Documente Academic
Documente Profesional
Documente Cultură
EE- 548 Wireless and Mobile Networks and Security in Wireless Network
Outline
1
2 3 4
Whats Internet of Things (IoT) Data Compression Approaches in IoT Real World Application Future Aspects
EE- 548 Wireless and Mobile Networks and Security in Wireless Network
Internet of Things
EE- 548 Wireless and Mobile Networks and Security in Wireless Network
Advancement in smart technology has made it possible for machines and devices to connect and communicate critical information into business systems. Internet of Things technology is everywhere and emerging applications are aimed at everyday life. In the coming years, machine-to-machine services will be installed in billions of devices, enhancing the way we live and do business.
EE- 548 Wireless and Mobile Networks and Security in Wireless Network
Event Driven
Internet of Things
Semantic Sharing
BUSINESS PERSPECTIVE
Businesses are realizing the capabilities of machine-to-machine technology, which in turn, has caused a widespread adoption and availability of low-cost communication modules. With the ability to deploy a solution more efficiently than ever before, companies are utilizing this technology to aid in:
The collection and sending of mass amounts of data, where it can be analyzed and assist in the decision making process. Increasing business intelligence by extracting information out of monitored machines and using historical information to predict future behaviors.
EE- 548 Wireless and Mobile Networks and Security in Wireless Network
INDUSTRIAL AUTOMATION
Connected Machines Real-time asset monitoring and communication abilities between machinery. Environment Control Companies can now control the temperature inside chambers and sensitive environments. Preventative Maintenance Assets embedded with sensor technology to send out warnings and errors prior to failure.
EE- 548 Wireless and Mobile Networks and Security in Wireless Network
One of the most exciting sectors that is taking advantage of machine-to-machine technology is in health care. This technology can help control cost and improve the efficiency of service. Internet of Things applications is being used for:
Patient Monitoring Whether a patient is physically in a health care facility or at home, Internet of Things technology will give doctors the ability to monitor patients conditions remotely. Connected Devices Patients will have the ability to monitor their own health conditions at home, and can send off their data to a physician for a diagnosis.
Drug Tracking Hospitals and clinics can track the status and delivery of prescription drugs and monitor dosage
EE- 548 Wireless and Mobile Networks and Security in Wireless Network
EE- 548 Wireless and Mobile Networks and Security in Wireless Network
We concern not only about water, tree and soldier, but also about ocean, forest fires and battlefield.
Sensed data Sensed data Sensed data Sensed data Sensed data
Digital World
Sensed data
Physical World
EE- 548 Wireless and Mobile Networks and Security in Wireless Network
The RamerDouglasPeucker algorithm (RDP) is an algorithm for reducing the number of points
in a curve that is approximated by a series of points.
Begin with the first and last points in the path (let's call them A and B respectively). These are always kept.
Find the point between the first and last that is furthest away from the line joining the first and last line (the orthogonal distance). If this point is greater than the allowed tolerance, this point is kept (let's called it X). Repeat this algorithm twice: once using A as the first point and X as the last point, the other time using X as the first point and B as the last point. This algorithm is recursive, and continues until all points have been checked.
The Orchestrator is implemented using RaspberryPi and it stores data from sensors into a MySQL database. Python is used to develop command interface for sensors as well as to implement R-DPH algorithm to compress sensor data. Wireless sensor nodes are programmed to send data at periodic intervals to the orchestrator. Each node has temperature, light, and humidity sensors. The orchestrator is connected to the cloud using Wi-Fi and using a sink node it connects with deployed sensor networks.
Cont..
In our development, we use hierarchical gradient based routing. For a given temperature and a humidity taken over a period of time t, we identify series of points with t, h in a series of equally distanced in time scale, utilizing R-DPH a tolerance of error " is defined, compression will implement the point reduction using the given error distance. In the experiment we inferred that interrelated points like temperature and humidity can be correlated to the amount of energy needed to cool down a room for an acceptable human comfort level.
1440
CHART TITLE
427
Series 1
Series 2
Series 3
37.5
NO COMPRESSION
EE- 548 Wireless and Mobile Networks and Security in Wireless Network
E=2
E=3
38.4
88
99
ADVANTAGES
Increase in performance of WSNs by optimizing the power. Decreases the transmission time , cost and space. Provides good quality of service compared to aggregation
CHALLENGES
Issues related to fault tolerance and error detection based on big data mining algorithms. Improvement of a virtual network orchestration over the internet.
Short Summary
Internet of Things, Cloud Computing and Services are all aspects of a (Future) Internet
Any TIME
Any PLACE
Any THING
Thank You!