scholarly journals Cloud-Based Fault Prediction Using IoT in Office Automation for Improvisation of Health of Employees

2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Mudita Uppal ◽  
Deepali Gupta ◽  
Sapna Juneja ◽  
Gaurav Dhiman ◽  
Sandeep Kautish

The novel paradigm of Internet of Things (IoT) is gaining recognition in the numerous scenarios promoting the pervasive presence of smart things around us through its application in various areas of society, which includes transportation, healthcare, industries, and agriculture. One more such application is in the smart office to monitor the health of devices via machine learning (ML) that makes the equipment more efficient by allowing real-time monitoring of their health. It guarantees indoor comfort as per the user’s satisfaction as it emphasizes on fault prediction in real-life devices. Early identification of various types of faults in IoT devices is the key requirement in smart offices. IoT devices are becoming ubiquitous and provide an assistant to supervise an office that is regulated by ML and data received from sensors is stored in cloud. A recommender system facilitates the selection of an appropriate solution for faults in IoT-enabled devices to mitigate faults. The architecture proposed in this paper is used to monitor each and every office appliance connected via IoT technology using ML technique, and recommender system is used to recommend solutions for fault patterns without much human intervention. The ultrasonic motion sensor is used to fetch the information of employee availability in cubicles and data is sent to the cloud through the WiFi module. ATmega8 is used to control electrical appliances in the office environment. The significance of this work is to forecast the faults in IoT appliances which will have an impact on life and reliability of IoT appliances. The main objective is to design a prototype of a smart office using IoT that can control and automate workplace devices and forecast whether the device needs repairing or replacing, thus reducing the overall burden on the employee and helping out in increasing physical as well as mental health of the person.

Author(s):  
Meilani Meilani ◽  
Haris Supratno ◽  
Setiawan Setiawan

Based on the problems in the novel Pukat and Eliana by Tere Liye, it is necessary to do an analysis that discusses the representation of environmental damage in literary works using ecocritical studies. The selection of studies on the representation of environmental damage in literary works as a focus of research has the following reasons: (1) the reflective representation in the novel Pukat and Eliana by Tere Liye is a real-life description of the problems of the characters in the novel with nature and the surrounding environment. The setting used in the story is the forest in Sumatra; (2) the next ecological problem is intentional representation which is a description of the factors that cause damage to the environment in Sumatra; (3) the constructional representation contained in Tere Liye's Pukat and Eliana novel is an impact that occurs as a result of human activity itself. In research with the object of these two novels using qualitative research. This qualitative research as a research step that produces descriptive data in the form of written words of the object being analyzed. The approach in this analysis is an eco-critic approach because this analysis can be used for research on the representation of environmental damage in literary works. Data collection techniques are basically gathering facts related to research problems. Based on research data sources in the form of texts namely novels titled Trawl and novels titled Eliana by Tere Liye the collection of data of this study uses the techniques of listening and documentation study techniques. Ecocriticism studies the ways in which we describe the relationship between humans and their environment. Ecocriticism is also influenced by modern environmental movements. Greg Garrard explored the development of the modern environmental movement and studied several concepts related to eco-criticism, including: (a) pollution, (b) wilderness, (c) apocalypse, (d) housing/dwelling, (e) animals, and (f) earth. Literature itself grows from the environment of society and the natural environment (ecology), which has a function as a medium of representation, views/reflections on the reality of literature which has an important role in changing social values, shared life values and values of local wisdom.


2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
Xiangdong Yin ◽  
Jie Yang

The connecting of things to the Internet makes it possible for smart things to access all kinds of Web services. However, smart things are energy-limited, and suitable selection of Web services will consume less resources. In this paper, we study the problem of selecting some Web service from the candidate set. We formulate this selection of Web services for smart things as single-source many-target shortest path problem. We design algorithms based on the Dijkstra and breadth-first search algorithms, propose an efficient pruning algorithm for breadth-first search, and analyze their performance of number of iterations andI/Ocost. Our empirical evaluation on real-life graphs shows that our pruning algorithm is more efficient than the breadth-first search algorithm.


IoT ◽  
2021 ◽  
Vol 2 (1) ◽  
pp. 140-162
Author(s):  
Hung Nguyen-An ◽  
Thomas Silverston ◽  
Taku Yamazaki ◽  
Takumi Miyoshi

We now use the Internet of things (IoT) in our everyday lives. The novel IoT devices collect cyber–physical data and provide information on the environment. Hence, IoT traffic will count for a major part of Internet traffic; however, its impact on the network is still widely unknown. IoT devices are prone to cyberattacks because of constrained resources or misconfigurations. It is essential to characterize IoT traffic and identify each device to monitor the IoT network and discriminate among legitimate and anomalous IoT traffic. In this study, we deployed a smart-home testbed comprising several IoT devices to study IoT traffic. We performed extensive measurement experiments using a novel IoT traffic generator tool called IoTTGen. This tool can generate traffic from multiple devices, emulating large-scale scenarios with different devices under different network conditions. We analyzed the IoT traffic properties by computing the entropy value of traffic parameters and visually observing the traffic on behavior shape graphs. We propose a new method for identifying traffic entropy-based devices, computing the entropy values of traffic features. The method relies on machine learning to classify the traffic. The proposed method succeeded in identifying devices with a performance accuracy up to 94% and is robust with unpredictable network behavior with traffic anomalies spreading in the network.


Sensors ◽  
2021 ◽  
Vol 21 (12) ◽  
pp. 4034
Author(s):  
Arie Haenel ◽  
Yoram Haddad ◽  
Maryline Laurent ◽  
Zonghua Zhang

The Internet of Things world is in need of practical solutions for its security. Existing security mechanisms for IoT are mostly not implemented due to complexity, budget, and energy-saving issues. This is especially true for IoT devices that are battery powered, and they should be cost effective to be deployed extensively in the field. In this work, we propose a new cross-layer approach combining existing authentication protocols and existing Physical Layer Radio Frequency Fingerprinting technologies to provide hybrid authentication mechanisms that are practically proved efficient in the field. Even though several Radio Frequency Fingerprinting methods have been proposed so far, as a support for multi-factor authentication or even on their own, practical solutions are still a challenge. The accuracy results achieved with even the best systems using expensive equipment are still not sufficient on real-life systems. Our approach proposes a hybrid protocol that can save energy and computation time on the IoT devices side, proportionally to the accuracy of the Radio Frequency Fingerprinting used, which has a measurable benefit while keeping an acceptable security level. We implemented a full system operating in real time and achieved an accuracy of 99.8% for the additional cost of energy, leading to a decrease of only ~20% in battery life.


Author(s):  
Sayan Surya Shaw ◽  
Shameem Ahmed ◽  
Samir Malakar ◽  
Laura Garcia-Hernandez ◽  
Ajith Abraham ◽  
...  

AbstractMany real-life datasets are imbalanced in nature, which implies that the number of samples present in one class (minority class) is exceptionally less compared to the number of samples found in the other class (majority class). Hence, if we directly fit these datasets to a standard classifier for training, then it often overlooks the minority class samples while estimating class separating hyperplane(s) and as a result of that it missclassifies the minority class samples. To solve this problem, over the years, many researchers have followed different approaches. However the selection of the true representative samples from the majority class is still considered as an open research problem. A better solution for this problem would be helpful in many applications like fraud detection, disease prediction and text classification. Also, the recent studies show that it needs not only analyzing disproportion between classes, but also other difficulties rooted in the nature of different data and thereby it needs more flexible, self-adaptable, computationally efficient and real-time method for selection of majority class samples without loosing much of important data from it. Keeping this fact in mind, we have proposed a hybrid model constituting Particle Swarm Optimization (PSO), a popular swarm intelligence-based meta-heuristic algorithm, and Ring Theory (RT)-based Evolutionary Algorithm (RTEA), a recently proposed physics-based meta-heuristic algorithm. We have named the algorithm as RT-based PSO or in short RTPSO. RTPSO can select the most representative samples from the majority class as it takes advantage of the efficient exploration and the exploitation phases of its parent algorithms for strengthening the search process. We have used AdaBoost classifier to observe the final classification results of our model. The effectiveness of our proposed method has been evaluated on 15 standard real-life datasets having low to extreme imbalance ratio. The performance of the RTPSO has been compared with PSO, RTEA and other standard undersampling methods. The obtained results demonstrate the superiority of RTPSO over state-of-the-art class imbalance problem-solvers considered here for comparison. The source code of this work is available in https://github.com/Sayansurya/RTPSO_Class_imbalance.


Sensors ◽  
2018 ◽  
Vol 18 (7) ◽  
pp. 2339 ◽  
Author(s):  
Cristian Ramirez-Atencia ◽  
David Camacho

Unmanned Aerial Vehicles (UAVs) have become very popular in the last decade due to some advantages such as strong terrain adaptation, low cost, zero casualties, and so on. One of the most interesting advances in this field is the automation of mission planning (task allocation) and real-time replanning, which are highly useful to increase the autonomy of the vehicle and reduce the operator workload. These automated mission planning and replanning systems require a Human Computer Interface (HCI) that facilitates the visualization and selection of plans that will be executed by the vehicles. In addition, most missions should be assessed before their real-life execution. This paper extends QGroundControl, an open-source simulation environment for flight control of multiple vehicles, by adding a mission designer that permits the operator to build complex missions with tasks and other scenario items; an interface for automated mission planning and replanning, which works as a test bed for different algorithms, and a Decision Support System (DSS) that helps the operator in the selection of the plan. In this work, a complete guide of these systems and some practical use cases are provided


Author(s):  
Siti Hafsah

Azab dan Sengsara is an Indonesian novel written by Merari Siregar (1921), one of the famous roman novelists in Indonesia in Balai Pustaka era. The novel is a material object of the present study. The study aims at revealing oppression, violence, exploitation of woman and all varieties of injustice to woman, revealing social symptoms ideological forms containing in the novel as a manifestation of a company condition in old era. This research uses a qualitative method and approaches of literary feminist and literary sociology as its support. This research succeeds in answering the problems of woman life, as manifestation of real life which reflects kinds of woman’s life in society of Indonesian, for example: marriage, custom, violence, etc. for the hero “Mariamin” (a woman). She is the manifestation of the authority life, besides talking on oppression of woman images of its community lives. The author succeeded offering solutions with various contradictions, conflicts, handling down the novel as manifestation in real life.


Author(s):  
Cristina Garrigós

Forgetting and remembering are as inevitably linked as lifeand death. Sometimes, forgetting is motivated by a biological disorder, brain damage, or it is the product of an unconscious desire derived from a traumatic event (psychological repression). But in some cases, we can motivate forgetting consciously (thought suppression). It is through the conscious repression of memories that we can find self-preservation and move forward, although this means that we create a fable of our lives, as Nietzsche says in his essay “On the Uses and Disadvantages of History for Life” (1997). In Jonathan Franzen’s novel, Purity (2015), forgetting is an active and conscious process by which the characters choose to forget certain episodes of their lives to be able to construct new identities. The erased memories include murder, economical privileges derived from illegal or unethical commercial processes, or dark sexual episodes. The obsession with forgetting the past links the lives of the main characters, and structures the narrative of the novel. The motivated erasure of memories becomes, thus, a way that the characters have to survive and face the present according to a (fake) narrative that they have constructed. But is motivated forgetting possible? Can one completely suppress facts in an active way? This paper analyses the role of forgetting in Franzen’s novel in relation to the need in our contemporary society to deny, hide, or erase uncomfortable data from our historical or personal archives; the need to make disappear stories which we do not want to accept, recognize, and much less make known to the public. This is related to how we manage information in the age of technology, the “selection” of what is to be the official story, and how we rewrite our own history


2011 ◽  
Vol 39 (111) ◽  
pp. 7-26
Author(s):  
Jonas Kjærgård Laursen

POLITICS OF APPEARANCE. ON REALITY MODELLING IN JOSEPH CONRAD’S NOSTROMOArtistically Nostromo is arguably the most ambitious of Joseph Conrad’s novels. It is also without a doubt the most explicitly political in that it openly engages with the question of how capitalism, imperialism, and revolution affect the human consciousness. There is however no agreement as to how this political problem is to be understood or, more precisely, what kind of understanding of the interrelationship between politics and literature is necessary when engaging this artwork. As a necessary supplement to both a 60’s Marxist reading and readings from the 70’s and 80’s dealing with ideological criticism, this article suggests a reading focusing on how the text creates a model of society by reconfiguring certain real life elements. By developing a specific artistic idiom Nostromo attempts to show the very limited view of the whole of society caused by, in the wording of the novel, the material interests of imperial capitalism. Under the inspiration of both Jurij Lotman and Jacques Rancière the analysis presented here is able to address some key political insights that appear as a consequence of the novelistic form when understood as a relatively autonomous model of society. And that is what is meant by the expression politics of appearance: the politics of literature is to be analysed as something generated by the specific gestalt of the text, as something that comes into sight with – and only with – the text.


Author(s):  
Simon Glew ◽  
Elizabeth M Ford ◽  
Helen Elizabeth Smith

Introduction and Objectives The accuracy of conclusions based on Electronic Healthcare Record (EHR) research is highly dependent on the correct selection of descriptors (codes) by users. We aimed to evaluate the feasibility and acceptability of filmed vignette monologues as a resource-light method of assessing and comparing how different EHR users record the same clinical scenario. Methods Six short monologues of actors portraying patients presenting allergic conditions to their General Practitioners were filmed head-on then electronically distributed for the study; no researcher was present during data collection. The method was assessed by participant uptake, reported ease of completion by participants, compliance with instructions, the receipt of interpretable data by researchers, and participant perceptions of vignette quality, realism and information content. Results 22 participants completed the study, reporting only minor difficulties. 132 screen prints were returned electronically, enabling analysis of codes, free text and EHR features. Participants assigned a quality rating of 7.7/10 (range 2-10) to the vignettes and rated the extent to which vignettes reflected real-life (86-100%). Between 1 and 2 hours were required to complete the task. Full compliance with instructions varied between participants but was largely successful. Conclusions Filmed monologues are a reproducible, standardized method which require few resources, yet allow clear assessment of clinicians’ and EHRs systems’ impact on documentation. The novel nature of this method necessitates clear instructions so participants can fully complete the study without face to face researcher oversight.


Sign in / Sign up

Export Citation Format

Share Document