ScholarWorksIndianapolis
  • Communities & Collections
  • Browse ScholarWorks
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    or
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Subject

Browsing by Subject "Internet of Things"

Now showing 1 - 10 of 10
Results Per Page
Sort Options
  • Loading...
    Thumbnail Image
    Item
    Emergency Evacuation Assistance
    (IEEE, 2020-01) Lee, John J.; Koo, Dan; Tadesse, Dinaol; Jain, Atharv; Shettar, Sushmitha; Kim, Dongsoo; Electrical and Computer Engineering, School of Engineering and Technology
    There have been more than necessary casualties due to a lack of intelligence in emergency evacuation mechanisms such as exit signs. Although large or complex buildings and facilities have many exit doors, in case of emergency, people may not be able to escape quickly enough due to sudden loss of directions and difficulty in finding safe routes to exit doors. If you were ever in such a situation, you would wish that if there were ever smart escape route assistance mechanisms available or at least smart exit signs available that safely and quickly guide you to a safe haven. It is what we try to make such a wish come true. In this paper, we propose a graph mapping scheme and a new safe evacuation route algorithm for safe emergency evacuation assistance, with the aid of recent technology called Internet of Things (IoT). The gist of our approach is that people are not allowed to pass through or even go towards any area where fire or toxic gas is detected by controlling the direction signals installed on exit signs. The experiments performed with our methodology shows that the proposed technology may be able to save more lives.
  • Loading...
    Thumbnail Image
    Item
    Internet of Things Security Using Proactive WPA/WPA2
    (2016-04-05) Kamoona, Mustafa; El-Sharkawy, Mohamed A.; King, Brian; Rizkalla, Maher
    The Internet of Things (IoT) is a natural evolution of the Internet and is becoming more and more ubiquitous in our everyday home, enterprise, healthcare, education, and many other aspects. The data gathered and processed by IoT networks might be sensitive and that calls for feasible and adequate security measures. The work in this thesis describes the use of the Wi-Fi technology in the IoT connectivity, then proposes a new approach, the Proactive Wireless Protected Access (PWPA), to protect the access networks. Then a new end to end (e2e) IoT security model is suggested to include the PWPA scheme. To evaluate the solutions security and performance, rstly, the cybersecurity triad: con dentiality, integrity, and availability aspects were discussed, secondly, the solutions performance was compared to a counterpart e2e security solution, the Secure Socket Layer security. A small e2e IoT network was set up to simulate a real environment that uses HTTP protocol. Packets were then collected and analyzed. Data analysis showed a bandwidth e ciency increase by 2% (Internet links) and 12% (access network), and by 344% (Internet links) and 373% (access network) when using persistent and non-persistent HTTP respectively. On the other hand, the analysis showed a reduction in the average request-response delay of 25% and 53% when using persistent and non-persistent HTTP respectively. This scheme is possibly a simple and feasible solution that improves the IoT network security performance by reducing the redundancy in the TCP/IP layers security implementation.
  • Loading...
    Thumbnail Image
    Item
    An Internet-of-Things (IoT) system development and implementation for bathroom safety enhancement
    (Elsevier, 2016) Koo, Dan D.; Lee, John J.; Sebastiani, Aleksei; Kim, Jonghoon; Department of Engineering Technology, School of Engineering and Technology
    Statistics show that a bathroom is one of the most hazardous places especially for older people. Older people typically have greater difficulties with mobility and balance, making them more vulnerable to fall and slip injuries in a bathroom and causing serious health issues related to short and long-term well-being. Various components in a bathroom including shower, tub, floor, and toilet have been re-designed, and independently upgraded their ergonomics and safety aspects; however, the number of bathroom injuries remains consistently high in general. Internet-of-Things (IoT) is a new concept applicable to almost everywhere and man-made objects. Wireless sensors detect abnormalities and send data through the network. A large amount of data can be collected from multiple IoT systems and it can be utilized for a big data analysis. The big data may reveal a hidden positive outcome beyond the initially intended purposes. A few commercial IoT applications such as wearable health monitoring and intelligent transportation systems are available. Nevertheless, An IoT application for a bathroom is not currently known. Unlike other applications, bathrooms have some unique aspects such as privacy and wet environment. This paper presents a holistic conceptual approach of an Internet-of-Things (IoT) system development and implementation to enhance bathroom safety. The concept focuses on the application in a large nursing care facility as a pilot testing bed. Authors propose 1) sensor selection and application, 2) integration of a wireless sensor local network system, 3) design concept for IoT implementation, and 4) a big data analysis system model in this paper.
  • Loading...
    Thumbnail Image
    Item
    Raspberry Pi: An Effective Vehicle in Teaching the Internet of Things in Computer Science and Engineering
    (MDPI, 2016-09) Zhong, Xiaoyang; Liang, Yao; Department of Computer and Information Science, School of Science
    The Raspberry Pi is being increasingly adopted as a suitable platform in both research and applications of the Internet of Things (IoT). This study presents a novel project-based teaching and learning approach devised in an Internet of Things course for undergraduate students in the computer science major, where the Raspberry Pi platform is used as an effective vehicle to greatly enhance students’ learning performance and experience. The devised course begins with learning simple hardware and moves to building a whole prototype system. This paper illustrates the outcome of the proposed approach by demonstrating the prototype IoT systems designed and developed by students at the end of one such IoT course. Furthermore, this study provides insights and lessons regarding how to facilitate the use of the Raspberry Pi platform to successfully achieve the goals of project-based teaching and learning in IoT.
  • Loading...
    Thumbnail Image
    Item
    Scalable Downward Routing for Wireless Sensor Networks Actuation
    (IEEE, 2019-10) Zhong, Xiaoyang; Liang, Yao; Computer and Information Science, School of Science
    In this paper, we study the downward routing for network control/actuation in large-scale and heterogeneous wireless sensor networks (WSNs). We propose the opportunistic source routing (OSR), a scalable and reliable downward routing protocol for WSNs. OSR introduces opportunistic routing into traditional source routing based on the parent set of a node's upward routing in data collection, significantly addressing the drastic link dynamics in low-power and lossy WSNs. We devise a novel adaptive Bloom filter mechanism to effectively and efficiently encode the downward source-route in OSR, which enables a significant reduction of the length of source-route field in the packet header. OSR is scalable to very large-size WSN deployments, since each resource-constrained node in the network stores only the set of its direct children. We present an analytical scalability model and evaluate the performance of OSR via both the simulations and real-world testbed experiments, in comparison with the standard RPL (both storing mode and non-storing mode), ORPL, and the representative dissemination protocol Drip. Our results show that the OSR significantly outperforms RPL and ORPL in scalability and reliability. OSR also achieves significantly better energy efficiency compared with TinyRPL and Drip which are based on the same TinyOS platform as OSR implementation.
  • Loading...
    Thumbnail Image
    Item
    Scalable Downward Routing for Wireless Sensor Networks and Internet of Things Actuation
    (IEEE, 2018-10) Zhong, Xiaoyang; Liang, Yao; Computer and Information Science, School of Science
    We present the opportunistic Source Routing (OSR), a scalable and reliable downward routing protocol for large-scale and heterogeneous wireless sensor networks (WSNs) and Internet of Things IoT. We devise a novel adaptive Bloom filter mechanism to efficiently encode the downward source route in OSR, which significantly reduces the length of the source route field in the packet header. Moreover, each node in the network stores only the set of its direct children. Thus, OSR is scalable to very large-size WSN/IoT deployments. OSR introduces opportunistic routing into traditional source routing based on the parent set of a node's upward routing in data collection, significantly addressing the drastic link dynamics in low-power and lossy networks (LLNs). Our evaluation of OSR via both simulations and real-world testbed experiments demonstrates its merits in comparison with the state-of-the-art protocols.
  • Loading...
    Thumbnail Image
    Item
    Scalable Downward Routing for Wireless Sensor Networks and Internet of Things Actuation
    (IEEE, 2018) Zhong, Xiaoyang; Liang, Yao; Computer and Information Science, School of Science
    We present the opportunistic Source Routing (OSR), a scalable and reliable downward routing protocol for large-scale and heterogeneous wireless sensor networks (WSNs) and Internet of Things IoT. We devise a novel adaptive Bloom filter mechanism to efficiently encode the downward source route in OSR, which significantly reduces the length of the source route field in the packet header. Moreover, each node in the network stores only the set of its direct children. Thus, OSR is scalable to very large-size WSN/IoT deployments. OSR introduces opportunistic routing into traditional source routing based on the parent set of a node's upward routing in data collection, significantly addressing the drastic link dynamics in low-power and lossy networks (LLNs). Our evaluation of OSR via both simulations and real-world testbed experiments demonstrates its merits in comparison with the state-of-the-art protocols.
  • Loading...
    Thumbnail Image
    Item
    Smart Phone Based Mobile Code Dissemination for Heterogeneous Wireless Sensor Networks
    (IEEE, 2019-10) Faruk, Omor; Zhong, Xiaoyang; Liang, Yao; Liang, Xu; Computer and Information Science, School of Science
    Low-power Wireless Sensor Networks (WSNs) are being widely used in various outdoor applications including environmental monitoring, precision agriculture, and smart cities. WSN is a distributed network of sensor devices where the software running on the sensor devices defines how the devices should operate. In real-world WSN deployments, sensor node's software update is required to fix bugs and maintain optimal operation. In this paper, we present a novel mobile code dissemination tool based on smart phone running on Android Operating System for heterogeneous WSN reprogramming. Our implementation builds upon Mobile Deluge with new enhancements and more convenient mobile code dissemination tool in practice. We have evaluated our application performance on Android platform, and validated our mobile tool with a real-world outdoor low-power heterogeneous WSN deployment, demonstrating its practical merit.
  • Loading...
    Thumbnail Image
    Item
    Smart shoe gait analysis and diagnosis: designing and prototyping of hardware and software
    (2018) Peddinti, Seshasai Vamsi Krishna; Agarwal, Mangilal; Rizkalla, Maher; El-Sharkawy, Mohamed‏
    Gait analysis plays a major role in treatment of osteoarthritis, knee or hip replacements, and musculoskeletal diseases. It is extensively used for injury rehabilitation and physical therapy for issues like Hemiplegia and Diplegia. It also provides us with the information to detect various improper gaits such as Parkinson's disease, Hemiplegic and diplegic gaits. Though there are many wearable and non-wearable methods to detect the improper gate performance, they are usually not user friendly and have restrictions. Most existing devices and systems can detect the gait but are very limited with regards of diagnosing them. The proposed method uses two A201 Force sensing resistors, accelerometer, and gyroscope to detect the gait and send diagnosed information of the possibility of the specified improper gaits via Bluetooth wireless communication system to the user's hand-held device or the desktop. The data received from the sensors was analyzed by the custom made micro-controller and is sent to the desktop or mobile device via Bluetooth module. The peak pressure values during a gait cycle were recorded and were used to indicate if the walk cycle of a person is normal or it has any abnormality. Future work: A magnetometer can be added to get more accurate results. More improper gaits can be detected by using two PCBs, one under each foot. Data can be sent to cloud and saved for future comparisons.
  • Loading...
    Thumbnail Image
    Item
    V. Real-World Examples, Handy How-to’s and Sample Screen Shots
    (2017) Hook, Sara Anne
    With all of the changes surrounding social media and email, it's critical to get up to speed on the latest rules, procedures and case law. This full-day, cutting-edge course will walk you through state processes, procedures and the latest case law while equipping you with handy how-to's, sample screen shots, real world examples and shortcuts along the way. Expert attorney faculty, who know the ins and outs of these groundbreaking new forms of evidence, will provide practical tech advice that you can actually understand and start using right away. From email to Facebook, Twitter and Snapchat, to YouTube, Pinterest and video surveillance, this comprehensive ESI guide will give you invaluable insight into proven ways for identifying, preserving, producing, admitting and blocking ESI.
About IU Indianapolis ScholarWorks
  • Accessibility
  • Privacy Notice
  • Copyright © 2025 The Trustees of Indiana University