Filters








896 Hits in 8.8 sec

Approximate Query Service on Autonomous IoT Cameras [article]

Mengwei Xu, Xiwen Zhang, Yunxin Liu, Xuanzhe Liu, Felix Xiaozhu Lin
2020 arXiv   pre-print
Can autonomous cameras do any useful analytics?  ...  Our response is iCam, a runtime for autonomous cameras, that is capable of producing useful analytics results with frugal camera resources. iCam is built atop two novel techniques: (1) For the first time  ...  Answering query with approximation and sampling Approximate query processing (AQP) [49] is to reduce the query delay on large-scale data.  ... 
arXiv:1909.00841v3 fatcat:qmncz4tjkbcfjoymxthjh2mz7m

Search Engine for the Internet of Things: Lessons from Web Search, Vision, and Opportunities

Fan Liang, Cheng Qian, William Grant Hatcher, Wei Yu
2019 IEEE Access  
With the development of the Internet of Things (IoT), massive numbers of IoT devices (smart sensors, cameras, phones, and so on) have been deployed and utilized in various environments, supporting numerous  ...  In this paper, we first summarize popular web search techniques and survey existing research on the search and analysis related to the IoT.  ...  In general, attacks on IoT search engines can be launched to target service, query, and devices: (i) Attacks on services: Adversaries directly attacking the IoT search engines themselves have the potential  ... 
doi:10.1109/access.2019.2931659 fatcat:ml54xvmlcbfv5bilrlkshjcita

ThingStore

Kutalmış Akpınar, Kien A. Hua, Kai Li
2015 Proceedings of the 9th ACM International Conference on Distributed Event-Based Systems - DEBS '15  
It provides a "market place" environment to facilitate collaboration on Internet-of-Things (IoT) applications development, and a platform to host their deployment.  ...  ThingStore services three categories of users: (1) Thing Provider -"Things" (such as online cameras and sensors) can be made more intelligent through event detection software routines called smart services  ...  The Internet of Things (IoT) is the interconnection of uniquely identifiable devices with associated computing services which can be performed on embedded computing devices or on an external computing  ... 
doi:10.1145/2675743.2771833 dblp:conf/debs/AkpinarHL15 fatcat:zc5fcplhrrcwjhfwip7x3beetq

Towards Efficient and Intelligent Internet of Things Search Engine

William Grant Hatcher, Cheng Qian, Weichao Gao, Fan Liang, Kun Hua, Wei Yu
2021 IEEE Access  
, and provide situation awareness on an unprecedented scale.  ...  In this article, we first propose a generic framework for the IoT search engine, and then present a naming service for the IoT system, an essential component for an effective IoT search engine.  ...  The local gateway can also leverage cameras installed on the autonomous vehicles and traffic intersections to estimate the state of real-time traffic against other the information.  ... 
doi:10.1109/access.2021.3052759 fatcat:osnxv2spm5brfjlyswkxm5qm54

Internet of things: from internet scale sensing to smart services

Dimitrios Georgakopoulos, Prem Prakash Jayaraman
2016 Computing  
We also describe a variety of IoT applications that have utilized the proposed IoT platform to provide smart IoT services in the areas of smart farming, smart grids, and smart manufacturing.  ...  The internet of things (IoT) is the latest web evolution that incorporates billions of devices (such as cameras, sensors, RFIDs, smart phones, and wearables), that are owned by different organizations  ...  Machine-interpretable semantics allows autonomous or semi-autonomous systems to discover, collect, represent, process, reason, share and act on IoT devices and their data.  ... 
doi:10.1007/s00607-016-0510-0 fatcat:h6yjqfxogjdhzf2edldafsm7ei

Emerging AI Security Threats for Autonomous Cars – Case Studies [article]

Shanthi Lekkala, Tanya Motwani, Manojkumar Parmar, Amit Phadke
2021 arXiv   pre-print
Artificial Intelligence has made a significant contribution to autonomous vehicles, from object detection to path planning.  ...  We discuss model extraction attacks in detail with two use-cases and a generic kill-chain that can compromise autonomous cars.  ...  There is a focus on numerous AI applications in the automotive world, from misfire detection for combustion engines, torque vectoring for electric vehicles to the camera, and LIDAR-based autonomous driving  ... 
arXiv:2109.04865v1 fatcat:ntywbpeorjdo3exgm2bw3nyofe

Development of IoT based Drone Security System for Woman Safety

Mohd Umar
2020 International Journal for Research in Applied Science and Engineering Technology  
Many Research and testing on drone delivery services are also going on, which will target the masses.  ...  Using IoT based model, and high de nition camera, we are developing the Drone for the safety of the women.  ...  We can activate the feature by clicking on 'Active Service Button'. Once the 'Active Service Button' is pressed, our system goes on alert and starts its programmed operation to save the victim. A.  ... 
doi:10.22214/ijraset.2020.30654 fatcat:w2mrdv7xbbbada5gtkry7rcvs4

An Approach to Share Self-Taught Knowledge between Home IoT Devices at the Edge

Ingook Jang, Donghun Lee, Jinchul Choi, Youngsung Son
2019 Sensors  
The traditional Internet of Things (IoT) paradigm has evolved towards intelligent IoT applications which exploit knowledge produced by IoT devices using artificial intelligence techniques.  ...  Knowledge sharing between IoT devices is a challenging issue in this trend.  ...  This board consumes 5 Watts of power approximately [52] .(b)Camera: The smart doorbell recognizes visitors from the images captured by an embedded camera module.  ... 
doi:10.3390/s19040833 fatcat:toe6kpp5wzelrnjcs7xjkiiwhe

Mez: An Adaptive Messaging System for Latency-Sensitive Multi-Camera Machine Vision at the IoT Edge

Anjus George, Arun Ravindran, Matias Mendieta, Hamed Tabkhi
2021 IEEE Access  
Mez is a novel publish-subscribe messaging system for latency sensitive multi-camera machine vision applications at the IoT Edge.  ...  Experimental evaluation on an IoT Edge testbed with a pedestrian detection machine vision application indicates that Mez is able to tolerate latency variations of up to 10x with a worst-case reduction  ...  Availability: Regarding service availability, the current version of Mez does not support replicated physical nodes (neither IoT camera nodes, nor Edge sever).  ... 
doi:10.1109/access.2021.3055775 fatcat:mjjwytxsozfkzmstrkejl7xcv4

Mez: A Messaging System for Latency-Sensitive Multi-Camera Machine Vision at the IoT Edge [article]

Anjus George, Arun Ravindran, Mattias Mendieta, Hamed Tabkhi
2020 arXiv   pre-print
Mez is a publish-subscribe messaging system for latency sensitive multi-camera machine vision at the IoT Edge.  ...  Experimental evaluation on an IoT Edge testbed with a pedestrian detection machine vision application indicates that Mez is able to tolerate latency variations of up to 10x with a worst-case reduction  ...  Availability: Regarding service availability, the current version of Mez does not support replicated physical nodes (neither IoT camera nodes, nor Edge sever).  ... 
arXiv:2009.13549v1 fatcat:asi2arrqdvf7pdj35vtgndy2zu

Cyber Security Measures for Internet of Things Devices

Sanjay Kumar Gupta, Sandeep Vanjale
2020 International journal of engineering research and technology  
This research work focuses on the security aspects of IoT and proposes security solutions for mitigation of the concerns.  ...  Therefore, security and privacy has emerged as a significant challenge for the IoT.  ...  The goals of cyber attackers may be summarized as [13] :  Launch of DDoS attack on internet by using the IoT devices as autonomous botnets.  Unleashing extortion from users by breaching their privacy  ... 
doi:10.37624/ijert/13.8.2020.1830-1839 fatcat:hudcoav5izeidahy4wcvbcoe44

Real-time Linked Dataspaces: A Data Platform for Intelligent Systems Within Internet of Things-Based Smart Environments [chapter]

Edward Curry
2019 Real-time Linked Dataspaces  
Chapters detail advanced techniques for approximate and best-effort stream and event processing services for dataspaces including quality of service, complex event processing, dissemination of IoT streams  ...  Chapter 11 QoS-Aware Complex Event Service ComposiƟon Chapter 12 DisseminaƟon of IoT Streams Chapter 13 Approximate SemanƟc Event Processing SecƟon IV: Intelligent Systems and ApplicaƟons  ... 
doi:10.1007/978-3-030-29665-0_1 fatcat:kimy67eej5ddxgw4la2fkjhype

Analytics-as-a-Service in a Multi-Cloud Environment through Semantically enabled Hierarchical Data Processing [article]

Prem Prakash Jayaraman, Charith Perera, Dimitrios Georgakopoulos, Schahram Dustdar, Dhavalkumar Thakker, Rajiv Ranjan
2016 arXiv   pre-print
However, there are interoperability issues in such environments that involve heterogeneous data and analytics-as-a-service providers.  ...  A large number of cloud middleware platforms and tools are deployed to support a variety of Internet of Things (IoT) data analytics tasks.  ...  This will amount to approximately 5,200 gigabytes for every person on earth. Much of these data is and will be generated from the Internet of Things (IoT) [2] .  ... 
arXiv:1606.07935v1 fatcat:fiuhjbrqivcq7lsvqnydfze4ra

Middleware for Internet of Things: A Survey

Mohammad Abdur Razzaque, Marija Milojevic-Jevric, Andrei Palade, Siobhan Clarke
2016 IEEE Internet of Things Journal  
, to enable a range of applications and services.  ...  Recently, there have been a number of proposals for IoT middleware.  ...  Easy-to-use interfaces support user queries to sensor networks to extract data of interest. However, only approximate results are returned.  ... 
doi:10.1109/jiot.2015.2498900 fatcat:skqtj45vqzdx3n54nydezv4yde

New Frontiers in IoT: Networking, Systems, Reliability, and Security Challenges [article]

Saurabh Bagchi, Tarek F. Abdelzaher, Ramesh Govindan, Prashant Shenoy, Akanksha Atrey, Pradipta Ghosh, Ran Xu
2020 arXiv   pre-print
upon to run (such as, video and LIDAR processing) on constrained resources (on-node and network).  ...  We then discuss the unique challenges for reliability, security, and privacy posed by IoT systems due to their salient characteristics which include heterogeneity of devices and protocols, dependence on  ...  Often, based on the task query, one might need to run multiple different DNN on same video stream. Most of the future IoT applications will rely on a chain of DNNs running on edge clusters.  ... 
arXiv:2005.07338v1 fatcat:a6hb5dpk7fgwreua5x2n7vlw7y
« Previous Showing results 1 — 15 out of 896 results