With the Internet of Things (IoT) bit by bit creating as the resulting time of the headway of the Internet, it gets critical to see the diverse expected zones for the utilization of IoT and the research challenges that are connected with these applications going from splendid savvy urban areas, to medical care administrations, shrewd farming, collaborations and retail. IoT is needed to attack into for all expectations and purposes for all pieces of our day-to-day life. Despite the fact that the current IoT enabling advancements have immensely improved in the continuous years, there are so far different issues that require attention. Since the IoT ideas results from heterogeneous advancements, many examination difficulties will arise. In like manner, IoT is planning for new components of exploration to be finished. This paper presents the progressing headway of IoT advancements and inspects future applications.
Technology transfer & knowledge management in digitalPrakash Kedia
The document summarizes two case studies on technology transfer: Google Glass, a failed innovation, and Advanced Distribution Management System (ADMS) by Schneider Electric, a successful implementation. It provides details on the conceptualization of Google Glass and reasons for its failure, including high price point and privacy/social acceptance issues. It also describes Schneider Electric's ADMS technology for power distribution management and its successful deployment in Bihar, India to help optimize the electricity grid.
This is an introductory slide set on the Report JVE Consulting will release by end of Q1 2015. The report is extensive in its IoT introduction, connectivity coverage, IoT applications, security, standards efforts, alliances forming and the views of several market and analyst leaders
The document summarizes a report on developing UI software for Bluetooth Low Energy (BLE) smart sensors using an Android smartphone. It describes connecting to BLE devices, reading and writing characteristic values to operate surrounding devices, and designing a basic universal remote control UI. Technical details covered include the BLE protocol, Android APIs for scanning, connecting and interacting with BLE devices, and initial drawbacks addressed like high battery consumption from regular scanning.
Viability of bring your-own-computer BYOC programsMasaf Dawood
The confluence of powerful hand held devices, and a broadband network at home has created the desire for employees to expect the same level of connectedness in the enterprise space/workplace. Businesses are feeling the pressure to develop a hybrid support approach that also includes Gen Y and Gen Z workers, who are technology savvy and would like to use these devices in the workplace. What is un-clear is how some of the programs aimed at integrating users own devices will work with the existing IT/framework and this paper attempts to provide a balanced approach to analyze the problem and propose a solution.
By: Masaf Dawood
IRJET- Cloud based Chat Bot using IoT and ArduinoIRJET Journal
This document describes a cloud-based chatbot using the Internet of Things (IoT) and Arduino. The chatbot can communicate with users via Bluetooth using a mobile app. It tells users the current temperature and humidity and their distance from the robot. It also indicates new message notifications using sound and light. Users can have basic conversations with the robot and get information about it. The chatbot uses IoT and Android technologies and works within a wireless local area network (WLAN). It provides a low-cost way for businesses to improve customer service and interactions through an automated chatbot system.
Android is an open-source, Linux-based operating system primarily used for touchscreen mobile devices. It was developed by Android Inc, which was acquired by Google in 2005. Google and other technology companies formed the Open Handset Alliance in 2007 to develop open standards for Android. The first Android phone was released in 2008. Android is now the world's most widely used smartphone platform, with over 75% of the global market share as of 2012.
This document describes the design and implementation of a smart interactive mirror interface. The mirror is built using a Raspberry Pi microcontroller and allows for functions like displaying the time, weather, news and responding to voice commands. It provides an interactive interface for home users to access information and services. The proposed smart mirror aims to be a convenient and user-friendly system integrated into a mirror to provide customized and personalized services to users while they get ready. It allows multiple tasks to be displayed simultaneously and tracked user health over time which could be useful for busy individuals.
Technical Report on Google Glass/Department of INFORMATION TECHNOLOGYSYED HOZAIFA ALI
Google Glass will have a voice-activated assistant similar to
Siri to help users get information and accomplish tasks hands-free.
Camera: The built-in camera will allow users to take photos and record
videos discreetly with voice commands.
Navigation: Google Glass will have GPS navigation capabilities to help
users get from place to place.
Information: Users will be able to get information like weather, stock
prices, sports scores, and more instantly displayed before their eyes.
Connectivity: Google Glass will allow users to stay constantly
connected to email, messages, and social networks without needing to
pull out a phone.
So in summary, Google Glass has the potential to be a groundbreaking
IRJET- Campus Navigation System Based on Mobile Augmented RealityIRJET Journal
The document proposes a campus navigation system using mobile augmented reality. The system would allow users unfamiliar with the large campus of Priyadarshini College of Engineering to navigate between locations. It uses an Android application that combines image recognition and GPS to identify buildings and provide navigation instructions. The application scans buildings on campus using the phone's camera, matches them to labeled images in a database, and displays the building name and other details in augmented reality. The system aims to help new students, faculty and visitors easily navigate an unfamiliar campus area through their mobile phone.
If you are looking for Best IT Magazine In India, Latest Technology News in India, IT News in India, IT news today, Business magazine, Latest it news, E magazine, Technology news then VAR India is one of the best platform for you. It daily get update its news and show you fresh and live content news in very easy language faster then other sites. VAR India is not only a IT Magazine but it is a Brand of best magazines. Visit on https://www.varindia.com/ to read more about it.
The document provides an overview of Android development architecture and basics. It discusses programming for mobile devices and introduces Android, covering its architecture, version history, key components like activities, services, and intents. It also demonstrates a simple "Hello World" Android code example and discusses tools for testing apps like the Android Virtual Device.
This document provides an executive summary and details about Celluon, a manufacturer of patented optical input devices. Key points include:
- Celluon develops and sells peripheral products using finger motion detection technology, including projection keyboards.
- Current products include Magic Cube, Epic, Prodigy 4, evoMouse, Power Cube, and Medic (a medical keyboard).
- The company holds patents for its electronic perception technology used in its products.
- Sales grew from 2010 to 2012 but declined in 2013 due to lack of capital to stock major retailers. Projected sales are much higher in 2014-2015.
- The company is currently headquartered in Korea but moving to the US, with factories in Korea and
This document discusses Google Glass technology, including its features, applications, and uses. Some key points:
- Google Glass is an optical head-mounted display designed as a pair of eyeglasses. It allows the wearer to access the internet, take photos and videos, and get information through voice commands.
- Features include augmented and virtual reality capabilities, a camera, touchpad, display, and connectivity to smartphones. It uses Android operating system and can run various applications.
- Applications include uses in healthcare like telemedicine, journalism for live reporting, and potential military/sports applications that take advantage of its first-person point of view.
- The goals are for it to be an easy to use, hands
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
The Internet of things (IoT) is growing rapidly and 2018 will be a fascinating year for the IoT industry. IoT technology continues to evolve at an incredibly rapid pace. Consumers and businesses alike are anticipating the next big innovation. They are all set to embrace the ground-breaking impact of the Internet of Things on our lives like ATMs that report crimes around them, forks that tell you if you are eating fast, or IP address for each organ of your body for doctors to connect and check
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
The document proposes a hybrid authentication technique using blockchain authentication and artificial intelligence for user and device authentication in an integrated Internet of Things (IoT) environment. It discusses challenges with IoT security and reviews existing literature on blockchain and AI approaches for IoT authentication. The proposed technique aims to create a decentralized authentication system using a blockchain to store authentication records that are then used to train a neural network model. This trained model can authenticate new users and devices in the IoT network. The document outlines the objectives, methodology, and potential benefits of the proposed hybrid authentication approach for improving IoT security.
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
When Internet of Things (IoT) applications become a part of people’s daily life, security issues in IoT have caught substantial attention in both academia and industry. Compared to traditional computing systems, IoT systems have more inherent vulnerabilities, and in the intervening time, could have higher security requirements. However, the current design of IoT does not successfully address the higher security requirements postured by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to defend this emerging system. This paper purposes to examine security challenges resulted from the special characteristics of the IoT systems and the new features of the IoT applications. This could help pave the road to better security solution design. Furthermore, three architectural security designs are suggested and analyzed. Examples of how to implement these designs are discussed. Finally, for each layer in IoT architecture, open issues are also identified.
In this presentation, Sujani introduces IoT and latest trends in that domain. Sujani is interested in security of IoT devices where she wants to tackle both access of IoT devices and the data generated by these devices.
FUTURE AND CHALLENGES OF INTERNET OF THINGS ijcsit
The document discusses the future challenges of the Internet of Things (IoT). It outlines technical challenges related to connectivity, compatibility, longevity, standards, security, and intelligent analysis. Business challenges involve investment and developing sustainable revenue models. Societal challenges include changing demands, new devices, costs, and ensuring customer trust. Legal challenges involve establishing laws, regulations, and policies around IoT. The document also discusses myths around IoT related to sensors, mobile data, data volume, data centers, interoperability standards, privacy, security, and limited vendors.
The world is moving forward at a fast pace, and the credit goes to ever growing technology. One such concept is IOT (Internet of things) with which automation is no longer a virtual reality. IOT connects various non-living objects through the internet and enables them to share information with their community network to automate processes for humans and makes their lives easier. The paper presents the future challenges of IoT , such as the technical (connectivity , compatibility and longevity , standards , intelligent analysis and actions , security), business ( investment , modest revenue model etc. ), societal (changing demands , new devices, expense, customer confidence etc. ) and legal challenges ( laws, regulations, procedures, policies etc. ). A section also discusses the various myths that might hamper the progress of IOT, security of data being the most critical factor of all. An optimistic approach to people in adopting the unfolding changes brought by IOT will also help in its growth.
What Can We Expect From Upcoming Developments In IoT.pdfTechugo
The ‘thing’ in IoT refers to any kind of device with built-in sensors, and it needs to have an ability to collect the data over a network. But that is not all, after the collection, the device is also expected to transfer the data over a particular network. That too without any kind of manual intervention.
This embedded technology helps the object to interact with all the internal and external states and environments, respectively. Every single information helps in building a strong foundation in the decision-making process.
The following list of predictions (Figure 1) explores the state of IoT in 2019 and covering IoT impact on many aspects business and technology including Digital Transformation, Blockchain, AI, and 5G.
The Internet of Things (IoT) promises to change the way enterprises connect, communicate, operate, and compete. At the same time, the IoT has left enterprise networks and IoT devices extremely vulnerable to security breaches. Current IoT devices and infrastructures are simply not equipped to tackle today’s sophisticated attack methods. Vulnerabilities can be easily exploited unless security is embedded from the inside out – from conception, deployment, and maintenance, to the network edge and across connected devices and infrastructures.
The Internet of things (IoT) is growing rapidly and 2018 will be a fascinating year for the IoT industry. IoT technology continues to evolve at an incredibly rapid pace,
Consumers and businesses alike are anticipating the next big innovation. They are all set to embrace the ground-breaking impact of the Internet of Things on our lives like ATMs that report crimes around them, forks that tell you if you are eating fast, or IP address for each organ of your body for doctors to connect and check,.
In 2018, IoT will see tremendous growth in all directions; the following 8 trends are the main developments we predict for next year:
This document proposes an e-toll payment system using Azure cloud that automates toll gate payments. The system uses RFID tags attached to vehicles with their registration number embedded. When a vehicle reaches the toll gate, the RFID reader obtains the registration number and sends it to the Azure cloud to check if payment was made using a mobile app. If payment was completed, the cloud responds to open the toll gate. This allows drivers to pay electronically without waiting in queues and avoids using cash. The system aims to reduce congestion and fuel consumption at toll plazas through automated payment verification and toll gate control.
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...IRJET Journal
This document proposes an e-toll payment system using Azure cloud that automates toll payments. A mobile app allows users to pay tolls digitally via wallet, credit/debit cards, or banking. Successful payments are recorded on Azure cloud along with the vehicle's RFID tag ID. At toll gates, RFID readers scan tags and check the cloud to see if payment was made. If so, the gate opens, streamlining the toll process and reducing congestion. The system aims to provide a more convenient cashless toll payment alternative compared to existing smart card or queue-based systems.
Using Machine Learning to Build a Classification Model for IoT Networks to De...IJCNCJournal
Internet of things (IoT) has led to several security threats and challenges within society. Regardless of the benefits that it has brought with it to the society, IoT could compromise the security and privacy of individuals and companies at various levels. Denial of Service (DoS) and Distributed DoS (DDoS) attacks, among others, are the most common attack types that face the IoT networks. To counter such attacks, companies should implement an efficient classification/detection model, which is not an easy task. This paper proposes a classification model to examine the effectiveness of several machine-learning algorithms, namely, Random Forest (RF), k-Nearest Neighbors (KNN), and Naïve Bayes. The machine learning algorithms are used to detect attacks on the UNSW-NB15 benchmark dataset. The UNSW-NB15 contains normal network traffic and malicious traffic instants. The experimental results reveal that RF and KNN classifiers give the best performance with an accuracy of 100% (without noise injection) and 99% (with 10% noise filtering), while the Naïve Bayes classifier gives the worst performance with an accuracy of 95.35% and 82.77 without noise and with 10% noise, respectively. Other evaluation matrices, such as precision and recall, also show the effectiveness of RF and KNN classifiers over Naïve Bayes.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates opportunities in numerous domains. However, this increase in connectivity creates many prominent challenges. This paper provides a survey of some of the major issues challenging the widespread adoption of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security, management, and privacy.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates opportunities in numerous domains. However, this increase in connectivity creates many prominent challenges. This paper provides a survey of some of the major issues challenging the widespread adoption of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security,
management, and privacy.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It
extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates
opportunities in numerous domains. However, this increase in connectivity creates many prominent
challenges. This paper provides a survey of some of the major issues challenging the widespread adoption
of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the
IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security,
management, and privacy.
The Internet of Things (IoT) is actively shaping both the industrial and consumer worlds. Smart tech finds its way to every business and consumer domain there is — from retail to healthcare, from finances to logistics — and a missed opportunity strategically employed by a competitor can easily qualify as a long-term failure for companies who don’t innovate.
Check out more articles at- https://insideaiml.com/articles
This document discusses challenges and techniques for securing Internet of Things (IoT) architecture. It begins with an introduction to IoT and outlines key challenges including privacy, security, scalability, and connectivity issues that arise from the large number of interconnected devices. The document then reviews literature on techniques for securing IoT, such as using network function virtualization (NFV) and information-centric networking (ICN). It describes several proposed secure IoT architectures in detail and compares different approaches. The document concludes by discussing future directions for securing IoT architecture.
With rapid growth of science and information technology, Internet of things (IoT) becomes as an integral part of daily life. The applications of IoT are expanded starting from connected cars, wearables, connected health, smart retail and healthcare. However, security issues are increasing with the increase of its use. Lack of compliances on the part of IoT manufacturers, lack of user knowledge and awareness, device update and management, lack of physical hardening and botnet attacks are considered as the major reasons for security issues in IoT based applications. In this aspect, it becomes important to analyze security issues involved with IoT and its impact on the users that has been performed in the present study
Similar to Future Applications of Smart Iot Devices (20)
Understanding the Impact and Challenges of Corona Crisis on Education Sector...vivatechijri
n the second week of March 2020, governments of all states in a country suddenly declared
shutting down of all colleges and schools for a temporary period of time as an immediate measure to stop the
spread of pandemic that is of novel corona virus. As the days pass by almost close to a month with no certainty
when they will again reopen. Due to pandemic like this an alarm bells have started sounding in the field of
education where a huge impact can be seen on teaching and learning process as well as on the entire education
sector in turn. The pandemic disruption like this is actually gave time to educators of today to really think about
the sector. Through the present research article, the author is highlighting on the possible impact of
coronavirus on education sector with the future challenges for education sector with possible suggestions.
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT vivatechijri
This document discusses the importance of leadership in leading an organization towards improvement and development. It states that leadership is responsible for providing a clear vision and strategy to successfully achieve that vision. Effective leadership can impact the success of an organization by controlling its direction and motivating employees. Leadership is different from traditional management in that it guides employees towards organizational goals through open communication and motivation, rather than simply directing work. The paper concludes that only leadership can lead an organization to change according to its evolving environment, while management may simply follow old rules. Leadership is key to adapting to new market needs and trends.
The topic of assignment is a critical problem in mathematics and is further explored in the real
physical world. We try to implement a replacement method during this paper to solve assignment problems with
algorithm and solution steps. By using new method and computing by existing two methods, we analyse a
numerical example, also we compare the optimal solutions between this new method and two current methods. A
standardized technique, simple to use to solve assignment problems, may be the proposed method
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...vivatechijri
The document summarizes research on a nano composite polymer gel electrolyte containing SiO2 nanoparticles. Key points:
1. Polyvinylidene fluoride-co-hexafluoropropylene polymer was used as the base polymer mixed with propylene carbonate, magnesium perchlorate, and SiO2 nanoparticles to synthesize the nano composite polymer gel electrolyte.
2. The electrolyte was characterized using XRD, SEM, and FTIR which confirmed the homogeneous dispersion of SiO2 nanoparticles and increased amorphous nature of the electrolyte, enhancing its ion conductivity.
3. XRD showed decreased crystallinity and disappearance of polymer peaks upon addition of SiO2. SEM revealed
Theoretical study of two dimensional Nano sheet for gas sensing applicationvivatechijri
This study is focus on various two dimensional material for sensing various gases with theoretical
view for new research in gas sensing application. In this paper we review various two dimensional sheet such as
Graphene, Boron Nitride nanosheet, Mxene and their application in sensing various gases present in the
atmosphere.
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOODvivatechijri
Food is essential forliving. Food adulteration deceives consumers and can endanger their health. The
purpose of this document is to list common food adulterant methods commonly found in India. An adulterant is
a substance found in other substances such as food, cosmetics, pharmaceuticals, fuels, or other chemicals that
compromise the safety or effectiveness of that substance. The addition of adulterants is called adulteration. The
most common reason for adulteration is the use of undeclared materials by manufacturers that are cheaper than
the correct and declared ones. The adulterants can be harmful or reduce the effectiveness of the product, or
they can be harmless.
The novel ideas of being a entrepreneur is a key for everyone to get in the hustle, but developing a
idea from core requires a systematic plan, time management, time investment and most importantly client
attention. The Time required for developing may vary from idea to idea and strength of the team. Leadership to
build a team and manage the same throughout the peak of development is the main quality. Innovations and
Techniques to qualify the huddles is another aspect of Business Development and client Retention.
Innovation for supporting prosperity has for quite some time been a focus on numerous orders, including PC science, brain research, and human-PC connection. In any case, the meaning of prosperity isn't continuously clear and this has suggestions for how we plan for and evaluate advances that intend to cultivate it. Here, we talk about current meanings of prosperity and how it relates with and now and then is a result of self-amazing quality. We at that point center around how innovations can uphold prosperity through encounters of self-amazing quality, finishing with conceivable future bearings.
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGEvivatechijri
Demand for data storage is growing exponentially, but the capacity of existing storage media is not keeping up, there emerges a requirement for a storage medium with high capacity, high storage density, and possibility to face up to extreme environmental conditions. According to a research in 2018, every minute Google conducted 3.88 million searches, other people posted 49,000 photos on Instagram, sent 159,362,760 e-mails, tweeted 473,000 times and watched 4.33 million videos on YouTube. In 2020 it estimated a creation of 1.7 megabytes of knowledge per second per person globally, which translates to about 418 zettabytes during a single year. The magnetic or optical data-storage systems that currently hold this volume of 0s and 1s typically cannot last for quite a century. Running data centres takes vast amounts of energy. In short, we are close to have a substantial data-storage problem which will only become more severe over time. Deoxyribonucleic acid (DNA) are often potentially used for these purposes because it isn't much different from the traditional method utilized in a computer. DNA’s information density is notable, 215 petabytes or 215 million gigabytes of data can be stored in just one gram of DNA. First we can encode all data at a molecular level and then store it in a medium that will last for a while and not become out-dated just like floppy disks. Due to the improved techniques for reading and writing DNA, a rapid increase is observed in the amount of possible data storage in DNA.
The usage of chatbots has increased tremendously since past few years. A conversational interface is an interface that the user can interact with by means of a conversation. The conversation can occur by speech but also by text input. When a chatty interface uses text, it is also described as a chatbot or a conversational medium. During this study, the user experience factors of these so called chatbots were investigated. The prime objective is “to spot the state of the art in chatbot usability and applied human-computer interaction methodologies, to research the way to assess chatbots usability". Two sorts of chatbots are formulated, one with and one without personalisation factors. the planning of this research may be a two-by-two factorial design. The independent variables are the two chatbots (unpersonalised versus personalised) and thus the speci?c task or goal the user are ready to do with the chatbot within the ?nancial ?eld (a simple versus a posh task). The results are that there was no noteworthy interaction effect between personalisation and task on the user experience of chatbots. A signi?cant di?erence was found between the two tasks with regard to the user experience of chatbots, however this variation wasn't because of personalisation.
The Smart glasses Technology of wearable computing aims to identify the computing devices into today’s world.(SGT) are wearable Computer glasses that is used to add the information alongside or what the wearer sees. They are also able to change their optical properties at runtime.(SGT) is used to be one of the modern computing devices that amalgamate the humans and machines with the help of information and communication technology. Smart glasses is mainly made up of an optical head-mounted display or embedded wireless glasses with transparent heads- up display or augmented reality (AR) overlay in it. In recent years, it is been used in the medical and gaming applications, and also in the education sector. This report basically focuses on smart glasses, one of the categories of wearable computing which is very popular presently in the media and expected to be a big market in the next coming years. It Evaluate the differences from smart glasses to other smart devices. It introduces many possible different applications from the different companies for the different types of audience and gives an overview of the different smart glasses which are available presently and will be available after the next few years.
The Internet, today, has become an important part of our lives. The World Wide Web that was once a small and inaccessible data storage service is now large and valuable. Current activities partially or completely integrated into the physical world can be made to a higher standard. All activities related to our daily life are mapped and linked to another business in the digital world. The world has seen great strides in the Internet and in 3D stereoscopic displays. The time has come to unite the two to bring a new level of experience to the users. 3D Internet is a concept that is yet to be used and requires browsers to be equipped with in-depth visualization and artificial intelligence. When this material is included, the Internet concept of material may become a reality discussed in this paper. In this paper we have discussed the features, possible setting methods, applications, and advantages and disadvantages of using the Internet. With this paper we aim to provide a clear view of 3D Internet and the potential benefits associated with this obviously cost the amount of investment needed to be used.
Recommender System (RS) has emerged as a significant research interest that aims to assist users to seek out items online by providing suggestions that closely match their interests. Recommender system, an information filtering technology employed in many items is presented in internet sites as per the interest of users, and is implemented in applications like movies, music, venue, books, research articles, tourism and social media normally. Recommender systems research is usually supported comparisons of predictive accuracy: the higher the evaluation scores, the higher the recommender. One amongst the leading approaches was the utilization of advice systems to proactively recommend scholarly papers to individual researchers. In today's world, time has more value and therefore the researchers haven't any much time to spend on trying to find the proper articles in line with their research domain. Recommender Systems are designed to suggest users the things that best fit the user needs and preferences. Recommender systems typically produce an inventory of recommendations in one among two ways -through collaborative or content-based filtering. Additionally, both the general public and also the non-public used descriptive metadata are used. The scope of the advice is therefore limited to variety of documents which are either publicly available or which are granted copyright permits. Recommendation systems (RS) support users and developers of varied computer and software systems to beat information overload, perform information discovery tasks and approximate computation, among others.
The study LiFi (Light Fidelity) demonstrates about how can we use this technology as a medium of communication similar to Wifi . This is the latest technology proposed by Harold Haas in 2011. It explains about the process of transmitting data with the help of illumination of an Led bulb and about its speed intensity to transmit data. Basically in this paper, author will discuss about the technology and also explain that how we can replace from WiFi to LiFi . WiFi generally used for wireless coverage within the buildings while LiFi is capable for high intensity wireless data coverage in limited areas with no obstacles .This research paper represents introduction of the Lifi technology,performance,modulation and challenges. This research paper can be used as a reference and knowledge to develop some of LiFitechnology.
Social media platform and Our right to privacyvivatechijri
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
THE USABILITY METRICS FOR USER EXPERIENCEvivatechijri
THE USABILITY METRICS FOR USER EXPERIENCE was innovatively created by Google engineers and it is ready for production in record time. The success of Google is to attributed the efficient search algorithm, and also to the underlying commodity hardware. As Google run number of application then Google’s goal became to build a vast storage network out of inexpensive commodity hardware. So Google create its own file system, named as THE USABILITY METRICS FOR USER EXPERIENCE that is GFS. THE USABILITY METRICS FOR USER EXPERIENCE is one of the largest file system in operation. Generally THE USABILITY METRICS FOR USER EXPERIENCE is a scalable distributed file system of large distributed data intensive apps. In the design phase of THE USABILITY METRICS FOR USER EXPERIENCE, in which the given stress includes component failures , files are huge and files are mutated by appending data. The entire file system is organized hierarchically in directories and identified by pathnames. The architecture comprises of multiple chunk servers, multiple clients and a single master. Files are divided into chunks, and that is the key design parameter. THE USABILITY METRICS FOR USER EXPERIENCE also uses leases and mutation order in their design to achieve atomicity and consistency. As of there fault tolerance, THE USABILITY METRICS FOR USER EXPERIENCE is highly available, replicas of chunk servers and master exists.
Google File System was innovatively created by Google engineers and it is ready for production in record time. The success of Google is to attributed the efficient search algorithm, and also to the underlying commodity hardware. As Google run number of application then Google’s goal became to build a vast storage network out of inexpensive commodity hardware. So Google create its own file system, named as Google File System that is GFS. Google File system is one of the largest file system in operation. Generally Google File System is a scalable distributed file system of large distributed data intensive apps. In the design phase of Google file system, in which the given stress includes component failures , files are huge and files are mutated by appending data. The entire file system is organized hierarchically in directories and identified by pathnames. The architecture comprises of multiple chunk servers, multiple clients and a single master. Files are divided into chunks, and that is the key design parameter. Google File System also uses leases and mutation order in their design to achieve atomicity and consistency. As of there fault tolerance, Google file system is highly available, replicas of chunk servers and master exists.
A Study of Tokenization of Real Estate Using Blockchain Technologyvivatechijri
Real estate is by far one of the most trusted investments that people have preferred, being a lucrative investment it provides a steady source of income in the form of lease and rents. Although there are numerous advantages, one of the key downsides of real estate investments is lack of liquidity. Thus, even though global real estate investments amount to about twice the size of investments in stock markets, the number of investors in the real estate market is significantly lower. Block chain technology has real potential in addressing the issues of liquidity and transparency, opening the market to even retail investors. Owing to the functionality and flexibility of creating Security Tokens, which are backed by real-world assets, real estate can be made liquid with the help of Special Purpose Vehicles. Tokens of ERC 777 standard, which represent fractional ownership of the real estate can be purchased by an investor and these tokens can also be listed on secondary exchanges. The robustness of Smart Contracts can enable the efficient transfer of tokens and seamless distribution of earnings amongst the investors. This work describes Ethereum blockchainbased solutions to make the existing Real Estate investment system much more efficient.
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
Cloudcomputingprovidesondemandservicestoitsclients.Datastorageisamongoneoftheprimaryservices providedbycloudcomputing.Cloudserviceproviderhoststhedataofdataownerontheirserverandusercan accesstheirdatafromtheseservers.Asdata,ownersandserversaredifferentidentities,theparadigmofdata storagebringsupmanysecuritychallenges.Anindependentmechanismisrequiredtomakesurethatdatais correctlyhostedintothecloudstorageserver.Inthispaper,wewilldiscussthedifferenttechniquesthatare usedforsecuredatastorageoncloud. Cloud computing is a functional paradigm that is evolving and making IT utilization easier by the day for consumers. Cloud computing offers standardized applications to users online and in a manner that can be accessed regularly. Such applications can be accessed by as many persons as permitted within an organization without bothering about the maintenance of such application. The Cloud also provides a channel to design and deploy user applications including its storage space and database without bothering about the underlying operating system. The application can run without consideration for on premise infrastructure. Also, the Cloud makes massive storage available both for data and databases. Storage of data on the Cloud is one of the core activities in Cloud computing. Storage utilizes infrastructure spread across several geographical locations.
Virtual reality is a machinery by-way-of which consumer can interact inside three-3 atmosphere by mean of electronic appliance. Virtual reality (cyberspace) will provide interactive practice through the assistance of virtual reality gadgets like VR thick pair of goggles sensor gloves. with the help of this technology user are absorbed and connect to three-dimensional worlds without viewing physical in front of shop with this customer can feel and sense the product through virtual environment this will increase the buyer better understanding and provide better view about product as compared to Electronic-Commerce experience. This will benefitcustomer as well as seller of the product, consumer can view and sense it through the help Virtual reality gadgets at any place at any time. This research study fundamentally based how to improve E-shopping with the use cyberspace technology simulation. The idea involves making the e-shopping experience more intuitive, closer to the experience of visiting a real shop, and providing on-line three-dimensional interfaces for the entire process from shop design and product placement to customer experience analysis.
A vernier caliper is a precision instrument used to measure dimensions with high accuracy. It can measure internal and external dimensions, as well as depths.
Here is a detailed description of its parts and how to use it.
Development of Chatbot Using AI/ML Technologiesmaisnampibarel
The rapid advancements in artificial intelligence and natural language processing have significantly transformed human-computer interactions. This thesis presents the design, development, and evaluation of an intelligent chatbot capable of engaging in natural and meaningful conversations with users. The chatbot leverages state-of-the-art deep learning techniques, including transformer-based architectures, to understand and generate human-like responses.
Key contributions of this research include the implementation of a context- aware conversational model that can maintain coherent dialogue over extended interactions. The chatbot's performance is evaluated through both automated metrics and user studies, demonstrating its effectiveness in various applications such as customer service, mental health support, and educational assistance. Additionally, ethical considerations and potential biases in chatbot responses are examined to ensure the responsible deployment of this technology.
The findings of this thesis highlight the potential of intelligent chatbots to enhance user experience and provide valuable insights for future developments in conversational AI.
How to Manage Internal Notes in Odoo 17 POSCeline George
In this slide, we'll explore how to leverage internal notes within Odoo 17 POS to enhance communication and streamline operations. Internal notes provide a platform for staff to exchange crucial information regarding orders, customers, or specific tasks, all while remaining invisible to the customer. This fosters improved collaboration and ensures everyone on the team is on the same page.
In May 2024, globally renowned natural diamond crafting company Shree Ramkrishna Exports Pvt. Ltd. (SRK) became the first company in the world to achieve GNFZ’s final net zero certification for existing buildings, for its two two flagship crafting facilities SRK House and SRK Empire. Initially targeting 2030 to reach net zero, SRK joined forces with the Global Network for Zero (GNFZ) to accelerate its target to 2024 — a trailblazing achievement toward emissions elimination.
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...IJAEMSJORNAL
This study aimed to profile the coffee shops in Talavera, Nueva Ecija, to develop a standardized checklist for aspiring entrepreneurs. The researchers surveyed 10 coffee shop owners in the municipality of Talavera. Through surveys, the researchers delved into the Owner's Demographic, Business details, Financial Requirements, and other requirements needed to consider starting up a coffee shop. Furthermore, through accurate analysis, the data obtained from the coffee shop owners are arranged to derive key insights. By analyzing this data, the study identifies best practices associated with start-up coffee shops’ profitability in Talavera. These findings were translated into a standardized checklist outlining essential procedures including the lists of equipment needed, financial requirements, and the Traditional and Social Media Marketing techniques. This standardized checklist served as a valuable tool for aspiring and existing coffee shop owners in Talavera, streamlining operations, ensuring consistency, and contributing to business success.
Exploring Deep Learning Models for Image Recognition: A Comparative Reviewsipij
Image recognition, which comes under Artificial Intelligence (AI) is a critical aspect of computer vision,
enabling computers or other computing devices to identify and categorize objects within images. Among
numerous fields of life, food processing is an important area, in which image processing plays a vital role,
both for producers and consumers. This study focuses on the binary classification of strawberries, where
images are sorted into one of two categories. We Utilized a dataset of strawberry images for this study; we
aim to determine the effectiveness of different models in identifying whether an image contains
strawberries. This research has practical applications in fields such as agriculture and quality control. We
compared various popular deep learning models, including MobileNetV2, Convolutional Neural Networks
(CNN), and DenseNet121, for binary classification of strawberry images. The accuracy achieved by
MobileNetV2 is 96.7%, CNN is 99.8%, and DenseNet121 is 93.6%. Through rigorous testing and analysis,
our results demonstrate that CNN outperforms the other models in this task. In the future, the deep
learning models can be evaluated on a richer and larger number of images (datasets) for better/improved
results.
1. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference onRole of Engineers in Nation Building – 2021 (NCRENB-2021)
1
Future Applications of Smart Iot Devices
Devkrishna Pareek1
, Prof.Nitesh Kumar2
1
Department of MCA, University of Mumbai, India
2
Department of MCA, University of Mumbai, India
Abstract—With the Internet of Things (IoT) bit by bit creating as the resulting time of the headway of the
Internet, it gets critical to see the diverse expected zones for the utilization of IoT and the research challenges
that are connected with these applications going from splendid savvy urban areas, to medical care
administrations, shrewd farming, collaborations and retail. IoT is needed to attack into for all expectations and
purposes for all pieces of our day-to-day life. Despite the fact that the current IoT enabling advancements have
immensely improved in the continuous years, there are so far different issues that require attention. Since the
IoT ideas results from heterogeneous advancements, many examination difficulties will arise. In like manner,
IoT is planning for new components of exploration to be finished. This paper presents the progressing headway
of IoT advancements and inspects future applications.
Keywords—Applications, Internet of Things (IoT), Privacy, Smart devices, Security.
I. INTRODUCTION
The Internet of Things (IoT), occasionally suggested as the Web of Objects will have an enormous
effect, including ourselves. The Internet influences training, correspondence, business, science, government, and
humankind [1]. The Internet is perhaps the most huge and staggering indications in the entirety of mankind's
arrangement of encounters, and now with the possibility of the Internet of things, the Internet ends up being
more important to have astute life in every perspective. Shrewd gadgets, cell phones, shrewd vehicles, savvy
homes, keen urban communities, shrewd world. These thoughts have been grasped for quite a while. Achieving
these destinations has been inspected, up to this point, by various grouped and frequently disjoint exploration
organizations. Five such obvious exploration networks are Internet of Things (IoT), Mobile Computing (MC),
Pervasive Computing (PC), Remote Sensor Networks (WSN), and most starting late, CyberPhysical Systems
(CPS). In any case, as innovation and game plans progress in all of these fields, there are a growing cover and
combination of guidelines and exploration questions. Thusly, the major target of the Web of Things is to cause it
practical for objects to be related with various items, individuals, at whatever point or wherever using any
organization, way or administration. The Internet of Things (IoT) is little by little being seen as the subsequent
stage in Internet advancement. IoT will cause it doable for standard gadgets to be associated to the Internet to
achieve unending divergent targets. At the present time, a normal number of only 0.6% of gadgets that can be
fundamental for IoT has been related up until now. In any case, constantly 2020, in light of everything, in excess
of 50 billion gadgets will have a web affiliation. The Internet of Things (IoT) is depended upon to continue to
stretch out its reach as identifies with the number of gadgets and limits, which it can run. This is evident from
the unclearness in the proclamation of "Things" which makes it difficult to chart the always creating limitations
of the IoT [2]. While business accomplishment continues showing up, the IoT ceaselessly offers a for all intents
and purposes limitless deftly of possibilities, in organizations just as in examination. As necessities may be, the
understudy keeps an eye on the diverse probably zones for the utilization of IoT regions and the examination
challenges that are identified with these applications. As the Internet continues propelling, it has gotten in excess
of an essential organization of PCs, yet rather an organization of various gadgets, while IoT fills in as an
2. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference onRole of Engineers in Nation Building – 2021 (NCRENB-2021)
2
organization of various "related" gadgets an organization of organizations [3], as showed up in Fig. 1.
Nowadays, gadgets like cell phones, vehicles, current frameworks, cameras, toys, structures, home apparatuses,
mechanical frameworks, and endless others would all have the option to share information over the Internet.
II. RESEARCH CHALLENGES
For all the above utilizations of IoT, there should be a sensible plausibility into the different spaces to gain
proficiency with the accomplishment of explicit applications and their convenience. Moreover, with a few other
kinds of innovation or headway, IoT has its challenges furthermore, proposals that should be sorted out to
enable mass selection [3]. Despite the fact that the rhythmic movement IoT enabling innovations have
essentially improved in the progressing years, there are up 'til now different issues that require thought, from
now on planning for new parts of examination to be done.
2.1 Security and Privacy
Security assaults are perilous for the IoT because of the irrelevant restriction of gadgets is being used, the
physical accessibility to sensors, equipment's and articles, and straightforwardness in an organization of the
frameworks, including the way that most gadgets will give remotely. The security issue is furthermore
exasperated in light of the fact that transient and never-ending irregular dissatisfactions are average, and
disillusionments are shortcomings that can be abused by aggressors. Regardless, the critical overabundance that
is available makes the potential for arranging applications to continue offering their predefined types of help
even notwithstanding disillusionments. To meet great structure requirements that get from suffering and
unattended action, IoT applications should have the alternative to keep on working adequately inside sight of
and to recover effectively from security assaults. Plans may require downloading new code and this itself is
accessible to security attacks [4]. The system ought to in like manner have the alternative to acclimate to new
assaults unpredicted when the structure was first presented, when the system works with a base level of
help, including generous attack acknowledgment limits. When an attack is recognized, at that point the reaction
to it occurs, without help from any other person recovering. Despite the security and affirmation parts of the
Internet for example, correspondences protection, the and constancy of correspondence accomplices, and
message reliability, various requirements would similarly be critical in a Web of Things. The inescapability and
collaborations related with IoT will give various solaces and accommodating administrations for individuals, yet
also, make various events to misuse security. The Internet of Things presents a few phenomenal challenges with
respect to security, and a huge load of that goes far past the data insurance gives that exist as of now. A great
deal of this is a consequence of the trouble planning gadgets into the conditions without people using them
intentionally [5]. This is ending up being impressively more overwhelming with respect to customer gadgets, for
instance, GPS reference points for vehicles and phones and moreover brilliant TVs. To be sure, your TV will in
a little while be more brilliant than you. Bringing down, right? Vision features and voice affirmation are as of
3. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference onRole of Engineers in Nation Building – 2021 (NCRENB-2021)
3
now being composed into keen TVs. These features can listen endlessly to conversations or quest for activity
and impart data explicitly to cloud administrations for handling.
2.2 Processing, Analysis and Management of Data
The technique for planning, investigation and information the board is enormously testing a consequence of
the heterogeneous thought of IoT, what's more, the huge size of information assembled, particularly in this
period of Big Data. As of now, most frameworks utilize hearty frameworks in offloading information and doing
computationally raised tasks on an overall cloud stage. Regardless, there is a consistent stress over standard
cloud structures not being convincing similarly as moving the huge volumes of information that are conveyed
and eaten up by IoT enabled gadgets and to be fit further assistance the going with the computational weight
also, simultaneously meet arranging imperative [6]. Information examination also, its setting not simply expects
a basic part in the accomplishment of IoT, it moreover presents critical challenges. At whatever point
information has been assembled, it should be used splendidly to achieve brilliant IoT limits. In like manner, the
progression of AI techniques and man-made reasoning calculations, resultant from neural works, hereditary
calculations, formative calculations, and various other fake insight frameworks are crucial in achieving
automated dynamic.
2.3 Better Connectivity
Machine-to-machine correspondence has a couple of novel characteristics: the information rate is frequently
lower, the information from different sensors or at different time steps may have stable associations, and a
couple messages don't require progressing transport. Like this, single direction to manage these issues is to
shape the lots of machines. Instead of talks with the base station direct, machines talk with near to aggregate
head, which like this provide for the base station. This will decrease the machine transmission power interest
and addition spatial reuse of the range [7]. One more opportunity is to merge information or wipe out the
abundance of the information, e.g., through appropriated coding, to diminish data transfer capacity use also.
Second, many related gadgets are portable; for instance, sensors present vehicles. These sensors not simply need
to talk with various sensors through intra-vehicle organizations, yet furthermore between vehicle networks.
Existing radios no uncertainty neglect to meet assumptions in on-road remote channels. To give solid vehicle-to-
vehicle correspondence, we ought to at first inspect the vehicle transportability show and afterward develop the
ideal correspondence conventions subject to the channel model.
2.4 Monitoring and Sensing
Whether or not advances stressed over observing what's more, detecting have acquired titanic ground, they
are persistently growing particularly focusing in on the energy viability what's more, structure perspective.
Sensors and marks are commonly expected to be dynamic persistently to secure brisk information; this point
makes it fundamental for energy viability, especially in lifetime expansion [8]. Simultaneously, new advances in
nanotechnology/biotechnology and downsizing have allowed the improvement of actuators and sensors at the
Nano-scale.
III. POTENTIAL APPLICATION DOMAINS OF IOT
Expected uses of the Internet of Things are different as well as altogether different as they infest into for all
plans and purposes for all pieces of regular daily existence of individuals, establishments, what's more, society.
According to, the utilizations of IoT cover huge districts counting creating or the modern area, wellbeing area,
farming, keen urban areas, security, and so on
3.1 Smart Cities
According to the IoT accepts an indispensable capacity in improving the intelligence of urban areas and
updating general establishment. Some of IoT application domains in making shrewd urban areas consolidate
canny transportation frameworks, keen structures, traffic blockage, squander the executives, brilliant lighting,
keen stopping, furthermore, metropolitan guides. This may consolidate different functionalities, for instance,
observing open parking spaces inside the city, observing vibrations similarly as mainstream conditions of
platforms and structures, setting up sound observing gadgets in delicate pieces of urban communities, similarly
4. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference onRole of Engineers in Nation Building – 2021 (NCRENB-2021)
4
as observing the levels of walkers and vehicles. Man-made consciousness (AI) engaged IoT can be utilized to
screen, control and decrease gridlocks in Smart Cities. Furthermore, IoT grants the foundation of sagacious and
atmosphere flexible street lighting and ID squander and squander compartments by keeping tabs of reject
grouping plans. Use of IoT to achieve brilliant urban communities would require using radio recurrence ID and
sensors. A part of the for the most part advanced applications around there is the Aware Home and the Smart
Santander functionalities [9]. In the United States, some critical urban communities like Boston have plans on
the best approach to complete the Internet of Things in the more critical a piece of their frameworks going from
their stopping meters, streetlamps, sprinkler frameworks, and sewage grates are altogether wanted to be
interlinked and connected with the Web.
3.2 Healthcare
Most medical services frameworks in various countries are inefficient, slow furthermore, slanted to bungle.
This can without a doubt be changed since the medical services area relies upon different activities and gadgets
that can be robotized and improved through innovation. Distinctive innovation that can empower various
undertakings like report sharing to various individuals and territories, record keeping furthermore, distributing
prescriptions would go far in changing the medical services area. A lot of focal points that IoT application offers
in the medical care area is by and large characterized into the accompanying of patients, staff, and items,
recognizing, similarly as affirming individuals, and the programmed social event of information and sense.
Clinical facility work cycle can be through and through improved once patients’ stream is followed. Application
areas in this area join; having the alternative to screen a patient's consistency with cures, telemedicine game
plans, and alerts for patients' success. Thusly, sensors can be applied to outpatient and inpatient patients, dental
Bluetooth gadgets and toothbrushes that can give information after they are used and patient's surveillance [10].
Various segments of IoT in this limit fuse RFID, Bluetooth, and WIFI, among others.
3.3 Smart Agriculture and Water Management
IoT can fortify and improve the horticulture area through investigating soil suddenness and by virtue of
grape plantations, observing the capacity compartment width. IoT would allow to control and save the quantity
of supplements found in plant things and oversee microclimate conditions to take bit of leeway of the making of
vegetables and results of the dirt quality. Plus, pondering atmosphere conditions licenses measuring of ice
information, dry season, wind changes, storm or day off, controlling temperature and stickiness levels to hinder
parasite similarly as other microbial poisons. Piece of IoT incorporates mulling over water fittingness in seas
and streams for both drinking and agribusiness use, distinguishing pressure assortments in lines, and liquid
presence outside tanks similarly as observing degrees of water assortment in dams, streams and stores[11].
These IoT applications use Remote sensor organizations. Occasions of existing IoT applications in these areas
incorporate; SiSviA, GBROOS, and SEMAT.
3.4 Smart Living
In this space, IoT can be applied in regulator gadgets whereby one can indirectly turn mechanical
assemblies on and off thusly thwarting disasters similarly as saving energy. Other keen home mechanical
assemblies consolidate fridges fitted with LCD (Liquid Crystal Display) screens. Enabling one to acknowledge
what is available inside, what has outstayed and is almost passing similarly as what ought to be restocked. This
information can similarly be associated with a cell phone application enabling one to get to it when outside the
house furthermore, thusly, buy what is required. In addition, garments washers can allow one to screen attire
distantly [12]. Also, an expansive extent of kitchen gadgets can be interfaced through a cell phone, therefore
making it possible to change temperature, as on account of a broiler.
3.5 Smart Environment
The climate incorporates a basic capacity inside all portions of life, from people to people, feathered
creatures, creatures and also plants, are impacted by an unfortunate climate some way or another. There have
been different undertakings to build up a sound climate to the extent taking out pollution and reducing wastage
of resources, be that as it may, the presence of organizations, similarly as transportations wastes joined with silly
and ruinous human exercises are normal spot parts which dependably hurt the climate. In this way, the climate
requires brilliant and creative ways to deal with assistance in observing and supervising waste, which gives
numerous information that powers governments to set up frameworks that will guarantee the climate. Shrewd
climate techniques coordination with IoT innovation should be made for detecting, following an examination of
5. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference onRole of Engineers in Nation Building – 2021 (NCRENB-2021)
5
objects of the climate that offer likely points of interest in achieving a valuable life and a green world. The IoT
innovation grants seeing and supervising of air quality through information collection from distant sensors
across urban communities and giving constant geographic consideration to accomplish better techniques for
supervising gridlocks in huge urban areas. Besides, IoT innovation can be applied in assessing defilement levels
in water and along these lines enlighten decisions on water usage. In waste the board, which includes various
kinds of waste, like engineered mixes and harms being badly designed to the climate also, individuals, creatures,
and plants as well, IoT can similarly be applied. This can be cultivated by natural protection by strategies for
controlling mechanical defilement through close checking, and the leader’s frameworks got together with
oversight despite dynamic organizations.
IV. CONCLUSION
The IoT can best be depicted as a CAS (Complex Adaptive Framework) that will continue progressing
consequently requiring new furthermore, innovative kinds of programming planning, frameworks planning,
adventure the board, similarly as different controls to make it further and regulate it the coming years. A
planned effort is expected to move the business past the start periods of market improvement towards
advancement, driven by a typical comprehension of the specific thought of the opportunity. This market has
explicit ascribes in the domains of administration flow, business and charging models, capacities expected to
pass on IoT administrations, and the differing requests these administrations will put on versatile organizations.
Partner those brilliant gadgets to the web has similarly started happening, despite the fact that at a slower rate.
As progressively more exploration contemplates are coordinated, new estimations to the IoT measures,
advancements included what’s more, the items that can be related, continue emerging, further clearing a course
for considerably more application functionalities of IoT. How IoT is so broad and impacts all parts of our lives
makes it an extensive research point for concentrates in various related fields, for instance, data innovation and
programming.
REFERENCES
[1] K. K. Patel, S. M. Patel, et al., “Internet of things IOT: definition, characteristics, architecture, enabling technologies, application future
challenges,” International journal of engineering science and computing, vol. 6, no. 5, pp. 6122–6131, 2016.
[2] I. Ahmad and K. Pothuganti, "Design & implementation of real time autonomous car by using image processing &IoT," 2020 Third
International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India, 2020, pp. 107-113,
doi:10.1109/ICSSIT48917.2020.9214125.
[3] Vishal DineshkumarSoni. (2018). IOT BASED PARKING LOT. International Engineering Journal For Research & Development, 3(1),
9. https://doi.org/10.17605/OSF.IO/9GSAR
[4] S. V. Zanjal and G. R. Talmale, “Medicine reminder and monitoring system for secure health using IOT,” Procedia Computer Science,
vol. 78, pp. 471–476, 2016.
[5] I. Ahmad and K. Pothuganti, Analysis of different convolution neural network models to diagnose Alzheimer’s disease, Materials
Today: Proceedings, https://doi.org/10.1016/j.matpr.2020.09.625
[6] J. Cooper and A. James, “Challenges for database management in the internet of things”IETE Technical Review,vol.26,no.5,pp.320–
329,2009.
[7] Z. Alansari, N. B. Anuar, A. Kamsin, M. R. Belgaum, J. Alshaer, S. Soomro, and M. H. Miraz, “Internet of Things: Infrastructure,
Architecture, Security and Privacy”, in 2018 International Conference on Computing, Electronics Communications Engineering (iCCECE),
pp. 150– 155, Aug 2018.
[8] JubinDipakkumar Kothari. (2018 Plant Disease Identification using Artificial Intelligence: Machine Learning Approach. International
Journal of Innovative Research in Science, Engineering and Technology, Vol. 7, Issue 11, 11082- 11085.
DOI:10.15680/IJIRSET.2019.0711081.
[9] Vishal DineshkumarSoni. (2019). IOT connected with e-learning . International Journal on Integrated Education, 2(5), 273-277.
https://doi.org/10.31149/ijie.v2i5.496
[10] H. U. Rehman, M. Asif, and M. Ahmad, “Future applications and research challenges of IOT,” in 2017 International Conference on
Informa-tion and Communication Technologies (ICICT), pp. 68–74, Dec 2017
[11] A. Mazayev, J. A. Martins, and N. Correia, “Interoperability in IoT Through the Semantic Profiling of Objects,” IEEE Access, vol. 6,
pp. 19379–19385, 2018.
[12] JubinDipakkumar Kothari. (2018). Detecting Welding Defects in Steel Plates using Machine Learning and Computer Vision
Algorithms. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 7, Issue 9, 3682-
3686. DOI:10.15662/IJAREEIE.2018.0709013. r.2020.09.625.
[13] Wikipedia: https://en.wikipedia.org/wiki/Internet_of_things#Medical_and_healthcare
[14] Wikipedia: https://en.wikipedia.org/wiki/Internet_of_things#Agriculture
[15] Wikipedia: https://en.wikipedia.org/wiki/Internet_of_things#Environmental_monitoring