scholarly journals Readiness of Electronic Engineering (Computer) Diploma Students in Applying Technical Skills to Face Career Challenges in Internet of Things (IoT)

2021 ◽  
Vol 6 (1) ◽  
Author(s):  
Maizun Jamil ◽  
◽  
Masnora Sepikun ◽  
Muhaini Muhammad ◽  
◽  
...  

The aims of this study are to identify the readiness of Electronics Engineering (Computer) Diploma students to apply technical skills to face the challenges in the career related to Internet of Things (IoT). The methodology used in this research was quantitative approach in which questionnaires were distributed to respondents through online strategy. This study involved semester 4 students of Diploma in Electronic Engineering (Computer) at the Department of Electrical Engineering, Polytechnic Port Dickson, who have registered the Internet Base Controller course. A total of 56 students were randomly selected as respondents. Three main aspects where investigated, namely readiness, technical skills and career challenges in the field of IoT. The results of the study show that students were highly ready to enhance their level of knowledge in IoT field from time to time as the field of IoT is growing rapidly. Besides, the students were also ready to apply various technical skills such as hardware, programming skills, IoT platform, microcontroller, wired and wireless technology. Whereas the career challenges faced by the students were related to equipment such as laptops, smartphones and internet connection tool which is important to produce an IoT project during studies. In addition, the similar findings also can be seen from the Internet Based Controller Course Outline Review Report which indicated that the achievement technical skills acquisition has reached 88%. In conclusion, this study has shown that three is a high level in terms of students’ readiness, technical skills and career challenges in IoT field. The students realise that the knowledge and skills related to IoT will provide bright career opportunities in the future and students are ready to increase their potential to face the challenges of IoT development in Malaysia in line with the needs of the industry.

2021 ◽  
Vol 9 (1) ◽  
pp. 17-25
Author(s):  
Shafagat Mahmudova

This article outlines the Internet of Things (IoT). The Internet of Things describes a network of physical objects, i.e., the “thing” including sensors, software, and other technologies for connection and data sharing with other devices and systems over the Internet. In other words, IoT is a relatively new technology enabling many “smart” devices to get connected, to analyze, process, and transfer data to each other and connect to a network. The article clarifies the essence of intelligent systems for the Internet of Things, and analyzes the most popular software for the IoT platform. It studies high-level systems for IoT and analyzes available literature in this field. It highlights most advanced IoT software of 2021. The article also identifies the prospects and challenges of intelligent systems for the Internet of Things. The creation of new intelligent systems for IoT and the development of technology will greatly contribute to the development of economy.


2021 ◽  
Vol 39 (4) ◽  
pp. 1-33
Author(s):  
Fulvio Corno ◽  
Luigi De Russis ◽  
Alberto Monge Roffarello

In the Internet of Things era, users are willing to personalize the joint behavior of their connected entities, i.e., smart devices and online service, by means of trigger-action rules such as “IF the entrance Nest security camera detects a movement, THEN blink the Philips Hue lamp in the kitchen.” Unfortunately, the spread of new supported technologies makes the number of possible combinations between triggers and actions continuously growing, thus motivating the need of assisting users in discovering new rules and functionality, e.g., through recommendation techniques. To this end, we present , a semantic Conversational Search and Recommendation (CSR) system able to suggest pertinent IF-THEN rules that can be easily deployed in different contexts starting from an abstract user’s need. By exploiting a conversational agent, the user can communicate her current personalization intention by specifying a set of functionality at a high level, e.g., to decrease the temperature of a room when she left it. Stemming from this input, implements a semantic recommendation process that takes into account ( a ) the current user’s intention , ( b ) the connected entities owned by the user, and ( c ) the user’s long-term preferences revealed by her profile. If not satisfied with the suggestions, then the user can converse with the system to provide further feedback, i.e., a short-term preference , thus allowing to provide refined recommendations that better align with the original intention. We evaluate by running different offline experiments with simulated users and real-world data. First, we test the recommendation process in different configurations, and we show that recommendation accuracy and similarity with target items increase as the interaction between the algorithm and the user proceeds. Then, we compare with other similar baseline recommender systems. Results are promising and demonstrate the effectiveness of in recommending IF-THEN rules that satisfy the current personalization intention of the user.


Author(s):  
Э.Д. Алисултанова ◽  
Л.К. Хаджиева ◽  
М.З. Исаева

Данная статья посвящена созданию профориентационной (умной) лаборатории, которая призвана сформировать у школьников базовые представления о технологии Интернет вещей (IoT), угрозах кибербезопасности в этой сфере, мотивировать к получению в будущем профильного образования и построению карьеры в области обеспечения безопасности Интернет вещей (IoT) при функционировании умного производства. Обучение школьников в профориентационной лаборатории, построенное на основе применения интерактивных электронных образовательных ресурсов, прежде всего будет позиционировать карьерные возможности будущих специалистов в сфере обеспечения безопасности Интернет вещей (IoT) при функционировании умного производства. В рамках функционирования лаборатории особое внимание обучающихся сконцентрировано на тематиках правовых аспектов обеспечения кибербезопасности, главных тенденциях развития киберугроз в современном глобальном информационном пространстве и мерах, необходимых для их нейтрализации. This article is devoted to the creation of a career-oriented (smart) laboratory, which is designed to formulate in schoolchildren basic ideas about the Internet of Things (IoT) technology, cyber security threats in this area, motivate to receive specialized education in the future and build a career in the field of Internet things (IoT) security) with the functioning of smart manufacturing. The training of schoolchildren in a vocational guidance laboratory, based on the use of interactive electronic educational resources, will primarily position the career opportunities of future specialists in the field of Internet of Things (IoT) security in the operation of smart manufacturing. Within the framework of the functioning of the laboratory, special attention of students is concentrated on the topics of the legal aspects of ensuring cyber security, the main trends in the development of cyber threats in the modern global information space and the measures necessary to neutralize them.


2020 ◽  
Author(s):  
Tanweer Alam ◽  
Mohamed Benaida

Building the innovative blockchain-based architecture across the Internet of Things (IoT) platform for the education system could be an enticing mechanism to boost communication efficiency within the 5 G network. Wireless networking would have been the main research area allowing people to communicate without using the wires. It was established at the start of the Internet by retrieving the web pages to connect from one computer to another computer Moreover, high-speed, intelligent, powerful networks with numerous contemporary technologies, such as low power consumption, and so on, appear to be available in today's world to connect among each other. The extension of fog features on physical things under IoT is allowed in this situation. One of the complex tasks throughout the area of mobile communications would be to design a new virtualization framework based on blockchain across the Internet of Things architecture. The goal of this research is to connect a new study for an educational system that contains Blockchain to the internet of things or keeping things cryptographically secure on the internet. This research combines with its improved blockchain and IoT to create an efficient interaction system between students, teachers, employers, developers, facilitators and accreditors on the Internet. This specified framework is detailed research's great estimation.


Proceedings ◽  
2019 ◽  
Vol 31 (1) ◽  
pp. 78
Author(s):  
Pedro Victor Borges ◽  
Chantal Taconet ◽  
Sophie Chabridon ◽  
Denis Conan ◽  
Thais Batista ◽  
...  

The rising popularity of the Internet of Things (IoT) has led to a plethora of highly heterogeneous, geographically dispersed devices. In recent years, IoT platforms have been used to provide a variety of services to applications such as device discovery, context management, and data analysis. However, the lack of standardization currently means that each IoT platform comes with its own abstractions, APIs, and interactions. As a consequence, programming the interactions between an application and an IoT platform is often time consuming, error prone, and depends on the developers’ level of knowledge about the IoT platform. To address these issues, we propose offering to application developers on the client side the possibility to declare variables that are automatically mapped to sensors and whose values are transparently updated with sensor observations. For this purpose, we introduce IoTVar, a middleware between IoT applications and platforms. In IoTVar, all the necessary interactions with IoT platforms are managed by proxies. This paper presents IoTVar integrated with the FIWARE platform, which is used for developing IoT Future Internet applications. We also report results of some experiments performed to evaluate IoTVar, showing IoTVar reduces the effort required to declare and manage IoT variables and its impact in terms of CPU, memory, and energy.


Symmetry ◽  
2018 ◽  
Vol 10 (12) ◽  
pp. 669 ◽  
Author(s):  
Daniel Díaz López ◽  
María Blanco Uribe ◽  
Claudia Santiago Cely ◽  
Daniel Tarquino Murgueitio ◽  
Edwin Garcia Garcia ◽  
...  

Undoubtedly, the adoption of the Internet of Things (IoT) paradigm has impacted on our every-day life, surrounding us with smart objects. Thus, the potentialities of this new market attracted the industry, so that many enterprises developed their own IoT platforms aiming at helping IoT services’ developers. In the multitude of possible platforms, selecting the most suitable to implement a specific service is not straightforward, especially from a security perspective. This paper analyzes some of the most prominent proposals in the IoT platforms market-place, performing an in-depth security comparison using five common criteria. These criteria are detailed in sub-criteria, so that they can be used as a baseline for the development of a secure IoT service. Leveraging the knowledge gathered from our in-depth study, both researchers and developers may select the IoT platform which best fits their needs. Additionally, an IoT service for monitoring commercial flights is implemented in two previously analyzed IoT platforms, giving an adequate detail level to represent a solid guideline for future IoT developers.


Author(s):  
B. Shoban Babu ◽  
Prince Patel

As we all know, the Internet has altered everything, and the Internet of Things has given us hope for a bright future of the Internet with Machine-to-Machine (M2M) connectivity. This review study demonstrated that smart systems based on the Internet of Things are feasible and economical to build (IoT). In the field of healthcare, the Internet of Things has made significant progress. This article examines how the Internet of Things (IoT) is revolutionising the healthcare industry by giving huge healthcare advantages to humanity through accessible and practical healthcare solutions specially during the hard coronavirus situation around the world. The purpose of this study is to address the function of IoT in smart hospitals, as well as its importance in dealing with pandemics. Various smart gadgets that can provide a variety of features, such as adequate monitoring of high-risk patients, tracking their bio-metric measurements, and gathering real-time data, can be used to serve community-specific demands during pandemic spread. We've also looked into other plans that can detect unforeseen events utilising a variety of sensors and display the information gathered on an LED display. The results of observational studies have indicated a high level of agreement with the hypothetical claims.


Author(s):  
Thangavel Bhuvaneswari ◽  
J. Hossen ◽  
NurAsyiqinbt. Amir Hamzah ◽  
P. Velrajkumar ◽  
Oo Hong Jack

<p>Garbage waste monitoring, collection and management is one of the primary concerns of the present era due to its detrimental effects on environment. The traditional way of manually monitoring and collecting the garbage is a cumbersome process as it requires considerable human effort and time leading to higher cost. In this paper, an IoT based garbage monitoring system using Thingspeak, an open IoT platform is presented. The system consists of an Arduino microcontroller, an ultrasonic sensor, a load cell and a Wi-Fi module. The Arduino microcontroller receives data from the ultrasonic sensor and load cell. The depth of the garbage in the bin is measured using ultrasonic sensor and the weight of the bin with garbage is measured from the load cell. The LCD screen is used to display the data. The Wi-Fi module transmits the above data to the internet. An open IoT platform Thingspeak is used to monitor the garbage system. With this system, the administrator can monitor and schedule garbage collection more efficiently. A prototype has been developed and tested. It has been found to work satisfactorily. The details are presented in this paper.</p>


The fourth industrial revolution represents smarter systems, faster and more optimized system of artificial intelligence, which involves control systems and sensors networks. In this paper, the concept of the Internet of Things (IoT) was applied preliminarily to create the connection between machine and the user, using a sensor, a processor such as Raspberry Pi, and IoT platform application such as Blynk in the smartphone. The simple IR 4.0 prototype system and IoT apps were developed in order to create a connection between sensors and user through the internet consisting of a temperature and humidity sensor, which is DHT11 and a Raspberry Pi 3 Model B. The smartphone application would be developed through the Blynk application for this simple prototype system. The graphical user interface GUI was built within the Blynk app and link it to the sensor which is already connected to the Raspberry Pi. The analysis that was done upon the system is by varying the stimuli to the sensors, which is a hairdryer with three levels of heat and observe the relative change of the reading of temperature and percentage of humidity on the apps. Therefore, the preliminary result shows an increase in temperature as the heat level increases. On the other hand, the percentage of humidity becomes lower as the temperature goes higher. Based on the results and the analysis, it had shown that the IR 4.0 prototype system of IoT monitoring can connect between the sensor and the smartphone application with real-time monitoring through the internet.


2020 ◽  
Vol 52 (4) ◽  
pp. 85-98
Author(s):  
MIKHAIL M PUTYATO ◽  
◽  
ALEKSANDR S. MAKARYAN ◽  
SHAMIL M. CHICH ◽  
VALENTINA K. MARKOVA ◽  
...  

Internet of things (IoT) devices have become increasingly popular in recent years. IoT refers to smart refrigerators, smart locks, video nannies, and other household devices that have access to the Internet. However, the growing popularity of IoT technology is increasingly attracting the attention of hackers who are interested both in disclosing confidential enduser data and in misuse of the computing resources of the attacked devices. Unfortunately, malicious attacks often result in successful compromise of devices, with the ensuing consequences. The reasons for the high level of compromise of IoT devices are caused both by errors in the design, implementation, and relatively simple operation with the use of various information security audit tools. To identify defects in the development and implementation of devices, you need to have some idea about them, that is, to identify and eliminate them in a timely manner. This can be achieved in various ways. One of these methods is to create special traps that collect information about the activity of an attacker, called honeypot. The essence of the honeypot technology is to emulate or implement the functionality of existing devices, services, and protocols, with the accumulation of data about malicious activity of an attacker. The information obtained can be used to improve the protection of real devices, services, and protocols, as well as to develop measures to counter hackers. The article provides a comparative analysis of the existing most popular honeypot systems in order to identify the best system. The analysis identified both the weaknesses and strengths of these systems. Next, an attempt is made to adapt these same systems to function at the level of Internet of things devices.


Sign in / Sign up

Export Citation Format

Share Document