IMPEMENTATION WORK ON IOT WITH GRID COMPUTING IN INDUSTRIAL AUTOMATION
Keywords:
Canny Edge Detector, Image Compression, Grid ComputingAbstract
In this research, the use of applications of various devices those are related to IOT has been discussed. In the research the implementation of image capturing module has been made from two different dimensions. The deployment of IOT application on grid environment has been made. The implementation of Security of Physical Wallets is made for grid array sensor module for security purpose. Several cameras are used to fetch the image and MATLAB is used for implementation purpose as well as compression of image. The canny edge detector is used to eliminate the useless part of image. The research work would be beneficial to integrate the IOT within Infrared Array sensors in order to implement proposed work. In future time, it would be beneficial for those who want to know about implementation of image capturing module from two different dimensions. It would deploy the IOT application on cloud environment. The paper has been proposed the system for security of organization. It would also offer a way of to increase Testing efficiency of system within existing on.
References
J. Gubbi, et_al, “Internet of Things ( IoT ): A vision , architectural elements , and future directions,” Futur. Gener.Comput.Syst., vol. 29, no. 7, pp. 1645–1660, 2013.
A. Bayoumi, et_al “A Review on Internet of Things (Iot): Security and Privacy Requirements and the Solution Approaches,” vol. 16, no. 7, 2016.
D. F. Murad and A. N. Hidayanto, “IoT for Development of Smart Public Transportation System : A Systematic Literature Review,” vol. 118, no. 18, pp. 3591–3604, 2018.
T. Haikun, L. Xinsheng, L. Haitao, and Y. Xiao-guang, “Research and Application of the IOT Gateway Based on the Real-Time Specification for Java,” vol. 14, no. 3, pp. 129–141.
N. Gondchawar and P. R. S. Kawitkar, “IoT based Smart Agriculture,” vol. 5, no. 6, pp. 838–842, 2016.
M. Raina, “STUDY OF VARIOUS APPLICATIONS OF INTERNET OF THINGS ( IOT ),” vol. 9, no. 2, pp. 39–50, 2018.
A. Tiwari and H. Maurya, “Challenges and Ongoing Researches for IOT ( Internet of Things ): A Review,” vol. 5, no. 2, pp. 57–60, 2017.
K. Lam and C. Chi, “Identity in the Internet-of-Things ( IoT ): New Challenges and Opportunities,” vol. 1, pp. 18–26, 2016.
S. Engineering, S. Arabia, and D. Campus, “A Review on Internet of Things ( loT ), Internet of Everything ( IoE ) and Internet ofNano Things ( IoNT ),” pp. 219–224.
G. Article, “Smart Security Solutions based on Internet of Things ( IoT ),” vol. 4, no. 5, pp. 3401–3404, 2014.
W. Zhou, Y. Jia, A. Peng, Y. Zhang, and P. Liu, “The Effect of IoT New Features on Security and Privacy : New Threats , Existing Solutions , and Challenges Yet to Be Solved,” IEEE Internet Things J., vol. PP, no. c, p. 1, 2018 [1] M. Singh and S. Kim, “Blockchain : A Game Changer for Securing IoT Data,” pp. 51–55.
M. Singh and S. Kim, “Blockchain : A Game Changer for Securing IoT Data,” pp. 51–55.
H. Kim, D. Lee, J. Cho, D. Park, and A. O. S. Architecture, “Software Execution Freeze-Safe Microcontroller Using Power Profile Tracking for IoT-Driven Connected Services,” pp. 237–240.
A. R. Biswas and R. Giaffreda, “IoT and Cloud Convergence : Opportunities and Challenges,” pp. 375–376, 2014.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2019 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.