14 research outputs found

    Wearable Devices and their Implementation in Various Domains

    Get PDF
    Wearable technologies are networked devices that collect data, track activities and customize experiences to users? needs and desires. They are equipped, with microchips sensors and wireless communications. All are mounted into consumer electronics, accessories and clothes. They use sensors to measure temperature, humidity, motion, heartbeat and more. Wearables are embedded in various domains, such as healthcare, sports, agriculture and navigation systems. Each wearable device is equipped with sensors, network ports, data processor, camera and more. To allow monitoring and synchronizing multiple parameters, typical wearables have multi-sensor capabilities and are configurable for the application purpose. For the wearer?s convenience, wearables are lightweight, modest shape and multifunctional. Wearables perform the following tasks: sense, analyze, store, transmit and apply. The processing may occur on the wearer or at a remote location. For example, if dangerous gases are detected, the data are processed, and an alert is issued. It may be transmitted to a remote location for testing and the results can be communicated in real-time to the user. Each scenario requires personalized mobile information processing, which transforms the sensory data to information and then to knowledge that will be of value to the individual responding to the situation

    Expanding Navigation Systems by Integrating It with Advanced Technologies

    Get PDF
    Navigation systems provide the optimized route from one location to another. It is mainly assisted by external technologies such as Global Positioning System (GPS) and satellite-based radio navigation systems. GPS has many advantages such as high accuracy, available anywhere, reliable, and self-calibrated. However, GPS is limited to outdoor operations. The practice of combining different sources of data to improve the overall outcome is commonly used in various domains. GIS is already integrated with GPS to provide the visualization and realization aspects of a given location. Internet of things (IoT) is a growing domain, where embedded sensors are connected to the Internet and so IoT improves existing navigation systems and expands its capabilities. This chapter proposes a framework based on the integration of GPS, GIS, IoT, and mobile communications to provide a comprehensive and accurate navigation solution. In the next section, we outline the limitations of GPS, and then we describe the integration of GIS, smartphones, and GPS to enable its use in mobile applications. For the rest of this chapter, we introduce various navigation implementations using alternate technologies integrated with GPS or operated as standalone devices

    An Adaptive Lightweight Security Framework Suited for IoT

    Get PDF
    Standard security systems are widely implemented in the industry. These systems consume considerable computational resources. Devices in the Internet of Things [IoT] are very limited with processing capacity, memory and storage. Therefore, existing security systems are not applicable for IoT. To cope with it, we propose downsizing of existing security processes. In this chapter, we describe three areas, where we reduce the required storage space and processing power. The first is the classification process required for ongoing anomaly detection, whereby values accepted or generated by a sensor are classified as valid or abnormal. We collect historic data and analyze it using machine learning techniques to draw a contour, where all streaming values are expected to fall within the contour space. Hence, the detailed collected data from the sensors are no longer required for real-time anomaly detection. The second area involves the implementation of the Random Forest algorithm to apply distributed and parallel processing for anomaly discovery. The third area is downsizing cryptography calculations, to fit IoT limitations without compromising security. For each area, we present experimental results supporting our approach and implementation

    Smart Home Systems Based on Internet of Things

    Get PDF
    Smart home systems achieved great popularity in the last decades as they increase the comfort and quality of life. Most smart home systems are controlled by smartphones and microcontrollers. A smartphone application is used to control and monitor home functions using wireless communication techniques. We explore the concept of smart home with the integration of IoT services and cloud computing to it, by embedding intelligence into sensors and actuators, networking of smart things using the corresponding technology, facilitating interactions with smart things using cloud computing for easy access in different locations, increasing computation power, storage space and improving data exchange efficiency. In this chapter we present a composition of three components to build a robust approach of an advanced smart home concept and implementation

    Advanced Lightweight Encryption Key Management Algorithms for IoT Networks

    Get PDF
    An Internet of Things (IoT) Network is a collection of sensors interconnected through a network that process and exchange data. IoT networks need sufficient resources to cope with the growing security challenges. In most cases, cryptography is implemented by symmetric and asymmetric encryption methods to cope with these security issues. Symmetric cryptography requires transmitting an encryption key to the receiver to decrypt the received encrypted messages. Consequently, secured key distribution techniques are the core for providing security and establishing a secured connection among objects. Encryption keys are frequently changed through key distribution mechanisms. Encrypted key exchange is a protocol that allows two parties who share the same key to communicate over an insecure network. This chapter outlines the challenges and core requirements for a robust key distribution mechanism, beginning with evaluating existing solutions and then detailing three innovative, efficient, and lightweight methods that balance the security level, network performance, and low processing overhead impact

    Communication Technologies and Their Contribution to Sustainable Smart Cities

    Get PDF
    Sustainable smart cities (SSC) are becoming a reality as many develop their unique model of smart cities based on vast communication infrastructure. New technologies led to innovative ecosystems where transportation, logistics, maintenance, etc., are automated and accessed remotely. Information and communication coordinate their overall activities. Sensors embedded in these devices sense the environment to provide the required input. Together with artificial intelligence, machine learning, and deep learning, it enables them to facilitate effective decision-making. This chapter discusses the role of integrating technologies in smart cities, focusing on the information and communication aspects, challenges, limitations, and mitigation strategies related to the infrastructure, implementations, and best practices for attaining SSC. We propose a four-layered model covering the main aspects of incorporating communication technology within sustainable smart cities. It covers the basic physical level, providing guidelines for designing a smart city that supports the requirements of a proper communications infrastructure. The level above is the network level where we describe current communication networks and technologies. The rest two upper layers represent the software with integrated and embedded communication components. In summary, we conclude that communication technology is the key enabler of most of the activities performed in smart cities

    Advancements in Optical Data Transmission and Security Systems

    Get PDF
    Optical Communication (OC) for data transmission was introduced more than 30 years ago. It employs two main technologies, fiber optics using a physical wire and Free Space Optical (FSO) wireless transmission. Fiber optics has been well developed over the years in terms of distance, bandwidth, speed, reliability, and other enhancements that contribute to its use. Recent developments in FSO transmission has made it the mainstream and a better alternative compared to RF wireless transmission, concerning all parameters. In this chapter, we focus on advancements in OC that represent innovative ideas of how to enable new methods of secured optical data transmission in different ways and not simply as an extension to current methods and technologies

    An Empirical Study to Measure Customer Experience for Telecom Operators in Indian Telecom Industry

    Get PDF
    as Indian Telecom industry matures itself, service providers understand the essence of Customer Experience as the prime differentiator towards business success. This paper will provide a rundown of the extant literature on customer experience studies done in Telecom industry. This research paper also attempts to identify the determinants of Customer Experience for Telecom operators in Indian Telecom industry. Also this research paper defines a yardstick called ACEI score to quantify customer experience in telecom industr

    Online Brand Communities and their Impact on Brand Equity of Indian Telecommunication Industry

    Get PDF
    Telecommunication space in India has become highly competitive and hence organizations are looking for newer value propositions and innovative ways to compete. With the advent of digital media, physical spaces are now being complimented with virtual spaces by organizations as a means of competitive advantage. Online brand communities (OBC’s) is one such source by which Telecom companies can achieve value creation and enhanced online customer engagement with customers.Hence this study is primarily an attempt to examine the impact of Online Brand Communities on selected brand equity dimensions of loyalty, awareness, association and perceived brand quality of telecom service providers. The purpose of this paper is to come up with a conceptual model which can explain the effects of the Online Brand Communities on value of the brand (brand equity) of telecommunication service providers.Primary data was collected from a sample of 120 respondents with the help of a questionnaire. For data analysis, statistical methods like factor analysis and regression analysis have been used to group inter related variables and predict the relationship between correlated variables respectively.Very few studies on OBC’s have been conducted in the telecommunication space hence the study will add to the academic literature and help telecom managers to determine how brand generated content and community participation can drive business to next level through engaged online customer experience. It will help the telecom companies in analysing brand equity building through online space, in turn enhancing the purchase decision, customer engagement and create competitive advantage

    Anomaly Detection in IoT: Recent Advances, AI and ML Perspectives and Applications

    Get PDF
    IoT comprises sensors and other small devices interconnected locally and via the Internet. Typical IoT devices collect data from the environment through sensors, analyze it and act back on the physical world through actuators. We can find them integrated into home appliances, Healthcare, Control systems, and wearables. This chapter presents a variety of applications where IoT devices are used for anomaly detection and correction. We review recent advancements in Machine/Deep Learning Models and Techniques for Anomaly Detection in IoT networks. We describe significant in-depth applications in various domains, Anomaly Detection for IoT Time-Series Data, Cybersecurity, Healthcare, Smart city, and more. The number of connected devices is increasing daily; by 2025, there will be approximately 85 billion IoT devices, spreading everywhere in Manufacturing (40%), Medical (30%), Retail, and Security (20%). This significant shift toward the Internet of Things (IoT) has created opportunities for future IoT applications. The chapter examines the security issues of IoT standards, protocols, and practical operations and identifies the hazards associated with the existing IoT model. It analyzes new security protocols and solutions to moderate these challenges. This chapter’s outcome can benefit the research community by encapsulating the Information related to IoT and proposing innovative solutions
    corecore