scholarly journals IoT Energy Efficiency through Centrality Metrics

2019 ◽  
Vol 3 (2) ◽  
pp. 14-21
Author(s):  
Majed Alhaisoni

The Internet of Things is the current and next revolution in integrating various technologies and wireless communications. It has been shown to make an important contribution in various modes of communication, in homes, offices and other buildings. However, certain research issues are still remain, such as life span of the network and a definition of the most influential nodes in communications, which affect the overall energy distribution. This paper introduces a new approach to enhance the communication over the internet of things, by combining two different domains, the computer network and network science. Various scenarios have been thoroughly implemented and tested over different network topologies. The results show clear enhancements on network centrality and overall energy distribution.

2014 ◽  
Vol 7 (2) ◽  
pp. 195-203 ◽  
Author(s):  
Richard A. Formato

Variable Z0(VZ0) antenna technology is a new design or optimization methodology applicable to any antenna on any platform designed or optimized with any procedure. It should be particularly useful for wireless devices populating the Internet of Things. VZ0expands the design or decision space by adding another degree of freedom invariably leading to better antennas. A simple design example illustrates its effectiveness.


Author(s):  
Xiongtao Zhang ◽  
Xiaomin Zhu ◽  
Weidong Bao ◽  
Laurence T. Yang ◽  
Ji Wang ◽  
...  

2016 ◽  
Vol 64 (7) ◽  
Author(s):  
Christian Bauer ◽  
Zaigham-Faraz Siddiqui ◽  
Manuel Beuttler ◽  
Klaus Bauer

AbstractWith the increasing connectivity of devices, the amount of data that is recorded and ready for analysis is growing correspondingly. This is also the case for shop floors in flexible sheet metal handling and production. With the growing need for flexibility in production, the availability of machine tools is imminent. This paper shows different approaches that a classical manufacturing systems company such as TRUMPF takes in applying data mining techniques to address the new challenges which come with the Internet of things. In addition to classical methods, a new approach is introduced that does not need any alteration of the machine or its interfaces.


Author(s):  
Linh Manh Pham

Many domains of human life are more and moreimpacted by applications of the Internet of Things (i.e., IoT).The embedded devices produce masses of data day after dayrequiring a strong network infrastructure. The inclusion ofmessaging protocols like MQTT is important to ensure as fewerrors as possible in sending millions of IoT messages. Thisprotocol is a great component of the IoT universe due to itslightweight design and low power consumption. DistributedMQTT systems are typically needed in actual applicationenvironments because centralized MQTT methods cannotaccommodate a massive volume of data. Although beingscalable decentralized MQTT systems, they are not suited totraffic workload variability. IoT service providers may incurexpense because the computing resources are overestimated.This points to the need for a new approach to adapt workloadfluctuation. Through proposing a modular MQTT framework,this article provides such an elasticity approach. In order toguarantee elasticity of MQTT server cluster while maintainingintact IoT implementation, the MQTT framework used offthe-shelf components. The elasticity feature of our frameworkis verified by various experiments.


Author(s):  
Dan-Radu Berte

Abstract IoT, or the Internet of Things, has been in use since circa 1999. It defines a next chapter in the evolution of the Internet where computing devices embedded in everyday objects are able to send and receive data themselves. In recent years miniaturization and economies of scale brought a boon of new devices to the consumer and enterprise market, prompting Gartner to predict over 20bln live IoT devices by 2020. However, the definition of IoT is loose and, for the purpose of predicting trends or discussing security, formulating a clear understanding of the term is crucial. In fact, Internet of Things is a term only mostly used by the media, academia and the industry. Customers in the consumer space refer to the technologies by their benefit describing term of “Smart Home”. A quick analysis of this gap shows how it’s entirely possible no knowledge permeates the business and market worlds because of the incompatible terms used. As more devices, OSes and heterogeneous platforms entrench the concept of a new digital lifestyle, the new “Digital Kingdom” opens its doors to radical disruption, such as the latest massive Mirai and Reaper attacks. Our ability to correctly define the IoT, it’s platforms and components, should lead to better market dynamics and better preparedness, as one can’t secure something that can’t be defined. This paper proposes to further understand the IoT by exploring available definitions, reiterating misuse and equivocal perception, concluding with a more suiting, contemporary definition.


2019 ◽  
Vol 6 (2) ◽  
pp. 2188-2204 ◽  
Author(s):  
Mohamed Amine Ferrag ◽  
Makhlouf Derdour ◽  
Mithun Mukherjee ◽  
Abdelouahid Derhab ◽  
Leandros Maglaras ◽  
...  

Author(s):  
Dr. Mohd Zuber

The huge data generate by the Internet of Things (IOT) are measured of high business worth, and data mining algorithms can be applied to IOT to take out hidden information from data. In this paper, we give a methodical way to review data mining in knowledge, technique and application view, together with classification, clustering, association analysis and time series analysis, outlier analysis. And the latest application luggage is also surveyed. As more and more devices connected to IOT, huge volume of data should be analyzed, the latest algorithms should be customized to apply to big data. We reviewed these algorithms and discussed challenges and open research issues. At last a suggested big data mining system is proposed.


Author(s):  
Maurizio Tonellotto

The development of information technologies in recent years has transformed our society into a “hyper-connected space” in which the pitfalls, the risks, as well as the damages to the victims have grown exponentially. Identity theft, hacking, information piracy, threats to data integrity, on-line scams, or CEO fraud are the commonplace keywords that are part of the internet of things. Cybercrime can cause serious harm and long-term effects, whether the victims are individuals or companies. It is important to address the definition of “cybercrime,” since the term itself refers to a harmful behavior that is in some way related to a single computer or to a computer network and examine the main types of computer crimes in order to understand which countermeasures can be implemented to counteract these phenomena where the human factor is the fundamental component to promote the concept of “conscious attention” as a necessary resource to limit the risks of “cyber victimization.”


Sign in / Sign up

Export Citation Format

Share Document