Low cost EPTS (Electronic Performance & Tracking System) development using IoT devices

Author(s):  
Luis A. Oliveira Rodriguez ◽  
Roberto Garcia Fernandez
Smart Cities ◽  
2020 ◽  
Vol 3 (1) ◽  
pp. 138-156 ◽  
Author(s):  
Spiridon Vergis ◽  
Vasileios Komianos ◽  
Georgios Tsoumanis ◽  
Athanasios Tsipis ◽  
Konstantinos Oikonomou

With the rapid increase of vehicles in use worldwide, the need for efficient traffic monitoring systems has arisen. This work proposes a low-cost vehicular traffic monitoring system using IoT devices and fog computing. The system is based on a three-tiered architecture which is composed of (i) the mobile tracking system that records the positions of the vehicles using GPS technologies; (ii) the information gathering system which gathers all the data collected by the mobile tracking system; and (iii) the fog devices that process the data collected and extract the information needed. The system is tested in the town of Corfu during a period of increased tourism when the traffic is considered to be relatively dense. The mobile tracking system devices are placed on taxis and with the help of professional taxi drivers the accuracy of the data collected is evaluated. The system is able to record the movement of the vehicles accurately using its own independent data. The results can be remotely accessed by utilizing fog and cloud computing infrastructure established to process the data and upload it on a server. The system is used to give a better understanding of the speed variance in the center of the town during different dates and hours. In conclusion the system presented in this study can be utilized to monitor the traffic and provide vital information about its behavior in relation to time.


2010 ◽  
Vol 50 (6) ◽  
pp. 616 ◽  
Author(s):  
M. G. Trotter ◽  
D. W. Lamb ◽  
G. N. Hinch ◽  
C. N. Guppy

The use of global satellite navigation system tracking as a research tool for monitoring livestock activity is increasing. Commercial systems are being developed for the livestock industry. This paper reports on the development of a low-cost, store-on-board Global Positioning System collar suitable for large-scale deployment in livestock herds. A robust collar design that avoids the necessity of external cables has been designed and was tested on beef cattle in western New South Wales. Configured for alternating wake and sleep modes to conserve battery life, the collars obtained a positional fix on 99.9% of attempts. Numerous alternatives for presenting extracted data, based on average diurnal activity, mean daily velocity, Livestock Residence Index and dry sheep equivalent maps are introduced and discussed.


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


2021 ◽  
Vol 10 (1) ◽  
pp. 13
Author(s):  
Claudia Campolo ◽  
Giacomo Genovese ◽  
Antonio Iera ◽  
Antonella Molinaro

Several Internet of Things (IoT) applications are booming which rely on advanced artificial intelligence (AI) and, in particular, machine learning (ML) algorithms to assist the users and make decisions on their behalf in a large variety of contexts, such as smart homes, smart cities, smart factories. Although the traditional approach is to deploy such compute-intensive algorithms into the centralized cloud, the recent proliferation of low-cost, AI-powered microcontrollers and consumer devices paves the way for having the intelligence pervasively spread along the cloud-to-things continuum. The take off of such a promising vision may be hurdled by the resource constraints of IoT devices and by the heterogeneity of (mostly proprietary) AI-embedded software and hardware platforms. In this paper, we propose a solution for the AI distributed deployment at the deep edge, which lays its foundation in the IoT virtualization concept. We design a virtualization layer hosted at the network edge that is in charge of the semantic description of AI-embedded IoT devices, and, hence, it can expose as well as augment their cognitive capabilities in order to feed intelligent IoT applications. The proposal has been mainly devised with the twofold aim of (i) relieving the pressure on constrained devices that are solicited by multiple parties interested in accessing their generated data and inference, and (ii) and targeting interoperability among AI-powered platforms. A Proof-of-Concept (PoC) is provided to showcase the viability and advantages of the proposed solution.


Sensors ◽  
2021 ◽  
Vol 21 (10) ◽  
pp. 3515
Author(s):  
Sung-Ho Sim ◽  
Yoon-Su Jeong

As the development of IoT technologies has progressed rapidly recently, most IoT data are focused on monitoring and control to process IoT data, but the cost of collecting and linking various IoT data increases, requiring the ability to proactively integrate and analyze collected IoT data so that cloud servers (data centers) can process smartly. In this paper, we propose a blockchain-based IoT big data integrity verification technique to ensure the safety of the Third Party Auditor (TPA), which has a role in auditing the integrity of AIoT data. The proposed technique aims to minimize IoT information loss by multiple blockchain groupings of information and signature keys from IoT devices. The proposed technique allows IoT information to be effectively guaranteed the integrity of AIoT data by linking hash values designated as arbitrary, constant-size blocks with previous blocks in hierarchical chains. The proposed technique performs synchronization using location information between the central server and IoT devices to manage the cost of the integrity of IoT information at low cost. In order to easily control a large number of locations of IoT devices, we perform cross-distributed and blockchain linkage processing under constant rules to improve the load and throughput generated by IoT devices.


2020 ◽  
Vol 15 (4) ◽  
pp. 613-619
Author(s):  
Li Kong ◽  
Yunpeng Zhang ◽  
Zhijian Lin ◽  
Zhongzhu Qiu ◽  
Chunying Li ◽  
...  

Abstract The present work aimed to select the optimum solar tracking mode for parabolic trough concentrating collectors using numerical simulation. The current work involved: (1) the calculation of daily solar radiation on the Earth’s surface, (2) the comparison of annual direct solar radiation received under different tracking modes and (3) the determination of optimum tilt angle for the north-south tilt tracking mode. It was found that the order of solar radiation received in Shanghai under the available tracking modes was: dual-axis tracking > north-south Earth’s axis tracking > north-south tilt tracking (β = 15°) > north-south tilt tracking (β = 45) > north-south horizontal tracking > east-west horizontal tracking. Single-axis solar tracking modes feature simple structures and low cost. This study also found that the solar radiation received under the north-south tilt tracking mode was higher than that of the north-south Earth’s axis tracking mode in 7 out of 12 months. Therefore, the north-south tilt tracking mode was studied separately to determine the corresponding optimum tilt angles in Haikou, Lhasa, Shanghai, Beijing and Hohhot, respectively, which were shown as follows: 18.81°, 27.29°, 28.67°, 36.21° and 37.97°.


2008 ◽  
Author(s):  
Mohammed Goryawala ◽  
Misael Del Valle ◽  
Jiali Wang ◽  
James Byrne ◽  
Juan Franquiz ◽  
...  

2021 ◽  
Author(s):  
Tianyun Yuan ◽  
Yu (Wolf) Song ◽  
Gerald A. Kraan ◽  
Richard H. M. Goossens

Abstract Measuring the motion of human hand joints is a challenging task due to the high number of DOFs. In this study, we proposed a low-cost hand tracking system built on action cameras and ArUco markers to measure finger joint rotation angles. The lens distortion of each camera was corrected first via intra-calibration and the videos of different cameras were aligned to the reference camera using a dynamic time warping based method. Two methods were proposed and implemented for extracting the rotation angles of finger joints: one is based on the 3D positions of the markers via inter-calibration between cameras, named pos-based method; the other one is based on the relative marker orientation information from individual cameras, named rot-based method. An experiment was conducted to evaluate the effectiveness of the proposed system. The right hand of a volunteer was included in this practical study, where the movement of the fingers was recorded and the finger rotation angles were calculated with the two proposed methods, respectively. The results indicated that although using the rot-based method may collect less data than using the pos-based method, it was more stable and reliable. Therefore, the rot-based method is recommended for measuring finger joint rotation in practical setups.


2018 ◽  
Vol 10 (3) ◽  
pp. 61-83 ◽  
Author(s):  
Deepali Chaudhary ◽  
Kriti Bhushan ◽  
B.B. Gupta

This article describes how cloud computing has emerged as a strong competitor against traditional IT platforms by offering low-cost and “pay-as-you-go” computing potential and on-demand provisioning of services. Governments, as well as organizations, have migrated their entire or most of the IT infrastructure to the cloud. With the emergence of IoT devices and big data, the amount of data forwarded to the cloud has increased to a huge extent. Therefore, the paradigm of cloud computing is no longer sufficient. Furthermore, with the growth of demand for IoT solutions in organizations, it has become essential to process data quickly, substantially and on-site. Hence, Fog computing is introduced to overcome these drawbacks of cloud computing by bringing intelligence to the edge of the network using smart devices. One major security issue related to the cloud is the DDoS attack. This article discusses in detail about the DDoS attack, cloud computing, fog computing, how DDoS affect cloud environment and how fog computing can be used in a cloud environment to solve a variety of problems.


Sign in / Sign up

Export Citation Format

Share Document