Recent progress of intrinsic and stimulated room-temperature gas sensors enabled by low-dimensional materials

Author(s):  
Yinfen Cheng ◽  
Baiyu Ren ◽  
Kai Xu ◽  
Itthipon Jeerapan ◽  
Hui Chen ◽  
...  

Room-temperature (RT) gas sensors based on low-dimensional materials have rapidly received wide attention in various automation control systems and particularly in the Internet of Things (IoT) platforms due to their...

Author(s):  
Tingting Wang ◽  
Juanyuan Hao ◽  
Jiaying Liu ◽  
Yanling Zhang ◽  
Qihua Liang ◽  
...  

Effective monitoring of hazardous gases at room-temperature is extremely indispensable in the “Internet of things” application; however, developing bifunctional gas sensors for the advanced sensing platform still remains a challenge....


Author(s):  
Xiao-Xue Wang ◽  
Suang Zhang ◽  
Yuan Liu ◽  
Jiangnan Dai ◽  
Hua-Yao Li ◽  
...  

With the rapid development of the Internet of things, light-excited gas sensors have aroused great attention to meet the increasing demand for room-temperature devices with high portability and low power...


Author(s):  
Paul Fremantle ◽  
Philip Scott

The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and privacy in the Internet of Things, with a strong focus on how these aspects are handled in IoT middleware. We focus on IoT middleware because many systems are built from existing middleware and these inherit the underlying security properties of the middleware framework. The paper is composed of three main sections. Firstly, we propose a matrix of security and privacy threats for IoT. This matrix is used as the basis of a widespread literature review aimed at identifying requirements on IoT platforms and middleware. Secondly, we present a structured literature review of the available middleware and how security is handled in these middleware approaches. We utilise the requirements from the first phase to evaluate. Finally, we draw a set of conclusions and identify further work in this area.


2017 ◽  
Author(s):  
Paul Fremantle ◽  
Philip Scott

The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and privacy in the Internet of Things, with a strong focus on how these aspects are handled in IoT middleware. We focus on IoT middleware because many systems are built from existing middleware and these inherit the underlying security properties of the middleware framework. The paper is composed of three main sections. Firstly, we propose a matrix of security and privacy threats for IoT. This matrix is used as the basis of a widespread literature review aimed at identifying requirements on IoT platforms and middleware. Secondly, we present a structured literature review of the available middleware and how security is handled in these middleware approaches. We utilise the requirements from the first phase to evaluate. Finally, we draw a set of conclusions and identify further work in this area.


Symmetry ◽  
2018 ◽  
Vol 10 (12) ◽  
pp. 669 ◽  
Author(s):  
Daniel Díaz López ◽  
María Blanco Uribe ◽  
Claudia Santiago Cely ◽  
Daniel Tarquino Murgueitio ◽  
Edwin Garcia Garcia ◽  
...  

Undoubtedly, the adoption of the Internet of Things (IoT) paradigm has impacted on our every-day life, surrounding us with smart objects. Thus, the potentialities of this new market attracted the industry, so that many enterprises developed their own IoT platforms aiming at helping IoT services’ developers. In the multitude of possible platforms, selecting the most suitable to implement a specific service is not straightforward, especially from a security perspective. This paper analyzes some of the most prominent proposals in the IoT platforms market-place, performing an in-depth security comparison using five common criteria. These criteria are detailed in sub-criteria, so that they can be used as a baseline for the development of a secure IoT service. Leveraging the knowledge gathered from our in-depth study, both researchers and developers may select the IoT platform which best fits their needs. Additionally, an IoT service for monitoring commercial flights is implemented in two previously analyzed IoT platforms, giving an adequate detail level to represent a solid guideline for future IoT developers.


Author(s):  
Dani Sasmoko ◽  
Dzyo Bachtiar

Internet of Things (IoT) connects a global infrastructure in communities so they can take benefit of advanced services, by connecting objects (things) both physical and virtual with the Internet so that objects can communicate each other. The object of this study is a baby box to control the baby’s condition. When the baby cries too long it may cause Baby Distressed Tantrum which is the feeling of being depressed in the baby because they feel ignored. If this happens for a long time will endanger the baby's health as it is related to respiratory function and cardiac performance. The function of the baby box is to observe a baby when left without supervision. It will enable users to know if the baby is sleeping, awake or crying. Leaving a crying baby too long may have a negative effect. By applying the Internet of Things (IoT) in the design of an intelligent a baby box will help the parents and babysitter in controlling the baby if they have other activities to do. The baby box monitoring system has a dht11 temperature and humidity sensor, and a noise sensor to detect the baby crying. An esp8266 module on Wemos d1 will send data to an android smartphone and notify the user by sound or vibration.


2018 ◽  
Vol 38 (1) ◽  
pp. 121-129 ◽  
Author(s):  
Pablo Antonio Pico Valencia ◽  
Juan A. Holgado-Terriza ◽  
Deiver Herrera-Sánchez ◽  
José Luis Sampietro

Recently, the scientific community has demonstrated a special interest in the process related to the integration of the agent-oriented technology with Internet of Things (IoT) platforms. Then, it arises a novel approach named Internet of Agents (IoA) as an alternative to add an intelligence and autonomy component for IoT devices and networks. This paper presents an analysis of the main benefits derived from the use of the IoA approach, based on a practical point of view regarding the necessities that humans demand in their daily life and work, which can be solved by IoT networks modeled as IoA infrastructures. It has been presented 24 study cases of the IoA approach at different domains ––smart industry, smart city and smart health wellbeing–– in order to define the scope of these proposals in terms of intelligence and autonomy in contrast to their corresponding generic IoT applications.


2019 ◽  
Vol 8 (4) ◽  
pp. 8775-8778

Recent progress in learning indicates the importance of students to be active in invents things rather than passive recipients. Smart Classrooms can make a noticeable change in how teachers can teach and learners can learn. The objective of the project presented in this paper is to propose a smart algorithm that provides a means of achieving a smart classroom environment in which most of the manual processes are automated and provides an efficient way of interconnecting multiple classes, thereby providing a unique way for information transfer. The proposed algorithm uses the Internet of Things to communicate between various classrooms and transmit/receive the required information. An embedded module installed in each classroom can collect information such as attendance detail, teacher’s location, and updates the information in the server for future use. These details are then used for some critical purposes, such as sending circulars, calling a particular teacher immediately to the office, etc


2021 ◽  
Vol 2 (1) ◽  
pp. 31-39
Author(s):  
Zbigniew Łukasik ◽  
Anton Ushakov

This article provides a comparative analysis of modern data transmission technologies that can be used in modern automation and telemechanics systems for data exchange with various sensors and other security and access control systems. The authors describe the most common types of transmission networks and offer options for their application in relation to the requirements of specific customers. The main emphasis is on open source solutions that can be used in research projects on an unlicensed basis.


IEEE Network ◽  
2020 ◽  
Vol 34 (5) ◽  
pp. 8-15
Author(s):  
Feifei Shi ◽  
Huansheng Ning ◽  
Wei Huangfu ◽  
Fan Zhang ◽  
Dawei Wei ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document