LITE 111 IoT Applications in Smart Cities PDF

Summary

This document provides an overview of IoT (Internet of Things) applications within smart cities. Topics like smart traffic management, smart parking, public safety, and energy management are explored, along with various smart city examples.

Full Transcript

LITE 111 WEEK 13: INTERNET OF THINGS distribution systems to monitor water (IoT) APPLICATIONS quality, detect leaks, and optimize water usage, reducing costs and SM...

LITE 111 WEEK 13: INTERNET OF THINGS distribution systems to monitor water (IoT) APPLICATIONS quality, detect leaks, and optimize water usage, reducing costs and SMART CITIES conserving resources APPLICATIONS OF IOT IN SMART REMOTE MONITORING CITIES - IoT-based smart city solutions also SMART TRAFFIC MANAGEMENT enable efficient utility management for - IoT sensors can be installed on traffic citizens.They allow residents to use lights, roadways, and vehicles to their meters to track and control collect data on traffic patterns, resource consumption. And in case of congestion, and accidents.This data issues like leakages or potential can be used to optimize traffic flow, failures, utility companies can notify reduce congestion, and improve road households and send specialists for be used to optimize traffic flow, timely repairs and maintenance reduce congestion, and improve road ENVIRONMENTAL WELL BEING safety. - Sensors are attached to water grids to SMART PARKING inspect their quality and trigger - IoT sensors can be installed in parking notifications in case of leakages or spaces to detect when a spot is changes in the chemical composition occupied and transmit that information of water. The same technology is also to a central server. This data can guide used for measuring air quality in areas drivers to available parking spots, prone to pollutants and is critical to reducing congestion and can guide recommending solutions that improve drivers to available parking spots, air quality. reducing congestion and search time. PUBLIC SAFETY PUBLIC TRANSPORT - IoT-enabled cameras and sensors can - Traffic operators can use the data from be installed in public spaces to sensors embedded in multiple sources monitor potential security threats, such to analyze and identify patterns of as suspicious activity or unattended using public transport. This data helps bags.unattended bags. achieve a standardized level of safety WASTE MANAGEMENT & timeliness while cutting wait times and enhancing the traveling - IoT sensors can be installed in garbage experience for citizen cans and recycling bins to monitor the fill level and optimize waste collection EXAMPLE OF SMART CITIES: routes, reducing costs and Singapore environmental impact. London UTILITY MANAGEMENT Amsterdam, Netherlands ENERGY MANAGEMENT: IoT Barcelona, Spain sensors can be installed in buildings New York and homes to monitor energy usage Copenhagen and optimize energy consumption. Hong Kong WATER MANAGEMENT: IoT Oslo sensors can be installed in water Seoul, South Korea 10 INTERNET OF THINGS (IoT) HAND HYGIENE MONITORING HEALTHCARE EXAMPLES - Today, many hospitals and other REMOTE PATIENT MONITORING health care operations use IoT devices - is the most common application of IoT to remind people to sanitize their devices for healthcare. IoT devices can hands when they enter hospital rooms. automatically collect health metrics The devices can even give instructions like heart rate, blood pressure, on how best to sanitize to mitigate a temperature, and more from patients particular risk for a particular patient. who are not physically present in a DEPRESSION AND MOOD healthcare facility, eliminating the MONITORING need for patients to travel to the - “Mood-aware” IoT devices can providers. address challenges of getting data on GLUCOSE MONITORING mental health. By collecting and - Glucose monitoring has traditionally analyzing data such as heart rate and been difficult. Not only is it blood pressure, devices can infer inconvenient to have to check glucose information about a patient’s mental levels and manually record results, but state. Advanced IoT devices for mood doing so reports a patient’s glucose monitoring can even track data such as levels only at the exact time the test is the movement of a patient’s eyes. provided. INGESTIBLE SENSORS - IoT devices can help address these - With ingestible sensors, it’s possible to challenges by providing continuous, collect information from digestive and automatic monitoring of glucose levels other systems in a much less invasive in patients. Glucose monitoring way. They provide insights into devices eliminate the need to keep stomach PH levels, for instance, or records manually, and they can alert help pinpoint the source of internal patients when glucose levels are bleeding. These devices must be small problematic. enough to be swallowed easily. They HEART RATE MONITORING must also be able to dissolve or pass - Monitoring heart rates can be through the human body cleanly on challenging, even for patients who are their own. present in healthcare facilities. CONNECTED CONTACT LENSES Conventional devices for continuous - Smart contact lenses provide another cardiac require patients to be attached opportunity for collecting healthcare to wired machines constantly, data in a passive, non-intrusive way. impairing their mobility.wired They could also, incidentally, include machines constantly, impairing their microcameras that allow wearers mobility. effectively to take pictures with their - Today, a variety of small IoT devices eyes, which is probably why are available for heart rate monitoring, companies like Google have patented freeing patients to move around as connected contact lenses. they like while ensuring that their hearts are monitored continuously. ROBOTIC SURGERY - By deploying small internet-connected robots inside the human body, surgeons can perform complex of the simplest wearable devices that procedures that would be difficult to allow users to keep an eye on their manage using human hands. At the health by monitoring such basic same time, robotic surgeries parameters as a heart or pulse rate. performed by small IoT devices can Moreover, the wristbands help control reduce the size of incisions requires to physical activity and track the number perform surgery, leading to a less of steps, sleep stages and calories invasive process, and faster healing for burnt. patients SMART HEALTH WATCHES CONNECTED INHALERS - Entered the market of electronic - Conditions such as asthma or COPD devices quite a long time ago. often involve attacks that come on However, they started to provide real suddenly, with little warning. value related to health only recently. In IoT-connected inhalers can help addition to capabilities to manage calls patients by monitoring the frequency and messages or send voice of attacks, as well as collecting data commands, smartwatches can equip from the environment to help users with insights into physical healthcare providers understand what activity levels. Stress, or even heart triggered an attack. pattern anomalies. - In addition, connected inhalers can WEARABLE BLOOD PRESSURE alert patients when they leave inhalers MONITORS at home, placing them at risk of - Hypertension is notorious for its suffering an attack without their aptitude to cause morbidity and inhaler present, or when they use the mortality globally. Incorporating blood inhaler improperly. pressure (BP) monitors into wearable PARKINSON’S DISEASE devices provides more opportunities to MONITORING improve screening for hypertension on - In order to treat Parkinson’s patients a daily basis. That way, enhancing most effectively, healthcare providers health care delivery and promoting must be able to assess how the wellness. severity of their symptoms fluctuate BIOSENSORS through the day - IoT sensors promise to make this task - The last type of wearable devices used much easier by continuously for monitoring health that we consider collecting data about Parkinson's today is biosensors. Usually, they symptoms. At the same time, the come in the form of self-adhesive devices give patients the freedom to patches that leverage sensor go about their lives in their own development and AI-based analytics to homes, instead of having to spend collect vital health data without extended periods in a hospital for restricting any movement. observation - Biosensors provide both patients and TYPES OF MEDICAL WEARABLE clinicians with a convenient way to DEVICES measure variables like cardiac output, respiratory rates, weight, or even fluid WEARABLE FITNESS TRACKERS volume. Thus, increasing the chances - Of course, we can’t fail to mention of preventing heart failure. Adoption good old fitness trackers. They are one of this non-invasive and continuous monitoring method paves the way for -unwanted, hostile behavior improved patient outcomes and better done by individuals to other quality of care. people in the hope of gaining control over them. WEEK 14 - done online INTERNET PROFILE IT, CULTURE AND SOCIETY - (internet identity, online identity, or internet persona) – THE INFLUENCE OF IT ON profile created by internet CULTURE AND SOCIAL BEHAVIOR users to establish their social - The sudden surge of ICT has created identity in online an influence on how people’s lives communities, social media have been changed, for better or for sites, and other websites. worse. - comes in the form of - Due to the high number of SMS being messages or images (memes) sent and received on a daily basis, Influence on Social Philippines is formerly called the NETIQUETTE ”texting- capital of the world” but now -combination of the words internet and it is dubbed as the “most social etiquette nation” (Opera Mini, 2015) - it describes how one should act online - The attitude and behavior of people - it brings in policies for all the features are evolving to meet technology’s and qualities of the internet. evolution. World Wide Web (WWW) - Communication email services - “generation wars” becoming popular File Transfer Protocol (FTP) INFLUENCE ON CULTURE chat rooms ONLINE REVIEWS instant messaging - with the proliferation of online DIFFERENT TYPES OF NETIQUETTE information, it is easy to find NETIQUETTE FOR SOCIAL details on a certain things MEDIA - technology affects the basic ○ The Personalize IT Rule human behavior of decision- ○ The Off-limits Rule making ○ The Tag – You’re It Rule WEBLOGGING/ SOCIAL MEDIA NETIQUETTE FOR EMAIL - Affecting social interaction SERVICES, CHAT ROOMS AND YOUTUBELEARNERS INSTANT MESSAGING - Youtube – most popular Guidelines in composing an social media sites email - Influences the acquisition of ○ Recipient (to whom knowledge and learning of the email will be sent) certain skill sets ○ Subject Line (gives hint of the purpose of INFLUENCE ON SOCIAL the email) BEHAVIOR ○ Salutation (serves as CYBERBULLYING greetings to the - serious phenomenon brought recipient) about by social media ○Body of the email PROFESSIONAL ETHICS (must be short and - IT professionals who follow specific) an ethical practice as they are ○ Closing Line the front liners, support, and (contains courteous backend of ICT language as form of - Association of Computing farewell) Machinery (ACM) has ○ Sender Information identified 24 imperatives of ○ Formatting professional conduct for IT ○ Attachment (if the professionals. user wishes to include Section 1: outlines the files such as fundamental ethical documents, images, considerations etc.) Section 2: provides additional, ○ Delete/Trash Bin more specific considerations NETIQUETTE FOR CHAT of professional conduct ROOMS AND INSTANT Section 3: intended MESSAGING specifically for individuals ho Guidelines for using instant have leadership role, whether messaging application in the workplace or in a ○ Think long and hard volunteer capacity such in before accepting a organizations like ACM. private conversation. Section 4: principles ○ In a group chat, involving compliance with include only those this Code are laid out that are in your 1. GENERAL MORAL friends list. IMPERATIVES ○ If possible, do not a. Contribute to society and give your personal human well being. information while b. Avoid harm to others. chatting, including c. Be honest and trustworthy. your photos or d. Be fair and take action not to “selfies.” discriminate. ○ When in doubt, save a e. Honor property rights copy or make a including copyrights and back-up of your patent. conversation (chat). f. Give proper credit for ○ You must log out from intellectual property. your account at all g. Respect the privacy of others. times, especially if h. Honor confidentiality. you are in public 2. MORE SPECIFIC place, such as PROFESSIONAL computer shop. RESPONSIBILITIES ○ You may opt to a. Strive to achieve the highest customize your quality, effectiveness and account settings from dignity in both the process and public to private products of professional work. account. b. Acquire and maintain f. Create opportunities for professional competence. members of the organization c. Know and respect existing to learn the principles and laws pertaining to professional limitations of computer work. systems d. Accept and provide 4. COMPLIANCE WITH THE CODE appropriate professional a. Uphold and promote the review. principles of this Code. e. Give comprehensive and b. Treat violations of this code as thorough evaluations of inconsistent with membership computer systems and their in the ACM. impacts, including analysis of possible risks. WEEK 15 f. Honor contracts, agreements, IT TRENDS, ISSUES AND CHALLENGES and assigned responsibilities g. Improve public understanding of computing and its IT TRENDS consequences - A general direction in which h. Access computing and something is developing or changing. communication resources only VARIETY OF TRENDS: when authorized to do so Industry 3. ORGANIZATIONAL Banking LEADERSHIP IMPERATIVES Education a. Articulate social Business responsibilities of members of Health an organizational unit and encourage full acceptance of those responsibilities. TRENDS : INDUSTRY b. Manage personnel and INDUSTRY SECTORS resources to design and build ○ Local Companies information systems that ○ Foreign Companies enhance the quality of FOOD INDUSTRY working life. ○ Universal Robina c. Acknowledge and support ○ Monde Nissin proper and authorized uses of BEVERAGE INDUSTRY an organization’s computing ○ San Miguel Brewery and communication resources. ○ Pepsi Philippines d. Ensures that users and those TWO MAJOR TRENDS IN INDUSTRY who will be affected by a SECTOR system have their needs 1. INTERNET OF THINGS (IoT) clearly articulated during the - Becoming an increasing topic assessment and design of of conversation both in requirements later workplace and in a society at e. Articulate and support policies large. that protect the dignity of - Can give an impact of how we users and others affected by a live and work. computing system. - Examples: Sensors, can easily integrate with cloud electronics, and robotics applications. SUMMARY FOR THE SUPPORTING - Lawrence Qua – Chair & ARTICLES: Chief Executive Officer of Groups to Mull over IoT Ionics-EMS Development in the Philippines - Big Data – refers to the - It is anticipated that voluminous amount of data expenditure on the Internet of from traditional and digital Things (IoT) in the sources that could be mined Philippines will increase 13 for valuable insights on times from its market value in human behavior such as 2014. trends, patterns, and - Industry Platform Pte. Ltd associations, in turn boosting (IPPL) – a Singapore business intelligence. incorporated firm focused on - Luis Pineda – President and the global telecommunications Country General Manager at sector. IBM Philippines - Ellaine Cedillo – the Head - Ionic-EMS and IBM – had a Organizer of IPPL long partnership that began in - IPPL said it forecast IoT in the 1990 and continued over the Philippines to grow from decades with evolving $55.1 million in 2014 to programs and technologies. $766.8 million in 2020 Ionics, IBM team up on high-tech 2. IT AUTOMATION products - Help many companies achieve - With the help of cloud, greater productivity among its mobile, and big data analytics, employees by using a division of electronics computers and software manufacturer Ionic Inc. has programs to do the task. partnered with global - Examples: Accounting technology giant IBM to Systems, Production Systems, create cutting-edge products and Security Systems that run on the Internet of SUMMARY FOR THE SUPPORTING Things (IoT). ARTICLES: - The Internet of Things (IoT) Makati fully implements biometric is a network of physical timekeeping system objects, such as devices, home - The Makati City government appliances, or industrial has finally implemented the equipment, that include use of the Automated embedded technology that Biometrics Timekeeping enables communication and System in monitoring daily interaction. attendance of employees - Blue Mix – an working in its offices at the implementation of IBM’s City Hall complex in open cloud architecture based Barangay Población. on open source of platform. - According to Makati Mayor - Cloud Foundry - delivers Jejomar Binay, the move was enterprise-level service that in keeping with the commitment of the city - offers a customer just about every government to harnessing service traditionally available through technology to promote a local branch, including deposits, transparency and efficiency in money transfers, and bill payments its operations and services. SUMMARY FOR THE SUPPORTING - He also said that, aside from ARTICLES: ensuring the accuracy of daily More Filipinos warming up to time records and thwarting online banking attempts of time theft, the new - 3 out 4 Filipinos are now time keeping system also comfortable conducting online promotes fast and efficient banking transactions, based on payroll calculations. a Citigroup online poll. - According to City Personnel - As od September 2012, there’s Officer Vissia Marie Aldon, already a 1,000,000 mobile using the system eliminated banking users for Citi in Asia. the possibility of employees - One-Time Personal making ‘proxy’ time-in ot Identification Number (PIN) time-out for other employees. – a unique six digit PIN, sent Property consultant bares future of via SMS, which allows users work to access their account details - According to a document, and complete online telecommunication companies transactions via Citibank and property developers will online. be having closer collaboration - “Call Me” – it’s a service for in developing the future clients who wish to apply for workplace. another credit card, to those - In a research paper titled “The who have yet to own a Future of Work”, Jones Lang Citibank credit card. La Salle Inc. head of corporate solutions research in Asia TRENDS : EDUCATION Pacific Susan Sutherland said the traditional office LEARNING MANAGEMENT workplace is gradually going SYSTEM (LMS) to be replaced by a new - To deliver, manage and keep concept anchored on track students’ progress. It technology developments. releases to e-learning. - Examples: Internet of Things E-LEARNING (IoT) , Artificial Intelligence, - electronic technology to Robotics access educational curriculum outside of traditional classroom. TRENDS : BANKING DISTANCE LEARNING ONLINE BANKING - refers to a program, course or - also known as “internet banking” or degree that is delivered online. “web banking” SUMMARY FOR SUPPORTING - allows a user to execute financial ARTICLES transactions via the internet Global Filipino School enhance e-learning with cloudfone tablets - Under global Filipino schools without having a social media are provided with unparalleled presence is almost unheard. online connectivity to give - The importance of social media in homeroom teachers access to business’ marketing will likely limitless teaching and learning continue to increase the market. An engagement available on the increasing number of businesses are internet. turning to social media influencers to PLDT Enterprise rolls out market their product. e-learning program to aid millennial students. TRENDS : HEALTH - Offers PLDT IGate, Smart Wifi, Smart M2M sims, Smart E-HEALTH Prepaid sims customized - Refers to the use of information and website with e-commerce communication technology in health capability to help establish care. online preference - Synonym for Health IT a. Used to improve and extend health care and health TRENDS : BUSINESS information. ELECTRONIC COMMERCE OR b. Used to alert, monitor, and E-COMMERCE control the spread of - A term for any type of communicable disease. business or commercial c. Used for the exchange of transaction that involves the health data transfer of information across d. Used to promote continuous the internet. medical training, education, - It covers a range of different and research for health care types of businesses, from providers. consumer based retail sites and auction or music sites, to WEEK 16 business exchanges trading IT ISSUES AND CHALLENGES goods and services between corporations. - Comparable to other industries, there - E-commerce businesses to are a lot of Issues and challenges that meet customers where they affect every aspect of society are. While it may seem like IT CAN BE FOUND IN: everything in commerce is Industry evolving, we narrowed it Banking down to the biggest trends that Education will affect businesses in the Business coming months and years. Health - Powering online retail ISSUES AND CHALLENGE : forward. INDUSTRY WHAT ARE THE TRENDS IN - One major challenge brought up by E-COMMERCE MARKET? the introduction of computers at work - The e-commerce landscape is getting is preserving the security and integrity more competitive. Running a business of the computer system. - Email exchanges or conversation in SPYWARE local chat rooms are typically used as - It is any software that installs means of communication in office itself on your computer and settings. starts covertly monitoring - This situation makes it possible for your online behavior without malicious software to be distributed your knowledge or throughout the entire corporation, permission. whether consciously or - It is a kind of malware that unintentionally. secretly gathers information - Any software that has the potential to about a person or organization harm a computer system is referred to and relays this data to other as malicious software, or malware. parties. RANSOMWARE TYPES OF MALWARE - It is a type of malicious software (malware) that VIRUS threaten to publish or block - A computer software that has access to data or a computer the ability to replicate itself system, usually by encrypting and spread infection without it, until the victim pays a the user’s knowledge or ransom fee to the attacker. consent. - In many cases, the ransom - It has the ability to corrupt or demand comes with the delete data on a computer, deadline. propagate to other computers via email, or even completely wipe out a hard drive. ISSUES AND CHALLENGE : BANKING WORM - A computer worm is a type of Security malware that replicates itself Technical Issues and spreads to other Lack of Personal Relationship computers while still functioning on infected ones. ISSUES AND CHALLENGE : - It reproduces itself to infect EDUCATION other systems. - With online learning being accepted TROJAN into schools as part of the teaching and - Malware that poses as learning methodology, one of the trustworthy programs or things that schools need to consider is software. monitoring and management. - Attackers have access to all - However, the use of IT in today’s actions that a legitimate user education system still possess issues could perform once they are and challenges to both students and within the network, including teachers. exporting files, editing data, 5 COMMON PROBLEMS FACED BY deleting files, and otherwise STUDENTS IN E-LEARNING changing the contents of the ADAPTABILITY STRUGGLE device. - Students with a “traditional” mindset find it difficult to adapt to e-learning. - Understanding the benefits of - A regular schedule planner eLearning and discussing would be a significant help to them with peers may change these learners, as they could their mindset. even set reminders for their - Online discussions demand courses and assignments. springing into action, rather SELF MOTIVATION than passive listening and - Students need to find notes taking are expected in a motivation to follow the new traditional classroom educational trends and also TECHNICAL ISSUES properly equip themselves for - Many students are not future challenges in their provided with the high education and careers. bandwidth or strong internet - Only a positive attitude will connection that online courses help them overcome the require. challenges in eLearning, - Weak monitors make it hard to though this is hard to practice, follow the Course students need to understand Management System and their that it is necessary. learning experience becomes problematic. ISSUES AND CHALLENGES : - Some of them don’t even own BUSINESS computers and seek help in How did Facebook know what you were Learning Resource Centers for looking at in those sites? technical assistance. ADWARE – a program designed to COMPUTER LITERACY display advertisements on your - Lack of computer literacy is a computer, redirect your search major issue among students requests to advertising websites, and today. collect marketing-type data about - Many students cannot operate yourself. basic programs such as Microsoft Word and Is it a bad things? PowerPoint. - It depends. - Technical proficiency is a - An adware can be considered as a must for following online legitimate alternative offered to courses. consumers who do not wish to pay for - Having a fundamental software. knowledge of computer - There are many ad-supported hardware would help them programs, games or utilities that are participate in online classes distributed as adware, which is often without problems called as freeware. TIME MANAGEMENT - Some applications have pop-up - Most adults prefer web-based advertisements that if a user wishes to learning programs for their remove them, a certain fee should be place and time flexibility, but paid to make the apps ad-free. they rarely have the time to take the courses due to their various everyday commitments. ISSUES AND CHALLENGES : LAW THAT PROTECTS OUR DATA HEALTH PRIVACY (UNITED STATES): Health Insurance Portability and - Patients are kept confidential. Accountability Act (HIPAA) in 1996 - However, with the introduction of - Designed to promote the technology, and with hospitals and confidentiality and portability clinics leaning towards automation, of patient records, as well as patient records have shifted from to develop data security paper to digital. standards for consistency in - With this concerns regarding data the Healthcare industry. security and data confidentiality of IMPORTANCE OF KNOWING IT patients have increased. TRENDS, ISSUES AND CHALLENGES You’ll continually gain new skills by WHY THERE IS SUCH AN INTERNET following trends, including how to use IN PATIENT? new technologies, engage in new - According to the International activities, and increase your efficiency. Association of Privacy Professionals, This will give you more options to “a medical record is more valuable choose from, which will allow you to than credit card on the black market.” try more things out and use them to - According to the World Privacy come up with fresh ideas. Forum, “a medical record, including a Problems and challenges are vital name, address, Social Security components of life that help you gain number, and health ID typically goes experiences, teach you lessons, and for & 50 on the online black market become stronger and wiser. [whereas] an active credit card sells Problem force us to change and for just $3.” evolve. People’s desire for a life free of LAW THAT PROTECTS OUR DATA difficulties is their main challenge PRIVACY (PHILIPPINES): Data Privacy Act (DPA) of 2012 - Implements data protection measures in their data processing systems to protect confidentiality of their patient’s personal information and medical records. - Violation of data privacy involves penalties. - Under this law, the penalty for unauthorized disclosure of personal information is P1, 000, 000. - The penalty exceeds to P2, 000, 000 if the acts involves sensitive personal information.

Use Quizgecko on...
Browser
Browser