A. Cloete, M. J. Booysen, R. Sandell, A. V. D. Merwe
{"title":"Smart electric water heaters: a system architecture proposal for scalable IoT","authors":"A. Cloete, M. J. Booysen, R. Sandell, A. V. D. Merwe","doi":"10.1145/3018896.3025168","DOIUrl":"https://doi.org/10.1145/3018896.3025168","url":null,"abstract":"Energy and water are scarce resources in South Africa, and the management thereof is receiving increased attention. One rare place where energy and water coincide is in water heaters, which consume over 30% of household energy in South Africa and collectively pass over 500 billion litres of water annually. These resource-hungry devices are not well managed and tend to be physically inaccessible and difficult to understand for users. The advent of wireless and cloud computing technology brought expectations of simple management of a multitude of devices and the so-called Internet of Things. A few solutions have been proposed for remote water heater management, but these are not scalable, and have not been benchmarked for scalability above tens of units. This paper proposes an end-to-end architecture to monitor and control EWHs based on MQTT, and specific emphasis is placed on the technologies suitable for large-scale cross-domain interoperability. The performance of the system with 10,000 connections and the results of a pilot deployment are presented.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122522645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Gomez, Jesus Talavera, L. Tobon, M. Culman, Luis Alfredo Quiroz, J. M. Aranda, Luis Ernesto Garreta
{"title":"A case study on monitoring and geolocation of noise in urban environments using the internet of things","authors":"J. Gomez, Jesus Talavera, L. Tobon, M. Culman, Luis Alfredo Quiroz, J. M. Aranda, Luis Ernesto Garreta","doi":"10.1145/3018896.3056794","DOIUrl":"https://doi.org/10.1145/3018896.3056794","url":null,"abstract":"This paper presents the development of a system to monitor and geo-reference noise in urban environments using the Internet-of-Things (IoT). The system intends to help control agencies and citizens to monitor noise using smart devices and services available on the Cloud for data sharing. The system includes a mobile application that periodically captures the microphone's audio signal during a configurable time window, obtains the mobile's global position after each measurement using the built-in GPS, and assigns a times-tamp from the operating system. Then, a Fast Fourier Transform is applied to recorded audio and the power spectrum in decibels is extracted. The resulting vector is sampled at specific frequencies to create a vector of audio features that can be used to assess noise pollution completely offline. If an Internet connection is available, a telemetry message is assembled and sent to an IoT Hub in Microsoft Azure Cloud containing a unique ID, a position stamp, a time stamp, and all audio features. The message is transferred to a Stream Analytics service, and from there it is sent to a Cloud SQL Database for permanent storage. The historical information collected and shared by different users can be examined online by any individual through a customized report developed in Microsoft Power BI.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127313705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security of wireless sensor network (WSN) in smart grid","authors":"B. Alohali, V. Vassilakis","doi":"10.1145/3018896.3056789","DOIUrl":"https://doi.org/10.1145/3018896.3056789","url":null,"abstract":"A smart grid is a well-thought-out smart network of meta-systems and subsystems that aims at improving the efficiency the traditional power grid and at ensuring reliable energy delivery. To achieve its goals, a smart grid requires a two-way communication between the utility provider and the end user. One way to achive that is by incorporating the wireless sensor network (WSN) technology into smart grids. A WSN-based smart grid network can bridges virtual and the physical worlds by exploiting the sensing and computing capabilities of smart meters. In particular, a WSN based smart grid comprises numerous small sensing nodes that can sense, read variables from their ambiance, and wirelessly report the readings to each other. Because of cost constraints and miniaturization requirements, these nodes have limitations in terms of available power and computational resources. The resulting resource scarcity imposes new challenges in terms of network and data security, that need to be thoroughly addressed. Hence, the purpose of this paper is to present the current security challenges and attack vectors on WSNs in smart grids and to analyze the existing security solutions.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127341225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Local anchor based architecture for mobility support in identificator locator split networks","authors":"Eric Mayeul O. Fafolahan, S. Pierre","doi":"10.1145/3018896.3018955","DOIUrl":"https://doi.org/10.1145/3018896.3018955","url":null,"abstract":"Although wireless networks have experienced tremendous improvements, mobility management remains an issue in a context of massive deployment of small cells, especially in the context of Internet of things and future 5G networks. In this paper, using the Identificator and locator Split concept, we propose a local anchor based network architecture for mobility support in dense small cells networks, where the local domain is partitioned into several location service areas (LSA). We developed a mathematical framework to analyse the performance of the proposed scheme and Markov models are used to obtain the close form expression of the intra-LSA and inter-LSA handover parameters. Numerical results show that the proposed scheme achieve up to 38% and 21% of signaling cost saving per mobile node for the intra-LSA and inter-LSA handovers respectively (K=3), compared to the existing LISP-MN protocol.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130658798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Basingab, L. Rabelo, Khalid Nagadi, Christopher Rose, Edgar Gutiérrez, Won II Jung
{"title":"Business modeling based on internet of things: a case study of predictive maintenance software using ABS model","authors":"M. Basingab, L. Rabelo, Khalid Nagadi, Christopher Rose, Edgar Gutiérrez, Won II Jung","doi":"10.1145/3018896.3018905","DOIUrl":"https://doi.org/10.1145/3018896.3018905","url":null,"abstract":"The Internet of Things (IoT) from a computational viewpoint is the evolution and convergence of High Throughput Computing (HTC) and High-Performance Computing (HPC) with other developments such as grid computing and peer-to-peer (P2P) networks. IoT is a vision of an integrated network covering physical objects that are able to collect and exchange data. It allows previously unconnected devices and appliances to become connected through equipping devices with communication technology such as sensors and radio frequency identification tags (RFID). This paper introduces a study of business modeling of IoT using agent-based simulations in order to determine its adoption and life cycle. The paradigm of agent-based simulation is utilized to verify the effectiveness of the business model and simulate the behavior of the market. We concentrate in a predictive maintenance business model that uses IoT as the core of the business. The physical components of the systems are connected to sensors and RFID tags to collect data that is stored in a cloud-based system. The simulated time includes two years in order to see the potential of this business model and its feasibility.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116694941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Rehman, Iqbal Uddin Khan, S. M. K. Alam, Ahmar Murtaza
{"title":"Bio-inspired energy harvesting in WSN: a survey","authors":"A. Rehman, Iqbal Uddin Khan, S. M. K. Alam, Ahmar Murtaza","doi":"10.1145/3018896.3036388","DOIUrl":"https://doi.org/10.1145/3018896.3036388","url":null,"abstract":"The world is getting smarter with the use of computing technologies. Many of the domains are now based on intelligent solutions and taking their own decisions as per the requirement. For intelligent decision, real-time data gathering is the core requirement and that is only possible with the use of sensors. To keep up the sensors alive for longer period of time, there is a need of recharging of batteries. For that purpose, many of the methodologies are in practice that includes use of alternate energy resources, Energy harvesting etc. Energy harvesting is the process of capturing small amounts of energy from one or more of naturally occurring energy sources also known as ambient energy sources, collecting and storing such energy for later use. Energy harvesting in WSN refers to the collecting and storing energy from ambient energy sources through WSN hardware components which include energy harvesting devices and/or batteries. In this paper the issues and challenges regarding power management in wireless sensor nodes and energy harvesting are detailed and also the available solutions in literature are presented.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132777332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Martin J. Kleinelanghorst, Li Zhou, Janusz J. Sikorski, Y. Foo, K. Aditya, S. Mosbach, I. Karimi, Raymond Lau, M. Kraft
{"title":"J-park simulator: roadmap to smart eco-industrial parks","authors":"Martin J. Kleinelanghorst, Li Zhou, Janusz J. Sikorski, Y. Foo, K. Aditya, S. Mosbach, I. Karimi, Raymond Lau, M. Kraft","doi":"10.1145/3018896.3025155","DOIUrl":"https://doi.org/10.1145/3018896.3025155","url":null,"abstract":"This paper presents the J-Park Simulator (JPS), a virtualisation of an Eco-Industrial Park (EIP). The JPS combines concepts of machine-to-machine (M2M) communication inspired by the Semantic Web and Industry 4.0, and advanced mathematical modelling to create a modelling platform for designing, computer-aided process engineering (CAPE) and managing an EIP. The overall aim is to reduce carbon footprint and maximise resource efficiency by taking advantage of symbiotic inter-company exchanges of material and energy. The paper outlines system architecture, supporting infrastructure, and its components such as database, data processing, data editing and visualisation, and system modelling tools. A cross-domain ontology is used to represent the wealth and complexity of data at multiple levels and across domains united in a shared data and information hub that provides real-time situational awareness of industrial processes. Networks of fast-to-evaluate surrogate models are employed to conduct real time simulations that quantify CO2 emission reduction using, for example, waste heat recovery (WHR), and carry out cross-domain simulations both at steady-state and in transient operation. The cross-domain ontology is furthermore used to answer semantic queries. The approach and some of the benefits of this platform are demonstrated in several case studies. We find that there is significant scope to realise as yet unexploited potential for energy savings.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"20 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131985960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Overview and reflexion on OWL 2 DL ontology consistency rules","authors":"Leila Bayoudhi, Najla Sassi, W. Jaziri","doi":"10.1145/3018896.3036376","DOIUrl":"https://doi.org/10.1145/3018896.3036376","url":null,"abstract":"Domain knowledge capture has always been a major interest for both humans and computer systems. Thus, semantic formalisms, such as ontologies, become necessary to hold, share and understand that knowledge. As the world is continually changing, ontology must be updated accordingly. However, ontology changes should never affect its consistency as ontology needs to remain in a consistent state along its lifecycle. To this end, ontology consistency rules are defined and used to check not only logical inconsistencies but also syntactical invalidities and style issues. They are adopted from a posteriori approaches and adapted to enable an a priori detection/fixing of ontology inconsistencies. This paper discusses ontology inconsistency issues and describes the different consistency rules adopted from the literature. Then, it proves their useful adaptation for an a priori inconsistency detection and fixing.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124436401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using UTAUT2 for cloud computing technology acceptance modeling","authors":"Fotios Nikolopoulos, S. Likothanassis","doi":"10.1145/3018896.3025153","DOIUrl":"https://doi.org/10.1145/3018896.3025153","url":null,"abstract":"In this work, we examine the technology acceptance of cloud computing by using the second iteration of the unified theory of acceptance and use of technology, from now on referred to as UTAUT2. UTAUT is a well established methodology widely used for the acceptance of technology. Empirical data was analyzed from 132 Cloud developers, Cloud users, IT professionals and managers using factor analysis. The results indicate that user acceptance of cloud computing can be explained and predicted by variables concerning performance expectancy, effort expectancy, social influence, habit, Price/Value, facilitating conditions, hedonic motivation and behavioral intention. These results further advance the theory and add to the bases for further research targeted at enhancing our knowledge of technology adoption for cloud computing. They also provide a first base for companies and governments on how to adopt and successfully integrate cloud technologies.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116669132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A proposed onto-Apriori algorithm to mine frequent patterns of high quality seafood","authors":"Sherimon Puliprathu Cherian, Vinu Sherimon","doi":"10.1145/3018896.3056786","DOIUrl":"https://doi.org/10.1145/3018896.3056786","url":null,"abstract":"Apriori algorithm is a classic data mining algorithm used to generate association rules. This paper proposes onto-Apriori algorithm to generate rules from the ontology data, which is used to determine frequent patterns of quality seafood. In the proposed algorithm, a vertical data layout is used and the generation of candidate set in every step is avoided. The seafood data is represented in ontology and the algorithm is used to mine the ontological data. The proposed algorithm eliminate the costly candidate generation. The dataset obtained from a seafood organization is used to test our approach. The performance of the proposed onto-Apriori algorithm is compared with the existing Apriori algorithm. The results show that the number of transactions required in generating the support count and the candidate items are less when onto-Apriori algorithm is used. The number of times required to check the data to generate candidate 1 item sets is same for both the approaches. Later in onto-Apriori algorithm frequent 1 item set is used as a reference to generate the subsequent candidate item sets. The association rules and patterns obtained by the proposed algorithm are effectively used to discover unknown relationships among seafood.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116742779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}