Academic literature on the topic 'IOT-BASED APMS'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IOT-BASED APMS.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "IOT-BASED APMS"

1

Sathishkumar, D., and C. Karthikeyan. "Adaptive power management strategy-based optimization and estimation of a renewable energy storage system in stand-alone microgrid with machine learning and data monitoring." International Journal of Wavelets, Multiresolution and Information Processing 18, no. 01 (September 4, 2019): 1941023. http://dx.doi.org/10.1142/s0219691319410236.

Full text
Abstract:
This work is carried out with the optimum design of a stand-alone hybrid energy storage system (HESS) based on solar, wind and super capacitor (SC) with battery storage system which is effectively optimized in the grid power system. The distribution of the power source is mainly considered on the Hybrid renewable energy power sources. This discourse presents an adaptive power optimizing the three-phase inverter and grid-connected hybrid renewable energy resources efficiently. In this analysis, the similar parameters are taken for the compensation such as voltage fluctuation, harmonics and Frequency imbalance by implementing Adaptive Power Management Strategy (APMS) and the obtained issues are synchronized by inverter control. All these comparative activities of the inverter are done either discretely or combined to stabilize the unbalanced impacts of a wide range of adjusted, uneven, power loss at the circulation level. A battery and SC energy management are essential for maintaining the energy sustainability in renewable energy system. Combination of solar and wind with the battery and SC is used to test the proposed stand-alone grid management. The proposed hybrid power system is designed to work under classical-based energy management and this performance is monitored with the help of the Internet of Things (IoT) and machine learning based on Polynomial Linear Regression Algorithm. The focus of the suggested HESS is reduced by the loss in stand-alone grid system with an economic performances.
APA, Harvard, Vancouver, ISO, and other styles
2

Bishnoi, Prevesh Kumar. "Cloud Based Electrical Device Control Middleware APIs for IoT." International Journal of Emerging Trends in Engineering Research 8, no. 2 (February 15, 2020): 464–70. http://dx.doi.org/10.30534/ijeter/2020/34822020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Oktian, Yustus Eko, Sang-Gon Lee, and Hoon Jae Lee. "Hierarchical Multi-Blockchain Architecture for Scalable Internet of Things Environment." Electronics 9, no. 6 (June 25, 2020): 1050. http://dx.doi.org/10.3390/electronics9061050.

Full text
Abstract:
Many researchers challenge the possibility of using blockchain and smart contracts to disrupt the Internet of Things (IoT) architecture because of their security and decentralization guarantees. However, the state-of-the-art blockchain architecture is not scalable enough to satisfy the requirements of massive data traffics in the IoT environment. The main reason for this issue is one needs to choose the consensus trade-off between either coping with a high throughput or a high number of nodes. Consequently, this issue prevents the applicability of blockchain for IoT use cases. In this paper, we propose a scalable two-tiered hierarchical blockchain architecture for IoT. The first tier is a Core Engine, which is based on a Practical Byzantine Fault Tolerance (PBFT) consensus to cope with a high throughput, that supervises the underlying subordinate engines (sub-engines) as its second tier. This second tier comprises of the Payment, Compute, and Storage Engine, respectively. We can deploy multiple instances of these sub-engines as many as we need and as local as possible near to the IoT domains, where IoT devices reside, to cope with a high number of nodes. Furthermore, to further extend the scalability of the proposed architecture, we also provide additional scalability features on the Core Engine such as request aggregation, request prioritization, as well as sub-engine parallelism. We implement all of our engines and expose them to IoT applications through the Engine APIs. With these APIs, developers can build and run IoT applications in our architecture. Our evaluation results show that our proposed features on the Core Engine can indeed enhance the overall performance of our architecture. Moreover, based on our proof-of-concept IoT car rental application, we also show that the interoperability between sub-engines through the Core Engine is possible, even when the particular sub-engine is under sub-engine parallelism.
APA, Harvard, Vancouver, ISO, and other styles
4

Jin, Wenquan, Rongxu Xu, Sunhwan Lim, Dong-Hwan Park, Chanwon Park, and Dohyeun Kim. "Integrated Service Composition Approach Based on Transparent Access to Heterogeneous IoT Networks Using Multiple Service Providers." Mobile Information Systems 2021 (May 28, 2021): 1–19. http://dx.doi.org/10.1155/2021/5590605.

Full text
Abstract:
The Internet of Things (IoT) enables the number of connected devices to be increased rapidly based on heterogeneous technologies such as platforms, frameworks, libraries, protocols, and standard specifications. Based on the connected devices, various applications can be developed by integrating domain-specific contents using the service composition for providing improved services. The management of the information including devices, contents, and composite objects is necessary to represent the physical objects on the Internet for accessing the IoT services transparently. In this paper, we propose an integrated service composition approach based on multiple service providers to provide improved IoT services by combining various service objects in heterogeneous IoT networks. In the proposed IoT architecture, each service provider provides web services based on Representational State Transfer (REST) Application Programming Interface (API) that delivers information to the clients as well as other providers for integrating the information to provide new services. Through the REST APIs, the integration management provider combines the service result of the IoT service provider to other contents to provide improved services. Moreover, the interworking proxy is proposed to bridge heterogeneous IoT networks for enabling transparent access in the integrated services through proving protocol translating on the entry of the device networks. Therefore, the interworking proxy is deployed between the IoT service provider and device networks to enable clients to access heterogeneous IoT devices through the composited services transparently.
APA, Harvard, Vancouver, ISO, and other styles
5

Alasbali, Nada, Saaidal Razalli Bin Azzuhri, Rosli Bin Salleh, Miss Laiha Mat Kiah, Ahmad Aliff A. S. Ahmad Shariffuddin, Nik Muhammad Izwan bin Nik Mohd Kamel, and Leila Ismail. "Rules of Smart IoT Networks within Smart Cities towards Blockchain Standardization." Mobile Information Systems 2022 (February 23, 2022): 1–11. http://dx.doi.org/10.1155/2022/9109300.

Full text
Abstract:
Motivation. Standardization in smart city applications is restricted by the competitive pressures of proprietary innovation and technological compartmentalization. Interoperability across networks, databases, and APIs is essential to achieving the smart objectives of technology-supported urban environments. Methodology. The issues that smart cities face, as well as the usage of blockchain in Internet of Things (IoT) applications, are discussed in this research paper. Problem Statement. The study shows the obstacles to the establishment of an IoT-driven smart city agenda, including system security, dispersed node interoperability, data resource management, and scalability of a diverse IoT network. Results. To resolve these challenges, this research proposes a working infinite loop model for establishing a standardized, intermediary cloud-based blockchain for IoT networking within smart cities. The blockchain intermediary function will resolve critical gaps in the existing, distributed IoT-based smart cities’ standards, drawing connections between nodes, users, and service providers that are enabled through autonomous, immutable, and nonrepudiated transactions.
APA, Harvard, Vancouver, ISO, and other styles
6

Surianarayanan, Chellammal, and Pethuru Raj Chelliah. "Integration of the Internet of Things and Cloud." International Journal of Cloud Applications and Computing 13, no. 1 (July 10, 2023): 1–30. http://dx.doi.org/10.4018/ijcac.325624.

Full text
Abstract:
The integration of IoT and cloud poses increased security challenges. Implementing security mechanisms in IoT systems is challenging due to the availability of limited resources, large number of devices, heterogeneity of devices, generation of bulk data, etc. Likewise, cloud resources are also vulnerable to security issues due to virtualization, insider threats, data loss, data breaches, insecure APIs, etc. Security is of major concern with the integration of IoT and cloud. The primary objective of this review is to highlight the security issues associated with an IoT system and cloud system and with the integration of the two, as well as to highlight solutions in each case. The secondary objective is to describe popular IoT-cloud platforms and also to highlight how such platforms facilitate secure integration. Ultimately a highlight on a shared responsibility model of implementing security is emphasized as both IoT users and cloud service providers have to cooperatively share the responsibility to deploy secure cloud-based IoT applications.
APA, Harvard, Vancouver, ISO, and other styles
7

Alexakis, George, Spyros Panagiotakis, Alexander Fragkakis, Evangelos Markakis, and Kostas Vassilakis. "Control of Smart Home Operations Using Natural Language Processing, Voice Recognition and IoT Technologies in a Multi-Tier Architecture." Designs 3, no. 3 (July 1, 2019): 32. http://dx.doi.org/10.3390/designs3030032.

Full text
Abstract:
The Internet of Things (IoT) is an emerging Internet-based architecture, enabling the exchange of data and services in a global network. With the advent of the Internet of Things, more and more devices are connecting to the Internet in order to help people get and share data or program actions. In this paper, we introduce an IoT Agent, a Web application for monitoring and controlling a smart home remotely. The IoT Agent integrates a chat bot that can understand text or voice commands using natural language processing (NLP). With the use of NLP, home devices are more user-friendly and controlling them is easier, since even when a command or question/command is different from the presets, the system understands the user’s wishes and responds accordingly. Our solution exploits several available Application Programming Interfaces (APIs), namely: the Dialogflow API for the efficient integration of NLP to our IoT system, the Web Speech API for enriching user experience with voice recognition and synthesis features, MQTT (Message Queuing Telemetry Transport) for the lightweight control of actuators and Firebase for dynamic data storage. This is the most significant innovation it brings: the integration of several third-party APIs and open source technologies into one mash-up, highlighting how a new IoT application can be built today using a multi-tier architecture. We believe that such a tiered architecture can be very useful for the rapid development of smart home applications.
APA, Harvard, Vancouver, ISO, and other styles
8

Koptyra, Katarzyna, and Marek R. Ogiela. "Steganography in IoT: Information Hiding with APDS-9960 Proximity and Gestures Sensor." Sensors 22, no. 7 (March 29, 2022): 2612. http://dx.doi.org/10.3390/s22072612.

Full text
Abstract:
This article describes a steganographic system for IoT based on an APDS-9960 gesture sensor. The sensor is used in two modes: as a trigger or data input. In trigger mode, gestures control when to start and finish the embedding process; then, the data come from an external source or are pre-existing. In data input mode, the data to embed come directly from the sensor that may detect gestures or RGB color. The secrets are embedded in time-lapse photographs, which are later converted to videos. Selected hardware and steganographic methods allowed for smooth operation in the IoT environment. The system may cooperate with a digital camera and other sensors.
APA, Harvard, Vancouver, ISO, and other styles
9

Nock, Oliver, Jonathan Starkey, and Constantinos Marios Angelopoulos. "Addressing the Security Gap in IoT: Towards an IoT Cyber Range." Sensors 20, no. 18 (September 22, 2020): 5439. http://dx.doi.org/10.3390/s20185439.

Full text
Abstract:
The paradigm of Internet of Things has now reached a maturity level where the pertinent research goal is the successful application of IoT technologies in systems of high technological readiness level. However, while basic aspects of IoT connectivity and networking have been well studied and adequately addressed, this has not been the case for cyber security aspects of IoT. This is nicely demonstrated by the number of IoT testbeds focusing on networking aspects and the lack of IoT testbeds focusing on security aspects. Towards addressing the existing and growing skills-shortage in IoT cyber security, we present an IoT Cyber Range (IoT-CR); an IoT testbed designed for research and training in IoT security. The IoT-CR allows the user to specify and work on customisable IoT networks, both virtual and physical, and supports the concurrent execution of multiple scenarios in a scalable way following a modular architecture. We first provide an overview of existing, state of the art IoT testbeds and cyber security related initiatives. We then present the design and architecture of the IoT Cyber Range, also detailing the corresponding RESTful APIs that help de-associate the IoT-CR tiers and obfuscate underlying complexities. The design is focused around the end-user and is based on the four design principles for Cyber Range development discussed in the introduction. Finally, we demonstrate the use of the facility via a red/blue team scenario involving a variant of man-in-the-middle attack using IoT devices. Future work includes the use of the IoT-CR by cohorts of trainees in order to evaluate the effectiveness of specific scenarios in acquiring IoT-related cyber-security knowledge and skills, as well as the IoT-CR integration with a pan-European cyber-security competence network.
APA, Harvard, Vancouver, ISO, and other styles
10

Klochko, Oksana V., Vasyl M. Fedorets, Maksym V. Mazur, and Yurii P. Liulko. "An IoT system based on open APIs and geolocation for human health data analysis." CTE Workshop Proceedings 10 (March 21, 2023): 399–413. http://dx.doi.org/10.55056/cte.567.

Full text
Abstract:
Development of applications based on open API is becoming increasingly popular today. Innovative projects using these technologies provide new opportunities for real-time human health monitoring. Such opportunities are also implemented using Internet of Things (IoT), artificial intelligence (AI) and cloud computing technologies. In the study, we developed an application based on open APIs using smart gadgets and meteorological geographic information system in the process of generating a message about the dangers to human health associated with: the presence of pollen in the air (grass pollen, birch pollen and olive pollen) indicating the level of its concentration in the air; problems with air quality, if the air quality indicator exceeds the permissible standards. The addition of such functions expands the possibilities to provide timely information about potential risks and threats and, accordingly, is an "anthropo-geo-sensor-digital" prerequisite for effective decision-making, prevailing. The implementation of this IoT system has significant methodological and technological potential that can be used to improve the efficiency of Healthcare, both in extreme conditions and in conditions of sustainable existence. First of all, this is relevant during and after the COVID-19 pandemic. The system we have developed can also be seen as one of the ways to innovate in Healthcare, in the educational process in institutions of higher education and in further scientific research on this topic. Further research in this area may be related to data processing in Healthcare systems based on machine learning, deep learning.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "IOT-BASED APMS"

1

NANDANWAR, HIMANSHU. "SMART IOT BASED AIR QUALITY MONITORING SYSTEMS FOR SMART CITIES: DESIGNS ISSUES, IMPLEMENTATION, ANALYTICS, AND CHALLENGES." Thesis, 2022. http://dspace.dtu.ac.in:8080/jspui/handle/repository/19103.

Full text
Abstract:
Air pollution has become a major global problem, with severe adverse effects on humans and their environment. Given this alarming situation, a system that allows both urban and rural populations to monitor air quality so that they can take the necessary precautions and measures. Such systems that maintain healthy environmental conditions must be designed and implemented. Toxic gas and fine dust that dissolve in the air greatly contribute to this pollution. With the availability of intelligent internet-based sensor systems that can record, analyze and predict air quality, we can develop them. Intelligent IoT-based air pollution monitoring systems(APMS) have proven to be a future solution. Many researchers have proposed several IoT-based solutions for air pollution monitoring systems. This paper focuses on understanding the various environment variables, pollutants, and components of existing intelligent IOT-based APMS. The study also has the vision of focusing on a comparative analysis of available systems and providing an overview of the relevance of pollution control systems in smart urban environments. This article also provides a comprehensive overview of the different classes of sensors, microcontrollers, and required communication technologies. This overview paper provides a general architecture for intelligent APMS and discusses various parameters in more detail. This article summarizes the challenges and open research areas. This review paper concludes with an analysis and recommendations to make Intelligent APMS reliable, efficient, and cost-effective.
APA, Harvard, Vancouver, ISO, and other styles
2

Zheng, Yu-Jie, and 鄭玉婕. "The Design of Incorporating Robots and IoT Toys in a Game-Based English Learning Scenario and the Effects of Robot Providing Guidance on Children''s English Listening Performance." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/2qx9g4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "IOT-BASED APMS"

1

Chaki, Rituparna. "An NLP-Based Scheme for User Data Security From Overprivileged IoT Apps." In Security in IoT, 99–114. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003149507-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rajarajeswari S. and Hema N. "Edge Computing in Intelligent IoT." In Convergence of Deep Learning and Internet of Things, 157–81. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-6275-1.ch008.

Full text
Abstract:
We can perceive, analyse, control, and optimise the conventional physical systems thanks to pervasive IoT applications. Numerous IoT apps have recently had security breaches, which suggests that IoT applications could endanger physical systems. Numerous security issues in IoT applications are mostly caused by two factors: severe resource restrictions and inadequate security architecture. Edge-based security designs for IoT applications are still in their infancy, despite some research efforts in this direction. In addition to providing an in-depth analysis of current edge-based IoT security options, this study seeks to provide inspiration for new edge-based IoT security designs. A significant deal of progress in artificial intelligence (AI) opens up a number of potential avenues for addressing the security challenges in the setting that privacy preservation and security have become essential issues for EC. This chapter addresses issues with edge computing-based internet of things at the computation and security levels.
APA, Harvard, Vancouver, ISO, and other styles
3

Susan M. B., Jennyfer, P. Subashini, and M. Krishnaveni. "Artificial Intelligence of Things for Smart Healthcare Development." In Advances in Computational Intelligence and Robotics, 29–60. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-8098-4.ch003.

Full text
Abstract:
Smart healthcare systems are the health services that use the technologies like wearable devices, internet of things (IoT), and mobile internet to access medical information dynamically. It connects people, materials, and institutions related to healthcare; actively manages; and automatically responds to medical ecosystem needs. It helps the traditional medical system in making healthcare more efficient, convenient, and personalized. This chapter proposed (1) a review of smart healthcare development using artificial intelligence, the internet of things, and smartphone Android apps; (2) an experimental approach using IoT-based smart monitoring systems, Android apps for data collection, and artificial algorithms to predict cervical cancer diseases; (3) the integration of IoT and AI algorithms. Artificial intelligence of things (AIoT) is proposed in this chapter as an experimental method for predicting cervical cancer from smart colposcopy images. The literature published in international journals and proceedings between 2010 and June 2022 is considered for the study.
APA, Harvard, Vancouver, ISO, and other styles
4

Singh Bedi, Harpreet, Raghav Gupta, Manoj Sindhwani, and Kamal Kumar Sharma. "Hydroponics Monitoring System Based on IoT and Blockchain." In Cross-Industry Blockchain Technology: Opportunities and Challenges in Industry 4.0, 74–86. BENTHAM SCIENCE PUBLISHERS, 2022. http://dx.doi.org/10.2174/9789815051452122010006.

Full text
Abstract:
Since blockchain is the central technology of bitcoin, block chain has gained a lot of attention in recent years. Its applications are expanding in a variety of fields, including Internet of Things (IoT) defense, banking, industries, and medical centre. Furthermore, IoT has grown in popularity because of its widespread usage in smart homes and urban developments around the world. This paper presents the design of an automated system for a greenhouse focusing mainly on Hydroponics. Along with the design, the purpose of this study is monitoring, control, and visualization of the data. This project addresses some of the issues in traditional farming. Issues like incapability of agriculture due to small and fragmented land holdings, risk in using manures and pesticides, and lack of mechanization. The segments of this project include the main module (referred to as AGMS), the cloud, and the end user. The data visualization is done through a website that will acquire it from a Wi-Fi module through APIs. The study also includes social media alerts to platforms like Twitter and mail.
APA, Harvard, Vancouver, ISO, and other styles
5

Hwang, Jong-Gyu, Tae-Ki An, Kyeong-Hee Kim, and Chung-Gi Yu. "IoT-Based Route Guidance Technology for the Visually Impaired in Indoor Area." In Smart Mobility - Recent Advances, New Perspectives and Applications [Working Title]. IntechOpen, 2022. http://dx.doi.org/10.5772/intechopen.105549.

Full text
Abstract:
The mobility handicapped, especially the visually impaired, are complaining of many difficulties and inconveniences in moving in underground spaces such as subway stations due to inconvenience in behavior and lack of guidance information. Route guidance for the visually impaired through various mobile apps using the newest global positioning system (GPS) is supported, but these apps cannot be used in areas where GPS signals are not received. To solve this problem, in this chapter, an Internet of things (IoT) sensor-based route guidance technology was presented to improve the mobility of the visually impaired in indoor areas such as railway stations and a mobile app has been developed, where an IoT-sensor-based user positioning algorithm and user convenience are considered. In addition, to evaluate the applicability of the developed system, the user satisfaction was measured through a test at the virtual Busan City Hall metro station for the visually impaired. The route guidance technology presented in this chapter is expected to contribute greatly to the improvement in the mobility of the visually impaired in indoor areas including railway stations.
APA, Harvard, Vancouver, ISO, and other styles
6

Buttar, Ahmed Mateen, Mubeen Abbas, and Muhammad Majid. "Optimized Storage and Resource Management in Fog Computing Paradigm." In Advances in Wireless Technologies and Telecommunication, 117–36. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-7348-1.ch008.

Full text
Abstract:
Fog computing reduces network usage and latency. The fog layer connects IoT users to the cloud by executing applications or processing data in network infrastructure devices. Cloud-based IoT can provide communication, computing, and storage. Offloading computer-intensive apps with fog is promising. Fog computing expands IoT roles at the network edge and supports cloud platforms. Clients can send control signals using fog computing and cloud services. Offload latency-sensitive user experiences to broken fog nodes at the network's edge. This makes real-time cloud management of sensors, actuators, and wi-fi routers difficult. Most cloud efforts allocate communication and computational resources. Fog computing emphasizes communication or computation. Fog computing can improve service quality and manage network challenges caused by real-time, latency-sensitive applications and IoT bandwidth and user resource limitations. This chapter examines computing and communication resource allocation. In this chapter, the author also discusses service delay, link quality, and mandatory benefits.
APA, Harvard, Vancouver, ISO, and other styles
7

Veera Prudhvi Raja, K., B. Jagadeesh Babu, and M. S. R. Sekhar. "An Architectural Study of Hyper Dimensional Processor for Human-Centric IoT." In Advances in Transdisciplinary Engineering. IOS Press, 2022. http://dx.doi.org/10.3233/atde220714.

Full text
Abstract:
In this paper study about Hyper-Dimensional Computing (HDC) for different applications. The architectural supports energy-efficient, fast, and scalable search operations using three generally utilized design methodologies. To grasp underlying circumstances and interact with their settings, many Internets of Things (IoT) apps rely on human action recognition. Machine learning is a popular technique for identifying actions based on sensor data. The application of a brain-inspired hyperdimensional computing technology to because IoT systems have a hard time recognizing activities, making activity detection easier is a good solution. can improve accuracy and efficiency. The model training was sped up by up to 468 times when compared to advanced training of Neural network.
APA, Harvard, Vancouver, ISO, and other styles
8

Surendar, A. "Computer Forensic Investigation in Cloud of Things." In Computational Intelligence in the Internet of Things, 256–70. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7955-7.ch011.

Full text
Abstract:
Digital data transformation is most challenging in developing countries. In recent days, all the applications are functioning with the support of internet of things (IoT). Wearable devices involve the most insightful information, which includes individual healthcare data. Health records of patients must be protected. IoT devices could be hacked, and criminals use this information. Smart cities with IoT use information technology to collect, analyze, and integrate information. Smart reduces the network traffic using the ground sensors, micro-radars, and drones monitor traffic to the traffic controller based on that signals are designed. The data collected includes the images and convey information to smart vehicles, which in turn, if data are hacked, may affect many people. Smart city includes important features such as smart buildings, smart technology, smart governance, smart citizen, and smart security. Cyber threat is a challenging problem, and usage of apps may increase malware that affects various customers.
APA, Harvard, Vancouver, ISO, and other styles
9

Surendar, A. "Computer Forensic Investigation in Cloud of Things." In Cyber Warfare and Terrorism, 855–65. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch052.

Full text
Abstract:
Digital data transformation is most challenging in developing countries. In recent days, all the applications are functioning with the support of internet of things (IoT). Wearable devices involve the most insightful information, which includes individual healthcare data. Health records of patients must be protected. IoT devices could be hacked, and criminals use this information. Smart cities with IoT use information technology to collect, analyze, and integrate information. Smart reduces the network traffic using the ground sensors, micro-radars, and drones monitor traffic to the traffic controller based on that signals are designed. The data collected includes the images and convey information to smart vehicles, which in turn, if data are hacked, may affect many people. Smart city includes important features such as smart buildings, smart technology, smart governance, smart citizen, and smart security. Cyber threat is a challenging problem, and usage of apps may increase malware that affects various customers.
APA, Harvard, Vancouver, ISO, and other styles
10

Hallur, Sudhakar, Vishweshkumar Aithal, and Vinay Sangolli. "IOT Based Smart Healthcare Applications Using Artificial Intelligence or Machine Learning Algorithms." In Applications of Artificial Intelligence and Machine Learning in Healthcare. Technoarete Publishing, 2022. http://dx.doi.org/10.36647/aaimlh/2022.01.b1.ch005.

Full text
Abstract:
Applications that include remote correspondences via IoT are profoundly inclined to security chances. Larger part of the applications currently goes remote including IoT as an innovation to convey to their particular objective. IoT is considered as a fate of Web. The Web of Things is imagined to fill quickly in the field of medical care in the approaching a very long time due the multiplication of correspondence innovation, the accessibility, combination and use of the application-coordinated gadgets and administrations. In addition, in this pandemic, the integration and competent correspondence of patient wellbeing watching bounds is critical. The IoT architecture is discussed in this chapter, which includes equipment correspondence protocols that support a layer of medical care administrations and apps that use Machine Learning and Artificial Intelligence algorithms. In addition, difficulties in data security, security, and incompatibility are explored. This chapter also includes some of the real-time Healthcare test cases where decisions are taken by a sample algorithm whose solution is proposed to the user..
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "IOT-BASED APMS"

1

Bagade, Priyanka, Ayan Banerjee, and Sandeep K. S. Gupta. "Rapid evidence-based development of mobile medical IoT apps." In 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops). IEEE, 2016. http://dx.doi.org/10.1109/percomw.2016.7457157.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Daghal, Asaad S., Ali F. Athab, and Ghufran M. Hatem. "Social Media Apps Controls Communication Devices Based on IoT." In 2022 Muthanna International Conference on Engineering Science and Technology (MICEST). IEEE, 2022. http://dx.doi.org/10.1109/micest54286.2022.9790160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Won, Ho Sein, Abd Kadir Mahamad, Sharifah Saon, Sri Wiwoho Mudjanarko, and Muladi. "IoT Based Vehicle Parking Model with Mobile Apps Software." In 2021 IEEE 19th Student Conference on Research and Development (SCOReD). IEEE, 2021. http://dx.doi.org/10.1109/scored53546.2021.9652765.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ishak, Muhammad Yusry Bin, Samsiah Binti Ahmad, and Zalikha Zulkifli. "Iot Based Bluetooth Smart Radar Door System Via Mobile Apps." In 2019 1st International Conference on Artificial Intelligence and Data Sciences (AiDAS). IEEE, 2019. http://dx.doi.org/10.1109/aidas47888.2019.8971002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Zhan, Yuandan Dong, and Yinwan Ning. "Frequency Reconfigurable SRR-Based Compact Antenna for IoT Application." In 2020 IEEE Asia-Pacific Microwave Conference (APMC 2020). IEEE, 2020. http://dx.doi.org/10.1109/apmc47863.2020.9331673.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ohtake, Tomohiro, Yohei Seki, and Toshihiro Kodaka. "Steiner Tree Based Recommendation System for Combination of APIs and IoT Devices." In 2017 24th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 2017. http://dx.doi.org/10.1109/apsec.2017.64.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sufian, Md Abu, Niamat Hussain, Anees Abbas, Wahaj Abbas Awan, Domin Choi, and Nam Kim. "A Series fed Planar Array-based 4-port MIMO Antenna for 5G mmWave IoT Applications." In 2022 Asia-Pacific Microwave Conference (APMC). IEEE, 2022. http://dx.doi.org/10.23919/apmc55665.2022.9999962.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Swahadika, Enggar, Adnan Rachmat Anom Besari, and Iwan Kurnianto Wibowo. "Implementation of Realtime Database for IoT Home Automation and Energy Monitoring Apps based on Android." In 2019 International Electronics Symposium (IES). IEEE, 2019. http://dx.doi.org/10.1109/elecsym.2019.8901557.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ma, Xiaoyue, Qiang Zeng, Haotian Chi, and Lannan Luo. "No More Companion Apps Hacking but One Dongle: Hub-Based Blackbox Fuzzing of IoT Firmware." In MobiSys '23: 21st Annual International Conference on Mobile Systems, Applications and Services. New York, NY, USA: ACM, 2023. http://dx.doi.org/10.1145/3581791.3596857.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dogan, Engin, Ali Kursad Gorur, Ceyhun Karpuz, and Adnan Gorur. "A New and Simple Approach on Multi-Resonator Circuit Based Chipless RFID Tags for IoT Applications." In 2020 IEEE Asia-Pacific Microwave Conference (APMC 2020). IEEE, 2020. http://dx.doi.org/10.1109/apmc47863.2020.9331378.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography