Figure 3 - uploaded by Simone Cirani
Content may be subject to copyright.
Similar publications
A traffic light controller takes as input an estimation of the number of vehicles entering the intersection and produces as output a light plan, with the objective to reduce the traffic jam. The quality of the input traffic estimation is a key consideration on the performance of the traffic light controller. The advent of Wireless Sensor Networks,...
Information-Centric Networking solutions target world-wide deployment in the Internet. It is hence necessary to dispose of a development and evaluation environment which enables both controllable and realistic experimentation to thoroughly understand how ICN solutions would behave in real life deployment. In this demonstration, we present an ICN de...
In this paper, a novel method for sensor node localization under mixed
line-of-sight/non-line-of-sight (LOS/NLOS) conditions based on second order
cone programming (SOCP) is presented. SOCP methods have, hitherto, not been
utilized in the node localization under mixed LOS/NLOS conditions. Unlike
semidefinite programming (SDP) formulation, SOCP is c...
Next generation cellular networks will consist of multiple tiers of cells and
users associated with different network tiers may have different priorities
(e.g., macrocell-picocell-femtocell networks with macro tier prioritized over
pico tier, which is again prioritized over femto tier). Designing efficient
joint power and admission control (JPAC) a...
In this paper, we focus on the deployment of wireless sensor nodes in an arbitrary realistic area with an irregular shape, and with the presence of obstacles that may be opaque. Moreover, we propose a simple projection-based method that tends to minimize the number of sensor nodes needed to fully cover such an area. This method starts with the opti...
Citations
... By leveraging IoT devices, businesses can optimize supply chains, reduce waste, and improve maintenance processes through predictive analytics. This connectivity not only drives efficiency but also supports sustainability initiatives by minimizing resource consumption and environmental impact [120], [121]. ...
The landscape of resource use in environmentally responsible organizational
systems has been transformed as a consequence of the integration of web-based
technologies and cloud computing, which has led to the modification of the
landscape. In order to improve the efficiency of resource allocation and utilization,
the objective of this research is to analyze the ways in which artificial intelligence
(AI), the Internet of Things (IoT), and highly developed security measures could
collaborate to achieve this goal. When it comes to sustainability, one of the most
essential factors is the ability of organizations to achieve scalable and flexible
resource management via the use of cloud infrastructure. Real-time data analytics
and automation capabilities are provided by technologies like as artificial
intelligence (AI) and the internet of things (IoT), which are designed to enhance
decision-making processes and operational efficiency. Furthermore, good security
standards ensure that the data is both accurate and private, which contributes to the
development of trust in these digital ecosystems. The objective of this study is to
examine a wide range of case studies and experimental data in order to demonstrate
how the combination of various technologies results in corporate systems that are
more environmentally friendly and effective. According to the findings, there is a
significant possibility of achieving significant cost savings, reducing the effect on
the environment, and improving overall performance. For businesses who are
striving to innovate in this era of digital change, these results give valuable insights
that were previously unavailable.
... IoT aims to make the internet immersive and pervasive through enabling easy access and interaction with a wide diversity of IoT devices as surveillance cameras, monitoring sensors, and home appliances. IoT will promote the development of several applications that utilize the gigantic and diverse amount of data, which is generated by smart devices to provide modern services for companies, citizens and organizations (Petter and Ovidui, 2014;Garda sevi c et al., 2016). ...
... IoT aims to make the internet immersive and pervasive through enabling easy access and interaction with a wide diversity of IoT devices as surveillance cameras, monitoring sensors, and home appliances. IoT will promote the development of several applications that utilize the gigantic and diverse amount of data, which is generated by smart devices to provide modern services for companies, citizens and organizations (Petter and Ovidui, 2014;Garda sevi c et al., 2016). ...
... The design proposed for our system meets the goal of the IoT, which is to enable things to be connected anytime, anyplace, with anything, and with anyone, ideally using any path or network and any service [17]. Moreover, our design is subject to client/server architecture and is based on the relationships that exist between the many applications in health monitoring [18]- [20]; i) gathering of data from sensors, ii) support of user interfaces and displays, iii) connectivity of networks and access to infrastructure services, iv) requirements of low power, robustness, durability, accuracy, and reliability. To identify the most appropriate vital parameters to reflect the human physical condition, many mobile emergency monitors and emergency case protocols have been examined [21]. ...
Chronic diseases quickly become broader public health issues because of the difficulty in obtaining appropriate, often long-term health care. So that, it requires the extension of health care for patients with chronic diseases beyond the clinic to include patient’s home and work environment. To reduce costs and provide more appropriate healthcare, we need telehealth care where internet of things (IoT) technology plays an important role. The integration of the IoT and medical science offers opportunities to improve healthcare quality, and efficiency and to better coordinate healthcare delivery at home and in the workplace. In this paper, we present the realization of a remote healthcare system based on the IoT technology. The function of this system is the transmission via a gateway of internet collected data using biomedical sensors node based Arduino board (e.g., temperature, electrical activity of the heart, heart rate monitor). These data will be stored automatically in a cloud. The health can then be monitored by the doctor or patient using a web page in real-time from anywhere at any time in the world using laptops or smart phones, etc. This method also reduces the need for direct interaction between doctor and patient.
... The rapidly growing market of wireless devices for "internet of things" [1] requires autonomous low power energy sources (~μW power) [2][3][4][5] and indoor photovoltaics (PV) can be the solution of choice because of suitable performance at standard 200-1000 lux light intensities produced by artificial light sources such as light-emitting diodes and halogen lamps. ...
The perovskite solar cell technology is showing rapid progress in delivering high power conversion efficiency. This is not limited to conventional 1 SUN illumination, but state-of-the-art results have also been also demonstrated for a low-light condition such as indoor illumination. In this work, we show that very efficient low-light perovskite solar cells can be realized in the inverted configuration with the use of NiO as a hole transporting material by employing a conventional high-temperature process (300 °C, compact NiO) or a low-temperature process (<100 °C) based on nanoparticle NiO. The power density of 90.2 μW/cm² at 1000 lux was achieved for compact NiO device, while 71.6 μW/cm² was obtained with nanoparticle NiO cells under the same illumination. A detailed electrical, optical, and morphological characterization permitted to identify the reasons for the difference between compact and nanoparticle NiO. Beside the difference in power density, nanoparticle NiO permitted to realize the first low temperature inorganic hole transporting layer for low-light p-i-n perovskite solar cell and, as we show, this could be easily scaled up to 1 cm² without suffering for performance losses moving from small to large area.
... Also, a semi versatile sink question driven model has been utilized to defeat continuously use of remote sensor system to guarantee a reasonable expense on arrangement and routing of the hubs. 13 The acknowledgment is thought by the researchers of the distinctive system structures to have a vitality effectiveness and dependability in the IOT empowered utilizing the ease gadgets. Cluster calculation is studied for more vitality versatility than the least vitality versatile grouping calculation by turning the cluster head (CH) dependent on its vitality level to have a decent vitality utilization and upgraded organize life time give the best throughput having a delay. ...
Exploration has been done on Internet of Things (IoT) with accentuation on the security like remote system security, correspondence security, sensor information security, respectability of physical signals, and impelling gadgets. The procedure for current security is not reasonable for IoT applications as gadgets that are included at the ground level have some of the restricted assets, low multifaceted nature, and vitality requirements. IoT being a system of systems permits billions of people and machines to connect with each other. IoT offers us a chance to build compelling organizations, applications for assembling, lifesaving arrangements, appropriate development, and the sky is the limit from there. The manuscript proposes a broad review of the IoT innovation and its differed applications in life sparing, brilliant urban communities, rural, mechanical by looking into the ongoing examination work. Existing strategies manage static remote sensor web to reason the interruptions in which the sensor hubs are conveyed in a uniform way to hold the consistency. Since the sensor hubs are referred to through various transmission locales having a determination of sensor checking hubs has become a difficult activity in ongoing examination. The enemies are additionally moving starting with one area then onto the next to investigate its particular tasks around the system. Hence, to given adaptable security, a protected routing along with the observing convention with multivariation tuples utilizing two‐fish symmetric key (TFSK) way to deal with the foes in the worldwide sensor organize. The proposed approach is the advanced hybrid secure multipath optimized routing in Internet of Things (IoT)‐based WSN. The two methodologies that are involved making a better routing protocol is the enhanced‐multipath optimized link state routing (E‐MP‐OLSR) and secure and efficient ad hoc on‐demand multipath distance vector (SE‐AOMDV) protocols. Besides, the proposed directing system is tough to different versatile foes; and henceforth, it guarantees multipath conveyance.
... This technology converges diverse hardware and software, enables bidirectional communication using protocols, and gives access to any device inside and outside the vehicle. The permanent connectivity enables smart information management which is the key to zero emissions and zero collisions goals [48]. ...
... On the other hand, bidirectional communication includes cellular technology for diagnostics and communications, Wi-Fi for information, DSRC for safety, NFC for authentication, and Bluetooth for entertainment. Bidirectional communication has various uses such as safety, mobility, and infotainment, each of which has different requirements for speed, security, distance, and bandwidth [48]. ...
Several converging trends appear to reshape the way citizens and goods move about. These trends are social, including urbanization and population growth, and technological, such as increased automation and connectivity. All these factors influence the market for connected, automated, shared and electric (CASE) vehicles, which presents many opportunities and challenges. The pace of the shift to a profoundly penetrated market for CASE vehicles is far from secure. Such transformation depends on the development of technologies, consumer attitudes, and policies. An expanding body of research has investigated the potential social and behavioral results of deploying CASE vehicles. However, most academic literature to date concentrates on technological issues linked to these vehicles. There are several teams from federal and state agencies, OEMs, academia, startups, and consortiums working on this complex subject. This study investigates several academic papers, as well as federal and industry reports, considering all the stakeholders mentioned above. Its aim is to present a comprehensive picture of the implementation barriers and drivers of CASE vehicle usage and provide suggestions to solve them. The findings confirm that several issues are currently affecting the implementation of CASE vehicles on the road. Although there have been significant partnerships and collaborations between CASE vehicle stakeholders, namely technology companies, federal-state agencies, and academic scholars, considerable work is still required to solve the remaining barriers facing CASE-related technologies. This would enable decision-makers to create effective policies for future transportation networks and increase the speed of CASE vehicle market penetration to enhance road network’s level of service.
... The number of IoT applications is growing. The applications comprise smart home, smart city, smart agriculture, utilities, healthcare monitoring, and animal farming, smart water, security and emergencies, industrial control, smart transportation, environment monitoring (2). It tackles the highly sensitive information about people and companies, which must not be revealed to those unauthorized persons and attackers. ...
Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.
... The effort to answer this question and address this underlying need led to the development of the IoT framework. The term IoT in contrast to the internet as we know today which could be described as "The Internet of People" depicts a framework where devices are configured to communicate and execute functions whilst requiring little human effort [1]. The Internet as we know today can be mostly described as the "Internet of People" as most of the devices and gadgets on the internet are used to provide connections essentially between people. ...
Everything is possible in this new era with the Internet connection, which has made the entire world a tiny global village. Using the Internet and web services, people can access the information they need and connect with others through verbal conversation, instant messaging, email, etc. We propose an approach that can be implemented in various universities, schools, colleges, and organizations. With the support of Proposed Research, workers can be automatically tracked without any traditional approaches and at a fair price relative to systems already in place. The proposed research is focused on smart devices that are inclined to school representatives, organizations, where each smart device has a different MAC (physical) address. Students can be linked to the application via MAC address and results can finally be stored, and we can generate the report regularly or weekly or monthly. Our proposed system is divided into two parts; the first is a website that can be accessed via the program management main screen such as student data registration, adding the admin to the program, etc. The second component is a system work environment that is the Micro-controller (Raspberry Pi3) which runs the device 's main script. Finally, results can be automatically obtained based on the MAC address of the students. For some exceptional cases, we developed an Android application for the admin to update all information manually. The system can currently be operated on its own, and can also be part of other integrated systems.
... IoT aims to make the internet immersive and pervasive through enabling easy access and interaction with a wide diversity of IoT devices as surveillance cameras, monitoring sensors, and home appliances. IoT will promote the development of several applications that utilize the gigantic and diverse amount of data, which is generated by smart devices to provide modern services for companies, citizens and organizations [312] [313]. ...