scholarly journals Selection of Devices Based on Multicriteria for Mobile Data in Internet of Things Environment

2021 ◽  
Vol 2021 ◽  
pp. 1-7
Author(s):  
YanCheng Yang ◽  
Farhad Ali ◽  
Shah Nazir

Internet of Things (IoT) is a computing term which describes universal Internet connectivity, transforming everyday objects into connected devices. Many smart devices are interconnected to sense their surroundings, send, and process the sensed data. The IoT connects the real world with the global world by interconnecting edge devices. The main goal of the IoT is to attain high operating performance, improve throughput, and control the assets and processes of the industry. Many heterogeneous devices in IoT settings are linked with each other to transfer huge amount of information for operations of organizational efficiency. The appropriate and proper device may hinder the main goals of the IoT which seems difficult to achieve. However, not a single research study is focused on the selection of devices based on multicriteria properties. For solving the dilemma of the IoT device selection, “Properties Based Device Selection Using Ant Colony Optimization (PBDS-ACO)” is implemented in this paper which selects a device based on multicriteria properties. By exploiting the suggested model, the effectiveness and efficiency of the IoT are shown.

Internet-of-Things (IoT) is an inevitable domain of technology that is going to capture the connectivity of the majority of the smart devices in the coming days supported by huge advancement in mobile computing. However, IoT still suffers serious security issues when it comes to performing extensive communication over a broad range of heterogeneous devices. A review of existing secure routing schemes shows that they are complex in operation overlooking the communication performance and resource-constrained factors. Therefore, the proposed system introduces a very novel, simple, and cost-effective, secure routing scheme that is not only capable of identifying the threats without any apriority information of adversary, but they are equally capable of isolating the threats from the connectivity of regular IoT nodes. The simulated outcome of the proposed system shows that it offers a better solution towards security in contrast to existing security approaches frequently exercised in IoT at present


Author(s):  
Scott J. Shackelford

The Internet of Things (IoT) is the notion that nearly everything we use, from gym shorts to streetlights, will soon be connected to the Internet; the Internet of Everything (IoE) encompasses not just objects, but the social connections, data, and processes that the IoT makes possible. Industry and financial analysts have predicted that the number of Internet-enabled devices will increase from 11 billion to upwards of 75 billion by 2020. Regardless of the number, the end result looks to be a mind-boggling explosion in Internet connected stuff. Yet, there has been relatively little attention paid to how we should go about regulating smart devices, and still less about how cybersecurity should be enhanced. Similarly, now that everything from refrigerators to stock exchanges can be connected to a ubiquitous Internet, how can we better safeguard privacy across networks and borders? Will security scale along with this increasingly crowded field? Or, will a combination of perverse incentives, increasing complexity, and new problems derail progress and exacerbate cyber insecurity? For all the press that such questions have received, the Internet of Everything remains a topic little understood or appreciated by the public. This volume demystifies our increasingly “smart” world, and unpacks many of the outstanding security, privacy, ethical, and policy challenges and opportunities represented by the IoE. Scott J. Shackelford provides real-world examples and straightforward discussion about how the IoE is impacting our lives, companies, and nations, and explain how it is increasingly shaping the international community in the twenty-first century. Are there any downsides of your phone being able to unlock your front door, start your car, and control your thermostat? Is your smart speaker always listening? How are other countries dealing with these issues? This book answers these questions, and more, along with offering practical guidance for how you can join the effort to help build an Internet of Everything that is as secure, private, efficient, and fun as possible.


2021 ◽  
Author(s):  
Mehdia Ajana El Khaddar

The Internet of Things (IoT), along with its wider variants including numerous technologies, things, and people: the Internet of Everything (IoE) and the Internet of Nano Things (IoNT), are considered as part of the Internet of the future and ubiquitous computing allowing the communication among billions of smart devices and objects, and have recently drawn a very significant research attention. In these approaches, there are varieties of heterogeneous devices empowered by new capabilities and interacting with each other to achieve specific applications in different domains. A middleware layer is therefore required to abstract the physical layer details of the smart IoT devices and ease the complex and challenging task of developing multiple backend applications. In this chapter, an overview of IoT technologies, architecture, and main applications is given first and then followed by a comprehensive survey on the most recently used and proposed middleware solutions designed for IoT networks. In addition, open issues in IoT middleware design and future works in the field of middleware development are highlighted.


Author(s):  
Ashok V. Sutagundar ◽  
Daneshwari Hatti

This chapter gives overview of Internet of Things (IoT), various issues in IoT and describes data management in IoT. IoT is emerging technology which interconnects things through the Internet. Things present in the surrounding are communicated and control the objects without human intervention. IoT helps in performing two way communications among various heterogeneous devices by using cloud storage and cloud computing. IoT mainly concentrates on communication, so the vast amount of data generated from plenty of devices is to be managed as it consumes lot of memory. Data management includes data processing techniques such as data filtering, aggregation, compression, data archiving. Various processing techniques eliminate the irrelevant data, reduce communication overhead and enhance bandwidth, storage space and Quality of service.


2017 ◽  
pp. 365-382 ◽  
Author(s):  
Ashok V. Sutagundar ◽  
Daneshwari Hatti

This chapter gives overview of Internet of Things (IoT), various issues in IoT and describes data management in IoT. IoT is emerging technology which interconnects things through the Internet. Things present in the surrounding are communicated and control the objects without human intervention. IoT helps in performing two way communications among various heterogeneous devices by using cloud storage and cloud computing. IoT mainly concentrates on communication, so the vast amount of data generated from plenty of devices is to be managed as it consumes lot of memory. Data management includes data processing techniques such as data filtering, aggregation, compression, data archiving. Various processing techniques eliminate the irrelevant data, reduce communication overhead and enhance bandwidth, storage space and Quality of service.


2021 ◽  
Vol 21 (3) ◽  
pp. 1-20
Author(s):  
Liang Tan ◽  
Na Shi ◽  
Keping Yu ◽  
Moayad Aloqaily ◽  
Yaser Jararweh

Green Internet of things (GIoT) generally refers to a new generation of Internet of things design concept. It can save energy and reduce emissions, reduce environmental pollution, waste of resources, and harm to human body and environment, in which green smart device (GSD) is a basic unit of GIoT for saving energy. With the access of a large number of heterogeneous bottom-layer GSDs in GIoT, user access and control of GSDs have become more and more complicated. Since there is no unified GSD management system, users need to operate different GIoT applications and access different GIoT cloud platforms when accessing and controlling these heterogeneous GSDs. This fragmented GSD management model not only increases the complexity of user access and control for heterogeneous GSDs, but also reduces the scalability of GSDs applications. To address this issue, this article presents a blockchain-empowered general GSD access control framework, which provides users with a unified GSD management platform. First, based on the World Wide Web Consortium (W3C) decentralized identifiers (DIDs) standard, users and GSD are issued visual identity ( VID ). Then, we extended the GSD-DIDs protocol to authenticate devices and users. Finally, based on the characteristics of decentralization and non-tampering of blockchain, a unified access control system for GSD was designed, including the registration, granting, and revoking of access rights. We implement and test on the Raspberry Pi device and the FISCO-BCOS alliance chain. The experimental results prove that the framework provides a unified and feasible way for users to achieve decentralized, lightweight, and fine-grained access control of GSDs. The solution reduces the complexity of accessing and controlling GSDs, enhances the scalability of GSD applications, as well as guarantees the credibility and immutability of permission data and identity data during access.


2020 ◽  
Vol 1 (1) ◽  
pp. 381-388
Author(s):  
Madinatul Arbi ◽  
Muhammad Syafiq Isnaya ◽  
Mahmud Mahmud

ABSTRAK PT Multi Nitrotama Kimia merupakan salahsatu perusahaan jasa pertambangan yang bergerak pada bidang penyedia jasa peledakan dan penjualan bahan peledak terbesar di Indonesia, dimana unit usaha ini bekerjasama dengan banyak perusahaan tambang besar dan terkenal di Indonesia. PT Alam Jayabaya Pratama merupakan salahsatu perusahaan besar yang bekerjasama dengan Perusahaan dalam unit usaha jasa peledakan. Sebagai bagian dari perbaikan secara berkelanjutan, perusahaan berupaya mengoptimasi serta memberikan efesiensi kepada proses kegiatan peledakan. Perbaikan hasil fragmentasi dan biaya peledakan menjadi target pada proses perbaikan ini.Penelitian dan percobaan dilakukan menggunakan beberapa kajian dan pendekatan empiris metode untuk menemukan metode yang bisa mengakomodir target perbaikan. Metode airdeck menjadi pilihan dengan konsep memaksimalkan rambatan gelombang hantaran Work Energy dari bahan peledak dalam lubang (contoh : energi kinetik). Tantangan dan dinamika dalam perbaikan ini adalah berkenaan dengan pemilihan perlengkapan yang menjadi penunjang dalam konsep dan metode airdeck pada rencana perbaikan berkelanjutan ini. Pertimbangan efektifitas dan efesiensi menjadi faktor yang membuat dinamika menjadi menarik.Metode airdeck yang dikombinasikan dengan pendekatan terkontrol serta efesiensi penggunaan jumlah muatan handak, berhasil menjadi solusi dalam perbaikan hasil peledakan dan efesiensi pada biaya peledakan. Hasilnya, sepanjang tahun 2019 berjalan, perusahaan dapat mengurangi biaya peledakan dan meningkatan hasil peledakan melampaui pada target. Pendekatan analisa dan kontrol bersama tim terkait menghasilkan kerjasama yang baik pada proses perbaikan berkelanjutan ini membantu menyelesaikan dinamika yang terjadi di dalam prosesnya. Kata Kunci : Airdeck, Peledakan, Perbaikan Berkelanjutan   ABSTRACT PT Multi Nitrotama Kimia is one of the main mining service companies that move in blasting service and the largest explosives sales service in Indonesia, where the business unit cooperates with many large and well-known mining companies in Indonesia. PT Alam Jayabaya Pratama is one of the major companies that collaborates with the Company in the blasting services business unit. As part of continuous improvement, the company seeks to optimize and provide efficiency to the process of blasting activities. Improvements to the results of fragmentation and blasting costs are targeted in this improvement process.Research and experiments are carried out using several studies and empirical approaches to find methods that can accommodate improvement targets. The airdeck method is chosen with the concept of maximizing wave propagation work energy from explosives in the hole (example: kinetic energy). The challenges and dynamics in this improvement are related to the selection of equipment that is a support in the airdeck concept and method in this continuous improvement plan. Consideration of effectiveness and efficiency is a factor that makes dynamics attractive.The airdeck method that combined with a controlled approach and the efficient use of explosive loads, has succeeded in becoming a solution in improving blasting results and efficiency at blasting costs. As a result, throughout 2019, companies can reduce blasting costs and increase blasting results beyond the target. The analysis and control approach with the related team resulted in good cooperation in the process of continuous improvement helping to resolve the dynamics that occurred in the process.    Keywords : Airdeck, Blasting, Continous Improvement 


Author(s):  
A.G. Filipova ◽  
A.V. Vysotskaya

The article presents the results of mathematical experiments with the system «Social potential of childhood in the Russian regions». In the structure of system divided into three subsystems – the «Reproduction of children in the region», «Children’s health» and «Education of children», for each defined its target factor (output parameter). The groups of infrastructure factors (education, health, culture and sport, transport), socio-economic, territorial-settlement, demographic and en-vironmental factors are designated as the factors that control the system (input parameters). The aim of the study is to build a model îf «Social potential of childhood in the Russian regions», as well as to conduct experiments to find the optimal ratio of the values of target and control factors. Three waves of experiments were conducted. The first wave is related to the analysis of the dynam-ics of indicators for 6 years. The second – with the selection of optimal values of control factors at fixed ideal values of target factors. The third wave allowed us to calculate the values of the target factors based on the selected optimal values of the control factors of the previous wave.


Sign in / Sign up

Export Citation Format

Share Document