The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Container-based virtualization offers several advantages such as high performance, resource efficiency, and agile environment, which can make IoT device management easy. Though previous studies introduce container-based virtualization to IoT devices, they do not address different network modes of containers and the performance issues. Because the network performance is an important factor in IoT,...
The Internet of Things promises tremendous benefits in our everyday life where healthcare is one of the application areas in which IoT has also paved its way for the development of human assistance technologies. With smart sensing and remote monitoring, peoples' health conditions can be assessed more effectively but to provide IoT services such as depressive disorder assistance still, there are many...
Most of IoT applications include large number of distributed sensors which are interesting in specific geographical area. A large number of IoT entities have multiple relations and dynamic connections with each other. And there are many group communication requirements. Flexible multicast mechanism will be essential in such environments but it is difficult to satisfy verious requirements by means...
MQTT is widely used as a flexible communication middleware for general IoT services. MQTT has publish/subscribe communication model and a broker-based architecture which may occur serious problems such as unpredictable transmission delay time and packet loss due to unknown changes of communication nodes and various traffic in a large-scale IoT environments. In this paper, we propose a communication...
Medical education is the practice of being a medical practitioner, which varies considerably across the world. It is an active research area and has evolved tremendously in recent decades. The learning activities are commonly explored using patient cases. Among multiple medical education methodologies, Case-Based Learning (CBL) is considered as an effective methodology for small-group of medical students...
Widespread onboard sensors of an automobile and sensors installed on aftermarket devices rapidly increase the number of automotive accident messages to public safety answering point operators. Unexpected massive reports from automotive emergency call devices, such as false alarms, promote semi-urgent or non-urgent calls exponentially, referred to as the PSAP overload problem. In this paper, a proxy...
As the introduction of distributed energy resources into power system is increasing and the service applications for them become more diverse, the scalability of the communication networks for monitoring and control becomes important. That is, a communication method considering loosely coupled and many-to-many relationships between distributed energy resources and their applications needs to be applied...
IoT (Internet of Things) has a large portion of our life. This is manifested by the large number of connected devices. With the exponential growth of IoT devices, IoT security is becoming important. In particular, Smart Door Lock system is extremely important because it is closely related to the safety of the user. However, the data sent and received of existing Smart Door Lock system is vulnerable...
Data interoperability is a prerequisite to achieve cross-community and cross-application sharing of information and knowledge. Heterogeneous data from multiple sources including semantic and non-semantic data sources (e.g. SNS data, web data, relational data, RDF, XML, CSV, etc.) have an important effect for IoT service provisioning. The data are not in a same type or format always that requires to...
The resource constraint is one of the top issues in the Internet of Things network. All activity in the network node should be carefully designed and managed to support the resource efficiency of the network. Hence, an energy efficient transceiver like ZigBee is popularly used as the infrastructure for the Internet of Things edge network. This paper presents our method for efficient ZigBee router...
Existing data management and searching system for Internet of Things uses centralized database. For this reason, security vulnerabilities are found in this system which consists of server such as IP spoofing, single point of failure and Sybil attack. This paper proposes data management system is based on blockchain which ensures security by using ECDSA digital signature and SHA-256 hash function....
In this paper, we propose the architecture and schemes of optical camera communication (OCC) system for the internet of lights (IoL) comprising an attentive indoor environment in which rolling-shutter cameras (including smartphone cameras) are used to receive data from light sources. Evidently, the challenges of system mainly come from the receiver side because the primary purpose of cameras is to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.