Lin ◽  
Sheng-Lin Chou

Due to the fast evolution of Sensor and Internet of Things (IoT) technologies, several large-scale smart city applications have been commercially developed in recent years. In these developments, the contracts are often disputed in the acceptance due to the fact that the contract specification is not clear, resulting in a great deal of discussion of the gray area. Such disputes often occur in the acceptance processes of smart buildings, mainly because most intelligent building systems are expensive and the operations of the sub-systems are very complex. This paper proposes SpecTalk, a platform that automatically generates the code to conform IoT applications to the Taiwan Association of Information and Communication Standards (TAICS) specifications. SpecTalk generates a program to accommodate the application programming interface of the IoT devices under test (DUTs). Then, the devices can be tested by SpecTalk following the TAICS data formats. We describe three types of tests: self-test, mutual-test, and visual test. A self-test involves the sensors and the actuators of the same DUT. A mutual-test involves the sensors and the actuators of different DUTs. A visual-test uses a monitoring camera to investigate the actuators of multiple DUTs. We conducted these types of tests in commercially deployed applications of smart campus constructions. Our experiments in the tests proved that SpecTalk is feasible and can effectively conform IoT implementations to TACIS specifications. We also propose a simple analytic model to select the frequency of the control signals for the input patterns in a SpecTalk test. Our study indicates that it is appropriate to select the control signal frequency, such that the inter-arrival time between two control signals is larger than 10 times the activation delay of the DUT.


2016 ◽  
Vol 110 (1) ◽  
pp. 149-165
Author(s):  
Michael E. Pregill

At the time of Shahab Ahmed's untimely death on 17 September 2015, he left behind many admiring colleagues, students, friends, and family, as well as a weighty tome of monumental significance—What Is Islam? The Importance of Being Islamic. It is tragic when an author's first book is published posthumously, perhaps even more so in this case given that Ahmed's work is poised to have a pervasive influence on the field of Islamic Studies and has already garnered numerous accolades. Like a supermassive celestial body, this dense book exerts an irresistible attraction and alters the intellectual trajectory of those drawn into its orbit. What Is Islam? poses difficult questions no one in the field can ignore, even if one disagrees with its premises, methods, or conclusions. We are collectively the poorer for being unable to engage directly with the author in the many discussions that are sure to be provoked by the book's meteoric impact.


Internet of Things(IoT) is playing a pivotal role in our daily life as well as in various fields like Health, agriculture, industries etc. In the go, the data in the various IoT applications will be easily available to the physical dominion and thus the process of ensuringthe security of the data will be a major concern. For the extensive implementation of the numerous applications of IoT , the data security is a critical component. In our work, we have developed an encryption technique to secure the data of IoT. With the help of Merkle-Hellman encryption the data collected from the various IoT devices are first of all encrypted and then the secret message is generated with the help of Elliptic Curve Cryptography.


2017 ◽  
Vol 13 (16) ◽  
pp. 113
Author(s):  
Youssef Nafidi ◽  
Anouar Alami ◽  
Moncef Zaki ◽  
Hanane Afkar ◽  
Mohammed Elazami Elhassani

In light of empirical experience from Morocco, combined with new possibilities afforded by Information and Communication Technology (ICT), there is a wish to integrate new technologies into distance education to help solve a set of problems identified in the initial training at the Regional Centre for the Professions of Education and Training of Fez-Meknes. The results of a study conducted among 15 trainee teachers of the Earth and Life Sciences allow us to conclude that designing a hypermedia tool for learning could constitute a promising solution to address the many challenges linked to the initial training of teachers in Morocco. Finally, the use of this digital resource by trainee teachers’ has also strongly contributed to their eagerness to integrate ICT in their subsequent teaching practices.


2021 ◽  
Vol 2 (4) ◽  
Author(s):  
Mansur Hamma-adama ◽  
◽  
Abdul-Basit Sa’eed Ahmad ◽  

Construction Industry is evolving amid the fourth industrial revolution. Transportation, commerce, manufacturing and many other industries ripened the current technological advancement and are striving to utilise every development in the IT sector. The procurement of construction works is known to be very conventional and backward in the adoption of digitalisation. The construction industry's procurement and supply chain are blamed for the most inflated cost of construction projects, mainly attributed to a lack of transparency and trust between the industry stakeholders. This research explores the challenges of E-procurement adoption in the industry and identifies the potential opportunities for its usage. This investigation's data are acquired through interviews, and the data are analysed using qualitative content analysis. This study reveals compounding challenges (i.e., corruption and lack of commitment) that lead to the failure of such efforts in Nigeria and the potential prospects (i.e., transparency and efficiency). This study is essential in developing a more effective and transparent process of procurement so that the Nigerian construction industry is not be left behind in the fast-digitalising markets.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Zakaria Mahlaoui ◽  
Eva Antonino-Daviu ◽  
Miguel Ferrando-Bataller

Based on the characteristic mode theory, a versatile radiation pattern reconfigurable antenna is proposed. The analysis starts from two parallel metallic plates with the same and different dimensions. By means of two PIN diodes, the size of one of the parallel metallic plates can be modified and consequently the behavior of the radiation pattern can be switched between bidirectional and unidirectional radiation patterns. Moreover, a SPDT switch is used to adjust the frequency and match the input impedance. The reconfigurable antenna prototype has been assembled and tested, and a good agreement between simulated and measured results is obtained at 2.5 GHz band which fits the IoT applications.


Sign in / Sign up

Export Citation Format

Share Document