The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, attempts have been made to change the paradigm of existing plants by applying ICT to the manufacturing industry. It can be seen as an extension of factory automation, which used to automate production facilities and unmanned work in the past, but Smart Factory is an advanced model to predict and respond to the future situation. In this paper, we propose a controller that is optimized for...
In this paper, an online working condition monitoring system is designed to early warn environmental quality in manufacturing industry. It is very crucial to provide real time and accurate data for staffs, stakeholders and control center to monitor factory air quality at working place. By uploading the all collected data on internet, the environmental condition can be monitored in real time by users...
With the continuous progress of rural construction, the problem of rural drinking water pollution is increasingly prominent. In view of water pollution, a design of rural drinking water monitoring system based on wireless sensor networks is proposed that nodes take STM32 as the core chip and WLK01L39 as well as its peripheral circuits are used as wireless communication modules and Beidou S1216 is...
The Internet of Things (IoT) consists of all kinds of sensors which collect much information. The privacy and anonymity in IoT is fundamental to the system and must be resolved. Sima proposed a protocol about lightweight authentication and key agreement and claimed to be secure and robust against all existing methods of attack. In this paper, the author points out the vulnerability of Sima's protocol...
Having seamless Internet connection is highly desirable for wireless sensor network (WSN). IPv6 offers the most promising solution to deal with the large quantity of nodes or "things". This demonstration presents a versatile research and development (R&D) or prototyping platform, on which we implement generic hardware and software framework for sensing/monitoring as well as remote control...
Nowadays, the Internet of Things (IoT) is receiving more attention in commercial and academic research, especially about its security property. However, current protocols cannot satisfy the requirement of various IoT applications and introduce some problems. There are three typical problems: traditional public key infrastructure (PKI) apply in IoT will incur great overhead, wireless sensor network...
Advances in technology have enabled wireless devices to monitor and provide information than ever before. These sensors/actuators can be incorporated into any device to provide the user an immersive experience which include services such as connected-consumer, e-Health and smart transportation etc. Bluetooth Smart has emerged as popular wireless communication technology for such devices. The Received...
The near future Internet of Things (IoT) allows devices to discover and to establish cooperation autonomously in an opportunistic manner. While the incentive service is available, the front-end inter-organisational devices may help each other not only on sharing information, but they can also share their Internet connection towards saving energy. Considering that different devices may have been configured...
Disseminating sensory information from sensor nodes to the gateway node towards Data Center Server has to be guaranteed its fruitfulness. However, these important information commonly are transmitted over wireless connections whereas everyone including adversaries may join freely in the network. Hence, the correctness of received information should be emphasized. To do so, such information should...
Representational State Transfer (REST) is a web architecture that take the advantage of Hypertext Transfer Protocol (HTTP) to invoke a certain code in the server to do action, either to store, update, delete, or query a value in the server. This kind of implementation are the basis of all Application Program Interface (API) system used by the web application. API provide a tools for creating a software...
This paper introduces a network operation and management system for Korean fir ecosystem monitoring. Its purpose is to collect information on the habitat surrounding environment, including soil moisture, tree diameter growth of information, based on wireless sensor network which is one of ICT technology. The environmental information including temperature, humidity, illuminance, Co2, rainfall, soil...
Disasters are inevitable aspects of the human civilization and the limitation of extending the medical infrastructure to every corner of the demography is a challenging task. Technology can cater to need of the availability of medical expertise for each affected individual in the disaster virtually. A medical infrastructure can be envisioned using existing LAN and WAN communication technology standards...
Air quality is an essential factor to assess the health and life quality of people. However, air pollution has become an acute problem in major cities of developing countries due to the rapid industrialization and poor handling of air pollutants. In this scenario, air quality monitoring practices have been scarcely implemented largely because of the relatively high cost and technical complexity of...
The introduction of mammalian species such as rats, stoats and possums into New Zealand has proven devastating to what was once a pristine ecosystem. Unlike the accidental introduction of rats and stoats, Possum were introduced with the intention of establishing a fur trade. Pest populations rapidly grew with an abundance of vegetation and few predators. As a result, rats, stoats and possums have...
Concentration of Carbon monoxide (CO) and Carbon dioxide (CO2) that high in the air is very dangerous for human life. Carbon monoxide is a poisonous gas that damages the circulation of oxygen in the blood when inhaled, while carbon dioxide is one of the gases that cause global warming. Both gases are classified as colorless and odorless gas so that the necessary special tools to monitor their concentration...
In recent years, an increasing number of researchers have become involved in wireless sensor networks (WSNs) and cloud computing. However, integrating WSN and cloud computing technology to monitor the environment is still an open issue. In this paper, we propose a mobile-device-based environmental monitor based on SaaS (Software as a Service) of cloud computing architecture. The proposed model is...
We used the green power and WSN techniques to ad-dress issues related to cycling activities, including health records, trajectory monitoring, group positioning, and immediate safety issues. Each bicycle is equipped with a green power module, a unique WSN identification device and an optional biomedical monitoring device. GPS is not required. Bike paths are equipped with routers and gateways that serve...
The world is adopting machine-type communication, wherein sensors and actuators blend seamlessly with the environment around us, bringing a new ubiquitous computing and communication era — a shift that is, to some extent, illustrated by the explosive growth of the Internet of Things (IoT). Capillary Networks play an important role in the growth of IoT, enabling wireless sensor networks to connect...
The idea of the Internet of Things, which emerged in recent years, became one of the main fields of interest in industrial and academic research. The Constrained Application Protocol (CoAP) is one of the technologies aspiring to a standard in the IoT world. CoAP was designed to provide a low-overhead, machine-to-machine communication for constrained devices in a way similar to HTTP. In this paper...
Wireless standardization activities such as Bluetooth V4.x have led to an explosive growth in innovative short-range wireless devices capable of providing various services to assist everyday life. Allowing Machine-to-Machine (M2M) communication between these M2M devices also enable new commercial service opportunities. Typically, short range M2M devices need another capable device such as a smartphone...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.