SlideShare a Scribd company logo
Smart Manufacturing
Through Cloud-Based
Smart Objects and SWE
An Article by: Pablo GimΓ©nez, BenjamΓ­n Molina, Carlos E. Palau, Manuel
Esteve and Jaime Calvo, 2014.
CE Dep, IAUSDJ.ac.ir
21-02-96(1 April, 2017)
1
2
Introduction
Motivation and Previous Work
Outline of the System
Design and Development
Use Case
Conclusions and Future Work
References
3
4
ο‚‘ Security technological advances in Industrial
environments.
ο‚‘ but there are still risks concerning worker’s
safety and health.
ο‚‘ Therefore new integrated approaches to
ensure the continuous safety and wellness of
workers
ο‚‘ we propose the usage of smart virtualized
objects to perform intelligent tasks such as
increasing productivity and minimizing risks 5
The IoT evolving from:
ο‚‘Simple sensors with network connectivity
ο‚‘Smart Objects (SO): Interrelated and
interconnected objects.
ο‚‘SOs are fully functional on their own.
ο‚‘Proposed system perceived as aWSN.
ο‚‘WSN enable applications to obtain up-to-date
information about the physical world.
ο‚‘6LowPAN (IPv6 over low power mesh network).
6
7
ο‚‘ Smart Objects provide a set of new resources
to be consumed by networks, services and
applications.
8
ο‚‘ The SWE architecture component that has
been used and analysed in this document is
the SOS.
ο‚‘ The main purpose of this service consists in
allowing access to sensor observations in a
standard way for any sensor system.
ο‚‘ SOS+O&M=modeling sensor observations,
ο‚‘ SOS+SensorML modelling=sensors and
sensor systems.
9
ο‚‘ A unique identification
ο‚‘ Capability to communicate effectively with its
environment
ο‚‘ Data storage about itself
ο‚‘ A language to display its features and its needs over its
lifecycle
ο‚‘ Capability to participate in or making individual
decisions relevant to its own destiny
ο‚‘ Capability for surveying and controlling its environment
ο‚‘ Generation of interaction by services offering:
contextual, personal and reactive services
10
ο‚‘ Considering sensors (and evenWSNs) as
small systems with limited (processing)
capabilities
ο‚‘ It makes sense to virtualize its capabilities in a
data centre
ο‚‘ so that sensors (WSNs) perceive that they are
as powerful as normal computers.
11
ο‚‘ OGC, Open Geospatial Consortium
ο‚‘ SWE, SensorWeb Enablement
ο‚‘ The OGC's SensorWeb Enablement (SWE)
standards enable developers to make all
types of sensors, transducers and sensor data
repositories discoverable, accessible and
useable via theWeb.
12
13
ο‚‘ The information model describes the
conceptual models
ο‚§ Refer to transducers, processes, systems and observations.
such as: (i)Transducer Markup Language (TML), currently
deprecated; (ii) Sensor Model Language (SensorML); (iii)
Observation and Measurements (O&M).
ο‚‘ The service model specifies related services.
ο‚§ Refer to (i) Sensor Alert Service (SAS); (ii) Sensor Planning
Services (SPS); (iii)Web Notification Service (WNS); (iv)
Catalog ServiceWeb (CSW); and (v) Sensor Observation
Service (SOS).
14
15
16
17
18
19
20
ο‚‘ European Factories of the Future (FoF)
focuses on the development and integration
of engineering technologies, Information and
CommunicationTechnology (ICT), and
advanced materials for adaptable machines
and industrial processes
ο‚‘ workers represent an even more important
asset.
21
ο‚‘ The proposed use case belongs to a Spanish
FoF project named FASyS
ο‚‘ The project was related with the
development of a large wireless sensor
system in order to provide safety to the
workers.
22
23
ο‚‘ Thus our system has to alert both drivers only when
both lift trucks have crossed their red (risk) lines
ο‚‘ The Control Center (CC) must keep track of the
position of each lift truck
ο‚‘ It inserts its position in the SOS everyTa seconds
ο‚‘ The control center reads from the SOS everyTread
seconds Alerting both vehicles takes some time
(Tsend) and an acknowledgment (Tack) from each
vehicle
24
ο‚‘ Experimental Results:
ο‚§ mean time (Tsend +Tack) is 200 ms
ο‚§ variability of 50 ms
ο‚‘ If the CC performs correctly (successfully), the
driver is alerted Ξ”x meters before crossing
the risk line
ο‚‘ To avoid alerting drivers a and b too late,
there is a safety distance (xS and yS).
25
26
27
28
29
30
ο‚‘ The presented system is able to avoid
collisions between automatic machineries or
lift trucks in a factory.
ο‚‘ To achieve this goal several components are
needed:WSN, SOS, CEP, HMI, A Cloud
computing environment
31
ο‚‘ The CEP is physically in a single computer
ο‚‘ SO’s is the smart objects are distributed
ο‚‘ we can qualitatively estimate that the final
time is slightly higher
ο‚‘ The processing time in the SO is significantly
low compared to a CEP.
ο‚‘ The SO only cares for a single vehicle
whereas the CEP (test case 1) cares for the
whole factory
32
ο‚‘ However the CEP does not require a NC as it
interacts directly with theWSNs; the SOs, on
the contrary, require the NC to exchange
notifications
ο‚‘ CEP can query the SOS to retrieve more
information on a single message whereas
each SO requires single (and simpler)
messages.
33
ο‚‘ As the SOs are independent objects, the
system is decentralized, so if one of them
goes down it does not imply the failure of the
whole system.
ο‚‘ The use of cloud computing (self-healing)
mechanisms also helps in detecting failures
and recovering immediately.
34
1. Kortuem, G., Kawsar, F., Fitton, D., Sundramoorthy,V.: Smart objects as building
blocks for the Internet of things, internet computing. IEEE 14(1), 44–51 (2010)
2. Schreiber, D., Luyten, K., MΓΌhlhΓ€user, M., Brdiczka, O., Hartman, M.: Introduction
to the special issue on interaction with smart objects.Trans. Interact. Intell. Syst.
3(2), 6 (2013)
3. Fortino, G., Guerrieri, A., Russo,W.: Agent-oriented smart objects development. In:
Proceedings of IEEE 16th International Conference on Computer Supported
CooperativeWork in Design (CSCWD), pp. 907–912 (2012)
4. Fortino, G., Guerrieri, A., Lacopo, M., Lucia, M., Russo, W.: An Agent-based
Middleware for Cooperating Smart Objects. In: Highlights on Practical Applications
of Agents and Multi-Agent Systems, Communications in Computer and Information
Science (CCIS),Vol. 365, pp. 387–398, Springer (2013)
5. Fortino G., Guerrieri A., RussoW., Savaglio C.: Middlewares for Smart Objects and
Smart Environments: Overview and Comparison, in Internet ofThings based on
Smart Objects: technology, middleware and applications, Springer Series on the
Internet ofThings (2014)
35
6. Hartmann, M., Schreiber, D., MΓΌhlhΓ€user,M.:Workshop on interacting with smart
objects. In: Proceedings of the 16th International Conference on Intelligent User
Interfaces (IUI ’11), pp. 481–482, NewYork (2011)
7. Montenegro, G., Kushalnagar, N., Hui, J., Culler, D.: RFC 4944:Transmission of IPv6
Packets over IEEE 802.15.4 Networks, Internet EngineeringTask Force (2007)
8. Konstantopoulos, C., Pantziou, G., Gavalas, D., Mpitziopoulos, A., Mamalis, B.: A
Rendezvous-based approach enabling energy-efficient sensory data collection with
mobile sinks. IEEETrans. Parallel Distrib. Sys. 23(5), 809–817 (2012)
9. Liu, A.F., Ma, M., Chen, Z.G., Gui, W.: Energy-hole avoidance routing algorithm for
WSN. In: Proceedings of the Fourth International Conference on Natural
Computation (ICNC’08), pp. 76–80 (2008)
10. Zhang,W.,Wang,Y.,Ma,Y.:Research ofWSNrouting algorithm based on the ant
algorithm. In: Proceedings of the 9th International Conference on Electronic
Measurement and Instruments (ICEMI’09), pp. 422–426 (2009)
11. Ji, S., Pei, Q., Zeng,Y.,Yang, C., Bu, S.: An automated black-box testing approach
forWSN security protocols. In: Proceedings of the 7th International Conference on
Computational Intelligence and Security, pp. 693–697 (2011)
36
12. Clark, J., Daigle, G.:The Importance of SimulationTechniques in ITS Research and
Analysis. In: Proceedings of the 29th Conference onWinter simulation (WSC ’97)
(1997)
13.Wu, H., Luo, Q., Zheng, P., Ni, L.M.:VMNet: realistic emulation of wireless sensor
networks. IEEETrans. Parallel Distrib. Syst. 18(2), 277–299 (2007)
14.The OGC SensorWeb Enablement (SWE), Open Geospatial Consortium (OGC).
http://www. opengeospatial.org/ogc/markets-technologies/swe/ (2013)
15. Sensor Observation Service (SOS), Open Geospatial Consortium (OGC).
http://www.opengeospatial.org/standards/sos (2013)
16. GimΓ©nez, P., Molina, B., Palau, C.E., Esteve M.: Sensor web simulation and testing
for the IoT. In: IEEE International conference on Systems, Man, and Cybernetics (IEEE
SMC 2013), Manchester, October 2013
17. McFarlane, D., Sarma, S., Chirn, J.L.,Wong, C.Y., Ashton, K.:The intelligent product
in manufacturing control and management. In: 15thTriennialWorld Congress IFAC,
Barcelona, Spain (2002)
18. Bajic, E.: Ambient services modeling framework for intelligent products, UbiComp
2005. In:Workshop on Smart Object Systems,Tokyo Sept 2005
37
Only the death
have seen
the end of war
38
Thank you for
your attention.
39

More Related Content

PPTX
Cooja simple programs.ppt
PPT
Contiki IoT simulation
Β 
DOCX
Formatted Paper_References added
PPTX
Intrusion Detection in A Smart Forest-Fire Early Warning Sensory System
PPTX
Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...
PDF
Power consumption analysis on an IoT network based on wemos: a case study
PDF
Wearable Gait Classification Using STM Sensortile
PDF
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...
Cooja simple programs.ppt
Contiki IoT simulation
Β 
Formatted Paper_References added
Intrusion Detection in A Smart Forest-Fire Early Warning Sensory System
Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...
Power consumption analysis on an IoT network based on wemos: a case study
Wearable Gait Classification Using STM Sensortile
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...

What's hot (16)

PDF
A Fault Dictionary-Based Fault Diagnosis Approach for CMOS Analog Integrated ...
PPTX
Tossim
PPTX
wireless sensor networks & application :forest fire detection
PDF
TheThingsConference 2019 Slides of Alex Raimondi
PPT
Threading Successes 05 Smoke
PPTX
Wireless Data Processing System for IoT-Enabled Devices
PDF
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
PPTX
Robotics Club Lesson 1
PDF
Development of a portable community video surveillance system
PDF
Beyond GPS - Neogeograpy Data Collection
PPTX
Micaz and TelosB
PDF
BTC302: Interim Report Sample
PDF
Increasing Throughput per Node for Content Delivery Networks
PDF
RSA Algorithm as a Data Security Control Mechanism in RFID
PPTX
Your Mind is a Rat
PPTX
TinyOS
A Fault Dictionary-Based Fault Diagnosis Approach for CMOS Analog Integrated ...
Tossim
wireless sensor networks & application :forest fire detection
TheThingsConference 2019 Slides of Alex Raimondi
Threading Successes 05 Smoke
Wireless Data Processing System for IoT-Enabled Devices
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
Robotics Club Lesson 1
Development of a portable community video surveillance system
Beyond GPS - Neogeograpy Data Collection
Micaz and TelosB
BTC302: Interim Report Sample
Increasing Throughput per Node for Content Delivery Networks
RSA Algorithm as a Data Security Control Mechanism in RFID
Your Mind is a Rat
TinyOS
Ad

Similar to Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh (20)

PDF
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
PDF
A_Middleware_based_on_Service_Oriented_Architectur.pdf
Β 
PDF
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
PDF
Ranjan.G, S. Akshatha, Sandeep.N and Vasanth.A, Acharya Institute of Technolo...
PDF
Enhancing Surveillance System through EdgeComputing: A Framework For Real-Tim...
PDF
journal for research
PDF
A Back Propagation Neural Network Intrusion Detection System Based on KVM
PDF
Toward a real time framework in cloudlet-based architecture
PDF
July 2022 - Top 10 Read Articles in Network Security & Its Applications
PDF
June 2022: Top 10 Read Articles in Network Security and Its Applications
PDF
December 2021: Top 10 Read Articles in Network Security and Its Applications
PDF
August 2022: Top 10 Read Articles in Network Security and Its Applications
PDF
September 2022: Top 10 Read Articles in Network Security & Its Applications
PDF
January 2024 - Top 10 Read Articles in Network Security & Its Applications
PDF
November 2021 - Top 10 Read Articles in Network Security & Its Applications
PDF
June 2025 - Top 10 Read Articles in Network Security and Its Applications
PDF
June 2023: Top 10 Read Articles in Network Security and Its Applications
PDF
May 2022: Top 10 Read Articles in Network Security and Its Applications
PDF
March 2022 - Top 10 Read Articles in Network Security and Its Applications
PDF
January 2025 - Top 10 Read Articles in Network Security & Its Applications.pdf
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
A_Middleware_based_on_Service_Oriented_Architectur.pdf
Β 
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
Ranjan.G, S. Akshatha, Sandeep.N and Vasanth.A, Acharya Institute of Technolo...
Enhancing Surveillance System through EdgeComputing: A Framework For Real-Tim...
journal for research
A Back Propagation Neural Network Intrusion Detection System Based on KVM
Toward a real time framework in cloudlet-based architecture
July 2022 - Top 10 Read Articles in Network Security & Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its Applications
June 2025 - Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
January 2025 - Top 10 Read Articles in Network Security & Its Applications.pdf
Ad

More from nabati (8)

PPT
Ip core -iausdj.ac.ir
Β 
PPT
Introduction to R r.nabati - iausdj.ac.ir
Β 
PPT
Cloud computing standards and protocols r.nabati
Β 
PPT
Internet of things (IoT) and big data- r.nabati
Β 
PPT
Graph theory concepts complex networks presents-rouhollah nabati
Β 
PPT
Big data analytics, survey r.nabati
Β 
PPT
Random walks on graphs - link prediction by Rouhollah Nabati
Β 
PPT
Introduction to latex by Rouhollah Nabati
Β 
Ip core -iausdj.ac.ir
Β 
Introduction to R r.nabati - iausdj.ac.ir
Β 
Cloud computing standards and protocols r.nabati
Β 
Internet of things (IoT) and big data- r.nabati
Β 
Graph theory concepts complex networks presents-rouhollah nabati
Β 
Big data analytics, survey r.nabati
Β 
Random walks on graphs - link prediction by Rouhollah Nabati
Β 
Introduction to latex by Rouhollah Nabati
Β 

Recently uploaded (20)

PPTX
SAP Ariba Sourcing PPT for learning material
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PDF
The Internet -By the Numbers, Sri Lanka Edition
Β 
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PDF
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
PPTX
artificial intelligence overview of it and more
PDF
Testing WebRTC applications at scale.pdf
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
SAP Ariba Sourcing PPT for learning material
Unit-1 introduction to cyber security discuss about how to secure a system
Sims 4 Historia para lo sims 4 para jugar
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Job_Card_System_Styled_lorem_ipsum_.pptx
Paper PDF World Game (s) Great Redesign.pdf
522797556-Unit-2-Temperature-measurement-1-1.pptx
Introuction about WHO-FIC in ICD-10.pptx
The Internet -By the Numbers, Sri Lanka Edition
Β 
WebRTC in SignalWire - troubleshooting media negotiation
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
artificial intelligence overview of it and more
Testing WebRTC applications at scale.pdf
Introuction about ICD -10 and ICD-11 PPT.pptx
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Cloud-Scale Log Monitoring _ Datadog.pdf
Decoding a Decade: 10 Years of Applied CTI Discipline
presentation_pfe-universite-molay-seltan.pptx
QR Codes Qr codecodecodecodecocodedecodecode
Introduction about ICD -10 and ICD11 on 5.8.25.pptx

Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh

  • 1. Smart Manufacturing Through Cloud-Based Smart Objects and SWE An Article by: Pablo GimΓ©nez, BenjamΓ­n Molina, Carlos E. Palau, Manuel Esteve and Jaime Calvo, 2014. CE Dep, IAUSDJ.ac.ir 21-02-96(1 April, 2017) 1
  • 2. 2
  • 3. Introduction Motivation and Previous Work Outline of the System Design and Development Use Case Conclusions and Future Work References 3
  • 4. 4
  • 5. ο‚‘ Security technological advances in Industrial environments. ο‚‘ but there are still risks concerning worker’s safety and health. ο‚‘ Therefore new integrated approaches to ensure the continuous safety and wellness of workers ο‚‘ we propose the usage of smart virtualized objects to perform intelligent tasks such as increasing productivity and minimizing risks 5
  • 6. The IoT evolving from: ο‚‘Simple sensors with network connectivity ο‚‘Smart Objects (SO): Interrelated and interconnected objects. ο‚‘SOs are fully functional on their own. ο‚‘Proposed system perceived as aWSN. ο‚‘WSN enable applications to obtain up-to-date information about the physical world. ο‚‘6LowPAN (IPv6 over low power mesh network). 6
  • 7. 7
  • 8. ο‚‘ Smart Objects provide a set of new resources to be consumed by networks, services and applications. 8
  • 9. ο‚‘ The SWE architecture component that has been used and analysed in this document is the SOS. ο‚‘ The main purpose of this service consists in allowing access to sensor observations in a standard way for any sensor system. ο‚‘ SOS+O&M=modeling sensor observations, ο‚‘ SOS+SensorML modelling=sensors and sensor systems. 9
  • 10. ο‚‘ A unique identification ο‚‘ Capability to communicate effectively with its environment ο‚‘ Data storage about itself ο‚‘ A language to display its features and its needs over its lifecycle ο‚‘ Capability to participate in or making individual decisions relevant to its own destiny ο‚‘ Capability for surveying and controlling its environment ο‚‘ Generation of interaction by services offering: contextual, personal and reactive services 10
  • 11. ο‚‘ Considering sensors (and evenWSNs) as small systems with limited (processing) capabilities ο‚‘ It makes sense to virtualize its capabilities in a data centre ο‚‘ so that sensors (WSNs) perceive that they are as powerful as normal computers. 11
  • 12. ο‚‘ OGC, Open Geospatial Consortium ο‚‘ SWE, SensorWeb Enablement ο‚‘ The OGC's SensorWeb Enablement (SWE) standards enable developers to make all types of sensors, transducers and sensor data repositories discoverable, accessible and useable via theWeb. 12
  • 13. 13
  • 14. ο‚‘ The information model describes the conceptual models ο‚§ Refer to transducers, processes, systems and observations. such as: (i)Transducer Markup Language (TML), currently deprecated; (ii) Sensor Model Language (SensorML); (iii) Observation and Measurements (O&M). ο‚‘ The service model specifies related services. ο‚§ Refer to (i) Sensor Alert Service (SAS); (ii) Sensor Planning Services (SPS); (iii)Web Notification Service (WNS); (iv) Catalog ServiceWeb (CSW); and (v) Sensor Observation Service (SOS). 14
  • 15. 15
  • 16. 16
  • 17. 17
  • 18. 18
  • 19. 19
  • 20. 20
  • 21. ο‚‘ European Factories of the Future (FoF) focuses on the development and integration of engineering technologies, Information and CommunicationTechnology (ICT), and advanced materials for adaptable machines and industrial processes ο‚‘ workers represent an even more important asset. 21
  • 22. ο‚‘ The proposed use case belongs to a Spanish FoF project named FASyS ο‚‘ The project was related with the development of a large wireless sensor system in order to provide safety to the workers. 22
  • 23. 23
  • 24. ο‚‘ Thus our system has to alert both drivers only when both lift trucks have crossed their red (risk) lines ο‚‘ The Control Center (CC) must keep track of the position of each lift truck ο‚‘ It inserts its position in the SOS everyTa seconds ο‚‘ The control center reads from the SOS everyTread seconds Alerting both vehicles takes some time (Tsend) and an acknowledgment (Tack) from each vehicle 24
  • 25. ο‚‘ Experimental Results: ο‚§ mean time (Tsend +Tack) is 200 ms ο‚§ variability of 50 ms ο‚‘ If the CC performs correctly (successfully), the driver is alerted Ξ”x meters before crossing the risk line ο‚‘ To avoid alerting drivers a and b too late, there is a safety distance (xS and yS). 25
  • 26. 26
  • 27. 27
  • 28. 28
  • 29. 29
  • 30. 30
  • 31. ο‚‘ The presented system is able to avoid collisions between automatic machineries or lift trucks in a factory. ο‚‘ To achieve this goal several components are needed:WSN, SOS, CEP, HMI, A Cloud computing environment 31
  • 32. ο‚‘ The CEP is physically in a single computer ο‚‘ SO’s is the smart objects are distributed ο‚‘ we can qualitatively estimate that the final time is slightly higher ο‚‘ The processing time in the SO is significantly low compared to a CEP. ο‚‘ The SO only cares for a single vehicle whereas the CEP (test case 1) cares for the whole factory 32
  • 33. ο‚‘ However the CEP does not require a NC as it interacts directly with theWSNs; the SOs, on the contrary, require the NC to exchange notifications ο‚‘ CEP can query the SOS to retrieve more information on a single message whereas each SO requires single (and simpler) messages. 33
  • 34. ο‚‘ As the SOs are independent objects, the system is decentralized, so if one of them goes down it does not imply the failure of the whole system. ο‚‘ The use of cloud computing (self-healing) mechanisms also helps in detecting failures and recovering immediately. 34
  • 35. 1. Kortuem, G., Kawsar, F., Fitton, D., Sundramoorthy,V.: Smart objects as building blocks for the Internet of things, internet computing. IEEE 14(1), 44–51 (2010) 2. Schreiber, D., Luyten, K., MΓΌhlhΓ€user, M., Brdiczka, O., Hartman, M.: Introduction to the special issue on interaction with smart objects.Trans. Interact. Intell. Syst. 3(2), 6 (2013) 3. Fortino, G., Guerrieri, A., Russo,W.: Agent-oriented smart objects development. In: Proceedings of IEEE 16th International Conference on Computer Supported CooperativeWork in Design (CSCWD), pp. 907–912 (2012) 4. Fortino, G., Guerrieri, A., Lacopo, M., Lucia, M., Russo, W.: An Agent-based Middleware for Cooperating Smart Objects. In: Highlights on Practical Applications of Agents and Multi-Agent Systems, Communications in Computer and Information Science (CCIS),Vol. 365, pp. 387–398, Springer (2013) 5. Fortino G., Guerrieri A., RussoW., Savaglio C.: Middlewares for Smart Objects and Smart Environments: Overview and Comparison, in Internet ofThings based on Smart Objects: technology, middleware and applications, Springer Series on the Internet ofThings (2014) 35
  • 36. 6. Hartmann, M., Schreiber, D., MΓΌhlhΓ€user,M.:Workshop on interacting with smart objects. In: Proceedings of the 16th International Conference on Intelligent User Interfaces (IUI ’11), pp. 481–482, NewYork (2011) 7. Montenegro, G., Kushalnagar, N., Hui, J., Culler, D.: RFC 4944:Transmission of IPv6 Packets over IEEE 802.15.4 Networks, Internet EngineeringTask Force (2007) 8. Konstantopoulos, C., Pantziou, G., Gavalas, D., Mpitziopoulos, A., Mamalis, B.: A Rendezvous-based approach enabling energy-efficient sensory data collection with mobile sinks. IEEETrans. Parallel Distrib. Sys. 23(5), 809–817 (2012) 9. Liu, A.F., Ma, M., Chen, Z.G., Gui, W.: Energy-hole avoidance routing algorithm for WSN. In: Proceedings of the Fourth International Conference on Natural Computation (ICNC’08), pp. 76–80 (2008) 10. Zhang,W.,Wang,Y.,Ma,Y.:Research ofWSNrouting algorithm based on the ant algorithm. In: Proceedings of the 9th International Conference on Electronic Measurement and Instruments (ICEMI’09), pp. 422–426 (2009) 11. Ji, S., Pei, Q., Zeng,Y.,Yang, C., Bu, S.: An automated black-box testing approach forWSN security protocols. In: Proceedings of the 7th International Conference on Computational Intelligence and Security, pp. 693–697 (2011) 36
  • 37. 12. Clark, J., Daigle, G.:The Importance of SimulationTechniques in ITS Research and Analysis. In: Proceedings of the 29th Conference onWinter simulation (WSC ’97) (1997) 13.Wu, H., Luo, Q., Zheng, P., Ni, L.M.:VMNet: realistic emulation of wireless sensor networks. IEEETrans. Parallel Distrib. Syst. 18(2), 277–299 (2007) 14.The OGC SensorWeb Enablement (SWE), Open Geospatial Consortium (OGC). http://www. opengeospatial.org/ogc/markets-technologies/swe/ (2013) 15. Sensor Observation Service (SOS), Open Geospatial Consortium (OGC). http://www.opengeospatial.org/standards/sos (2013) 16. GimΓ©nez, P., Molina, B., Palau, C.E., Esteve M.: Sensor web simulation and testing for the IoT. In: IEEE International conference on Systems, Man, and Cybernetics (IEEE SMC 2013), Manchester, October 2013 17. McFarlane, D., Sarma, S., Chirn, J.L.,Wong, C.Y., Ashton, K.:The intelligent product in manufacturing control and management. In: 15thTriennialWorld Congress IFAC, Barcelona, Spain (2002) 18. Bajic, E.: Ambient services modeling framework for intelligent products, UbiComp 2005. In:Workshop on Smart Object Systems,Tokyo Sept 2005 37
  • 38. Only the death have seen the end of war 38
  • 39. Thank you for your attention. 39

Editor's Notes

  • #17: Notification Center (NC) module Common Resource Repository (CRR)=environmental facilities Personal Data Record (PDR)
  • #18: Sensor Model Language (SensorML); (iii) Observation and Measurements (O&M).
  • #24: CEP, Complex Event Processing
  • #25: CEP, Complex Event Processing
  • #26: CEP, Complex Event Processing
  • #31: RC= Risk of Collision NC=Notification Center