3,270 research outputs found

    Embedded Based Energy Efficient Handling of Big Data Using Wireless Sensor Network

    Get PDF
    The wireless sensor networks have each individual node of a network may store and deliver a massive amount of information at once or over time. In the future, massively connected, highly dynamic wireless sensor networks have such vehicle-2-vehicle communication scenarios may hold even greater information potential. This is mostly because of the increase in node complexity and data volumes will be a problem for traditional data aggregation strategies traffic-wise as well as energy efficiency. The existing system is continuously monitors the nodes status and gives information to the user. It does not have any monitoring or data storage system to save the information. This leads to the continuous energy consumption and data is not saved at the monitoring unit. This causes high power consumption and needs manual control over the system in industrial and army applications this leads to continuous waste of time and energy. To avoid this waste of time and energy consumption then we proposed the following system. In the proposed system, the big data is monitored by the server section by using ZIGBEE. The nodes communicate their sensor data to the server section through ZIGBEE which is a high power, effective communication system. This helps the server to receive data and handle large amount of data from different nodes. The collected big data is posted in web by using GPRS section and the big data handled and posted to the server

    SmartEx: a case study on user profiling and adaptation in exhibition booths

    Get PDF
    An investigation into user profiling and adaptation with exhibition booth as a case study is reported. First a review of the field of exhibitions and trade fairs and a summary introduction to adaptation and profiling are given. We then introduce three criteria for the evaluation of exhibition booth: effectiveness, efficiency and affect. Effectiveness is related the amount of information collected, efficiency is a measurement of the time taken to collect the information, and affect is the perception of the experience and the mood booth visitors have during and after their visit. We have selected these criteria to assess adaptive and profiled exhibition booths, we call smart exhibition (SmartEx). The assessment is performed with an experiment with three test conditions (non-profiled/non adaptive, profiled/non-adaptive and profiled adaptive presentations). Results of the experiment are presented along discussion. While there is significant improvements of effectiveness and efficiency between the two-first test conditions, the improvement is not significant for the last test condition, for reasons explained. As for the affect, the results show that it has an under-estimated importance in people minds and that it should be addressed more carefully

    The future of universal access? merging computing, design and engineering

    Get PDF
    Technology is advancing at a fast pace while the shape and nature of computers continues to evolve, with tablets and smartphones illustrating the move away from the traditional notion of a laptop or desktop computer. Similarly, networking and sensing technologies are also developing rapidly and innovatively. All of these technologies have the potential to enfranchise users with severe functional impairments to be better able to control and interact with other people and their surroundings. However, this is only possible if those designing the novel systems based upon these new technologies consider such usersā€™ needs explicitly. This paper examines how these technological advances can be employed to support these users in the near future. The paper further discusses issues such as the need for security as systems evolve from control of specific environments to a potential model for interaction in any location

    A Survey of Positioning Systems Using Visible LED Lights

    Get PDF
    Ā© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.As Global Positioning System (GPS) cannot provide satisfying performance in indoor environments, indoor positioning technology, which utilizes indoor wireless signals instead of GPS signals, has grown rapidly in recent years. Meanwhile, visible light communication (VLC) using light devices such as light emitting diodes (LEDs) has been deemed to be a promising candidate in the heterogeneous wireless networks that may collaborate with radio frequencies (RF) wireless networks. In particular, light-fidelity has a great potential for deployment in future indoor environments because of its high throughput and security advantages. This paper provides a comprehensive study of a novel positioning technology based on visible white LED lights, which has attracted much attention from both academia and industry. The essential characteristics and principles of this system are deeply discussed, and relevant positioning algorithms and designs are classified and elaborated. This paper undertakes a thorough investigation into current LED-based indoor positioning systems and compares their performance through many aspects, such as test environment, accuracy, and cost. It presents indoor hybrid positioning systems among VLC and other systems (e.g., inertial sensors and RF systems). We also review and classify outdoor VLC positioning applications for the first time. Finally, this paper surveys major advances as well as open issues, challenges, and future research directions in VLC positioning systems.Peer reviewe

    Implementation and Analysis of Communication Protocols in Internet of Things

    Full text link
    Internet of Things (IoT) is the future of all the present-day devices around the globe. Giving them internet connectivity makes IoT the next frontier of technology. Possibilities are limitless as the devices communicate and interact with each other which make it even more interesting for the global markets. For example, Rolls-Royce announced that it would use the Microsoft Azure IoT suite and also the Intelligence suite of Cortana to keep track of the fuel usage, for performance analysis, to optimize the fly routes etc. which improves the airline efficiency. The devices must communicate with each other, the data from these devices must be collected by the servers, and the data is then analyzed or provided to the people. For all this to happen, there is a need for efficient protocols to ensure that the communication is secure and to avoid loss of data. This research is about the implementation and analysis of various protocols that can be used for the communication in IoT. Various protocols with various capabilities are required for different environments. The internet today supports hundreds of protocols from which choosing the best would be a great challenge. But each protocol is different in its own way when we have the specifics like security, reliability, range of communication etc. This research emphasizes on the best available protocols and the environments that suit them the most. It provides an implementation of some of the protocols and analyzes the protocols according to the results obtained. The data collected from the sensors/devices through a protocol is also subject to predictive analysis which improves the scope of the project to performing data analysis on the data collected through IoT

    Security and Privacy for IoT Ecosystems

    Get PDF
    Smart devices have become an integral part of our everyday life. In contrast to smartphones and laptops, Internet of Things (IoT) devices are typically managed by the vendor. They allow little or no user-driven customization. Users need to use and trust IoT devices as they are, including the ecosystems involved in the processing and sharing of personal data. Ensuring that an IoT device does not leak private data is imperative. This thesis analyzes security practices in popular IoT ecosystems across several price segments. Our results show a gap between real-world implementations and state-of-the-art security measures. The process of responsible disclosure with the vendors revealed further practical challenges. Do they want to support backward compatibility with the same app and infrastructure over multiple IoT device generations? To which extent can they trust their supply chains in rolling out keys? Mature vendors have a budget for security and are aware of its demands. Despite this goodwill, developers sometimes fail at securing the concrete implementations in those complex ecosystems. Our analysis of real-world products reveals the actual efforts made by vendors to secure their products. Our responsible disclosure processes and publications of design recommendations not only increase security in existing products but also help connected ecosystem manufacturers to develop secure products. Moreover, we enable users to take control of their connected devices with firmware binary patching. If a vendor decides to no longer offer cloud services, bootstrapping a vendor-independent ecosystem is the only way to revive bricked devices. Binary patching is not only useful in the IoT context but also opens up these devices as research platforms. We are the first to publish tools for Bluetooth firmware and lower-layer analysis and uncover a security issue in Broadcom chips affecting hundreds of millions of devices manufactured by Apple, Samsung, Google, and more. Although we informed Broadcom and customers of their technologies of the weaknesses identified, some of these devices no longer receive official updates. For these, our binary patching framework is capable of building vendor-independent patches and retrofit security. Connected device vendors depend on standards; they rarely implement lower-layer communication schemes from scratch. Standards enable communication between devices of different vendors, which is crucial in many IoT setups. Secure standards help making products secure by design and, thus, need to be analyzed as early as possible. One possibility to integrate security into a lower-layer standard is Physical-Layer Security (PLS). PLS establishes security on the Physical Layer (PHY) of wireless transmissions. With new wireless technologies emerging, physical properties change. We analyze how suitable PLS techniques are in the domain of mmWave and Visible Light Communication (VLC). Despite VLC being commonly believed to be very secure due to its limited range, we show that using VLC instead for PLS is less secure than using it with Radio Frequency (RF) communication. The work in this thesis is applied to mature products as well as upcoming standards. We consider security for the whole product life cycle to make connected devices and IoT ecosystems more secure in the long term

    Dance of the bulrushes: building conversations between social creatures

    Get PDF
    The interactive installation is in vogue. Interaction design and physical installations are accepted fixtures of modern life, and with these technology-driven installations beginning to exert influence on modes of mass communication and general expectations for user experiences, it seems appropriate to explore the variety of interactions that exist. This paper surveys a number of successful projects with a critical eye toward assessing the type of communication and/or conversation generated between interactive installations and human participants. Moreover, this exploration seeks to identify whether specific tactics and/or technologies are particularly suited to engendering layers of dialogue or ā€˜conversationsā€™ within interactive physical computing installations. It is asserted that thoughtful designs incorporating self-organizational abilities can foster rich dialogues in which participants and the installation collaboratively generate value in the interaction. To test this hypothesis an interactive installation was designed and deployed in locations in and around London. Details of the physical objects and employed technologies are discussed, and results of the installation sessions are shown to corroborate the key tenets of this argument in addition to highlighting other concerns that are specifically relevant to the broad topic of interactive design

    From Uncertainty to Confidence: Implementation of a Cyrano de Bergerac Coaching Model in a Virtual Reading Clinic

    Get PDF
    During the Fall 2021 semester of a Reading Assessment and Intervention course, an instructor and two doctoral graduate assistants piloted a study in which the instructor used bug-in-ear (BIE) technology to deliver teaching prompts to preservice teacher (PST) tutors while they listened to children read in a virtual tutorial setting. The course instructor joined virtual tutorial sessions over Zoom using a laptop computer and communicated with the tutors via phone, through a Bluetooth earpiece provided for them. The BIE coaching occurred during the 10-minute guided reading portion of the lesson, and during the child\u27s oral reading of the text, the instructor provided prompts for the tutor to try when the child encountered a point of difficulty and suggested teaching points to follow the child\u27s reading of the text. The tutoring and coaching sessions were recorded, transcribed, and analyzed. Other forms of collected data included field notes and a transcript from a semi-structured focus group interview with the tutors. Data analysis revealed that the pilot was successful in terms of technology use and the ways in which the tutors learned from the experience
    • ā€¦
    corecore