scholarly journals Disinfectant Spraying Robot to Prevent the Transmission of the Covid-19 Virus Based on the Internet of Things (IoT)

2021 ◽  
Vol 5 (2) ◽  
pp. 61-67
Author(s):  
Indah Sulistiyowati ◽  
Moh Imam Muhyiddin

One way to prevent the transmission and spread of Covid-19 is to always keep ourselves and our environment clean. Maintaining personal and environmental hygiene can be done by using antiseptics and disinfectants. Disinfectants that are not used properly will be bad for humans. That is why so far the spraying of disinfectants for the prevention of COVID-19 has been carried out by human workers who are dressed in complete Personal Protective Equipment (PPE) using manual sprayers. This is certainly very risky to humans who do the spraying manually. The objective of this research is to minimize the risk of spraying disinfectants, by using a robotic power to spray disinfectant based on the Internet of Things (IoT) and a camera. This robot is operated by using a smartphone while to determine the environmental conditions around it is used a camera. From the test results, it obtained data that the robot works well and is quite reliable due to the wider scope limit because it uses an IoT connection to communicate with smartphones. The results of camera readings on laptops are also quite clear, although the higher the resolution on the display, the lag time required to transfer images to the laptop affects.

Author(s):  
WASIN ALKISHRI ◽  
Mahmood Al-Bahri

Biometrics In conjunction with the new development of the Internet of Things (IoT), augmented reality (AR) systems are evolving to visualize 3D virtual models of the real world into an intelligent and interactive virtual reality environment that facilitates physical identification of objects and defines their specifications efficiently. The integration between AR and IoT in a complementary way helps identify network-related items' specifications and interact with the Internet of Things more efficiently. An identity is a dedicated, publicly known attribute or set of names for an individual device. Typically, identifiers operate within a specific area or network, making it difficult to identify things globally. This paper explores the use of Augmented Reality (AR) Technology for identifying devices and displaying relevant information about the device to the user. Based on the developed model network, the developed system of identification of IoT devices was tested. Also, the traffic generated by the AR device when generating requests to the organization server was investigated. According to the test results, the system is undemanding to the main network indicators. The system-generated traffic is self-similar. The test results show that the server software can solve the problems of identifying IoT devices through interaction with augmented reality devices.


SinkrOn ◽  
2020 ◽  
Vol 5 (1) ◽  
pp. 129
Author(s):  
Rudi Arif Candra ◽  
Devi Satria Saputra ◽  
Dirja Nur Ilham ◽  
Herry Setiawan ◽  
Hardisal Hardisal

This study discusses the infusion detection device in a hospital room. This tool is designed to help hospital nurses to cope more quickly to avoid problems due to the infusion. Load cell sensors are used as heavy detectors that send notifications to the nurses through the telegram application that has been installed. The nurse will get a notification message sent to the telegram if the sensor has read the weight. The tool is made using a load cell sensor and NodeMCU Wi-FiESP866 which functions to send notification of the results of sensor data input to the Internet of Things (IOT) platform namely Telegram. Nurses need to be connected to the internet network to get notifications on the telegram. Test results show that the time needed to send and receive notifications on Telegram takes about 2-5 seconds. The message will be sent 3 times, first the infusion WARNING is almost exhausted (alert), second the infusion WARNING is almost exhausted (standby) and the infusion WARNING is almost exhausted (please replace). If the infusion is not replaced by the nurse, it will be warned by Buzzer. However, time can be influenced by the available internet network connectivity. However, time can be affected by the available internet network.


2013 ◽  
Vol 756-759 ◽  
pp. 3394-3398
Author(s):  
Yong Liu ◽  
Xing Zhong Xiong

RFID is one of the most important technologies in the Internet of Things (IoT), which has been widely used in all kinds of fields. However, a key problem is the tag collision when multiple tags reflect simultaneously to a reader. In traditional algorithm, slot location is always ignored. We present an anti-collision algorithm based on tag estimation and slot location in this paper. The key technique can be divided into two parts: precisely tag estimation and slot location. Simulation and test results show that the proposed anti-collision algorithm performs better than the traditional algorithm despite its simplicity.


Author(s):  
Emir Husni

Problems related to fuel consumption efficiency are likely to occur in a car rental company. A system for the Internet of Things – VISCar to monitor fuel consumption on Android mobile application is proposed to solve the problem. The VISCar has four features, including driving behavior analysis, monitoring, notification, and location and route to the gas station. This system consists of three subsystems: connector, server, and user interface. Car’s engine data is scanned by OBDII and sent via Bluetooth to Raspberry Pi then passed using 3G connection to the server and being stored. The data can be accessed by users through a mobile application via MQTT and processed on server for analysis. The test results show VISCar has been successfully built and implemented to monitor fuel consumption efficiency for the car rental company.


2013 ◽  
Vol 278-280 ◽  
pp. 1818-1821
Author(s):  
Wei Liu ◽  
Jing Zhong ◽  
Jun Lin

By analyzing and extending 802.1X protocol, this paper proposes a scheme of secure terminal access on the internet of things. The scheme consists of three components: an authentication client, a switch supported 802.1X protocol and a radius authentication server. This paper proposes the work flow after explaining these components respectively. The test results show that the scheme satisfies the functional requirements of terminal security access on the internet of things.


Sensors ◽  
2019 ◽  
Vol 19 (12) ◽  
pp. 2674 ◽  
Author(s):  
Mike Yuliana ◽  
Wirawan ◽  
Suwadi

One solution to ensure secrecy in the Internet of Things (IoT) is cryptography. However, classical cryptographic systems require high computational complexity that is not appropriate for IoT devices with restricted computing resources, energy, and memory. Physical layer security that utilizes channel characteristics is an often used solution because it is simpler and more efficient than classical cryptographic systems. In this paper, we propose a signal strength exchange (SSE) system as an efficient key generation system and a synchronized quantization (SQ) method as a part of the SSE system that synchronizes data blocks in the quantization phase. The SQ method eliminates the signal pre-processing phase by performing a multi-bit conversion directly from the channel characteristics of the measurement results. Synchronization is carried out between the two authorized nodes to ensure sameness of the produced keys so it can eliminate the error-correcting phase. The test results at the IoT devices equipped with IEEE 802.11 radio show that SSE system is more efficient in terms of computing time and communication overhead than existing systems.


2014 ◽  
Vol 543-547 ◽  
pp. 3476-3481
Author(s):  
Hong Tang ◽  
Long Jia Yu

ZigBee protocol is widely used in the internet of things. In process of related equipment development, the ZigBee protocol debugging is an important part, and ZigBee protocol analyzer is a vital tool for debugging. For the existing protocol analyzer cannot deal with the wrong frame well and cannot locate a specific field quickly, this paper designs a ZigBee protocol analyzer and implement it by using the technology of quick rollback and partial repainting, the main features of this system are as follows: lower computer supports a variety of ways to connect to superior computer; it can collect data packets for 16 channels of 2.4GHz band; it can significantly identify the wrong frame; also, it can present a specific field which debugger are interested. Test results show that this system is better able to deal with the wrong frame and locate the specific field quickly.


2022 ◽  
Vol 2146 (1) ◽  
pp. 012019
Author(s):  
Ang Zhou

Abstract Networking is one of the new technologies supported by our country’s national “125” strategic industry plan, mainly used in medicine, military industry, transportation and other fields. While enjoying the convenient business of the, people also pay more attention to the security of the Internet of Things information system. Therefore, this article mainly discusses security under the perspective of the IoT, and understands the relevant basic theoretical knowledge about the IoT and security on the basis of a large number of documents, and then conceives the security methods under the perspective of the IoT, and the designed method has been tested, and the test results show that the performance of the encryption algorithm in the network security scheme of this article is due to the traditional encryption algorithm. When the encrypted text is 15000 bytes, the encryption time is 40s.


2020 ◽  
pp. 1-12
Author(s):  
Zhang Caiqian ◽  
Zhang Xincheng

The existing stand-alone multimedia machines and online multimedia machines in the market have certain deficiencies, so they cannot meet the actual needs. Based on this, this research combines the actual needs to design and implement a multi-media system based on the Internet of Things and cloud service platform. Moreover, through in-depth research on the MQTT protocol, this study proposes a message encryption verification scheme for the MQTT protocol, which can solve the problem of low message security in the Internet of Things communication to a certain extent. In addition, through research on the fusion technology of the Internet of Things and artificial intelligence, this research designs scheme to provide a LightGBM intelligent prediction module interface, MQTT message middleware, device management system, intelligent prediction and push interface for the cloud platform. Finally, this research completes the design and implementation of the cloud platform and tests the function and performance of the built multimedia system database. The research results show that the multimedia database constructed in this paper has good performance.


Sign in / Sign up

Export Citation Format

Share Document