scholarly journals Implementation of IoT in Agriculture

2021 ◽  
Author(s):  
B. Mohamed Arafath Rajack ◽  
N. Subramanian ◽  
N. Arun Pragadesh ◽  
R. Suvanesh ◽  
S. Vignesh

In this modern world agriculture is one of the major booming sectors around the world. In India around 60 percent of GDP comes from agriculture sector alone. Also, around the world there are many technologies showing up in the field of agriculture. In this paper proposed a technology by means of which potential pest attack in the crops can be detected and the respective pesticide is also sprayed as well. Along with these there is a range of sensor employed in the field connected to the controller that will take the real time values from the field and can be displayed in the respective screen (monitor or mobile screen) by means of technology called IOT (Internet of Things). Raspberry-pi is used as the controller to perform IoT. system is linked with an application called “cain” Which allows us to display various values of sensors in the monitor or in mobile application.

Author(s):  
Selvaraj Kesavan ◽  
Senthilkumar J. ◽  
Suresh Y. ◽  
Mohanraj V.

In establishing a healthy environment for connectivity devices, it is essential to ensure that privacy and security of connectivity devices are well protected. The modern world lives on data, information, and connectivity. Various kinds of sensors and edge devices stream large volumes of data to the cloud platform for storing, processing, and deriving insights. An internet of things (IoT) system poses certain difficulties in discretely identifying, remotely configuring, and controlling the devices, and in the safe transmission of data. Mutual authentication of devices and networks is crucial to initiate secure communication. It is important to keep the data in a secure manner during transmission and in store. Remotely operated devices help to monitor, control, and manage the IoT system efficiently. This chapter presents a review of the approaches and methodologies employed for certificate provisioning, device onboarding, monitoring, managing, and configuring of IoT systems. It also examines the real time challenges and limitations in and future scope for IoT systems.


2019 ◽  
Vol 22 (3) ◽  
pp. 172-179
Author(s):  
Sama Samaan

In the past few years, all over the world, crime against children has been on the rise, and parents always worry about their children whenever they are outside. For this reason, tracking and monitoring children have become a considerable necessity. This paper presents an outdoor IoT tracking system which consists of a child module and a parent module. The child module monitors the child location in real time and sends the information to a database in the cloud which forwards it to the parent module (represented as a mobile application). This information is shown in the application as a location on Google maps.  The mobile application is designed for this purpose in addition to a number of extra functions. A Raspberry Pi Zero Wireless is used with a GSM/GPS module on shield to provide mobile communication, internet and to determine location. Implementation results for the suggested system are provided which shows that when the child leaves a pre-set safe area, a warring message pops up on the parent’s mobile and a path from the current parent location to the child location is shown on a map.


Author(s):  
Nazmul Hossain ◽  
Rafia Sultana ◽  
Farzana Akter Lima ◽  
Md. Arif Rahman

The Internet of Things or IoT means the ability to connect billions of physical devices around the world that are now linking to the internet for collecting and sharing data. Internet of Things (IoT) technologies is used to sense the real-time primordial manufacture data and included the energy alliance data and the provision circumstance data. The Internet of Things (IoT) will approve any contents to be sensed or monitored remotely wherever there any remaining network infrastructure, making amenities for the integration of the actual world into computer-based systems. Real-time narrates the path of flowing media is processing. In the real-time procedure, anyone can entrance information barring to narrate for it and save our time.


2018 ◽  
Vol 3 (1) ◽  
pp. 55
Author(s):  
Griffani Megiyanto Rahmatullah ◽  
Muhammad Ayat ◽  
Wirmanto Suteddy

Sistem keamanan rumah merupakan implementasi yang harus dilakukan untuk meningkatkan keamanan dari kejadian yang tidak diinginkan. Beberapa implementasi hanya memberikan notifikasi sederhana berupa alarm dan tidak menjadi bukti yang kuat apabila terjadi pencurian. Salah satu solusi yang dilakukan adalah penempatan kamera untuk memantau keamanan rumah secara real time diintegrasikan dengan penyimpanan cloud. Bluemix merupakan salah satu provider untuk aplikasi cloud yang memiliki layanan pengolahan dan penyimpanan data, akses aplikasi mobile, pengawasan serta Internet of Things (IoT). Sistem yang diimplementasikan adalah integrasi Raspberry Pi dengan layanan Bluemix untuk melakukan pengawasan keamanan rumah dan memberikan notifikasi kepada pengguna. Sistem mendeteksi jarak menggunakan sensor HC-SR04 terhadap objek dan apabila jarak melewati acuan, hal tersebut adalah indikasi terjadinya pencurian. Berikutnya sistem akan menyalakan buzzer sebagai keluaran suara dan mengaktifkan kamera untuk mengambil gambar lalu diunggah ke object storage Bluemix. Langkah berikutnya yaitu layanan IBM push notification memberikan notifikasi ke perangkat Android pengguna. Pengujian dilakukan dengan menghalangi pembacaan sensor sehingga terjadi indikasi pencurian. Hasilnya adalah sistem berhasil menyalakan buzzer, mengambil gambar lalu diunggah ke Bluemix, dan notifikasi berhasil masuk pada Android. Notifikasi diterima oleh file browser pada perangkat Android dan dilakukan sinkronisasi dengan object storage untuk melakukan pengunduhan berkas gambar yang telah diunggah sebelumnya.Kata kunci: Bluemix, Raspberry Pi, object sorage, IBM push notification Home security system is an implementation that needs to be done to improve the security of unwanted events. Some implementations only provide a simple notification such as alarm and cannot become strong evidence in case of theft. One of the solutions is camera placement to monitor home security in real time integrated with cloud storage. Bluemix is a provider for cloud applications that have data processing and storage services, mobile application access, monitoring and Internet of Things (IoT). System implemented was integration of Raspberry Pi with Bluemix services to conduct home security surveillance and provide notification to user. System detected distance using HC-SR04 sensor to object and if distance passes the reference, it was an indication of theft. Next, system will turned on buzzer as a sound output and activating the camera to take picture and uploaded to Bluemix Object Storage. Next step was IBM push notification service giving notification to user's Android device. The testing was done by blocking the sensor readings so that there was an indication of theft. The result was system succeeded in turning on the buzzer, taking pictures, uploading pictures to Bluemix, and notification successfully logged on Android. Notifications are received by the file browser on Android device and synchronized with object storage to download image files that have been uploaded previously.Keywords: Bluemix, Raspberry Pi, object storage, IBM push notification 


Author(s):  
Marta Kotkowska

Between the World and the Image – Signs, Symbols and Visual Metaphors in Iwona Chmielewska’s Picturebooks In this article, Marta Kotkowska appeals to the category of the iconic turn and appoints insignias of picturebooks of Iwona Chmielewska. The researcher also analyses meanings of the artistic expression which author uses in her books. Relying on this characterization, Marta Kotkowska presents how this “in between” words and images works, and how, almost in the real time, it generates and transform meanings. In the description of the almost indiscernible and elusive relation between the word and the image which constitutes picturebook, the semiotic categories, such as the sign, the symbol and the visual metaphor are used. The editorial deliberations concerning the congeniality of analyzing projects are summing the whole article. They emphasize that Chmielewska creates every book even in the smallest detail and with full consciousness and that both format, cover and paper, and words and images, are significant.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Xiang Yu ◽  
Chun Shan ◽  
Jilong Bian ◽  
Xianfei Yang ◽  
Ying Chen ◽  
...  

With the rapid development of Internet of Things (IoT), massive sensor data are being generated by the sensors deployed everywhere at an unprecedented rate. As the number of Internet of Things devices is estimated to grow to 25 billion by 2021, when facing the explicit or implicit anomalies in the real-time sensor data collected from Internet of Things devices, it is necessary to develop an effective and efficient anomaly detection method for IoT devices. Recent advances in the edge computing have significant impacts on the solution of anomaly detection in IoT. In this study, an adaptive graph updating model is first presented, based on which a novel anomaly detection method for edge computing environment is then proposed. At the cloud center, the unknown patterns are classified by a deep leaning model, based on the classification results, the feature graphs are updated periodically, and the classification results are constantly transmitted to each edge node where a cache is employed to keep the newly emerging anomalies or normal patterns temporarily until the edge node receives a newly updated feature graph. Finally, a series of comparison experiments are conducted to demonstrate the effectiveness of the proposed anomaly detection method for edge computing. And the results show that the proposed method can detect the anomalies in the real-time sensor data efficiently and accurately. More than that, the proposed method performs well when there exist newly emerging patterns, no matter they are anomalous or normal.


2013 ◽  
Vol 846-847 ◽  
pp. 1711-1715 ◽  
Author(s):  
Wen Jie Ji ◽  
Xiao Qiong Li ◽  
Jing Yang Chen

Mountain torrent is one of major natural disasters for humans. With the development of the Internet of things, the instrumented terminals, through which the host PC could obtain the real-time water and rainfall information and could alert to a coming disaster, have been widely applied to mountain torrent warning system. In order to ensure the effectiveness of network alerting, the program in the terminals need to be updated for some specific situations, but large quantities of terminals are usually built in complex terrain and fragmented geographically, so that it is difficult and expensive to update or repair the programs. In this paper, a method of remote update, realized on the BAM-4300 hydrologic remote terminal to update the complex programs via GPRS modules, was highly reliable. Experiments show that this method is of safety and reliability, and cumbersome processes of onsite update and maintenance could be avoided.


2010 ◽  
Vol 19 (2) ◽  
pp. 151-171 ◽  
Author(s):  
Emily Troscianko

We read in a linear fashion, page by page, and we seem also to experience the world around us thus, moment by moment. But research on visual perception shows that perceptual experience is not pictorially representational: it does not consist in a linear, cumulative, totalizing process of building up a stream of internal picture-like representations. Current enactive, or sensorimotor, theories describe vision and imagination as operating through interactive potentiality. Kafka’s texts, which evoke perception as non-pictorial, provide scope for investigating the close links between vision and imagination in the context of the reading of fiction. Kafka taps into the fundamental perceptual processes by which we experience external and imagined worlds, by evoking fictional worlds through the characters’ perceptual enaction of them. The temporality of Kafka’s narratives draws us in by making concessions to how we habitually create ‘proper’, linear narratives out of experience, as reflected in traditional Realist narratives. However, Kafka also unsettles these processes of narrativization, showing their inadequacies and superfluities. Kafka’s works engage the reader’s imagination so powerfully because they correspond to the truth of perceptual experience, rather than merely to the fictions we conventionally make of it. Yet these texts also unsettle because we are unused to thinking of the real world as being just how these truly realistic, Kafkaesque worlds are: inadmissible of a complete, linear narrative, because always emerging when looked for, just in time.


2013 ◽  
Vol 273 ◽  
pp. 641-645 ◽  
Author(s):  
Rong Chun Sun ◽  
Yan Piao ◽  
Yu Wang ◽  
Han Wang

To help drivers to quickly find a spare parking, a parking guidance control system was proposed. The principle of ultrasonic ranging was used to detect the state of a parking space, and through the internet of things the parking detector transmits the real-time information to the control center. The control center mainly is an industrial computer and is responsible for dealing with the real-time information and sending the control command by internet of things. The guidance signs at each crossroad receive the wireless commands and execute them, by which the guidance function is performed. The internet of things was realized by ZigBee star network, in which the control center is a coordinator and other parts are routers or terminal equipments. The simulation experiment results show that the parking guidance system works well, and has the value of application and promotion to some extent.


Sign in / Sign up

Export Citation Format

Share Document