scholarly journals PERANCANGAN PROTOTYPE ALAT PENDETEKSI KEBOCORAN GAS LPG BERBASIS ARDUINO UNO R3 DENGAN MODUL SIM800L DAN ESP8266 SEBAGAI MEDIA INFORMASI

2020 ◽  
Vol 4 (2) ◽  
pp. 47-53
Author(s):  
Afdal Eka Kurniawan ◽  
Mayda Waruni Kasrani ◽  
A Asni B

Abstract— The LPG (Liquefied Petroleum Gas) gas leak detection and monitoring system is an anticipatory measure for safety from hazards such as gas cylinder explosions. This research aims to build a detection system by integrating MQ-6 sensor, Arduino microcontroller and ESP8266. Data can then be displayed on the Blynk application and notifications will be given via the application and email. The process of sending data using SIM800L module GSM/GPRS is a part that serves to communicate between the main monitors with mobile phone and the module ESP8266E ESP 12E WIFI IOT for data transfer in WIFI network . And this system has fulfilled the rules of the Internet of things, making it easier for the community in its application.

2020 ◽  
Vol 12 (1) ◽  
pp. 34-40
Author(s):  
Abi Sabila Mustaqim ◽  
Danny Kurnianto ◽  
Fikra Titan Syifa

Fire due to  Liquefied Petroleum Gas (LPG) gas leak is one of the disasters that still often occurs in the community. Community ignorance of safety standards in using LPG gas  is one reason. Fires can be prevented if at the time of the LPG gas leak can be detected earlier. Therefore we need a system that can monitor the condition of gas leaks and fires remotely. Internet of things (IoT) technology can be applied to this monitoring system so that information on LPG gas leaks and fires can be monitored remotely. The Internet of Things (IoT) based LPG and Fire leak monitoring system is a concept that utilizes internet connectivity between smartphone devices connected to sensor devices. The devices used to support this system include NodeMCU ESP8266 as a microcontroller and as a liaison to the internet, MQ-6 gas sensors and flame sensors as sensors for detecting gas and fire leaks, buzzers as alarms, and fans as neutralizing gas levels in the room. Data obtained by the sensor will be uploaded to the database via the internet and can be accessed through an android application. The results of the design show that the android application can display notifications when a gas leak or fire occurs. In testing the performance of data transmission, the results show that the highest data transmission delay is 64,61 seconds, and the lowest delay time is 61,56 seconds, the highest throughput value is 747,6 bits/second, and the lowest value is 285,4 bits/second.


2021 ◽  
Vol 21 (3) ◽  
pp. 1-22
Author(s):  
Celestine Iwendi ◽  
Saif Ur Rehman ◽  
Abdul Rehman Javed ◽  
Suleman Khan ◽  
Gautam Srivastava

In this digital age, human dependency on technology in various fields has been increasing tremendously. Torrential amounts of different electronic products are being manufactured daily for everyday use. With this advancement in the world of Internet technology, cybersecurity of software and hardware systems are now prerequisites for major business’ operations. Every technology on the market has multiple vulnerabilities that are exploited by hackers and cyber-criminals daily to manipulate data sometimes for malicious purposes. In any system, the Intrusion Detection System (IDS) is a fundamental component for ensuring the security of devices from digital attacks. Recognition of new developing digital threats is getting harder for existing IDS. Furthermore, advanced frameworks are required for IDS to function both efficiently and effectively. The commonly observed cyber-attacks in the business domain include minor attacks used for stealing private data. This article presents a deep learning methodology for detecting cyber-attacks on the Internet of Things using a Long Short Term Networks classifier. Our extensive experimental testing show an Accuracy of 99.09%, F1-score of 99.46%, and Recall of 99.51%, respectively. A detailed metric representing our results in tabular form was used to compare how our model was better than other state-of-the-art models in detecting cyber-attacks with proficiency.


Author(s):  
Sree Naga Raja Sekhar Mallela

Abstract: The most common buzzwords in the world is “The Internet of things” (IoT) and IOT describes the network of physical objects, so known as, "things" those are rooted with sensors in the devices, application software, technologies that is used for the resolution of connecting one end to another end and exchanging information with other devices and systems over the Internet. The IoT 5G technologies can also be used in journalism and the primary focus is to increase M2M interaction of mass communication devices. One way it is “ubiquitous computing” can occur using any device, in any location, and in any format. The Internet of Things (IoT) is all about small cost sensors grabbing data to communicate with one device to another device using cloud solutions. Coming to the 5th generation mobile network. We have already started using 4G networks and as we know that, start with 1G, 2G, 3G, and 4G networks. The 5th generation network is going to enable an upcoming new network that will associate virtually every person globally connected and everything organized including IoT devices, objects and machines. Central communication and Journalism is the activity of gathering right information, evaluating, generating, and presenting broadcast information. It is high time to start using IOT Technology using 5th generation high-speed network connectivity devices to communicate or data transfer in the area of journalism. Keywords: IOT – Internet Of Things, 5G- Fifth Generation in data network, JMC – Journalism and Mass Communications, M2M – Machine to Machine, Cloud , Artificial intelligence and Machine Learning.


2019 ◽  
Vol 7 (2) ◽  
pp. 21-40 ◽  
Author(s):  
Parthasarathy Panchatcharam ◽  
Vivekanandan S.

Wellbeing is fundament requirement. What's more, it is human appropriate to get quality health care. These days, India is confronting numerous medical problems in light of fewer assets. This survey article displays the idea of solving health issues by utilizing a recent innovation, the Internet of Things (IOT). The Internet of Things with their developing interdisciplinary applications has changed our lives. Smart health care being one such IoT application interfaces brilliant gadgets, machines, patients, specialists, and sensors to the web. At long last, the difficulties and prospects of the improvement of IoT-based medicinal service frameworks are talked about in detail. This review additionally summarizes the security and protection worries of IoT, administrations and application of IoT and smart healthcare services that have changed the customary medicinal services framework by making healthcare administration more proficient through their applications.


Author(s):  
S. Sundar ◽  
Piyush Arora ◽  
Sarthak Agrawal ◽  
R. Kumar ◽  
Harish M. Kittur

<p>In the last few years,there has been big interest in adhoc wireless network as they have tremendous military and commercial potential[1].Traditionally to test various parameters in the MANET , the most popular approach is to use mobile phone and Laptops and use the popular WIFI based protocol . But in the recent years there is a huge attraction towards the Internet Of things and specifically wireless sensor network. In this paper we are going to test the MANET protocol using zigbee based XBee modules specifally to determine the Range and Throughput of the Xbee netowork using XCTU Software . The sensor network will be deployed in the car parking application to see the parameters in the real time and dynamically see the sustainability of the network .The network is being designed keeping in mind that the nodes are mobile and at the same time the network does not require a standard infrastructure.</p>


Sensors ◽  
2019 ◽  
Vol 19 (9) ◽  
pp. 1977 ◽  
Author(s):  
Geethapriya Thamilarasu ◽  
Shiven Chawla

Cyber-attacks on the Internet of Things (IoT) are growing at an alarming rate as devices, applications, and communication networks are becoming increasingly connected and integrated. When attacks on IoT networks go undetected for longer periods, it affects availability of critical systems for end users, increases the number of data breaches and identity theft, drives up the costs and impacts the revenue. It is imperative to detect attacks on IoT systems in near real time to provide effective security and defense. In this paper, we develop an intelligent intrusion-detection system tailored to the IoT environment. Specifically, we use a deep-learning algorithm to detect malicious traffic in IoT networks. The detection solution provides security as a service and facilitates interoperability between various network communication protocols used in IoT. We evaluate our proposed detection framework using both real-network traces for providing a proof of concept, and using simulation for providing evidence of its scalability. Our experimental results confirm that the proposed intrusion-detection system can detect real-world intrusions effectively.


2018 ◽  
Vol 7 (3) ◽  
pp. 1491
Author(s):  
Dr Chalasani Srinivas ◽  
Dr Srinivas Malladi

The Internet of Things (IoT) is growing in the web of an age-old IPv6 address for Internet connections and messages that arise between these and other devices and systems that work with the Internet. It is equipped with the unique ID and data transfer capability through the network. Among other things, tracking and tracking online travel is a major issue. Although there are many tracking techniques for moving objects, many are at risk. So there is a need for tracking the safety of an object Safety protocols should provide visibility and tracking of street objects in support of the Internet (IoT). This protocol is based on the RFID Identity System for IoT Objects. Existing ones do not provide authentication of sites that lead to fakes. Great use of energy. The proposed protocol improves road safety tracking using the base protocol light and SPDL. The requested protocol is intended to ensure accuracy, accuracy, confidentiality and encryption. To ensure safe monitoring of objects, the requested protocols use cryptic primitives that use HMAC concepts that are used to authenticate an object. This protocol introduction relies on code authentication code (CMC), which is used to reduce power consumption at low cost. The testing of a test network evaluates protocol implementation and is found to be safer and requires less calculation than existing protocols.  


Sign in / Sign up

Export Citation Format

Share Document