scispace - formally typeset
Search or ask a question

How can you control an IOT connected smart device a a game controller B an associated app c a transistor D a connected keyboard and mouse? 

Answers from top 8 papers

More filters
Papers (8)Insight
The experiments showed that interoperability between different IoT devices, standards, and protocols in a smart health system could be achieved using a specialized gateway device and that different web technologies could be used simultaneously in constrained and Internet environments.
The evaluation results show that Point-n-Press is a useful and suitable control scheme for IoT-based smart homes.
Also, we show how IoT devices can be connected and efficiently make use of the PIM mechanism.
Open accessProceedings ArticleDOI
Ronghua Xu, Yu Chen, Erik Blasch, Genshe Chen 
02 May 2018
43 Citations
Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.
Proceedings ArticleDOI
Kapil Kumar, Joy Bose, Samarth Tripathi 
01 Dec 2016
6 Citations
Our solution will enable any user to easily control any connected smart device via a web browser.
This paper suggests a novel framework to cooperate cloud-level IoT services on a smart device with the concept of Intention.
Then we show how information from the IoT can be directly connected to these processes, thus providing a valuable addition of real-time data as input.
Proceedings ArticleDOI
02 Oct 2016
5 Citations
We show that this is applicable in scenarios of connected, smart devices where a task can be executed on a multitude of devices.

Related Questions

Can Chat gpt control IOT.?5 answersYes, ChatGPT can be utilized to control IoT devices. ChatGPT has been demonstrated to convert natural language instructions into sequences of executable actions, making it applicable for various environments and integration with robot systems. Moreover, advancements in Large Language Models like GPT-4 have shown potential in solving complex traffic control problems, indicating the ability of novices to leverage ChatGPT effectively in mixed traffic scenarios. Additionally, ChatGPT falls under the data-driven analysis method for cyber-physical-social systems, where it serves as a black box model focusing on input-output relationships, making it suitable for managing complex systems involving human and social factors. While current applications are limited, the future potential of ChatGPT in military operations, including IoT control, is vast as its database grows and analytical capabilities evolve.
What is the IOt in tennis?4 answersThe Internet of Things (IoT) in tennis refers to the integration of IoT sensors and technologies to enhance player evaluation, stroke analysis, and training methods. Various studies have utilized wearable Inertial Measurement Units (IMUs) combined with machine learning algorithms like Support Vector Machines (SVM) to evaluate tennis strokes in real-time, providing precise feedback on serve, forehand, backhand, and volley techniques. Additionally, IoT sensors have been designed to collect data on ball and player movements during table tennis, aiding in training guidance and skill development. By incorporating IoT-based video and image recognition systems, tennis teaching methods have been optimized, leading to significant improvements in students' serving abilities and overall performance. The application of IoT perception has also facilitated action recognition in table tennis training, enhancing accuracy and stability in identifying complex movements.
What is IoT used for most in relation to sports?5 answersThe Internet of Things (IoT) is extensively utilized in sports for various applications. IoT technology is predominantly employed in sports for monitoring and analyzing physiological variables in athletes, enhancing athlete performance through personalized measuring instruments, and optimizing training in disciplines like rowing by developing low-cost IoT devices for onboard analysis of key parameters. Additionally, IoT facilitates real-time monitoring of athletes' physiological parameters during games and off-days, aiding in health management and risk mitigation. The integration of IoT in sports enables the collection, storage, and analysis of data from wearable devices, offering valuable insights for decision-making based on machine learning models. Overall, IoT plays a crucial role in revolutionizing sports training, performance analysis, and athlete health monitoring.
What factors should be considered when designing a control platform for IoT?4 answersWhen designing a control platform for IoT, several factors should be considered. Firstly, the choice of microprocessors, microcontrollers, and Field Programmable Gate Arrays (FPGA) is crucial as they play a core role at the IoT edge level. Secondly, the performance of the controller can be improved by implementing control algorithms near the actuator to eliminate delay effects. Additionally, the design should focus on efficient IoT-enabled motion control, considering factors such as actuator design and controller performance. Furthermore, connectivity, reliability, security, and mobility challenges of IoT can be addressed through the use of IPv4/IPv6, CoAP, HTTP, WebSocket, and Capillary Networks. Lastly, the software architecture for IoT-oriented control devices should ensure conformity, consistent reconfigurability, and compatibility between different devices and applications.
How access controls works in IoT application?5 answersAccess control in IoT applications is crucial for managing user access to sensitive data. Traditional access control methods face challenges such as single points of failure and data leakage. To address these issues, researchers have proposed various approaches. One approach combines blockchain and Intel software guard extension (SGX) technology to create a secure access control framework for IoT. The blockchain validates IoT devices and edge servers, while the access control contract is deployed on the blockchain to manage fine-grained access control policies. SGX technology ensures the confidentiality of data processing on edge computing servers. Another approach focuses on identity and access management (IAM) technologies, which play a vital role in ensuring secure and trustworthy IoT ecosystems. IAM technologies help grant or revoke access to IoT systems and can be visualized and categorized using a preliminary model. Additionally, a policy-based approach using attributes, roles, and capabilities has been proposed for resource-constrained IoT devices, providing fine-grained access control for authorized users. Finally, an attribute-based access control (ABAC) security model has been developed for the MQTT protocol, allowing for the regulation of publications, subscriptions, and message distribution in IoT applications.
How access controls works IoT?3 answersAccess control in the IoT is crucial for granting access rights to users and devices connected to the network. However, designing an ideal access control solution for the IoT faces challenges due to the variety of devices, resource constraints, and heterogeneous nature of the IoT. Existing access control technologies in the IoT have problems such as coarse-grainedness, weak auditability, lack of access process control, and excessive privileges. To address these challenges, a blockchain-based and encrypted currency-based access control model supported by Trusted Execution Environment (TEE) technology is proposed, providing fine-grainedness, strong auditability, and access procedure control. Another approach combines blockchain and Intel software guard extension (SGX) technology to create an access control framework for the IoT, enabling attribute-based access control policies and data processing confidentiality. Additionally, a dynamic secure access control model using blockchain is proposed, ensuring secure access control, data sharing, and dual revocations for maintaining security. Finally, an access control scheme based on permissioned blockchain and edge computing is proposed, achieving fine-grained, dynamic access control with high throughput, low latency, and security.