New approach based internet of things for a clean atmosphere

2018 ◽  
Vol 11 (1) ◽  
pp. 89-95 ◽  
Author(s):  
Azeddine Khiat ◽  
Ayoub Bahnasse ◽  
Jamila Bakkoury ◽  
Mohamed El Khaili ◽  
Fatima Ezzahraa Louhab
2014 ◽  
Vol 7 (2) ◽  
pp. 195-203 ◽  
Author(s):  
Richard A. Formato

Variable Z0(VZ0) antenna technology is a new design or optimization methodology applicable to any antenna on any platform designed or optimized with any procedure. It should be particularly useful for wireless devices populating the Internet of Things. VZ0expands the design or decision space by adding another degree of freedom invariably leading to better antennas. A simple design example illustrates its effectiveness.


Author(s):  
Xiongtao Zhang ◽  
Xiaomin Zhu ◽  
Weidong Bao ◽  
Laurence T. Yang ◽  
Ji Wang ◽  
...  

Sensors ◽  
2020 ◽  
Vol 20 (2) ◽  
pp. 556 ◽  
Author(s):  
Shingo Yamaguchi

A new kind of malware called Mirai is spreading like wildfire. Mirai is characterized by targeting Internet of Things (IoT) devices. Since IoT devices are increasing explosively, it is not realistic to manage their vulnerability by human-wave tactics. This paper proposes a new approach that uses a white-hat worm to fight malware. The white-hat worm is an extension of an IoT worm called Hajime and introduces lifespan and secondary infectivity (the ability to infect a device infected by Mirai). The proposed white-hat worm was expressed as a formal model with agent-oriented Petri nets called PN 2 . The model enables us to simulate a battle between the white-hat worm and Mirai. The result of the simulation evaluation shows that (i) the lifespan successfully reduces the worm’s remaining if short; (ii) if the worm has low secondary infectivity, its effect depends on the lifespan; and (iii) if the worm has high secondary infectivity, it is effective without depending on the lifespan.


2016 ◽  
Vol 64 (7) ◽  
Author(s):  
Christian Bauer ◽  
Zaigham-Faraz Siddiqui ◽  
Manuel Beuttler ◽  
Klaus Bauer

AbstractWith the increasing connectivity of devices, the amount of data that is recorded and ready for analysis is growing correspondingly. This is also the case for shop floors in flexible sheet metal handling and production. With the growing need for flexibility in production, the availability of machine tools is imminent. This paper shows different approaches that a classical manufacturing systems company such as TRUMPF takes in applying data mining techniques to address the new challenges which come with the Internet of things. In addition to classical methods, a new approach is introduced that does not need any alteration of the machine or its interfaces.


Author(s):  
Vardan Mkrttchian ◽  
Leyla Gamidullaeva ◽  
Alexey Finogeev ◽  
Serge Chernyshenko ◽  
Vsevolod Chernyshenko ◽  
...  

To respond to the needs of digital transformation, universities must continue to play their role as proving ground for educating the future generation and innovation. The article is devoted to overview, discussion, and investigation of application in higher education of two modern information technologies: big data and internet of things. The article identifies the role of analytics, based on big data, in improvement of education process and outlines the challenges, related with big data mining, storage, and security. Proposed statements are based on practical experience of the authors; architecture of program and methodological solution are the focus of the article. The article contributes to theory by the new approach to combination of big data and internet of things technologies in educational resources and, at the same time, includes implications for practice, presenting examples of the approach's realization and sharing the authors' experiences of such realization.


Author(s):  
Linh Manh Pham

Many domains of human life are more and moreimpacted by applications of the Internet of Things (i.e., IoT).The embedded devices produce masses of data day after dayrequiring a strong network infrastructure. The inclusion ofmessaging protocols like MQTT is important to ensure as fewerrors as possible in sending millions of IoT messages. Thisprotocol is a great component of the IoT universe due to itslightweight design and low power consumption. DistributedMQTT systems are typically needed in actual applicationenvironments because centralized MQTT methods cannotaccommodate a massive volume of data. Although beingscalable decentralized MQTT systems, they are not suited totraffic workload variability. IoT service providers may incurexpense because the computing resources are overestimated.This points to the need for a new approach to adapt workloadfluctuation. Through proposing a modular MQTT framework,this article provides such an elasticity approach. In order toguarantee elasticity of MQTT server cluster while maintainingintact IoT implementation, the MQTT framework used offthe-shelf components. The elasticity feature of our frameworkis verified by various experiments.


2018 ◽  
Vol 184 ◽  
pp. 02009
Author(s):  
Dan Ioan Țarcă ◽  
Radu Cătălin Țarcă ◽  
Ioan Constantin ȚarcȚ

Internet of Things (IoT) is a relatively new approach. Due to its wide spreading and simplicity it has a various number of application, practically in every domain. This paper aims to present the way in which a classic stand can be transformed into a microprocessor-controlled system. The chosen stand is related to experimental determination of the friction coefficient and efficiency for a threaded mechanism.


Author(s):  
Sridarala Ramu ◽  
Daniel Osaku

IOT connected objects are new technologies used to connect objects to the internet and to users. The IOT influences our daily life in several fields such as logistics, health, energy, intelligent vehicles, the smart home or the smart city ... Subsequently, following the specific characteristics of the different areas of use, a multitude IOT applications have been developed and deployed using different IOT frameworks. An IOT framework is a set of rules, protocols and standards that simplify the implementation of IOT applications. The proper functioning and success of these applications depends on the characteristics of the framework, and also on the security mechanisms used. In this article, we will discuss the frameworks used by presenting the proposed architecture of each framework, the compatible hardwares and softwares and the security mechanisms used, then a comparative study of these frameworks will be presented. Finally, we will propose an architecture of a secure IOT framework.


Sign in / Sign up

Export Citation Format

Share Document