scholarly journals The Challenge for Energy Saving in Smart Homes: Exploring the Interest for IoT Devices Acquisition in Romania

Energies ◽  
2021 ◽  
Vol 14 (22) ◽  
pp. 7589
Author(s):  
Adrian Micu ◽  
Angela-Eliza Micu ◽  
Marius Geru ◽  
Alexandru Capatina ◽  
Mihaela-Carmen Muntean

The Internet of Things (IoT) is a shift towards a digitally enriched environment that connects smart objects and users, aiming to provide merchants with innovative ways to communicate with customers. Therefore, the aim of this research was to identify the Romanian consumer′s openness to technological autonomy and the degree of acceptance of IoT services and technologies to address the green deal principle of low energy consumption. This article investigated the factors that influence the decision to buy smart IoT devices and customers′ perception regarding the security of the data generated in this process. Based on the Technology Acceptance Model (TAM), this research proposed an alternative model consisting of 18 items measured on a Likert scale in order to identify the factors that contribute to the perceived value of the consumer and the behavioral precursors impacting the decision to purchase IoT products. More and more products have built-in sensors and through the Internet connection generate valuable data from a managerial point of view in relation to the customer. Although these data are expected to be of great value to companies, the way they are used is not always transparent and can affect the purchasing decisions and the behavior of IoT products′ customers. The findings of this paper aimed to better promote Smart Home IoT technologies and devices among Romanian people, making possible the control of consumption and the generation of energy savings.

2019 ◽  
Vol 265 ◽  
pp. 07014
Author(s):  
Alexander Shiler ◽  
Elizaveta Stepanova

At present, the Internet market of things is constantly expanding; it has covered almost all the most important areas: transport, housing and communal services, industry, agriculture, telecommunications and information technology. In connection with the constant increase in the number of attacks on IoT-devices, the issue of standardization of this technology is quite acute. The features of the of existing solutions and the new proposed Russian NB-Fi standard for IoT are presented in this article from the point of view of information security.


2018 ◽  
Vol 38 (1) ◽  
pp. 121-129 ◽  
Author(s):  
Pablo Antonio Pico Valencia ◽  
Juan A. Holgado-Terriza ◽  
Deiver Herrera-Sánchez ◽  
José Luis Sampietro

Recently, the scientific community has demonstrated a special interest in the process related to the integration of the agent-oriented technology with Internet of Things (IoT) platforms. Then, it arises a novel approach named Internet of Agents (IoA) as an alternative to add an intelligence and autonomy component for IoT devices and networks. This paper presents an analysis of the main benefits derived from the use of the IoA approach, based on a practical point of view regarding the necessities that humans demand in their daily life and work, which can be solved by IoT networks modeled as IoA infrastructures. It has been presented 24 study cases of the IoA approach at different domains ––smart industry, smart city and smart health wellbeing–– in order to define the scope of these proposals in terms of intelligence and autonomy in contrast to their corresponding generic IoT applications.


2015 ◽  
Vol 54 (2) ◽  
pp. 211-228 ◽  
Author(s):  
Paul Juinn Bing Tan

Currently, the speed of knowledge innovation is accelerating with the prevalence of online learning, which penetrates the limits of both time and space. To date, studies examining English e-learning websites have rarely been conducted from the point of view of both the technology acceptance model (TAM) and information technology. In this research, we use the TAM as our basic theory to research the use of English e-learning websites. We find that (1) most English learners think that using the Internet to learn English is more convenient than using traditional methods; and (2) that most adult English learners think that using the Internet to learn English is more helpful than using traditional methods.


Author(s):  
Patrick Carvalho Tavares R. Ferreira ◽  
Lucas Francisco Wanner

Due to the evolution of silicon chips manufacturing processes at smaller and smaller nanoscales, the computing and memory substrates are increasingly changing, especially from an energy point of view. Considering projects with transistors composed of countable atoms quantities, small variations in the construction process can lead to energy costs of 10 times greater for the same processing. Software systems that identify hardware characteristics and take measures to adapt to the execution context amortize unnecessary energy expenditures. This economy is crucial for the execution continuity of embedded systems and/or applications used in the Internet of Things (IoT), where the energy resources are limited. One way to do this is by staggering tasks efficiently, postponing low-urgency services and running them all in only one period of CPU activity. The objective of this project was to increase the energy efficiency of IoT devices by creating a system that is capable of reorganizing and scheduling its tasks, as well as redistributing them in a network to be executed in nodes with characteristics of lower resource consumption.


Author(s):  
Zoran Cekerevac ◽  
Zdenek Dvorak ◽  
Ludmila Prigoda ◽  
Petar Cekerevac

Understanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, including hacker’s point of view as well as the defender’s point of view. Here are discussed questions like: Who are the hackers? Why do people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end, some questions about victim protection are discussed together with the weakness that hackers can use for their own protection. The aim of the article is to make readers familiar with the possible risks of hacker's attacks on the mobile phones and on possible attacks in the announced flood of the internet of things (next IoT) devices.


Think India ◽  
2019 ◽  
Vol 22 (3) ◽  
pp. 402-409
Author(s):  
Deepak Shrivastava ◽  
Apurva Shrivastava ◽  
Gyan Prakash

Tech-friendliness in this new era is an important quotient considered and the persons’ acceptance towards the technology frequency matters a lot. But still the frequency varies from person to person, this brought in the concept of Technology Acceptance Model given by Fred Davis in 1989. The theory of TAM is based on two theories that are Theory of Reasoned Action and Theory of Planned Behavior, TAM is extended version of these two. Green Banking is a new technology introduced by the banks that focuses on the growth of Sustainable development and Banking system too. Thus, banks ask their customers to use it or practice it in their daily life transactions. But every customer has their own point of view on the usage of Green banking. Thus, the research aims to understand the customers’ perception towards the Green Banking for this TAM is used. The research states that Perceived risk is the primary factor that is followed by perceived usefulness and perceived ease of use that impacts the decision to use green banking. Thus, the behavioral intention results in actual use of green banking usage for which people are trying to accept the new technology. So, the banks have earned points for creating awareness among their customers but still they have to work hard and clarify their customers’ problems and vanish that hitch that is stopping them to use green banking easily.


Sensors ◽  
2021 ◽  
Vol 21 (5) ◽  
pp. 1631
Author(s):  
Bruno Guilherme Martini ◽  
Gilson Augusto Helfer ◽  
Jorge Luis Victória Barbosa ◽  
Regina Célia Espinosa Modolo ◽  
Marcio Rosa da Silva ◽  
...  

The application of ubiquitous computing has increased in recent years, especially due to the development of technologies such as mobile computing, more accurate sensors, and specific protocols for the Internet of Things (IoT). One of the trends in this area of research is the use of context awareness. In agriculture, the context involves the environment, for example, the conditions found inside a greenhouse. Recently, a series of studies have proposed the use of sensors to monitor production and/or the use of cameras to obtain information about cultivation, providing data, reminders, and alerts to farmers. This article proposes a computational model for indoor agriculture called IndoorPlant. The model uses the analysis of context histories to provide intelligent generic services, such as predicting productivity, indicating problems that cultivation may suffer, and giving suggestions for improvements in greenhouse parameters. IndoorPlant was tested in three scenarios of the daily life of farmers with hydroponic production data that were obtained during seven months of cultivation of radicchio, lettuce, and arugula. Finally, the article presents the results obtained through intelligent services that use context histories. The scenarios used services to recommend improvements in cultivation, profiles and, finally, prediction of the cultivation time of radicchio, lettuce, and arugula using the partial least squares (PLS) regression technique. The prediction results were relevant since the following values were obtained: 0.96 (R2, coefficient of determination), 1.06 (RMSEC, square root of the mean square error of calibration), and 1.94 (RMSECV, square root of the mean square error of cross validation) for radicchio; 0.95 (R2), 1.37 (RMSEC), and 3.31 (RMSECV) for lettuce; 0.93 (R2), 1.10 (RMSEC), and 1.89 (RMSECV) for arugula. Eight farmers with different functions on the farm filled out a survey based on the technology acceptance model (TAM). The results showed 92% acceptance regarding utility and 98% acceptance for ease of use.


2022 ◽  
Vol 54 (7) ◽  
pp. 1-34
Author(s):  
Sophie Dramé-Maigné ◽  
Maryline Laurent ◽  
Laurent Castillo ◽  
Hervé Ganem

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.


T-Comm ◽  
2020 ◽  
Vol 14 (12) ◽  
pp. 45-50
Author(s):  
Mikhail E. Sukhoparov ◽  
◽  
Ilya S. Lebedev ◽  

The development of IoT concept makes it necessary to search and improve models and methods for analyzing the state of remote autonomous devices. Due to the fact that some devices are located outside the controlled area, it becomes necessary to develop universal models and methods for identifying the state of low-power devices from a computational point of view, using complex approaches to analyzing data coming from various information channels. The article discusses an approach to identifying IoT devices state, based on parallel functioning classifiers that process time series received from elements in various states and modes of operation. The aim of the work is to develop an approach for identifying the state of IoT devices based on time series recorded during the execution of various processes. The proposed solution is based on methods of parallel classification and statistical analysis, requires an initial labeled sample. The use of several classifiers that give an answer "independently" from each other makes it possible to average the error by "collective" voting. The developed approach is tested on a sequence of classifying algorithms, to the input of which the time series obtained experimentally under various operating conditions were fed. Results are presented for a naive Bayesian classifier, decision trees, discriminant analysis, and the k nearest neighbors method. The use of a sequence of classification algorithms operating in parallel allows scaling by adding new classifiers without losing processing speed. The method makes it possible to identify the state of the Internet of Things device with relatively small requirements for computing resources, ease of implementation, and scalability by adding new classifying algorithms.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


Sign in / Sign up

Export Citation Format

Share Document