scholarly journals A WoT Platform for Supporting Full-Cycle IoT Solutions from Edge to Cloud Infrastructures: A Practical Case

Sensors ◽  
2020 ◽  
Vol 20 (13) ◽  
pp. 3770
Author(s):  
Rafael Pastor-Vargas ◽  
Llanos Tobarra ◽  
Antonio Robles-Gómez ◽  
Sergio Martin ◽  
Roberto Hernández ◽  
...  

Internet of Things (IoT) learning involves the acquisition of transversal skills ranging from the development based on IoT devices and sensors (edge computing) to the connection of the devices themselves to management environments that allow the storage and processing (cloud computing) of data generated by sensors. The usual development cycle for IoT applications consists of the following three stages: stage 1 corresponds to the description of the devices and basic interaction with sensors. In stage 2, data acquired by the devices/sensors are employed by communication models from the origin edge to the management middleware in the cloud. Finally, stage 3 focuses on processing and presentation models. These models present the most relevant indicators for IoT devices and sensors. Students must acquire all the necessary skills and abilities to understand and develop these types of applications, so lecturers need an infrastructure to enable the learning of development of full IoT applications. A Web of Things (WoT) platform named Labs of Things at UNED (LoT@UNED) has been used for this goal. This paper shows the fundamentals and features of this infrastructure, and how the different phases of the full development cycle of solutions in IoT environments are implemented using LoT@UNED. The proposed system has been tested in several computer science subjects. Students can perform remote experimentation with a collaborative WoT learning environment in the cloud, including the possibility to analyze the generated data by IoT sensors.

Author(s):  
K. Tsuno ◽  
T. Honda ◽  
Y. Harada ◽  
M. Naruse

Developement of computer technology provides much improvements on electron microscopy, such as simulation of images, reconstruction of images and automatic controll of microscopes (auto-focussing and auto-correction of astigmatism) and design of electron microscope lenses by using a finite element method (FEM). In this investigation, procedures for simulating the optical properties of objective lenses of HREM and the characteristics of the new lens for HREM at 200 kV are described.The process for designing the objective lens is divided into three stages. Stage 1 is the process for estimating the optical properties of the lens. Firstly, calculation by FEM is made for simulating the axial magnetic field distributions Bzc of the lens. Secondly, electron ray trajectory is numerically calculated by using Bzc. And lastly, using Bzc and ray trajectory, spherical and chromatic aberration coefficients Cs and Cc are numerically calculated. Above calculations are repeated by changing the shape of lens until! to find an optimum aberration coefficients.


2021 ◽  
Vol 10 (1) ◽  
pp. 13
Author(s):  
Claudia Campolo ◽  
Giacomo Genovese ◽  
Antonio Iera ◽  
Antonella Molinaro

Several Internet of Things (IoT) applications are booming which rely on advanced artificial intelligence (AI) and, in particular, machine learning (ML) algorithms to assist the users and make decisions on their behalf in a large variety of contexts, such as smart homes, smart cities, smart factories. Although the traditional approach is to deploy such compute-intensive algorithms into the centralized cloud, the recent proliferation of low-cost, AI-powered microcontrollers and consumer devices paves the way for having the intelligence pervasively spread along the cloud-to-things continuum. The take off of such a promising vision may be hurdled by the resource constraints of IoT devices and by the heterogeneity of (mostly proprietary) AI-embedded software and hardware platforms. In this paper, we propose a solution for the AI distributed deployment at the deep edge, which lays its foundation in the IoT virtualization concept. We design a virtualization layer hosted at the network edge that is in charge of the semantic description of AI-embedded IoT devices, and, hence, it can expose as well as augment their cognitive capabilities in order to feed intelligent IoT applications. The proposal has been mainly devised with the twofold aim of (i) relieving the pressure on constrained devices that are solicited by multiple parties interested in accessing their generated data and inference, and (ii) and targeting interoperability among AI-powered platforms. A Proof-of-Concept (PoC) is provided to showcase the viability and advantages of the proposed solution.


Author(s):  
I-Tien Lo ◽  
Ching-Yuan Lin ◽  
Ming-Tai Cheng

Abstract Objectives: This exercise aimed to validate New Taipei City’s strategic plan for a city lockdown in response to COVID-19. The main goal of all solutions was the principle of “reducing citizen activity and strengthening government control”. Methods: We created a suitable exercise, and creating 15 hypothetical situations for three stages. All participating units designed and proposed policy plans and execution protocols according to each situation. Results: In the course of the exercise, many existing policies and execution protocols were validated to address. Situations occurring in Stage 1, when the epidemic was spreading to the point of lockdown preparations, approaches to curb the continued spread of the epidemic in Stage 2, and returning to work after the epidemic is controlled and lockdown is lifted in Stage 3. Twenty response units participated in the exercise. Although favourable outcomes were obtained, the evaluators provided comments suggesting further improvements. Conclusions: Our exercise demonstrated a successful example to help policy making and revision in a large city over 4 million population during COVID-19 pandemic. It also enhanced participants’ subject knowledge and familiarity with the implementation of a city lockdown. For locations intending to go into lockdown, similar tabletop exercises are an effective verification option.


Minerals ◽  
2019 ◽  
Vol 9 (2) ◽  
pp. 99 ◽  
Author(s):  
Shunda Li ◽  
Xuebing Zhang ◽  
Lingling Gao

The Jinchang gold–copper deposit is located in Eastern Heilongjiang Province,Northeastern China. The orebody comprises primarily hydrothermal breccias, quartz veins, anddisseminated ores within granite, diorite, and granodiorite. Three paragenetic stages are identified:early quartz–pyrite–arsenopyrite (Stage 1), quartz–pyrite–chalcopyrite (Stage 2), and latequartz–pyrite–galena–sphalerite (Stage 3). Gold was deposited during all three stages and Stage 1was the major gold-producing stage. Copper is associated with the mineralization but has loweconomic value. Fluid inclusions (FIs) within the deposit are liquid-rich aqueous, vapor-rich aqueous,and daughter-mineral-bearing types. Microthermometric data for the FIs reveal decreasinghomogenization temperatures (Th) and salinities of the ore-forming fluids over time. The Th forStages 1–3 of the mineralization are 421–479, 363–408, and 296–347 °C, respectively. Stage 1 fluidsin vapor-rich and daughter-mineral-bearing inclusions have salinities of 5.7–8.7 and 49.8–54.4 wt%NaCl equivalent, respectively. Stage 2 fluids in vapor-rich, liquid-rich, and daughter-mineral-bearinginclusions have salinities of 1.2–5.4, 9.5–16.0, and 43.3–48.3 wt% NaCl, respectively. Stage 3 fluids inliquid-rich and daughter-mineral-bearing inclusions have salinities of 7.9–12.6 and 38.3–42.0 wt% NaClequivalent, respectively. The estimated trapping pressures are 160–220 bar, corresponding toan entrapment depth of 1.6–1.2 km in the paleo-water table. Oxygen and hydrogen isotope data(δ18OV-SMOW = 8.6‰ to 11.4‰; δDV-SMOW = −92.2‰ to −72.1‰) suggest that the ore-forming fluidswere derived from magmatic fluids during the early stages of mineralization and subsequentlyincorporated meteoric water during the late stages. The sulfide minerals have δ34SVCDT values of0.2‰–3.5‰, suggesting that the sulfur has a magmatic origin. The Jinchang deposit is a typicalgold-rich gold–copper porphyry deposit.


Internet of Things(IoT) is playing a pivotal role in our daily life as well as in various fields like Health, agriculture, industries etc. In the go, the data in the various IoT applications will be easily available to the physical dominion and thus the process of ensuringthe security of the data will be a major concern. For the extensive implementation of the numerous applications of IoT , the data security is a critical component. In our work, we have developed an encryption technique to secure the data of IoT. With the help of Merkle-Hellman encryption the data collected from the various IoT devices are first of all encrypted and then the secret message is generated with the help of Elliptic Curve Cryptography.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Zakaria Mahlaoui ◽  
Eva Antonino-Daviu ◽  
Miguel Ferrando-Bataller

Based on the characteristic mode theory, a versatile radiation pattern reconfigurable antenna is proposed. The analysis starts from two parallel metallic plates with the same and different dimensions. By means of two PIN diodes, the size of one of the parallel metallic plates can be modified and consequently the behavior of the radiation pattern can be switched between bidirectional and unidirectional radiation patterns. Moreover, a SPDT switch is used to adjust the frequency and match the input impedance. The reconfigurable antenna prototype has been assembled and tested, and a good agreement between simulated and measured results is obtained at 2.5 GHz band which fits the IoT applications.


2019 ◽  
Vol 2019 ◽  
pp. 1-19 ◽  
Author(s):  
Zeeshan Ali Khan ◽  
Peter Herrmann

Many Internet of Things (IoT) systems run on tiny connected devices that have to deal with severe processor and energy restrictions. Often, the limited processing resources do not allow the use of standard security mechanisms on the nodes, making IoT applications quite vulnerable to different types of attacks. This holds particularly for intrusion detection systems (IDS) that are usually too resource-heavy to be handled by small IoT devices. Thus, many IoT systems are not sufficiently protected against typical network attacks like Denial-of-Service (DoS) and routing attacks. On the other side, IDSs have already been successfully used in adjacent network types like Mobile Ad hoc Networks (MANET), Wireless Sensor Networks (WSN), and Cyber-Physical Systems (CPS) which, in part, face limitations similar to those of IoT applications. Moreover, there is research work ongoing that promises IDSs that may better fit to the limitations of IoT devices. In this article, we will give an overview about IDSs suited for IoT networks. Besides looking on approaches developed particularly for IoT, we introduce also work for the three similar network types mentioned above and discuss if they are also suitable for IoT systems. In addition, we present some suggestions for future research work that could be useful to make IoT networks more secure.


Author(s):  
Mamata Rath ◽  
Bibudhendu Pati

Adoption of Internet of Things (IoT) and Cloud of Things (CoT) in the current developing technology era are expected to be more and more invasive, making them important mechanism of the future Internet-based communication systems. Cloud of Things and Internet of Things (IoT) are two emerging as well as diversified advanced domains that are diversified in current technological scenario. Paradigm where Cloud and IoT are merged together is foreseen as disruptive and as an enabler of a large number of application scenarios. Due to the adoption of the Cloud and IoT paradigm a number of applications are gaining important technical attention. In the future, it is going to be more complicated a setup to handle security in technology. Information till now will severely get changed and it will be very tough to keep up with varying technology. Organisations will have to repeatedly switch over to new skill-based technology with respect to higher expenditure. Latest tools, methods and enough expertise are highly essential to control threats and vulnerability to computing systems. Keeping in view the integration of Cloud computing and IoT in the new domain of Cloud of things, the said article provides an up-to-date eminence of Cloud-based IoT applications and Cloud of Things with a focus on their security and application-oriented challenges. These challenges are then synthesized in detail to present a technical survey on various issues related to IoT security, concerns, adopted mechanisms and their positive security assurance using Cloud of Things.


Electronics ◽  
2020 ◽  
Vol 9 (11) ◽  
pp. 1925
Author(s):  
Soe Ye Yint Tun ◽  
Samaneh Madanian ◽  
Dave Parry

The elderly population is increasing globally, putting more pressure on aged care and public health systems. To address this issue and help increase the independence of older people, different digital technologies, including the Internet of things (IoT), can play an important role. Although there has been an increase in the number of studies in this field, most of them concentrate on IoT applications in elderly care from a technology perspective, with very little contribution from the clinical side. Therefore, this paper aims to investigate and identify the available IoT applications and their clinical utility for common diseases in elderly people. The results of this study could be useful for information technology professionals in developing and understanding the clinical requirements for IoT applications in healthcare for older people. Clinicians will also be informed about the clinical possibilities of using IoT devices in this area. Based on our findings, future research should focus on enhancing the clinical utility of current IoT applications in different settings and on developing new applications to support practitioners and older people.


2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Wanli Zhang ◽  
Xianwei Li ◽  
Liang Zhao ◽  
Xiaoying Yang

Network performance is of great importance for processing Internet of Things (IoT) applications in the fifth-generation (5G) communication system. With the increasing number of the devices, how network services should be provided with better performances is becoming a pressing issue. The static resource allocation of wireless networks is becoming a bottleneck for the emerging IoT applications. As a potential solution, network virtualization is considered a promising approach to enhancing the network performance and solving the bottleneck issue. In this paper, the problem of wireless network virtualization is investigated where one wireless infrastructure provider (WIP), mobile virtual network operators (MVNOs), and IoT devices coexist. In the system model under consideration, with the help of a software-defined network (SDN) controller, the WIP can divide and reconfigure its radio frequency bands to radio frequency slices. Then, two MVNOs, MVNO1 and MVNO2, can lease these frequency slices from the WIP and then provide IoT network services to IoT users under competition. We apply a two-stage Stackelberg game to investigate and analyze the relationship between the two MVNOs and IoT users, where MVNO1 and MVNO2 firstly try to maximize their profits by setting the optimal network service prices. Then, IoT users make decisions on which network service they should select according to the performances and prices of network services. Two competition cases between MVNO1 and MVNO2 are considered, namely, Stackelberg game (SG) where MVNO1 is the leader whose price of network service is set firstly and MVNO2 is the follower whose network service price is set later and noncooperative strategic game (NSG) under which the service prices of MVNO1 and MVNO2 are simultaneously set. Each IoT user decides whether and which MVNO to select on the basis of the network service prices and qualities. The numerical results are provided to show the effectiveness of our game model and the proposed solution method.


Sign in / Sign up

Export Citation Format

Share Document