Tag Archives: Saudi Arabia

Loading
loading..

Internet of Water Things

 

Internet of Water Things: A Remote Raw Water Monitoring and Control System

Abílio C. Da Silva Júnior – Aloísio V. Lira Neto – Victor Hugo C. De Albuquerque
Universidade de Fortaleza
.
Roberto Munoz
Universidad de Valparaíso
.
María De Los Ángeles Quezada
Instituto Tecnológico de Tijuana
.
Mohammad Mehedi Hassan
King Saud University
.

Abstract: The scarcity of the planet’s water resources is a concern of several international entities and governments. Smart solutions for water quality monitoring are gaining prominence with advances in communication technology. This work’s primary goal is to develop a new online system to monitor and manage water resources, called Internet of Water Things (IoWT). The proposed system’s objective would be to control and manage raw water resources. Thus, it has developed a platform based on the server-less architecture and Internet of Things Architectural Reference Model, in which it is applied in a simulation environment, considering several electronic devices to validate its performance. For this research, there is a system for capturing raw water from tubular wells. Each well has a level sensor, a temperature sensor and a rain gauge. The data is collected every minute by an electronic device and sent every hour to the IoWT system. From data analysis, the amount of memory allocated to functions minimally interferes with efficiency. The IoWT system, applied in a real case, consists of connecting a device installed in a water well to the platform, where the data is transmitted through a 3G network and then processed. Thus, the proposed approach has great potential to be considered a complementary tool in monitoring raw water and assisting in decision-making for the management of water resources.

CLICK HERE for Free Access to the complete paper

Harmonic Impacts on the Electrical Distribution Network by the Broad Usage of LED Lamps

This content is accessible to paid subscribers. To view it please enter your password below or send mike@standardsmichigan.com a request for subscription details.

Negative Impacts of Using the Internet Among Nursing Students

 

Emerging Technologies and the Negative Impacts of Using the Internet Among Nursing Students

Atallah Alenezi, et al

College of Applied Medical Science, Shaqra University, Riyadh, Kingdom of Saudi Arabia

 

Abstract: World wide Web or the internet is gaining more challenges and has been one of the most exciting major events in the second half of the 20th century and has brought negative impact that cannot be ignored. Aim of this study is to develop solutions to deal with negative impacts of using internet among nursing students in a government university. Design, descriptive methodological design (cross-sectional) to achieve the study objectives. Setting, sample of 185 undergraduate male and female nursing students from three campuses of applied medical sciences college of Shaqra university. Results, 75.7% of students ages ranged from 20–25, health impacts came at the first level of negative impacts of using internet and got arithmetic mean (32.74), and no statistically significant correlation between student’s personal characteristics regarding the negative impacts of using the internet.

CLICK HERE to order complete paper

Multifactor Authentication Approach on Internet of Things: Children’s Toys

Multifactor Authentication Approach on Internet of Things: Children’s Toys

Manal Alanazi – Majed Aborokbah

Faculty of Computers & Information Technology, University of Tabuk, Tabuk, Saudi Arabia

Abstract:  Internet connected Children’s toys are a type of IoT devices that the security community should pay particular attention. A cyber-predator may interact with or gather confidential data about children without being physically present if IoT toys are hacked. Authentication to verify user identity is essential for all internet-connected applications, where relying on single authentication is not considered safe, especially in children’s applications. Children often use easy-to-guess passwords in smart applications associated with the Internet of Things (IoT) for children’s toys. In this paper, we propose to activate multi-factor authentication on the IoTs for children’s toys connected to the internet using companion applications. When changing the user’s behaviour (by IP address, GPS, OS version, and browser), the child’s identity must be verified by two-factor authentication to prevent unauthorized access to preserve the child’s safety and privacy. This paper introduces multi-authentication mechanisms: a password and another authentication type, either mobile phone SMS, security token, digital certificate, or biometric authentication.

CLICK HERE to order complete paper.

Layout mode
Predefined Skins
Custom Colors
Choose your skin color
Patterns Background
Images Background
Skip to content