SlideShare une entreprise Scribd logo
1  sur  57
1
Lecture 8: IoT System Models and
Applications
EEEM048/COM3023- Internet of Things
Prof. Payam Barnaghi
Centre for Vision, Speech and Signal Processing (CVSSP)
Electrical and Electronic Engineering Department
University of Surrey
Autumn 2018
Spatial Data and IoT
− Most of the data in IoT applications is location dependent;
− Services could be also location-based;
− Location can be specified as:
− Names, labels
− Tags and semantic annotations
− GPS data - Longitude, Latitude (and Altitude)
− How can we define an area?
− Multiple points are required
− Simple Euclidian distance measure won’t work for longitude/latitude
(lon/lat) data
− The same way, you can’t simply cluster, group lon/lat data using classical
methods that use Euclidian distance (e.g. k-means clustering)
How to create location tags?
− GeoHashing is one way to do this;
− Geohash is a latitude/longitude geo-coding that was invented
by Gustavo Niemeyer.
− GeoHashing function can encods/decods (lat,lon) pairs in a
compact form.
− The Geohash algorithm can represent geographic regions in a
hierarchical structure.
− A geohash is represented as a string:
− e.g. (-25.382708 and -49.265506) can be represented as:
6gkzwgjzn820
− Or http://geohash.org/6gkzwgjzn820
How does it work?
− A Geohash is calculated by interleaving bits obtained from
latitude and longitude pairs and converting the bits to a string
using a Base-32 character map.
− Base-32:
Table source: https://en.wikipedia.org/wiki/Geohash
Geohash – example
5
ezs42
01101 11111 11000 00100 00010
GeoHash
− A Geohash string represents a fixed spatial bounding box.
− For example, the latitude and longitude coordinates of (-
25.382708 and -49.265506) fall within the Geohash bounding
box of "6gkzwgjzn820".
− Appending characters to the string would make it refer to
more precise geographical subsets of the original string.
− More information: http://geohash.org/site/tips.html#format
Example of similar locations
− (51.236127 -0.574036) - Guildford
− gcpe6zmbpfrd
− (51.243113 -0.590343) – University of Surrey
− gcped8d0u087
− (51.243603 -0.587994) – BA (Arthur C Clark) Building
− gcped8egdezy
gcpe6zmbpfrd
gcped8d0u087
gcped8egdezy
GeoHash
Prefix similarity can be used to find close locations;
But it cannot be directly converted to a metric distance measure.
GeoHashing – Location Codes
Image credit: Pramod Anantharam et al., Wright State University/University of Surrey;
Alternatively Grid boxes and tags can be
defined manually or using other different
techniques; here is an example:
Limitations of GeoHash
− Geohash algorithm can be used to find locations (e.g. points) that are
close to each other by checking prefix similarity of the GeoHash tags.
− However, the points that close to each other but located at two opposite
sides of the Equator line or for the nodes that fall on line of longitude (i.e.
Meridian points) can produce Geohash codes that have no common
prefix.
− Point close to North and South Poles can have very different geohashes (in
Norht and South Poles close areas can have different latitudes)
− Geohash also defines a Bounding Box; this can then result having locations
that are close but have different GeoHash codes.
− For better proximity searches, the surrounding eight geohashes of a
geohash should be calculated but this can make the proximity
searches more complicated.
How to calculate the distance between two
geohashes or locations
− If you have two geohashes, the first step is to decode them
into latitude and longitude values.  
− Longitude varies between [-180 , +180]
− Latitude varies between [-90 , +90]
− The Geohash is based on the splitting the interval in 2 (for
each of the Longitude and Latitude) at each step and
take 0 for the right part and 1 for the left part.
11
Calculate distance between two
Latitude/Longitude points
− There are a variety of calculations for lati­tude/longi­tude
points, with different formulae.
− The formulae to calculate distance between two Lat/Lon
points are often on the basis of a spherical earth (ignoring
ellipsoidal effects) – which is accurate enough for most of the
applications.
12
Source: http://www.movable-type.co.uk/scripts/latlong.html
Haversine’ formula
− haversine’ formula is used to calculate the great-circle distance between
two points 
a = sin²( /2) +Δφ cos 1φ ⋅ cos 2φ ⋅ sin²( /2)Δλ
c = 2 atan2( √a, √(1 a) )⋅ −
d = R c⋅
where φ is latitude, λ is longitude, R is earth’s radius (mean radius = 6,371km);
1 =φ lat1.toRadians();
2 =φ lat2.toRadians();
= (Δφ lat2-lat1).toRadians();
= (Δλ lon2-lon1).toRadians();
13Source: http://www.movable-type.co.uk/scripts/latlong.html
Haversine’ formula
- Note that angles need to be in radians.
- In this module, you don’t need to remember these
formulae. The main formulae and also the required
conversion formula (e.g. degree to radian) will be
given in the exam.
14
Haversine’ formula- sample code
15
Source: http://www.movable-type.co.uk/scripts/latlong.html
IoT Applications
−The IoT and M2M?
−IoT is a more generic term; M2M focuses on devices and
machine-to-machine communications;
−Sometimes the terms are used interchangeably; however,
M2M is mainly meant for automated interactions between
devices and IoT is an umbrella term for describing
technologies that allow real world data collection,
communication, processing and interactions (machines,
devices and human users).
Some of the IoT Application areas
17
− Industrial automation
− Smart homes
− eHealth
− Automotive (navigation, traffic control, vehicle safety, fleet
management, etc.)
− Smart cities (city automation, intelligent parking, intelligent
transport systems, air quality and pollution monitoring, etc.)
− Environmental monitoring
− Smart grid and smart metering
− …
Types of applications
− Event detection
− Nodes report events and occurrences
− Anomaly and outlier detection
− Collaboration of nearby and/or remote sensors to detect more
complicated events
− Pattern detection and anomaly detections in patterns
− Periodic monitoring and measurements, information
extraction and interactons
− Measuring and monitoring and reporting the data
− Monitoring and measurement can be triggered by an event
− Processing the collected information and implementing (automated)
interactions.
18
Types of applications
− Approximation and edge detection
− Detecting how a physical value (e.g. temperature) changes one place to
another;
− This can be used to approximate spatial characteristics and map it to an area
− For example, in a forest fire, this can be used to approximate the border of
actual fire;
− This can be generalised to finding “edges” in different boundaries such as
space and time.
− Tracking
− An event source can be mobile;
− sensors can be used to monitor and track an object;
− Speed and direction of the object can be also estimated.
19
Types of applications
− Control and feedback
− Using actuators to interact with the environment;
− Make a change and the sense and obtain feedback from the physical
environment.
20
Physical Environment/ Things
Actuator Sensor
Controller
actuation sensing
feedbackcommand
Characteristic requirements
− Types of services
− Interfaces and interaction models
− Autonomy of services
− Data processing and information extraction requirements
− Service network requirements
− Quality of service
− Delay and latency
− Quality of information
− Accuracy and quality measures of the functions (e.g. reliability and
accuracy of event detection).
21
Characteristic requirements
− Fault tolerance
− Reliability and dependability
− What happens if a node runs out of power or gets damaged or losses
coverage
− Redundant deployment
− Lifetime
− Especially if the nodes rely on limited power
− Sometimes it is a trade-off between energy efficiency against the
quality of service
− Can be defined as the time that first node fails or runs out of energy;
or when x% of the nodes fail; or it can be defined as the time that the
observed “thing” is no longer covered.
22
Characteristic requirements
− Scalability
− How efficiently large number of nodes/Things can be supported.
− How efficiently the system can respond to large number of events, requests,
traffic, etc.
− Density
− Number of nodes per unit area
− Programmability
− Planning for an application to see if support for change and dynamic updates
required.
− Maintainability
− Ability to adapt to the changes or to change operational parameters
− Or, in some applications ability to access and maintain or replace the nodes or
to re-configure them (remotely or locally)
23
Required mechanisms
− Multi-hop wireless communications
− Transmission range can be short and in some cases multi-hop communication is
required.
− Energy efficient operations
− To save energy and/or increase the lifetime of the network/services.
− Auto-configuration
− Ability to configure (at least some of) the functional parameters automatically.
− Collaboration and in-network processing
− Several node collaborate
− Parts of the process is performed on the node and/or in the network.
− Data-centric solutions
− Conventional networks often focus on sending data between two specific nodes each
equipped with an address.
− Here what is important is data and the observations and measurements not the node
that provides it.
− Security, Trust and Privacy
24
What is special about IoT applications?
− Different applications and various requirements
− Interaction and deployment in uncontrolled or less controlled
environments
− Heterogeneity and scale
− Energy and resource constraints
− Autonomous mechanisms that are often required; e.g. self-configurability
− Security and Privacy issues
− Data quality and data processing and analysis requirements
− Actuation, feedback and control loop to interact with physical
objects/environment over distributed networks.
− Mobility
25
26
Crowdsourced solutions
27
Smart Cities
− Cities:
− Cities account for 75% of green house emissions, while only occupying 2% of
world surface.
− It is expected that the amount of people living in urban areas will double until
2050.
− By 2015, 1.2 billion cars will be on the road–making 1 car per 6 person.
− Challenge:
− More space required
− Management of resources and infra structure waste, transportation, …
− Climate change
− Competitiveness
− Crisis management
Adapted from: Smart Cities and Internet of Things, Oliver Haubensak ETH-MTEC, ETHZ, May 2011.
Designing IoT applications for smart cities
28
29
Source LA Times, http://documents.latimes.com/la-2013/
Future cities: a view from 1998
Importance of designing for real
problems and challenges
30Source: http://robertluisrabello.com/denial/traffic-in-la/#gallery[default]/0/
Source: wikipedia
31
IoT applications in smart cities
− Traffic management
− Waste management
− City transport
− Noise, air-quality control and monitoring
− Emergency services
− Security and safety
− Infrastructure management
− Elderly-care and social care
− Smart metering
32
IoT environments are usually dynamic and (near-) real-time
33
Off-line Data analytics
Data analytics in dynamic environments
Image sources: ABC Australia and 2dolphins.com
Traffic control and sensing
− There are various sensing technologies that can be used
including: video, sonar, radar, inductive loops, bacons, etc.
− Some of these will need cable and some need to be installed
on lampposts, etc..
− Some others like inductive loops can be embedded into the
transportation road infrastructure.
− One application is congestion control by counting (and
estimating) the number of passing vehicles and their speed.
− Environmental factors can affect the sensors; for example,
video cameras are not very helpful during fog and heavy snow
or rain.
34
#1: Design for large-scale and provide tools and APIs.
#2: Think of who will use the data and how, when you
design your models.
#3: Provide means to update and change the data
models and processing methods.
35
Smart Cities
#4: Design for different audience (data consumers,
developers, providers) and think about real impact and
sustainability of your solution.
#5: Specify (and encourage others to do the same) data
governance and privacy procedures, explain the
ownership and re-use rules, and give control to the
owners of the data.
36
Smart cities
37
Users in control or losing control?
38
Image source: Julian Walker, Flicker
Smart City: IoT Application Examples
40
Event Visualisation
A sample smart city application
41
Data Quality Explorer
42
Source: The CityPulse project by the University of Applied Sciences Osnabrück
Video demo: https://www.youtube.com/watch?v=Yc1jiB5zdfE
Precision Agriculture
− A large farm can exhibit wide spatial diversity in soil types,
nutrient content, water/moisture, and other important
factors.
− Sensors for monitoring temperature, humidity, acidity of soil.
− Monitoring for fungal disease; e.g. by monitoring humidity and
temperature conditions in the field as well as the wetness of
potato leaves the researchers can identify the risk of fungal
disease.
43
Source: Dargie and Poellabauer, Fundamentials of Wirless Sensor Networks: Theory and Practice, Wiley, 2010
Healthcare: IoT Application use-case scenarios
IoT for healthcare: Dementia use-case
 16,801 people with dementia in Surrey – set to rise to 19,000
by 2020 (estimated) - nationally 850,000 - estimated 1m by
2025 (Alzheimer’s Society);
 Estimated to cost £26bn p/a in the UK (Alzheimer’s Society):
health and social care (NHS and private) + unpaid care;
 IoT devices can provide data that can further analysed to
detect agitation, sleep, weight loss, and wandering – all have a
big impact on quality of life and wellbeing;
Technical Challenges
− Infrastructure
− Interoperability, integration
− Security
− Data governance
− Scalability
Device/Data interoperability
47
FIHR4TIHM
48
Gateway
Gateway
Data Analytics
Cloud systems
External systems
Possible links to
other networks
Gateway
Data-driven and patient
centered Healthcare
Applications
How does TIHM work?
Signals
Machine
Analysis
Human
Decision
Action
24/7
Personalised thresholds
51
Probabilistic machine learning models
52
TIHM Integrated View (iView)
Integrated view
monitored by blend of
health professionals
Working closely with
Alzheimer’s Society, NHS,
social services and police
Freeing up clinicians
to focus on
treatment
54
Application requirements in IoT
− Healthcare
− Service reliability, security, privacy, trust, mobility, lower power
consumption, lower delays;
− Automotive
− Mobility, real-time interactions, quality of services, location tracking;
− Smart cities
− Reliability, fault tolerance, delay tolerance;
Exercise : A use-case study
55Image source: Mahmoud Meribout, A Wireless Sensor Network-Based Infrastructure for Real-Time and Online Pipeline Inspection, IEEE SENSORS JOURNAL, VOL. 11, NO. 11, NOVEMBER
2011
This diagram shows a leak detection
System in a pipeline.
Work in groups and identify:
-What parameters can be measured
to detect a leak?
-What type of sensors can be used?
-What components can be added to
this diagram?
-What are the key issues that should
be considered in the design?
-What type of in-network processes
can be done?
Further reading
− If you are interested in more information about spatial data,
you may want to refer to (this won’t be part of the exam):
− Spatial Data on the Web Best Practices:
− https://www.w3.org/TR/sdw-bp/
56
57
Questions?

Contenu connexe

Tendances

Algorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsAlgorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systems
Jigisha Aryya
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
Editor IJARCET
 
Network components
Network componentsNetwork components
Network components
Anas Karzoun
 
Networking Hardware
Networking HardwareNetworking Hardware
Networking Hardware
isma ishak
 
A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networks
praveen369
 

Tendances (20)

wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Architecture 4 Wireless Sensor Networks
Architecture 4 Wireless Sensor NetworksArchitecture 4 Wireless Sensor Networks
Architecture 4 Wireless Sensor Networks
 
Algorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsAlgorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systems
 
Ioe prerequisites
Ioe prerequisitesIoe prerequisites
Ioe prerequisites
 
Unit2[1]
Unit2[1]Unit2[1]
Unit2[1]
 
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
 
Wireless sensor networks dcs
Wireless sensor networks dcsWireless sensor networks dcs
Wireless sensor networks dcs
 
Corresponding parts of computer and their functions
Corresponding parts of computer and their functionsCorresponding parts of computer and their functions
Corresponding parts of computer and their functions
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
 
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed SurveyComparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
 
Computer networks--introduction computer-networking
Computer networks--introduction computer-networkingComputer networks--introduction computer-networking
Computer networks--introduction computer-networking
 
Computer network
Computer networkComputer network
Computer network
 
Network components
Network componentsNetwork components
Network components
 
Networking Hardware
Networking HardwareNetworking Hardware
Networking Hardware
 
Unit1
Unit1Unit1
Unit1
 
Basic networking
Basic networkingBasic networking
Basic networking
 
A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networks
 
Energy efficient platform designed for sdma applications in mobile wireless ...
Energy efficient platform designed for sdma applications in mobile  wireless ...Energy efficient platform designed for sdma applications in mobile  wireless ...
Energy efficient platform designed for sdma applications in mobile wireless ...
 
important network terminologies
important network terminologiesimportant network terminologies
important network terminologies
 
Assignment 1,computer networks-317
Assignment 1,computer networks-317Assignment 1,computer networks-317
Assignment 1,computer networks-317
 

Similaire à Lecture 8: IoT System Models and Applications

Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13
Farhad Gholami
 

Similaire à Lecture 8: IoT System Models and Applications (20)

Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksRedundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
 
B03202006011
B03202006011B03202006011
B03202006011
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
 
Localization of wireless sensor network
Localization of wireless sensor networkLocalization of wireless sensor network
Localization of wireless sensor network
 
IRJET- Survey Paper on Human Following Robot
IRJET- Survey Paper on Human Following RobotIRJET- Survey Paper on Human Following Robot
IRJET- Survey Paper on Human Following Robot
 
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs) A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs)
 
IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...
IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...
IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...
 
A Survey on the Mobile Sink Hierarchical Routing Protocols in the Wireless Se...
A Survey on the Mobile Sink Hierarchical Routing Protocols in the Wireless Se...A Survey on the Mobile Sink Hierarchical Routing Protocols in the Wireless Se...
A Survey on the Mobile Sink Hierarchical Routing Protocols in the Wireless Se...
 
microclimate
microclimatemicroclimate
microclimate
 
Agps05
Agps05Agps05
Agps05
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data int...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data int...JAVA 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data int...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data int...
 
Mobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksMobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networks
 
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
 
Dijkstra Shortest Path Visualization
Dijkstra Shortest Path VisualizationDijkstra Shortest Path Visualization
Dijkstra Shortest Path Visualization
 
IRJET- Comparison on Measurement of a Building using Total Station, ARCGI...
IRJET-  	  Comparison on Measurement of a Building using Total Station, ARCGI...IRJET-  	  Comparison on Measurement of a Building using Total Station, ARCGI...
IRJET- Comparison on Measurement of a Building using Total Station, ARCGI...
 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
 
D-STOP Symposium 2016 Closing Remarks
D-STOP Symposium 2016 Closing RemarksD-STOP Symposium 2016 Closing Remarks
D-STOP Symposium 2016 Closing Remarks
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
 
Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13
 

Plus de PayamBarnaghi

Plus de PayamBarnaghi (20)

Academic Research: A Survival Guide
Academic Research: A Survival GuideAcademic Research: A Survival Guide
Academic Research: A Survival Guide
 
Reproducibility in machine learning
Reproducibility in machine learningReproducibility in machine learning
Reproducibility in machine learning
 
Search, Discovery and Analysis of Sensory Data Streams
Search, Discovery and Analysis of Sensory Data StreamsSearch, Discovery and Analysis of Sensory Data Streams
Search, Discovery and Analysis of Sensory Data Streams
 
Internet Search: the past, present and the future
Internet Search: the past, present and the futureInternet Search: the past, present and the future
Internet Search: the past, present and the future
 
Scientific and Academic Research: A Survival Guide 
Scientific and Academic Research:  A Survival Guide Scientific and Academic Research:  A Survival Guide 
Scientific and Academic Research: A Survival Guide 
 
Lecture 5: Software platforms and services
Lecture 5: Software platforms and services Lecture 5: Software platforms and services
Lecture 5: Software platforms and services
 
Internet of Things for healthcare: data integration and security/privacy issu...
Internet of Things for healthcare: data integration and security/privacy issu...Internet of Things for healthcare: data integration and security/privacy issu...
Internet of Things for healthcare: data integration and security/privacy issu...
 
Scientific and Academic Research: A Survival Guide 
Scientific and Academic Research:  A Survival Guide Scientific and Academic Research:  A Survival Guide 
Scientific and Academic Research: A Survival Guide 
 
Semantic Technolgies for the Internet of Things
Semantic Technolgies for the Internet of ThingsSemantic Technolgies for the Internet of Things
Semantic Technolgies for the Internet of Things
 
Internet of Things and Data Analytics for Smart Cities and eHealth
Internet of Things and Data Analytics for Smart Cities and eHealthInternet of Things and Data Analytics for Smart Cities and eHealth
Internet of Things and Data Analytics for Smart Cities and eHealth
 
Spatial Data on the Web
Spatial Data on the WebSpatial Data on the Web
Spatial Data on the Web
 
IoT-Lite: A Lightweight Semantic Model for the Internet of Things
IoT-Lite:  A Lightweight Semantic Model for the Internet of ThingsIoT-Lite:  A Lightweight Semantic Model for the Internet of Things
IoT-Lite: A Lightweight Semantic Model for the Internet of Things
 
The Future is Cyber-Healthcare
The Future is Cyber-Healthcare The Future is Cyber-Healthcare
The Future is Cyber-Healthcare
 
Internet of Things: Concepts and Technologies
Internet of Things: Concepts and TechnologiesInternet of Things: Concepts and Technologies
Internet of Things: Concepts and Technologies
 
How to make cities "smarter"?
How to make cities "smarter"?How to make cities "smarter"?
How to make cities "smarter"?
 
The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next?
 
Information Engineering in the Age of the Internet of Things
Information Engineering in the Age of the Internet of Things Information Engineering in the Age of the Internet of Things
Information Engineering in the Age of the Internet of Things
 
Smart Cities….Smart Future
Smart Cities….Smart FutureSmart Cities….Smart Future
Smart Cities….Smart Future
 
What makes smart cities “Smart”?
What makes smart cities “Smart”? What makes smart cities “Smart”?
What makes smart cities “Smart”?
 
Semantic technologies for the Internet of Things
Semantic technologies for the Internet of Things Semantic technologies for the Internet of Things
Semantic technologies for the Internet of Things
 

Dernier

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 

Dernier (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 

Lecture 8: IoT System Models and Applications

  • 1. 1 Lecture 8: IoT System Models and Applications EEEM048/COM3023- Internet of Things Prof. Payam Barnaghi Centre for Vision, Speech and Signal Processing (CVSSP) Electrical and Electronic Engineering Department University of Surrey Autumn 2018
  • 2. Spatial Data and IoT − Most of the data in IoT applications is location dependent; − Services could be also location-based; − Location can be specified as: − Names, labels − Tags and semantic annotations − GPS data - Longitude, Latitude (and Altitude) − How can we define an area? − Multiple points are required − Simple Euclidian distance measure won’t work for longitude/latitude (lon/lat) data − The same way, you can’t simply cluster, group lon/lat data using classical methods that use Euclidian distance (e.g. k-means clustering)
  • 3. How to create location tags? − GeoHashing is one way to do this; − Geohash is a latitude/longitude geo-coding that was invented by Gustavo Niemeyer. − GeoHashing function can encods/decods (lat,lon) pairs in a compact form. − The Geohash algorithm can represent geographic regions in a hierarchical structure. − A geohash is represented as a string: − e.g. (-25.382708 and -49.265506) can be represented as: 6gkzwgjzn820 − Or http://geohash.org/6gkzwgjzn820
  • 4. How does it work? − A Geohash is calculated by interleaving bits obtained from latitude and longitude pairs and converting the bits to a string using a Base-32 character map. − Base-32: Table source: https://en.wikipedia.org/wiki/Geohash
  • 5. Geohash – example 5 ezs42 01101 11111 11000 00100 00010
  • 6. GeoHash − A Geohash string represents a fixed spatial bounding box. − For example, the latitude and longitude coordinates of (- 25.382708 and -49.265506) fall within the Geohash bounding box of "6gkzwgjzn820". − Appending characters to the string would make it refer to more precise geographical subsets of the original string. − More information: http://geohash.org/site/tips.html#format
  • 7. Example of similar locations − (51.236127 -0.574036) - Guildford − gcpe6zmbpfrd − (51.243113 -0.590343) – University of Surrey − gcped8d0u087 − (51.243603 -0.587994) – BA (Arthur C Clark) Building − gcped8egdezy gcpe6zmbpfrd gcped8d0u087 gcped8egdezy
  • 8. GeoHash Prefix similarity can be used to find close locations; But it cannot be directly converted to a metric distance measure.
  • 9. GeoHashing – Location Codes Image credit: Pramod Anantharam et al., Wright State University/University of Surrey; Alternatively Grid boxes and tags can be defined manually or using other different techniques; here is an example:
  • 10. Limitations of GeoHash − Geohash algorithm can be used to find locations (e.g. points) that are close to each other by checking prefix similarity of the GeoHash tags. − However, the points that close to each other but located at two opposite sides of the Equator line or for the nodes that fall on line of longitude (i.e. Meridian points) can produce Geohash codes that have no common prefix. − Point close to North and South Poles can have very different geohashes (in Norht and South Poles close areas can have different latitudes) − Geohash also defines a Bounding Box; this can then result having locations that are close but have different GeoHash codes. − For better proximity searches, the surrounding eight geohashes of a geohash should be calculated but this can make the proximity searches more complicated.
  • 11. How to calculate the distance between two geohashes or locations − If you have two geohashes, the first step is to decode them into latitude and longitude values.   − Longitude varies between [-180 , +180] − Latitude varies between [-90 , +90] − The Geohash is based on the splitting the interval in 2 (for each of the Longitude and Latitude) at each step and take 0 for the right part and 1 for the left part. 11
  • 12. Calculate distance between two Latitude/Longitude points − There are a variety of calculations for lati­tude/longi­tude points, with different formulae. − The formulae to calculate distance between two Lat/Lon points are often on the basis of a spherical earth (ignoring ellipsoidal effects) – which is accurate enough for most of the applications. 12 Source: http://www.movable-type.co.uk/scripts/latlong.html
  • 13. Haversine’ formula − haversine’ formula is used to calculate the great-circle distance between two points  a = sin²( /2) +Δφ cos 1φ ⋅ cos 2φ ⋅ sin²( /2)Δλ c = 2 atan2( √a, √(1 a) )⋅ − d = R c⋅ where φ is latitude, λ is longitude, R is earth’s radius (mean radius = 6,371km); 1 =φ lat1.toRadians(); 2 =φ lat2.toRadians(); = (Δφ lat2-lat1).toRadians(); = (Δλ lon2-lon1).toRadians(); 13Source: http://www.movable-type.co.uk/scripts/latlong.html
  • 14. Haversine’ formula - Note that angles need to be in radians. - In this module, you don’t need to remember these formulae. The main formulae and also the required conversion formula (e.g. degree to radian) will be given in the exam. 14
  • 15. Haversine’ formula- sample code 15 Source: http://www.movable-type.co.uk/scripts/latlong.html
  • 16. IoT Applications −The IoT and M2M? −IoT is a more generic term; M2M focuses on devices and machine-to-machine communications; −Sometimes the terms are used interchangeably; however, M2M is mainly meant for automated interactions between devices and IoT is an umbrella term for describing technologies that allow real world data collection, communication, processing and interactions (machines, devices and human users).
  • 17. Some of the IoT Application areas 17 − Industrial automation − Smart homes − eHealth − Automotive (navigation, traffic control, vehicle safety, fleet management, etc.) − Smart cities (city automation, intelligent parking, intelligent transport systems, air quality and pollution monitoring, etc.) − Environmental monitoring − Smart grid and smart metering − …
  • 18. Types of applications − Event detection − Nodes report events and occurrences − Anomaly and outlier detection − Collaboration of nearby and/or remote sensors to detect more complicated events − Pattern detection and anomaly detections in patterns − Periodic monitoring and measurements, information extraction and interactons − Measuring and monitoring and reporting the data − Monitoring and measurement can be triggered by an event − Processing the collected information and implementing (automated) interactions. 18
  • 19. Types of applications − Approximation and edge detection − Detecting how a physical value (e.g. temperature) changes one place to another; − This can be used to approximate spatial characteristics and map it to an area − For example, in a forest fire, this can be used to approximate the border of actual fire; − This can be generalised to finding “edges” in different boundaries such as space and time. − Tracking − An event source can be mobile; − sensors can be used to monitor and track an object; − Speed and direction of the object can be also estimated. 19
  • 20. Types of applications − Control and feedback − Using actuators to interact with the environment; − Make a change and the sense and obtain feedback from the physical environment. 20 Physical Environment/ Things Actuator Sensor Controller actuation sensing feedbackcommand
  • 21. Characteristic requirements − Types of services − Interfaces and interaction models − Autonomy of services − Data processing and information extraction requirements − Service network requirements − Quality of service − Delay and latency − Quality of information − Accuracy and quality measures of the functions (e.g. reliability and accuracy of event detection). 21
  • 22. Characteristic requirements − Fault tolerance − Reliability and dependability − What happens if a node runs out of power or gets damaged or losses coverage − Redundant deployment − Lifetime − Especially if the nodes rely on limited power − Sometimes it is a trade-off between energy efficiency against the quality of service − Can be defined as the time that first node fails or runs out of energy; or when x% of the nodes fail; or it can be defined as the time that the observed “thing” is no longer covered. 22
  • 23. Characteristic requirements − Scalability − How efficiently large number of nodes/Things can be supported. − How efficiently the system can respond to large number of events, requests, traffic, etc. − Density − Number of nodes per unit area − Programmability − Planning for an application to see if support for change and dynamic updates required. − Maintainability − Ability to adapt to the changes or to change operational parameters − Or, in some applications ability to access and maintain or replace the nodes or to re-configure them (remotely or locally) 23
  • 24. Required mechanisms − Multi-hop wireless communications − Transmission range can be short and in some cases multi-hop communication is required. − Energy efficient operations − To save energy and/or increase the lifetime of the network/services. − Auto-configuration − Ability to configure (at least some of) the functional parameters automatically. − Collaboration and in-network processing − Several node collaborate − Parts of the process is performed on the node and/or in the network. − Data-centric solutions − Conventional networks often focus on sending data between two specific nodes each equipped with an address. − Here what is important is data and the observations and measurements not the node that provides it. − Security, Trust and Privacy 24
  • 25. What is special about IoT applications? − Different applications and various requirements − Interaction and deployment in uncontrolled or less controlled environments − Heterogeneity and scale − Energy and resource constraints − Autonomous mechanisms that are often required; e.g. self-configurability − Security and Privacy issues − Data quality and data processing and analysis requirements − Actuation, feedback and control loop to interact with physical objects/environment over distributed networks. − Mobility 25
  • 27. 27 Smart Cities − Cities: − Cities account for 75% of green house emissions, while only occupying 2% of world surface. − It is expected that the amount of people living in urban areas will double until 2050. − By 2015, 1.2 billion cars will be on the road–making 1 car per 6 person. − Challenge: − More space required − Management of resources and infra structure waste, transportation, … − Climate change − Competitiveness − Crisis management Adapted from: Smart Cities and Internet of Things, Oliver Haubensak ETH-MTEC, ETHZ, May 2011.
  • 28. Designing IoT applications for smart cities 28
  • 29. 29 Source LA Times, http://documents.latimes.com/la-2013/ Future cities: a view from 1998
  • 30. Importance of designing for real problems and challenges 30Source: http://robertluisrabello.com/denial/traffic-in-la/#gallery[default]/0/ Source: wikipedia
  • 31. 31
  • 32. IoT applications in smart cities − Traffic management − Waste management − City transport − Noise, air-quality control and monitoring − Emergency services − Security and safety − Infrastructure management − Elderly-care and social care − Smart metering 32
  • 33. IoT environments are usually dynamic and (near-) real-time 33 Off-line Data analytics Data analytics in dynamic environments Image sources: ABC Australia and 2dolphins.com
  • 34. Traffic control and sensing − There are various sensing technologies that can be used including: video, sonar, radar, inductive loops, bacons, etc. − Some of these will need cable and some need to be installed on lampposts, etc.. − Some others like inductive loops can be embedded into the transportation road infrastructure. − One application is congestion control by counting (and estimating) the number of passing vehicles and their speed. − Environmental factors can affect the sensors; for example, video cameras are not very helpful during fog and heavy snow or rain. 34
  • 35. #1: Design for large-scale and provide tools and APIs. #2: Think of who will use the data and how, when you design your models. #3: Provide means to update and change the data models and processing methods. 35 Smart Cities
  • 36. #4: Design for different audience (data consumers, developers, providers) and think about real impact and sustainability of your solution. #5: Specify (and encourage others to do the same) data governance and privacy procedures, explain the ownership and re-use rules, and give control to the owners of the data. 36 Smart cities
  • 37. 37
  • 38. Users in control or losing control? 38 Image source: Julian Walker, Flicker
  • 39. Smart City: IoT Application Examples
  • 41. A sample smart city application 41
  • 42. Data Quality Explorer 42 Source: The CityPulse project by the University of Applied Sciences Osnabrück Video demo: https://www.youtube.com/watch?v=Yc1jiB5zdfE
  • 43. Precision Agriculture − A large farm can exhibit wide spatial diversity in soil types, nutrient content, water/moisture, and other important factors. − Sensors for monitoring temperature, humidity, acidity of soil. − Monitoring for fungal disease; e.g. by monitoring humidity and temperature conditions in the field as well as the wetness of potato leaves the researchers can identify the risk of fungal disease. 43 Source: Dargie and Poellabauer, Fundamentials of Wirless Sensor Networks: Theory and Practice, Wiley, 2010
  • 44. Healthcare: IoT Application use-case scenarios
  • 45. IoT for healthcare: Dementia use-case  16,801 people with dementia in Surrey – set to rise to 19,000 by 2020 (estimated) - nationally 850,000 - estimated 1m by 2025 (Alzheimer’s Society);  Estimated to cost £26bn p/a in the UK (Alzheimer’s Society): health and social care (NHS and private) + unpaid care;  IoT devices can provide data that can further analysed to detect agitation, sleep, weight loss, and wandering – all have a big impact on quality of life and wellbeing;
  • 46. Technical Challenges − Infrastructure − Interoperability, integration − Security − Data governance − Scalability
  • 49. Gateway Gateway Data Analytics Cloud systems External systems Possible links to other networks Gateway Data-driven and patient centered Healthcare Applications
  • 50. How does TIHM work? Signals Machine Analysis Human Decision Action 24/7
  • 53. TIHM Integrated View (iView) Integrated view monitored by blend of health professionals Working closely with Alzheimer’s Society, NHS, social services and police Freeing up clinicians to focus on treatment
  • 54. 54 Application requirements in IoT − Healthcare − Service reliability, security, privacy, trust, mobility, lower power consumption, lower delays; − Automotive − Mobility, real-time interactions, quality of services, location tracking; − Smart cities − Reliability, fault tolerance, delay tolerance;
  • 55. Exercise : A use-case study 55Image source: Mahmoud Meribout, A Wireless Sensor Network-Based Infrastructure for Real-Time and Online Pipeline Inspection, IEEE SENSORS JOURNAL, VOL. 11, NO. 11, NOVEMBER 2011 This diagram shows a leak detection System in a pipeline. Work in groups and identify: -What parameters can be measured to detect a leak? -What type of sensors can be used? -What components can be added to this diagram? -What are the key issues that should be considered in the design? -What type of in-network processes can be done?
  • 56. Further reading − If you are interested in more information about spatial data, you may want to refer to (this won’t be part of the exam): − Spatial Data on the Web Best Practices: − https://www.w3.org/TR/sdw-bp/ 56

Notes de l'éditeur

  1. Public data should be made available to everyone and the basic services (that replace the existing practices) should be free to everyone; it doesn’t mean if we replace a bus time table with a smart phone app then who pays a premium should access it.
  2. Helen to outline how TIHM works Trevor will finish slide by talking about his experience of the system as a carer.