CompSciRN: Internet of Things (Topic)最新文献

筛选
英文 中文
IOT Based Smart Gas Leakage Detection and Alert System 基于物联网的智能气体泄漏检测和警报系统
CompSciRN: Internet of Things (Topic) Pub Date : 2021-05-07 DOI: 10.2139/ssrn.3866873
Sejal Shah, Aakash Parashar, Chanchal Rai, Sagar Pokhariyal
{"title":"IOT Based Smart Gas Leakage Detection and Alert System","authors":"Sejal Shah, Aakash Parashar, Chanchal Rai, Sagar Pokhariyal","doi":"10.2139/ssrn.3866873","DOIUrl":"https://doi.org/10.2139/ssrn.3866873","url":null,"abstract":"There are much uses of fuels, gases, etc. in our day-to-day life such as in households, industries, etc. But it can cause vital issues if not used carefully. It was the only cause of many accidents in the past. The purpose of this project is to detect a gas leak and prevent the accident and blocking of gas leaks in vulnerable areas. This includes the MQ6 gas sensor which is used to detect gas leakage in home and industry and is also very much suitable for detecting LPG, i-butane, Hydrogen, Methane, Smoke and Alcohol, etc. But it does not indicate the exact gas concentration. It only illustrates the trend of gas concentration in a suitable error range. This device automatically takes precautions. And even turns off main supply in some time to avoid accidents. And also include the WiFi module to take necessary action immediately by sending an alert SMS to the owner.","PeriodicalId":228679,"journal":{"name":"CompSciRN: Internet of Things (Topic)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132037957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Intelligent IoT Framework for the Identification of Nutrition Value in Crops Using Convolutional Neural Networks 利用卷积神经网络识别作物营养价值的智能物联网框架
CompSciRN: Internet of Things (Topic) Pub Date : 2020-11-23 DOI: 10.2139/ssrn.3735738
Sathyavani R, Dr.JaganMohan K., Dr.Kalaavathi B.
{"title":"An Intelligent IoT Framework for the Identification of Nutrition Value in Crops Using Convolutional Neural Networks","authors":"Sathyavani R, Dr.JaganMohan K., Dr.Kalaavathi B.","doi":"10.2139/ssrn.3735738","DOIUrl":"https://doi.org/10.2139/ssrn.3735738","url":null,"abstract":"Consumption of a balanced diet that meets all the nutritional requirements is very important especially at all stages of human life. Insufficiency in meeting these body requirements lead to serious illnesses and organ collapse leading to significant health conditions in adulthood. In this context, early assessment of nutrition content in crops leads to educate the consumers to make healthy food. To address the challenge, this study develops a self-assessing nutrition monitoring system based on the new Internet of Things (IoT) to enhance agricultural yield. The artificial intelligence assessment of the crops to monitor its nutritional content is important to ensure healthy and complete growth. The objective of this study is to design a self- an automized system that will detect the nutritional deficiencies in crops by scanning the images of leaves of the crops. Convolutional neural networks (CNN) are used to further process the images. This technique compares the captured image with the readily available dataset. Results of the deficiency are obtained when the captured image partially or completely matches with the already present data set images. The result is shown in the form of percentage values. This approach will be highly beneficial to farmers by ensuring crop productivity and decreased labor. Simulation results report that the proposed system is highly beneficial when compared to the existing monitoring systems.","PeriodicalId":228679,"journal":{"name":"CompSciRN: Internet of Things (Topic)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133859314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Approach for Getting Better Bandwidth in Wireless Mobile Computing 在无线移动计算中获得更好带宽的新方法
CompSciRN: Internet of Things (Topic) Pub Date : 2020-07-01 DOI: 10.21276/ijircst.2020.8.4.4
A. Chakraborty, Bhupinder Kaur, Ruchika
{"title":"New Approach for Getting Better Bandwidth in Wireless Mobile Computing","authors":"A. Chakraborty, Bhupinder Kaur, Ruchika","doi":"10.21276/ijircst.2020.8.4.4","DOIUrl":"https://doi.org/10.21276/ijircst.2020.8.4.4","url":null,"abstract":"Wireless mobile computing is type of computation by which various mobile gadgets gives services to us at numerous ways. In wireless computing of mobile one can find the working of sensors ad hoc networks odysseys and rover etc. Not only has this wireless based mobile computing service also suggested that a user can take the services of networks any time anywhere without any disturbances. This includes the physical location time place authentication etc. which paves way for making mobile services successful. The research paper also describes about merits and disadvantages of wireless mobile computing along with many challenges faced by it in remote areas. Additionally, this paper also states how we get adapted to the ecosystem of wireless network from the long process of wired networks. Mobile agent is one of the most important elements in computing. It is clearly described in this research paper. This research paper also throws ample amount of light on the working of sensors and its unique features. Wireless computing makes our life totally comfortable by its outstanding services. Here all useful services of that are clearly mentioned. At last the conducting of wireless mobile computing in all areas of the world is much more important for the welfare of future generations. This research paper describes about the steps with measures needed in implementing wireless computing everywhere.<br> <br>","PeriodicalId":228679,"journal":{"name":"CompSciRN: Internet of Things (Topic)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129398969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transparency and Consent in Data-Driven Smart Environments 数据驱动的智能环境中的透明度和同意
CompSciRN: Internet of Things (Topic) Pub Date : 2020-01-24 DOI: 10.2139/ssrn.3597736
Christof Koolen
{"title":"Transparency and Consent in Data-Driven Smart Environments","authors":"Christof Koolen","doi":"10.2139/ssrn.3597736","DOIUrl":"https://doi.org/10.2139/ssrn.3597736","url":null,"abstract":"The Internet of Things (IoT) has come to be an umbrella term for internet-connected devices with sensory capabilities. These IoT appliances – often referred to as smart devices – take an increasingly prominent role in consumers’ daily lives. Connected security systems, remotely controllable lighting, smart wearables, thermostats, refrigerators and even voice-controlled assistants… Together, they form an invisible network of information aggregators, capable of capturing data from the physical world and communicating about this information via the internet. On the one hand, smart devices undeniably offer practical advantages and useful insights to their users. On the other hand, however, they also provide the means to compose a detailed account of consumers’ behavioral patterns. Combined with big data analytics, it all of a sudden becomes possible to not only anticipate consumers’ purchasing preferences, but also to deduce information about their private lifestyles and even map out certain personality traits. \u0000 \u0000The pervasiveness of smart devices poses challenges that are particularly worrisome from a privacy and data protection perspective. Faced with consumers’ concerns regarding the protection and sharing of their personal data, this paper sheds light on the preservation of privacy in smart environments. Transparency and consent form the core concepts of this research. In this respect, notable emphasis goes to (i) awareness surrounding data collection practices and (ii) the implementation of consent mechanisms. \u0000 \u0000The contribution features a two-step approach in view of balancing entrepreneurs’ thirst for data against consumers’ desire for privacy. Firstly, it is necessary to arrive at a solid understanding of the functioning of smart devices, in order to get a good grasp on how the selected transparency concerns manifest themselves in an IoT context. Along this route, attention is given to the occurrence of “low-quality consent” among consumers. Secondly, the paper argues that, notwithstanding consent, the integration of privacy enhancing technologies such as obfuscation and data minimization is necessary in view of ex ante containing the potential ramifications of data leakages. In that respect, the question is raised to what extent a technical rather than a legal responsibility exists to attain adequate levels of privacy and data protection. In conclusion, this paper submits that smart environments are indeed putting strain on the existing regulatory framework. Yet, in all likelihood, the much sought-after solutions to transparency and consent will largely be technological in nature and sprout from industry-driven efforts.","PeriodicalId":228679,"journal":{"name":"CompSciRN: Internet of Things (Topic)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134321060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Elicitation and Specification of the Requirements for an Internet of Things (IoT) System 物联网(IoT)系统需求的激发和规范评估
CompSciRN: Internet of Things (Topic) Pub Date : 2020-01-13 DOI: 10.2139/ssrn.3518226
M. Rao, N. kamila, N. Adhikari
{"title":"Evaluation of Elicitation and Specification of the Requirements for an Internet of Things (IoT) System","authors":"M. Rao, N. kamila, N. Adhikari","doi":"10.2139/ssrn.3518226","DOIUrl":"https://doi.org/10.2139/ssrn.3518226","url":null,"abstract":"One of the key features of Internet of Things (IoT) systems is self-adaptation. Modelling such systems efficiently requires minimizing the gap between system requirements and user requirements. Here an IoT System for Harbour Surveillance and Ferry Monitoring is considered as a case study. Modelling its behaviour and purpose is very essential before designing and deploying the system. Some of the modelling approaches such as AODB and Bigraphs are presented and explored here to evaluate how well they depict the aspects of the system. The mental model is designed to identify the functional interfaces of the Harbour Surveillance and Ferry Monitoring case study.","PeriodicalId":228679,"journal":{"name":"CompSciRN: Internet of Things (Topic)","volume":"411 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120846106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Based Women Safety Device Without Human Intervention 基于物联网的女性安全设备,无需人为干预
CompSciRN: Internet of Things (Topic) Pub Date : 2020-01-10 DOI: 10.2139/ssrn.3517216
Dwaipayan Saha, Indranil Mukherjee, Jesmin Roy, Sumanta Chatterjee
{"title":"IoT Based Women Safety Device Without Human Intervention","authors":"Dwaipayan Saha, Indranil Mukherjee, Jesmin Roy, Sumanta Chatterjee","doi":"10.2139/ssrn.3517216","DOIUrl":"https://doi.org/10.2139/ssrn.3517216","url":null,"abstract":"There is a common notion that “Men and Women are equal” but in reality, it is quite contradictory in nature. Even though we are living in the 21st century and technologies are getting advanced at a sharper rate but still girls and women are not safe. Women safety is a very important issue due to higher crime rate. This paper deals with a smart safety device for women so that they can use it when they feel they are in trouble. This safety device is unique as it serves a dual-purpose alert as it will activate the system when she feels that she might be in trouble and secondly when she is trouble. The main feature of this device is that here we are using IOT instead of panic button so that it can be used in panic condition also. This feature makes it super easy to use.","PeriodicalId":228679,"journal":{"name":"CompSciRN: Internet of Things (Topic)","volume":"41 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114039448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Disaster Recovery Plan for Business Continuity: Case Study in a Business Sector 业务连续性的灾难恢复计划:业务部门的案例研究
CompSciRN: Internet of Things (Topic) Pub Date : 2016-06-16 DOI: 10.2139/ssrn.2796601
Jacob Joseph Kassema
{"title":"Disaster Recovery Plan for Business Continuity: Case Study in a Business Sector","authors":"Jacob Joseph Kassema","doi":"10.2139/ssrn.2796601","DOIUrl":"https://doi.org/10.2139/ssrn.2796601","url":null,"abstract":"An information technology (IT) disaster recovery (DR) plan provides a structured approach for responding to unplanned incidents that threaten an IT infrastructure, which includes hardware, software, networks, processes and people. Protecting your organization's investment in its technology infrastructure, and protecting your organization’s ability to conduct business are the key reasons for implementing an IT disaster recovery plan. \u0000 \u0000As IT systems have become increasingly critical to the smooth operation of a company, and arguably the economy as a whole, the importance of ensuring the continued operation of those systems, and their rapid recovery, has increased. This study found that, most of the companies that had a major loss of business data, 43% never reopen and 29% closed within two years. \u0000 \u0000As a result, preparation for continuation or recovery of systems needs to be taken very seriously. This involves a significant investment of time and money with the aim of ensuring minimal losses in the event of a disruptive event. That is why this study concluded that, it is important to make sure that all the production and business operation systems are properly backed up with an appropriate technology for easy and quick recovery for business continuity in case of any disruption may occur.","PeriodicalId":228679,"journal":{"name":"CompSciRN: Internet of Things (Topic)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127908723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparison Between Energy Efficient Cooperative MIMO and Cooperative Relay in Energy Constrained WSN 能量约束WSN中高效协同MIMO与协同中继的比较
CompSciRN: Internet of Things (Topic) Pub Date : 2016-04-27 DOI: 10.5121/jant.2016.2202
M. Sharma
{"title":"Comparison Between Energy Efficient Cooperative MIMO and Cooperative Relay in Energy Constrained WSN","authors":"M. Sharma","doi":"10.5121/jant.2016.2202","DOIUrl":"https://doi.org/10.5121/jant.2016.2202","url":null,"abstract":"Wireless sensor network consists of thousand number of sensor nodes employed in a wide range of data gathering application such as environmental gathering, military applications etc. Each sensor node in WSN are powered by battery having limited energy so it is very difficult to replace there batteries for prolonged the network life time. Maximizing the network lifetime have been most important design goal for the network. In WSN channel fading and radio interference constitute a big dispute in design of energy efficient communication protocol. To reduce fading and energy consumption in WSN, MIMO MISO SISO scheme is employed but implement multiple antenna technology to sensor network is improbable because of the sensor node generally support a single antenna. Cooperative scheme are utilized in WSN by applying the collective nature of the sensor nodes to provide reliable communication links in order to lower the total energy consumption. In this paper, the cooperative technique are inspected and by comparing different cooperative techniques we can elect the best cooperative scheme for energy constrained WS N application.","PeriodicalId":228679,"journal":{"name":"CompSciRN: Internet of Things (Topic)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123122746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Association Rules for Recommendations with Multiple Items 多项推荐的关联规则
CompSciRN: Internet of Things (Topic) Pub Date : 2014-03-06 DOI: 10.1287/ijoc.2013.0575
Abhijeet Ghoshal, S. Sarkar
{"title":"Association Rules for Recommendations with Multiple Items","authors":"Abhijeet Ghoshal, S. Sarkar","doi":"10.1287/ijoc.2013.0575","DOIUrl":"https://doi.org/10.1287/ijoc.2013.0575","url":null,"abstract":"In Web-based environments, a site has the ability to recommend multiple items to a customer in each interaction. Traditionally, rules used to make recommendations either have single items in their consequents or have conjunctions of items in their consequents. Such rules may be of limited use when the site wishes to maximize the likelihood of the customer being interested in at least one of the items recommended in each interaction (with a session comprising multiple interactions). Rules with disjunctions of items in their consequents and conjunctions of items in their antecedents are more appropriate for such environments. We refer to such rules as disjunctive consequent rules. We have developed a novel mining algorithm to obtain such rules. We identify several properties of disjunctive consequent rules that can be used to prune the search space when mining such rules. We demonstrate that the pruning techniques drastically reduce the proportion of disjunctive rules explored, with the pruning effectiveness increasing rapidly with an increase in the number of items to be recommended. We conduct experiments to compare the use of disjunctive rules with that of traditional (conjunctive) association rules on several real-world data sets and show that the accuracies of recommendations made using disjunctive consequent rules are significantly higher than those made using traditional association rules. We also compare the disjunctive consequent rules approach with two other state-of-the-art recommendation approaches---collaborative filtering and matrix factorization. Its performance is generally superior to both these techniques on two transactional data sets. The relative performance on a very sparse click-stream data set is mixed. Its performance is inferior to that of collaborative filtering and superior to that of matrix factorization for that data set.","PeriodicalId":228679,"journal":{"name":"CompSciRN: Internet of Things (Topic)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131440723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Silver Conductive Threads Based Textile Impedance Sensor for Moisture Volume Detection 基于银导电线的织物湿量检测阻抗传感器
CompSciRN: Internet of Things (Topic) Pub Date : 1900-01-01 DOI: 10.2139/ssrn.3943407
Saima Qureshi, Goran M. Stojanović, M. Simić, V. Jeoti, Najeebullah Lashari
{"title":"Silver Conductive Threads Based Textile Impedance Sensor for Moisture Volume Detection","authors":"Saima Qureshi, Goran M. Stojanović, M. Simić, V. Jeoti, Najeebullah Lashari","doi":"10.2139/ssrn.3943407","DOIUrl":"https://doi.org/10.2139/ssrn.3943407","url":null,"abstract":"Wearable sensors have become part of our daily life for health monitoring. The detection of moisture content is critical for physical and health monitoring applications. In the present research, an embroidered sensor has been fabricated for the detection of moisture content. The sensor is comprised of an interdigitated electrode embroidered on a cotton substrate with silver-tech 150 and HC 12 threads, respectively, which are silver coated continuous filament and 100 % polyamide with silver plated yarn. The moisture sensor's operation is verified by measuring its impedance between (1-10) MHz and the change in moisture level (1-50) µl. At 1MHz, the comparison of the impedance change of dry sensors shows that the impedance of HC 12 is 25.5 percent less than that of the silver-tech 150 sensor. Also, sensitivity for moisture sensing showed that the silver-tech 150 sensor has a sensitivity of 444Ω/µl, while the HC 12 sensor has a sensitivity of 456Ω/µl. The repeatability test shows the stability of the sensor after washing and the sensor has detected artificial sweat and blood serum for future application of theranostic wound dressing.","PeriodicalId":228679,"journal":{"name":"CompSciRN: Internet of Things (Topic)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121790757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信