Science topic

Internet of Things - Science topic

The Internet of Things (IOT) is a network of Internet-enabled objects, together with web services that interact with these objects. Underlying the Internet of Things are sensor technologies such as RFID, sensors, and smartphones.
Questions related to Internet of Things
  • asked a question related to Internet of Things
Question
1 answer
Call for Papers 
CMC-Computers, Materials & Continua new special issue“Practical Application and Services in Fog/Edge Computing System”is open for submission now.
📆 Submission Deadline:  31 December 2024
👨‍🎓 Guest Editors
Prof. Hwa-Young Jeong, Kyung Hee University, South Korea
Prof. Neil Y. Yen, University of Aizu, Japan
Prof. Jason C. Hung, Taichung University of Science and Technology, Taiwan
📝 The main topics of this special issue are state-of-the-art technologies and research for practical use or application in the field of fog/edge computing with IoT. Real cases and technical studies in various fields are recruited with fog/edge computing technology, and research cases applied to fog/edge computing with artificial intelligence/deep learning are recruited.
📚 For submission guidelines and details, visit:  https://www.techscience.com/cmc/special_detail/fog_edge-computing
Keywords
  • Advanced Edge computing and analytics using big data
  • Application and service of edge computing and security
  • Practical service of Edge-as-a-Service (EaaS), Fog as a Service (FaaS)
  • Distributed computation with 6G networks and edge computing
  • Fog and edge computing technique and service for smart city
  • High performance Storage as a service in Fog computing
  • Practical Infrastructure as a Service (IaaS) in Fog/Edge computing
  • Advanced Fog architecture using IoT sensing technique and service
  • Practical IoT application and service with fog/edge computing
  • Improved IoT-Fog-Cloud Architecture using Big-Data analytics
  • Optimization of IoT-Fog Network Path
  • The use of IoT based education application with fog/edge computing
  • Advanced life change using IoT with fog/edge computing
  • The development of deep learning models for cloud, edge, fog, and IoT computing
  • The design and development of Cloud, fog and edge computing platforms
  • The development and use of AI-based fog and edge computing
  • The use of smart healthcare with fog/edge computing
  • 6G network application and service with devices in IoT with fog/edge computing
  • Processing and analysis of IoT based drone computation offloading with fog/edge computing
Relevant answer
Answer
Respected Editors,
Is there any charges for the accepted article
  • asked a question related to Internet of Things
Question
2 answers
I have been by my institute to publish a research paper. As I have an ECE background, I am thinking to work on IoT. So please help me in choosing my topic and how to analyze other papers in order to publish my own.
Relevant answer
Answer
Hello,
This is a very good question for Research work. I will suggest you an approach, To choose and analyze research papers for publishing your own in IoT (Internet Of Things):
  1. Find a Trending Topic: Look into areas like smart cities, healthcare monitoring, or energy management.
  2. Search Recent Papers: Use databases like IEEE Xplore , Google Scholar, Science Direct to find recent studies on these topics.
  3. Read and Analyze: Focus on the latest papers, understand their methods, findings, and what questions remain.
  4. Identify a Research Gap: Look for less explored areas within these topics to base your research on.
  5. Develop Your Paper: Formulate a question or hypothesis based on gaps you’ve identified.
I hope this approach will help you to start the work.
Thank You,
Vaibhav
  • asked a question related to Internet of Things
Question
3 answers
Most farmers of developing nations are self learned. they have limited knowledge on ICT & precision agriculture. will it be an obstacle to adopt IoT monitored Alternate Wetting and Drying (AWD) rice irrigation system? can anyone share practical information on this topics with references?
Relevant answer
Answer
Dear Mohammad Mominul Hoque,
to clarify this issue, see this information source:
Warren Purcell,Thomas Neubauer: "Digital Twins in Agriculture: A State-of-the-art review"; Smart Agricultural Technology, Volume 3, February 2023
Look here: 4. Applications and use-cases
For general information about DTs see:
Best regards
Anatol Badach
  • asked a question related to Internet of Things
Question
3 answers
I am researcher doing my research related to this topic, This paper is published in 2021 IEEE conference proceedings, if any one have this paper - Kindly share this paper and help me for my research
Relevant answer
Answer
With the development of the Internet of things (IoT), many tasks are automated. The system aims to make the daily tasks of humans in the kitchen easier. This system provides IoT-based Smart Pantry level monitoring using the Internet of things. The containers are fitted with sensors. These are used to gather data about the stock level of items in the container. This data is collected and stored in the cloud.
Regards,
Shafagat
  • asked a question related to Internet of Things
Question
1 answer
IoT, Flooded irrigation, rice cultivation, water saving technology, 4IR
Relevant answer
Answer
Automating irrigation in Alternate Wetting and Drying (AWD) rice could indeed be economically feasible for producers. The working hypothesis, based on preliminary research, suggests that integrating automated, IoT-irrigation technologies into an AWD rice production system can lead to several benefits:
  1. Water Use Reduction: By automating irrigation based on real-time data, water application can be optimized. This decrease in water use may offset the costs of additional technologies.
  2. Yield Improvement: Properly managed irrigation can enhance rice grain yield and seed quality.
  3. Economic Viability: The net returns from rice production may be positively impacted due to improved water management and yield.
The goal is to create productive and profitable low-water-use, row-crop production systems that producers will adopt. Extension programs can be crucial in increasing awareness among the farmers about AWD rice production systems and addressing concerns related to this novel conservation practice.
Further, IoT-based monitoring can provide valuable insights into water requirements, making it easier for farmers to care for their rice fields and reduce irrigation-related problems.
Overall, the integration of IoT technologies holds promise for enhancing rice farming efficiency and sustainability.
  • asked a question related to Internet of Things
Question
3 answers
The future of wearable technologies is likely to see several innovative advancements that can enhance their functionality, usability, and impact on various aspects of our lives.
For Example:
Humane officially launches the AI Pin, its OpenAI-powered wearable
The Ai Pin, as the device is called, is designed to be worn on clothing and can be tapped to talk to a virtual assistant powered by technologies from ChatGPT-creator OpenAI and cloud computing power from Microsoft (MSFT.O). It uses a laser projection system to display text and monochromatic images on a user's hand.
Learn more about Ai Pin: https://lnkd.in/dhvR4h4p
Relevant answer
Answer
Although this is more of a technical aspect of wearable devices, I think the increasing easy of use of e-textiles will unlock many new form-factors (smart clothes). The scalable production of these devices is feasible and they can benefit from detachable connectors, making them practical to use.
Actually, many researchers have been using off-the-shelf snap fasteners to achieve rigid-flexible connectivity in smart textiles. They are cheap, easy to implement, and already used in regular clothing.
I have validated the use of such fasteners in wearable devices, and look forward to see more researchers using them as well. In case you are interested in this study, here’s the paper I published recently: https://rdcu.be/dEuxG
  • asked a question related to Internet of Things
Question
2 answers
What does mean the (EC-GSM-IoT, LTE-M (LTE for machines) and NB-IoT (Narrowband IoT) In CIOTs( Cellular Internet of Things)?
Relevant answer
Answer
EC-GSM-IoT- Extended Coverage GSM IoT- it is an extension of the GSM (Global System for Mobile Communications) standard, specifically designed to provide extended coverage for IoT devices.
LTE-M (LTE for machines) - Low-power wide-area (LPWA) cellular technology operates on LTE networks and infrastructure to provide better coverage and lower latency for IoT devices.
NB-IoT (Narrowband IoT) - another LPWA cellular technology which operates in the narrowband spectrum, enabling efficient use of resources and allowing a number of devices to connect simultaneously.
These technologies are designed to meet the diverse requirements of IoT applications, offering different combinations of coverage, power consumption, data rates, and cost-effectiveness.
Depending on the specific needs of an IoT deployment, one of these technologies may be more suitable than the others.
I hope this is helpful
  • asked a question related to Internet of Things
Question
5 answers
2024 IEEE 6th International Conference on Internet of Things, Automation and Artificial Intelligence(IoTAAI 2024) will be held in Guangzhou, China from July 26 to 28, 2024.
Conference Webise: https://ais.cn/u/InumA3
The conference aims to provide a large platform for researchers in the field of modern machinery manufacturing and materials engineering to communicate and provide the participants with the most cutting-edge scientific and technological information. The conference invites experts and scholars from universities and research institutions, business people and other related personnel from home and abroad to attend and exchange ideas.
---Call For Papers---
The topics of interest for submission include, but are not limited to:
1. Internet of Things
IoT Electronics
IoT Enabling Technologies
IoT Networks
IoT Applications
IoT Architecture
......
2. Automation
Electrical Automation
Circuits and Systems
Control Engineering
Robotics and Automation Systems
Automatic control and Information Technology
......
3. Artificial Intelligence
Intelligent Systems
Intelligent Optimized Design
Virtual Manufacturing and Network Manufacturing
System Optimization
......
All accepted full papers will be published and submitted for inclusion into IEEE Xplore subject to meeting IEEE Xplore's scope and quality requirements, and also submitted to EI Compendex and Scopus for indexing.
Important Dates:
Full Paper Submission Date: May 11, 2024
Registration Deadline: July 24, 2024
Final Paper Submission Date: July 22, 2024
Conference Dates: July 26-28, 2024
For More Details please visit:
Invitation code: AISCONF
*Using the invitation code on submission system/registration can get priority review and feedback
Relevant answer
Answer
Thanks
  • asked a question related to Internet of Things
Question
4 answers
I would like to develop an automation that would notify firefighters after some fire confirmation tests.
Relevant answer
Answer
Dear Wilker Rodrigues Zamboni Pereira,
the IoT application protocol CoAP would be well suited for their purposes.
My sources of information about CoAP may be able to help you.
Best regards
Anatol Badach
Figure 009406: Multilayer protocol architecture of devices in the IoT Figure 009408: IoT Access Gateways - structure and functions
Figure 009409: Importance of HTTP-to-CoAP Proxying when connecting Smart Homes to the Internet
Figures 10, 12, 13 and 14
  • asked a question related to Internet of Things
Question
2 answers
Considering their resource-constrained nature and the need for real-time response.
Relevant answer
Answer
Here are some novel techniques that can be employed:
Behavioral Analysis and Anomaly Detection: Utilize machine learning algorithms and anomaly detection techniques to analyze the behavior of IoT devices. For reference see the following papers.
Traffic Classification and Filtering: Employ deep packet inspection (DPI) techniques to classify incoming traffic based on its characteristics, such as source, destination, payload, and protocol. for reference
Collaborative Defense Mechanisms: Establish collaborative defense mechanisms among IoT devices, gateways, and cloud-based services to share threat intelligence and coordinate response efforts. For reference
  • asked a question related to Internet of Things
Question
2 answers
I am gatheering data for this question for case study and research paper.
Relevant answer
Answer
Dear,
Anatol Badach,
Thank you for sharing these valuable resources on Digital Twins (DTs) in construction. I'll explore them to deepen my understanding and integrate their insights into my research on IoT and Big Data Fusion in Construction MIS. DTs hold great promise for revolutionizing construction practices, enhancing efficiency, safety, and sustainability.
Best regards,
Mithun Kokare.
  • asked a question related to Internet of Things
Question
3 answers
How IoT devices are vulnerable and how it posses threats to user data privacy.
Relevant answer
Answer
IoT Device Vulnerabilities: The Core Weaknesses
IoT devices are inherently vulnerable due to weak security measures, lack of encryption, and insecure default settings, making them easy target iot devices for cyberattacks. Cyber criminals are constantly seeking ways to exploit iot vulnerabilities and gain access to sensitive data, potentially affecting multiple devices connected to both home and corporate networks.
Weak Security Measures
Weak security measures in IoT devices increase the risk of cyberattacks and data breaches. Attackers use a range of techniques to compromise IoT devices, however one of the most popular methods is exploiting weak or hardcoded passwords. Neglecting security measures can leave your device vulnerable to attack. Insecure or outdated components in IoT devices can also increase an organization’s attack surface, making it more susceptible to malicious actors gaining access to the device.
Cyberattacks targeting IoT devices include:
  • Data theft
  • Phishing attacks
  • Spoofing
  • Denial of Service (DoS) attacks
  • Brute force attacks
For securing IoT devices, manufacturers and users need to give priority to security measures and proactively address known vulnerabilities. This includes implementing strong authentication mechanisms, ensuring regular software and firmware updates, and utilizing encryption to protect sensitive data.
  • asked a question related to Internet of Things
Question
3 answers
"In what ways might the integration of IoT confront apprehensions surrounding data confidentiality and security, specifically concerning the acquisition, retention, and conveyance of confidential data?"
Relevant answer
Answer
I will try my best to answer it in terms of Governance, Product organization, or the person tasked with integration, their or his/her commitment in terms of policies and procedures might help showcase their seriousness towards protecting the confidential data of their customers. Compliance with Industry standards and regulations is another step towards trust and faith.
Independent attestations are a piece of excellent evidence.
In terms of technical controls and security, various alternatives can be looked at, starting with access management, data anonymization, encryption, and control/data plane segregation, to name a few.
  • asked a question related to Internet of Things
Question
1 answer
We cordially invite you to contribute a book chapter for our edited book entitled "Machine Learning for Drone-Enabled IoT Networks: Opportunities, Developments, and Trends", which will be published by Springer Nature publishers in the Advances in Science, Technology & Innovation series (Scopus indexed). There is no publication fee. This edited book aims to explore the latest developments, challenges, and opportunities in the application of machine learning techniques to enhance the performance and efficiency of IoT networks assisted by aerial unmanned vehicles (UAVs), commonly known as drones.
Relevant answer
Answer
I am honored to accept your invitation to contribute a chapter to this prestigious publication. The opportunity to share insights and contribute to the exploration of machine learning techniques in enhancing the performance and efficiency of IoT networks with the assistance of unmanned aerial vehicles (UAVs) aligns perfectly with my research interests and expertise.
I am excited to delve into the latest developments, challenges, and opportunities in this emerging field and to contribute to the collective knowledge base through my chapter. I am confident that this collaboration will yield valuable insights and contribute to the advancement of knowledge in the intersection of machine learning and drone-enabled IoT networks.
  • asked a question related to Internet of Things
Question
5 answers
IoT industry analysis & difference.
Relevant answer
Answer
Dear Romesha Haroon,
the term Industry 4.0 stands for the integration of automation and data exchange in the industrial sector. The use of Artificial Intelligence (AI) in this area and the collaboration between people and intelligent machines when using AI leads to the term Industry 5.0.
However, this does not mean that the introduction of Industry 5.0 will completely replace Industry 4.0. In the future, Industry 5.0 will expand the strengths of Industry 4.0 and make industry even more intelligent.
Best regards
Anatol Badach
  • asked a question related to Internet of Things
Question
2 answers
In which journals can a blueprint paper be published?
I have a paper in the field of pavement digital twin and I want to publish it.
How can I find the right journal for that?
Relevant answer
Answer
Publishing a blueprint paper in the field of pavement digital twin requires identifying journals that specialize in civil engineering, transportation engineering, or related fields. Here are some journals where you can consider submitting your paper:
  1. Transportation Research Part C: Emerging Technologies:This journal focuses on innovative technologies and methodologies in transportation engineering, including digital twin applications. It covers topics such as traffic management, infrastructure monitoring, and intelligent transportation systems.
  2. Journal of Transportation Engineering, Part B: Pavements:Specializing in pavement engineering and materials, this journal is an ideal venue for papers related to pavement digital twin technology. It covers topics such as pavement design, performance evaluation, and maintenance strategies.
  3. ASCE Journal of Infrastructure Systems:This journal publishes research on infrastructure systems, including transportation infrastructure. Papers related to digital twin applications in pavement management and infrastructure monitoring would be appropriate for this journal.
  4. Computer-Aided Civil and Infrastructure Engineering:Focusing on the application of computer-aided technologies in civil engineering, this journal covers topics such as simulation, modeling, and visualization of infrastructure systems. Digital twin-related research in pavement engineering would align well with the scope of this journal.
  5. International Journal of Pavement Engineering:Specializing in pavement engineering and materials science, this journal publishes research on various aspects of pavement design, construction, and maintenance. Papers on digital twin applications in pavement management systems would find a suitable audience here.
  6. IEEE Transactions on Intelligent Transportation Systems:As a leading journal in the field of intelligent transportation systems, this publication covers a wide range of topics related to transportation technology and innovation. Papers on digital twin applications for traffic management and infrastructure monitoring may be suitable for this journal.
When selecting a journal, consider factors such as the scope of the journal, its impact factor, the relevance of previous publications to your research, and the target audience. Additionally, review the submission guidelines and requirements of each journal to ensure that your paper meets the specified criteria.
You can also consult with colleagues, advisors, or mentors in your field for recommendations on suitable journals for publishing your blueprint paper in pavement digital twin technology.
Please follow me if it's helpful. All the very best. Regards, Safiul
  • asked a question related to Internet of Things
Question
1 answer
IEEE International Conference on Omni-Layer Intelligent Systems (COINS-2024) is excited to announce a special session on the Use of Microelectronics in IoT and AI ecosystem Sustainability as part of our upcoming conference, scheduled to take place at King's College, London, 29-31 July 2024. This special session offers a unique opportunity for graduate students, researchers, scholars, supervisors, experts from diverse fields, and industrialists to present their work and engage in discussions focused on Microelectronics applications in IoT and AI ecosystem sustainability.
Special Session Theme:
We welcome original research papers, case studies, innovative practices, and work in progress that contribute to advancing knowledge and understanding within the scope of IoT and AI Ecosystem Sustainability. Submissions may explore empirical, conceptual, or practical aspects, including various perspectives, disciplines, and methodological approaches toward IoT and AI Ecosystem Sustainability. The topics of interest include but are not limited to:
➢ Semiconductor,
➢ Electronics devices,
➢ Microelectronics
➢ Nanotechnology
➢ Nanomaterials
➢ e-waste
➢ Bio-degradable in electronics
➢ VLSI/ULSI.
Relevant answer
Answer
Important Dates:
➢ Technical Papers: March 31, 2024
➢ Acceptance Notification: May 31, 2024
➢ Camera-Ready Submission: June 20, 2024
  • asked a question related to Internet of Things
Question
3 answers
How can federated learning be extended and optimized for scenarios with limited communication bandwidth or high-latency networks, such as IoT devices or edge computing environments, while still preserving privacy and security?
Relevant answer
Answer
Dear Sikander Hans,
I would suggest using the ideas of Digital Twins (DTs) for this. See the added Internet sources.
For general idea of DTs see my presentation at the address:
Best regards
Anatol Badach
The part „Use cases of a digital twin network“ in „Y.3090 : Digital twin network - Requirements and architecture“ at the address: https://www.itu.int/rec/T-REC-Y.3090-202202-I
Wei Yang; Wei Xiang; Yuan Yang; Peng Cheng: „Optimizing Federated Learning With Deep Reinforcement Learning for Digital Twin Empowered Industrial IoT“ https://ieeexplore.ieee.org/document/9815106
Kangde Liu, Zheng Yan, Xueqin Liang, Raimo Kantola, Chuangyue Hu: A survey on blockchain-enabled federated learning and its prospects with digital twin https://www.sciencedirect.com/science/article/pii/S2352864822001626
Selvarajan Shitharth, Hariprasath Manoharan , Achyut Shankar, et al.: Federated learning optimization: A computational blockchain process with offloading analysis to enhance security https://www.sciencedirect.com/science/article/pii/S1110866523000622
  • asked a question related to Internet of Things
Question
2 answers
The 3rd International Conference on Optoelectronic Information and Functional Materials (OIFM 2024) will be held in Wuhan, China from April 5 to 7, 2024.
The annual Optoelectronic Information and Functional Materials conference (OIFM) offers delegates and members a forum to present and discuss the most recent research. Delegates and members will have numerous opportunities to join in discussions on these topics. Additionally, it offers fresh perspectives and brings together academics, researchers, engineers, and students from universities and businesses throughout the globe under one roof.
---𝐂𝐚𝐥𝐥 𝐅𝐨𝐫 𝐏𝐚𝐩𝐞𝐫𝐬---
The topics of interest for submission include, but are not limited to:
1. Optoelectronic information science
- Optoelectronics
- Optical communication and optical network
- Optical fiber communication and system
......
2. Information and Communication Engineering
- Communication and information system
- Wireless communication, data transmission
- Switching and broadband network
......
3. Materials science and Engineering
- New materials
- Optoelectronic functional materials and devices
- Bonding material
......
All accepted full papers will be published in the conference proceedings and will be submitted to EI Compendex / Scopus for indexing.
𝐈𝐦𝐩𝐨𝐫𝐭𝐚𝐧𝐭 𝐃𝐚𝐭𝐞𝐬:
Full Paper Submission Date: February 5, 2024
Registration Deadline: March 22, 2024
Final Paper Submission Date: March 29, 2024
Conference Dates: April 5-7, 2024
𝐅𝐨𝐫 𝐌𝐨𝐫𝐞 𝐃𝐞𝐭𝐚𝐢𝐥𝐬 𝐩𝐥𝐞𝐚𝐬𝐞 𝐯𝐢𝐬𝐢𝐭:
Relevant answer
Answer
Dear Sergey Alexandrovich Shoydin ,only English manuscripts are accepted in the conference.
  • asked a question related to Internet of Things
Question
3 answers
Are there any AI-based solutions for service discovery which take the mobility of node into account?
Relevant answer
Answer
Yes, there are research and developments in service discovery mechanisms in IoT that support the mobility of nodes. One approach is to leverage AI-based solutions to enhance traditional service discovery methods, considering the dynamic nature of node mobility in IoT environments.
@@@ AI-based solutions for service discovery in IoT that consider node mobility include:
  1. Machine learning-based predictive models analyze historical mobility patterns of nodes to predict their future locations. By understanding node mobility patterns, service discovery mechanisms can proactively update service registries or adapt search strategies to locate services efficiently.
  2. Reinforcement Learning (RL) can optimize service discovery strategies based on real-time feedback and environmental changes. Nodes learn to decide on service discovery actions while considering their mobility patterns and network conditions.
  3. Context-aware Service Discovery can be applied to consider mobile nodes' contextual information (e.g., location, speed, direction). This context is used to tailor service discovery requests and adapt service provisioning based on the current context of the nodes.
  4. Federated Learning allows nodes to train machine learning models collaboratively without sharing raw data. In the context of service discovery, federated learning can be employed to train models that predict service availability and location based on the mobility patterns of nodes while preserving data privacy.
However, these AI-based solutions aim to improve service discovery mechanisms' efficiency, scalability, and adaptability in IoT environments with mobile nodes. They enable intelligent decision-making and resource allocation to support dynamic changes in node mobility and network conditions.@Samia Haboussi
  • asked a question related to Internet of Things
Question
4 answers
Within the International Symposium on the Internet of Things, held at SpliTech 2024, we are organizing a special session focused on Blockchain applications and Cybersecurity solutions (for IoT).
We kindly invite you to send your contributions to our Special Session. The deadline is for February 29, 2024. However, we could negotiate a couple of weeks of extension. Feel free to contact me if you need extra time to submit a paper to the session. I am also open to discussing if your research proposal could properly fit into the session.
The flyer of the special session is available at the following link:
The conference website is: https://splitech.org
News: deadline extended to March 26, 2024.
Relevant answer
Answer
I believe my research aligns well with the themes of the session, particularly in exploring innovative approaches to enhancing cybersecurity within IoT ecosystems using blockchain technology. I am more than happy to provide further details or discuss how my work could complement the session's objectives.
  • asked a question related to Internet of Things
Question
4 answers
How can interdisciplinary collaboration between researchers in computer science, engineering, and social sciences contribute to advancing IoT research?
Relevant answer
Answer
Interdisciplinary collaboration between researchers in computer science, engineering, and social sciences can significantly contribute to advancing IoT research by bringing together diverse expertise and perspectives to address complex challenges and opportunities in the field. Here are some ways in which interdisciplinary collaboration can enhance IoT research:
  1. Holistic Approach: Researchers from computer science, engineering, and social sciences can offer complementary insights and expertise to develop a holistic understanding of IoT systems. Computer scientists can contribute technical knowledge on networking, data processing, and security, engineers can provide expertise in hardware design and implementation, while social scientists can offer insights on user behavior, adoption patterns, and ethical considerations.
  2. User-Centered Design: Collaboration between social scientists and technologists can help ensure that IoT technologies are designed with a focus on user needs, preferences, and societal impacts. By incorporating social science perspectives into the design process, researchers can create IoT systems that are more user-friendly, inclusive, and aligned with societal values.
  3. Ethical and Legal Implications: Social scientists can collaborate with computer scientists and engineers to explore the ethical, legal, and regulatory implications of IoT technologies. By considering ethical concerns such as privacy, data security, and algorithmic bias from a social science perspective, researchers can develop IoT systems that are ethically responsible and compliant with legal requirements.
  4. Interoperability and Standards: Collaboration between computer scientists and engineers can facilitate the development of interoperable IoT systems by establishing common standards and protocols. By working together to define technical specifications and interoperability requirements, researchers can ensure seamless communication and integration of diverse IoT devices and platforms.
  5. Innovation and Creativity: Interdisciplinary collaboration can spark innovation and creativity by bringing together diverse perspectives and approaches. Researchers from different disciplines can inspire new ideas, challenge assumptions, and explore unconventional solutions to complex IoT research problems.
  6. Real-World Applications: Collaboration between researchers in computer science, engineering, and social sciences can drive research towards real-world applications and societal impact. By considering the practical implications of IoT technologies on individuals, communities, and organizations, interdisciplinary teams can develop solutions that address pressing societal challenges and improve quality of life.
In conclusion, interdisciplinary collaboration between researchers in computer science, engineering, and social sciences is essential for advancing IoT research. By leveraging the diverse expertise and perspectives of different disciplines, researchers can develop innovative, user-centered, and ethically responsible IoT technologies that have a positive impact on society. Collaborative efforts across disciplines can lead to breakthroughs in IoT research and drive the evolution of connected technologies towards a more sustainable and inclusive future.
  • asked a question related to Internet of Things
Question
2 answers
How can build environment for do computation inside IoT- Mobile Edge Computing Based on benefit of SDN to manage this network
i decide to use pox controller , but if possible to make custom controller it is better
also i want to generate task from IoT, what tools can use to generate task ?
Relevant answer
Answer
To build an environment for computation inside Mobile Edge Computing (MEC) based on the benefits of Software-Defined Networking (SDN) to manage the network, you can follow these steps:
  1. Setting up the Environment:
  • Deploy MEC servers at the edge of the network to enable computation closer to end devices.
  • Implement SDN controllers to centrally manage and control the network infrastructure, including MEC resources.
  1. Utilizing SDN Benefits:
  • Use SDN to dynamically allocate resources, optimize network traffic, and ensure efficient communication between IoT devices and MEC servers.
  • Leverage SDN's programmability to create custom network policies and configurations tailored to the specific requirements of MEC applications.
  1. Choosing the Controller:
  • You can use the POX controller as a starting point for managing the SDN-enabled MEC environment. However, developing a custom controller tailored to your specific needs can offer more flexibility and control over network operations.
  1. Generating Tasks from IoT Devices:
  • To generate tasks from IoT devices and send them to the MEC servers for computation, you can use tools such as:MQTT (Message Queuing Telemetry Transport) protocol for lightweight and efficient messaging between IoT devices and MEC servers. CoAP (Constrained Application Protocol) for resource-constrained IoT devices to communicate tasks to the MEC environment. Custom software applications or scripts that can generate and send tasks from IoT devices to the MEC servers.
By combining MEC, SDN, and custom controller development, you can create a powerful and efficient environment for computation at the edge of the network, enabling seamless interaction between IoT devices and MEC resources. Using appropriate tools for task generation from IoT devices will ensure smooth communication and task offloading to the MEC servers for processing.
  • asked a question related to Internet of Things
Question
3 answers
This question seeks insights on improving cybersecurity in the rapidly growing field of the Internet of Things (IoT). As IoT networks become more complex with an increasing number of connected devices, they face unique security challenges. Key points for discussion include:
Identifying Major Security Risks: What are the primary vulnerabilities in IoT networks?
Innovative Security Solutions: Suggestions for new technologies or protocols that can strengthen IoT security.
Effective IoT Network Management: Tips for secure network design and device management in IoT ecosystems.
Role of Policy in IoT Security: Insights on how governance and industry standards can aid in securing IoT networks.
This question invites contributions from researchers and professionals in cybersecurity, IoT technology, and network management to share their experiences and strategies.
Relevant answer
Answer
Dear Doctor
"10 Critical Steps to Enhance IoT Cybersecurity
In order to enhance IoT cybersecurity, there are 10 critical steps that should be followed: identify and understand your network and connected devices; regularly assess the IoT devices on your network; implement strong password policies; segregate your IoT devices on a separate network; customize default device settings; employ firewalls and IoT security solutions; utilize strong encryption and secure networks; disconnect devices when not in use; disable Universal Plug and Play (UPnP); ensure physical security of devices."
  • asked a question related to Internet of Things
Question
3 answers
Between LDP and CDP, which one is best for IoT?
Relevant answer
Answer
the choice depends on the specific IoT application, the level of privacy required, and the trade-off between privacy and utility. A hybrid approach, combining elements of both LDP and CDP, might also be considered based on the unique needs of the IoT deployment.
  • asked a question related to Internet of Things
Question
2 answers
Which are the sensors can be used in agriculture in IoT and application of IoT based system for monitoring energy consumption?
Relevant answer
Answer
Dr Safi Muqdad Sadeq thank you for your contribution to the discussion
  • asked a question related to Internet of Things
Question
3 answers
2024 International Conference on Smart City and Information System (ICSCIS 2024) will be held in Kuala Lumpur, Malaysia from May 17-19, 2024.
---Call For Papers---
The topics of interest include, but are not limited to:
1. Smart City
- Smart Grid
- Smart Manufacturing
- Wireless Communication
......
2. Information System
- Information Systems and Security
- Information Management Systems
- Internet of Things (IoT)
......
3. Other Related Topics
All accepted full papers will be published on Conference Proceedings and submitted to EI Compendex and Scopus for indexing.
Important Dates:
Registration Deadline Date: May 8, 2024
Final Paper Submission Date: May 13, 2024
Conference Date: May 17-19, 2024
For More Details please visit:
Relevant answer
Answer
Thank you so much
  • asked a question related to Internet of Things
Question
1 answer
Exploring the potential of edge computing to bolster security measures in Internet of Things (IoT) networks.
Relevant answer
Answer
Absolutely, let's keep it simple!
Edge computing in IoT networks is like having a security guard right at your doorstep. Here's how it helps:
Faster Response: With edge devices processing data locally, you get quicker threat detection and response. No need to wait for data to travel to a central server.
Reduced Data Exposure: Less data needs to be sent to the cloud, so there's less chance of sensitive info being intercepted during transmission.
Offline Security: Even if the internet goes down, your edge devices can still monitor and secure your IoT network.
It's like having a security team on the ground, ready to act fast and keep your IoT network safe and sound.
  • asked a question related to Internet of Things
Question
4 answers
In the rapidly evolving landscape of the Internet of Things (IoT), the integration of blockchain, machine learning, and natural language processing (NLP) holds promise for strengthening cybersecurity measures. This question explores the potential synergies among these technologies in detecting anomalies, ensuring data integrity, and fortifying the security of interconnected devices.
Relevant answer
Answer
Imagine we're talking about a superhero team-up in the world of tech, with blockchain, machine learning (ML), and natural language processing (NLP) joining forces to beef up cybersecurity in IoT environments.
First up, blockchain. It's like the trusty sidekick ensuring data integrity. By nature, it's transparent and tamper-proof. So, when you have a bunch of IoT devices communicating, blockchain can help keep that data exchange secure and verifiable. It's like having a digital ledger that says, "Yep, this data is legit and hasn't been messed with."
Then, enter machine learning. ML is the brains of the operation, constantly learning and adapting. It can analyze data patterns from IoT devices to spot anything unusual. Think of it as a detective that's always on the lookout for anomalies or suspicious activities.
And finally, there's NLP. It's a bit like the communicator of the group. In this context, NLP can be used to sift through tons of textual data from IoT devices or networks, helping to identify potential security threats or unusual patterns that might not be obvious at first glance.
Put them all together, and you've got a powerful team. Blockchain keeps the data trustworthy, ML hunts down anomalies, and NLP digs deeper into the data narrative. This combo can seriously level up cybersecurity in IoT, making it harder for bad actors to sneak in and cause havoc. Cool, right?
  • asked a question related to Internet of Things
Question
4 answers
In the context of the ever-expanding Internet of Things (IoT), cybersecurity is becoming increasingly critical. As IoT networks grow in complexity and size, they present unique security challenges due to the diversity and number of connected devices, along with the vast amount of data they generate and process. This question seeks insights into effective strategies for enhancing cybersecurity in such environments, This question aims to gather a comprehensive understanding of the current best practices and future directions for securing IoT networks, drawing on the expertise and experiences of researchers in cybersecurity, network design, IoT technologies, and related fields.
Relevant answer
Answer
Thank you sir for the insight.
  • asked a question related to Internet of Things
Question
3 answers
This question blends various emerging technologies to spark discussion. It asks if sophisticated image recognition AI, trained on leaked bioinformatics data (e.g., genetic profiles), could identify vulnerabilities in medical devices connected to the Internet of Things (IoT). These vulnerabilities could then be exploited through "quantum-resistant backdoors" – hidden flaws that remain secure even against potential future advances in quantum computing. This scenario raises concerns for cybersecurity, ethical hacking practices, and the responsible development of both AI and medical technology.
Relevant answer
Answer
Combining image-trained neural networks, bioinformatics breaches, and quantum-resistant backdoors has major limitations.
Moving from image-trained neural networks to bioinformatics data requires significant domain transfer, which is not straightforward due to the distinct nature of these data types and tasks.
Secure IoT medical devices are designed with robust security features in mind and deployed. Successful attacks requires exploiting a specific vulnerability in the implementation of security measures, rather than the reliance on neural network capabilities.
Deliberately inserting backdoors and to the extent, even quantum-resistant ones, poses ethical and legal questions that would go against norms and standards of cybersecurity practitioners. The actions would violate privacy rights on the federal level, ethical standards and codes of conduct and pose severe legal consequences. Those would be the domestic ones; assuming we're keeping the products in the US.
Quantum computers with sufficient power to break current cryptographic systems are not yet available. Developing quantum-resistant backdoors knowingly anticipates a future scenario to be truth that is still today largely theoretical, without being proven or true.
  • asked a question related to Internet of Things
Question
2 answers
How are specific emerging technologies such as Internet-of-Things (IoT), Artificial Intelligence (AI), and blockchain influencing the enhancement of service quality within the logistics sector?
Relevant answer
Answer
In today's fast-paced world, emerging technologies have become catalysts for digital transformation, reshaping industries and challenging traditional business models. The potential of technologies such as artificial intelligence (AI), blockchain, and virtual reality (VR) is huge.
Regards,
Shafagat
  • asked a question related to Internet of Things
Question
4 answers
papers related to problem statement for the topic?
Papers related to the state of the Art?
Relevant answer
Answer
The Growing Importance of Cybersecurity in the IoT Era - Infosec Resources
IoT cybersecurity: How trust can unlock value | McKinsey
Internet of Things (IoT) Cybersecurity: Literature Review and … - MDPI
IOT Security and the Role of AI/ML to Combat Emerging Cyber Threats in …
How to Secure IoT Devices & Protect Them From Cyber Attacks - EC-Council
  • asked a question related to Internet of Things
Question
5 answers
What are the biggest strategic challenges that insurance companies are facing as a result of digitalisation?
Relevant answer
Answer
In the rapidly evolving landscape of the digital age, insurance companies face a myriad of strategic challenges that demand innovative responses to stay competitive and relevant. The ongoing process of digitalization has ushered in a new era, transforming the industry in profound ways. Understanding and navigating these changes is crucial for insurance companies to thrive in an increasingly digital world.
One of the primary challenges is the shift in customer expectations. As digital technologies continue to redefine the way individuals interact with businesses, insurance customers now expect seamless and personalized experiences. The challenge for insurance companies lies in meeting these expectations, from the initial policy purchase to the handling of claims. Achieving a balance between the traditional aspects of the industry, such as risk assessment, and the demand for a digital-first approach is a strategic imperative.
Moreover, the rise of InsurTech startups introduces a competitive dynamic that can disrupt established business models. These newcomers leverage cutting-edge technologies, such as artificial intelligence and data analytics, to streamline processes, enhance customer experiences, and offer more tailored products. Incumbent insurance companies must adapt to these advancements to remain competitive, either by collaborating with InsurTech firms or by developing their own technological capabilities.
Data privacy and cybersecurity are critical challenges that have gained prominence in the digital era. Insurance companies handle vast amounts of sensitive information, making them attractive targets for cyberattacks. Ensuring the security of customer data is not only a legal and ethical obligation but also a key factor in maintaining trust. Developing robust cybersecurity measures and staying abreast of evolving threats is an ongoing strategic challenge for insurance companies.
The digital transformation also necessitates a cultural shift within insurance organizations. Embracing a culture of innovation and agility is essential for adapting to the fast-paced nature of technological advancements. This involves not only investing in employee training and development but also fostering a mindset that values experimentation and learning from failures.
Additionally, regulatory challenges are amplified in the digital realm. As technology continues to outpace regulatory frameworks, insurance companies must navigate complex and evolving compliance requirements. Staying ahead of regulatory changes and proactively adapting policies and procedures is essential to avoid legal issues and maintain the trust of customers and stakeholders.
  • asked a question related to Internet of Things
Question
4 answers
I'm starting my research on the relationship between agriculture and technology (or agro 4.0) and I would like help from the academic community to know which factors I should pay attention to.
Relevant answer
Answer
The implementation of new technologies in agribusiness, also known as Agro 4.0, is influenced by various factors that can be categorized into four groups: institutional factors, market factors, technology factors, and stakeholder perception factors.
- Institutional factors refer to the policies, regulations, standards, and incentives that affect the adoption and diffusion of new technologies in the agricultural sector. For example, the availability of subsidies, loans, tax breaks, or grants for farmers who invest in new technologies can facilitate their implementation. Conversely, the lack of clear rules, guidelines, or protocols for data sharing, privacy, security, or ownership can hinder their adoption.
- Market factors refer to the supply and demand conditions, prices, costs, and competitiveness of the agricultural products and services that are affected by new technologies. For example, the demand for high-quality, traceable, and sustainable food products can drive the adoption of new technologies that enable precision farming, smart irrigation, or blockchain-based traceability. On the other hand, the high costs of new technologies, the lack of infrastructure, or the low profitability of some crops can discourage their implementation.
- Technology factors refer to the characteristics, performance, availability, and accessibility of the new technologies themselves. For example, the compatibility, interoperability, reliability, scalability, and user-friendliness of new technologies can influence their adoption by farmers and other stakeholders. Moreover, the availability of technical support, training, maintenance, and updates can also affect their implementation.
- Stakeholder perception factors refer to the knowledge, attitudes, beliefs, preferences, and expectations of the farmers and other actors involved in the agricultural value chain regarding new technologies. For example, the awareness, understanding, and perception of the benefits, risks, challenges, and opportunities of new technologies can affect their adoption. Additionally, the trust, confidence, and satisfaction of the stakeholders with the new technologies can also influence their implementation.
These factors are interrelated and can have positive or negative effects on the implementation of new technologies in agribusiness. Therefore, it is important to consider them holistically and address the potential barriers and enablers for Agro 4.0.
  • asked a question related to Internet of Things
Question
3 answers
The future in the palm of your hand: Demystifying Humane’s Ai Pin Wearable technology is the future – we're living that future. Wearable tech has seen an awe-inspiring transformation from its early beginnings to current iterations. The Ai Pin, as the device is called, is designed to be worn on clothing and can be tapped to talk to a virtual assistant powered by technologies from ChatGPT-creator OpenAI and cloud computing power from Microsoft (MSFT.O). It uses a laser projection system to display text and monochromatic images on a user's hand. Remember, this is only the beginning.
Relevant answer
Answer
The description of Humane's Ai Pin wearable technology paints a vivid picture of the advancements in wearable tech, highlighting how far the field has come and the exciting possibilities that lie ahead. Here are a few key points to consider:
  1. Integration of Advanced AI and Cloud Computing: The Ai Pin's use of ChatGPT technologies by OpenAI, coupled with Microsoft's cloud computing infrastructure, indicates a high level of sophistication. This integration suggests capabilities like real-time data processing, advanced user interaction, and potentially learning and adapting to user preferences or behaviors.
  2. User Interface Innovation: The use of a laser projection system to display text and images on a user’s hand is an innovative approach. It addresses the challenge of limited display space on wearable devices, offering a convenient and unobtrusive way for users to interact with technology.
  3. Versatility and Accessibility: Being designed to attach to clothing and operated through simple taps implies ease of use and accessibility. This could make the technology appealing to a broad range of users, including those who might be less comfortable with more traditional tech interfaces.
  4. The Future of Wearable Technology: The Ai Pin represents a step towards more integrated, intuitive, and user-friendly wearable technology. It suggests a future where technology blends seamlessly into our daily lives, offering assistance and information in more natural and interactive ways.
  5. Potential Applications: The applications for such a device could be vast, ranging from aiding in navigation, providing real-time translations, assisting in learning, to offering personalized recommendations or alerts based on the user’s context and preferences.
Overall, the Ai Pin is a testament to the rapidly evolving world of wearable technology, where the convergence of AI, cloud computing, and innovative design is creating new possibilities for how we interact with technology in our everyday lives.
  • asked a question related to Internet of Things
Question
5 answers
What is your opinion on the implementation of a supply chain management system that harnesses the latest technologies like AI, IoT, and real-time data analytics to address the challenges in supply chain operations?
Relevant answer
Answer
The implementation of a supply chain management system that integrates state-of-the-art technologies such as Artificial Intelligence (AI), the Internet of Things (IoT), and real-time data analytics epitomizes a paradigm shift towards digital metamorphosis in supply chain operations. This avant-garde approach facilitates an unprecedented level of end-to-end visibility and orchestration across the entire value chain.
By leveraging AI's predictive analytics and machine learning algorithms, stakeholders can prognosticate market vicissitudes, optimize inventory levels, and anticipate potential disruptions with greater acuity, thereby enabling proactive remediation strategies. The IoT ecosystem, replete with sensor-generated data, fosters a granular, real-time observability that underpins dynamic decision-making processes and augments operational efficiency. Concurrently, real-time data analytics transmute colossal data troves into actionable insights, ensuring a nimble and responsive supply chain apparatus.
The confluence of these advanced technologies engenders a robust, resilient supply chain framework that not only mitigates latency and attenuates bottlenecks but also drives value creation through cost-effective and customer-centric operations. Moreover, this tech-centric modus operandi propels the transition from a traditionally reactive supply chain to a strategic, forward-looking entity that is pivotal in achieving a competitive advantage in the tumultuous global market.
  • asked a question related to Internet of Things
Question
1 answer
1. Malware execution and analysis on IOT and GPU-based processer devices?
in that IOT and GPU both have different processors in that case how same or different kind of malware will impacts, how to do forensics investigation to club both the technologies ?
2.Malware execution and analysis on IOT and GPU-based processer devices?
in that IOT and GPU both have different processors in that case how same or different kind of malware will impacts in bid data environment
Relevant answer
Answer
The aim of this question is to define global features to tend to make analysis partially comparable between any type of processor. In my opinion, it is possible to do this by focusing on programing language and program structure (AST, Graph Analysis...). However, that's could lead to decrease in case of your goal is to produce categorization by any means (ML, DL...). I focus my work on program architecture especially on central node detection. It is hard to produce a malware detection system with good accuracy, but it is too interesting.
  • asked a question related to Internet of Things
Question
2 answers
Comments/Critics/Suggestions/Citations
Topic: Integration of Blockchain and IoT for Enhanced Security, Trust, Economics, and Public Administration in Digital Smart Cities
  • October 2023
  • DOI:
  • 10.13140/RG.2.2.24700.10886:
  • ABSTRACT: The integration of Blockchain and Internet of Things (IoT) technologies has emerged as a critical paradigm in the development of Digital Smart Cities. This research paper provides comprehensive research views for fellow researchers, the public, investors, and policymakers to research the synergies between Blockchain and IoT, emphasizing their role in bolstering security, establishing trust, optimizing economic models, and revolutionizing public administration in urban environments. Supplementing through case studies and in-depth analysis, this paper presents a roadmap for leveraging these technologies to shape the future of Digital Smart Cities.
Relevant answer
Answer
The integration of blockchain and the Internet of Things (IoT) is a relatively new concept with the potential to revolutionize many industries and aspects of our lives.
Concept
Blockchain is a distributed ledger technology that allows for secure, transparent, and tamper-proof transactions. IoT is a network of physical devices that are connected to the internet and can collect and exchange data.
The integration of blockchain and IoT can provide a number of benefits, including:
  • Security: Blockchain can help to secure IoT devices and data from cyberattacks.
  • Transparency: Blockchain can provide a transparent record of all IoT transactions, which can help to build trust and accountability.
  • Efficiency: Blockchain can help to streamline IoT processes and improve efficiency.
  • Autonomy: Blockchain can enable IoT devices to operate autonomously without the need for a central authority.
Reality
The integration of blockchain and IoT is still in its early stages of development, but there are a number of real-world applications that are already emerging. For example:
  • Supply chain management: Blockchain can be used to track the movement of goods through a supply chain, ensuring transparency and traceability.
  • Smart cities: Blockchain can be used to manage a variety of smart city applications, such as traffic control, energy management, and waste management.
  • Healthcare: Blockchain can be used to store and share healthcare data securely and efficiently.
  • Financial services: Blockchain can be used to enable new financial services, such as micropayments and peer-to-peer lending.
Challenges
There are a number of challenges that need to be addressed before blockchain and IoT integration can be widely adopted. These challenges include:
  • Scalability: Blockchain networks can be slow and expensive to process transactions, which can be a barrier to adoption in IoT applications.
  • Interoperability: There are a number of different blockchain platforms, which can make it difficult for IoT devices to communicate with each other.
  • Regulation: The regulatory landscape for blockchain and IoT is still evolving, which can create uncertainty for businesses that are looking to adopt these technologies.
Despite these challenges, the integration of blockchain and IoT has the potential to revolutionize many industries and aspects of our lives. As the technology continues to develop and mature, we can expect to see even more innovative and groundbreaking applications emerge.
Here are some examples of real-world projects that are integrating blockchain and IoT:
  • IBM Food Trust: IBM Food Trust is a blockchain-based system that is used to track the movement of food through the supply chain. This system helps to improve food safety and traceability.
  • VeChain: VeChain is a blockchain-based platform that is used to manage a variety of IoT applications, such as supply chain management, product authentication, and asset tracking.
  • IOTA: IOTA is a blockchain-based platform that is specifically designed for IoT applications. IOTA is designed to be lightweight and scalable, making it ideal for use with IoT devices.
These are just a few examples of the many ways that blockchain and IoT are being integrated. As these technologies continue to develop, we can expect to see even more innovative and groundbreaking applications emerge.
  • asked a question related to Internet of Things
Question
8 answers
I am trying to explore data collection methods and protocols for transferring sensor data from the IoT devices to a local server.
Relevant answer
Answer
Collecting sensor data from IoT (Internet of Things) devices and transferring it to a local server involves several methods and protocols to ensure efficient and secure data transmission. Here are common data collection methods and protocols for IoT devices:
Data Collection Methods:
  1. Polling and Pushing: IoT devices can send data to a local server through polling or pushing mechanisms. In polling, the server periodically requests data from devices. In pushing, devices send data to the server as soon as it becomes available. Pushing is often more efficient for real-time data.
  2. HTTP/HTTPS: Using standard HTTP or its secure counterpart HTTPS is a common method for IoT data transfer. Devices can make HTTP/HTTPS requests to web services or APIs hosted on the server to send data. RESTful APIs are commonly used for this purpose.
  3. MQTT (Message Queuing Telemetry Transport): MQTT is a lightweight and efficient publish-subscribe protocol designed for IoT. Devices publish data to specific topics, and subscribers (including the server) receive updates when data is published.
  4. CoAP (Constrained Application Protocol): CoAP is another lightweight protocol designed for resource-constrained devices. It's suitable for IoT environments and supports UDP for efficient communication.
  5. WebSocket: WebSockets provide full-duplex communication channels over a single TCP connection. IoT devices can establish WebSocket connections to the server, allowing bidirectional data transfer.
  6. UDP (User Datagram Protocol): While less reliable than TCP, UDP is often used for real-time IoT applications where low latency is critical. Devices send data as datagrams to the server, which may require additional error handling.
Data Protocols:
  1. JSON (JavaScript Object Notation): JSON is a lightweight and human-readable data interchange format. IoT devices can encode data in JSON format and send it to the server, which can then parse and process the data.
  2. XML (eXtensible Markup Language): XML is another format for structuring data. IoT devices can use XML to encode data before transmission, and the server can parse the XML data.
  3. Protocol Buffers (protobuf): Protocol Buffers is a binary serialization format designed for efficient and compact data transmission. It's often used in resource-constrained IoT environments.
  4. MessagePack: MessagePack is another binary serialization format that provides a compact representation of data. It's suitable for IoT applications where bandwidth and efficiency are crucial.
Security Protocols:
  1. TLS/SSL: Transport Layer Security (TLS) and its predecessor Secure Sockets Layer (SSL) provide encryption and authentication to secure data transmission. Using HTTPS or secure MQTT (MQTT over TLS) is common for IoT security.
  2. OAuth: OAuth is used for secure authentication and authorization between IoT devices and servers. It ensures that only authorized devices can send data.
  3. API Keys and Tokens: Devices can use API keys or tokens to authenticate with the server's APIs. Tokens can be short-lived and rotated for added security.
  4. Digital Signatures and Certificates: IoT devices can sign data with digital signatures or use certificates to verify their identity to the server.
  5. Firewalls and Intrusion Detection Systems: Implementing firewalls and intrusion detection systems on both the device and server sides can help detect and prevent unauthorized access and attacks.
The choice of data collection methods and protocols depends on factors such as the nature of the IoT devices, the required data transfer rate, security considerations, and the capabilities of the local server. A combination of methods and protocols may be used in a comprehensive IoT data collection and transmission strategy.
  • asked a question related to Internet of Things
Question
2 answers
public dataset, IoT, security, text
Relevant answer
Answer
There are a few public datasets with textual security requirements data generated from IoT systems that you can use in academic research. Here are a few examples:
  • The IoT Security Requirements Dataset (IoTSeRD) is a collection of textual security requirements for IoT systems, generated by security experts. The dataset is available on GitHub and is licensed under the Creative Commons Zero (CC0) license, which means that you can use it for any purpose, including academic research.
  • The IoT Security Requirements Corpus (IoTSRC) is a dataset of textual security requirements for IoT systems, generated by both security experts and non-experts. The dataset is available on GitHub and is licensed under the Apache License 2.0, which means that you can use it for any purpose, including academic research.
  • The Industrial IoT Security Requirements Dataset (IIoTSRD) is a collection of textual security requirements for industrial IoT systems. The dataset is available on GitHub and is licensed under the Creative Commons Zero (CC0) license.
In addition to these datasets, you may also be able to find public datasets of textual security requirements for IoT systems in specific domains, such as healthcare, transportation, and manufacturing. For example, the Healthcare IoT Security Requirements Dataset (HC-IoTSRD) is a collection of textual security requirements for healthcare IoT systems. The dataset is available on GitHub and is licensed under the Creative Commons Zero (CC0) license.
When choosing a public dataset to use in your research, it is important to consider the following factors:
  • The quality and reliability of the dataset: Is the dataset well-curated and free of errors?
  • The size and scope of the dataset: Does the dataset contain enough data to support your research? Does the dataset cover the types of IoT systems that you are interested in?
  • The license of the dataset: Is the dataset licensed under a permissive license that allows you to use it for your research?
  • asked a question related to Internet of Things
Question
5 answers
With security and pricacy in mind. The project should have a non challenging artifact
Relevant answer
Answer
Here are some project topics related to IoT (Internet of Things) and cybersecurity, with a focus on security and privacy, that can be implemented with relatively non-challenging artifacts:
IoT Device Security Assessment: Evaluate the security of a specific IoT device (e.g., a smart thermostat or a home security camera). Identify vulnerabilities, suggest improvements, and create a report on enhancing its security.
IoT Home Network Security Setup: Design a secure IoT network at home by implementing best practices like network segmentation, strong passwords, and firmware updates. Create a guide for users to follow to secure their IoT devices.
Privacy-Focused IoT Data Collection: Develop a simple IoT project that collects data (e.g., temperature or light levels) but focuses on privacy protection. Implement techniques like data anonymization and encryption for data transmission.
IoT Security Awareness Training: Create an educational program or presentation on IoT security and privacy for non-technical users. Address common risks and offer practical tips for securing IoT devices.
IoT Device Authentication: Build a basic system for authenticating IoT devices on a network. Use techniques like device certificates or secure tokens to ensure that only trusted devices can connect.
IoT Firmware Analysis: Analyze the firmware of a common IoT device, such as a smart bulb or smart plug. Identify security vulnerabilities or privacy concerns in the firmware and suggest improvements.
IoT Communication Protocol Analysis: Study and compare the security of different IoT communication protocols (e.g., MQTT, CoAP, HTTP). Create a report on their strengths and weaknesses.
IoT Penetration Testing Lab: Set up a controlled environment for testing the security of IoT devices. Perform penetration testing on various devices and document the vulnerabilities found.
IoT Privacy Policy Evaluation: Evaluate the privacy policies of popular IoT device manufacturers. Analyze how they handle user data and make recommendations for better privacy practices.
IoT Security Dashboard: Develop a basic security dashboard that displays the status of IoT devices on a network, including information about security patches and potential vulnerabilities.
IoT Secure Boot Implementation: Implement secure boot mechanisms on a Raspberry Pi or Arduino-based IoT device. Ensure that the device only runs authorized firmware.
IoT Device Access Control: Create a user-friendly access control system for IoT devices. Users can define who can control or access their devices, enhancing privacy and security.
IoT Threat Modeling: Develop a threat model for a specific IoT ecosystem, such as a smart home or industrial IoT network. Identify potential threats and propose countermeasures.
IoT Privacy Preservation for Wearables: Build a simple IoT wearable device (e.g., a fitness tracker) that collects user data while preserving privacy through techniques like data aggregation.
IoT Password Management: Design a secure password management system for IoT devices, ensuring that users can easily manage and update passwords for multiple devices.
These project ideas cover a range of aspects within IoT and cybersecurity, and they can be adapted to different levels of technical complexity depending on your skill level and resources. Always prioritize security and privacy when working on IoT projects to contribute to a safer and more privacy-aware IoT ecosystem.
  • asked a question related to Internet of Things
Question
5 answers
Ambient Intelligence vs Internet of Things? What is Similarities and Differences?
Relevant answer
Answer
Ambient Intelligence (AmI) and Internet of Things (IoT) are two concepts that have gained significant attention in the field of technology. While they share some similarities, there are also distinct differences between the two.
Ambient Intelligence refers to a computing environment that is sensitive and responsive to human presence. It aims to create an intelligent and intuitive system that can adapt to users' needs without explicit instructions. AmI systems utilize sensors, data analysis, and machine learning algorithms to provide personalized services in a seamless manner. For example, smart homes equipped with AmI technology can adjust lighting, temperature, and music preferences based on individual preferences.
On the other hand, the Internet of Things refers to a network of physical objects embedded with sensors, software, and connectivity capabilities. IoT enables these objects to collect and exchange data over the internet without human intervention. The main goal of IoT is to connect various devices for efficient communication and automation. For instance, IoT can be seen in applications like smart cities where streetlights automatically adjust their brightness based on real-time traffic conditions.
Although both AmI and IoT involve interconnected devices and rely on data collection for decision-making processes, there are key differences between them. Firstly, while AmI focuses on creating an intelligent environment that adapts to humans' needs seamlessly, IoT emphasizes connecting devices for efficient communication without direct human involvement.
Secondly, AmI systems primarily rely on local processing capabilities within the environment itself. This means that most of the data processing occurs within the immediate vicinity of users or devices. In contrast, IoT systems often rely on cloud computing for storing and analyzing large amounts of data collected from multiple sources.
Lastly, another difference lies in their scope of application. Ambient Intelligence has a more personal focus as it aims at providing personalized services tailored specifically for individuals or small groups. On the other hand, IoT has broader applications ranging from industrial automation to healthcare monitoring systems.
In conclusion, Ambient Intelligence (AmI) and Internet of Things (IoT) are two distinct concepts in the field of technology. While they share similarities in terms of interconnected devices and data collection, their focus, processing capabilities, and scope of application differ significantly. Both concepts have the potential to revolutionize various industries and improve our daily lives.
Reference:
Kidd, C.D., Orr, R.J., Abowd, G.D., Atkeson, C.G., Essa, I.A., MacIntyre, B., Mynatt E.D. & Starner T.E. (1999). The Aware Home: A Living Laboratory for Ubiquitous Computing Research. In Proceedings of the Second International Workshop on Cooperative Buildings (CoBuild '99), 191-198.
  • asked a question related to Internet of Things
Question
4 answers
How can the integration of IoT, deep learning, and cloud computing improve the efficiency and effectiveness of smart city systems? What are some real-world examples of this integration in action?
Relevant answer
Answer
Hi,
Please take a look at my papers in the IoT. In the first paper I used Machine Learning with IoT:
■ A. Abusukhon Intelligent Shoes for Detecting Blind Falls Using the Internet of Things. KSII Transactions on Internet and Information Systems. Vol. 17, Issue 9. 2023
■ A. Abusukhon, A. Al-Fuqaha, B. Hawashin, A Novel Technique for Detecting Underground Water Pipeline Leakage Using the Internet of Things. Journal of Universal Computer Science (JUCS). Vol. 29, No. 8.
■ A. Abusukhon, IOT Bracelets for Guiding Blind People in an Indoor Environment, in Journal of Communications Software and Systems, vol. 19, no. 2, pp. 114-125, April 2023, doi: 10.24138/jcomss-2022-0160.
■ A. Abusukhon (2021) Towards Achieving a Balance between the User Satisfaction and the Power Conservation in the Internet of Things, IEEE Internet of Things Journal, doi: 10.1109/JIOT.2021.3051764. impact factor 9.936. Published by IEEE. https://ieeexplore.ieee.org/document/9326414. [Science Citation Index].
■ Ahmad Abusukhon, Bilal Hawashin and Mohammad Lafi (2021) An Efficient Algorithm for Reducing the Power Consumption in Offices Using the Internet of Things, International Journal of Advances in Soft Computing and its Applications (IJASCA). http://ijasca.zuj.edu.jo/Volumes.aspx
■ A. Abusukhon, Z. Mohammad, A. Al-Thaher (2021) An authenticated, secure, and mutable multiple-session-keys protocol based on elliptic curve cryptography and text_to-image encryption algorithm. Concurrency and computation practice and experience. [Science Citation Index].
■ B. Hawashin, A. Abusukhon An Efficient Course Recommender Using Deep Enriched Hidden Student Aptitudes. ICIC Express Letters, Part B: Applications, 2022.
■ A. Abusukhon, N. Anwar, M. Mohammad, Z., Alghanam, B. (2019) A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm. Journal of Discrete Mathematical Sciences and Cryptography. 22(1) pp. 65- 81. (SCOPUS). https://www.tandfonline.com/doi/abs/10.1080/09720529.2019.1569821
■ A. Abusukhon, B.Wawashin, B. (2015) A secure network communication protocol based on text to barcode encryption algorithm. International Journal of Advanced Computer Science and Applications (IJACSA). (ISI indexing). https://thesai.org/Publications/ViewPaper?Volume=6&Issue=12&Code=IJACSA&Seri alNo=9
■ A. Abusukhon, Talib, M., and Almimi, H. (2014) Distributed Text-to-Image Encryption Algorithm. International Journal of Computer Applications (IJCA), 106 (1). [ available online at : https://www.semanticscholar.org/paper/Distributed-Text-to-Image-Encryption-Algorithm-Ahmad-Mohammad/0764b3bd89e820afc6007b048dac159d98ba5326]
■ A. Abusukhon (2013) Block Cipher Encryption for Text-to-Image Algorithm. International Journal of Computer Engineering and Technology (IJCET). 4(3) , 50-59. http://www.zuj.edu.jo/portal/ahmad-abu-alsokhon/wpcontent/uploads/sites/15/BLOCK-CIPHER-ENCRYPTION-FOR-TEXT-TO-IMAGE ALGORITHM.pdf
■ A. Abusukhon, Talib, M. and Nabulsi, M. (2012) Analyzing the Efficiency of Text-to-Image Encryption Algorithm. International Journal of Advanced Computer Science and Applications ( IJACSA )(ISI indexing) , 3(11), 35 – 38. https://thesai.org/Publications/ViewPaper?Volume=3&Issue=11&Code=IJACSA&Seri alNo=6
■ A. Abusukhon, Talib M., Issa, O. (2012) Secure Network Communication Based on Text to Image Encryption. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 1(4). The Society of Digital Information and Wireless Communications (SDIWC) 2012. https://www.semanticscholar.org/paper/SECURE NETWORK-COMMUNICATION-BASED-ON-TEXT-TO-IMAGE-Abusukhon-Talib/1d122f280e0d390263971842cc54f1b044df8161
  • asked a question related to Internet of Things
Question
2 answers
Explain How IoT( Internet of Things) is fortifying the agricultural industry?
Relevant answer
Answer
The Internet of Things (IoT) is playing a significant role in fortifying the agricultural industry by providing farmers with advanced technologies and data-driven insights to optimize various aspects of farming. Here's how IoT is transforming agriculture:
  1. Precision Farming: IoT sensors and devices are used to collect real-time data on soil conditions, weather, and crop health. This information helps farmers make data-driven decisions about planting, irrigation, and fertilization. Precision agriculture techniques enable targeted resource use, reducing waste of water, fertilizers, and pesticides. This not only lowers operational costs but also minimizes environmental impact.
  2. Smart Irrigation: IoT-enabled smart irrigation systems use sensors to monitor soil moisture levels and weather conditions. They adjust irrigation schedules and water distribution to ensure optimal hydration for crops. This technology helps conserve water, a critical resource in agriculture, and prevents over- or under-irrigation, which can harm crop yields.
  3. Crop Monitoring and Management: IoT sensors, drones, and satellite imagery enable farmers to monitor crop growth, detect diseases, and assess pest infestations. Early detection allows for timely intervention and reduces crop losses. Automated monitoring also helps farmers identify areas of their fields that need special attention, improving overall crop health and productivity.
  4. Livestock Management: IoT devices are used to track the health and location of livestock. Wearable sensors can monitor vital signs, detect illness early, and help manage animal behavior. GPS tracking and geofencing ensure that livestock stay within designated areas, improving herd management and reducing the risk of theft or predation.
  5. Supply Chain Optimization: IoT helps streamline the supply chain by tracking the movement and condition of agricultural products from farm to market. Temperature and humidity sensors in storage and transport facilities ensure the quality and safety of products like fruits, vegetables, and dairy.
  6. Predictive Analytics and Decision Support: IoT-generated data can be processed using artificial intelligence and machine learning algorithms to provide predictive insights. Farmers can anticipate crop yields, market prices, and weather patterns. Decision support systems enable farmers to make informed choices about planting, harvesting, and selling their crops.
  7. Remote Monitoring and Control: Farmers can remotely monitor and control farm equipment, such as tractors and irrigation systems, using IoT technology. This increases operational efficiency and reduces labor costs.
  8. Environmental Sustainability: IoT assists in sustainable farming practices by minimizing resource use, optimizing energy consumption, and reducing greenhouse gas emissions.
  9. Rural Connectivity: IoT infrastructure extends connectivity to remote rural areas, bridging the digital divide and enabling farmers to access information and market opportunities.
In summary, IoT is revolutionizing agriculture by providing farmers with actionable data, automating tasks, and optimizing resource use. It helps increase productivity, reduce environmental impact, improve food quality, and enhance the overall sustainability of the agricultural industry.
  • asked a question related to Internet of Things
Question
3 answers
What are the components of IoT based agriculture monitoring system and what is IoT based smart monitoring of soil parameters for agricultural field?
Relevant answer
Answer
Dr Aniket Sunil Gaikwad thank you for your contribution to the discussion
  • asked a question related to Internet of Things
Question
10 answers
What is IoT based smart agriculture monitoring system methodology and what is smart plant monitoring system using IoT applications?
Relevant answer
Answer
Dr Kamel Khedhiri thank you for your contribution to the discussion
  • asked a question related to Internet of Things
Question
3 answers
What is smart agriculture system using IoT in India and how can Internet of Things help farming by automating farming techniques?
Relevant answer
Answer
In fact, thanks to it, farmers can see and manage all data and equipment using one device in real-time without going on the field. This smart farming approach improves overall plant productivity, reduces waste, and optimizes electricity, fuel, water, and fertilizer use. IoT smart agriculture products are designed to help monitor crop fields using sensors and by automating irrigation systems. As a result, farmers and associated brands can easily monitor the field conditions from anywhere without any hassle. IoT-based smart agriculture refers to applying IoT technology in the agricultural sector for optimized farming processes. It integrates sensors, actuators, and other smart devices to enable data collection, analysis, and automated decision-making in farming operations. By using IoT sensors to collect environmental and machine metrics, farmers can make informed decisions, and improve just about every aspect of their work – from livestock to crop farming. Digital technologies such as satellite imaging, drones, and sensors can continue to help farmers optimize their use of resources such as water, fertilizers, and pesticides. This can help to increase productivity, reduce costs, and minimize environmental impacts. Increasing control over production leads to better cost management and waste reduction. The ability to trace anomalies in crop growth or livestock health, for instance, helps eliminate the risk of losing yields. Additionally, automation boosts efficiency. Climate-smart agriculture (CSA) is a part of India's and the G20 countries' Sustainable Development Goals (SDGs) vision. The objective of CSA is to optimize a country's agricultural productivity, resilience and emissions in response to climate change using real-time, localized information. With the right IoT technologies, farmers can make better decisions about fertilizer use, harvesting, and livestock health monitoring, reducing post-harvest losses. Additionally, the IoT in agriculture will help farms reduce their energy usage and repair costs. The Future of IoT in agriculture in India will enable growers to grow better crops at lower costs. The husbandry IoT devices can help them identify herd health, prognosticate crop water conditions, and collect environmental and machine criteria. IoT and AI based systems are capable of enhancing input use efficiency on the farm. Smart farming leverages digital technologies to automate agricultural operations in real-time. Deep learning based solutions can solve numerous day to day agricultural problems.
  • asked a question related to Internet of Things
Question
3 answers
- I am trying to understand the factors that affects the well being of the grains and how they can be mitigated by using IoT.
- Also potential challenges one would encounter if they choose IoT method to secure their grains.
Relevant answer
Answer
Hi
Robert Schaefer
thank you so much, currently the Silos and the sheds are used as grain facilities. Routine fumigation is conducted after three months for stocks in storage and all doors and windows (if any) are opened for storage sheds to allow fresh air to circulate through the stocks.
  • asked a question related to Internet of Things
Question
3 answers
Can artificial intelligence farming make agriculture more sustainable and how IoT and machine learning are automating agriculture?
Relevant answer
Answer
In fact, AI enables farmers to cultivate in a smart and sustainable manner, reaping higher and better yields while using fewer resources. If adopted at scale, AI definitely has the potential to power the next agricultural revolution. For this, farmers, governments and AI experts need to work in tandem to ease AI adoption. By collecting data on plant growth, AI can help produce crops that are less prone to disease and better adapted to weather conditions. With the help of AI, scientists can identify the best-performing plant varieties and crossbreed them to create even better hybrids. AI can help detect field boundaries and bodies of water to enable sustainable farming practices, improve crop yields, and support India's 1.4 billion people and the rest of the world. AI can be appropriate and efficacious in agriculture sector as it optimizes the resource use and efficiency and solves the scarcity of resources and labor to a large extent. Artificial intelligence can be technological revolution and boom in agriculture to feed the increasing amount of human population in the world. AI systems are helping improve the harvest quality and accuracy, which is known as precision agriculture. AI technology assist's in detecting the diseases in plants, pests, poor plant nutrition, etc. It also allows the farmers to monitor the health of the crops and the soil.PwC numbers estimate that the use of AI can reduce worldwide greenhouse gas (GHG) emissions by 4%. Use of AI for environmental purposes can also contribute up to $5.2 trillion USD to the global economy in 2030. Artificial intelligence (AI) is playing a critical role in the agriculture sector as it helps farmers to increase crop yields, improve crop quality, and reduce production costs. In addition, AI can help farmers to optimize irrigation systems, predict weather patterns, and forecast market prices.IoT and AI based systems are capable of enhancing input use efficiency on the farm. Smart farming leverages digital technologies to automate agricultural operations in real-time. Deep learning based solutions can solve numerous day to day agricultural problems. By collecting IoT data, smart sensors can enable real-time monitoring of “what is happening on the ground.” Farming can be made more efficient by knowing when to harvest, the amount of water used and whether irrigation is needed, soil health, and fertilizer requirements. I oT in agriculture uses robots, drones, remote sensors, and computer imaging combined with continuously progressing machine learning and analytical tools for monitoring crops, surveying, and mapping the fields, and provide data to farmers for rational farm management plans to save both time and money. Using the deep learning and ML techniques, the crop productivity in the agriculture can be improvised. By using the sensor data, the accurate data are predicted by evolving the artificial intelligence, which allows a smart way in farmer decision making. Using the deep learning and ML techniques, the crop productivity in the agriculture can be improvised. By using the sensor data, the accurate data are predicted by evolving the artificial intelligence, which allows a smart way in farmer decision making.
  • asked a question related to Internet of Things
Question
1 answer
In the modern era of technology, many microcontrollers are equipped with multicore processors.
Relevant answer
Answer
Yes, Internet of Things (IoT) devices and embedded systems can be classified within Flynn's taxonomy. Flynn's taxonomy is a classification scheme for computer architectures based on the number of instructions and data streams that can be processed simultaneously. The four categories of Flynn's taxonomy are:
  • Single Instruction Single Data (SISD): These architectures process a single instruction on a single data stream at a time. Most traditional personal computers and workstations are SISD architectures.
  • Single Instruction Multiple Data (SIMD): These architectures process a single instruction on multiple data streams at a time. SIMD architectures are well-suited for applications that involve parallel processing, such as image processing and video encoding.
  • Multiple Instruction Single Data (MISD): These architectures process multiple instructions on a single data stream at a time. MISD architectures are rarely used in practice, but they can be useful for applications such as fault tolerance and redundancy.
  • Multiple Instruction Multiple Data (MIMD): These architectures process multiple instructions on multiple data streams at a time. MIMD architectures are the most versatile type of architecture and are used in a wide range of applications, including supercomputers, high-performance computing clusters, and cloud computing platforms.
IoT devices and embedded systems can be classified into all four categories of Flynn's taxonomy. For example, a simple IoT device such as a smart thermostat is typically an SISD architecture. A more complex IoT device such as a self-driving car is likely to be an MIMD architecture.
Here are some examples of IoT devices and embedded systems classified within Flynn's taxonomy:
  • SISD: Smart thermostat, smart light bulb, fitness tracker
  • SIMD: Smart camera, video encoder, image processing accelerator
  • MISD: Fault-tolerant control system, redundant sensor system
  • MIMD: Self-driving car, industrial robot, cloud computing platform
It is important to note that Flynn's taxonomy is a simplified classification scheme and does not capture all of the nuances of modern computer architectures. For example, many modern processors can support both SISD and SIMD instructions. Additionally, some IoT devices and embedded systems may use hybrid architectures that combine elements of multiple categories from Flynn's taxonomy.
  • asked a question related to Internet of Things
Question
7 answers
All these terms are so confusing! I want to understand these terminologies in a very crisp and simplified manner. Can someone help me out with this confusion explaining their differences and real life examples? Any authorized books of reputed publishers? Thanks in advance.
Relevant answer
Answer
  • asked a question related to Internet of Things
Question
1 answer
How does Industry 5.0 contribute to the concept of sustainable development?
Relevant answer
Answer
Industry 5.0 expands upon and completes Industry 4.0. It emphasizes elements that will determine factors for the position of industry in the future European society, not just economic or technological ones. These factors also have aspects related to the environment, society, and fundamental rights. Industry 5.0 should not be viewed as a replacement for the current Industry 4.0 paradigm or as a chronological continuation of it. It is the outcome of an exercise that looked towards the future to help frame how European industry and new societal trends and needs could coexist. The report contributes to the larger discussion on industrial change.
There is no better time to introduce the new idea of Industry 5.0. In order to remain the solution provider for all Europeans, many European industries are reinventing themselves, adjusting to the new COVID reality, and increasingly embracing digital and green technologies. The time is now to implement more sustainable production practices, create more resilient supply chains, and make workplaces more inclusive.
The society will change as a result of a transformed industry. This is particularly true for industry workers, whose roles might change and call for new skills. Action in a variety of areas will be required to make the transition to Industry 5.0.
  • asked a question related to Internet of Things
Question
2 answers
What is difference in LORAWAN class A , B , C devices and what is spreading factor relation with time to air??
Relevant answer
Answer
LoRaWAN Class A possesses bi-directional communication capability and is power efficient. It only initiates uplink communication and this makes it suitable for event-driven applications like alarms, sensors, etc.
LoRaWAN Class B devices can open extra receive windows at scheduled intervals and these devices are also able to synchronize with a network beacon to better coordinate downlink communication.
LoRaWAN Class C devices are open to receive but at the expense of higher power consumption.
Since TOA is critical in LoRaWAN because it depends on power efficiency, network capacity and regulatory compliance. So, the spreading factor is a trade-off that needs to be carefully considered based on the specific requirements of a LoRaWAN deployment.
TOA = preamble time + payload time
Both preamble time and payload time are dependent on the spreading factor, among other things. As the spreading factor increases, these times increase, leading to a higher TOA.
  • asked a question related to Internet of Things
Question
3 answers
I am working on a VANET simulation with NetSim and aim to introduce a clustering mechanism similar to the one used in IoT/WSN setups. The objective is for each vehicle cluster to establish communication with a certain Road Side Unit (RSU). Is it feasible to achieve this through MATLAB-NetSim co-simulation?
Relevant answer
Answer
Implementation of cluster-based routing can be done with the following:
  1. By creating a custom routing algorithm and replacing the original protocol with this new algorithm, in NetSim source code.
  2. Alternatively, you can interface with MATLAB (or Python) by writing the code in MATLAB, passing the necessary parameters to MATLAB from NetSim, and retrieving the output from MATLAB for use in NetSim. One such example related to cluster-based routing is provided here- https://github.com/NetSim-TETCOS/Clustering_in_VANETs_v13.3/archive/refs/heads/main.zip.
  3. NetSim File Exchange projects (https://www.tetcos.com/file-exchange.html), contain examples related to clustering in IoT/WSN. With some adjustments, these concepts can be adapted for VANET applications from the context of WSN. For reference: https://tetcos.com/pdf/v13.3/Dynamic_Clustering_in_WSN_v13.3.pdf
  • asked a question related to Internet of Things
Question
8 answers
Hello Folks!
IoT security is becoming a key area of research these days. However, to move into a certain direction of research is hard to decide before knowing its value in the future.
What do you think? What are the new trends and hot topics in IoT security?
Relevant answer
Answer
iRecently, one very popular topic of research that joins together IoT, security and machine learning is detection of anomalies (malicious or technical) from network traffic. In the past anomaly detection was more restricted to malware, and used mostly signature-based and behavior-based methods. Current, machine-learning methos have taken over the state of the art and are not restricted to malware or malicious attacks, but can detect operational problems and other physical failures of the system. It is not restricted to IoT, but as many network topics, IoT scalated existing problems with sheer numbers and network heterogeneity.
If you look for papers with any combination of the following keywords, you will find an increasingly big number of studies:
Anomaly detection, network traffic, ids, ddos, machine-learning, classification and mitigation.
Finally, a very popular survey on the topic can be found below:
FFFFFinally,
  • asked a question related to Internet of Things
Question
1 answer
what is the Internet of Behaviour and how much its market is expected to grow in the coming years?
Relevant answer
Answer
Dear Masarat Kudle,
The growth of the IoB market will depend on several factors, including technological advancements, regulatory developments, and consumer acceptance. Companies in sectors like marketing, healthcare, retail, and smart cities are particularly interested in leveraging IoB to enhance customer experiences, improve services, and drive business outcomes.
  • asked a question related to Internet of Things
Question
3 answers
What is the type of architecture in embedded system and what is IoT and explain different characteristics of an IoT system?
Relevant answer
Answer
The Harvard architecture in embedded systems architecture is a computer architecture that has separately placed memory areas of data and instructions of the system. The CPU of this architecture includes separate storage and memory that are accessed differently. Embedded systems architecture types can be classified into four groups: simple, monolithic, microkernel, and modular. Simple architecture is the simplest of all architectures. It contains a single processor and a small amount of memory. The architecture of an embedded system is centered around its microcontroller, also sometimes referred to as the microcontroller unit (MCU), typically a single integrated circuit containing the processor, RAM, flash memory, serial receivers and transmitters, and other core components. These systems are so scalable and reliable. Works on wide variety of sectors and environments. Improve product quality and enhance performance. The internet of things, or IoT, is a network of interrelated devices that connect and exchange data with other IoT devices and the cloud. IoT devices are typically embedded with technology such as sensors and software and can include mechanical and digital machines and consumer objects. The Internet of Things (IoT) describes the network of physical objects—“things”—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet. The bottom layer has container management, platform management, and IoT orchestration elements. Messaging to connected devices is facilitated through the communication layer, while the core layer handles configuration management, OTA services, and messaging.
  • asked a question related to Internet of Things
Question
2 answers
How does Federated Meta-learning can enable joint management of ressources in the MEC IOT ?
Relevant answer
Answer
Dear Bakhit Amine Adoum,
this ETSI document may help you:
ETSI White Paper No. 59:
Enabling Multi-access Edge Computing in Internet-of- Things: how to deploy ETSI MEC and oneM2M; June 2023
Best regards
Anatol Badach
  • asked a question related to Internet of Things
Question
8 answers
What is the role of sensors in precision agriculture and components of IoT based agriculture monitoring system?
Relevant answer
Answer
Electrochemical Sensors provide key information required in precision agriculture: pH and soil nutrient levels. Sensor electrodes work by detecting specific ions in the soil. Currently, sensors mounted to specially designed “sleds” help gather, process, and map soil chemical data. This sensor provides information such as air temperature, soil temperature at various depths, rainfall, leaf wetness, chlorophyll, wind speed, dew point temperature, wind direction, relative humidity, solar radiation, and atmospheric pressure is measured and recorded at scheduled intervals. Precision agriculture sensors are very efficient in agriculture because they transmit data that helps farmers not only to monitor but also to improve their products and keep abreast of changes in the field and ecosystem. It can minimize the use of pesticides, effectively control weeds and pests, and achieve efficient green precision agriculture. WSN can sense and collect real-time data of various information changes in the process of agricultural production and provide timely feedback to the users. In IoT, sensors are used to collect data from various sources and send it to cloud-based platforms for analysis. The data collected by sensors are used to monitor and control various systems, including environmental conditions, traffic patterns, and equipment performance. Microcontroller on Arduino uno and Node MCU ESP8266 platform is used to implement the control unit. The setup uses soil moisture sensors which measure the exact moisture level in soil & also it contains Humidity and Temperature Sensor DHT11 for Online monitoring of system. CropSpec sensors measure plant reflectance to determine chlorophyll content, which correlates to nitrogen concentration in the leaf.n IoT-based smart farming, a system is built for monitoring the crop field with the help of sensors (light, humidity, temperature, soil moisture, etc.) and automating the irrigation system. The farmers can monitor the field conditions from anywhere. These precision agriculture sensors are used to determine the variety, distance, and height of any position within the required area. They take the help of GPS satellites for this purpose. They are installed on tractors and other field equipment to check equipment operations. The data collected by the IoT sensors can provide a real-time picture of what's going on in the field. This means that farmers will be able to know when their crops are ripe, how much water is being used and if an irrigation system is needed, soil health, and whether they need more fertilizer or any other input. This smart agriculture using IOT system is powered by Arduino, it consists of Temperature sensor, Moisture sensor, water level sensor, DC motor and GPRS module. When the IOT based agriculture monitoring system starts it checks the water level, humidity and moisture level. IoT agricultural solutions consist of multiple monitoring, controlling, and tracking applications that measure several types of variables such as air monitoring, temperature monitoring, humidity monitoring, soil monitoring, water monitoring, fertilization, pest control, illumination control, and location tracking. One can connect IoT-based agriculture sensors, such as temperature and moisture sensors in agriculture for environmental monitoring applications. The sensors can ensure fine dust, high-pressure spray, submersion in water, and extreme temperatures. Precision agriculture sensors are very efficient in agriculture because they transmit data that helps farmers not only to monitor but also to improve their products and keep abreast of changes in the field and ecosystem. Smart sensors in agriculture collect data to help farmers in monitoring and optimize their crops while being kept updated on the changing environmental and ecosystem factors. Smart sensors in agriculture collect data to help farmers in monitoring and optimize their crops while being kept updated on the changing environmental and ecosystem factors. The system uses various sensors to monitor environmental conditions in real-time. The data collected is processed by a microcontroller and transmitted wirelessly to a web application that provides farmers with visualized information about their crops. This system uses different components like DHT11 sensor, Soil Moisture sensor, Gsm Modem, ultrasonic sensor etc. and according to this sensor parameters farmer are provided an automated way to irrigate their fields and monitor the tank.To predict production rate of the crop artificial network use information collected by sensors from the farm. This information includes parameters such as soil, temperature, pressure, rainfall, and humidity. The farmers can get an accurate soil data either by the dashboard or a customized mobile application.
  • asked a question related to Internet of Things
Question
2 answers
What is the blockchain architecture for IoT and can blockchain technology protect data confidentiality?
Relevant answer
Answer
Dear prof. Rk Naresh,
Info presented below may be helpful:
Blockchain architecture for IoT (Internet of Things) involves integrating blockchain technology into the IoT ecosystem to enhance security, data integrity, and trust among interconnected devices. IoT refers to the network of physical objects or "things" embedded with sensors, software, and other technologies that enable them to collect and exchange data over the internet. Blockchain, on the other hand, is a distributed and immutable ledger technology that can help address some of the security and privacy challenges in the IoT landscape.
The basic components of a blockchain architecture for IoT include:
  1. IoT Devices: These are the physical devices that gather and transmit data. They can range from sensors and actuators to wearable devices and industrial equipment.
  2. Data Collection and Transmission: IoT devices collect and transmit data over various communication protocols, such as Wi-Fi, Bluetooth, Zigbee, or cellular networks.
  3. Blockchain Network: A decentralized network of computers (nodes) that work together to maintain a shared ledger. Each node stores a copy of the blockchain, and consensus mechanisms are used to agree on the validity of transactions.
  4. Smart Contracts: Self-executing contracts with predefined rules and conditions. These contracts can automate processes based on data inputs and trigger actions when certain conditions are met.
  5. Consensus Mechanisms: Algorithms used to ensure that all nodes in the network agree on the state of the blockchain. Common mechanisms include Proof of Work (PoW), Proof of Stake (PoS), and others.
  6. Data Encryption: To ensure data privacy during transmission and storage, encryption techniques are used to protect data from unauthorized access.
  7. Private and Public Chains: Depending on the use case, blockchain networks can be public (open to anyone) or private (restricted to a specific group). Private chains might be preferred for certain IoT applications where data confidentiality is crucial.
  8. Data Integrity and Immutability: Once data is recorded on the blockchain, it becomes nearly impossible to alter or delete it, ensuring the integrity of the data.
Blockchain technology can indeed contribute to protecting data confidentiality in IoT by providing the following benefits:
  1. Decentralization: Traditional centralized systems are more susceptible to breaches as a single point of failure can compromise the entire system. Blockchain's decentralized nature reduces this risk.
  2. Data Encryption: Data can be encrypted before being stored on the blockchain, and only authorized parties with the decryption keys can access the data.
  3. Access Control: Blockchain-based systems can implement fine-grained access control mechanisms, ensuring that only authorized parties can access specific data.
  4. Immutable Audit Trail: Any data modification or access can be recorded on the blockchain, creating an audit trail that enhances accountability and reduces unauthorized tampering.
  5. User Consent Management: Blockchain can facilitate transparent and secure management of user consent for data sharing, enhancing user privacy.
While blockchain technology can enhance data confidentiality, it's important to note that it's not a one-size-fits-all solution. The architecture and implementation need to be tailored to the specific requirements and constraints of the IoT application. Additionally, blockchain technology also introduces challenges such as scalability, energy consumption (for PoW-based blockchains), and complexity in managing distributed networks. Therefore, a careful analysis of the trade-offs is necessary when considering blockchain for IoT applications.
  • asked a question related to Internet of Things
Question
17 answers
What is an embedded system on an IoT device and primary hardware components of an embedded system?
Relevant answer
Answer
Embedded systems are standalone devices that have usually been designed to do one specific thing. An IoT embedded system is an embedded system that also has connectivity to the internet and can therefore communicate with other IoT embedded systems. Embedded systems are ubiquitous in IoT devices. Combined with software, dedicated systems for IoT usage employ microcontrollers and microprocessors to enable the networked devices to communicate. The other difference between an embedded system and IoT is that IoT refers more to a class of devices that represent the newly connected world. But an embedded system refers very specifically to the hardware used in these devices. Embedded systems are commonly found in consumer, industrial, automotive, home appliances, medical, and telecommunication, commercial, aerospace and military applications. Generally, an embedded system comprises power supply, processor, memory, timers, serial communication ports and system application specific circuits. Embedded systems can be classified into different types based on performance, functional requirements and performance of the microcontroller. Embedded systems are rapidly changing the future of technology, and their growth is set to continue at a fast pace in India. The integration of embedded systems with new technologies such as IoT, AI, and automation is expected to lead to a new era of innovation and disruption in various industries. An embedded system is a microprocessor-based computer hardware system with software that is designed to perform a dedicated function, either as an independent system or as a part of a large system. At the core is an integrated circuit designed to carry out computation for real-time operations. The processor is the main part of embedded systems hardware architecture, and architecture defines how the hardware and software components must interact with each other. A well-designed architecture enables the creation of energy-efficient systems capable of executing real-time applications.
  • asked a question related to Internet of Things
Question
5 answers
What are the characteristics of an embedded system and how many layers are there in the IoT device architecture?
Relevant answer
Answer
Generally, an embedded system comprises power supply, processor, memory, timers, serial communication ports and system application specific circuits. Embedded systems can be classified into different types based on performance, functional requirements and performance of the microcontroller. This type of system makes sure that all critical processes are completed within the given time frame. This means that all the delays in the system are strictly time bound. Also, there is little to no secondary memory and data is stored in short term memory or read only memory. So we can define an embedded system as a Microcontroller based, software driven, and reliable, real-time control system. An IoT embedded system is an embedded system that has internet connectivity. Another word for what is IoT embedded system is a "smart" device. A touch screen and a keyboard are not necessary to define a device as an IoT embedded system, although these peripherals can also be attached. Four-layer architecture is the standard and most widely accepted format. As you can see from the above image, there are four layers present i.e., the Perception Layer, Network Layer, Processing Layer, and Application Layer. IoT architecture can comprise up to seven layers, which are known as the perception, transport, edge, processing, application, business, and security layers.
  • asked a question related to Internet of Things
Question
3 answers
What is the role of Blockchain in the Internet of Things IoT and how blockchain is enhancing security of IoT devices?
Relevant answer
Answer
Blockchain technology can be used in IoT to provide a secure and transparent platform for storing and sharing IoT data, and to enable secure and authenticated transactions between IoT devices. An IoT-enabled blockchain can store the temperatures, position, arrival times, and status of shipping containers as they move. Immutable blockchain transactions help ensure that all parties can trust the data and take action to move products quickly and efficiently. A blockchain is a database ledger, which is decentralized, shared, distributed, and immutable. All transactions or data are stored in chronological order, in a set of participating computer memories (called nodes) that are tamper-proof. Blockchain is ideal for delivering that information because it provides immediate, shared and completely transparent information stored on an immutable ledger that can be accessed only by permission network members. A blockchain network can track orders, payments, accounts, production and much more. One of the most significant advantages of blockchain technology in securing IoT data is its decentralized nature. Unlike traditional centralized systems, where data is stored on a single server, blockchain data is distributed across a network of computers, making it more resilient to attacks. The future of IoT depends on blockchain because it can keep a record of each transaction mode on IoT. It can also make transactions secure in such a way that data cannot be altered. Blockchain technology is the most ground-breaking and revolutionary technology in recent years. Blockchain can potentially change how we use the internet by offering a secure, decentralized platform for performing transactions and storing data. Blockchain technology can improve the security of Internet of Things (IoT) devices by providing enhanced data privacy. Its decentralized nature also makes it difficult for hackers to target a single point of vulnerability. Blockchain is a distributed ledger technology that combines with IoT to make machine-to-machine transactions possible. It uses a set of transactions that are recorded in a database, verified by multiple sources and entered in a common ledger distributed across every node. Blockchain and IoT can improve supply chain efficiency by eliminating the middleman, increasing transaction speed, and lowering costs. Fees are paid with each hop in a typical supply chain transaction, which takes four or five hops to validate. For IoT safety, the blockchain is able to monitor the information collected by the sensors, without allowing them to be duplicated by any wrong data. Sensors can also transfer data using Blockchain technology, without the need for a trusted third party.
  • asked a question related to Internet of Things
Question
3 answers
How can technology improve productivity in manufacturing and how can IoT help improve the efficiency and productivity of manufacturing processes?
Relevant answer
Answer
IoT technology in the manufacturing industry lets businesses implement digital transformation. The technology includes advanced sensor devices, gateway connectivity, and a dashboard for the managers to simplify their workload and improve all aspects of industrial production. Enhanced Productivity IoT devices can monitor equipment and processes in real-time, providing valuable data that can be used to streamline operations, reduce waste, and increase output. According to a study by the MPI Group, factories implementing IoT solutions have seen a 72% increase in productivity. Automation technologies can improve manufacturing productivity by streamlining processes and increasing efficiency. As, robotics and automation can reduce the risk of human error and omissions resulting in product defects. IoT sensors are paramount for collecting essential information and sending data to the cloud for analysis in manufacturing. By analyzing data compiled from the sensors, businesses can create solutions that improve productivity, avoid costly unplanned downtime, and reduce the expense of manufacturing. IoT enables machines to complete tedious tasks without human intervention. Companies can automate processes, reduce labor costs, cut down on waste and improve service delivery. IoT helps make it less expensive to manufacture and deliver goods, and offers transparency into customer transactions. Technology can automate the workflow of almost any function in a business, such as finance, marketing, operations, and workplace management. Technology can turn inefficient, tedious tasks into a seamless and automated process. This frees up time for your team and allows them to be more productive. In economics, it is widely accepted that technology is the key driver of economic growth of countries, regions and cities. Technological progress allows for the more efficient production of more and better goods and services, which is what prosperity depends on. Technology can play an important role in creating lean and efficient processes. It can help you reduce or eliminate duplications and delays in the workflow, as well as help you speed up by automating specific tasks. Here are three areas where efficiencies can be created by using technology. Information technology has enabled businesses to attain a greater reach. Now more than ever, it's easier for companies to do business across the world. Emails, text, instant messaging, websites and applications have made global communication quicker and more effective than ever.
  • asked a question related to Internet of Things
Question
3 answers
Which are the sensors can be used in agriculture in IoT and use of sensors in the field of automation and control?
Relevant answer
Answer
One can connect IoT-based agriculture sensors, such as temperature and moisture sensors in agriculture for environmental monitoring applications. The sensors can ensure fine dust, high-pressure spray, submersion in water, and extreme temperatures. The technology consists of a sensor or series of sensors that measure the level and moisture content in grains, such as corn. This information is then relayed back to an app on a tablet or computer where it can be viewed by the farmer for analysis. Electrochemical Sensors provide key information required in precision agriculture: pH and soil nutrient levels. Sensor electrodes work by detecting specific ions in the soil. Currently, sensors mounted to specially designed “sleds” help gather, process, and map soil chemical data. In addition to monitoring the plants that are harvested, temperature sensors observe the equipment that gathers these plants. Temperature sensors send out alerts whenever an equipment system requires minor maintenance, is underperforming, or is critically failing.Agriculture through precision agriculture implements IoT through the use of robots, drones, sensors, and computer imaging integrated with analytical tools for getting insights and monitoring the farms. Placement of physical equipment on farms monitors and records data, which is then used to get valuable insights. Sensors play a crucial role by detecting and measuring a variety of parameters such as temperature, pressure, humidity, flow rate, motion, and position. They convert physical signals into electric signals and provide information in real-time to the control system, thereby making production intelligent and automated.
  • asked a question related to Internet of Things
Question
3 answers
What is the purpose of smart plant monitoring system and what are the applications of IoT in environmental monitoring?
Relevant answer
Answer
The IoT-based Smart Plant Monitoring System is designed to monitor and maintain the growth and health of plants. The system works by collecting data from various sensors and then sending that data to a mobile application through the internet.This system is very used in few areas like nursery farms and in agriculture. In this system a mechanism is established to find the moisture content in the soil with the help of soil moisture sensor and depending upon the condition of the sensor the water is controlled. The set up uses the temperature sensor, moisture sensor and humidity sensor which measure the approximate temperature, moisture and humidity in the soil. This value enables the system to use appropriate quantity of water which avoids over/under irrigation. Monitoring systems are responsible for supervising the technology a company makes use of in order to analyze its performance, and to detect and alert about possible errors. The applications of IoT in environmental monitoring are broad − environmental protection, extreme weather monitoring, water safety, endangered species protection, commercial farming, and more. In these applications, sensors detect and measure every type of environmental change. Environmental monitoring is to manage and minimize the impact an organization's activities have on an environment, either to ensure compliance with laws and regulations or to mitigate risks of harmful effects on the natural environment and protect the health of human beings.A combination of sensors in different capacities throughout the city for various tasks such as managing the traffic, handling waste management, optimizing streetlights, saving water, monitoring energy expenditure, creating smart buildings, and more. IoT is used in various applications like smart home, smart parking, smart water level monitoring, smart healthcare, smart traffic lighting, smart waste management, smart solar panels, etc.
  • asked a question related to Internet of Things
Question
3 answers
What are the sensors used in IoT based smart irrigation system and what are the applications of smart plant monitoring system using IoT?
Relevant answer
Answer
The set up uses the temperature sensor, moisture sensor and humidity sensor which measure the approximate temperature, moisture and humidity in the soil. This value enables the system to use appropriate quantity of water which avoids over/under irrigation. Smart irrigation technology uses weather data or soil moisture data to determine the irrigation need of the landscape. Smart irrigation technology includes: These products maximize irrigation efficiency by reducing water waste, while maintaining plant health and quality. The smart irrigation system uses this information to adjust the amount of water it delivers and when it delivers it. System sensors range in type and purpose. They include rain sensors, soil moisture sensors, weather sensors, flow sensors, and others. In smart irrigation system using IOT it contains solar panel, charge controller, battery, Arduino, Ethernet shield, relay, soil moisture sensor, humidity sensor and DC pump. The solar which acts as a source and generates electricity. These charges are stored in the battery via charge controller. Electrochemical Sensors provide key information required in precision agriculture: pH and soil nutrient levels. Sensor electrodes work by detecting specific ions in the soil. Currently, sensors mounted to specially designed “sleds” help gather, process, and map soil chemical data. These include a smart controller, rain sensors, flow sensors, and moisture sensors. As a property manager, you can use all four together to get the most out of your irrigation system. The proposed irrigation system pumps the water to the crop based on the type, area, and date of the plantation of the crop, and these parameters are registered by the farmer through the IoT-based Android App. Temperature, proximity, gas, smoke, and water and air quality sensors provide the input data for environmental monitoring applications. A sensor is a physical device for example a motion detector or a light switch that converts physical events or characteristics. Rain sensors comprise discs that stop or delay the irrigation cycle when they get wet. The primary benefit is water-saving, as the rain will substitute the next irrigation cycle. This automated irrigation system is easily controlled using a computer. It behaves as an intelligent switching system that detects the soil moisture level and irrigates the plant if necessary. This will also save time and energy, as well as minimize energy loss. The IoT-based Smart Plant Monitoring System is designed to monitor and maintain the growth and health of plants. The system works by collecting data from various sensors and then sending that data to a mobile application through the internet.The plant monitoring system is helpful for watering the plants and to monitor few parameters for growth of plants. This system is very used in few areas like nursery farms and in agriculture. Granular crop-level monitoring can help growers identify and remedy problematic and potentially destructive conditions. Smart sensing helps 30MHz customers prevent sunscald, optimize nutrient and water delivery, and prevent moisture-borne diseases by tracking dew point and soil moisture. The IoT-based Smart Plant Monitoring System is designed to monitor and maintain the growth and health of plants. The system works by collecting data from various sensors and then sending that data to a mobile application through the internet.
  • asked a question related to Internet of Things
Question
2 answers
How are advanced fire safety technologies, such as early warning systems, intelligent suppression systems, and real-time data analytics, revolutionizing fire prevention, detection, and response in high-rise buildings and critical infrastructure, and what are the key challenges in integrating these technologies to ensure comprehensive and adequate fire safety measures?
Relevant answer
Answer
Dear Samsul Islam,
The link below should be relevant to your question:
_____
_____
  • asked a question related to Internet of Things
Question
2 answers
Authors are solicited to contribute to the book series by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas related to IoT, but are not limited to
  1. IoT Communication Technologies
  2. IoT Architectures & Platforms
  3. IoT Performance & Management
  4. IoT Privacy & Security
  5. IoT Embedded Systems, Sensors, Actuators
  6. Practical and Innovative Applications of IoT & IoT Networks (smart cities, smart mobility, smart home, smart health, smart grid, etc.)
  7. IoT for the industry and Business
  8. IoT operations & Interoperability
  9. Augmented Reality and virtual reality
  10. IoT & Artificial intelligence
go to www.iipseries.org for submission.
last date for submission is 31 july, 2023
Book Series Id: IIPV3EBS08_G2
kindly enter my reference id: IIPER1673412413 while submitting the chapter.
Relevant answer
Answer
Dear Anatol,
You can submit in the book series, using my reference id that is mentioned. We will check & revert you
  • asked a question related to Internet of Things
Question
1 answer
This question opens up the discussion to various sectors such as building management, industrial monitoring, agriculture, or even healthcare, where thermal imaging can provide valuable insights and enhance operational efficiency.
Relevant answer
Answer
Dear Manvitha Gali,
an interesting way of delivering Healthcare based on IoT using Human Health Digital Twins (HHDTs) illustrated Fig. 9 (Healthcare Scenario with Patient Digital Twin and Mobile Phone as Healthcare Assistant)
under the address
Best regards
Anatol Badach
  • asked a question related to Internet of Things
Question
5 answers
..
Relevant answer
Answer
You can set up digital twins using IoT simulators like NS3 or NetSim and then use ML for things like: a) Ad hoc routing: Dynamic route selection, load balancing, fault tolerance and recovery b) Energy consumption: Adaptive power management, communication protocol optimization c) Enhanced security: Modeling attacks and developing countermeasures, intrusion detection and response
  • asked a question related to Internet of Things
Question
6 answers
This research question focuses on the specific domain of cybersecurity, namely the Internet of Things (IoT). IoT devices are becoming increasingly prevalent in various sectors, including healthcare, transportation, and smart homes, but they also pose unique security risks. Investigating the emerging threats and challenges associated with securing IoT devices and networks can provide valuable insights into the vulnerabilities and potential countermeasures needed to protect these interconnected systems. This research inquiry can contribute to the development of robust security frameworks, protocols, and strategies for IoT deployments, ultimately enhancing the overall cybersecurity landscape.
Relevant answer
Answer
The emerging threats and challenges in securing Internet of Things (IoT) devices and networks revolve around the increasing complexity and scale of interconnected devices. As IoT adoption grows, the expanding attack surface provides opportunities for cybercriminals to exploit vulnerabilities, compromising the privacy, integrity, and availability of devices and networks. Common challenges include weak device authentication and authorization mechanisms, inadequate encryption and data protection practices, lack of timely security updates and patch management, and the absence of standardized security protocols across different IoT platforms. Additionally, the proliferation of heterogeneous IoT ecosystems exacerbates interoperability issues and complicates security management. Addressing these challenges requires a holistic approach, incorporating robust security measures at every stage of the IoT lifecycle, fostering collaboration among stakeholders to establish industry standards, promoting security awareness among consumers and manufacturers, and investing in research and development for innovative security technologies.
  • asked a question related to Internet of Things
Question
2 answers
Hello,
I graduated with a Master's degree in Computer Applications. I have some difficulties finding Ph.D. topics on use of IoT in smart cities.
Do you have some suggestions or ideas?
Relevant answer
Answer
Daer Rajwinder Kaur,
I would suggest a topic for your research integrating SD-IoT (Software Defined Internet of Things) and the idea of “Digital Twins in IoT”.
Some of my figures can provide ideas for the use of SD-IoT and Digital Twins in Smart Sities. See for this:
Digital Twins in IoT
Fig. 8: Example for Application of Digital Twins in Smart Cities to Monitor Building Safety usingvirtual Sensors and virtual Actuators
Fig.10: Example of using Digital Twins in Smart Cities to monitor Building Safety with Help ofvirtual Sensors and virtual Actuators
Fig. 11: Important Application Areas of Digital Twins and Examples for their Use
SD-IoT Software Defined Internet of Things
Fig. 9771: Smart City Parking System as a regional SD-IoT system
Fig. 9773: Proxy-based SD-IoT Architecture for Realizing SD-IoT Services
Fig. 9773: SDSH City Services logical Architecture with proxy-based Control of IoT Devices
See also:
Fig. 04_Logical Model of Human Cognition
Fig. 05_Model of IIoT Cognition
Fig. 10_Autonomous Driving with Def Computing
Best regards and much success Anatol Badach
  • asked a question related to Internet of Things
Question
2 answers
The journal Computer Systems Science and Engineering (CSSE. JCR Q1) published by Tech Science Press is running a new Special Issue entitled "Al and IoT Empowered Unmanned Autonomous Systems".
Leading Guest Editor: Dr. Zain Anwar Ali
Guest Editors: Prof. Tarik A. Rashid, Prof. Muhammad Salman Pathan
The topics are as follows, but not limited to:
• Intelligent Control Algorithms
• Collision Avoidance and Tracking
• Environment Monitoring
• AI and IoT-based Fault diagnosis and tolerance,
• Adaptive Control Techniques for Unmanned Systems
• Internet of Robotic Things (IoRT)
Relevant answer
Answer
I think the author of this Wired Magazine article would be able to give an excellent presentation on the Topic, if you can get him to participate.
This is a very hot topic right now.
  • asked a question related to Internet of Things
Question
7 answers
Cloud Computing, Big Data, IoT
Relevant answer
Answer
A mechanism to defend attacks based on the Training Data might be of interest. You might find the article below relevant, and it has some interesting references you might want to contact.
This is a very hot topic right now.
  • asked a question related to Internet of Things
Question
32 answers
Currently l am thinking of perusing research computing, ideal area cybersecurity problems and IoT, so far proposed research title "security risk assessment in IoT systems: Data privacy and security" any suggestions please experts
Relevant answer
Answer
There are many current problems in cybersecurity and IoT, some of which include:
1. Device vulnerabilities: IoT devices are often designed with weak security, making them an easy target for hackers.
2. Distributed Denial-of-service (DDoS) attacks: These attacks are increasing in frequency and are becoming more sophisticated, making them difficult to prevent.
3. Lack of standards: There is currently a lack of industry-wide standards for IoT security, making it difficult for manufacturers to ensure that their devices are secure.
4. Data privacy: IoT devices often collect and store large amounts of data, putting personal and sensitive information at risk.
5. Insider threats: Employees, contractors, and other insiders can pose significant security risks to IoT systems, as they can intentionally or inadvertently cause data breaches.
6. Cloud security: Many IoT devices rely on cloud services to operate, making them vulnerable to cloud-based attacks.
To address these problems, it is important for businesses and individuals to implement strong cybersecurity measures, such as strong passwords, encryption, and regular updates. Additionally, industry-wide standards and regulations can help ensure that IoT devices are designed and manufactured with security in mind.@
  • asked a question related to Internet of Things
Question
31 answers
In your opinion, the impact of chatGPT on the future of humanity can be positive or negative, and what impact can it have on education?
Relevant answer
Answer
ChatGPT, or any AI chatbot for that matter, has the potential to significantly impact the future of humanity in both positive and negative ways.
Positive impacts:
1. Improved accessibility to information: With an AI-powered chatbot like ChatGPT, people can easily access a wide range of information and answers to their questions without having to spend a lot of time searching for it.
2. Enhanced productivity: ChatGPT can quickly provide answers to common questions, which can save people time and increase productivity.
3. Better customer service: Companies can use AI chatbots like ChatGPT to provide better and faster customer support.
Negative impacts:
1. Dependence on technology: As people become more reliant on technology, they may lose some of their critical thinking skills and analytical abilities.
2. Job displacement: ChatGPT and other AI technologies could potentially replace human workers in certain job types, leading to significant unemployment.
3. Privacy concerns: AI chatbots require access to user data to function, which could potentially lead to privacy violations.
Overall, the impact of ChatGPT on the future of humanity will depend on how it is developed and implemented. If used responsibly and ethically, it could provide significant benefits. However, if not properly regulated, it could also create some negative consequences.
  • asked a question related to Internet of Things
Question
4 answers
How can AI be integrated with other emerging technologies in agriculture, such as blockchain and the internet of things (IoT)?
Relevant answer
Answer
AI/ML together with IoT is proving a powerful force for building connections between the monitoring, predictive and operationalisation decision making. These connections enable on the ground decisions in relation to farm operation to be optimised and enhanced in areas such as irrigation, fertilising etc.
  • asked a question related to Internet of Things
Question
6 answers
When simulating a wireless sensor network in NetSim, what are the parameters to vary to increase/decrease the communication range of the sensors? How is the default range calculated? How can I modify the GUI grid size (environment) in proportion to the communication range?
Relevant answer
Answer
Hello,
You can look through the comprehensive documentation provided by NetSim support. It explains the different nuances involved in obtaining the radio communication range or transmission range.
Here is the link:
Thanks,
Anthony
  • asked a question related to Internet of Things
Question
4 answers
How can we use sensors and other IoT devices to collect real-time data on soil moisture, temperature, and other environmental factors that affect crop growth?
Relevant answer
Answer
Farmers use manual intervention to control the greenhouse environment. The use of IoT sensors enables them to get accurate real-time information on greenhouse conditions such as lighting, temperature, soil condition, and humidity. Thermistors are really popular IoT temperature sensors due to their small size and low power consumption. They are also highly accurate and reliable. Other types of temperature sensors are thermocouples, resistance temperature detectors (RTDs), and infrared temperature sensors. The soil moisture sensor is a simple device for measuring the moisture level in soil and similar materials. The soil moisture sensor is straight forward to use. The two large exposed pads function as probes for the sensor, together acting as a variable resistor. Volumetric moisture sensors for soil determine the water-to-soil volume percentage. Two common varieties of volumetric sensors are neutron probes and electromagnetic sensors. Agriculture sensors such as air temperature and humidity, soil moisture, soil pH, light intensity, and carbon dioxide are often used to collect data in all aspects of crop growth such as nursery, growth, and harvest. Agricultural conductivity and agricultural pH sensors are used to monitor water and fertilizer. The Dragino N95S31is a NB-IoT Temperature and Humidity Sensor for Internet of Things solution. It is used to measure the surrounding environment temperature and relative air humidity precisely, and then upload to IoT server via NB-IoT network. An IoT ecosystem consists of web-enabled smart devices that use embedded systems, such as processors, sensors and communication hardware, to collect, send and act on data they acquire from their environments. The applications of IoT in environmental monitoring are broad − environmental protection, extreme weather monitoring, water safety, endangered species protection, commercial farming, and more. In these applications, sensors detect and measure every type of environmental change.
  • asked a question related to Internet of Things
Question
5 answers
I'm looking for a simulator or emulator to validate an approach that solves cascading failures on interdependent IoT devices, so I'm wondering if there is one that can simulate failures and dependencies between IoT devices?
Relevant answer
Answer
There are several simulators and emulators available for IoT devices that can simulate failures and dependencies between devices. Here are a few options that you can explore:
  1. Contiki: Contiki is an open-source operating system for the Internet of Things (IoT) that comes with a network simulator called Cooja. Cooja is an emulator that allows you to simulate a network of IoT devices and their interactions.
  2. OMNeT++: OMNeT++ is a discrete event simulation framework that is widely used for modeling and simulating complex networks. It includes a suite of tools and libraries for building and simulating networked systems, including IoT devices.
  3. NS-3: NS-3 is another popular discrete-event network simulator that is widely used for research and education. It includes support for simulating IoT devices and their interactions.
  4. IoT-LAB: IoT-LAB is a large-scale IoT testbed that provides a platform for testing and validating IoT applications and services. It includes a range of IoT devices that can be configured and programmed to simulate various failure scenarios.
  5. Eclipse Mosquitto: Eclipse Mosquitto is an open-source message broker that supports the MQTT protocol, which is widely used in IoT applications. It includes support for simulating various network failure scenarios, such as network latency, packet loss, and connectivity issues.
  • asked a question related to Internet of Things
Question
2 answers
I am searching a postdoc position in IoT or WSN and some stuff like that.
Relevant answer
Answer
The best is if search the positions in LinkedIn or else, by contacting the professors directly.
  • asked a question related to Internet of Things
Question
2 answers
What are some potential business opportunities that can be created by implementing a smart water quality prediction system for biofloc aquaculture, and how can they be leveraged to create a competitive advantage in the aquaculture industry?
Relevant answer
Answer
Implementing a smart water quality prediction system for biofloc aquaculture can create several potential business opportunities, including:
  1. Improved production efficiency: By using a smart water quality prediction system, biofloc aquaculture farmers can optimize their production processes by predicting and managing water quality parameters such as dissolved oxygen, pH, temperature, and ammonia levels. This can lead to higher survival rates, faster growth rates, and reduced feed conversion ratios, all of which can improve production efficiency and profitability.
  2. Reduced operational costs: With a smart water quality prediction system, farmers can reduce operational costs by automating water quality monitoring and management. By using real-time data, farmers can adjust feed rates, aeration systems, and other parameters to ensure optimal conditions for their fish, reducing the need for manual labor and minimizing waste.
  3. Improved product quality: A smart water quality prediction system can help farmers maintain consistent water quality parameters, which can improve the health and growth of their fish and reduce the risk of disease outbreaks. This can lead to higher-quality products that command a premium price in the market.
  4. Increased sustainability: By using a smart water quality prediction system, biofloc aquaculture farmers can reduce their environmental impact by minimizing the amount of feed and energy required to maintain optimal water quality conditions. This can improve the sustainability of the aquaculture industry and appeal to environmentally conscious consumers.
To leverage these opportunities and create a competitive advantage in the aquaculture industry, biofloc aquaculture farmers can:
  1. Differentiate their products: By using a smart water quality prediction system to improve production efficiency and product quality, farmers can differentiate their products from those of their competitors. This can help them command a premium price in the market and increase customer loyalty.
  2. Enhance their brand image: By promoting their use of a smart water quality prediction system and highlighting their commitment to sustainability and environmental responsibility, farmers can enhance their brand image and appeal to consumers who prioritize these values.
  3. Improve their supply chain efficiency: By using a smart water quality prediction system to optimize their production processes and reduce operational costs, farmers can improve their supply chain efficiency and compete more effectively on price.
  4. Expand their market reach: By producing high-quality, sustainable products, farmers can expand their market reach and appeal to a wider range of customers, including those who are willing to pay a premium for premium-quality, environmentally responsible products.
  • asked a question related to Internet of Things
Question
8 answers
I want to build system model consist of IoT devices, mobile edge computing servers, cloud
and I want to sending multiple random request from IoT devices , and work some algorithm on the mobile, what is the best simulation i can work with it
Relevant answer
Answer
Hello Fatima Aziz ,
You're welcome! Most of the simulators mentioned can indeed work with offloading algorithms or custom algorithms you write. To integrate your algorithm into the simulator, you may need to create a custom module or modify existing modules to fit your needs.
For instance, in ns-3, you can create custom application modules to implement your offloading algorithm, while in OMNeT++, you can extend existing modules or create new ones to incorporate your algorithm. In iFogSim and EdgeCloudSim, you can implement your offloading algorithm as part of the resource management and scheduling policies.
Regarding Mininet, while it is primarily focused on SDN, you can integrate it with other tools to create an environment that supports mobile edge computing. You might need to explore additional resources, such as ONOS (Open Network Operating System) or OpenDaylight, to create an SDN-based mobile edge computing environment in Mininet.
As you mentioned, exploring the documentation and example scenarios for each simulator will be helpful. Many simulators have active communities and mailing lists where you can ask for help or find resources related to your specific use case.
Good luck with your project.
Best regards!
  • asked a question related to Internet of Things
Question
3 answers
An IoT-based system uses ESP32, ESP8266, PZEM 004T, and other sensors, software, and smart devices to collect data on energy consumption, production, and distribution in a smart microgrid and process this data to provide a perception of energy use and optimize energy management.
Relevant answer
Answer
The PZEM004T energy monitor sensor is a highly useful component for smart microgrid energy monitoring. This sensor can measure various electrical parameters, including voltage, current, power, energy, and frequency, which are essential in monitoring energy consumption and production in a smart microgrid. By measuring these parameters accurately, the sensor can provide insights into energy usage patterns, identify potential energy wastage, and help optimize energy management in the microgrid.
In combination with other sensors, smart devices, and software, the PZEM004T energy monitor sensor can provide a comprehensive and real-time view of the microgrid's energy status. This data can help microgrid operators and energy managers make informed decisions about energy management and help them identify potential problems before they become critical.
To answer your question, The PZEM004T energy monitor sensor is an important component of an IoT-based smart microgrid energy monitoring system, as it provides essential data to optimize energy management, improve energy efficiency, and reduce energy costs.
  • asked a question related to Internet of Things
Question
5 answers
How benefits, doing agriculture with IoT and what is the challenges of IoT?
Relevant answer
Answer
IoT-based smart farming, a system is built for monitoring the crop field with the help of sensors and automating the irrigation system. IoT in agriculture uses robots, drones, remote sensors, and computer imaging combined with continuously progressing machine learning and analytical tools for monitoring crops, surveying, and mapping the fields, and providing data to farmers for rational farm management plans to save both time and money. IoT ensures accurate and efficient communication to farmers of real time data related to dynamic agricultural processes weather forecasts, soil quality, and availability and cost of labor.
  • asked a question related to Internet of Things
Question
4 answers
i want search all research paper on IoT with artificial intelligence technology year 2017 .i got 1000+ result how to clarify it is right or not result ?
Relevant answer
Answer
You have to read the paper to know if it is correct or not..
  • asked a question related to Internet of Things
Question
7 answers
Although the application of IoMT technologies to healthcare brings many benefits, it also brings great security challenges. Other IoT devices are also exposed to security threats, but the consequences that can arise are much greater in the case of attacks on IoMT devices, since they can also cause loss of human life. Further development of IoMT devices will have to ensure adequate mechanisms to protect the security of the users of these devices.
Relevant answer
Answer
There is no one technology that can completely improve the security of the medical Internet of Things (IoT) on its own. Instead, a combination of technologies, processes, and best practices is necessary to ensure the security of medical IoT devices and networks. However, some important technologies that can contribute to improving the security of medical IoT include:
  1. Blockchain: Blockchain technology can help to create a secure and decentralized network for storing and transmitting medical data. This can help to prevent unauthorized access and tampering of data.
  2. Artificial Intelligence (AI): AI can be used to detect and prevent cyberattacks on medical IoT devices and networks. It can also help to identify and respond to anomalies in the system that may indicate a security breach.
  3. Secure Boot: Secure boot is a process that verifies the integrity of the software running on a device when it is turned on. This can help to prevent malicious software from being installed on the device.
  4. Encryption: Encryption is a method of converting data into a code that can only be deciphered by authorized parties. It can help to protect medical data as it is transmitted over the internet.
  5. Multi-Factor Authentication (MFA): MFA is a security process that requires users to provide more than one form of identification to access a device or network. This can help to prevent unauthorized access to medical IoT devices and networks.
  • asked a question related to Internet of Things
Question
14 answers
Dear RG community
I am writing the final paper of my Ph.D. thesis.
My final contributions are related to each other; I wanted to express both of these contributions in one article. Still, the number of pages increased significantly, so I want to publish the article in two parts. The first part and the second part, do you think this is possible?
I wanted to know what the protocol for a two parts article is.
I would be happy if you could explain how to write an article in two separate parts.
Relevant answer
Answer
I recommend you to publish your article in journals related to your especilast scopus journals where their are familar reviewers
  • asked a question related to Internet of Things
Question
5 answers
Health 4.0 is a term used to describe the integration of advanced technologies, such as the Internet of Things (IoT), artificial intelligence (AI), and big data analytics, into healthcare systems. The goal of Health 4.0 is to improve patient outcomes, streamline hospital operations, and reduce healthcare costs.
One of the key components of Health 4.0 is the use of electronic health records (EHRs) and other digital technologies to improve communication, collaboration, and data sharing among healthcare professionals, patients, and caregivers. This can lead to more efficient and personalized care, as well as improved patient outcomes.
Another important aspect of Health 4.0 is the use of IoT devices, such as wearable devices and remote monitoring systems, to collect real-time data on patients' health and activity levels. This data can be analyzed using AI and machine learning algorithms to identify patterns and predict potential health issues before they occur. This can help healthcare professionals to provide more targeted and proactive care to patients.
Health 4.0 also includes the use of telemedicine, which allows patients to receive medical advice and treatment remotely, either through video conferencing or through remote monitoring devices. This can improve access to healthcare for patients living in remote or underserved areas, and also allows for more efficient use of healthcare resources.
Overall, Health 4.0 is a holistic approach to healthcare that aims to improve patient outcomes and reduce costs by leveraging advanced technologies in a way that is integrated and coordinated across the entire healthcare system.
Relevant answer
Answer
Dear Professor,
Thank you for initiating a discussion on such an interesting topic.
I come from the field of Management. So, I am not directly related to this field. But, when it comes to anything regarding health, then who cannot be related. And, so I am getting into it.
When we start to talk about something like Health 4.0, we need to consider two important aspects related to it. First of all, the required infrastructure. Secondly, the finances involved. In my country (India), both these are obstacles. That Health 4.0 is not a significant matter of discussion anywhere.
I stay in Salt Lake City, Kolkata, West Bengal, in the eastern part of India. Yesterday, my 79 year old father got operated in his left eye for cataract. The surgeon was Dr. Pankaj Rupauliha. During the day, when I was there I was thinking that its been more than 75 years of independence. But still, we have not been able to help common people get access to a surgeon like Dr. Rupauliha. They have to depend on the quacks.
Best regards,
Anamitra.
  • asked a question related to Internet of Things
Question
4 answers
IoT, or the Internet of Things, refers to the network of physical devices, vehicles, buildings, and other items that are embedded with sensors, software, and connectivity which enables these objects to connect and exchange data. In the context of COVID-19, IoT can be used in a variety of ways to help mitigate the spread of the virus and support public health efforts.
One way IoT is being used in the fight against COVID-19 is through the deployment of contact tracing devices. These devices, which can be worn as wristbands or carried in a pocket, use Bluetooth technology to detect when two people are in close proximity to one another. If one person later tests positive for COVID-19, the device can alert other people who have been in close contact with that person, allowing them to get tested or quarantine as necessary.
Another way IoT is being used in the fight against COVID-19 is through the use of smart thermometers and temperature monitoring systems. These devices can be used to quickly and easily take the temperature of large numbers of people, such as at airports or other public places, to help identify potential cases of COVID-19.
IoT-enabled devices such as smart robots, drones and cameras are also utilized to sanitize and disinfect large areas such as hospitals, airports, and public places.
In summary, IoT plays a vital role in tracking, monitoring and controlling the spread of COVID-19 in various applications.
Relevant answer
Answer
  • asked a question related to Internet of Things
Question
1 answer
Edge vs Fog Computing
Velibor Bozic
When we use edge computing and when we use fog computing
Edge computing is used when data is generated and processed at the edge of a network, closer to the source of the data. This is often used in IoT (Internet of Things) devices and other devices that are not always connected to the internet, such as industrial control systems and autonomous vehicles.
Fog computing, also known as "fogging," is a type of edge computing where data processing and storage takes place at the edge of the network, but closer to the end-user than traditional edge computing. This is often used in applications such as smart cities and transportation systems, where data needs to be processed and analyzed in real-time to support decision-making and control.
In summary, Edge computing deals with data that is generated and processed at the edge of a network and is used when devices are not always connected, while fog computing is used when data needs to be processed and analyzed in real-time to support decision-making and control.
Relevant answer
Answer
Velibor Božić Yes, it is an accurate characterization of the primary distinctions between edge computing and fog computing.
Edge computing is utilized when data is created and processed near the edge of a network, such as in IoT devices and industrial control systems. The idea is to reduce the quantity of data that must be transmitted back to a centralized location for processing and storage, hence lowering latency and enhancing system responsiveness.
In contrast, fog computing is a sort of edge computing that is closer to the end user than typical edge computing. It is employed where real-time data processing and analysis is required, such as in smart cities and transportation systems. Fog computing can also serve to offload some of the cloud's processing and storage requirements, as well as give more localized data control and administration.
In summary, edge computing is concerned with data created and processed at the network's edge and is utilized when devices are not constantly connected, whereas fog computing is concerned with data that must be processed and analyzed in real-time to enable decision-making and control.
  • asked a question related to Internet of Things
Question
5 answers
Hello researchgaters,
i am looking for collegues that work on database, big data with the robotics application domains.
The goal is starting collaborations (organizing conf, papers, etc.)
Loonking for your contacts!
Relevant answer
Answer
well lets share what to plan .
We are also working on autonomous vehicle tracking and DAS.
  • asked a question related to Internet of Things
Question
3 answers
I am doing research about human activity recognition in Smart home.
to create human activity dataset (ADL)
Relevant answer
Answer
i used openHAB : Gives DATAUSER Not DATASET
THNAK U Sir
  • asked a question related to Internet of Things
Question
4 answers
Dear network,
DM if anyone is looking for a technical project to collaborate with in Bangkok, Thailand.
Project Detail on News:
Tech Stack & Team:
- Firmware
- AI
- Embedded Hardware
- AWS IoT (cloud)
- UI/UX
- PoC test
Thank you and look forward to hearing back.
Best Regards,
Navid
Relevant answer
Answer
Dear sir,
An electronic calculator developed by epidemiologists at Brock University has long been used effectively to predict lung cancer. But intelligent systems currently do not recognize many human diseases, so there are still many unsolved problems.
To carry out scientific research, outstanding specialists in electronic medicine are invited to the laboratory to analyze large amounts of data using intelligent systems. The main activity in the laboratory is the use of intelligent e-medicine systems for the analysis of large data sets in order to identify and cluster patients' diseases. The use of laboratory tools is free. Employees and the head of the laboratory do not receive a salary. Scientific research is carried out remotely without interruption from the main work. The results of scientific research will be published in popular scientific journals at the expense of grants received by laboratory staff. The results of the research are published in articles:
1. Almadi Mudar, Ryabtsev V.G. Application of e-medicine. // Published in Research Gate. – 2022. – 25 p. DOI : 10.13140/RG.2.2.26093.46565
2. Almadi Mudar, Ryabtsev V.G. Classification of tumors in human organs. // Published in Research Gate. – 2022. – 15 p. DOI: DOI: 10.13140/RG.2.2.28256.15368
3. Almadi Mudar, Ryabtsev V.G. Diagnostic’s kidney disease. // Published in Research Gate. – 2022. – 12 p. DOI: 10.13140/RG.2.2.13556.42884
4. Almadi Mudar, Ryabtsev V.G. Diagnosing liver disease. // Published in Research Gate. – 2022. – 10 p. DOI: 10.13140/RG.2.2.10620.41606
5. Almadi Mudar, Ryabtsev V.G. Intelligent lung cancer diagnosis system. // Published in Research Gate. – 2022. – 10 p. DOI: 10.13140/RG.2.2.22593.84328
6. Almadi Mudar, Ryabtsev V.G. Classification system for diseases human spine. // Published in Research Gate. – 2022. – 10 p. DOI: 10.13140/RG.2.2.14814.72009
One of our works is attached in the file.
  • asked a question related to Internet of Things
Question
12 answers
We have a scenario of one server and three clients connected in a star topology in GNS3, as shown in the attached figure. These nodes are running IoT protocols (CoAP and MQTT) using the Node-Red application installed on Xubuntu OS. What is the method (tool) to measure delay, jitter, and throughput for each protocol in this network?
Relevant answer
Answer
You could consider more professional software like NetSim or MATLAB.
  • asked a question related to Internet of Things
Question
10 answers
How can Big Data optimize urban planning and design?
Relevant answer
ان اتجاه التنمية للمدن المستقبلية من منظور الابتكار العلمي والتكنولوجي، يشير الى أن الطاقة النظيفة ستصبح الشكل الرئيس للطاقة الحضرية، واعتماد إعادة التدوير والاستخدام الفعال للموارد الاتجاه الرئيس للإنتاج الحضري
ودمج معلومات الخدمة العامة بشكل عضوي مثل النقل والاتصالات والموارد ومصادر الطاقة في المدينة، وابتكار أدوات وأفكار عمرانية جديدة للتصميم الحضري
  • asked a question related to Internet of Things
Question
5 answers
i have a research about workload in iot
Relevant answer
Answer
Use NetSim simulator tool