Results for 'Internet of Things'

977 found
Order:
  1. Ethics of the health-related internet of things: a narrative review.Brent Mittelstadt - 2017 - Ethics and Information Technology 19 (3):1-19.
    The internet of things is increasingly spreading into the domain of medical and social care. Internet-enabled devices for monitoring and managing the health and well-being of users outside of traditional medical institutions have rapidly become common tools to support healthcare. Health-related internet of things (H-IoT) technologies increasingly play a key role in health management, for purposes including disease prevention, real-time tele-monitoring of patient’s functions, testing of treatments, fitness and well-being monitoring, medication dispensation, and health research (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  2. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Designing the Health-related Internet of Things: Ethical Principles and Guidelines.Brent Mittelstadt - 2017 - Information 8 (3):77.
    The conjunction of wireless computing, ubiquitous Internet access, and the miniaturisation of sensors have opened the door for technological applications that can monitor health and well-being outside of formal healthcare systems. The health-related Internet of Things (H-IoT) increasingly plays a key role in health management by providing real-time tele-monitoring of patients, testing of treatments, actuation of medical devices, and fitness and well-being monitoring. Given its numerous applications and proposed benefits, adoption by medical and social care institutions and (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  4. Data Analysis, Analytics in Internet of Things and BigData.Mohammad Nezhad Hossein Shourkaei, Damghani Hamidreza, D. Leila & Hosseinian Heliasadat - 2019 - 4th International Conference on Combinatorics, Cryptography, Computer Science and Computation 4.
    The Internet-of-Things (IoT) is gradually being established as the new computing paradigm, which is bound to change the ways of our everyday working and living. IoT emphasizes the interconnection of virtually all types of physical objects (e.g., cell phones, wearables, smart meters, sensors, coffee machines and more) towards enabling them to exchange data and services among themselves, while also interacting with humans as well. Few years following the introduction of the IoT concept, significant hype was generated as a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Internet of Things future in Edge Computing.C. Pvandana & Ajeet Chikkamannur - 2016 - International Journal of Advanced Engineering Research and Science 3 (12):148-154.
    With the advent of Internet of Things (IoT) and data convergence using rich cloud services, data computing has been pushed to new horizons. However, much of the data generated at the edge of the network leading to the requirement of high response time. A new computing paradigm, edge computing, processing the data at the edge of the network is the need of the time. In this paper, we discuss the IoT architecture, predominant application protocols, definition of edge computing (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. Compound Metric Assisted Trust Aware Routing for Internet of Things through Firefly Algorithm.Mohammad Osman, Kaleem Fatima & P. Naveen Kumar - 2023 - International Journal of Intelligent Engineering and Systems 16 (3):280-291.
    Security and privacy are the major concerns in the internet of things (IoT) which are uncertain and unpredictable. Trust aware routing is one of the recent and effective strategies which ensure better resilience for IoT nodes from different security threats. Towards such concern, this paper proposes a new strategy called independent onlooker withstanding trust aware routing (IOWTAR) for IoT. IOWTAR introduced a new compound trust metric by combining three individual metrics namely independent trust, onlooker trust, and withstanding trust (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. The Qualitative Role of Big data and Internet of Things for Future Generation-A Review.M. Arun Kumar & A. Manoj Prabaharan - 2021 - Turkish Online Journal of Qualitative Inquiry (TOJQI) 12 (3):4185-4199.
    The Internet of Things (IoT) wireless LAN in healthcare has moved away from traditional methods that include hospital visits and continuous monitoring. The Internet of Things allows the use of certain means, including the detection, processing and transmission of physical and biomedical parameters. With powerful algorithms and intelligent systems, it will be available to provide unprecedented levels of critical data for real-time life that are collected and analyzed to guide people in research, management and emergency care. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Machine Learning-Based Intrusion Detection Framework for Detecting Security Attacks in Internet of Things.Jones Serena - manuscript
    The proliferation of the Internet of Things (IoT) has transformed various industries by enabling smart environments and improving operational efficiencies. However, this expansion has introduced numerous security vulnerabilities, making IoT systems prime targets for cyberattacks. This paper proposes a machine learning-based intrusion detection framework tailored to the unique characteristics of IoT environments. The framework leverages feature engineering, advanced machine learning algorithms, and real-time anomaly detection to identify and mitigate security threats effectively. Experimental results demonstrate the efficacy of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Towards the Epistemology of the Internet of Things Techno-Epistemology and Ethical Considerations Through the Prism of Trust.Ori Freiman - 2014 - International Review of Information Ethics 22:6-22.
    This paper discusses the epistemology of the Internet of Things [IoT] by focusing on the topic of trust. It presents various frameworks of trust, and argues that the ethical framework of trust is what constitutes our responsibility to reveal desired norms and standards and embed them in other frameworks of trust. The first section briefly presents the IoT and scrutinizes the scarce philosophical work that has been done on this subject so far. The second section suggests that the (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  10. A Review Paper on Internet of Things and it’s Applications.A. K. Sarika, Dr Vinit & Mrs Asha Durafe - 2019 - International Research Journal of Engineering and Technology 6 (06):1623 - 1630.
    Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unpreventable for anyone. The type of communication that we see today is either human-to-human or human-to-device, but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-to-machine (M2M). The Internet of Things (IoT) is defined as a paradigm in which objects provide with sensors, actuators, and processors communicate with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  28
    Vibration signal diagnosis and conditional health monitoring of motor used in biomedical applications using Internet of Things environment.Evans Asenso Dong Wang, Lihua Dai, Xiaojun Zhang, Shabnam Sayyad, R. Sugumar, Khushmeet Kumar - 2022 - Journal of Engineering 5 (6):1-9.
    Vibration, especially basic vibration, may cause loose contacts, open circuits, or other contact problems, which account for a large proportion of system failure causes. Due to the complexity of the chassis structure used in the biomedical motors, the vibration analysis of a single component cannot solve the vibration problems encountered in the work of the system. Therefore, it is necessary to use system simulation and experiments to monitor and enhance the health of the structure. Finite element method is used to (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  12. Ownership of personal data in the Internet of Things.Václav Janeček - 2018 - Computer Law and Security Review 34 (5):1039-52.
    This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  13.  43
    Vibration signal diagnosis and conditional health _monitoring of motor used in biomedical applications using Internet of Things environment (2nd edition).Sugumar R. - 2022 - Journal of Engineering 2 (12):1-10.
    Vibration, especially basic vibration, may cause loose contacts, open circuits, or other contact problems, which account for a large proportion of system failure causes. Due to the complexity of the chassis structure used in the biomedical motors, the vibration analysis of a single component cannot solve the vibration problems encountered in the work of the system. Therefore, it is necessary to use system simulation and experiments to monitor and enhance the health of the structure. Finite element method is used to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Consensus-Based Data Management within Fog Computing For the Internet of Things.Al-Doghman Firas Qais Mohammed Saleh - 2019 - Dissertation, University of Technology Sydney
    The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions of nodes. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Status of Big Data In Internet of Things: A Comprehensive Overview.Peter Alphonce & Lusekelo Kibona - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 2 (3):5-9.
    Abstract: Reports suggests that total amount of data generated everyday reaches 2.5 quintillion bytes [9], annual global IP traffic run rate in 2016 was 1.2 zettabytes and will reach 3.3 zettabytes by 2021 [12]. According to Gartner [25], Internet of Things excluding personal computers, tablets and smartphones will grow to 26 billion units of installed devices in year 2020. This results from penetration of digital applications which highly motivated by smart societies which can be defined as to when (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution.Aymen Abdullah, Phamhung Phuoc & Eui Namhuh - 2017 - International Arab Journal of Information Technology 14 (6).
    These days, Thin-client devices are continuously accessing the Internet to perform/receive diversity of services in the cloud. However these devices might either has lack in their capacity (e.g., processing, CPU, memory, storage, battery, resource allocation, etc) or in their network resources which is not sufficient to meet users satisfaction in using Thin-client services. Furthermore, transferring big size of Big Data over the network to centralized server might burden the network, cause poor quality of services, cause long respond delay, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Integration of Internet Protocol and Embedded System On IoT Device Automation.Yousef MethkalAbd Algani, S. Balaji, A. AlbertRaj, G. Elangovan, P. J. Sathish Kumar, George Kofi Agordzo, Jupeth Pentang & B. Kiran Bala - manuscript
    The integration of Internet Protocol and Embedded Systems can enhance the communication platform. This paper describes the emerging smart technologies based on Internet of Things (IOT) and internet protocols along with embedded systems for monitoring and controlling smart devices with the help of WiFi technology and web applications. The internet protocol (IP) address has been assigned to the things to control and operate the devices via remote network that facilitates the interoperability and end-to-end communication (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  18. Revolutionizing Agriculture with Autonomous Equipment: The Future of Farming.Bharti Bisen - 2024 - Idea of Specturm 12 (1):8-15.
    Autonomous agricultural equipment represents a transformative innovation, combining cutting-edge technologies such as artificial intelligence (AI), robotics, and the Internet of Things (IoT). These machines address challenges such as labor shortages, environmental sustainability, and rising food demand. This paper explores the concept, key technologies, applications, and benefits of autonomous farming equipment. A comprehensive literature review highlights current advancements and challenges in the field. An experimental study evaluates the efficiency and impact of autonomous machinery in farming, providing results that demonstrate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. RESEARCH ASPECTS IN WASTE MANAGEMENT AND THE USE OF INTELLIGENT TECHNOLOGIES.Mohit Gangwar - 2024 - Annals of the Bhandarkar Oriental Research Institute (6):151-157.
    The management of waste has become an increasingly critical issue as urbanization and industrial activities surge globally. Traditional waste management practices are struggling to keep pace with the rising quantities and complexities of waste. This paper delves into the integration of intelligent technologies, such as Artificial Intelligence (AI), the Internet of Things (IoT), and data analytics, into waste management systems. By examining current practices, methodologies, experiments, and results, this study aims to highlight the transformative potential of intelligent technologies (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  90
    Scalable Encryption Protocol for Searchable Data Management in IoT Systems.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Emerging Trends in Cybersecurity: Navigating the Future of Digital Protection.Anumiti Jat - 2024 - Idea of Spectrum 1 (12):1-7.
    The increasing sophistication of cyber threats necessitates innovative and proactive cybersecurity measures. This paper explores the latest trends in cybersecurity, focusing on the role of Artificial Intelligence (AI), Zero Trust security, and blockchain technology. A review of the literature highlights significant advancements and persistent challenges, including the security of Internet of Things (IoT) ecosystems and human-centric vulnerabilities. Experiments were conducted to evaluate the efficacy of machine learning-based intrusion detection systems and Zero Trust implementation in a simulated environment. Results (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  23.  20
    Enhanced Campus Automation System and the emerging need for IoT integration: an automation perspective. [eCAS-IoT].J. Rajeshwar Rao & Siby Samuel - 2019 - In Cecilia Titiek Murniati & Heny Hartono, E-Proceedings International Conference on Innovation in Education: Opportunities and Challenges in Southeast Asia. Semarang: Universitas Katolik Soegijapranata. pp. 179-190.
    Technology has the power to break the limitations of traditional passive learning and innovate almost all aspects of everyday life with the power of connecting things of the world to the Internet, “Internet of Things (IoT).” IoT is no longer a phenomenon, but it has become a prevalent system in which people, processes, data, and things connect to the Internet and each other. This paper ‘Enhanced Campus Automation System and the emerging need of IoT (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  36
    IoT-Enabled Smart Agriculture Powered By Microcontroller: A Review.S. R. Vidyadhara - 2021 - International Journal of Advanced Research in Arts, Science, Engineering and Management 8 (6):2317-2322.
    Agriculture is critical to the growth of an agricultural country. Many industries, including agricultural, have been altered as a result of the fast rise of Internet of Things-based technology. In India, farming employs over 70% of the people and generates one-third of the nation's capital. Agriculture-related issues have traditionally hampered the country's progress. The only answer to this challenge is smart agriculture, which involves upgrading conventional agricultural processes. Solutions based on IoT are being developed to autonomously manage and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Speech Based Controlled Techniques using NLP.R. Senthilkumar - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):24-32.
    The main objective of our project is to construct a fully functional voice-based home automation system that uses the Internet of Things and Natural Language Processing. The home automation system is user-friendly to smartphones and laptops. A set of relays is used to connect the Node MCU to homes under controlled appliances. The user sends a command through the speech to the mobile devices, which interprets the message and sends the appropriate command to the specific appliance. The voice (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  69
    Development of a Project Risk Management System based on Industry 4.0 Technology and its Practical Implications.Sharma Sakshi - 2023 - International Journal of Innovative Research in Computer and Communication Engineering 11 (12):12220-12226.
    Traditional project risk management techniques are becoming less and less effective in the age of Industry 4.0, which is defined by sophisticated automation, data interchange, and cyber-physical systems. It suggests a new framework that improves risk detection, assessment, and mitigation techniques by utilising technology like artificial intelligence (AI), big data analytics, and the Internet of Things (IoT). This paper illustrates how Industry 4.0 is revolutionising risk management procedures by looking at actual case studies and industry implementations. The framework (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  27. A Hybrid Approach for Intrusion Detection in IoT Using Machine Learning and Signature-Based Methods.Janet Yan - manuscript
    Internet of Things (IoT) devices have transformed various industries, enabling advanced functionalities across domains such as healthcare, smart cities, and industrial automation. However, the increasing number of connected devices has raised significant concerns regarding their security. IoT networks are highly vulnerable to a wide range of cyber threats, making Intrusion Detection Systems (IDS) critical for identifying and mitigating malicious activities. This paper proposes a hybrid approach for intrusion detection in IoT networks by combining Machine Learning (ML) techniques with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. AI Can Help Us Live More Deliberately.Julian Friedland - 2019 - MIT Sloan Management Review 60 (4).
    Our rapidly increasing reliance on frictionless AI interactions may increase cognitive and emotional distance, thereby letting our adaptive resilience slacken and our ethical virtues atrophy from disuse. Many trends already well underway involve the offloading of cognitive, emotional, and ethical labor to AI software in myriad social, civil, personal, and professional contexts. Gradually, we may lose the inclination and capacity to engage in critically reflective thought, making us more cognitively and emotionally vulnerable and thus more anxious and prone to manipulation (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  29. (1 other version)Mark Weiser and the Origins of Ubiquitous Computing. [REVIEW]Dustin Gray - 2024 - Metascience 33:257–259.
    In today’s world, technology seems to touch every aspect of our lives. Our processes for so many things have become automated and digitalized. The use of networked computational devices by both end users and corporations has become, in a word, ubiquitous. In many ways, the era of rapid technological growth we find ourselves in currently can be traced back to the work of the pioneering computer scientist, Mark Weiser. It is widely accepted among technologists today that his original vision (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  91
    An Integrated Framework for IoT Security: Combining Machine Learning and Signature-Based Approaches for Intrusion Detection.Yan Janet - manuscript
    Internet of Things (IoT) devices have transformed various industries, enabling advanced functionalities across domains such as healthcare, smart cities, and industrial automation. However, the increasing number of connected devices has raised significant concerns regarding their security. IoT networks are highly vulnerable to a wide range of cyber threats, making Intrusion Detection Systems (IDS) critical for identifying and mitigating malicious activities. This paper proposes a hybrid approach for intrusion detection in IoT networks by combining Machine Learning (ML) techniques with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  76
    Securing IoT Networks: Machine Learning-Based Malware Detection and Adaption.G. Ganesh - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (5):1-16.
    Although Internet of Things (IoT) devices are being rapidly embraced worldwide, there are still several security concerns. Due to their limited resources, they are susceptible to malware assaults such as Gafgyt and Mirai, which have the ability to interrupt networks and infect devices. This work looks into methods based on machine learning to identify and categorize malware in IoT network activity. A dataset comprising both malware and benign traffic is used to assess different classification techniques, such as Random (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. The teaching of computer ethics on computer science and related degree programmes. a European survey.Ioannis Stavrakakis, Damian Gordon, Brendan Tierney, Anna Becevel, Emma Murphy, Gordana Dodig-Crnkovic, Radu Dobrin, Viola Schiaffonati, Cristina Pereira, Svetlana Tikhonenko, J. Paul Gibson, Stephane Maag, Francesco Agresta, Andrea Curley, Michael Collins & Dympna O’Sullivan - 2021 - International Journal of Ethics Education 7 (1):101-129.
    Within the Computer Science community, many ethical issues have emerged as significant and critical concerns. Computer ethics is an academic field in its own right and there are unique ethical issues associated with information technology. It encompasses a range of issues and concerns including privacy and agency around personal information, Artificial Intelligence and pervasive technology, the Internet of Things and surveillance applications. As computing technology impacts society at an ever growing pace, there are growing calls for more computer (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  33.  96
    Digital Monitoring of Diesel Generators.B. Ujwala - 2024 - International Journal of Engineering Innovations and Management Strategie 1 (3):1-13.
    The increasing demand for reliable power sources has made diesel generators essential in various industries. However, traditional monitoring methods often rely on manual inspections, resulting in inefficiencies, unplanned downtimes, and higher operational costs. This project proposes a digital monitoring system for diesel generators that leverages advanced sensor technologies and real-time data analytics to overcome these challenges. The system will utilize Internet of Things (IoT) devices to collect key operational parameters, such as fuel levels, temperature, vibration, and performance metrics, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. The First Protocol Of Reaching Consensus Under Unreliable Mobile Edge Computing Paradigm.Ching ShuWang, Yan Qin, Yao Tsai Te & Shu-Ching Wang - 2019 - International Journal of Innovative Computing, Information and Control 15 (2):713 - 723.
    Mobile Edge Computing (MEC) is an emerging technology that enables computing directly at the edge of the cloud computing network. Therefore, it is important that MEC is applied with reliable transmission. The problem of reaching consensus in the distributed system is one of the most important issues in designing a reliable transmission network. However, all previous protocols for the consensus problem are not suitable for an MEC paradigm. It is the first time an optimal protocol of reaching consensus is pro- (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  22
    Smart Home Security System Using Arduino.Jay Dudhatra Karan Gori - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (10):4139-4144.
    Internet of Things (IoT) conceptualizes the idea of remotely connecting and monitoring real world objects (things) through the Internet [1]. When it comes to our house, this concept can be aptly incorporated to make it smarter, safer and automated. This IoT project focuses on building a smart wireless home security system which sends alerts to the owner by using Internet in case of any trespass and raises an alarm optionally. Besides, the same can also be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. State of the Art on Ethical, Legal, and Social Issues Linked to Audio- and Video-Based AAL Solutions.Alin Ake-Kob, Aurelija Blazeviciene, Liane Colonna, Anto Cartolovni, Carina Dantas, Anton Fedosov, Francisco Florez-Revuelta, Eduard Fosch-Villaronga, Zhicheng He, Andrzej Klimczuk, Maksymilian Kuźmicz, Adrienn Lukacs, Christoph Lutz, Renata Mekovec, Cristina Miguel, Emilio Mordini, Zada Pajalic, Barbara Krystyna Pierscionek, Maria Jose Santofimia Romero, Albert AliSalah, Andrzej Sobecki, Agusti Solanas & Aurelia Tamo-Larrieux - 2021 - Alicante: University of Alicante.
    Ambient assisted living technologies are increasingly presented and sold as essential smart additions to daily life and home environments that will radically transform the healthcare and wellness markets of the future. An ethical approach and a thorough understanding of all ethics in surveillance/monitoring architectures are therefore pressing. AAL poses many ethical challenges raising questions that will affect immediate acceptance and long-term usage. Furthermore, ethical issues emerge from social inequalities and their potential exacerbation by AAL, accentuating the existing access gap between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Multi-Layer Intrusion Detection Framework for IoT Systems Using Ensemble Machine Learning.Janet Yan - manuscript
    The proliferation of Internet of Things (IoT) devices has introduced a range of opportunities for enhanced connectivity, automation, and efficiency. However, the vast array of interconnected devices has also raised concerns regarding cybersecurity, particularly due to the limited resources and diverse nature of IoT devices. Intrusion detection systems (IDS) have emerged as critical tools for identifying and mitigating security threats. This paper proposes a Multi-Layer Intrusion Detection Framework for IoT systems, leveraging Ensemble Machine Learning (EML) techniques to improve (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Present Scenario of Fog Computing and Hopes for Future Research.G. KSoni, B. Hiren Bhatt & P. Dhaval Patel - 2019 - International Journal of Computer Sciences and Engineering 7 (9).
    According to the forecast that billions of devices will get connected to the Internet by 2020. All these devices will produce a huge amount of data that will have to be handled rapidly and in a feasible manner. It will become a challenge for real-time applications to handle this huge data while considering security issues as well as time constraints. The main highlights of cloud computing are on-demand service and scalability; therefore the data generated from IoT devices are generally (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. The problem of the consent for the processing of health data, particularly for biomedical research purposes, from the perspective of fundamental rights protection in the Digital Era.Joaquín Sarrión Esteve - 2018 - Revista de Derecho y Genoma Humano: Genética, Biotecnología y Medicina Avanzada = Law and the Human Genome Review: Genetics, Biotechnology and Advanced Medicine 48:107-132.
    Health data processing fields face ethical and legal problems regarding fundamental rights. As we know, patients can benefit in the Digital Era from having health or medical information available, and medical decisions can be more effective with a better understanding of clinical histories, medical and health data thanks to the development of Artificial Intelligence, Internet of Things and other Digital technologies. However, at the same time, we need to guarantee fundamental rights, including privacy ones. The complaint about ethical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  99
    OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Information Systems Governance and Industry 4.0 - epistemology of data and semiotic methodologies of IS in digital ecosystems.Ângela Lacerda Nobre, Rogério Duarte & Marc Jacquinet - 2018 - Advances in Information and Communication Technology 527:311-312.
    Contemporary Information Systems management incorporates the need to make explicit the links between semiotics, meaning-making and the digital age. This focus addresses, at its core, pure rationality, that is, the capacity of human interpretation and of human inscription upon reality. Creating the new real, that is the motto. Humans are intrinsically semiotic creatures. Consequently, semiotics is not a choice or an option but something that works like a second skin, establishing limits and permeable linkages between: human thought and human's infinite (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  87
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43.  95
    Towards Inclusive Societies: Leveraging IoT for Community Development and Education.Sudip Suklabaidya - 2024 - Novel Insights 1 (1):40-51.
    The proliferation of Internet of Things (IoT) technologies presents a promising avenue for fostering inclusive societies through community development and education initiatives. This paper explores the potential of leveraging IoT to address societal inequalities and empower marginalized communities. Through a multidisciplinary lens, the paper examines the intersection of IoT, community development, and education, elucidating how IoT-enabled solutions can contribute to building more resilient, connected, and equitable societies. By harnessing IoT devices, sensor networks, and data analytics, community development efforts (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. The Different Way of Utilizing the Intellectual of Artificial Intelligence in the Animal Farming Field Progress of AI.K. Krishna Kumar Deepak Kumar, Laith H. Alzubaidi, Awadhesh Chandramauli, Raheem Unissa, Saloni Bansal - 2024 - International Conference on Advance Computing and Innovative Technologies in Engineering 4 (1):1624-1626.
    The goal of this project is to create a prototype smart farm using Internet of Things (IoT) technology. Developing an Internet of Things feeding control system and designing and implementing environmental monitoring and control systems for farm housing are the primary objectives. The development method uses open-source hardware and software and is conducted in pig farms in the Thai region of Nakhon Si Thammara. An ESP8266 Wi-Fi microcontroller is crucial to the system design, allowing several sensors (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45.  95
    A New Framework and Performance Assessment Method for Distributed Deep Neural NetworkBased Middleware for Cyberattack Detection in the Smart IoT Ecosystem.Tambi Varun Kumar - 2024 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 11 (5):2283-2291.
    In the current digital environment, cyberattacks continue to pose a serious risk and difficulty. Internet of Things (IoT) devices are becoming more and more vulnerable due to security problems like ransomware, malware, poor encryption, and IoT botnets. These flaws may result in ransom demands, data tampering, illegal access, and system risks. Creating strong cybersecurity procedures for contemporary smart environments is essential to resolving these problems. This strategy uses proactive network traffic monitoring to spot any dangers in the (...) of Things ecosystem. Our approach is to improve Smart Environments' security and awareness of potential threats. Two IoT gateways were used to examine the effectiveness and performance of a deep neural network (DNN) model. The results were promising: the model caused an average increase of less than 30 kb/s in network bandwidth and a mere 2% rise in CPU usage. Additionally, memory and power consumption were minimal, with 0.42 GB and 0.2 GB of memory usage for NVIDIA Jetson and Raspberry Pi devices, respectively, and an average 13.5% increase in power consumption per device. The machine learning models achieved nearly 93% detection accuracy and a 92% F1 score on the datasets used. Our framework demonstrates an effective and efficient method for detecting malware and attacks in Smart Environments. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   66 citations  
  46.  42
    Wireless EV Charging _Pathway Based on Electromagnetic Energy (13th edition).S. Karthickeyan A. Bhuvaneswari, - 2024 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 13 (5):1363-1368. Translated by P.K.Selvarani S.Pavithra.
    This project presents a dynamic wireless charging system for electric vehicles (EVs) with the Arduino Uno microcontroller as the main controller. The system features a transmitter (TX) coil embedded in roadway infrastructure and a receiver (RX) coil installed in the vehicle unit, enabling continuous charging while in motion. Energy is wirelessly transferred from the TX coil to the RX coil through electromagnetic induction. The Arduino Uno microcontroller serves as the central control unit, managing power transmission, monitoring charging status, and regulating (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47.  19
    CYBERSECURITY STRATEGIES FOR IOT DEVICES IN SMART CITIES.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-6.
    The rapid proliferation of Internet of Things (IoT) devices in smart cities has introduced numerous benefits, enhancing urban efficiency, sustainability, and automation. However, these interconnected systems also pose significant cybersecurity challenges, including data breaches, unauthorized access, and cyberattacks that can compromise critical infrastructure. This paper explores various cybersecurity strategies tailored for IoT environments in smart cities, focusing on encryption techniques, secure authentication mechanisms, network security protocols, and blockchain-based security models. Additionally, it discusses machine learningbased anomaly detection systems to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48.  80
    Innovative Robotic Solutions for Improved Stock Management Efficiency.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):680-690.
    The primary objective of this research is to enhance the precision and speed of stock handling while minimizing human intervention and error. Our design incorporates state-of-the-art sensors, real-time tracking systems, and autonomous robots programmed with advanced algorithms for object identification, gripping, and movement. We propose a systematic workflow for automating the storage and retrieval process, starting from the identification of the stock to its precise placement and retrieval within the storage facility. The design also addresses potential challenges such as robot (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  39
    Adaptive Cybersecurity in the Digital Age: Emerging Threat Vectors and Next-Generation Defense Strategies.Harish Kumar Reddy Kommera - 2024 - International Journal for Research in Applied Science and Engineering Technology (Ijraset) 12 (9):558-564.
    This article examines the rapidly evolving landscape of cybersecurity, focusing on emerging threats and innovative defense mechanisms. We analyze four key threat vectors: Advanced Persistent Threats (APTs), ransomware, Internet of Things (IoT) vulnerabilities, and social engineering attacks. These threats pose significant risks to organizations, including data breaches, financial losses, and operational disruptions. In response, we explore cutting-edge defense mechanisms such as Artificial Intelligence and Machine Learning for threat detection, Zero Trust Architecture for access control, blockchain for data integrity, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  50. Effective Urban Resilience through AI-Driven Predictive Analytics in Smart Cities.E. Garcia - manuscript
    Urban resilience is critical for ensuring the sustainability and adaptability of cities in the face of growing challenges such as climate change, population growth, and infrastructure degradation. Predictive analytics, powered by Artificial Intelligence (AI) and the Internet of Things (IoT), offers a transformative approach to enhancing urban resilience. This paper explores how AI-driven predictive analytics can optimize disaster preparedness, infrastructure maintenance, and resource allocation in smart cities. By integrating real-time data from IoT sensors with advanced machine learning models, (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 977