scholarly journals THE APPLICATION OF IOT (INTERNET OF THINGS) FOR SMART HOUSING ENVIRONMENTS AND INTEGRATED ECOSYSTEMS

2020 ◽  
Vol 7 (1) ◽  
pp. 80
Author(s):  
Andi Hildayanti ◽  
M Sya'Rani Machrizzandi

Abstrak_ Perkembangan teknologi meningkat pesat seiring berjalannya waktu. Mulai dari mobil pintar yang bisa berjalan sendiri ke berbagai tujuan tanpa pengemudi, hingga perangkat rumah pintar yang bisa secara otomatis bersuara mengingatkan untuk melakukan aktifitas sesuai jadwal. Semua teknologi terbaru ini adalah bagian dari Internet of Things. Internet of Things (IoT) adalah konsep dimana objek memiliki kemampuan untuk mentransfer data melalui jaringan tanpa memerlukan interaksi dari manusia ke manusia atau dari manusia ke komputer. IoT adalah struktur dimana, orang diberi identitas eksklusif dan kemampuan untuk memindahkan data melalui jaringan tanpa memerlukan dua arah antara manusia ke manusia, sumber ke tujuan atau interaksi antara manusia dan komputer. Jadi, penelitian ini bertujuan untuk mengidentifikasi dan menjelaskan penerapan sistem IoT dalam mendukung program smart building dan lingkungan yang terintegrasi. Penelitian ini dianalisis secara deskriptif kualitatif dengan pendekatan studi kasus untuk mengeksplorasi manfaat teknologi IoT. Hasil penelitian ini menunjukkan dengan menghubungkan sistem bangunan yang berbeda dengan sensor dan perangkat IoT yang terhubung ke jaringan, aplikasi bangunan pintar untuk lingkungan perumahan pintar, dan ekosistem dapat terintegrasi menggunakan data lintas operasi, memberikan visibilitas yang lebih besar, wawasan cepat, dan pengalaman penghuni yang lebih baik. Teknologi IoT dapat bekerja dengan baik jika interaksi antara perangkat IoT dengan manusia atau pengguna harus berjalan dengan baik, karena IoT tidak akan berfungsi secara optimal jika pengguna tidak dapat mengoperasikannya dengan baik.Kata kunci: Internet of Things (IoT); Bangunan Pintar; Lingkungan Perumahan Pintar; Ekosistem Terpadu, Sistem Bangunan. Abstract_ Technological development increases rapidly over time. Starting from smart cars that can walk alone to various destinations without a human driver, to smart home devices that can automatically remind the voice to do activities on schedule. All of this latest technology is part of the Internet of Things. Internet of Things (IoT) is a concept where objects can transfer data through networks without requiring interaction from human to human or from human to computer. IoT is a structure in which objects, people are given an exclusive identity and the ability to move data through networks without requiring two directions between humans to humans, that is, sources to destinations or interactions between humans and computers. So, this research aims to identify and explain the application of the IoT system in support of smart building programs and integrated environments. This study was analyzed descriptively qualitative with a case study approach to explore the benefits of IoT technology. The results of this study indicate by connecting disparate building systems with networked IoT sensors and devices, smart building applications for smart housing environments and integrated ecosystems can use data across operations, providing greater visibility, valuable insights, and better occupant experiences. IoT technology can work well if the interaction between IoT devices with humans or users must go well because the function of IoT will not work optimally if the user cannot operate it properly.Keywords: Internet of Things (IoT); Smart Building; Smart Housing Environment; Integrated Ecosystems, Building Systems.

Author(s):  
Erdinç Koç

This chapter gives brief information about internet of things (IoT) and then detailed knowledge of industrial internet of things (IIoT). Internet of things applications can be seen in different areas, such as smart cars, smart homes, smart cities, agriculture, healthcare, industry, etc. This study focuses on the industrial part. Industrial internet of things (IIoT) means internet of things (IoT) applications for industrial usage. IIoT give a chance to enterprise for tracking supply chains, monitoring production line operations, and real-time consumption of energy, managing stock, and transportation decisions. This study used case study method for developing theory about IIoT's contribution to enterprise productivity. IIoT applications can be adapted to which operations of the enterprise, and how it will contribute to enterprise productivity is explained in this chapter. The chapter discusses the projects that are within the vision of IIoT but not yet implemented and concludes with suggestions for future studies.


2017 ◽  
Vol 21 (1) ◽  
pp. 57-70 ◽  
Author(s):  
Lorna Uden ◽  
Wu He

Purpose Current knowledge management (KM) systems cannot be used effectively for decision-making because of the lack of real-time data. This study aims to discuss how KM can benefit by embedding Internet of Things (IoT). Design/methodology/approach The paper discusses how IoT can help KM to capture data and convert data into knowledge to improve the parking service in transportation using a case study. Findings This case study related to intelligent parking service supported by IoT devices of vehicles shows that KM can play a role in turning the incoming big data collected from IoT devices into useful knowledge more quickly and effectively. Originality/value The literature review shows that there are few papers discussing how KM can benefit by embedding IoT and processing incoming big data collected from IoT devices. The case study developed in this study provides evidence to explain how IoT can help KM to capture big data and convert big data into knowledge to improve the parking service in transportation.


Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4121 ◽  
Author(s):  
Alberto Giaretta ◽  
Nicola Dragoni ◽  
Fabio Massacci

Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure default configurations and sufficient security configurability. They also lack rich behavioural descriptions, failing to list provided and required services. To answer this problem, we envision a future where IoT devices carry behavioural contracts and Fog nodes store network policies. One requirement is that contract consistency must be easy to prove. Moreover, contracts must be easy to verify against network policies. In this paper, we propose to combine the security-by-contract (S × C) paradigm with Fog computing to secure IoT devices. Following our previous work, first we formally define the pillars of our proposal. Then, by means of a running case study, we show that we can model communication flows and prevent information leaks. Last, we show that our contribution enables a holistic approach to IoT security, and that it can also prevent unexpected chains of events.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3375 ◽  
Author(s):  
Luis Sánchez ◽  
Jorge Lanza ◽  
Juan Santana ◽  
Rachit Agarwal ◽  
Pierre Raverdy ◽  
...  

The Internet of Things (IoT) concept has attracted a lot of attention from the research and innovation community for a number of years already. One of the key drivers for this hype towards the IoT is its applicability to a plethora of different application domains. However, infrastructures enabling experimental assessment of IoT solutions are scarce. Being able to test and assess the behavior and the performance of any piece of technology (i.e., protocol, algorithm, application, service, etc.) under real-world circumstances is of utmost importance to increase the acceptance and reduce the time to market of these innovative developments. This paper describes the federation of eleven IoT deployments from heterogeneous application domains (e.g., smart cities, maritime, smart building, crowd-sensing, smart grid, etc.) with over 10,000 IoT devices overall which produce hundreds of thousands of observations per day. The paper summarizes the resources that are made available through a cloud-based platform. The main contributions from this paper are twofold. In the one hand, the insightful summary of the federated data resources are relevant to the experimenters that might be seeking for an experimental infrastructure to assess their innovations. On the other hand, the identification of the challenges met during the testbed integration process, as well as the mitigation strategies that have been implemented to face them, are of interest for testbed providers that can be considering to join the federation.


2019 ◽  
Vol 20 (2) ◽  
pp. 365-376 ◽  
Author(s):  
Vivek Kumar Prasad ◽  
Madhuri D Bhavsar ◽  
Sudeep Tanwar

The evolution of the Internet of Things (IoT) has augmented the necessity for Cloud, edge and fog platforms. The chief benefit of cloud-based schemes is they allow data to be collected from numerous services and sites, which is reachable from any place of the world. The organizations will be benefited by merging the cloud platform with the on-site fog networks and edge devices and as result, this will increase the utilization of the IoT devices and end users too. The network traffic will reduce as data will be distributed and this will also improve the operational efficiency. The impact of monitoring in edge and fog computing can play an important role to efficiently utilize the resources available at these layers. This paper discusses various techniques involved for monitoring for edge and fog computing and its advantages. The paper ends with a case study to demonstarte the need of monitoring in fog and edge in the healthcare system.


Energies ◽  
2020 ◽  
Vol 13 (18) ◽  
pp. 4813
Author(s):  
Pooja Anand ◽  
Yashwant Singh ◽  
Arvind Selwal ◽  
Pradeep Kumar Singh ◽  
Raluca Andreea Felseghi ◽  
...  

In recent years, people have witnessed numerous Internet of Things (IoT)-based attacks with the exponential increase in the number of IoT devices. Alongside this, the means to secure IoT-based applications are maturing slower than our budding dependence on them. Moreover, the vulnerabilities in an IoT system are exploited in chains to penetrate deep into the network and yield more adverse aftereffects. To mitigate these issues, this paper gives unique insights for handling the growing vulnerabilities in common IoT devices and proposes a threat architecture for IoT, addressing threats in the context of a three-layer IoT reference architecture. Furthermore, the vulnerabilities exploited at the several IoT attack surfaces and the challenges they exert are explored. Thereafter, the challenges in quantifying the IoT vulnerabilities with the existing framework are also analyzed. The study also covers a case study on the Intelligent Transportation System, covering road transport and traffic control specifically in terms of threats and vulnerabilities. Another case study on secure energy management in the Smart Grid is also presented. This case study covers the applications of Internet of Vulnerable Things (IoVT) in Smart energy Grid solutions, as there will be tremendous use of IoT in future Smart Grids to save energy and improve overall distribution. The analysis shows that the integration of the proposed architecture in existing applications alarms the developers about the embedded threats in the system.


2013 ◽  
Vol 3 ◽  
pp. 6-23 ◽  
Author(s):  
Chandra Sharma Poudyal

Henri Fayol is popularly known as the founder of administrative management for his contribution to the field of management. Although his principles of management are termed as classical management theory, the principles are still applicable in the field of management. In this paper I explore the issues of management and ownership in two private schools in Nepal using Fayol’s principles of management. The data were collected from two private schools using a case study approach. I conducted semi- structured interviews with teachers, administrators and principals of two private schools. In the case study schools, the owners were also working in the capacity of principal of the school and hence the term owner/principal has been used in this paper. The owners/principals were taken as the participants to represent the voice of the employers while the teachers were taken to represent the voice of the employees. Similarly, the administrators in this study represent the voices of both the employer and the employees of the school.This study suggests that when management and ownership are not separated, there is a concentration of power. The power concentration in individual or group of owners gives rise to a number of management related issues such as unequal distribution of authority and responsibility, role ambiguity, negative motivation and conflict of interest. Fayol’s principles of authority and responsibility, initiative, subordination of individual interest to group interest, stability of tenure of personnel and spirit of cooperation have been used in this paper to explain several issues of management and ownership that emerged from the case study.DOI: http://dx.doi.org/10.3126/jer.v3i0.7849Journal of Education and Research March 2013, Vol. 3, No. 1, pp. 6-23


Dementia ◽  
2021 ◽  
pp. 147130122110244
Author(s):  
Jane Andrew ◽  
Heather Wilkinson ◽  
Seamus Prior

Befriending is a service in which volunteers provide companionship and support usually to people who are lonely or isolated. Such services are promoted in Scotland’s national strategy to improve the lives of people with dementia, around a third of whom live alone. However, little is known about the perspectives of recipients. Taking a holistic qualitative case study approach, the aim of this research was to explore how people living alone with dementia experienced befriending and the contexts in which their befriending relationships were meaningful. Three people were visited on five separate occasions. Largely unstructured conversations allowed individuals to prioritise areas of importance to them within the broad topics of befriending, everyday life, social networks and biography. Participants also had the option of ‘showing’ how they spent their time with their befriender. Data were analysed using the voice-centred relational method. Three key messages emerged: befriending satisfied unmet needs and wishes for particular kinds of relationship; befriending was a facilitated friendship; and befriending was a human response to contingent and existential limitations.


2020 ◽  
Vol 8 ◽  
Author(s):  
Grace Latuheru ◽  
Tatik Meiyutariningsih

In the era of globalization, one of the effects of globalization is that the rapid technological development makes it easy for everyone to access all kinds of information through gadgets. Gadgets that initially made it easy for everyone will turn into a negative thing if you can not control yourself to use it, design with interesting features that might make someone want to linger to use it to feel dependent on the gadget. This research aims to reduce gadget addiction behavior in children. The research method is an experimental method with a case study approach is to provide Economy Tokens in order to control the behavior of children so they do not play gadgets for a long time. The token economy is given for 3 weeks and subjects must collect 5 stickers each week and then they will be exchanged for gifts in the form of toys they want. The subject is a child who is 7 years old in Ambon. Based on the analysis it can be concluded that the application of token economy can reduce gadget addiction in children. The subject's behavior is more controlled and is responsible for the decisions taken and their consequences. Another impact is the subject has good social interaction with people around him.


Sign in / Sign up

Export Citation Format

Share Document