期刊文献+

为您找到了以下期刊:

共找到112篇文章
< 1 2 6 >
每页显示 20 50 100
Development of a Low-Cost Internet-of-Things (IoT) System for Monitoring Soil Water Potential Using Watermark 200SS Sensors 被引量:7
1
作者 José O. Payero Ali Mirzakhani-Nafchi +2 位作者 Ahmad Khalilian Xin Qiao Rebecca Davis advances in internet of things 2017年第3期71-86,共16页
Soil moisture monitoring is one of the methods that farmers can use for irrigation scheduling. Many sensor types and data logging systems have been developed for this purpose over the years, but their widespread adopt... Soil moisture monitoring is one of the methods that farmers can use for irrigation scheduling. Many sensor types and data logging systems have been developed for this purpose over the years, but their widespread adoption in practical irrigation scheduling is still limited due to a variety of factors. Important factors limiting adoption of soil moisture sensing technology by farmers include high cost and difficulties in timely data collection and interpretation. Recent developments in open source microcontrollers (such as Arduino), wireless communication, and Internet-of-Things (IoT) technologies offer opportunities for reducing cost and facilitating timely data collection, visualization, and interpretation for farmers. Therefore, the objective of this study was to develop and test a low-cost IoT system for soil moisture monitoring using Watermark 200SS sensors. The system uses Arduino-based microcontrollers and data from the field sensors (End Nodes) are communicated wirelessly using LoRa radios to a receiver (Coordinator), which connects to the Internet via WiFi and sends the data to an open-source website (ThingSpeak.com) where the data can be visualized and further analyzed using Matlab. The system was successfully tested under field conditions by installing Watermark sensors at four depths in a wheat field. The system described here could contribute to widespread adoption of easy-to-use and affordable moisture sensing technologies among farmers. 展开更多
关键词 IRRIGATION Scheduling Automation SENSORS Soil MOISTURE Internet-of-Things ARDUINO WATERMARK SENSORS Calibration
暂未订购
Cyber-Physical-Social Based Security Architecture for Future Internet of Things 被引量:10
2
作者 Huansheng Ning Hong Liu advances in internet of things 2012年第1期1-7,共7页
As the Internet of Things (IoT) is emerging as an attractive paradigm, a typical IoT architecture that U2IoT (Unit IoT and Ubiquitous IoT) model has been presented for the future IoT. Based on the U2IoT model, this pa... As the Internet of Things (IoT) is emerging as an attractive paradigm, a typical IoT architecture that U2IoT (Unit IoT and Ubiquitous IoT) model has been presented for the future IoT. Based on the U2IoT model, this paper proposes a cyber-physical-social based security architecture (IPM) to deal with Information, Physical, and Management security perspectives, and presents how the architectural abstractions support U2IoT model. In particular, 1) an information security model is established to describe the mapping relations among U2IoT, security layer, and security requirement, in which social layer and additional intelligence and compatibility properties are infused into IPM;2) physical security referring to the external context and inherent infrastructure are inspired by artificial immune algorithms;3) recommended security strategies are suggested for social management control. The proposed IPM combining the cyber world, physical world and human social provides constructive proposal towards the future IoT security and privacy protection. 展开更多
关键词 Internet of THINGS PHYSICAL SOCIAL CYBER Security Architecture
在线阅读 下载PDF
Integrating RFIDs and Smart Objects into a UnifiedInternet of Things Architecture 被引量:7
3
作者 Evangelos A. Kosmatos Nikolaos D. Tselikas Anthony C. Boucouvalas advances in internet of things 2011年第1期5-12,共8页
The term Internet of Things refers to the networked interconnection of objects of diverse nature, such as electronic devices, sensors, but also physical objects and beings as well as virtual data and environments. Alt... The term Internet of Things refers to the networked interconnection of objects of diverse nature, such as electronic devices, sensors, but also physical objects and beings as well as virtual data and environments. Although the basic concept of the Internet of Things sounds simple, its application is difficult and, so far, the respective existing architectural models are rather monolithic and are dominated by several limitations. The paper introduces a generic Internet of Things architecture trying to resolve the existing restrictions of current architectural models by integrating both RFID and smart object-based infrastructures, while also exploring a third parameter, i.e. the social potentialities of the Internet of Things building blocks towards shaping the “Social Internet of Things”. The proposed architecture is based on a layered lightweight and open middle-ware solution following the paradigm of Service Oriented Architecture and the Semantic Model Driven Ap-proach, which is realized at both design-time and deployment–time covering the whole service lifecycle for the corresponding services and applications provided. 展开更多
关键词 Internet of THINGS RFID SMART OBJECTS Blojects Service ORIENTED Architecture SEMANTIC Model Driven Approach
在线阅读 下载PDF
Evaluation of Microblog Users’ Influence Based on PageRank and Users Behavior Analysis 被引量:6
4
作者 Lijuan Huang Yeming Xiong advances in internet of things 2013年第2期34-40,共7页
This paper explores the uses’ influences on microblog. At first, according to the social network theory, we present an analysis of information transmitting network structure based on the relationship of following and... This paper explores the uses’ influences on microblog. At first, according to the social network theory, we present an analysis of information transmitting network structure based on the relationship of following and followed phenomenon of microblog users. Informed by the microblog user behavior analysis, the paper also addresses a model for calculating weights of users’ influence. It proposes a U-R model, using which we can evaluate users’ influence based on PageRank algorithms and analyzes user behaviors. In the U-R model, the effect of user behaviors is explored and PageRank is applied to evaluate the importance and the influence of every user in a microblog network by repeatedly iterating their own U-R value. The users’ influences in a microblog network can be ranked by the U-R value. Finally, the validity of U-R model is proved with a real-life numerical example. 展开更多
关键词 SOCIAL Network Microblog USERS BEHAVIOR PAGERANK ALGORITHMS U-R Model INFLUENCE
暂未订购
Design and Implementation of a Low-Power Active RFID for Container Tracking at 2.4 GHz Frequency 被引量:4
5
作者 Dawood Moeinfar Hossein Shamsi Fatemeh Nafar advances in internet of things 2012年第2期13-22,共10页
In this paper a new active RFID system at 2.45 GHz based on the low-power system-on-chip CC2530 RF transceiver is designed and implemented. Only by using of an integrated multi-channel fast chip, both the MCU and RF o... In this paper a new active RFID system at 2.45 GHz based on the low-power system-on-chip CC2530 RF transceiver is designed and implemented. Only by using of an integrated multi-channel fast chip, both the MCU and RF operations are done which makes the RFID more reliable and reduces the complexity of the hardware and cost, vividly. This RFID system utilizes the Zig-Bee IEEE 802.15.4 standard in the ISM band. A lot amount of energy is restored by setting Tags in the sleep mode in the most of times. The maximum transmission range of 80 m at the output power of 4.5 dBm is obtained. The main application of this system is for the container identification with precise operation and high accuracy. An active Tag with unique ID is mounted on each vehicle. By enabling the AUTOCRC error detection possibility, minor errors are detected in the received frames. Receiver sensitivity of –97 dBm and current consumption of 1 μA in the sleep mode and 29.6 mA in the active mode are reported. 展开更多
关键词 Radio FREQUENCY Identification (RFID) CC2530 RSSI Active Tags Collision TDMA IEEE 802.15.4 SLEEP Mode
暂未订购
Marketing Management for Consumer Products in the Era of the Internet of Things 被引量:2
6
作者 Reinhold Decker Christian Stummer advances in internet of things 2017年第3期47-70,共24页
In the Internet of Things (IoT) consumer products like coffee machines and smoke detectors are connected with the Internet, which effectively expands the Internet to the physical world. Such products have the ability ... In the Internet of Things (IoT) consumer products like coffee machines and smoke detectors are connected with the Internet, which effectively expands the Internet to the physical world. Such products have the ability to collect and share data from the user’s environment and, thus, their broad emergence will affect well-established concepts presented in the extant marketing literature. In order to provide a distinct contribution, we focus on customer relationship management, product life cycle management, as well as business model development and discuss implications of the enhanced capabilities of IoT products in these fields. By means of an extensive analysis of current developments in theory and practice, we systematically deduce ten research propositions. The paper concludes with a synthesis of findings and an outlook to promising directions for further research in IoT-oriented marketing management. 展开更多
关键词 Internet of THINGS SMART Products MARKETING Management PRODUCT ANALYTICS
暂未订购
Intelligent Video Surveillance System for Elderly People Living Alone Based on ODVS 被引量:3
7
作者 Yiping Tang Baoqing Ma Hangchen Yan advances in internet of things 2013年第2期44-52,共9页
Intelligent video surveillance for elderly people living alone using Omni-directional Vision Sensor (ODVS) is an important application in the field of intelligent video surveillance. In this paper, an ODVS is utilized... Intelligent video surveillance for elderly people living alone using Omni-directional Vision Sensor (ODVS) is an important application in the field of intelligent video surveillance. In this paper, an ODVS is utilized to provide a 360° panoramic image for obtaining the real-time situation for the elderly at home. Some algorithms such as motion object detection, motion object tracking, posture detection, behavior analysis are used to implement elderly monitoring. For motion detection and object tracking, a method based on MHoEI(Motion History or Energy Images) is proposed to obtain the trajectory and the minimum bounding rectangle information for the elderly. The posture of the elderly is judged by the aspect ratio of the minimum bounding rectangle. And there are the different aspect ratios in accordance with the different distance between the object and ODVS. In order to obtain activity rhythm and detect variously behavioral abnormality for the elderly, a detection method is proposed using time, space, environment, posture and action to describe, analyze and judge the various behaviors of the elderly in the paper. In addition, the relationship between the panoramic image coordinates and the ground positions is acquired by using ODVS calibration. The experiment result shows that the above algorithm can meet elderly surveillance demand and has a higher recognizable rate. 展开更多
关键词 Intelligent Surveillance ELDERLY People LIVING ALONE ODVS MHoEI Algorithm POSE Detection ABNORMAL Behavior Recognition
暂未订购
Smart Agriculture with an Automated IoT-Based Greenhouse System for Local Communities 被引量:3
8
作者 Nianpu Li Yimeng Xiao +3 位作者 Lei Shen Zhuoyue Xu Botao Li Chongxuan Yin advances in internet of things 2019年第2期15-31,共17页
Nowadays, smart agriculture using wireless communication is replacing the wired system which was difficult to install and manage. Then, this paper introduces a new design for IoT application on the greenhouse, which u... Nowadays, smart agriculture using wireless communication is replacing the wired system which was difficult to install and manage. Then, this paper introduces a new design for IoT application on the greenhouse, which utilizes different technologies to present a new model for practical implementation in the IoT concept. This design can settle a new method to solve problems in Market Demand, Precision in Operation and supervision. Furthermore, this design can be used in many cases and assist farmers, cropper and planted people to develop their business. 展开更多
关键词 Internet of THINGS HYDROPONICS ZigBee Sensor Network AUTOMATED AGRICULTURE CLOUD
暂未订购
Evolving Open-Source Technologies Offer Options for Remote Sensing and Monitoring in Agriculture 被引量:3
9
作者 Daniel K. Fisher Reginald S. Fletcher Saseendran S. Anapalli advances in internet of things 2020年第1期1-10,共10页
A variety of sensing and monitoring systems have been developed based on the concept of open-source and on open-source hardware and software components. Availability and relatively low cost of hardware components and ... A variety of sensing and monitoring systems have been developed based on the concept of open-source and on open-source hardware and software components. Availability and relatively low cost of hardware components and availability and ease of use of software components allow access to sensing and monitoring technologies that were previously unattainable to many potential users. Advances in electronic monitoring and evolving cellular communications technologies are increasingly offering more, simpler, and less expensive options for remote monitoring. Due to the near-future cessation of 2G and 3G cellular network services, however, many existing monitoring systems will need to be redesigned to operate on alternative cellular networks. A soil-moisture monitoring system was developed incorporating updated open-source Arduino microcontrollers and the recently introduced LTE Cat-M1 cellular network to transmit sensor measurements via the cellular network for access on an internet website. The monitoring system costs approximately US$130 to construct the electronic circuitry and less than US$1 per month for cellular network access and data transmission. Data were transmitted with a 95% success rate, and the monitoring system operated continuously throughout an entire crop growing season with no battery recharge or maintenance requirements. The design and operation of the monitoring system can serve as a basis for other remote monitoring systems. 展开更多
关键词 ARDUINO Microcontrollers Cellular Soil Moisture Sensors Internet of THINGS
在线阅读 下载PDF
Proposed Caching Scheme for Optimizing Trade-off between Freshness and Energy Consumption in Name Data Networking Based IoT 被引量:1
10
作者 Rahul Shrimali Hemal Shah Riya Chauhan advances in internet of things 2017年第2期11-24,共14页
Over the last few years, the Internet of Things (IoT) has become an omnipresent term. The IoT expands the existing common concepts, anytime and anyplace to the connectivity for anything. The proliferation in IoT offer... Over the last few years, the Internet of Things (IoT) has become an omnipresent term. The IoT expands the existing common concepts, anytime and anyplace to the connectivity for anything. The proliferation in IoT offers opportunities but may also bear risks. A hitherto neglected aspect is the possible increase in power consumption as smart devices in IoT applications are expected to be reachable by other devices at all times. This implies that the device is consuming electrical energy even when it is not in use for its primary function. Many researchers’ communities have started addressing storage ability like cache memory of smart devices using the concept called—Named Data Networking (NDN) to achieve better energy efficient communication model. In NDN, memory or buffer overflow is the common challenge especially when internal memory of node exceeds its limit and data with highest degree of freshness may not be accommodated and entire scenarios behaves like a traditional network. In such case, Data Caching is not performed by intermediate nodes to guarantee highest degree of freshness. On the periodical updates sent from data producers, it is exceedingly demanded that data consumers must get up to date information at cost of lease energy. Consequently, there is challenge in maintaining tradeoff between freshness energy consumption during Publisher-Subscriber interaction. In our work, we proposed the architecture to overcome cache strategy issue by Smart Caching Algorithm for improvement in memory management and data freshness. The smart caching strategy updates the data at precise interval by keeping garbage data into consideration. It is also observed from experiment that data redundancy can be easily obtained by ignoring/dropping data packets for the information which is not of interest by other participating nodes in network, ultimately leading to optimizing tradeoff between freshness and energy required. 展开更多
关键词 Internet of Things (IoT) Named Data NETWORKING Smart CACHING Table Pending INTEREST Forwarding INFORMATION Base CONTENT Store CONTENT Centric NETWORKING INFORMATION Centric NETWORKING Data & INTEREST Packets SCTSmart CACHING
暂未订购
Application of Internet of Things in Urban Waterlogging Prevention Management System 被引量:1
11
作者 Qinggong Ma Bo Yang Jipeng Wang advances in internet of things 2017年第1期1-9,共9页
This paper aims to realize the extensive application of Internet of things technology in urban waterlogging prevention management system, and has analyzed the security requirement and security architecture of Internet... This paper aims to realize the extensive application of Internet of things technology in urban waterlogging prevention management system, and has analyzed the security requirement and security architecture of Internet of things technology, and discussed the demand of urban waterlogging prevention management system in combination with the key technology of Internet of things technology, to do the overall design and functional design well during designing of urban waterlogging prevention management system. Finally, the application process of the Internet of things technology in Chongqing waterlogging prevention management system is summarized. The application result shows that the flood control and drainage function of Chongqing is gradually improved with smooth drainage facilities;the inspection and maintenance management is gradually standardized;operation monitoring and early warning management is fully strengthened. There is visual management for emergency command and dispatch, and at the same time, the drainage pipe network assessment management can be conducted correctly. 展开更多
关键词 Internet of THINGS Urban WATERLOGGING PREVENTION Management System Sys-tem Design APPLICATION Analysis
暂未订购
Enabling IoT Network Slicing with Network Function Virtualization 被引量:2
12
作者 Ting-An Tsai Fuchun Joseph Lin advances in internet of things 2020年第3期17-35,共19页
Numerous Internet of Things (IoT) devices are being connected to the net-works to offer services. To cope with a large diversity and number of IoT ser-vices, operators must meet those needs with a more flexible and ef... Numerous Internet of Things (IoT) devices are being connected to the net-works to offer services. To cope with a large diversity and number of IoT ser-vices, operators must meet those needs with a more flexible and efficient net-work architecture. Network slicing in 5G promises a feasible solution for this issue with network virtualization and programmability enabled by NFV (Net-work Functions Virtualization). In this research, we use virtualized IoT plat-forms as the Virtual Network Functions (VNFs) and customize network slices enabled by NFV with different QoS to support various kinds of IoT services for their best performance. We construct three different slicing systems including: 1) a single slice system, 2) a multiple customized slices system and 3) a single but scalable network slice system to support IoT services. Our objective is to compare and evaluate these three systems in terms of their throughput, aver-age response time and CPU utilization in order to identify the best system de-sign. Validated with our experiments, the performance of the multiple slicing system is better than those of the single slice systems whether it is equipped with scalability or not. 展开更多
关键词 NFV NFV MANO Network Slicing SCALABILITY IOT OPENSTACK Kubernetes
在线阅读 下载PDF
Managing Computing Infrastructure for IoT Data 被引量:1
13
作者 Sapna Tyagi Ashraf Darwish Mohammad Yahiya Khan advances in internet of things 2014年第3期29-35,共7页
Digital data have become a torrent engulfing every area of business, science and engineering disciplines, gushing into every economy, every organization and every user of digital technology. In the age of big data, de... Digital data have become a torrent engulfing every area of business, science and engineering disciplines, gushing into every economy, every organization and every user of digital technology. In the age of big data, deriving values and insights from big data using rich analytics becomes important for achieving competitiveness, success and leadership in every field. The Internet of Things (IoT) is causing the number and types of products to emit data at an unprecedented rate. Heterogeneity, scale, timeliness, complexity, and privacy problems with large data impede progress at all phases of the pipeline that can create value from data issues. With the push of such massive data, we are entering a new era of computing driven by novel and ground breaking research innovation on elastic parallelism, partitioning and scalability. Designing a scalable system for analysing, processing and mining huge real world datasets has become one of the challenging problems facing both systems researchers and data management researchers. In this paper, we will give an overview of computing infrastructure for IoT data processing, focusing on architectural and major challenges of massive data. We will briefly discuss about emerging computing infrastructure and technologies that are promising for improving massive data management. 展开更多
关键词 BIG DATA Cloud COMPUTING DATA ANALYTICS Elastic SCALABILITY Heterogeneous COMPUTING GPU PCM Massive DATA Processing
在线阅读 下载PDF
IoT Based Greenhouse Real-Time Data Acquisition and Visualization through Message Queuing Telemetry Transfer (MQTT) Protocol 被引量:1
14
作者 Vincent de Paul Niyigena Kwizera Zhanming Li +2 位作者 Victus Elikplim Lumorvie Febronie Nambajemariya Xiaowei Niu advances in internet of things 2021年第2期77-93,共17页
One of the most indispensable needs of life is food and its worldwide availability endorsement has made agriculture an essential sector in recent years. As the technology evolved, the need to maintain a good and suita... One of the most indispensable needs of life is food and its worldwide availability endorsement has made agriculture an essential sector in recent years. As the technology evolved, the need to maintain a good and suitable climate in the greenhouse became imperative to ensure that the indoor plants are more productive hence the agriculture sector was not left behind. That notwithstanding, the introduction and deployment of IoT technology in agriculture solves many problems and increases crop production. This paper focuses mainly on the deployment of the Internet of Things (IoT) in acquiring real- time data of environmental parameters in the greenhouse. Various IoT technologies that can be applicable in greenhouse monitoring system was presented and in the proposed model, a method is developed to send the air temperature and humidity data obtained by the DHT11 sensor to the cloud using an ESP8266-based NodeMCU and firstly to the cloud platform Thing- Speak, and then to Adafruit.IO in which MQTT protocol was used for the reception of sensor data to the application layer referred as Human-Machine Interface. The system has been completely implemented in an actual prototype, allowing the acquiring of data and the publisher/subscriber concept used for communication. The data is published with a broker’s aid, which is responsible for transferring messages to the intended clients based on topic choice. Lastly, the functionality testing of MQTT was carried out and the results showed that the messages are successfully published. 展开更多
关键词 GREENHOUSE Sensors Monitoring System Internet of Things (IOT) Thing-Speak Data Visualization MQTT Adafruit.IO MQTT Testing
在线阅读 下载PDF
Hybrid Security Techniques for Internet of Things Healthcare Applications 被引量:1
15
作者 Lobna Yehia Ayman Khedr Ashraf Darwish advances in internet of things 2015年第3期21-25,共5页
The Internet of Things (IoT) describes the future where every day physical objects will be connected to the internet and be able to identify themselves to other devices. IoT is a new revolution of the Internet and It ... The Internet of Things (IoT) describes the future where every day physical objects will be connected to the internet and be able to identify themselves to other devices. IoT is a new revolution of the Internet and It will effect in a large number of applications such as smart living, smart home, healthcare systems, smart manufacturing, environment monitoring, and smart logistics. This paper provides integration, summarizes and surveys some of the security techniques especially hybrid techniques that can be applied with healthcare applications in IoT environment. 展开更多
关键词 IOT Healthcare APPLICATIONS HYBRID SECURITY Techniques BODY Area Networks
在线阅读 下载PDF
Cloud Computing at a Cross Road: Quality and Risks in Higher Education 被引量:1
16
作者 Mohammed Ali advances in internet of things 2019年第3期33-49,共17页
The key determinants of cloud computing provide a convincing argument for HEIs and its stakeholders to adopt the innovation. These benefits reflect the essential quality characteristics of the cloud, such as Broad net... The key determinants of cloud computing provide a convincing argument for HEIs and its stakeholders to adopt the innovation. These benefits reflect the essential quality characteristics of the cloud, such as Broad network Access;Measured Service;On-demand Self-Service;Rapid Elasticity;and Resource Pooling. However, there are also risks associated with the cloud, leading to non-adoption, such as Confidence, Privacy, Security, Surety and Trust. Understanding the impact of these factors can support multiple stakeholders, such as students, lecturers, senior managers and admins in their adoptive decision of CC in their respected institutions. Using the Multiview 3 (MV3) methodology, a research model was proposed to explore the key qualities and risks that determine the adoption or non-adoption of CC by UK HEIs from multiple perspectives. An exploratory qualitative study was conducted on 32 University stakeholders across 2 UK Universities. The findings suggest that security, privacy and trust are the key determinants to non-adoption as participants felt that the cloud cannot fully guarantee the safeguarding of sensitive information. Determinants to cloud adoption include improving relationships between students and teachers via collaborative tools, in addition to proposing cloud apps for mobile devices for accessing virtual learning materials and email securely off-campus. In conclusion, University stakeholders are still at a cross-road when it comes to cloud adoption, but future advances of the cloud may help to steer their decision to adopt this innovative technology given its overwhelming potential. 展开更多
关键词 Cloud Computing HIGHER Education Innovation STAKEHOLDERS QUALITY RISKS
暂未订购
Design and Simulation of IoT Systems Using the Cisco Packet Tracer 被引量:1
17
作者 Norman Gwangwava Tinashe B. Mubvirwi advances in internet of things 2021年第2期59-76,共18页
Design and implementation of Internet of Things (IoT) systems require platforms with smart things and components. Two dominant architectural approaches for developing IoT systems are mashup-based and model-based appro... Design and implementation of Internet of Things (IoT) systems require platforms with smart things and components. Two dominant architectural approaches for developing IoT systems are mashup-based and model-based approaches. Mashup approaches use existing services and are mainly suitable for less critical, personalized applications. Web development tools are widely used in mashup approaches. Model-based techniques describe a system on a higher level of abstraction, resulting in very expressive modelling of systems. The article uses Cisco packet tracer 7.2 version, which consists of four subcategories of smart things—home, smart city, industrial and power grid, to design an IoT based control system for a fertilizer manufacturing plant. The packet tracer also consists of boards—microcontrollers (MCU-PT), and single boarded computers (SBC-PT), as well as actuators and sensors. The model facilitates flexible communication opportunities among things—machines, databases, and Human Machine Interfaces (HMIs). Implementation of the IoT system brings finer process control as the operating conditions are monitored online and are broadcasted to all stakeholders in real-time for quicker action on deviations. The model developed focuses on three process plants;steam raising, nitric acid, and ammonium nitrate plants. Key process parameters are saturated steam temperature, fuel flowrates, CO and SO<sub>x</sub> emissions, converter head temperature, NO<sub>x</sub> emissions, neutralisation temperature, solution temperature, and evaporator steam pressure. The parameters need to be monitored in order to ensure quality, safety, and efficiency. Through the Cisco packet tracer platform, a use case, physical layout, network layout, IoT layout, configuration, and simulation interface were developed. 展开更多
关键词 Internet of Things (IoT) Smart Sensors Wireless Sensors Process Control Cisco Packet Tracer Simulation Smart Factory Cloud Computing
在线阅读 下载PDF
Integrating RFID Technology with Intelligent Classifiers for Meaningful Prediction Knowledge 被引量:1
18
作者 Peter Darcy Steven Tucker Bela Stantic advances in internet of things 2013年第2期27-33,共7页
Radio Frequency Identification (RFID) is wireless technology that has been designed to automatically identify tagged objects using a reader. Several applications of this technology have been introduced in past literat... Radio Frequency Identification (RFID) is wireless technology that has been designed to automatically identify tagged objects using a reader. Several applications of this technology have been introduced in past literature such as pet identification and luggage tracking which have increased the efficiency and effectiveness of each environment into which it was integrated. However, due to the ambiguous nature of the captured information with the existence of missing, wrong and duplicate readings, the wide-scale adoption of the architecture is limited to commercial sectors where the integrity of the observations can tolerate ambiguity. In this work, we propose an application of RFID to take the reporting of class attendance and to integrate a predictive classifier to extract high level meaningful information that can be used in diverse areas such as scheduling and low student retention. We conclude by providing an analysis of the core strengths and opportunities that exist for this concept and how we might extend it in future research. 展开更多
关键词 RADIO Frequency Identification CLASSIFIER PREDICTION NEURAL NETWORK BAYESIAN NETWORK
暂未订购
Home Automation Device Protocol (HADP): A Protocol Standard for Unified Device Interactions 被引量:1
19
作者 Thomas Gonnot Won-Jae Yi +1 位作者 Ehsan Monsef Jafar Saniie advances in internet of things 2015年第4期27-38,共12页
Daily activities have become more efficient and convenient with home automation. There are many different home automation devices in the market for consumers to enjoy their home for being smarter, resourceful, and rem... Daily activities have become more efficient and convenient with home automation. There are many different home automation devices in the market for consumers to enjoy their home for being smarter, resourceful, and remotely accessible. However, current home automation protocols lack extensibility and compatibility. In this paper, we propose a protocol standard for home automation system called Home Automation Device Protocol (HADP). This protocol standard aims for the interoperability of home automation devices across different platforms. Based on the IFTTT (IF-This-Then-That) model, we define a set of device communication protocols where devices’ triggers and actions are combined to generate and manage interactions through a central node. The proposed protocol standard offers low power consumption and low bandwidth requirements using the minimum data packets to trigger an action on a home automation device. The protocol supports various communication mediums such as Wi-Fi, Bluetooth 4.2, ZigBee IP, 6LoWPAN, IEEE 802.15.4 standards, and Ethernet orany network layer supporting IPv6 protocol. 展开更多
关键词 HOME AUTOMATION IFTTT Wireless Communication PROTOCOL Smart LIVING
在线阅读 下载PDF
Side-Channel Analysis for Detecting Protocol Tunneling 被引量:1
20
作者 Harakrishnan Bhanu Jason Schwier +4 位作者 Ryan Craven Richard R. Brooks Kathryn Hempstalk Daniele Gunetti Christopher Griffin advances in internet of things 2011年第2期13-26,共14页
Protocol tunneling is widely used to add security and/or privacy to Internet applications. Recent research has exposed side channel vulnerabilities that leak information about tunneled protocols. We first discuss the ... Protocol tunneling is widely used to add security and/or privacy to Internet applications. Recent research has exposed side channel vulnerabilities that leak information about tunneled protocols. We first discuss the timing side channels that have been found in protocol tunneling tools. We then show how to infer Hidden Markov models (HMMs) of network protocols from timing data and use the HMMs to detect when protocols are active. Unlike previous work, the HMM approach we present requires no a priori knowledge of the protocol. To illustrate the utility of this approach, we detect the use of English or Italian in interactive SSH sessions. For this example application, keystroke-timing data associates inter-packet delays with keystrokes. We first use clustering to extract discrete information from continuous timing data. We use discrete symbols to infer a HMM model, and finally use statistical tests to determine if the observed timing is consistent with the language typing statistics. In our tests, if the correct window size is used, fewer than 2% of data windows are incorrectly identified. Experimental verification shows that on-line detection of language use in interactive encrypted protocol tunnels is reliable. We compare maximum likelihood and statistical hypothesis testing for detecting protocol tunneling. We also discuss how this approach is useful in monitoring mix networks like The Onion Router (Tor). 展开更多
关键词 Hidden MARKOV Models TIMING Side-Channel ATTACK VPN VULNERABILITY
暂未订购
上一页 1 2 6 下一页 到第
使用帮助 返回顶部