Explore chapters and articles related to this topic
Design of Arduino-Based Smart Digital Liquefied Petroleum Gas Detector and Level Indicator Using Internet of Things Technology
Published in Lavanya Sharma, Pradeep K Garg, From Visual Surveillance to Internet of Things, 2019
S. Ranjan, Vijay Kumar Tayal, Saket Kumar
The IoT is a system of interrelated devices requiring human–computer or human–human interaction [20–21]. The IoT is commonly used to monitor and control the mechanical, electronic, and electrical systems used in private and public buildings, institutions, and industrial applications. The majority of the IoT relies on global system for mobile communications (GSM), Bluetooth, and Wi-Fi connectivity. Selecting which connectivity to use is completely based on the applications of the IoT product being created and user needs.
Conventional Acceleration
Published in Andrei Seryi, Unifying Physics of Accelerators, Lasers and Plasma, 2015
The inductive output tube, or IOT, (invented by Andrew Haeff around 1939) is based on the principle that a toroidal cavity surrounding an electron beam of oscillating intensity could extract power from the beam without intercepting the beam itself.
Storage, System Security and Access Control for Big Data IoT
Published in Naveen Chilamkurti, T. Poongodi, Balamurugan Balusamy, Blockchain, Internet of Things, and Artificial Intelligence, 2021
T. Lucia Agnes Beena, T. Kokilavani, D. I. George Amalarethinam
Data generated by the internet is increasing every day which leads to an increase in IoT-based cloud services. IoT devices are used in various fields like healthcare, marketing, weather forecasting, and security management [28]. The main focuses in addressing security issues for data produced from IoT devices are authentication and access control. The security clearance mechanism has to be easily controllable and adaptable. As IoT devices are included in human lifestyle (in tools like fridges, watches, etc.) people with diverse proficiency need to be implicated in security clearance activities. An effective access control mechanism should satisfy three constraints, namely [29]:Confidentiality: To prevent unauthorized access of resourcesAvailability: To ensure access to the authorized users whenever resources are neededIntegrity: To prevent modification of resources without authorizationWhen users try to access data, a strong protection mechanism needs to be applied to check the user’s permission to obtain the data and the allowable conditions to access the data. To ensure security in data storage, different types of access control mechanisms are followed in IoT applications. The enormous amount of heterogeneous data generated by IoT devices needs to be analyzed using big data analytics. The data produced by IoT devices are semi-structured like bank/credit card transactions, current location of a device, and measurements from human body. Traditional database management systems cannot support huge volumes of data in terms of performance, efficacy, flexibility, and scalability. Databases like NoSQL and MapReduce mechanisms are used for the systematic analysis of semi-structured data. A fine-grained access control mechanism is an effective approach for protecting personal and sensitive data. For customized access control, context management is used through which constrained access can be given to data based on exact time periods or geographical locations [30].
Model Predictive Torque Control-Based Induction Motor Drive with Remote Control and Monitoring Interface for Electric Vehicles
Published in Electric Power Components and Systems, 2023
Aydın Boyar, Ersan Kabalcı, Yasin Kabalcı
Kevin Ashton pioneered the IoT technology with the use of radio frequency identification (RFID) in 1999. This technology allows devices to interact with one another and share data on a larger network. IoT technology can connect people-to-people (P2P), people-machine (M2P), and machine-machine (M2M) communication. IoT technology is used in many fields, including energy, building automation, and transportation. People, the internet, and physical objects such as sensors and devices are the three main components of IoT technology [32, 33].