The document outlines a 10-step IoT design methodology that includes requirements specification, process specification, domain modeling, information modeling, service specifications, level specification, functional and operational views, device integration, and application development. It then applies this methodology to design a smart home automation system case study, outlining the purpose, behavior, and requirements in step 1. Steps 2-10 are then summarized for the home automation example, covering process specification through application development using RESTful web services, a native Python controller service, and a Django application frontend. Finally, it notes how the full system would be integrated using these components on a Raspberry Pi device.
1. Introduction to Embedded Systems & IoTIEEE MIU SB
This document provides an introduction to embedded systems and the Internet of Things (IoT). It defines embedded systems as hardware and software components that perform dedicated tasks as part of larger machines. Embedded systems are designed for specific tasks without human intervention and must meet real-time performance constraints. Examples are given of embedded systems applications. It then discusses microprocessors versus microcontrollers. The document introduces Arduino, an open-source hardware and software platform used to build electronics projects, and describes its various components. It defines IoT as the network of physical objects embedded with electronics that collect and share data over the internet. Applications and evolution of IoT are briefly outlined.
The Internet of Things (IoT) is a network of physical objects embedded with electronics, software, and sensors that allows objects to connect and exchange data over the internet. IoT creates opportunities to remotely sense and control objects across networks, improving efficiency. Things in IoT include devices like heart monitors, farm animal tags, sensors in cars, and environmental sensors. These devices collect data using technologies and autonomously share it. IoT requires connectivity between things, intelligence to interpret sensor data, and scalability to handle increased connections.
The document discusses the key components and building blocks for IoT devices. It describes how IoT devices typically contain a microcontroller, sensors, and actuators to collect and respond to information. The document outlines the software, physical computing, and design aspects of developing IoT devices, including using microcontrollers, sensors, programming languages and tools. Diagrams show examples of common IoT device architectures that connect microcontrollers and components to servers through wireless protocols.
This document describes an RFID-based attendance system. It includes a block diagram of the system which uses an RFID reader module connected to a PIC microcontroller and LCD display powered by a power supply. The system works by detecting an RFID card within 10cm, checking the card information against a database, and increasing the attendance count for that student and storing it in the database if it matches. The system aims to automate attendance tracking in educational institutions for ease of use and data analysis.
on successful go through of this complete PPT, the learners can be able to understand the Raspberry PI, Raspberry Pi Interfaces(Serial, SPI,I2C) Programming, Python programming with Raspberry PI with the focus of Interfacing external gadgets
Controlling output Reading input from pins.
1. Introduction to Embedded Systems & IoTIEEE MIU SB
This document provides an introduction to embedded systems and the Internet of Things (IoT). It defines embedded systems as hardware and software components that perform dedicated tasks as part of larger machines. Embedded systems are designed for specific tasks without human intervention and must meet real-time performance constraints. Examples are given of embedded systems applications. It then discusses microprocessors versus microcontrollers. The document introduces Arduino, an open-source hardware and software platform used to build electronics projects, and describes its various components. It defines IoT as the network of physical objects embedded with electronics that collect and share data over the internet. Applications and evolution of IoT are briefly outlined.
The Internet of Things (IoT) is a network of physical objects embedded with electronics, software, and sensors that allows objects to connect and exchange data over the internet. IoT creates opportunities to remotely sense and control objects across networks, improving efficiency. Things in IoT include devices like heart monitors, farm animal tags, sensors in cars, and environmental sensors. These devices collect data using technologies and autonomously share it. IoT requires connectivity between things, intelligence to interpret sensor data, and scalability to handle increased connections.
The document discusses the key components and building blocks for IoT devices. It describes how IoT devices typically contain a microcontroller, sensors, and actuators to collect and respond to information. The document outlines the software, physical computing, and design aspects of developing IoT devices, including using microcontrollers, sensors, programming languages and tools. Diagrams show examples of common IoT device architectures that connect microcontrollers and components to servers through wireless protocols.
This document describes an RFID-based attendance system. It includes a block diagram of the system which uses an RFID reader module connected to a PIC microcontroller and LCD display powered by a power supply. The system works by detecting an RFID card within 10cm, checking the card information against a database, and increasing the attendance count for that student and storing it in the database if it matches. The system aims to automate attendance tracking in educational institutions for ease of use and data analysis.
on successful go through of this complete PPT, the learners can be able to understand the Raspberry PI, Raspberry Pi Interfaces(Serial, SPI,I2C) Programming, Python programming with Raspberry PI with the focus of Interfacing external gadgets
Controlling output Reading input from pins.
This ppt explains how to record the attendance of students using RFID tags, student is provided with his/her authorized tag to swipe over the reader to record their attendance.
Edgefxkits.com has a wide range of electronic projects ideas that are primarily helpful for ECE, EEE and EIE students and the ideas can be applied for real life purposes as well.
http://www.edgefxkits.com/
Visit our page to get more ideas on popular electronic projects developed by professionals.
Edgefx provides free verified electronic projects kits around the world with abstracts, circuit diagrams, and free electronic software. We provide guidance manual for Do It Yourself Kits (DIY) with the modules at best price along with free shipping.
This document discusses various domain-specific Internet of Things (IoT) applications. It outlines IoT applications for homes, cities, the environment, energy systems, retail, logistics, industry, agriculture, and health and lifestyle. It then provides more details on specific IoT applications for homes (smart lighting, smart appliances, intrusion detection, smoke/gas detectors), cities (smart parking, smart road lighting, smart roads, structural health monitoring, surveillance, emergency response) and the environment (weather monitoring, air pollution monitoring, noise pollution monitoring, forest fire detection, river flood detection).
The document outlines the key steps in an IoT design methodology:
1. Define the purpose, requirements, and use cases of the system.
2. Specify the domain model, information model, services, and IoT level.
3. Develop functional and operational views describing the system components and how they will communicate and operate.
4. Integrate the physical devices and components and draw schematics.
5. Develop the IoT application to implement the designed system.
This document describes an IoT-based health monitoring system created by three group members. The system uses sensors to measure a patient's heartbeat and temperature, which are sent wirelessly to a monitoring center. The monitoring center allows for real-time analysis of the vital sign data and emergency alerts. The system aims to allow doctors to remotely monitor patients at low cost using embedded technology.
High level overview of CoAP or Constrained Application Protocol. CoAP is a HTTP like protocol suitable for constrained environment like IoT. CoAP uses HTTP like request response model, status code etc.
The document discusses the IEEE 802.15.4 standard and its limitations for Internet of Things applications with stringent requirements. It introduces the IEEE 802.15.4e standard, which amends the 802.15.4 MAC layer to enhance reliability, latency, bandwidth, and robustness against interference through the addition of new modes like DSME and TSCH. The document surveys the literature on these new modes and discusses open issues and how 802.15.4e helps enable critical IoT scenarios like smart cities and industrial settings.
This document summarizes an Internet of Things (IoT) meetup that covered various topics:
- Introduction to IoT and how objects can transfer data over networks.
- Introduction to cloud computing and how resources are shared over the internet.
- IoT architecture including things, gateways, and networks/cloud.
- IoT gateways like Raspberry Pi that interface devices and cloud.
- Sensor interfaces like XBee and RS-485 that connect to gateways.
- Network interfaces like WiFi and GPRS to connect gateways to cloud.
- Cloud architecture models from various sources.
- Data acquisition from devices using open-source Ponte software.
- Data storage
Smart Home Using IOT simulation In cisco packet tracerKhyathiNandankumar
IoT projects are rare and the smart devices working with the help of IoT is afuture scope method,we can have bright future with this power saving method.
Chapter 3 Charateristics and Quality Attributes of Embedded SystemMoe Moe Myint
This document discusses the characteristics and quality attributes of embedded systems. It begins with learning objectives about understanding the characteristics of embedded systems and important quality metrics. It then describes key characteristics like being application specific, reactive and real-time in nature, operating in harsh environments, being distributed, requiring small size and weight, and having power concerns. Finally, it outlines important quality attributes for embedded systems during operational and non-operational modes, including response, throughput, reliability, maintainability, security, and safety.
The slides defines IoT and show the differnce between M2M and IoT vision. It then describes the different layers that depicts the functional architecture of IoT, standard organizations and bodies and other IoT technology alliances, low power IoT protocols, IoT Platform components, and finally gives a short description to one of IoT low power application protocols (MQTT).
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...Sagar Rai
Software, Software Defined Network, Network Function Virtualization, SDN, NFV, Internet of things, Basics of Internet of things, Network Basics, Virtualization, Limitation of Conventional Network, Open flow, Basics of conventional network,
This document discusses sensors and actuators in Industry 4.0 and the Industrial Internet of Things. It defines sensors as devices that detect physical quantities and convert them into signals, and actuators as devices that convert energy signals into motion or force. It classifies sensors as passive or active, analog or digital, and scalar or vector. It also describes common sensor characteristics and classifications of actuators such as electric, fluid power, and manual linear and rotary actuators.
This document discusses IoT protocols for data communication and connection models. It describes the key pillars of IoT protocols as being device, connectivity, data, and analytics. It also outlines various types of IoT data protocols like AMQP, DDS, XMPP, and WebSocket that establish end-to-end communication. Additionally, it covers IoT network protocols like Bluetooth, LPWANs, ZigBee, Z-Wave and others that facilitate secured communication between IoT devices over the internet.
- Zigbee is a wireless mesh networking standard used for low-power wireless personal area networks. It operates on the IEEE 802.15.4 standard and defines the higher layers for reliable transmission of data between devices.
- 6LoWPAN is an adaptation layer that allows IPv6 packets to be sent over IEEE 802.15.4 low-power wireless networks. It provides compression mechanisms to encapsulate IPv6 datagrams into frames compatible with the IEEE 802.15.4 standard.
- Both Zigbee and 6LoWPAN are commonly used in wireless sensor networks and Internet of Things applications where many devices need to communicate wirelessly over short distances with low power consumption. However, Z
The document discusses the integration of Internet of Things (IoT) and cloud computing, referred to as Cloud of Things. It identifies several key issues with this integration, such as protocol support, energy efficiency, resource allocation, identity management, and security/privacy. Potential solutions are provided for some of the issues. The conclusion discusses the need for more study on the impact of these issues based on the specific IoT application and services provided.
This chapter discusses systems management for IoT and introduces NETCONF and YANG as solutions. It notes the need for automated configuration, monitoring, reliability and reusable configurations for IoT systems management. It describes SNMP and its limitations. NETCONF is introduced as a session-based network management protocol using XML and YANG for data modeling. YANG is used to model configuration and state data for NETCONF. The chapter provides an example YANG module and discusses using NETCONF and YANG for IoT systems management.
LoRaWAN is an open standard for wireless communication targeted at low-power wide-area networks. It uses a proprietary radio protocol called LoRa to allow long-range communication at low bit rates. LoRaWAN defines the communication protocols and system architecture for end devices, gateways, and network servers. Key entities include end devices that communicate with gateways, network servers that coordinate communication, and application servers that interface with end user applications. [END SUMMARY]
This document discusses Internet of Things (IoT) physical devices and endpoints. It begins by defining IoT devices as objects connected to the Internet that can send and receive data. Basic components of an IoT device are then outlined, including sensing, actuation, communication, and data processing. The Raspberry Pi is presented as an exemplary IoT device, noting its low cost, credit card size, Linux operating system, and interfaces for connecting sensors and actuators. Programming the Raspberry Pi using Python is also mentioned. Finally, some other examples of IoT devices are listed.
This document discusses the design methodology for Internet of Things (IoT) systems. It outlines the 10 steps in the IoT design process: 1) defining the purpose and requirements, 2) specifying the processes, 3) specifying the domain model, 4) specifying the information model, 5) specifying the services, 6) specifying the IoT level, 7) specifying the functional view, 8) specifying the operational view, 9) integrating devices and components, and 10) developing the IoT application. Embedded computing logic and common hardware platforms like Arduino and Raspberry Pi are also discussed.
This ppt explains how to record the attendance of students using RFID tags, student is provided with his/her authorized tag to swipe over the reader to record their attendance.
Edgefxkits.com has a wide range of electronic projects ideas that are primarily helpful for ECE, EEE and EIE students and the ideas can be applied for real life purposes as well.
http://www.edgefxkits.com/
Visit our page to get more ideas on popular electronic projects developed by professionals.
Edgefx provides free verified electronic projects kits around the world with abstracts, circuit diagrams, and free electronic software. We provide guidance manual for Do It Yourself Kits (DIY) with the modules at best price along with free shipping.
This document discusses various domain-specific Internet of Things (IoT) applications. It outlines IoT applications for homes, cities, the environment, energy systems, retail, logistics, industry, agriculture, and health and lifestyle. It then provides more details on specific IoT applications for homes (smart lighting, smart appliances, intrusion detection, smoke/gas detectors), cities (smart parking, smart road lighting, smart roads, structural health monitoring, surveillance, emergency response) and the environment (weather monitoring, air pollution monitoring, noise pollution monitoring, forest fire detection, river flood detection).
The document outlines the key steps in an IoT design methodology:
1. Define the purpose, requirements, and use cases of the system.
2. Specify the domain model, information model, services, and IoT level.
3. Develop functional and operational views describing the system components and how they will communicate and operate.
4. Integrate the physical devices and components and draw schematics.
5. Develop the IoT application to implement the designed system.
This document describes an IoT-based health monitoring system created by three group members. The system uses sensors to measure a patient's heartbeat and temperature, which are sent wirelessly to a monitoring center. The monitoring center allows for real-time analysis of the vital sign data and emergency alerts. The system aims to allow doctors to remotely monitor patients at low cost using embedded technology.
High level overview of CoAP or Constrained Application Protocol. CoAP is a HTTP like protocol suitable for constrained environment like IoT. CoAP uses HTTP like request response model, status code etc.
The document discusses the IEEE 802.15.4 standard and its limitations for Internet of Things applications with stringent requirements. It introduces the IEEE 802.15.4e standard, which amends the 802.15.4 MAC layer to enhance reliability, latency, bandwidth, and robustness against interference through the addition of new modes like DSME and TSCH. The document surveys the literature on these new modes and discusses open issues and how 802.15.4e helps enable critical IoT scenarios like smart cities and industrial settings.
This document summarizes an Internet of Things (IoT) meetup that covered various topics:
- Introduction to IoT and how objects can transfer data over networks.
- Introduction to cloud computing and how resources are shared over the internet.
- IoT architecture including things, gateways, and networks/cloud.
- IoT gateways like Raspberry Pi that interface devices and cloud.
- Sensor interfaces like XBee and RS-485 that connect to gateways.
- Network interfaces like WiFi and GPRS to connect gateways to cloud.
- Cloud architecture models from various sources.
- Data acquisition from devices using open-source Ponte software.
- Data storage
Smart Home Using IOT simulation In cisco packet tracerKhyathiNandankumar
IoT projects are rare and the smart devices working with the help of IoT is afuture scope method,we can have bright future with this power saving method.
Chapter 3 Charateristics and Quality Attributes of Embedded SystemMoe Moe Myint
This document discusses the characteristics and quality attributes of embedded systems. It begins with learning objectives about understanding the characteristics of embedded systems and important quality metrics. It then describes key characteristics like being application specific, reactive and real-time in nature, operating in harsh environments, being distributed, requiring small size and weight, and having power concerns. Finally, it outlines important quality attributes for embedded systems during operational and non-operational modes, including response, throughput, reliability, maintainability, security, and safety.
The slides defines IoT and show the differnce between M2M and IoT vision. It then describes the different layers that depicts the functional architecture of IoT, standard organizations and bodies and other IoT technology alliances, low power IoT protocols, IoT Platform components, and finally gives a short description to one of IoT low power application protocols (MQTT).
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...Sagar Rai
Software, Software Defined Network, Network Function Virtualization, SDN, NFV, Internet of things, Basics of Internet of things, Network Basics, Virtualization, Limitation of Conventional Network, Open flow, Basics of conventional network,
This document discusses sensors and actuators in Industry 4.0 and the Industrial Internet of Things. It defines sensors as devices that detect physical quantities and convert them into signals, and actuators as devices that convert energy signals into motion or force. It classifies sensors as passive or active, analog or digital, and scalar or vector. It also describes common sensor characteristics and classifications of actuators such as electric, fluid power, and manual linear and rotary actuators.
This document discusses IoT protocols for data communication and connection models. It describes the key pillars of IoT protocols as being device, connectivity, data, and analytics. It also outlines various types of IoT data protocols like AMQP, DDS, XMPP, and WebSocket that establish end-to-end communication. Additionally, it covers IoT network protocols like Bluetooth, LPWANs, ZigBee, Z-Wave and others that facilitate secured communication between IoT devices over the internet.
- Zigbee is a wireless mesh networking standard used for low-power wireless personal area networks. It operates on the IEEE 802.15.4 standard and defines the higher layers for reliable transmission of data between devices.
- 6LoWPAN is an adaptation layer that allows IPv6 packets to be sent over IEEE 802.15.4 low-power wireless networks. It provides compression mechanisms to encapsulate IPv6 datagrams into frames compatible with the IEEE 802.15.4 standard.
- Both Zigbee and 6LoWPAN are commonly used in wireless sensor networks and Internet of Things applications where many devices need to communicate wirelessly over short distances with low power consumption. However, Z
The document discusses the integration of Internet of Things (IoT) and cloud computing, referred to as Cloud of Things. It identifies several key issues with this integration, such as protocol support, energy efficiency, resource allocation, identity management, and security/privacy. Potential solutions are provided for some of the issues. The conclusion discusses the need for more study on the impact of these issues based on the specific IoT application and services provided.
This chapter discusses systems management for IoT and introduces NETCONF and YANG as solutions. It notes the need for automated configuration, monitoring, reliability and reusable configurations for IoT systems management. It describes SNMP and its limitations. NETCONF is introduced as a session-based network management protocol using XML and YANG for data modeling. YANG is used to model configuration and state data for NETCONF. The chapter provides an example YANG module and discusses using NETCONF and YANG for IoT systems management.
LoRaWAN is an open standard for wireless communication targeted at low-power wide-area networks. It uses a proprietary radio protocol called LoRa to allow long-range communication at low bit rates. LoRaWAN defines the communication protocols and system architecture for end devices, gateways, and network servers. Key entities include end devices that communicate with gateways, network servers that coordinate communication, and application servers that interface with end user applications. [END SUMMARY]
This document discusses Internet of Things (IoT) physical devices and endpoints. It begins by defining IoT devices as objects connected to the Internet that can send and receive data. Basic components of an IoT device are then outlined, including sensing, actuation, communication, and data processing. The Raspberry Pi is presented as an exemplary IoT device, noting its low cost, credit card size, Linux operating system, and interfaces for connecting sensors and actuators. Programming the Raspberry Pi using Python is also mentioned. Finally, some other examples of IoT devices are listed.
This document discusses the design methodology for Internet of Things (IoT) systems. It outlines the 10 steps in the IoT design process: 1) defining the purpose and requirements, 2) specifying the processes, 3) specifying the domain model, 4) specifying the information model, 5) specifying the services, 6) specifying the IoT level, 7) specifying the functional view, 8) specifying the operational view, 9) integrating devices and components, and 10) developing the IoT application. Embedded computing logic and common hardware platforms like Arduino and Raspberry Pi are also discussed.
The document outlines the steps in designing an embedded IoT platform. It includes specifying requirements and purposes, creating process, domain, information, and service models, and defining functional and operational views. The methodology aims to reduce design time and complexity and improve interoperability. Key steps involve modeling the system purpose, entities, data, services, functions, and device integration.
The document discusses the key steps in IoT system design methodology. It begins with defining the purpose, behavior and requirements of the system. It then covers specifying the processes, domain model, information model, services, deployment level, functional groups, operational aspects and integrating devices. The methodology aims to reduce complexity and improve interoperability of IoT systems.
A full course about asp.net mvc 5 in Arabic. You can watch on my youtube channel https://www.youtube.com/watch?v=jrhdXwuyrfs&list=PLAPpPaAUVQyZJvtvWH9eOJcVkj7NLPQLk
This document discusses the methodology for designing an IOT platform. It includes specifying requirements, processes, domain models, information models, services, and integrating devices and components. As an example, it outlines the process specification for a home automation system that allows remote control of lights using a web application. Key steps in the process specification include defining the purpose, behavior, system management requirements, data analysis requirements, and security requirements. It also describes defining the domain model, which abstractly represents concepts, objects and relationships in the IOT domain, such as physical entities, virtual entities, devices, resources, and services.
IRJET- MVC Framework: A Modern Web Application Development Approach and WorkingIRJET Journal
This document provides an overview of the model-view-controller (MVC) framework, which is commonly used for web application development. It describes the three layers of MVC - the model layer manages the application data and logic, the view layer is responsible for display and presentation, and the controller layer handles user input and updates the model and view. The advantages of MVC include separation of concerns, testability, and support for parallel development. Some disadvantages are that it can be more complex and difficult to learn than other approaches. Popular programming languages and IDEs that support MVC development are also listed.
Learntek is global online training provider on Big Data Analytics, Hadoop, Machine Learning, Deep Learning, IOT, AI, Cloud Technology, DEVOPS, Digital Marketing and other IT and Management courses.
The document provides an introduction to IoT, including definitions, characteristics, physical and logical designs, communication protocols, and deployment levels. It defines IoT as a global network of devices with sensing/actuation and communication capabilities. Key aspects covered include common IoT device components, popular communication protocols, logical architectures like request-response and publish-subscribe models, and six levels of IoT systems ranging from single devices to complex networks of independent nodes.
The document provides an overview of Internet of Things (IoT) including definitions, characteristics, physical and logical designs, protocols, and deployment levels. It defines IoT as a dynamic global network of devices connected using standard protocols. The physical design section describes IoT devices' sensing, actuating, and monitoring capabilities. The logical design outlines functional blocks for identification, sensing, communication and management. It also describes common communication models like request-response, publish-subscribe, and REST APIs. Finally, it outlines six levels of IoT deployment with varying device, data, analysis and application configurations.
The document describes the five layers of an IoT ecosystem reference architecture:
1) Object layer comprising physical sensors and devices
2) Object abstraction layer that transfers data from objects to the service layer using transmission technologies like RFID, WiFi, etc.
3) Service management layer that acts as middleware pairing services to requests based on addresses and names
4) Application layer providing services to customers in various verticals like smart cities, healthcare, etc.
5) Business layer performing overall management using data to build business models and monitor IoT system requirements.
The document discusses the key concepts of IoT including its definition, characteristics, physical and logical design, protocols, levels and deployment templates. Specifically, it defines IoT as a global network of devices with sensing/actuation and communication capabilities. It describes the various components of an IoT system including devices, resources, controllers, databases, services, analytics and applications. Finally, it outlines six levels of IoT systems with increasing complexity from single device/node to multiple interconnected devices and centralized control.
Spatial Data Infrastructure involves data modeling, metadata, and web services for data access. Data modeling involves conceptualizing user needs, developing a data model, encoding the data, and publishing it. Metadata provides information about spatial data to improve discovery. Registry and discovery services allow querying metadata. Web services like WMS and WFS enable accessing and manipulating mapped features through standard interfaces.
The document provides an introduction to IoT, including definitions, characteristics, physical and logical designs, communication protocols, and deployment models. It defines IoT as a global network of devices with sensing/actuation and communication capabilities. The physical components are "things" like sensors and devices. Logically, IoT systems use models like publish-subscribe and request-response. Deployment is classified into 6 levels based on the network topology and where data is stored and processed.
Get things done with Yii - quickly build webapplicationsGiuliano Iacobelli
Lesson teached at Università di Roma Tre - Software Engineering course.
Web is plenty of amazing tools used daily by millions of people. A good idea can turn to be a highly profitable business if well executed. Yii framework is an ideal tool to build in short time an MVP of your product to start as soon as possible to find your market fit. Here follows some infos about the framework and steps on how to build a simple blog over Yii.
Presenting Data – An Alternative to the View ControlTeamstudio
In this webinar, Paul Della-Nebbia, an IBM Champion, will show how to implement a different alternative for displaying information from Domino views. Paul will cover how to use the Dojo Data Grid (included with XPages) to display a data grid that provides unique features like infinite scrolling, click to sort column headers, adjustable column widths, filtering, and the ability to drag and drop column headers to reorder. As the user scrolls through, the view data is retrieved as needed which improves performance and usability.
.NET Core, ASP.NET Core Course, Session 9aminmesbahi
This document provides an overview of controllers and filters in ASP.NET Core MVC. It defines controllers as classes that handle browser requests, retrieve model data, and specify view templates. Actions are public methods on controllers that handle requests. Filters allow running code before and after stages of the execution pipeline and can be used to handle concerns like authorization, caching, and exception handling. The document discusses implementing different filter types, configuring filters through attributes and dependency injection, and controlling filter order.
ASP.NET MVC_Routing_Authentication_Aurhorization.pdfsetit72024
Introduction:
Begin with an overview of the .NET MVC framework and its importance in building dynamic and scalable web applications.
Introduce the key concepts that will be covered in the presentation: Attribute Routing, Authentication, and Authorization.
Highlight the significance of these features in enhancing the security, usability, and structure of MVC applications.
Section 1: Attribute Routing in .NET MVC:
Definition and Purpose:
Define Attribute Routing and explain its role in defining routes using attributes directly within the controller and action methods.
Emphasize the benefits of attribute routing in terms of readability, maintainability, and providing fine-grained control over URL patterns.
Syntax and Examples:
Provide examples of attribute routing syntax within controllers and actions.
Demonstrate how attribute routing allows developers to create custom, SEO-friendly, and RESTful URLs.
Showcase scenarios where attribute routing excels over convention-based routing.
Section 2: Authentication in .NET MVC:
Understanding Authentication:
Define Authentication and discuss its importance in verifying the identity of users accessing an application.
Introduce the authentication mechanisms supported by .NET MVC, such as Forms Authentication, Windows Authentication, and OAuth.
Implementing Authentication:
Walk through the process of implementing authentication in .NET MVC using attributes, filters, and middleware.
Discuss the role of the [Authorize] attribute and how it restricts access to specific controllers or actions based on the user's authentication status.
Section 3: Authorization in .NET MVC:
Overview of Authorization:
Define Authorization and distinguish it from authentication.
Emphasize the significance of controlling access to specific resources based on user roles, claims, or other criteria.
Implementing Authorization:
Discuss how authorization can be implemented in .NET MVC using attributes like [Authorize] and [AllowAnonymous].
Explore scenarios where role-based authorization and custom policies are essential.
Provide examples of how to implement role-based access control and attribute-based access control.
Case Studies and Best Practices:
Present real-world case studies or examples showcasing the effective use of attribute routing, authentication, and authorization in .NET MVC projects.
Share best practices for maintaining a secure and well-structured MVC application, including tips on managing user roles, securing sensitive data, and handling authentication cookies.
Conclusion:
Summarize the key takeaways from the presentation.
Reinforce the importance of attribute routing, authentication, and authorization in building robust and secure .NET MVC applications.
Encourage further exploration through resources, documentation, and community forums.
This document provides an overview of ASP.NET MVC 2.0, covering topics such as routing, controllers, action methods, views, validation, and filters. It introduces the MVC framework's basic structure and components, and explains how to build a sample Todo application using ASP.NET MVC to manage tasks. The document also outlines some advanced features in ASP.NET MVC 2.0 like areas and asynchronous controllers, as well as new capabilities in ASP.NET MVC 3 Beta such as the Razor view engine and improved dependency injection support.
SAM-IoT: Model Based Methodology and Framework for Design and Management of N...Brain IoT Project
Internet of Things (IoT) is a pervasive technology covering many applications areas (Smart Mobility, Smart Industry, Smart Healthcare, Smart Building, etc.). Its success and the technology evolution allow targeting more complex and critical applications such as the management of critical infrastructures and cooperative service robotics, which requires real time operation and a higher level of intelligence in the monitoring-control command for decision-making. Furthermore, these applications type need to be fully validated in advance considering that bugs discovered during real operation could cause significant damages. In order to avoid these drawbacks, IoT developers and system integrators need advanced tools and methodologies. This paper presents a methodology and a set of tools, defined and developed in the context of the BRAIN-IoT European Union (EU) project. The overall framework includes both Open semantic models to enforce interoperable operations and exchange of data and control features; and Model-based development tools to implement Digital Twin solutions to facilitate the prototyping and integration of interoperable and reliable IoT system solutions. After describing the solution developed, this paper also presents concrete use cases based on the two critical systems mentioned above, leveraging the application scenarios used to validate the concepts developed and results obtained by the BRAIN-IoT project.
Similaire à [PPT] _ Unit 2 _ 9.0 _ Domain Specific IoT _Home Automation.pdf (20)
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...Selvaraj Seerangan
This document discusses the development of a new type of battery that could revolutionize energy storage. It describes how the battery uses a solid electrolyte material that conducts ions quickly and prevents short circuits. This new battery design could lead to batteries that charge faster, last longer, and are less flammable than current lithium-ion batteries. The document concludes by stating that further research is still needed but that this new battery technology shows significant potential.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise boosts blood flow and levels of neurotransmitters and endorphins which elevate and stabilize mood.
ThingSpeak accepts different data types and stores data in channels with 255 character fields. Channels represent data from devices. Write API keys send data to channels and read API keys read channel data. TaskTrackers send heartbeat messages to JobTrackers every few minutes to report status and available slots.
The document lists 16 templates divided across 5 phases of the design thinking process. The phases are explore, empathize, experiment, engage and evolve. 5 templates are listed for the explore phase, 6 for empathize, 1 for experiment, 1 for engage and 3 for evolve. Each template is then briefly described.
The document provides a complete list of 40 templates (T1 to T40) used in the design thinking process. The templates are divided into 5 phases - Explore (15 templates), Empathize (13 templates), Experiment (2 templates), Engage (2 templates), and Evolve (8 templates). For each phase, the relevant templates are listed along with a brief description.
The document lists 12 templates for the Experiment, Engage and Evolve phases of CAT III. The templates include the SCAMPER worksheet, reconnecting with personas, storyboard canvases, a concept synthesis tool, strategic requirements template, process evolution template, impact indicators, a change management plan, MARS framework, identifying quick wins, and an action planning template.
This document provides an overview of the key concepts and methods covered in the Evolve phase of the design thinking process. The Evolve phase focuses on developing strategies and implementation plans to deliver the solutions identified in previous phases. Some of the key methods discussed include concept synthesis to define the overall solution, strategic requirements to assess organizational fit, activity system integration to evolve current processes, and viability analysis to evaluate impact. Additional tools covered are innovation assessment, change management, identifying quick wins, and creating an action plan. The overall goal of the Evolve phase is to strategize and test ideas to learn what resources are needed for effective implementation.
This document discusses methods for engaging with users during the design thinking process. It covers storytelling, storyboarding, co-creation, collecting feedback, and refining ideas based on user input. Storytelling involves sharing prototypes and concepts with users through visuals like storyboards and roleplaying. Co-creation gets users involved in developing and testing solutions early on. Feedback is collected through surveys, forums, and observation to understand what users like and what can be improved. The engagement process aims to ensure solutions match user needs and find issues through real-world testing before large-scale implementation.
The document discusses various methods and tools used in the experiment phase of design thinking, including ideation, user experience design, prototyping, and idea refinement. It provides details on specific ideation tools like SCAMPER, analogy inspiration, and deconstructing and reconstructing. It also covers mapping the user experience journey and creating low and high fidelity prototypes. The overall purpose of the experiment phase and these methods is to generate ideas and make them tangible through prototyping to get user feedback and refine concepts.
The document lists 13 templates for the empathize phase of design thinking. The templates are for frameworks like POEMS and SAM, generating interview questions using empathy maps and journey maps, taking user interview notes, post interview discussions, documenting insights and needs, and creating personas.
Things in IoT refer to devices that have unique identities and can perform remote sensing, actuating, and monitoring capabilities. They can exchange data with other connected devices, applications, or collect data from other devices to process locally or send to centralized servers.
The document discusses the key characteristics of big data including volume, variety, and velocity. It also outlines the functional blocks of IoT including application, device, management, security, communication, and services.
The purpose of an information model is to define the structure of all information in an IoT system including attributes and relations of virtual entities without describing how information is represented or stored.
The document provides details of an experiment conducted in the Problem Solving and Programming Laboratory course. It includes an algorithm, flowchart and C program that demonstrates different formatting options for input and output. The program takes input of two numbers and prints their sum, difference, product and quotient using different formatting options like printf, scanf and format specifiers. It then ends by returning 0.
The document describes a network laboratory experiment on simulating a star topology using the NS2 simulator.
The objectives are to simulate the star topology, understand queuing and packet dropping at routers, and apply the knowledge to measure network performance metrics.
The steps include creating nodes and links to form the star topology, generating UDP traffic from two sources to a sink node, and observing packet dropping at the congested link using the nam trace file.
The document describes a C program to perform operations on singly linked lists and doubly linked lists. It includes functions to add nodes, print the list, search for a node, delete a node, copy the list, and sort the list. The main menu allows the user to choose these operations and provides sample outputs of executing each operation on some sample data.
The document lists 15 templates for the explore phase of CAT I. The templates are used for tasks such as defining the design challenge scope, analyzing trends and stakeholders, mapping relationships, developing engagement strategies, and reframing challenges and opportunities. The templates are numbered T1 through T15 and include templates for STEEP analysis, strategic priorities matrix, activity system mapping, and more.
This PPT is very much useful for practitioners who are all making products and services to society. Mangers think innovatively and come up with innovative ideas. It is a 5 stage processing also called a design thinking process. The stages are empathize, define, ideate, prototype and test.
This document contains the answer key for a continuous assessment test on mobile communication and IoT for Kongu Engineering College. It includes 14 multiple choice and descriptive questions covering topics like radio frequency ranges, signal representation tools, antenna types, cellular network technologies and standards, Bluetooth networking, and the IEEE 802.11 protocol architecture.
This document provides an introduction to using Raspberry Pi for Internet of Things applications. It begins with defining IoT devices and their basic building blocks. Raspberry Pi is presented as an exemplary IoT device due to its low cost, small size, and ability to interface with sensors and actuators via GPIO pins. Programming Raspberry Pi with Python for applications like controlling outputs and reading inputs from pins is discussed. Interfaces like serial, SPI, and I2C are also introduced. Examples provided include blinking an LED, building a traffic light, and controlling an LED with a switch.
This document provides an introduction to Internet of Things (IoT). It defines IoT and discusses its key characteristics such as being dynamic and self-adapting. The document outlines various IoT applications and technologies that enable it. It also describes the physical design of IoT including sensors, actuators and example device architectures. Finally, it discusses important communication protocols used at different layers of the OSI model for IoT including Bluetooth, WiFi, IPv6 and MQTT.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Design and optimization of ion propulsion dronebjmsejournal
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earth’s atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earth’s atmosphere.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
4. Step 1: Purpose & Requirements Specification
• The first step in IoT system design methodology is to define the
purpose and requirements of the system. In this step, the system
purpose, behavior and requirements (such as data collection
requirements, data analysis requirements, system management
requirements, data privacy and security requirements, user interface
requirements, ...) are captured.
5. Step 2: Process Specification
• The second step in the IoT design methodology is to define the
process specification. In this step, the use cases of the IoT system are
formally described based on and derived from the purpose and
requirement specifications.
6. Step 3: Domain Model Specification
• The third step in the IoT design methodology is to define the Domain
Model. The domain model describes the main concepts, entities and
objects in the domain of IoT system to be designed. Domain model
defines the attributes of the objects and relationships between
objects. Domain model provides an abstract representation of the
concepts, objects and entities in the IoT domain, independent of any
specific technology or platform. With the domain model, the IoT
system designers can get an understanding of the IoT domain for
which the system is to be designed.
7. Step 4: Information Model Specification
• The fourth step in the IoT design methodology is to define the
Information Model. Information Model defines the structure of all
the information in the IoT system, for example, attributes of Virtual
Entities, relations, etc. Information model does not describe the
specifics of how the information is represented or stored. To define
the information model, we first list the Virtual Entities defined in the
Domain Model. Information model adds more details to the Virtual
Entities by defining their attributes and relations.
8. Step 5: Service Specifications
• The fifth step in the IoT design methodology is to define the service
specifications. Service specifications define the services in the IoT
system, service types, service inputs/output, service endpoints,
service schedules, service preconditions and service effects.
9. Step 6: IoT Level Specification
• The sixth step in the IoT design methodology is to define the IoT level
for the system. In Chapter-1, we defined five IoT deployment levels.
10. Step 7: Functional View Specification
• The seventh step in the IoT design methodology is to define the
Functional View. The Functional View (FV) defines the functions of
the IoT systems grouped into various Functional Groups (FGs). Each
Functional Group either provides functionalities for interacting with
instances of concepts defined in the Domain Model or provides
information related to these concepts.
11. Step 8: Operational View Specification
• The eighth step in the IoT design methodology is to define the
Operational View Specifications. In this step, various options
pertaining to the IoT system deployment and operation are defined,
such as, service hosting options, storage options, device options,
application hosting options, etc
12. Step 9: Device & Component Integration
• The ninth step in the IoT design methodology is the integration of the
devices and components.
13. Step 10: Application Development
• The final step in the IoT design methodology is to develop the IoT
application.
15. Step:1 - Purpose & Requirements
• Applying this to our example of a smart home automation system, the
purpose and requirements for the system may be described as follows:
• Purpose : A home automation system that allows controlling of the lights in a home
remotely using a web application.
• Behavior : The home automation system should have auto and manual modes. In
auto mode, the system measures the light level in the room and switches on the
light when it gets dark. In manual mode, the system provides the option of manually
and remotely switching on/off the light.
• System Management Requirement : The system should provide remote monitoring
and control functions.
• Data Analysis Requirement : The system should perform local analysis of the data.
• Application Deployment Requirement : The application should be deployed locally
on the device, but should be accessible remotely.
• Security Requirement : The system should have basic user authentication capability.
25. Step 10: Application Development
• Auto
• Controls the light appliance automatically based on the lighting
conditions in the room
• Light
• When Auto mode is off, it is used for manually controlling the
light appliance.
• When Auto mode is on, it reflects the current state of the light
appliance.
26. Implementation: RESTful Web Services
# Models – models.py
from django.db import models
class Mode(models.Model):
name = models.CharField(max_length=50)
class State(models.Model):
name = models.CharField(max_length=50)
# Serializers – serializers.py
from myapp.models import Mode, State
from rest_framework import serializers
class ModeSerializer(serializers.HyperlinkedModelSerializer):
class Meta:
model = Mode
fields = ('url', 'name')
class StateSerializer(serializers.HyperlinkedModelSerializer):
class Meta:
model = State
fields = ('url', 'name')
REST services implemented with Django REST Framework
1. Map services to models. Model
fields store the states (on/off,
auto/manual)
2. Write Model serializers. Serializers allow
complex data (such as model instances) to be
converted to native Python datatypes that can
then be easily rendered into JSON, XML or
other content types.
27. Implementation: RESTful Web Services
# Views – views.py
from myapp.models import Mode, State
from rest_framework import viewsets
from myapp.serializers import ModeSerializer, StateSerializer
class ModeViewSet(viewsets.ModelViewSet):
queryset = Mode.objects.all()
serializer_class = ModeSerializer
class StateViewSet(viewsets.ModelViewSet):
queryset = State.objects.all()
serializer_class = StateSerializer
3. Write ViewSets for the Models which
combine the logic for a set of related views in
a single class.
# Models – models.py
from django.db import models
class Mode(models.Model):
name = models.CharField(max_length=50)
class State(models.Model):
name = models.CharField(max_length=50)
4. Write URL patterns for the services.
Since ViewSets are used instead of views, we
can automatically generate the URL conf by
simply registering the viewsets with a router
class.
Routers automatically determining how the
URLs for an application should be mapped to
the logic that deals with handling incoming
requests.
# URL Patterns – urls.py
from django.conf.urls import patterns, include, url
from django.contrib import admin
from rest_framework import routers
from myapp import views
admin.autodiscover()
router = routers.DefaultRouter()
router.register(r'mode', views.ModeViewSet)
router.register(r'state', views.StateViewSet)
urlpatterns = patterns('',
url(r'^', include(router.urls)),
url(r'^api-auth/', include('rest_framework.urls', namespace='rest_framework')),
url(r'^admin/', include(admin.site.urls)),
url(r'^home/', 'myapp.views.home'),
)
28. Implementation: RESTful Web Services
Screenshot of browsable
State REST API
Screenshot of browsable
Mode REST API
29. Implementation: Controller Native Service
#Controller service
import RPi.GPIO as GPIO
import time
import sqlite3 as lite
import sys
con = lite.connect('database.sqlite')
cur = con.cursor()
GPIO.setmode(GPIO.BCM)
threshold = 1000
LDR_PIN = 18
LIGHT_PIN = 25
def readldr(PIN):
reading=0
GPIO.setup(PIN, GPIO.OUT)
GPIO.output(PIN, GPIO.LOW)
time.sleep(0.1)
GPIO.setup(PIN, GPIO.IN)
while (GPIO.input(PIN)==GPIO.LOW):
reading=reading+1
return reading
def switchOnLight(PIN):
GPIO.setup(PIN, GPIO.OUT)
GPIO.output(PIN, GPIO.HIGH)
def switchOffLight(PIN):
GPIO.setup(PIN, GPIO.OUT)
GPIO.output(PIN, GPIO.LOW)
def runAutoMode():
ldr_reading = readldr(LDR_PIN)
if ldr_reading < threshold:
switchOnLight(LIGHT_PIN)
setCurrentState('on')
else:
switchOffLight(LIGHT_PIN)
setCurrentState('off')
def runManualMode():
state = getCurrentState()
if state=='on':
switchOnLight(LIGHT_PIN)
setCurrentState('on')
elif state=='off':
switchOffLight(LIGHT_PIN)
setCurrentState('off')
def getCurrentMode():
cur.execute('SELECT * FROM myapp_mode')
data = cur.fetchone() #(1, u'auto')
return data[1]
def getCurrentState():
cur.execute('SELECT * FROM myapp_state')
data = cur.fetchone() #(1, u'on')
return data[1]
def setCurrentState(val):
query='UPDATE myapp_state set name="'+val+'"'
cur.execute(query)
while True:
currentMode=getCurrentMode()
if currentMode=='auto':
runAutoMode()
elif currentMode=='manual':
runManualMode()
time.sleep(5)
Native service deployed locally
1. Implement the native service in
Python and run on the device
32. Finally - Integrate the System
Django Application
REST services implemented with Django-REST framework
Native service implemented in Python
SQLite Database
Raspberry Pi device to which sensors and actuators are connected
OS running on Raspberry Pi
• Setup the device
• Deploy and run the REST and Native services
• Deploy and run the Application
• Setup the database