IOT-EMTECH

Ace your homework & exams now with Quizwiz!

Data swapping and Laplace noise techniques modify a subset of the data by introducing uncertainty about its value.

Noise addition techniques

main reason for sleep associated respiration disorder

Obstructive sleep apnea (OSA)

according to ______, IoT is the interaction of everyday object's computing devices through the internet that enables the sending and receiving of useful data

Oxford dictionary

helps users to identify the real-time availability of parking spaces on their phone

Parking Sensors

Measure sleep degrees or the sleeping position

Pressure sensor

Challenges of IoT in healthcare

-89% have suffered an IoT- related security breach -49% malware -39% Human Error -22% DDos

Challenges in IoT

-Insufficient testing and updating -concern regarding data security and privacy -software complexity - data volumes and interpretation

Challenges in IoT

-Integration with AI and Automation -Devices require a constant power supply which is difficult -Interaction and short-range communication

Benefits of IoT in healthcare

-Reduced expenses -Time-saving -Personal Care for patients -Monitoring health condition -medicine notification -Improved healthcare devices

Disadvantages of IoT

-Security -privacy -flexibility -complexity -compliance

Advantages of IoT

-Technical Optimization -Improved Data Collection -Reduced Waste -Improved Customer Engagement

results according to several facets.

-data life cycle -privacy preserving techniques -ISO privacy principles

Benefits of IoT in agriculture

-data that works for you -control over the risks -automation and efficiency -better product's quality

Risks IoT can bring

-privacy of patients -Accidental failures -Malware -Lack of encryption

the actual idea of connected devices was proposed in

1970

The term Internet of Things was invented in______ to promote RFID Technology

1999

The term was mentioned in famous publications like the Guardian, Boston Globe, and Scientific American

2004

UN's International Telecommunications Union (ITU) published its first report on this topic.

2005

- The Internet of Things was born

2008

IoT did not accelerate until ___________ and reached mass market in early 2014

2010/2011

Gartner, the market research company, include "The Internet of Things" Technology in their research

2011

theme of Europe's biggest internet conference LeWeb was the "Internet of Things"

2012

The term Internet of Things reached mass market awareness when in January 2014 Google announced to buy Nest for $3.2bn. At the same time the Consumer Electronics Show (CES) in Las Vegas was held under the theme of IoT.

2014

These techniques are effective for ensuring data sharing. Data owners can express their individual preferences about who can access to what data and how others manipulate their shared data

Access control

Helps you to capture heart rate pattern, calorie expenditure, activity levels, and skin temperature on your wrist.

Activity trackers

These techniques hide a data owner's identity by removing any explicit identifier and makes the data less precise. The most commonly used is k-anonymity, l-diversity and t-closeness.

Anonymization protection techniques

Brain of the system which contains all the program created.

Arduino UNO

Create beep sounds depending on the set time.

Buzzer

the concept of connected health care system facilities real-time health monitoring and patient care. It helps in improved medical decision-making based on patient data.

Connect health

IoT helps automobile companies handle billing, parking, insurance, and other related stuff automatically

Connected cars

all the collected data is sent to a cloud infrastructure

Connectivity

These techniques are heavily used when preserving the privacy of distributed entities. They can be categorized into three major groups: secure multiparty computation, asymmetric/symmetric encryption, and public key infrastructure.

Cryptographic protection

These techniques are a series of operations that modify or hide some sensitive parts on the original data to preserve privacy.

Data Perturbation Techniques

These techniques aim at limiting data use by blocking access or encrypting inputs.

Data restriction techniques

There is a huge concern regarding the flexibility of an IoT system. It is mainly regarding integrating with another system as there are many diverse systems involved in the process.

Flexibility

M2M as well as the industrial internet are not opposing concepts to IoT. In fact both are a subset of the internet of things with a narrower reach

Further Observations

according to the _______ ,IoT is a framework of all things that have a representation in the presence of the internet in such a way that new applications and services enable the interaction in the physical and virtual world

IEEE communications

IoT facilitates immediate action on data

Improved Data Collection

allows you to improve customer experience by detecting problems and improving the process

Improved customer Engagement

this term was strongly pushed by GE, it goes beyond M2M since it not only connections between machines but also includes human interfaces

Industrial Internet (of Things)

describes a set of concepts to drive the next industrial revolution. That includes all kinds of connectivity concepts in the industrial context.

Industry 4.0

connects only people

Internet

according to the _______________ definition, ______ is the networking of smart objects meaning a huge number of devices intelligently communicating in the presence of internet protocol.

Internet Architecture Board (IAB), Internet Of Things

according to ________, smart objects in IoT have some constraints such as limited bandwidth, power, and processing accessibility.

Internet Engineering Task Force (IETF)

Sensors and actuators embedded in physical objects are linked through wired and wireless networks, often using the same Internet Protocol (IP) that connects the Internet.

Internet Of Things

aims to include all sorts of connection that one can envision. The concept has thus the highest reach

Internet of Everything

Transmit information inside the network.

Internet of Things

transmit information from the sensors and display in internet application

Internet of Things (IoT)

includes connections beyond the industrial context such as wearable devices on people

IoT

he created a toaster which could be turned on/off over the internet in 1990

John Romkey

"Internet of Things" was coined by

Kevin Ashton, 1999 during his work at procter&Gamble

Displays the respiration rate and sleeping time.

LCD or Liquid Crystal Display

has been in use for more than a decade, and is well-known in the Telecoms sector.

M2M or Machine to Machine

r reports on a systematic literature review of privacy preserving solutions used in Cooperative Information Systems (CIS) in the IoT field.

Privacy-Aware in the IoT Applications: A Systematic Literature Review

Enables the use of a RTC and calendar.

RTC or Real-time clock

offers real-time information leading to effective decision making & management of resources

Reduced waste

Determine respiration rate. If the breathing level increases, it'll be displayed on LCD.

Respiratory mic sensor

IoT technology creates an ecosystem of connected devices. However, during this process, the system may offer little authentication control despite sufficient security measures.

Security

Four fundamental components of IoT System

Sensors/Devices Connectivity Data Processing User Interface

introduced the first cellular module built for M2M in 1995

Siemens

offers all types of use cases which include traffic management to water distribution, waste management, etc.

Smart city

Encapsulates the connectivity inside your homes. it includes smoke detectors, home appliances, light bulbs, windows, door locks, etc

Smart home

Integrated with pressure sensor and IoT functions for sleep apnea detection

Smart mattress

Remotely turn any device on or off. It also allows you to track a device's energy level and get custom notifications directly into your smartphone

Smart outlets

helps in real-time tracking of goods while they are on the road, or getting suppliers to exchange inventory information

Smart supply chain

save resource on heating bills by knowing your usage patterns

Smart thermostats

IoT applications

Smart thermostats Connected cars Activity trackers Smart Outlets Parking Sensors

collect data from various car sensors. The manufacturer analyzes them to improve its design and make them more efficient

Technical Optimization

needs to available to the end user in some way which can be achieved by triggering alarms on their phones or sending them notification through email or text message

User Interface

much narrower in scope as the other concepts as it solely focuses on software architecture

Web of Things

IoT has its own set of rules and regulations. However, because of its complexity, the task of compliance is quite challenging.

compliance

The design of the IoT system is also quite complicated. Moreover, it's deployment and maintenance also not very easy.

complicated

once that data is collected, and it gets to the cloud, the software performs processing on the gathered data.

data processing

Three positions of pressure sensors were used to analyze the body condition.

left,right,center

how to detect sleep apnea

pressure sensors Respiration Microphone sensors

The use of IoT, exposes a substantial amount of personal data, in extreme detail, without the user's active participation. This creates lots of privacy issues

privacy

helps collect live data from the surrounding environment

sensors/devices

affects a person's common health and quality of life

sleep-disordered respiration


Related study sets

Immune and Hematologic Disorders

View Set

Anatomy and Physiology Final Exam

View Set

Exam OSHA 30 FALL HAZARDS Redvector Clicksafety - Flash Cards

View Set