A Method for Incomplete Data Filling Based on Power Graph in IoT

2013 ◽  
Vol 380-384 ◽  
pp. 2431-2434
Author(s):  
Yang Yang ◽  
Xiao Wen ◽  
Peng Tang ◽  
Fang Yi Liu

With the development of the Internet of Things, collected data from the Internet of Things include more and more incomplete data because of the network fault or the sensing terminal breakdown. A lot of incomplete data do harm to the IoT application and decision. For filling the incomplete data in IoT effectively, this paper presents a new method based on power graph, which first uses the graph power to abstract the important attributes of the objects. Then the proposed method fills the important attributes using improved method based on similarity. Experimental results show the effectiveness of our method, especially for filling the massive incomplete data in IoT.

Sensors ◽  
2020 ◽  
Vol 20 (7) ◽  
pp. 1821 ◽  
Author(s):  
Zhenyu Wu ◽  
Kai Qiu ◽  
Jianguo Zhang

The interoperations of endpoint devices are generally achieved by gateways in Internet of Things (IoT) systems. However, the gateways mainly focus on networking communication, which is lack of data logic control capabilities. The microcontrollers with embedded intelligence could work as an intermediate device to help the interconnections of the endpoint devices. Moreover, they could help control the endpoint devices. In this paper, a microcontroller architecture with intelligent and scalable characteristics is proposed. The intelligence means that the microcontroller could control the target endpoint devices by its logical circuits, and the scalability means that the microcontroller architecture could be easily extended to deal with more complex problems. Two real world industrial implementations of the proposed architecture are introduced. The implementations show that the microcontroller is important to provide the intelligent services to users in IoT systems. Furthermore, a simulation experiment based on the cloud model is designed to evaluate the proposed method. The experimental results demonstrate the effectiveness of the proposed architecture.


MACRo 2015 ◽  
2015 ◽  
Vol 1 (1) ◽  
pp. 25-36
Author(s):  
Béla Genge ◽  
Călin Enăchescu

AbstractThe expansion of Internet has led to a variety of directly accessible devices and services. Nowadays, companies tend to increase the number of Internetfacing services in order to ensure higher visibility, and accessibility towards end-users. Nonetheless, this profound expansion towards an “Internet of Things” brings new opportunities to malicious actors. As a result, novel cyber-physical attacks bring new challenges to systems administrators in order to accommodate traditional user requests with security prerequisites. Therefore, in this paper we propose a novel approach for historical Internet connectivity assessment of services. The technique uses the output of the popular Shodan search engine to infer the lifetime of different Internet-facing services. Experimental results conducted on IP address blocks attributed to six different institutions distributed across four sectors (university, telecommunications, banking, and power) show different possible service lifetime patterns.


Author(s):  
Vishesh Jakhar

Abstract: Man-made consciousness innovations are starting to be effectively utilized in human existence, this is worked with by the appearance and wide scattering of the Internet of Things (IOT). Independent gadgets are becoming more intelligent in their manner to communicate with both a human and themselves. New limits lead to making of different frameworks for mix of savvy things into Social Networks of the Internet of Things. One of the important patterns in man-made brainpower is the innovation of perceiving the normal language of a human. New experiences in this theme can prompt new method for normal humanmachine cooperation, in which the machine would figure out how to comprehend human's language, changing and connecting in it. One of such devices is voice associate, which can be incorporated into numerous other shrewd frameworks. In this workshop, the standards of the working of voice collaborators are depicted, its principle weaknesses and restrictions are given. The strategy for making a neighborhood voice colleague without utilizing cloud administrations is depicted, which permits to altogether grow the pertinence of such gadgets later on.


2015 ◽  
Author(s):  
Carlos Eduardo Millani ◽  
Alisson Linhares ◽  
Rafael Auler ◽  
Edson Borin

In face of the high number of different hardware platforms that we need to program in the Internet-of-Things (IoT), Virtual Machines (VMs) pose as a promising technology to allow a program once, deploy everywhere strategy. Unfortunately, many existing VMs are very heavy to work on resourceconstrained IoT devices. We present COISA, a compact virtual platform that relies on OpenISA, an Instruction Set Architecture (ISA) that strives for easy emulation, to allow a single program to be deployed on many platforms, including tiny microcontrollers. Our experimental results indicate that COISA is easily portable and is capable of running unmodified guest applications in highly heterogeneous host platforms, including one with only 2 kB of RAM.


Intruders usually break into houses with the intention of committing burglaries. This research proposed a development of an intrusion detection and security Alarm System using the Internet of Things. The methodology of the proposed system consists of five components. First, the hardware components are Raspberry Pi 3 Model B+, a camera for Raspberry Pi, motion sensors, relays and speakers, while the software system was developed by Python. Second, the architecture of the proposed system. Third, the design and construction of the electronic circuit connected with sensors. Fourth, the intruder image analysis for the alarm system using OpenCV and Deep Learning. The face detected by the camera was compared with homeowner’s pictures. If the detected face was not the homeowner, the system alarms the user or the owner via the smartphone LINE Application. Last, the Anto, which is the free and easy Internet of Things platform, connect the devices and the smartphone application together via the internet. Hence, the users or homeowners can control the devices or take the picture from a distance using a smartphone. The experimental results show that the proposed system can detect the intruder and alarm the homeowner via LINE Application on the smartphone. The experimental results show that the proposed system can efficiently detect the intruder and alarm the homeowner via LINE Application on the smartphone. The performance of the proposed system is excellent with the average score of 97.40%. The developed application on the Android smartphone is user-friendly, simple and efficient as well.


Sign in / Sign up

Export Citation Format

Share Document