The document discusses the architecture of the Internet of Things (IoT). It begins by introducing IoT and its key components. It then discusses three traditional IoT architectures: (1) a three-layer architecture consisting of a perception, network and application layer; (2) the TCP/IP four-layer model; and (3) the Telecommunications Management Network's five-layer logical layered architecture. The document proposes a new five-layer IoT architecture combining aspects of these models. The five layers are the business, application, processing, transport and perception layers. The perception layer collects data via sensors while the business layer manages the overall enterprise.
Open Source Platforms Integration for the Development of an Architecture of C...Eswar Publications
The goal of the Internet of Things (IoT) is to achieve the interconnection and interaction of all kind of everyday
objects. IoT architecture can be implemented in various ways. This paper presents a way to mount an IoT architecture using open source hardware and software platforms and shows that this is a viable option to collect information through various sensors and present it through a web page.
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
Internet of things (IoT) is a concept that has been widely used to improve business efficiency and customer’s experience. It involves resource constrained devices connecting to each other with a capability of sending data, and some with receiving data at the same time. The IoT environment enhances user experience by giving room to a large number of smart devices to connect and share information. However, with the sophistication of technology has resulted in IoT applications facing with malware threat. Therefore, it becomes highly imperative to give an understanding of existing state-of-the-art techniques developed to address malware threat in IoT applications. In this paper, we studied extensively the adoption of static, dynamic and hybrid malware analyses in proffering solution to the security problems plaguing different IoT applications. The success of the reviewed analysis techniques were observed through case studies from smart homes, smart factories, smart gadgets and IoT application protocols. This study gives a better understanding of the holistic approaches to malware threats in IoT applications and the way forward for strengthening the protection defense in IoT applications.
Does the Convergence of the Blockchain, the Internet of Things and Artificial...eraser Juan José Calderón
Does the Convergence of the Blockchain, the
Internet of Things and Artificial Intelligence Changing
Our Lives, Education and the Known World of the
Internet?! Some Changes and Perspectives for the
International Economy. Elena GURGU
, Maria ANDRONIE
, Mihai ANDRONIE
, Irina DIJMARESCU
1, 2, 3Spiru Haret University, 13 Ion Ghica, Bucharest, 030045, Romania,
State regulation of the IoT in the Russian Federation: Fundamentals and chall...IJECEIAES
The purpose of this section is to study the problems with implementing technical and legal regulations for the development of public administration functions in the Russian Federation when using the internet of things (IoT). The introduction is based on an analysis of regulatory legal acts and presents the main strategic directions for the development of public administration functions in the Russian federation when using IoT. State reports, scientific literature, a system of technical and legal regulation are analyzed, and the main problems of implementing the IoT that impede the achievement of effective public administration are studied. The Russian practice of using IoT in various economic areas is investigated. Based on an analysis of the mechanisms for ensuring data safety of information technology users in the Russian federation, problems were investigated, such as the collecting data through IoT, including publicly available personal data in order to profile human activities, and creating of a digital twin of a person. The social constraints for introducing distributed registry technologies are users' distrust in the field of data privacy protection and mathematical algorithms that are used to establish trust in a digital environment instead of trusted centralized intermediaries; these problems were also analyzed. The Russian approach was analyzed in comparison to European experience in this field. To ensure information security and the possibility of its distribution, the IoT is revealed.
October 2020 - Top Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Most cited articles in academia - International journal of network security &...IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Authors: Arshdeep Bahga, Vijay Madisetti
Paperback: 446 pages
Publisher: VPT; 1 edition (August 9, 2014)
Language: English
ISBN-10: 0996025510
ISBN-13: 978-0996025515
Product Dimensions: 10 x 7 x 1 inches
Book Website: www.internet-of-things-book.com
Availabile on: www.amazon.com/dp/0996025510
Internet of Things (IoT) refers to physical and virtual objects that have unique identities and are connected to the internet to facilitate intelligent applications that make energy, logistics, industrial control, retail, agriculture and many other domains "smarter". Internet of Things is a new revolution of the Internet that is rapidly gathering momentum driven by the advancements in sensor networks, mobile devices, wireless communications, networking and cloud technologies. Experts forecast that by the year 2020 there will be a total of 50 billion devices/things connected to the internet.
This book is written as a textbook on Internet of Things for educational programs at colleges and universities, and also for IoT vendors and service providers who may be interested in offering a broader perspective of Internet of Things to accompany their own customer and developer training programs. The typical reader is expected to have completed a couple of courses in programming using traditional high-level languages at the college-level, and is either a senior or a beginning graduate student in one of the science, technology, engineering or mathematics (STEM) fields. Like our companion book on Cloud Computing, we have tried to write a comprehensive book that transfers knowledge through an immersive "hands on" approach, where the reader is provided the necessary guidance and knowledge to develop working code for real-world IoT applications.
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Towards Internet of Things: Survey and Future VisionCSCJournals
Internet of things is a promising research due to its importance in many commerce, industry, and education applications. Recently, new applications and research challenges in numerous areas of Internet of things are fired. In this paper, we discuss the history of Internet of things, different proposed architectures of Internet of things, research challenges and open problems related to the Internet of things. We also introduce the concept of Internet of things database and discuss about the future vision of Internet of things. These are the manuscript preparation guidelines used as a standard template for all journal submissions. Author must follow these instructions while preparing/modifying these guidelines.
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
The Internet of Things (IoT) concept has recently been presented as the next revolution and a part of the internet of the future. IoT consists of billions of uniquely identified smart objects ‘things’ with communication ability over the internet
eSOA: A Contextual Analysis on Service Oriented Architecture for Embeddded Ne...Juan Antonio Martin Checa
The document discusses eSOA, a middleware for embedded sensor networks based on service-oriented architecture (SOA). It first provides background on related concepts like the Internet of Things, web services, and SOA. It then analyzes the requirements of embedded networks and details eSOA's design principles and implementation. Finally, it compares eSOA to similar projects and outlines ongoing research areas.
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...IJCNCJournal
Internet of Things (IoT) has been receiving a lot of interest around the world in academia, industry and telecommunication organizations. In IoT, many constrained devices can communicate with each other which generate a huge number of transferred packets. These packets have different priorities based on the applications which are supported by IoT technology. Emergency applications such as calling an ambulance in a car accident scenario need fast and reliable packets delivery in order to receive an immediate response from a service provider. When a client sends his request with specific requirements, fast and reliable return contents (packets) should be fulfilled, otherwise, the network resources may be wasted and undesirable circumstances may be counted. Content-Centric Networking (CCN) has become a promising network paradigm that satisfies the requirements of fast packets delivery for emergency applications of IoT. In this paper, we propose fast packets delivery techniques based on CCN for IoT environment, these techniques are suitable for urgent packets in emergency applications that need fast delivery. The simulation results show how the proposed techniques can achieve high throughput, a large number of request messages, fast response time and a low number of lost packets in comparison with the normal CCN.
Applications of Blockchains in the Internet of Things: A Comprehensive SurveyDavid Bess
This document provides a comprehensive survey of applications of blockchains in the Internet of Things (IoT). It begins with an overview of blockchain technology and how it can help address challenges with centralized IoT models, such as single points of failure, lack of user control over data, and limited scalability. The document then surveys recent advances by industry and research to leverage blockchains to provide a decentralized, secure, and tamper-proof system for IoT data and communications. It discusses how blockchains can enhance fault tolerance, device autonomy, accountability, and enable features like smart contracts and programmable logic for IoT applications and interactions.
A MIDDLEWARE FOR THE INTERNET OF THINGSIJCNCJournal
The Internet of Things (IoT) connects everyday objects including a vast array of sensors, actuators, and smart devices, referred to as ��things” to the Internet, in an intelligent and pervasive fashion. This connectivity gives rise to the possibility of using the tracking capabilities of things to impinge on the location privacy of users. Most of the existing management and location privacy protection solutions do not consider the low-cost and low-power requirements of things; or, they do not account for the heterogeneity, scalability, or autonomy of communications supported in the IoT. Moreover, these traditional solutions do not consider the case where a user wishes to control the granularity of the disclosed information based on
the context of their use (e.g. based on the time or the current location of the user). To fill this gap, a middleware, referred to as the Internet of Things Management Platform (IoT-MP) is proposed in this paper.
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Internet of Things (IoT) plays a vital role in our
day to day life and normally used in our houses, in industry,
schools and in hospitals which implemented outside to manage
and control for taking report the changes in location prevent
from dangers and many more favorable things. Moreover all
other advantages can approach of big risks of privacy loss and
security issues. To protect the IoT devices, so many research
works have been measure to find those problems and locate a
best way to eradicate those risks or at least to reduce their effect
on the security and privacy requirement. Formation the concept
of device to device (D2D) communication technology, IoT plays
the information transfer from one end to another end as node of
interconnection. This paper examines the constraints and
security challenges posed by IoT connected devices and the
ability to connect, communicate with, and remotely manage an
incalculable number of networked, automated devices via the
Internet is becoming pervasive.
In the networking field, Internet of Things (IoT) can be referred to technological e-learning advancements. It is seen that through the internet, nowadays it becomes easier to be connected with the real world affairs by being acknowledges about the all-around happenings. Even everyone is aware about communicating with each other all over world. ‘Things’ can be specified as the objects which are connected through internet.Over the internet, the specific kind of interconnection of different things can serve its capability through the information which can be utilized in receiving and sending of evaluated data. It is said to be specialized in almost every field that can be determined in numerous manner for implementing wide range of applications format. Wide ranges can be mentioned aseducation, business, transportation, agriculture, healthcare and management. In a generalized manner, in this article specifically and mainly the discussion is being held over the Internet of Things (IoT). Specific emphasis on E-learning is said to be implemented as a source of information applied for its readers. By the utilization of smart learning as the IOT the smart techniques can also be represented shown by e-learning methods. by Vishal Dineshkumar Soni 2019. IOT connected with e-learning . International Journal on Integrated Education. 2, 5 (Oct. 2019), 273-277. DOI:https://doi.org/10.31149/ijie.v2i5.496. https://journals.researchparks.org/index.php/IJIE/article/view/496/477 https://journals.researchparks.org/index.php/IJIE/article/view/496
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Internet of Things (IoT) integrates billions of the heterogeneous IoT things with the Internet in which the embedded systems such as sensors and actuators linked together to improve quality of life, and becomes the future of technologies in any field of human daily life. These IoT devices cooperate with each other and generate useful information to provide better services and applications to the governments and the society. Also, there is a need to store these data on Cloud for monitoring. This paper, surveys IoT applications, new challenges and issues arise in different fields and provides IoT architecture, focuses on explanation of IoT protocols and their operations and functionalities, presents different microcontroller types used by researchers. With the huge amount of data generated from IoT devices, the integrating Cloud and IoT may helpful, Therefore, a survey on open issues faced when these two concepts integrating together is discussed. The objective of this paper is to provide a survey for everything related to IoT and direct it to all beginners in this filed or academic researchers.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
This document provides an overview of the Internet of Things (IoT) and its applications as lecture notes for a B.Tech course. It covers the fundamentals of IoT including enabling technologies, architecture, and functional components. It also discusses IoT access technologies, protocols, design methodology, hardware platforms, data analytics, supporting services, and various industrial and real-world case studies of IoT applications. The objectives of the course are to study the basics of IoT, its architecture, design principles, hardware platforms, data analytics, and industrial applications.
IoT & Applications Digital Notes (1).pdfssusere169ea1
This document provides an overview of the Internet of Things (IoT) and its applications as lecture notes for a B.Tech course. It covers the fundamentals of IoT including enabling technologies, architecture, sensors, actuators and connecting smart objects. It also discusses IoT protocols, design and development methodology, data analytics and supporting services. Finally, it examines various IoT case studies and industrial applications. The document is intended to educate students on the key concepts and components of IoT systems and their real-world uses.
This document provides an overview of the Internet of Things (IoT) and its applications as lecture notes for a B.Tech course. It covers the fundamentals of IoT including enabling technologies, architecture, and functional components. It also discusses IoT access technologies, protocols, design methodology, hardware platforms, data analytics, supporting services, and various industrial and real-world case studies of IoT applications. The objectives of the course are to study the basics of IoT, its architecture, design principles, hardware platforms, data analytics, and industrial applications.
This document provides an overview of Internet of Things (IoT) and its applications as a course for B.Tech students. It discusses key topics that will be covered in the course, including fundamentals of IoT, IoT protocols, design and development methodology, data analytics and supporting services, and case studies of industrial IoT applications. The course aims to help students understand the basics of IoT, implement IoT architectures, learn about hardware platforms and data analysis, and compare real-world IoT applications in industry. It provides objectives, outlines of content for each of the 5 units, and expected learning outcomes.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
The common vision of smart systems today, is by and large associated with one single concept,
the internet of things (IoT), where the whole physical infrastructure is linked with intelligent
monitoring and communication technologies through the use of wireless sensors. In such an
intelligent vibrant system, sensors are connected to send useful information and control
instructions via distributed sensor networks. Wireless sensors have an easy deployment and
better flexibility of devices contrary to wired setup. With the rapid technological development of
sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an
invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also
important to consider whether the sensors of a WSN should be completely integrated into IoT or
not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a
number of security primitives that can be taken to protect their data over the internet.
This document provides an overview of an Internet of Things course for the 2018-2019 academic year. It includes 5 units that will cover topics such as IOT protocols, the web of things, network dynamics applications, resource management, smart grids, and electrical vehicle charging. The course objectives are for students to understand IOT protocols, applications of the web of things, and network dynamics. The document lists 4 textbooks that will be used and provides descriptions of the topics that will be covered in each unit.
IoT: Ongoing challenges and opportunities in Mobile TechnologyAI Publications
Mobile technology opens the door for a new kind of learning called here and now learning that occurs when learners have access to information anytime and anywhere to perform authentic activities in the context of their learning. Mobile devices, applications and services have become integrated into people's daily lives on a personal and professional level. The purpose of this study was to investigate challenges &opportunities of IoT in mobile technology. The paper is divided in 5 sections and the content of the paper covers the history, elements, challenges and opportunities salong with future of IoT specific to Indian Mobile arena.
In this presentation, Sujani introduces IoT and latest trends in that domain. Sujani is interested in security of IoT devices where she wants to tackle both access of IoT devices and the data generated by these devices.
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn significant attention during the past few years, the pace at which new devices are being integrated into the system will profoundly impact the world in a good way but also poses some severe queries about security and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most significant concerns of IoT is to provide security assurance for the data exchange because data is vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where each layer provides a service. The security needs vary from layer to layer as each layer serves a different purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks have been discussed along with some existing and proposed countermeasures.
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of
the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating
interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn
significant attention during the past few years, the pace at which new devices are being integrated into the
system will profoundly impact the world in a good way but also poses some severe queries about security
and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most
significant concerns of IoT is to provide security assurance for the data exchange because data is
vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where
each layer provides a service. The security needs vary from layer to layer as each layer serves a different
purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks
have been discussed along with some existing and proposed countermeasures.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm.
It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet.
The document is a chapter on Internet of Things (IoT) network architecture from a course on IoT. It discusses key aspects of IoT architecture including:
- The three layers of a core IoT functional stack: the "things" layer containing sensors and actuators, the communications network layer connecting things, and the applications and analytics layer.
- Considerations for the communications network layer such as access network technologies, topologies, and sublayers for gateways, transport, and management.
- The role of edge, fog and cloud computing in IoT data management across the three stack layers.
- Standardized IoT architectures like oneM2M and the IoT World Forum's 7
This document discusses hardware/software interoperability and single point vulnerability problems with internet of things (IoT) systems. It summarizes previous work that identified key barriers to wider IoT adoption, including a desire for components that are highly interoperable, dependable, reconfigurable, and certifiable. The document then examines IoT communication models like device-to-device, device-to-cloud, and device-to-gateway. While these models provide flexibility, interoperability challenges can arise from proprietary protocols and data formats. Future IoT systems will need to address these issues to gain broad societal acceptance.
The document discusses hardware/software interoperability and single point vulnerability problems with internet of things (IoT) systems. It provides background on IoT, describing how connected devices can communicate through different models including device-to-device, device-to-cloud, and device-to-gateway. The paper reviews literature on societal applications and adoption barriers for IoT. It finds that for widespread adoption, future IoT technologies will need highly interoperable and dependable hardware/software that is reconfigurable and certifiable to address known problems and vulnerabilities.
The document discusses key topics related to the Internet of Things (IoT) including:
1. It defines IoT and lists its main characteristics as intelligence, connectivity, enormous scale, dynamic nature, heterogeneity, sensing, and security.
2. It describes the physical design of IoT including IoT devices and protocols used for communication between devices and cloud servers.
3. It outlines the logical design of IoT including functional blocks, common communication models like request-response, publish-subscribe, and push-pull, as well as communication APIs.
The document provides an overview of the Internet of Things (IoT). It begins with definitions of IoT and discusses the components that make up IoT systems, including physical devices, connectivity networks, edge computing, data storage and processing, applications, and collaboration. It then describes four common communication models in IoT - device-to-device, device-to-cloud, device-to-gateway, and back-end data sharing. Next, it explains how IoT works at both a non-technical and technical level, involving devices, sensors, networking, software kits, virtual devices, rules engines, and cloud servers. Finally, it outlines some key challenges with IoT, such as the need for open standards, sharing
The document discusses the key components of an Internet of Things (IoT) architecture. It describes the five layers of an IoT architecture: perception layer, object abstraction layer, service management layer, application layer, and business layer. It also discusses the key elements that enable IoT such as things, gateways, data streaming processors, data lakes, data warehouses, data analysts, machine learning models, and control applications. Security is an important consideration for IoT architectures and the requirements vary across the different layers.
Similar to Understanding Architecture of Internet of Things (20)
This document presents a study that uses linear regression to predict university freshmen's academic performance (GPA) based on their scores on the Joint Matriculation Examination (JME). The study finds a weak positive correlation (R=0.137) between GPA and JME scores, with the regression model only explaining 1.9% of variability in GPA. Statistical tests show no significant relationship between JME score and university GPA (p>0.05). The study concludes that JME score is not a strong predictor of freshmen academic performance.
This document describes a school bus tracking and security system that uses face recognition, GPS, and notification technologies. The system uses a camera to identify students as they board and exit the bus. A GPS module tracks the bus location and uploads coordinates to a database. Parents and school administrators can access this information through a mobile app to track students. When a student's face is recognized, a notification is sent to the parents. The system aims to increase student safety by monitoring their locations and notifying parents when they enter or exit the bus.
BigBasket encashing the Demonetisation: A big opportunityIJSRED
1. BigBasket is India's largest online grocery retailer, launched in 2011 when online grocery shopping was still nascent.
2. During India's 2016 demonetization, when cash was scarce, online grocery saw a major boost as consumers turned to sites like BigBasket for contactless digital payments.
3. However, BigBasket faced challenges in meeting consumer expectations for quick delivery while expanding partnerships with local vendors for fresh produce during this surge in demand.
Quantitative and Qualitative Analysis of Plant Leaf DiseaseIJSRED
This document discusses a technique for detecting plant leaf diseases using image processing. It begins with an introduction to plant pathology and the importance of identifying plant diseases. Common plant leaf diseases like Alternaria Alternata, Anthracnose, Bacterial blight, and Cercospora Leaf Spot are described along with their symptoms. The existing methods of disease identification are discussed. The proposed method uses various image processing techniques like filtering, histogram equalization, k-means clustering, and Gray Level Co-occurrence Matrix (GLCM) feature extraction to detect diseases. Image quality is then assessed to identify the affected regions of the leaf.
DC Fast Charger and Battery Management System for Electric VehiclesIJSRED
This document discusses the development of a DC fast charger and battery management system for electric vehicles. It aims to reduce charging times for EVs by designing an efficient charging mechanism. A PIC microcontroller controls the charging voltage and a battery management system monitors battery temperature, voltage, current and provides notifications. The system uses a step-down transformer, rectifier, voltage regulators and temperature sensor to charge lithium-ion batteries safely and quickly, while the battery management system protects the batteries from overcharging or overheating. Faster charging times through more charging stations could encourage greater adoption of electric vehicles.
France has experienced steady economic growth through policies that develop human capital and innovation. It has a highly organized education system that has increased enrollments over time, particularly in tertiary education. France also invests heavily in research and development, ranking highly in patents and innovative organizations. Infrastructure investment has also increased tangible capital stock. Additionally, factors like political stability, rule of law, and low corruption create an environment conducive to business investment and growth. Major events like the French Revolution helped shape France culturally, legally and technologically in ways that still influence its growth path today.
This document describes an acquisition system designed to make the examination process more efficient. The system uses a Raspberry Pi to control various hardware components including an RFID reader, rack and pinion assembly, and motor. It is intended to reduce the time and effort required of staff to distribute exam materials by automating the process. When examiners scan their RFID tags, the system verifies their identity and allows them to retrieve the appropriate exam bundles via a motorized rack and pinion assembly. The goal is to minimize manual labor and speed up exam distribution using an automated hardware and software solution controlled by a Raspberry Pi microcontroller.
Parallelization of Graceful Labeling Using Open MPIJSRED
This document summarizes research on parallelizing the graceful graph labeling problem using OpenMP on multi-core processors. It introduces the concepts of parallelization, multi-core architecture, and OpenMP. An algorithm is designed to parallelize graceful labeling by distributing graph vertices across processor cores. Execution time and speedup are measured for graphs of increasing size, showing improved speedup and reduced time with parallelization. Results show consistent performance gains as graph size increases due to better utilization of the multi-core architecture.
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. AmaraIJSRED
This study examines the phenotypic plasticity of fruits in the plant Luffa acutangula var. amara across different locations in Sindhudurg district, Maharashtra, India. The study found that the plant exhibited plasticity in growth cycle, flowering season, leaf shape, and fruit size depending on location. Maximum fruit weights and sizes were recorded at Talebazar village, while minimum sizes were found at Dahibav village. The variation in fruit morphology is an adaptation to the different environmental conditions at each site.
This document describes a project report submitted by three students for their bachelor's degree. The report outlines the development of a smart shopping cart system that utilizes RFID and Zigbee technologies. The smart cart is intended to enhance the shopping experience for customers by automatically billing items as they are added to the cart, providing real-time stock levels, and reducing checkout times. The system aims to benefit both customers through a more personalized shopping experience and retailers by improving stock management and reducing shoplifting. The document includes sections on requirements, system design, implementation, results and discussion, and conclusions.
An Emperical Study of Learning How Soft Skills is Essential for Management St...IJSRED
This document discusses an empirical study on the importance of soft skills for management students' careers. It finds that while hard skills and academic performance were once prioritized by employers, soft skills like communication, teamwork, and emotional intelligence are now essential for success. The study surveyed 50 management students and faculty in Bangalore to understand how well soft skills training is incorporated and its benefits. It determined that soft skills like communication are crucial as they influence interactions and job performance. However, older teaching methods do not sufficiently develop these skills. Integrating soft skills training into courses could better prepare students for today's work challenges.
The document describes a proposed smart canteen management system that uses various technologies like a web application, barcode scanner, and thermal printer to automate the food ordering process. The system aims to reduce wait times for students and avoid food wastage by allowing online ordering and monitoring stock. A barcode scanner will be used to identify students during ordering and payment. Thermal printers will generate receipts. The system is expected to reduce workload for staff and provide detailed sales reports for management.
This document discusses Gandhi's concept of trusteeship as an alternative economic system. It summarizes that Gandhi did not distinguish between economics and ethics, and based trusteeship on religious ideas like non-possession and truth as well as Western ideas like stewardship. Trusteeship aimed to persuade wealthy property owners to hold wealth in trust for the benefit of society rather than personal gain. It was meant as a non-violent alternative to capitalism and communism that eliminated class conflict through cooperation and trust between rich and poor. The document provides background on the philosophical and religious influences on Gandhi's views before explaining the key aspects of his theory of trusteeship.
Impacts of a New Spatial Variable on a Black Hole Metric SolutionIJSRED
This document discusses the impacts of introducing a new spatial variable in black hole metrics. It begins by summarizing Einstein and Rosen's 1935 paper which introduced a variable ρ = r - 2M in the Schwarzschild metric to remove the singularity. The document then introduces a similar new variable p = r - 2√M and analyzes how this impacts the Schwarzschild metric. Specifically, it notes that this new variable allows for negative radii values and multiple asymptotic regions beyond just two, introducing concepts of probability and imaginary spatial coordinates. Overall, the document explores how different mathematical variables can impact theoretical physics concepts like wormholes.
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...IJSRED
This document summarizes a study that assessed the effectiveness of a planned teaching program on mothers' knowledge of preventing acute respiratory infections in children under 5. 50 mothers were surveyed before and after the program. Before, 36% had moderate knowledge, 62% had inadequate knowledge, and 2% had adequate knowledge. After, 34% had moderate knowledge, 0% had inadequate knowledge, and 66% had adequate knowledge, showing the program improved mothers' knowledge. The study found no significant association between mothers' knowledge and factors like age, education, or family type.
This document describes a proposed ingenuous Trafalgar contrivition system to improve traffic flow and emergency vehicle access. The system uses embedded technologies like a Raspberry Pi, RF transmitter and receiver, and an Android app. When an emergency vehicle is detected approaching a traffic light, the system will open the lights on its path without disrupting other signals. The app will also help identify hit-and-run vehicles through a brief tracking period. The goal is to reduce traffic congestion and response times to save lives.
This document discusses a proposed system called the Farmer's Analytical Assistant, which aims to help farmers in India maximize crop yields through predictive analysis and recommendations. It analyzes agricultural data on factors like soil properties, rainfall, and past crop performance using machine learning techniques to predict optimal crops for different regions based on the environmental conditions. The proposed system would allow farmers to input local data, receive personalized yield predictions and crop suggestions, and get advice from experts online. The methodology section describes how climate/rainfall and soil data is collected and analyzed using machine learning models to provide crop recommendations. The goal is to improve upon traditional crop selection methods and help increase farmers' incomes.
Functions of Forensic Engineering Investigator in IndiaIJSRED
Forensic engineering involves applying engineering principles and methodologies to answer legal questions, especially regarding accidents and failures. A forensic engineer investigates failures through failure analysis and root cause analysis to determine how and why something failed. The engineer must be familiar with relevant codes and standards, understand eyewitness testimony, apply the scientific method to reconstruct events, and report findings clearly to assist courts. A forensic engineering investigation follows the scientific method to methodically analyze evidence and test hypotheses to determine the cause and circumstances of a failure or accident.
GSM Based Smart Helmet with Sensors for Accident Prevention and Intellectual ...IJSRED
1) The document describes a smart helmet system for motorbike riders that aims to improve safety.
2) The smart helmet contains sensors to detect accidents and whether the rider is wearing the helmet or intoxicated. It can send alerts with location data via GSM if an accident is detected.
3) The system is intended to only allow ignition of the motorbike if the rider is wearing the smart helmet, to encourage helmet usage and prevent accidents. It integrates sensors in the helmet with controls on the motorbike.
Development of Chatbot Using AI/ML Technologiesmaisnampibarel
The rapid advancements in artificial intelligence and natural language processing have significantly transformed human-computer interactions. This thesis presents the design, development, and evaluation of an intelligent chatbot capable of engaging in natural and meaningful conversations with users. The chatbot leverages state-of-the-art deep learning techniques, including transformer-based architectures, to understand and generate human-like responses.
Key contributions of this research include the implementation of a context- aware conversational model that can maintain coherent dialogue over extended interactions. The chatbot's performance is evaluated through both automated metrics and user studies, demonstrating its effectiveness in various applications such as customer service, mental health support, and educational assistance. Additionally, ethical considerations and potential biases in chatbot responses are examined to ensure the responsible deployment of this technology.
The findings of this thesis highlight the potential of intelligent chatbots to enhance user experience and provide valuable insights for future developments in conversational AI.
How to Manage Internal Notes in Odoo 17 POSCeline George
In this slide, we'll explore how to leverage internal notes within Odoo 17 POS to enhance communication and streamline operations. Internal notes provide a platform for staff to exchange crucial information regarding orders, customers, or specific tasks, all while remaining invisible to the customer. This fosters improved collaboration and ensures everyone on the team is on the same page.
Response & Safe AI at Summer School of AI at IIITHIIIT Hyderabad
Talk covering Guardrails , Jailbreak, What is an alignment problem? RLHF, EU AI Act, Machine & Graph unlearning, Bias, Inconsistency, Probing, Interpretability, Bias
20CDE09- INFORMATION DESIGN
UNIT I INCEPTION OF INFORMATION DESIGN
Introduction and Definition
History of Information Design
Need of Information Design
Types of Information Design
Identifying audience
Defining the audience and their needs
Inclusivity and Visual impairment
Case study.
Unblocking The Main Thread - Solving ANRs and Frozen FramesSinan KOZAK
In the realm of Android development, the main thread is our stage, but too often, it becomes a battleground where performance issues arise, leading to ANRS, frozen frames, and sluggish Uls. As we strive for excellence in user experience, understanding and optimizing the main thread becomes essential to prevent these common perforrmance bottlenecks. We have strategies and best practices for keeping the main thread uncluttered. We'll examine the root causes of performance issues and techniques for monitoring and improving main thread health as wel as app performance. In this talk, participants will walk away with practical knowledge on enhancing app performance by mastering the main thread. We'll share proven approaches to eliminate real-life ANRS and frozen frames to build apps that deliver butter smooth experience.
A brand new catalog for the 2024 edition of IWISS. We have enriched our product range and have more innovations in electrician tools, plumbing tools, wire rope tools and banding tools. Let's explore together!
In May 2024, globally renowned natural diamond crafting company Shree Ramkrishna Exports Pvt. Ltd. (SRK) became the first company in the world to achieve GNFZ’s final net zero certification for existing buildings, for its two two flagship crafting facilities SRK House and SRK Empire. Initially targeting 2030 to reach net zero, SRK joined forces with the Global Network for Zero (GNFZ) to accelerate its target to 2024 — a trailblazing achievement toward emissions elimination.
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...IJAEMSJORNAL
This study primarily aimed to determine the best practices of clothing businesses to use it as a foundation of strategic business advancements. Moreover, the frequency with which the business's best practices are tracked, which best practices are the most targeted of the apparel firms to be retained, and how does best practices can be used as strategic business advancement. The respondents of the study is the owners of clothing businesses in Talavera, Nueva Ecija. Data were collected and analyzed using a quantitative approach and utilizing a descriptive research design. Unveiling best practices of clothing businesses as a foundation for strategic business advancement through statistical analysis: frequency and percentage, and weighted means analyzing the data in terms of identifying the most to the least important performance indicators of the businesses among all of the variables. Based on the survey conducted on clothing businesses in Talavera, Nueva Ecija, several best practices emerge across different areas of business operations. These practices are categorized into three main sections, section one being the Business Profile and Legal Requirements, followed by the tracking of indicators in terms of Product, Place, Promotion, and Price, and Key Performance Indicators (KPIs) covering finance, marketing, production, technical, and distribution aspects. The research study delved into identifying the core best practices of clothing businesses, serving as a strategic guide for their advancement. Through meticulous analysis, several key findings emerged. Firstly, prioritizing product factors, such as maintaining optimal stock levels and maximizing customer satisfaction, was deemed essential for driving sales and fostering loyalty. Additionally, selecting the right store location was crucial for visibility and accessibility, directly impacting footfall and sales. Vigilance towards competitors and demographic shifts was highlighted as essential for maintaining relevance. Understanding the relationship between marketing spend and customer acquisition proved pivotal for optimizing budgets and achieving a higher ROI. Strategic analysis of profit margins across clothing items emerged as crucial for maximizing profitability and revenue. Creating a positive customer experience, investing in employee training, and implementing effective inventory management practices were also identified as critical success factors. In essence, these findings underscored the holistic approach needed for sustainable growth in the clothing business, emphasizing the importance of product management, marketing strategies, customer experience, and operational efficiency.
Conservation of Taksar through Economic RegenerationPriyankaKarn3
This was our 9th Sem Design Studio Project, introduced as Conservation of Taksar Bazar, Bhojpur, an ancient city famous for Taksar- Making Coins. Taksar Bazaar has a civilization of Newars shifted from Patan, with huge socio-economic and cultural significance having a settlement of about 300 years. But in the present scenario, Taksar Bazar has lost its charm and importance, due to various reasons like, migration, unemployment, shift of economic activities to Bhojpur and many more. The scenario was so pityful that when we went to make inventories, take survey and study the site, the people and the context, we barely found any youth of our age! Many houses were vacant, the earthquake devasted and ruined heritages.
Conservation of those heritages, ancient marvels,a nd history was in dire need, so we proposed the Conservation of Taksar through economic regeneration because the lack of economy was the main reason for the people to leave the settlement and the reason for the overall declination.
Social media management system project report.pdfKamal Acharya
The project "Social Media Platform in Object-Oriented Modeling" aims to design
and model a robust and scalable social media platform using object-oriented
modeling principles. In the age of digital communication, social media platforms
have become indispensable for connecting people, sharing content, and fostering
online communities. However, their complex nature requires meticulous planning
and organization.This project addresses the challenge of creating a feature-rich and
user-friendly social media platform by applying key object-oriented modeling
concepts. It entails the identification and definition of essential objects such as
"User," "Post," "Comment," and "Notification," each encapsulating specific
attributes and behaviors. Relationships between these objects, such as friendships,
content interactions, and notifications, are meticulously established.The project
emphasizes encapsulation to maintain data integrity, inheritance for shared behaviors
among objects, and polymorphism for flexible content handling. Use case diagrams
depict user interactions, while sequence diagrams showcase the flow of interactions
during critical scenarios. Class diagrams provide an overarching view of the system's
architecture, including classes, attributes, and methods .By undertaking this project,
we aim to create a modular, maintainable, and user-centric social media platform that
adheres to best practices in object-oriented modeling. Such a platform will offer users
a seamless and secure online social experience while facilitating future enhancements
and adaptability to changing user needs.
Exploring Deep Learning Models for Image Recognition: A Comparative Reviewsipij
Image recognition, which comes under Artificial Intelligence (AI) is a critical aspect of computer vision,
enabling computers or other computing devices to identify and categorize objects within images. Among
numerous fields of life, food processing is an important area, in which image processing plays a vital role,
both for producers and consumers. This study focuses on the binary classification of strawberries, where
images are sorted into one of two categories. We Utilized a dataset of strawberry images for this study; we
aim to determine the effectiveness of different models in identifying whether an image contains
strawberries. This research has practical applications in fields such as agriculture and quality control. We
compared various popular deep learning models, including MobileNetV2, Convolutional Neural Networks
(CNN), and DenseNet121, for binary classification of strawberry images. The accuracy achieved by
MobileNetV2 is 96.7%, CNN is 99.8%, and DenseNet121 is 93.6%. Through rigorous testing and analysis,
our results demonstrate that CNN outperforms the other models in this task. In the future, the deep
learning models can be evaluated on a richer and larger number of images (datasets) for better/improved
results.
1. Understanding Architecture of Internet of Things
Ms.Pragati V.Thawani Dr.Prafulla E.Ajmire,
(Varkha K.Jewani ) M.Sc., PGDCS, M.S.(Soft.Syst.),M.Phil.(CS), Ph..D
M.Sc(IT),M.Phil(IT) Head & Associate Professor in Computer Science& Application
Assistant Professor, K.C College, Churchgate G S Science, Arts & Commerce College, Khamgaon, Maharashtra
Research Scholar in Computer Science Sant.Gadge Baba Amravati University, Maharashtra
Sant. Gadge Baba Amravati University, Maharashtra peajmire@gmail.com, peajmire@rediffmail.com
vkjewani@gmail.com
ABSTRACT – Now a day’s everything is in an era of
Information Technology where each one must become IT
incumbent and resource oriented. Our day to day life activities
revolve around technology, from last few decades it was
observed that technology is providing the generation with at
most benefit and ease. Therefore, Internet of Things has
emerged in the latest trends of technology. The future of
computing and communications is depend on this new
technological revolution where it contains some distinguishing
features and also the features of both the Internet and the
Telecommunications Network in such a specified and wide
domain which helps people to understand the real world
applications, where each object can perform multiple tasks
while communicating with other different objects using IoT
which makes human life far better and easier than ever with full
of devices, sensors and other objects which allows each other
to communicate in a network environment. This paper explores
the current research work on IoT as Three-layer traditional
architecture, and how it relates with architecture of Internet and
Telecommunications Management Network. After review it
was observed that there is a requirement to reform a technical
framework of the Internet and the Logical Layered Architecture
of the Telecommunication Management Network because
three-layer architecture doesn’t provides all features and
significance of the Internet of Things, for this purpose only a
new five-layer architecture of IoT was established. Finally, at
the end a new improved architecture to the internet of things
(IoT) was proposed that takes into consideration the basic
concept of IoT and its working.
Keywords- Internet, Telecommunications, Internet of
Things, IoT Architecture.
1.0 INTRODUCTION
The Internet of Things is considered as a collection of
interconnected and distributed networks of embedded system
where all the wired or wireless communication technologies are
communicating and interconnecting in a network connectivity
with different physical objects, devices. The other items
empowered with electronics, circuits, software, sensors
connected in a network that allows correlation of data in terms
of collection and exchange of data. Whereas objects that has
functionality of readability, recognizing, locating, addressing,
are to be controlled via the Internet in terms of RFID, wireless
LAN, wide-area network, and to be recognized and controlled
by existing network infrastructure, remotely across the world.
It also provides the opportunities for more direct integration of
the physical system into computer-based system to improve
efficiency and accuracy of the system [1]. Some of the well-
developed domains of IoT applications are Medical,
Automobile industries ,etc. where the objects that have not
represented electronically at all are started to become online
with the help of electronic devices, embedded systems,
microprocessors, communicating with each other via the
Internet without the knowledge of human intervention. As IoT
technologies are booming; around the world with many new
developments are happening in terms of the integration of
objects with sensors via the Internet. But there are certain issues
while development of IoT represented in terms of commuting
and communication technology, interfaces, protocols, and
standards, security and privacy, etc. [2].
Internet of Things can be categorized into two terms:
one is Internet, which is defined as networks of networks where
billions of users are connected in a network with some standard
internet protocols [3].while using different technologies one
can connect several different sectors, departments, different
devices like mobile, personal systems and business
organizations all are to be connected via the Internet. The
second term is Thing, which basically means devices or objects
that are converted into intelligent objects [4] where all objects
represents to real world instead of physical world. Where
interaction between physical world and real world with the help
of different embedded systems such as connectors, actuators,
sensors [5]. The development of dynamic world is depend on
the reformation of commuting and communication technology
in a number of important fields, from wired environment to
wireless sensors in terms of network of smart objects that has
the functionality to auto-organize, correlate data ,resources and
sudden changes in the environment.[3,6] Technically, it was
reviewed that the IoT architecture is based on the functionality
of different communication tools, primarily RFID-tagged
items (Radio Frequency Identification), Which provides the
main functioning of the loT to facilitate exchange of
information among other things, sharing of data in networks,
i.e. It has the responsibility to provide information about
"things" in a more secure and stable manner to extend the
applications at their early stage of implementation and also act
as backbone for universal computing, permitting the devices to
retrieve information from the Internet to facilitate their robust
functionality and allows smart environments to identify and
recognize other objects for interaction [1].
2. Fig.1: Basics of Internet of Things
Since single architecture is not enough to suit all the
requirements therefore, a modular scalable reference model that
supports different additional or suppressing of existing
capabilities, also supporting many requirements across a wide
variety of these areas is inherently possible. Therefore, there is
a necessity to design the Reference model that provides an entry
point for architects looking forward to creating IoT solutions
and a strong basis for further development of existing reference
models designed by industries like CISCO, INTEL and IBM.
Therefore, it is suggested that the outlook of IoT’s components
should not be restricted by the Reference Model. i.e. from a
physical point of view, every device in the IoT could reside in
a single environment or it could be distributed across the world.
As Internet of things composed from Internet, the study and the
design of it should be from data generated by devices
perspective rather than data generated by people. The internet
data transmission follows the seven-layer OSI model. Where it
can be compared with internet model as devices are replaced by
people in internet [7]. Based on different protocols initially IoT
architecture was deigned to have Three-layer architecture and
5- layer architecture, then finally Seven-layer architecture.
According to the early stages of research the three-layer
architecture mention the basic minimal things required for the
devices to be connected to the internet. [8, 9]. Hence there will
be a research in the field of finer things in the model and
resulted as an output in terms of five-layer [9-10] and then to
seven-layer.
The term Internet of Things (IoT) according to the 2020
conceptual framework is expressed in terms of:
IoT= Services+ Data+ Networks + Sensors [11]
2.0 Three LAYER ARCHITECTURE
After Static web pages and social networking’s based web
the Internet of Things is considered as the third wave of the
World Wide Web (WWW) where it connects different types of
objects at anyplace, anytime and anywhere via a popular
internet protocol (IP).In the initial phase of research the
traditional architecture was introduced [5], which have three
layers the perception, network and application layers.
Fig. 2: Three-Layer Architecture
2.1) Perception Layer - This layer also called as physical
layer, whose main functionality is to collect data,
information and recognizes the usage of data in the
physical world. where all the actuators work according to
the information that is collected by the sensors of different
object in order to perform specific operations by the
corresponding objects with 2-D bar code labels and
readers, RFID tags and reader-writers, camera, GPS,
sensors, terminals, and sensor network [12].It acts like the
facial skin and the five sense organs of loT, which is
mainly identifying objects, gathering information.
2.2) Network Layer - It is the middle layer in architecture;
where it acts as an interface between application layer and
perceptual layer. Its functionality is to process data and
information obtained from perception layer and also
broadcasting of data and connecting devices in a network
[5].It is functioning similarly to the neural network where
it includes a convergence network of communication and
Internet network, network management center,
information center and intelligent processing center, etc.
2.3) Application Layer – It is a layer where in actuality
different applications are to be deployed with the
usage of IoT services It provides the personalized
based services according to user relevant requirements,
also creates a link between the users and applications
which combines the industry to provide high-level
intelligent applications type solutions such as the
disaster monitoring, health monitoring, transposition,
etc.
This model layers represents the structure of loT from
the technical level, it is reasonable at the initial stage of
development but it is observed that various technologies
mentioned in this structure basically have varying degree
of development and application, but it has not been large-
scale applied into our work and life, and even many
scholars think the IoT is a visionary cloud-castle because
it is lack of good management methods and business
models. Just as the Internet, its booming development not
only depends on the technology progress, more on various
new applications and successful business models.
Therefore, there is a requirement not only breakthrough
technology problems constantly; at the same time should
also pay more attention to its management mode and
3. business models. However, different from the Internet,
which can't be managed and controlled, the things in IoT
needs to be managed and operated. It is more like the
communication network, because both need to be
controlled and operated. To understand the Internet of
Things' system structure correctly, there is a necessity to
analyse these two-network structure, the Internet and
communications network, and combine the features of
Internet of Things, finally obtain a better and more
reasonable architecture of IoT.
3.0 ARCHITECTURE OF INTERNET AND
TELECOMMUNICATIONS MANAGEMENT
NETWORK
3.1. TCP/IP Model Layer
The TCP/IP (Transmission Control Protocol Internet
Protocol) model uses four layers that logically related to the top
six layers of the OSI (Open System Interconnect) model. This
model does not contain the physical layer, where hardware
devices are to be used. The remaining three layers-network
interface, internet and (host-to-host) transport correspond to
layers 2, 3 and 4 of the OSI model. Figure 3 shows the
relationship between TCP/IP and, OSI/RM[1].
Fig .3: OSI Reference Model and TCP/IP Model Layers
3.1.1) Internet Layer: This layer is like the network layer in
the OSI Reference Model and sometimes called the
network layer even in TCP/IP model. Its main
functionality with three responsibilities such as logical
device addressing, data packaging, manipulation and
delivery, and most importantly routing of data. It is
core component of TCP/IP, as well as support
protocols for Internet Control Message Protocol
(ICMP) and the different routing protocols (RIP,
OSFP, BOP, etc.) In the coming years the future
version of IP, called as IPV 6, will be used.
3.1.2) Transport Layer: This layer facilitates device to
device communication over an internetwork. Where
logical connections are to be established between
devices to transfer of data either reliably where it
keeps track of the data sent and reached successfully
to the destination and re- sends it if necessary or
unreliably with no guarantee that it forwarded and
arrived to the end Point. The protocols used at this
layer are the Transmission Control Protocol (TCP)
and User Datagram Protocol (UDP). The TCP/IP
transport layer corresponds same as OSI model (layer
four) with certain elements that are part of the OSI
session layer. Where it establishes a connection
between end devices that can persist for a long period
of time, which is in some cases called as session
instead of connection by researchers.
3.1.3) Application Layer: This is at the top position in the
TCP/IP model that provides the interfaces and
corresponding protocols needed by the users. It is used
to develop network-based applications. It is also
concerned with error handling and recovery of the
message. It provides user services like user login,
naming network devices, formatting messages, and e-
mails, transfer of files etc. With the help of number of
protocols reside at this layer such as HTTP, FTP and
SMTP for providing end-user services, as well as
administrative protocols like SNMP, DHCP and DNS.
[14]
3.2. TMN Logical Layered Architecture within the
TMN functional architecture
To understand the complexity of telecommunications
management, it may be represented into logical layers. The
LLA is responsible for the structuring of management
functionality in terms of groupings called "logical layers"
and describes the relationship between layers. It reflects
aspects of management arranged by different levels of
abstraction [15]. Figure 4 shows the Suggested model for
layering of TMN management functions.
3.2.1) Element management layer: This layer manages
each network element on an individual basis or group
basis and supports an abstraction of the functions
provided by the network element layer. It has one or
more element called as Operations Systems Function
to individually responsible, on a delegate basis from
the network management layer, for some part of
network element functions. The following are three
principal roles of this layer:
a) Control and coordination of a subset of network
elements on an individual NEF (Network Element
Function) basis.
b) Control and coordinate a subset of network elements
on collective basis.
c) To maintain statistical, log and other data about
elements within its scope of control.
Fig .4: Suggested model for layering of TMN management
4. 3.2.2) Network management layer: The network is
supported by the element management layer and functions
addressing the management of a wide geographical area.
Since complete visibility of the entire network is typical
hence as an objective, a technology independent view will be
provided to the service management layer. It has the
following five principal roles:
a) It controls and coordinates the network view of all
network elements within its prescribed domain.
b) The allocation of resources or modification of
network capabilities for the support of service to
customers.
c) The maintenance of network capabilities.
d) It maintains statistical, log and other data about the
network and interact with the service manager layer on
performance, usage, availability, etc.
e) The network OSFs maintains the relationships (e.g.
Connectivity) between NEFs.
3.2.3) Service management layer: This layer provides the
services to the potential customers who can perform IoT
operations’ facilities offered by this layer are service order
handling, complaint handling and invoicing. It has the
following four principal roles:
a) To handle customer and interfacing with other PTOs
(Public Telecommunications Operators);
b) To interact with service providers;
c) To maintain statistical data (e.g. QOS);
d) Interaction between services.
3.2.4) Business management layer: It has responsibility for
the total enterprise. The business management layer
comprises proprietary functionality. The business
management layer is included in the TMN architecture to
facilitate the specification of capability that it requires of the
other management layers. This layer acts as a part of the
overall management of the enterprise and many interactions
are necessary with other management systems.it has the
following four principal roles: [5]
a) To support the decision-making process for the
optimal investment and use of new
telecommunications resources;
b) To support the management of OA&M related
budget;
c) To support the supply and demand of OA&M related
manpower;
d) Also maintain aggregate data about the total
enterprise.
4.0 Five LAYER ARCHITECTURE
As IOT is different from Internet and
Telecommunications Network, the above two models are not
suitable for loT directly. But they have some similar feature
in common. So, through the technology architecture of the
Internet and the logical structure of Telecommunications
Management Network and combined with the specific
features of the Internet of Things, a new architecture of loT
was established. It is to be believed that this architecture
would better explain the features and connotation of the
Internet of Things. It divides loT into five layers, which are
the Business Layer, the Application Layer, the Processing
Layer, the Transport Layer and the Perception Layer. As
shown in figure below.
Fig .5: Five-layer architecture of Internet of Things
4.1) The Perception Layer: The main task of this layer is to
perceive the physical properties of objects (such as
temperature, location etc.) by various sensors (such as
infrared sensors, RFID, 2-D barcode), and convert these
information’s to digital signals which is more convenient
for network transmission. The various sensors and
equipment’s in the Perception Layer are like the "Network
Element" in Telecommunications Management Network.
The techniques used in this layer are sensing technology,
RFID technology (including labels and literacy), 2-D
barcode, GPS, etc.
Meanwhile, many objects cannot be perceived directly, so
to perform this functionality implant microchip into their
bodies. These chips can sense the temperature, speed and
so on, and even process collected information with the
usage of nanotechnology which makes the chips small
enough to be implanted into every object, even sand. These
are the key technologies of this layer.
4.2) The Transport Layer: The Transport Layer, or called
the Network Layer, is responsible for transmitting data
obtained from the Perception Layer to the processing center
through various network, such as wireless or cable network,
even the enterprise Local Area Network The main
techniques in this layer include FTTx, 3G, Wifi,
bluetooth, Zigbee, infrared technology and so
on. At this layer, many protocols are available, like IPv6
(Internet Protocol version 6), which is necessary for
addressing billions of things. Therefore, the communication
between different networks and entities is very crucial
because it connects billions of things, also encompass huge
amounts of various networks.[5].
4.3) The Processing Layer: The Processing Layer mainly
5. store, analyze, process and transmits the information of
objects from the transport layer. It must perform the major
task because it will process all the information gathered by
the perception layer. This huge amount of data will require
storage space and to be stored using some techniques like
cloud computing or any DBMS. Then it will analyze how to
fetch data whenever required in order to complete the desired
task, due to the large quantities of things and the huge
information they carried, it is very important to maintain and
difficult to store and process these mass data. The techniques
included database, intelligent processing, cloud computing,
ubiquitous computing, etc. Cloud computing and ubiquitous
computing is the primary technology in this layer [16].
4.4) The Application Layer: The functionality of this layer
is based on the data processed in the Process Layer, and
develops diverse applications of the IoT, such as
authentication, intelligent transportation, logistics
management, identity location-based service and safety. It is
providing all kinds of applications for each industry, because
the various applications promote the development of the IOT
to a large scale.
4.5) The Business Layer: The Business Layer is like a
manager of the Internet of Things, including managing the
applications, the relevant business model and other business.
It not only manages the release and charging of various
applications, but also the research on business model and
profit model. As everyone knows, success of a technology
depends on the priority on technology, and on the innovation
and reasonable of business model. Meanwhile, this layer
should manage the users' privacy which is equally important
in IoT [17].
5.0 PROPOSED IMPROVED LAYERED
ARCHITECTURE FOR IoT
This improved layered architecture depends on seven layers,
unlike the traditional layered architecture, it takes all the
functions of the traditional architecture and distribute them
on the seven layers, but in a more operational way. The
proposed improved layered IoT architecture composed of
seven layers, is illustrated in Fig.6, as follows [18]:
5.1) Application layer: This is the topmost layer of the
architecture and is responsible of providing various
applications to different users using IoT.The applications
can vary from different industry areas such as:
manufacturing, logistics, retail, environment, public
safety, healthcare, food and drug etc. Also, from the RFID
technology, numerous applications are evolving which all
are part of IoT [19].
5.2) Application support & management layer: It focus on
main functions such as; Qos Manager, Device Manager,
Business Process Modeling, Business Process Execution –
Authorization, Key Exchange & Management, Trust &
Reputation, Identity Management. All actions related to
the control, security and management of the application are
responsibility of this layer.
5.3) Services layer: It performs the following functions such
as Service storage & orchestration Service composition &
organization, Virtual Entity resolution, VE services, IoT
servicer resolution and service monitoring. All decisions
related to the monitoring, storage, organization and
visualization of the received information, including
resolving virtual entities created, are responsibility of this
layer.
5.4) Communication layer: It performs the following
functions; such as Flow control & Reliability – Qos –
Energy Optimization. Also, if applicable it performs cross
platform communication. The IoT web portal is part of this
layer. All decisions related to communications and
measurements of the flow and its quality and energy
consumed are responsibility of this layer.[20]
5.5) Network layer: The main functionality is to provide
Gateway Routing & Addressing, Network Capabilities,
Transport Capabilities, Error detection & Correction and
also takes care of publishing and subscribing of messages.
It consist of different high speed applications and services,
transactional services, context-aware applications, and
access protocols are all to be connected with each other in
a heterogeneous configuration and are available in a wide
spectrum at this layer, where these networks can be
represented in terms of a private, public or hybrid models
and are to be used to support the communication
requirements for latency, bandwidth or security. [21]
5.6) Hardware layer: It interconnects the physical world with
digital world using different devices, sensors, hardware
components, embedded systems, RFID tags and readers,
which allows real-time information to be collected and
processed in a network. There are multiple types of sensors
like environmental sensors, body sensors, home appliance
sensors and vehicle telemetric sensors, for different
purposes have the capacity to take measurements such as
temperature, air quality, movement and electricity and also
with degree of memory, allowing it to record a certain
number of measurements i.e. measure the physical
property and convert it into signal that can be understood
by an instrument and are represented according to their
unique purpose.
5.7) Environment layer: Its functionality is to detect objects
and places to be observed. The detected objects can vary
from physical moving objects, such as humans, cars, to
environmental factors such as, temperature, or humidity.
The places to observe are ranging from buildings,
universities, streets and so on.
6. Fig.6: Improved Layered Architecture for IoT
The below figure represents how the seven layers
interact with each other inside the proposed architecture of
IoT. The interaction between layers can occur in both
directions in some cases. First, the authorized person must
provide his identity to the application, if the identity is right
and registered in the IoT database in the services layer, then
only one can open the application and request the
information according to requirement. The detected objects
are to be tracked or places to be identified by the
environment layer which includes not only static, but also
dynamic objects for example vehicles, places such as
buildings, which contains movable objects or walking
people. The hardware layer, includes the components such
as; sensors, tracking devices, RFID readers and tags and
others that transport live information about the tracked
object or place to the network layer, with multiple
networks ,various technologies and access protocols, such
as, Wi-Fi, Ethernet, CDMA , GSM, Bluetooth and others.
Then, the network layer takes this live information to the
communication layer, where the IOT Web portal resides,
and performs cross platform interaction using different
protocols, such as, HTTP, FTP and others. The functionality
of communication layer is to transmit this live information
to the services layer, where all decisions related to the
monitoring, storage, organization, resources allocation and
visualization of the received information, including creating
virtual entities, are to be considered.[23] Finally, the
received information is transmitted from the services layer
to the application support and management layer, where it
goes to the authorized person to receive this information.
And finally, in the application layer, when the authorized
person sitting before the application user interface receives
this information, he must take the required decisions and can
request additional information from the application. [24,25]
Fig 7. A model of end-to-end interaction between various
layers in improved layered IoT architecture
6.0 CONCLUSION AND FUTURE SCOPE
IoT connects billions of devices and enables machine-
to-machine communication. It can transform daily life with
everyday objects connected to each other via the Internet.
The existing three-layer structure has certain significance to
understand technical architecture of IoT at the initial stage of
its development, but it cannot completely explain its structure
and the connotation, because of this, five-layer architecture
of IoT was established by developers to better understand the
Internet of Things. Later, a more reliable IoT architecture is
proposed in this paper. The proposed improved layered
architecture of IoT is consist of seven layers and the
environment layer is included in this architecture, and there
is a sort of functions distribution on each layer. This proposed
architecture differs from the traditional architecture by its
reliability and feasibility to all sorts of applications, also, it is
more flexible. In the future, there will be a focus on building
new model applications for internet of things (IoT) based on
this proposed internet of things (IoT) architecture. The future
research should focus on standardized protocol stack and
networking technologies used for a seamless flow of data
between different devices. Streamlined data analytics for the
huge amount of data generated by IoT and how to secure data
must also be an area of emphasis.
7.0 ACKNOWLEDGEMENT
The author is very much thankful to Dr.Hiren Dand sir for
giving this opportunity to publish research paper for this
particular conference and all the other members of the
conference team for their valuable suggestions.
7. 8.0 REFERENCES
[1]"Internet of Things - Need for a New Legal
Environment?" Computer Law & Security Review, pp. 522-
527, Rolf H. Weber, 2009.
[2] ITU, 2005, "Internet Reports 2005: The Internet of
Things", ITU Internet Report.
[3] “Internet of Things (IoT): A Literature Review,” Journal
of Computer and Communications,2015, 3, 164-
173.Somayya Madakam, R. Ramaswamy, Siddharth
Tripathi,
[4] “A survey on Internet of Things,” Abakós, Belo
Horizonte,v. 1, n. 2, p. 78 – 95, maio 2013 – ISSN:2316–9451.
Shashank Agrawal, Dario Vieira,
[5] “Research on the architecture of Internet of things”
.IEEE International Conference on Advanced Computer
Theory and Engineering (ICACTE Miao W., Ting L., Fei L.,
ling S., Hui D., 2010.),Sichuan province, China, Pages: 484-
487.
[6] “A Survey paper on RFID Technology, its Applications
and Classification of Security/Privacy Attacks and
Solutions”, IRACST – International Journal of Computer
Science and InformationTechnology & Security (IJCSITS),
ISSN: 2249-9555 Vol.6, No4, July-August 2016, Ms.Neha
Kamdar, Vinita Sharma, Sudhanshu Nayak,.
[7] A survey on data-centric internet of things, Journal of
Network and ComputerApplications “ YongruiQin a,n,
QuanZ.Sheng a, NickolasJ.G.Falkner a, SchahramDustdar
b, HuaWang c, AthanasiosV.Vasilakos ,” When things
matter: 64(2016)137–153
[8]., “Choices for interaction with things on Internetand
underlying issues,” Ad Hoc Networks, vol. 28, pp. 68–90,
2015. Mashal, O. Alsaryrah, T.-Y. Chung, C.-Z. Yang, W.-
H. Kuo, andD. P.Agrawal
[9], “Towards internet of things:survey and future vision,”
International Journal of Computer Networks, vol. 5, no. 1,
pp. 1–17, 2013. O. Said and M.Masud
[10], “Future internet: the internet of things architecture,
possible applications and key challenges,” in Proceedings of
the 10th International Conference on Frontiers of
Information Technology (FIT ’12), pp. 257–260, December
2012. R. Khan, S. U. Khan, R. Zaheer, and S. Khan
[11] "Understanding the Internet of Things:
definition,Potentials, and societal role of a fast evolving
paradigm," Ad Hoc Networks, vol. 56,pp. 122-140, 2017
LAtzori, A. Iera, and G. Morabito,.
[12] 2010. Descriptive Models for Internet of Things. IEEE
International Conference on Intelligent Control and
Information Processing, Dalian, China, Pages: 483- 486.
Yinghui H., Guanyu L.,
[13]"The TCP/IP Guide A Comprehensive,Illustrated
Internet Protocols Reference", No Starch Press. Charles M.
Kozierok, 2005
[14] 'The Computer for the 21st Century", Scientific
American, September 1991. M. Weiser,
[15] ITU, "ITU-T Recommendation M.30IO: Principles for
aTelecommunications Management Network",
Telecommunication Standardization Sector oflTU, pp. 15-
19.
[16] “Internet of Things: Architectures, Protocols, and
Applications,”Journal of Electrical and Computer
Engineering Volume 2017, Article ID 9324035, 25 pages.
Pallavi Sethi and Smruti R. Sarangi,
[17] "Internet of things: A survey on enabling technologies,
protocols, and applications," IEEE Communications Surveys
& Tutorials, vol. 17, pp. 2347-2376, 2015. A. Al-Fuqaha, M.
Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash,
[18], “Improved Layered Architecture for Internet of
Things”. Dina Gamal Darwish.
[19] O. Vermesan, P. Friess, P. Guillemin et al., “Internet of
things strategic research roadmap,” in Internet of Things:
Global Technological and Societal Trends, vol. 1, pp. 9–52,
2011.
[20] O. Said and M.Masud, “Towards internet of things:
survey and future vision,” International Journal of
Computer Networks, vol.5, no. 1, pp. 1–17, 2013.
[21] M. Weyrich and C. Ebert, “Reference architectures for
the internet of things,” IEEE Software, vol. 33,no. 1, pp.
112–116, 2016.
[22] I. Stojmenovic and S. Wen, “The fog computing
paradigm:scenarios and security issues,” in Proceedings of
the Federated Conference on Computer Science and
Information Systems (Fed-CSIS ’14), pp. 1–8,
IEEE,Warsaw, Poland, September 2014.
[23] M. Swan, “Sensor mania! The internet of things,
wearable computing, objective metrics, and the quantified
self 2.0,” Journal of Sensor and Actuator Networks, vol. 1,
no. 3, pp. 217–253,2012.
[24] Peng Du and George Roussos, "Adaptive
Communications Techniques for the internet of things",
Journal of sensor and actuator network, 6 Mar. 2013.
[25] A. Whitmore, A. Agarwal, and L. Da Xu, “The internet
of things—a survey of topics and trends,” Information
Systems Frontiers, vol. 17, no. 2, pp. 261–274, 2015.