FOWLP Technology eWLB – Enabler for Packaging of IoT/IoE Modules

2015 ◽  
Vol 2015 (1) ◽  
pp. 000239-000244 ◽  
Author(s):  
Steffen Kroehnert ◽  
José Campos ◽  
André Cardoso ◽  
Eoin O'Toole ◽  
Abel Janeiro ◽  
...  

The next big wave, the Internet of Things or Internet of Everything (IoT/IoE) is on the way. What does that mean for semiconductor packaging, assembly and test? What are the requirements? What solutions can be provided? The market will be wide and fragmented. Many different solutions will be needed. Flexibility and the capability to customize system solutions will be crucial. The fact is, it will be all about smart system integration, integration of sensors, MEMS, connectivity and memory: more functionality on less space in small and thin System-in-Package (SiP) and Package-on-Package (PoP). There will not be one specific packaging technology for IoT/IoE, and no new “IoT/IoE Packaging Technology”. The toolbox is here already, and further features required to meet the needs of future IoT/IoE modules are under development. That is actually good news, as the cost pressure will be high, and materialization of existing manufacturing environment, of mature and yielding packaging technologies will be a key for success.

2021 ◽  
pp. 1-10
Author(s):  
Jintao Tang ◽  
Lvqing Yang ◽  
Jiangsheng Zhao ◽  
Yishu Qiu ◽  
Yihui Deng

With the development of the Internet of Things and Radio Frequency Identification (RFID), indoor positioning technology as an important part of positioning technology, has been attracting much attention in recent years. In order to solve the problems of low precision, high cost and signal collision between readers, a new indoor positioning algorithm based on a single RFID reader combined with a Double-order Gated Recurrent Unit (GRU) are proposed in this paper. Firstly, the reader is moved along the specified direction to collect the sequential tag data. Then, the tag’s coordinate is taken as the target value to train models and compare them with existing algorithms. Finally, the best Gated Recurrent Unit positioning model is used to estimate the position of the tags. Experiment results show that the proposed algorithm can effectively improve positioning accuracy, reduce the number of readers, cut down the cost and eliminate the collisions of reader signals.


Author(s):  
R. I. Minu ◽  
G. Nagarajan

In the present-day scenario, computing is migrating from the on-premises server to the cloud server and now, progressively from the cloud to Edge server where the data is gathered from the origin point. So, the clear objective is to support the execution and unwavering quality of applications and benefits, and decrease the cost of running them, by shortening the separation information needs to travel, subsequently alleviating transmission capacity and inactivity issues. This chapter provides an insight of how the internet of things (IoT) connects with edge computing.


Author(s):  
Maurice Dawson

Secure computing is essential as environments continue to become intertwined and hyperconnected. As the Internet of Things (IoT), Web of Things (WoT), and the Internet of Everything (IoE) dominate the landscape of technological platforms, protection these complicated networks is important. The everyday person who wishes to have more devices that allow the ability to be connected needs to be aware of what threats they could be potentially exposing themselves to. Additionally, for the unknowing consumer of everyday products needs to be aware of what it means to have sensors, Radio Frequency IDentification (RFID), Bluetooth, and WiFi enabled products. This submission explores how Availability, Integrity, and Confidentiality (AIC) can be applied to IoT, WoT, and IoE with consideration for the application of these architectures in the defense sector.


2019 ◽  
Vol 8 (3) ◽  
pp. 2613-2619

The Internet of Things (IoT) technology is the main contributor in numerous smart applications. The reason is because it offers for 24/7 hours of control and maintenance geographically apart, thus reduces labor or manpower cost significantly. The 3 main components for any IoT applications are the source of power (energy), the microcontroller and the sensor (s) involved. Previous issues mainly related to how long the source of power could last for the applications to continue its operation. This paper presents IoT technology for hygiene application to address the utilization of toilet tissue named as Intelligent Tissue Dispenser System (iTDS). The iTDS device relies on the microcontroller and sensor in order to operate the intended task. The microcontroller used is an IoT based device called ESP8266 which is a WiFi-embedded microcontroller that utilized standard everyday WiFi band frequency which is at 2.4 GHz. For the sensor, an ultrasonic distance measurement device is used. The ultrasonic sensor transmit an ultrasonic wave that hit the object to be measured. Upon hitting the surface of the object to be measured, the wave is then reflected to the receiver of the sensor and the time difference between transmitted wave and received wave is calculated to get the actual distance of the object from the sensor. The main contribution of iTDS is to monitor and track for the toilet tissue to be refilled. The implementation shows the iTDS ables to update for the status of each tissue which reducing the cost of manually human checking for tissue refill.


Author(s):  
Scott J. Shackelford

The Internet of Things (IoT) is the notion that nearly everything we use, from gym shorts to streetlights, will soon be connected to the Internet; the Internet of Everything (IoE) encompasses not just objects, but the social connections, data, and processes that the IoT makes possible. Industry and financial analysts have predicted that the number of Internet-enabled devices will increase from 11 billion to upwards of 75 billion by 2020. Regardless of the number, the end result looks to be a mind-boggling explosion in Internet connected stuff. Yet, there has been relatively little attention paid to how we should go about regulating smart devices, and still less about how cybersecurity should be enhanced. Similarly, now that everything from refrigerators to stock exchanges can be connected to a ubiquitous Internet, how can we better safeguard privacy across networks and borders? Will security scale along with this increasingly crowded field? Or, will a combination of perverse incentives, increasing complexity, and new problems derail progress and exacerbate cyber insecurity? For all the press that such questions have received, the Internet of Everything remains a topic little understood or appreciated by the public. This volume demystifies our increasingly “smart” world, and unpacks many of the outstanding security, privacy, ethical, and policy challenges and opportunities represented by the IoE. Scott J. Shackelford provides real-world examples and straightforward discussion about how the IoE is impacting our lives, companies, and nations, and explain how it is increasingly shaping the international community in the twenty-first century. Are there any downsides of your phone being able to unlock your front door, start your car, and control your thermostat? Is your smart speaker always listening? How are other countries dealing with these issues? This book answers these questions, and more, along with offering practical guidance for how you can join the effort to help build an Internet of Everything that is as secure, private, efficient, and fun as possible.


2015 ◽  
Vol 2015 (1) ◽  
pp. 000006-000013 ◽  
Author(s):  
Val R. Marinov

The Internet of Things (IoT) “things” are often times described as active or smart devices and objects augmented with sensing, processing, and network capabilities. These smart objects are in the heart of the IoT concept but they alone cannot realize the full potential of IoT. The most ubiquitous objects in the IoT ecosystem, those that reside at the lowest system level and interact with the higher-level smart object, are based on the passive RFID technology. In the form of wireless passive sensors these objects are found in smart packaging, they form the backbone of the structural health monitoring systems, they provide non-invasive and continuous monitoring of physiological parameters, etc. RFID capability is already added to everyday items in the physical form of adhesive “smart” labels, enabling them to become “citizens” of the IoT ecosystem, but this “add-on“ approach increases the implementation cost and oftentimes impacts negatively the host item's form factor and appearance. It also does very little in terms of security and counterfeit prevention. On the other hand, the key economic factor that drives the deployment of the IoT is the cost at the end points. Therefore, the future of the IoT depends on developing an ultra-low-cost technology solution that can mass-produce low cost, RFID-enabled IoT objects on flexible substrates, ready for integration into everyday items. In some cases, such as in intelligent packaging, these objects will be non-obstructive and seamlessly integrated in their hosts. This integration will minimize the cost of implementation and will provide an insurmountable barrier to counterfeiters as they will need access to sophisticated and capital-intensive technologies in order to be able to alter or replicate the product's embedded configuration. Presented are two disruptive processes for packaging of ultrathin flexible hybrid electronic systems with ICs as thin as 15–20 μm and as small as 250 μm per side. The first generation technology is a modification of the conventional pick-and-place technique and has been already demonstrated on a commercial-grade roll-to-roll assembly line with packaging rates exceeding 10,000 cph. The second generation technology uses a laser beam to scan and transfer ultrathin, ultra-small ICs for high-precision assembly onto various flexible and rigid substrates. It provides packaging rates significantly exceeding those of the conventional pick-and-place equipment. Reported are also results from integrating the resulting ultrathin flexible hybrid electronic devices into thin materials such as paper and plastics.


Author(s):  
Reema Abdulraziq ◽  
Muneer Bani Yassein ◽  
Shadi Aljawarneh

Big data refers to the huge amount of data that is being used in commercial, industrial and economic environments. There are three types of big data; structured, unstructured and semi-structured data. When it comes to discussions on big data, three major aspects that can be considered as its main dimensions are the volume, velocity, and variety of the data. This data is collected, analysed and checked for use by the end users. Cloud computing and the Internet of Things (IoT) are used to enable this huge amount of collected data to be stored and connected to the Internet. The time and the cost are reduced by means of these technologies, and in addition, they are able to accommodate this large amount of data regardless of its size. This chapter focuses on how big data, with the emergence of cloud computing and the Internet of Things (IOT), can be used via several applications and technologies.


Author(s):  
Vardan Mkrttchian ◽  
Leyla Gamidullaeva ◽  
Svetlana Panasenko ◽  
Arman Sargsyan

This chapter discusses the problems associated with the design of the business model in the new context of big data and the internet of things to create a research laboratory for studying and improving digital transformations. The development of business prospects for IOT is due to two main trends: 1) the change of focus from IOT viewing primarily as a technology platform for viewing it as a business ecosystem and 2) the transition from focusing on the business model in general to the development of business models of ecosystems. In the chapter, the business model of the ecosystem is considered as a model consisting of signs fixed in ecosystems and focuses on creating the cost of the laboratory and fixing the value of the ecosystem in which the created laboratory operates.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Kai He ◽  
Xueqiao Liu ◽  
Jia-Nan Liu ◽  
Wei Liu

In an identity-based broadcast encryption (IBBE) scheme, the ciphertext is usually appended with a set of user identities to specify intended recipients. However, as IBBE is adopted in extensive industries, the demand of anonymity for specific scenarios such as military applications is urgent and ought no more to be ignored. On the contrary, how to optimize computation and communication is an unavoidable challenge in the IBBE scheme construction, especially in the large-scaled resource-limited wireless networks such as the Internet of Things (IoT), where the cost of computation and communication should be mitigated as much as possible since other functions including connectivity and privacy should be given the top priority. Thus, we present an IBBE scheme from the lattice, in which we employ the Chinese remainder theorem and lattice basis delegation in fixed dimensions to obtain several desirable characteristics, such as constant-size public parameter, private key, and ciphertext. In addition, our encryption and decryption algorithms are more efficient than broadcast encryption (BE) schemes based on number-theoretic problems. To be noticed, our scheme can simultaneously achieve confidentiality and outsider anonymity against the chosen-plaintext attack under the hardness of the learning with error (LWE) problem.


Sign in / Sign up

Export Citation Format

Share Document