Results for 'Internet of Things'

962 found
Order:
  1. Designing the Health-related Internet of Things: Ethical Principles and Guidelines.Brent Mittelstadt - 2017 - Information 8 (3):77.
    The conjunction of wireless computing, ubiquitous Internet access, and the miniaturisation of sensors have opened the door for technological applications that can monitor health and well-being outside of formal healthcare systems. The health-related Internet of Things (H-IoT) increasingly plays a key role in health management by providing real-time tele-monitoring of patients, testing of treatments, actuation of medical devices, and fitness and well-being monitoring. Given its numerous applications and proposed benefits, adoption by medical and social care institutions and (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  2. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Ethics of the health-related internet of things: a narrative review.Brent Mittelstadt - 2017 - Ethics and Information Technology 19 (3):1-19.
    The internet of things is increasingly spreading into the domain of medical and social care. Internet-enabled devices for monitoring and managing the health and well-being of users outside of traditional medical institutions have rapidly become common tools to support healthcare. Health-related internet of things (H-IoT) technologies increasingly play a key role in health management, for purposes including disease prevention, real-time tele-monitoring of patient’s functions, testing of treatments, fitness and well-being monitoring, medication dispensation, and health research (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  4. Data Analysis, Analytics in Internet of Things and BigData.Mohammad Nezhad Hossein Shourkaei, Damghani Hamidreza, D. Leila & Hosseinian Heliasadat - 2019 - 4th International Conference on Combinatorics, Cryptography, Computer Science and Computation 4.
    The Internet-of-Things (IoT) is gradually being established as the new computing paradigm, which is bound to change the ways of our everyday working and living. IoT emphasizes the interconnection of virtually all types of physical objects (e.g., cell phones, wearables, smart meters, sensors, coffee machines and more) towards enabling them to exchange data and services among themselves, while also interacting with humans as well. Few years following the introduction of the IoT concept, significant hype was generated as a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Internet of Things future in Edge Computing.C. Pvandana & Ajeet Chikkamannur - 2016 - International Journal of Advanced Engineering Research and Science 3 (12):148-154.
    With the advent of Internet of Things (IoT) and data convergence using rich cloud services, data computing has been pushed to new horizons. However, much of the data generated at the edge of the network leading to the requirement of high response time. A new computing paradigm, edge computing, processing the data at the edge of the network is the need of the time. In this paper, we discuss the IoT architecture, predominant application protocols, definition of edge computing (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. Compound Metric Assisted Trust Aware Routing for Internet of Things through Firefly Algorithm.Mohammad Osman, Kaleem Fatima & P. Naveen Kumar - 2023 - International Journal of Intelligent Engineering and Systems 16 (3):280-291.
    Security and privacy are the major concerns in the internet of things (IoT) which are uncertain and unpredictable. Trust aware routing is one of the recent and effective strategies which ensure better resilience for IoT nodes from different security threats. Towards such concern, this paper proposes a new strategy called independent onlooker withstanding trust aware routing (IOWTAR) for IoT. IOWTAR introduced a new compound trust metric by combining three individual metrics namely independent trust, onlooker trust, and withstanding trust (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. A Review Paper on Internet of Things and it’s Applications.A. K. Sarika, Dr Vinit & Mrs Asha Durafe - 2019 - International Research Journal of Engineering and Technology 6 (06):1623 - 1630.
    Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unpreventable for anyone. The type of communication that we see today is either human-to-human or human-to-device, but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-to-machine (M2M). The Internet of Things (IoT) is defined as a paradigm in which objects provide with sensors, actuators, and processors communicate with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. The Qualitative Role of Big data and Internet of Things for Future Generation-A Review.M. Arun Kumar & A. Manoj Prabaharan - 2021 - Turkish Online Journal of Qualitative Inquiry (TOJQI) 12 (3):4185-4199.
    The Internet of Things (IoT) wireless LAN in healthcare has moved away from traditional methods that include hospital visits and continuous monitoring. The Internet of Things allows the use of certain means, including the detection, processing and transmission of physical and biomedical parameters. With powerful algorithms and intelligent systems, it will be available to provide unprecedented levels of critical data for real-time life that are collected and analyzed to guide people in research, management and emergency care. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  53
    Machine Learning-Based Intrusion Detection Framework for Detecting Security Attacks in Internet of Things.Jones Serena - manuscript
    The proliferation of the Internet of Things (IoT) has transformed various industries by enabling smart environments and improving operational efficiencies. However, this expansion has introduced numerous security vulnerabilities, making IoT systems prime targets for cyberattacks. This paper proposes a machine learning-based intrusion detection framework tailored to the unique characteristics of IoT environments. The framework leverages feature engineering, advanced machine learning algorithms, and real-time anomaly detection to identify and mitigate security threats effectively. Experimental results demonstrate the efficacy of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Towards the Epistemology of the Internet of Things Techno-Epistemology and Ethical Considerations Through the Prism of Trust.Ori Freiman - 2014 - International Review of Information Ethics 22:6-22.
    This paper discusses the epistemology of the Internet of Things [IoT] by focusing on the topic of trust. It presents various frameworks of trust, and argues that the ethical framework of trust is what constitutes our responsibility to reveal desired norms and standards and embed them in other frameworks of trust. The first section briefly presents the IoT and scrutinizes the scarce philosophical work that has been done on this subject so far. The second section suggests that the (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  11. Consensus-Based Data Management within Fog Computing For the Internet of Things.Al-Doghman Firas Qais Mohammed Saleh - 2019 - Dissertation, University of Technology Sydney
    The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions of nodes. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Status of Big Data In Internet of Things: A Comprehensive Overview.Peter Alphonce & Lusekelo Kibona - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 2 (3):5-9.
    Abstract: Reports suggests that total amount of data generated everyday reaches 2.5 quintillion bytes [9], annual global IP traffic run rate in 2016 was 1.2 zettabytes and will reach 3.3 zettabytes by 2021 [12]. According to Gartner [25], Internet of Things excluding personal computers, tablets and smartphones will grow to 26 billion units of installed devices in year 2020. This results from penetration of digital applications which highly motivated by smart societies which can be defined as to when (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Ownership of personal data in the Internet of Things.Václav Janeček - 2018 - Computer Law and Security Review 34 (5):1039-52.
    This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  14. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Integration of Internet Protocol and Embedded System On IoT Device Automation.Yousef MethkalAbd Algani, S. Balaji, A. AlbertRaj, G. Elangovan, P. J. Sathish Kumar, George Kofi Agordzo, Jupeth Pentang & B. Kiran Bala - manuscript
    The integration of Internet Protocol and Embedded Systems can enhance the communication platform. This paper describes the emerging smart technologies based on Internet of Things (IOT) and internet protocols along with embedded systems for monitoring and controlling smart devices with the help of WiFi technology and web applications. The internet protocol (IP) address has been assigned to the things to control and operate the devices via remote network that facilitates the interoperability and end-to-end communication (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16.  55
    Scalable Encryption Protocol for Searchable Data Management in IoT Systems.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  18.  49
    Revolutionizing Agriculture with Autonomous Equipment: The Future of Farming.Bharti Bisen - 2024 - Idea of Specturm 12 (1):8-15.
    Autonomous agricultural equipment represents a transformative innovation, combining cutting-edge technologies such as artificial intelligence (AI), robotics, and the Internet of Things (IoT). These machines address challenges such as labor shortages, environmental sustainability, and rising food demand. This paper explores the concept, key technologies, applications, and benefits of autonomous farming equipment. A comprehensive literature review highlights current advancements and challenges in the field. An experimental study evaluates the efficiency and impact of autonomous machinery in farming, providing results that demonstrate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Speech Based Controlled Techniques using NLP.R. Senthilkumar - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):24-32.
    The main objective of our project is to construct a fully functional voice-based home automation system that uses the Internet of Things and Natural Language Processing. The home automation system is user-friendly to smartphones and laptops. A set of relays is used to connect the Node MCU to homes under controlled appliances. The user sends a command through the speech to the mobile devices, which interprets the message and sends the appropriate command to the specific appliance. The voice (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. RESEARCH ASPECTS IN WASTE MANAGEMENT AND THE USE OF INTELLIGENT TECHNOLOGIES.Mohit Gangwar - 2024 - Annals of the Bhandarkar Oriental Research Institute (6):151-157.
    The management of waste has become an increasingly critical issue as urbanization and industrial activities surge globally. Traditional waste management practices are struggling to keep pace with the rising quantities and complexities of waste. This paper delves into the integration of intelligent technologies, such as Artificial Intelligence (AI), the Internet of Things (IoT), and data analytics, into waste management systems. By examining current practices, methodologies, experiments, and results, this study aims to highlight the transformative potential of intelligent technologies (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  75
    Emerging Trends in Cybersecurity: Navigating the Future of Digital Protection.Anumiti Jat - 2024 - Idea of Spectrum 1 (12):1-7.
    The increasing sophistication of cyber threats necessitates innovative and proactive cybersecurity measures. This paper explores the latest trends in cybersecurity, focusing on the role of Artificial Intelligence (AI), Zero Trust security, and blockchain technology. A review of the literature highlights significant advancements and persistent challenges, including the security of Internet of Things (IoT) ecosystems and human-centric vulnerabilities. Experiments were conducted to evaluate the efficacy of machine learning-based intrusion detection systems and Zero Trust implementation in a simulated environment. Results (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. AI Can Help Us Live More Deliberately.Julian Friedland - 2019 - MIT Sloan Management Review 60 (4).
    Our rapidly increasing reliance on frictionless AI interactions may increase cognitive and emotional distance, thereby letting our adaptive resilience slacken and our ethical virtues atrophy from disuse. Many trends already well underway involve the offloading of cognitive, emotional, and ethical labor to AI software in myriad social, civil, personal, and professional contexts. Gradually, we may lose the inclination and capacity to engage in critically reflective thought, making us more cognitively and emotionally vulnerable and thus more anxious and prone to manipulation (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  23.  57
    A Hybrid Approach for Intrusion Detection in IoT Using Machine Learning and Signature-Based Methods.Janet Yan - manuscript
    Internet of Things (IoT) devices have transformed various industries, enabling advanced functionalities across domains such as healthcare, smart cities, and industrial automation. However, the increasing number of connected devices has raised significant concerns regarding their security. IoT networks are highly vulnerable to a wide range of cyber threats, making Intrusion Detection Systems (IDS) critical for identifying and mitigating malicious activities. This paper proposes a hybrid approach for intrusion detection in IoT networks by combining Machine Learning (ML) techniques with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  9
    Enhanced Campus Automation System and the emerging need for IoT integration: an automation perspective. [eCAS-IoT].J. Rajeshwar Rao & Siby Samuel - 2019 - In Cecilia Titiek Murniati & Heny Hartono (eds.), E-Proceedings International Conference on Innovation in Education: Opportunities and Challenges in Southeast Asia. Semarang: Universitas Katolik Soegijapranata. pp. 179-190.
    Technology has the power to break the limitations of traditional passive learning and innovate almost all aspects of everyday life with the power of connecting things of the world to the Internet, “Internet of Things (IoT).” IoT is no longer a phenomenon, but it has become a prevalent system in which people, processes, data, and things connect to the Internet and each other. This paper ‘Enhanced Campus Automation System and the emerging need of IoT (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  25. (1 other version)Mark Weiser and the Origins of Ubiquitous Computing. [REVIEW]Dustin Gray - 2024 - Metascience 33:257–259.
    In today’s world, technology seems to touch every aspect of our lives. Our processes for so many things have become automated and digitalized. The use of networked computational devices by both end users and corporations has become, in a word, ubiquitous. In many ways, the era of rapid technological growth we find ourselves in currently can be traced back to the work of the pioneering computer scientist, Mark Weiser. It is widely accepted among technologists today that his original vision (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. The teaching of computer ethics on computer science and related degree programmes. a European survey.Ioannis Stavrakakis, Damian Gordon, Brendan Tierney, Anna Becevel, Emma Murphy, Gordana Dodig-Crnkovic, Radu Dobrin, Viola Schiaffonati, Cristina Pereira, Svetlana Tikhonenko, J. Paul Gibson, Stephane Maag, Francesco Agresta, Andrea Curley, Michael Collins & Dympna O’Sullivan - 2021 - International Journal of Ethics Education 7 (1):101-129.
    Within the Computer Science community, many ethical issues have emerged as significant and critical concerns. Computer ethics is an academic field in its own right and there are unique ethical issues associated with information technology. It encompasses a range of issues and concerns including privacy and agency around personal information, Artificial Intelligence and pervasive technology, the Internet of Things and surveillance applications. As computing technology impacts society at an ever growing pace, there are growing calls for more computer (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  27. The First Protocol Of Reaching Consensus Under Unreliable Mobile Edge Computing Paradigm.Ching ShuWang, Yan Qin, Yao Tsai Te & Shu-Ching Wang - 2019 - International Journal of Innovative Computing, Information and Control 15 (2):713 - 723.
    Mobile Edge Computing (MEC) is an emerging technology that enables computing directly at the edge of the cloud computing network. Therefore, it is important that MEC is applied with reliable transmission. The problem of reaching consensus in the distributed system is one of the most important issues in designing a reliable transmission network. However, all previous protocols for the consensus problem are not suitable for an MEC paradigm. It is the first time an optimal protocol of reaching consensus is pro- (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. State of the Art on Ethical, Legal, and Social Issues Linked to Audio- and Video-Based AAL Solutions.Alin Ake-Kob, Aurelija Blazeviciene, Liane Colonna, Anto Cartolovni, Carina Dantas, Anton Fedosov, Francisco Florez-Revuelta, Eduard Fosch-Villaronga, Zhicheng He, Andrzej Klimczuk, Maksymilian Kuźmicz, Adrienn Lukacs, Christoph Lutz, Renata Mekovec, Cristina Miguel, Emilio Mordini, Zada Pajalic, Barbara Krystyna Pierscionek, Maria Jose Santofimia Romero, Albert AliSalah, Andrzej Sobecki, Agusti Solanas & Aurelia Tamo-Larrieux - 2021 - Alicante: University of Alicante.
    Ambient assisted living technologies are increasingly presented and sold as essential smart additions to daily life and home environments that will radically transform the healthcare and wellness markets of the future. An ethical approach and a thorough understanding of all ethics in surveillance/monitoring architectures are therefore pressing. AAL poses many ethical challenges raising questions that will affect immediate acceptance and long-term usage. Furthermore, ethical issues emerge from social inequalities and their potential exacerbation by AAL, accentuating the existing access gap between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. The problem of the consent for the processing of health data, particularly for biomedical research purposes, from the perspective of fundamental rights protection in the Digital Era.Joaquín Sarrión Esteve - 2018 - Revista de Derecho y Genoma Humano: Genética, Biotecnología y Medicina Avanzada = Law and the Human Genome Review: Genetics, Biotechnology and Advanced Medicine 48:107-132.
    Health data processing fields face ethical and legal problems regarding fundamental rights. As we know, patients can benefit in the Digital Era from having health or medical information available, and medical decisions can be more effective with a better understanding of clinical histories, medical and health data thanks to the development of Artificial Intelligence, Internet of Things and other Digital technologies. However, at the same time, we need to guarantee fundamental rights, including privacy ones. The complaint about ethical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  60
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  49
    An Integrated Framework for IoT Security: Combining Machine Learning and Signature-Based Approaches for Intrusion Detection.Yan Janet - manuscript
    Internet of Things (IoT) devices have transformed various industries, enabling advanced functionalities across domains such as healthcare, smart cities, and industrial automation. However, the increasing number of connected devices has raised significant concerns regarding their security. IoT networks are highly vulnerable to a wide range of cyber threats, making Intrusion Detection Systems (IDS) critical for identifying and mitigating malicious activities. This paper proposes a hybrid approach for intrusion detection in IoT networks by combining Machine Learning (ML) techniques with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Present Scenario of Fog Computing and Hopes for Future Research.G. KSoni, B. Hiren Bhatt & P. Dhaval Patel - 2019 - International Journal of Computer Sciences and Engineering 7 (9).
    According to the forecast that billions of devices will get connected to the Internet by 2020. All these devices will produce a huge amount of data that will have to be handled rapidly and in a feasible manner. It will become a challenge for real-time applications to handle this huge data while considering security issues as well as time constraints. The main highlights of cloud computing are on-demand service and scalability; therefore the data generated from IoT devices are generally (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  62
    OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Information Systems Governance and Industry 4.0 - epistemology of data and semiotic methodologies of IS in digital ecosystems.Ângela Lacerda Nobre, Rogério Duarte & Marc Jacquinet - 2018 - Advances in Information and Communication Technology 527:311-312.
    Contemporary Information Systems management incorporates the need to make explicit the links between semiotics, meaning-making and the digital age. This focus addresses, at its core, pure rationality, that is, the capacity of human interpretation and of human inscription upon reality. Creating the new real, that is the motto. Humans are intrinsically semiotic creatures. Consequently, semiotics is not a choice or an option but something that works like a second skin, establishing limits and permeable linkages between: human thought and human's infinite (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  57
    Multi-Layer Intrusion Detection Framework for IoT Systems Using Ensemble Machine Learning.Janet Yan - manuscript
    The proliferation of Internet of Things (IoT) devices has introduced a range of opportunities for enhanced connectivity, automation, and efficiency. However, the vast array of interconnected devices has also raised concerns regarding cybersecurity, particularly due to the limited resources and diverse nature of IoT devices. Intrusion detection systems (IDS) have emerged as critical tools for identifying and mitigating security threats. This paper proposes a Multi-Layer Intrusion Detection Framework for IoT systems, leveraging Ensemble Machine Learning (EML) techniques to improve (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  55
    Towards Inclusive Societies: Leveraging IoT for Community Development and Education.Sudip Suklabaidya - 2024 - Novel Insights 1 (1):40-51.
    The proliferation of Internet of Things (IoT) technologies presents a promising avenue for fostering inclusive societies through community development and education initiatives. This paper explores the potential of leveraging IoT to address societal inequalities and empower marginalized communities. Through a multidisciplinary lens, the paper examines the intersection of IoT, community development, and education, elucidating how IoT-enabled solutions can contribute to building more resilient, connected, and equitable societies. By harnessing IoT devices, sensor networks, and data analytics, community development efforts (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. IoT Based Intruder Prevention using Fogger.T. Krishna Prasath - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):81-90.
    Anamoly detection in videos plays an important role in various real-life applications. Most of traditional approaches depend on utilizing handcrafted features which are problem-dependent and optimal for specific tasks. Nowadays, there has been a rise in the amount of disruptive and offensive activities that have been happening. Due to this, security has been given principal significance. Public places like shopping centers, avenues, banks, etc. are increasingly being equipped with CCTVs to guarantee the security of individuals. Subsequently, this inconvenience is making (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. AUGMENTED REALITY AND IOT-INTEGRATED SMART HOMES: ENHANCING USER EXPERIENCE AND AUTOMATION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):389-394.
    The integration of Augmented Reality (AR) and the Internet of Things (IoT) within smart homes represents a significant leap forward in home automation and user experience. This paper explores a comprehensive framework that combines these technologies to create an immersive, efficient, and user-friendly smart home environment. By utilizing AR, users can interact with and control IoT-enabled devices in real time through visual and intuitive interfaces. This integration not only simplifies the management of home systems but also enhances the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Psychopower and Ordinary Madness: Reticulated Dividuals in Cognitive Capitalism.Ekin Erkan - 2019 - Cosmos and History 15 (1):214-241.
    Despite the seemingly neutral vantage of using nature for widely-distributed computational purposes, neither post-biological nor post-humanist teleology simply concludes with the real "end of nature" as entailed in the loss of the specific ontological status embedded in the identifier "natural." As evinced by the ecological crises of the Anthropocene—of which the 2019 Brazil Amazon rainforest fires are only the most recent—our epoch has transfixed the “natural order" and imposed entropic artificial integration, producing living species that become “anoetic,” made to serve (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  40.  47
    Smart Route Optimization for Emergency Vehicles: Enhancing Ambulance Efficiency through Advanced Algorithms.Vishal Parmar - 2024 - Technosaga 2024 1 (1):1-6.
    Emergency response times play a critical role in saving lives, especially in urban settings where traffic congestion and unpredictable events can delay ambulance arrivals. This paper explores a novel framework for smart route optimization for emergency vehicles, leveraging artificial intelligence (AI), Internet of Things (IoT) technologies, and dynamic traffic analytics. We propose a real-time adaptive routing system that integrates machine learning (ML) for predictive modeling and IoT-enabled communication with traffic infrastructure. The system is evaluated using simulated urban environments, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  82
    Cloud-Based IoT System for Outdoor Pollution Detection and Data Analysis.Prathap Jeyapandi - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):424-430.
    Air pollution is a significant environmental concern that affects human health, ecosystems, and climate change. Effective monitoring and management of outdoor air quality are crucial for mitigating its adverse effects. This paper presents an advanced approach to outdoor pollution measurement utilizing Internet of Things (IoT) technology, combined with optimization techniques to enhance system efficiency and data accuracy. The proposed framework integrates a network of IoT sensors that continuously monitor various air pollutants, such as particulate matter (PM), carbon monoxide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Theorising Web 3.0: ICTs in a changing society.David Kreps & Kai Kimppa - 2015 - Information Technology and People 28 (4):726-741.
    Abstract: Purpose – The purpose of this paper is to analyse the broad phases of web development: the read-only Web 1.0, the read-write Web 2.0, and the collaborative and Internet of Things Web 3.0, are examined for the theoretical lenses through which they have been understood and critiqued. Design/methodology/approach – This is a conceptual piece, in the tradition of drawing on theorising from outside the Information Systems field, to shed light on developments in information communication technologies (ICTs). Findings (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43.  18
    Optimizing Robotic Systems for Stock Management in Pick and Place Operations.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):670-680.
    The design also addresses potential challenges such as robot mobility, collision avoidance, and space optimization. Performance metrics, including accuracy, time efficiency, and system scalability, are measured using simulation-based experiments in a controlled environment. The results show significant improvements in operational efficiency compared to traditional stock management approaches. This integration paves the way for future advancements in fully automated warehouses, reducing the need for human labor and increasing reliability. Finally, we discuss potential enhancements, including AI-based decision-making algorithms, multi-robot collaboration, and integration (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  26
    Streamlined Inventory Handling Using Optimized Robotic Pick and Place Systems.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):660-680.
    We propose a systematic workflow for automating the storage and retrieval process, starting from the identification of the stock to its precise placement and retrieval within the storage facility. The design also addresses potential challenges such as robot mobility, collision avoidance, and space optimization. Performance metrics, including accuracy, time efficiency, and system scalability, are measured using simulation-based experiments in a controlled environment. The results show significant improvements in operational efficiency compared to traditional stock management approaches. This integration paves the way (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45.  26
    Optimizing Inventory Management with Advanced Robotic Pick and Place Technology.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):690-700.
    The results show significant improvements in operational efficiency compared to traditional stock management approaches. This integration paves the way for future advancements in fully automated warehouses, reducing the need for human labor and increasing reliability. Finally, we discuss potential enhancements, including AI-based decision-making algorithms, multi-robot collaboration, and integration with Internet of Things (IoT) for real-time data analysis and continuous system improvement. Key words: Robotic aut.
    Download  
     
    Export citation  
     
    Bookmark  
  46.  22
    Innovative Robotic Solutions for Improved Stock Management Efficiency.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):680-690.
    The primary objective of this research is to enhance the precision and speed of stock handling while minimizing human intervention and error. Our design incorporates state-of-the-art sensors, real-time tracking systems, and autonomous robots programmed with advanced algorithms for object identification, gripping, and movement. We propose a systematic workflow for automating the storage and retrieval process, starting from the identification of the stock to its precise placement and retrieval within the storage facility. The design also addresses potential challenges such as robot (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Automatic Control for Home Applications using IoT.R. Veeramani - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):101-110.
    Smart home has become more and more popular in recent years. Due to the rapid development in the field of the Automation industry, human life is becoming more advanced and better in all aspects. In the present scenario, Automated systems are being preferred over the non-automated system. With the rapid growth in the number of consumers using the internet over the past years, the Internet has become an important part of life, and IoT is the newest and emerging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. rethinking machine ethics in the era of ubiquitous technology.Jeffrey White (ed.) - 2015 - Hershey, PA, USA: IGI.
    Table of Contents Foreword .................................................................................................... ......................................... xiv Preface .................................................................................................... .............................................. xv Acknowledgment .................................................................................................... .......................... xxiii Section 1 On the Cusp: Critical Appraisals of a Growing Dependency on Intelligent Machines Chapter 1 Algorithms versus Hive Minds and the Fate of Democracy ................................................................... 1 Rick Searle, IEET, USA Chapter 2 We Can Make Anything: Should We? .................................................................................................. 15 Chris Bateman, University of Bolton, UK Chapter 3 Grounding Machine Ethics within the Natural System ........................................................................ 30 Jared Gassen, JMG Advising, USA Nak Young Seong, Independent Scholar, South (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  3
    A New Framework and Performance Assessment Method for Distributed Deep Neural NetworkBased Middleware for Cyberattack Detection in the Smart IoT Ecosystem.Tambi Varun Kumar - 2024 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 11 (5):2283-2291.
    In the current digital environment, cyberattacks continue to pose a serious risk and difficulty. Internet of Things (IoT) devices are becoming more and more vulnerable due to security problems like ransomware, malware, poor encryption, and IoT botnets. These flaws may result in ransom demands, data tampering, illegal access, and system risks. Creating strong cybersecurity procedures for contemporary smart environments is essential to resolving these problems. This strategy uses proactive network traffic monitoring to spot any dangers in the (...) of Things ecosystem. Our approach is to improve Smart Environments' security and awareness of potential threats. Two IoT gateways were used to examine the effectiveness and performance of a deep neural network (DNN) model. The results were promising: the model caused an average increase of less than 30 kb/s in network bandwidth and a mere 2% rise in CPU usage. Additionally, memory and power consumption were minimal, with 0.42 GB and 0.2 GB of memory usage for NVIDIA Jetson and Raspberry Pi devices, respectively, and an average 13.5% increase in power consumption per device. The machine learning models achieved nearly 93% detection accuracy and a 92% F1 score on the datasets used. Our framework demonstrates an effective and efficient method for detecting malware and attacks in Smart Environments. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  2
    Project Risk Management System Development Based on Industry 4.0 Technology and its Practical Implications.Tambi Varun Kumar - 2018 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 7 (10):3841-3847.
    Because of advanced automation, data exchange, and cyber-physical systems, traditional project risk management strategies are losing their effectiveness in the era of Industry 4.0. This study investigates how integrating Industry 4.0 technology into project risk management frameworks can have real-world implications. Using technologies like artificial intelligence (AI), big data analytics, and the Internet of Things (IoT), it proposes a new framework that enhances risk identification, assessment, and mitigation methods. In order to demonstrate how Industry 4.0 is transforming risk (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 962