Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Internet of Things (IOT)" wg kryterium: Wszystkie pola


Wyświetlanie 1-4 z 4
Tytuł:
Edge computing in IoT-enabled honeybee monitoring for the detection of Varroa destructor
Autorzy:
Wachowicz, Anna
Pytlik, Jakub
Małysiak-Mrozek, Bożena
Tokarz, Krzysztof
Mrozek, Dariusz
Powiązania:
https://bibliotekanauki.pl/articles/2172108.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Zielonogórski. Oficyna Wydawnicza
Tematy:
Internet of Things
IoT
Varroa destructor
precision beekeeping
machine learning
image processing
edge device
Internet Rzeczy
pszczelarstwo
uczenie maszynowe
przetwarzanie obrazu
urządzenie brzegowe
Opis:
Among many important functions, bees play a key role in food production. Unfortunately, worldwide bee populations have been decreasing since 2007. One reason for the decrease of adult worker bees is varroosis, a parasitic disease caused by the Varroa destructor (V. destructor) mite. Varroosis can be quickly eliminated from beehives once detected. However, this requires them to be monitored continuously during periods of bee activity to ensure that V. destructor mites are detected before they spread and infest the entire beehive. To this end, the use of Internet of things (IoT) devices can significantly increase detection speed. Comprehensive solutions are required that can cover entire apiaries and prevent the disease from spreading between hives and apiaries. In this paper, we present a solution for global monitoring of apiaries and the detection of V. destructor mites in beehives. Our solution captures and processes video streams from camera-based IoT devices, analyzes those streams using edge computing, and constructs a global collection of cases within the cloud. We have designed an IoT device that monitors bees and detects V. destructor infestation via video stream analysis on a GPU-accelerated Nvidia Jetson Nano. Experimental results show that the detection process can be run in real time while maintaining similar efficacy to alternative approaches.
Źródło:
International Journal of Applied Mathematics and Computer Science; 2022, 32, 3; 355--369
1641-876X
2083-8492
Pojawia się w:
International Journal of Applied Mathematics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Feature optimization using a two-tier hybrid optimizer in an Internet of Things network
Autorzy:
Agrawal, Akhileshwar Prasad
Singh, Nanhay
Powiązania:
https://bibliotekanauki.pl/articles/15548024.pdf
Data publikacji:
2023
Wydawca:
Uniwersytet Zielonogórski. Oficyna Wydawnicza
Tematy:
IoT
Internet of Things
anomaly mitigation
GWO
Gray Wolf Optimizer
feature optimization
PSO
particle swarm optimizer
Internet Rzeczy
optymalizacja funkcji
Opis:
The growing use of the Internet of Things (IoT) in smart applications necessitates improved security monitoring of IoT components. The security of such components is monitored using intrusion detection systems which run machine learning (ML) algorithms to classify access attempts as anomalous or normal. However, in this case, one of the issues is the large length of the data feature vector that any ML or deep learning technique implemented on resource-constrained intelligent nodes must handle. In this paper, the problem of selecting an optimal-feature set is investigated to reduce the curse of data dimensionality. A two-layered approach is proposed: the first tier makes use of a random forest while the second tier uses a hybrid of gray wolf optimizer (GWO) and the particle swarm optimizer (PSO) with the k-nearest neighbor as the wrapper method. Further, differential weight distribution is made to the local-best and global-best positions in the velocity equation of PSO. A new metric, i.e., the reduced feature to accuracy ratio (RFAR), is introduced for comparing various works. Three data sets, namely, NSLKDD, DS2OS and BoTIoT, are used to evaluate and validate the proposed work. Experiments demonstrate improvements in accuracy up to 99.44%, 99.44% and 99.98% with the length of the optimal-feature vector equal to 9, 4 and 8 for the NSLKDD, DS2OS and BoTIoT data sets, respectively. Furthermore, classification improves for many of the individual classes of attacks: denial-of-service (DoS) (99.75%) and normal (99.52%) for NSLKDD, malicious control (100%) and DoS (68.69%) for DS2OS, and theft (95.65%) for BoTIoT.
Źródło:
International Journal of Applied Mathematics and Computer Science; 2023, 33, 2; 313--326
1641-876X
2083-8492
Pojawia się w:
International Journal of Applied Mathematics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
IoT sensing networks for gait velocity measurement
Autorzy:
Chou, Jyun-Jhe
Shih, Chi-Sheng
Wang, Wei-Dean
Huang, Kuo-Chin
Powiązania:
https://bibliotekanauki.pl/articles/330707.pdf
Data publikacji:
2019
Wydawca:
Uniwersytet Zielonogórski. Oficyna Wydawnicza
Tematy:
internet of things
IoT middleware
data fusion
data reduction
internet rzeczy
oprogramowanie pośredniczące
fuzja danych
redukcja danych
Opis:
Gait velocity has been considered the sixth vital sign. It can be used not only to estimate the survival rate of the elderly, but also to predict the tendency of falling. Unfortunately, gait velocity is usually measured on a specially designed walk path, which has to be done at clinics or health institutes. Wearable tracking services using an accelerometer or an inertial measurement unit can measure the velocity for a certain time interval, but not all the time, due to the lack of a sustainable energy source. To tackle the shortcomings of wearable sensors, this work develops a framework to measure gait velocity using distributed tracking services deployed indoors. Two major challenges are tackled in this paper. The first is to minimize the sensing errors caused by thermal noise and overlapping sensing regions. The second is to minimize the data volume to be stored or transmitted. Given numerous errors caused by remote sensing, the framework takes into account the temporal and spatial relationship among tracking services to calibrate the services systematically. Consequently, gait velocity can be measured without wearable sensors and with higher accuracy. The developed method is built on top of WuKong, which is an intelligent IoT middleware, to enable location and temporal-aware data collection. In this work, we present an iterative method to reduce the data volume collected by thermal sensors. The evaluation results show that the file size is up to 25% of that of the JPEG format when the RMSE is limited to 0.5º.
Źródło:
International Journal of Applied Mathematics and Computer Science; 2019, 29, 2; 245-259
1641-876X
2083-8492
Pojawia się w:
International Journal of Applied Mathematics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A holistic study on the use of blockchain technology in CPS and IoT architectures maintaining the CIA triad in data communication
Autorzy:
Bhattacharjya, Aniruddha
Powiązania:
https://bibliotekanauki.pl/articles/2172111.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Zielonogórski. Oficyna Wydawnicza
Tematy:
CPS
blockchain Internet of things
IIoT
DDoS
ARP spoofing
M2M
machine-to-machine
peer-to-peer system
P2P
CIA triad
Internet rzeczy
ARP
peer-to-peer
Opis:
Blockchain-based cyber-physical systems (CPSs) and the blockchain Internet of things (BIoT) are two major focuses of the modern technological revolution. Currently we have security attacks like distributed denial-of-service (DDoS), address resolution protocol (ARP) spoofing attacks, various phishing and configuration threats, network congestion, etc. on the existing CPS and IoT architectures. This study conducts a complete survey on the flaws of the present centralized IoT system’s peer-to-peer (P2P) communication and the CPS architecture’s machine-to-machine (M2M) communication. Both these architectures could use the inherent consensus algorithms and cryptographic advantages of blockchain technology. To show how blockchain technology can resolve the flaws of the existing CPS and IoT architectures while maintaining confidentiality, integrity, and availability (the CIA triad), we conduct a holistic survey here on this topic and discuss the research focus in the domain of the BIoT. Then we analyse the similarities and dissimilarities of blockchain technology in IoT and CPS architectures. Finally, it is well understood that one should explore whether blockchain technology will give advantages to CPS and IoT applications through a decision support system (DSS) with a relevant mathematical model, so here we provide the DSS with such a model for this purpose.
Źródło:
International Journal of Applied Mathematics and Computer Science; 2022, 32, 3; 403--413
1641-876X
2083-8492
Pojawia się w:
International Journal of Applied Mathematics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-4 z 4

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies