scholarly journals Next-Generation Antimicrobial Resistance Surveillance System Based on the Internet-of-Things and Microfluidic Technique

ACS Sensors ◽  
2021 ◽  
Author(s):  
Luyao Ma ◽  
Weidong He ◽  
Marlen Petersen ◽  
Keng C. Chou ◽  
Xiaonan Lu
2020 ◽  
Vol 8 (27) ◽  
pp. 13619-13629 ◽  
Author(s):  
Asif Abdullah Khan ◽  
Md Masud Rana ◽  
Guangguang Huang ◽  
Nanqin Mei ◽  
Resul Saritas ◽  
...  

A high-performance perovskite/polymer piezoelectric nanogenerator for next generation self-powered wireless micro/nanodevices.


Sensors ◽  
2016 ◽  
Vol 16 (3) ◽  
pp. 403 ◽  
Author(s):  
Alexander Kotsev ◽  
Sven Schade ◽  
Massimo Craglia ◽  
Michel Gerboles ◽  
Laurent Spinelle ◽  
...  

2020 ◽  
Author(s):  
Tanweer Alam

<p>The fog computing is the emerging technology to compute, store, control and connecting smart devices with each other using cloud computing. The Internet of Things (IoT) is an architecture of uniquely identified interrelated physical things, these physical things are able to communicate with each other and can transmit and receive information. <a>This research presents a framework of the combination of the Internet of Things (IoT) and Fog computing. The blockchain is also the emerging technology that provides a hyper, distributed, public, authentic ledger to record the transactions. Blockchains technology is a secured technology that can be a boon for the next generation computing. The combination of fog, blockchains, and IoT creates a new opportunity in this area. In this research, the author presents a middleware framework based on the blockchain, fog, and IoT. The framework is implemented and tested. The results are found positive. </a></p>


Author(s):  
Matt Zwolenski ◽  
Lee Weatherill

The Digital Universe, which consists of all the data created by PC, Sensor Networks, GPS/WiFi Location, Web Metadata, Web-Sourced Biographical Data, Mobile, Smart-Connected Devices and Next-Generation Applications (to name but a few) is altering the way we consume and measure IT and disrupting proven business models. Unprecedented and exponential data growth is presenting businesses with new and unique opportunities and challenges. As the ‘Internet of Things’ (IoT) and Third Platform continue to grow, the analysis of structured and unstructured data will drive insights that change the way businesses operate, create distinctive value, and deliver services and applications to the consumer and to each other. As enterprises and IT grapple to take advantage of these trends in order to gain share and drive revenue, they must be mindful of the Information Security and Data Protection pitfalls that lay in wait ─ hurdles that have already tripped up market leaders and minnows alike.


2014 ◽  
Author(s):  
Martin Daumer ◽  
Patrick Burger

Imagine a world where everything from products to people, spaces and services is connected and together operates as a living network. ‘Meta Products’ is the next generation of ’living’ products, services and spaces referring to the potential of the Internet of Things to reach everywhere and to be embodied in everything. In the current transition period we are living in, we are building new aspirations that demand increasingly clever ways to use the potentially endless amounts of information we can track, sense, measure, share and produce via the constantly improving omnipresent technologies. So we are bringing information-fuelled products and services that will be around us as a network whenever we need them. The result of finding these increasingly clever ways to use information is what we call Meta-Products.


2019 ◽  
Vol 52 (5-6) ◽  
pp. 338-353 ◽  
Author(s):  
Murat Aydos ◽  
Yılmaz Vural ◽  
Adem Tekerek

Internet of Things is the next-generation Internet network created by intelligent objects with software and sensors, employed in a wide range of fields such as automotive, construction, health, textile, education and transportation. With the advent of Industry 4.0, Internet of Things has been started to be used and it has led to the emergence of innovative business models. The processing and production capabilities of Internet of Things objects in hidden and critical data provide great advantages for the next generation of Internet. However, the integrated features of Internet of Things objects cause vulnerabilities in terms of security, making them the target of cyber threats. In this study, a security model which offers an integrated risk-based Internet of Things security approach for the Internet of Things vulnerabilities while providing detailed information about Internet of Things and the types of attacks targeting Internet of Things is proposed. In addition, in this study, the vulnerabilities of Internet of Things were explained by classifying attack types threatening the physical layer, network layer, data processing layer and application layer. Moreover, the risk-based security model has been proposed by examining the vulnerabilities and threats of smart objects that generate the Internet of Things. The proposed Internet of Things model is a holistic security model that separately evaluates the Internet of Things layers against vulnerabilities and threats based on the risk-level approach.


Sign in / Sign up

Export Citation Format

Share Document