1,748 research outputs found

    Parking guidance and authentication system

    Get PDF
    Whenever the number of parking lots became large the problems related to parking management became more complicated. The most two important problems that related to large parking places are: First, the long searching time for available lots, especially at the peak time. The second problem is the unauthorized-parking situations. Nowadays, there are parking guidance systems that guide the drivers toward the available lots. As a result, reduce the searching time for available lots, as well as reduce the congestion in that parking area. However, these systems do not solve the problem of unauthorized-parked vehicles. This study aims to combine along with guidance system, a mechanism to verify the legality of vehicles parked at authorized-parking lots. Therefore, this study will focus on two modules which are the detection module and the identification module. In the detection module, wireless sensors such as ultrasonic and y-axis magnetometers have proven their ability in detecting vehicles. And in the identification module, active RFID including both tag and reader are very suitable for this purpose. This project has significant implications for large institutions, by making the parking lots that allocated to their staff within the same customer parking area. In addition, it reduces the required manpower for managing that parking area

    Middleware Technologies for Cloud of Things - a survey

    Get PDF
    The next wave of communication and applications rely on the new services provided by Internet of Things which is becoming an important aspect in human and machines future. The IoT services are a key solution for providing smart environments in homes, buildings and cities. In the era of a massive number of connected things and objects with a high grow rate, several challenges have been raised such as management, aggregation and storage for big produced data. In order to tackle some of these issues, cloud computing emerged to IoT as Cloud of Things (CoT) which provides virtually unlimited cloud services to enhance the large scale IoT platforms. There are several factors to be considered in design and implementation of a CoT platform. One of the most important and challenging problems is the heterogeneity of different objects. This problem can be addressed by deploying suitable "Middleware". Middleware sits between things and applications that make a reliable platform for communication among things with different interfaces, operating systems, and architectures. The main aim of this paper is to study the middleware technologies for CoT. Toward this end, we first present the main features and characteristics of middlewares. Next we study different architecture styles and service domains. Then we presents several middlewares that are suitable for CoT based platforms and lastly a list of current challenges and issues in design of CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268, Digital Communications and Networks, Elsevier (2017

    Middleware Technologies for Cloud of Things - a survey

    Full text link
    The next wave of communication and applications rely on the new services provided by Internet of Things which is becoming an important aspect in human and machines future. The IoT services are a key solution for providing smart environments in homes, buildings and cities. In the era of a massive number of connected things and objects with a high grow rate, several challenges have been raised such as management, aggregation and storage for big produced data. In order to tackle some of these issues, cloud computing emerged to IoT as Cloud of Things (CoT) which provides virtually unlimited cloud services to enhance the large scale IoT platforms. There are several factors to be considered in design and implementation of a CoT platform. One of the most important and challenging problems is the heterogeneity of different objects. This problem can be addressed by deploying suitable "Middleware". Middleware sits between things and applications that make a reliable platform for communication among things with different interfaces, operating systems, and architectures. The main aim of this paper is to study the middleware technologies for CoT. Toward this end, we first present the main features and characteristics of middlewares. Next we study different architecture styles and service domains. Then we presents several middlewares that are suitable for CoT based platforms and lastly a list of current challenges and issues in design of CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268, Digital Communications and Networks, Elsevier (2017

    When Things Matter: A Data-Centric View of the Internet of Things

    Full text link
    With the recent advances in radio-frequency identification (RFID), low-cost wireless sensor devices, and Web technologies, the Internet of Things (IoT) approach has gained momentum in connecting everyday objects to the Internet and facilitating machine-to-human and machine-to-machine communication with the physical world. While IoT offers the capability to connect and integrate both digital and physical entities, enabling a whole new class of applications and services, several significant challenges need to be addressed before these applications and services can be fully realized. A fundamental challenge centers around managing IoT data, typically produced in dynamic and volatile environments, which is not only extremely large in scale and volume, but also noisy, and continuous. This article surveys the main techniques and state-of-the-art research efforts in IoT from data-centric perspectives, including data stream processing, data storage models, complex event processing, and searching in IoT. Open research issues for IoT data management are also discussed

    From the Internet of things to the Internet of physical world

    Get PDF
    International audienceThis article describes the different kinds of RFID tags. It details passive and active RFID tags different functions and uses

    Reserved Parking Validation

    Get PDF
    A common situation that we can testify every day: fossil fuel cars occupying electric cars charge only places, and handy capped reserved places, occupied with cars without the proper authorization. This is something that plagues our society, where the values and moral are forgotten, and our duties and rights are lost in the day-to-day life. There are more and more cars moving, every day, to the city center, where the lack of available parking, together with the lack of proper public transportation creates a chaotic situation. Also, the large proliferation of electric cars, that is not accompanied by a proportional availability of electric chargers, raises issues, where these cars’ drivers are not allowed to charge their vehicles, most of the times, because they are being used as abusive parking. This dissertation has the goal to identify and propose a universal solution, with low implementation and maintenance costs, that allows a fast and unambiguous validation of authorization of a user, for parking in a reserved parking space

    Emerging technologies for learning (volume 2)

    Get PDF

    Intergenerational interpretation of the Internet of Things

    Get PDF
    This report investigates how different generations within a household interpret individual members’ data generated by the Internet of Things (IoT). Adopting a mixed methods approach, we are interested in interpretations of the IoT by teenagers, their parents and grandparents, and how they understand and interact with the kinds of data that might be generated by IoT devices. The first part of this document is a technical review that outlines the key existing and envisaged technologies that make up the IoT. It explores the definition and scope of the Internet of Things. Hardware, networking, intelligent objects and Human-Computer Interaction implications are all discussed in detail. The second section focuses on the human perspective, looking at psychological and sociological issues relating to the interpretation of information generated by the IoT. Areas such as privacy, data ambiguity, ageism, and confirmation bias are explored. The third section brings both aspects together, examining how technical and social aspects of the IoT interact in four specific application domains: energy monitoring, groceries and shopping, physical gaming, and sharing experiences. This section also presents three household scenarios developed to communicate and explore the complexities of integrating IoT technologies into family life. The final section draws together all the findings and suggests future research
    corecore