Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (14)

Search Parameters:
Keywords = Azure cloud architecture

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
58 pages, 901 KB  
Review
A Comprehensive Evaluation of IoT Cloud Platforms: A Feature-Driven Review with a Decision-Making Tool
by Ioannis Chrysovalantis Panagou, Stylianos Katsoulis, Evangelos Nannos, Fotios Zantalis and Grigorios Koulouras
Sensors 2025, 25(16), 5124; https://doi.org/10.3390/s25165124 - 18 Aug 2025
Viewed by 753
Abstract
The rapid proliferation of Internet of Things (IoT) devices has led to a growing ecosystem of Cloud Platforms designed to manage, process, and analyze IoT data. Selecting the optimal IoT Cloud Platform is a critical decision for businesses and developers, yet it presents [...] Read more.
The rapid proliferation of Internet of Things (IoT) devices has led to a growing ecosystem of Cloud Platforms designed to manage, process, and analyze IoT data. Selecting the optimal IoT Cloud Platform is a critical decision for businesses and developers, yet it presents a significant challenge due to the diverse range of features, pricing models, and architectural nuances. This manuscript presents a comprehensive, feature-driven review of twelve prominent IoT Cloud Platforms, including AWS IoT Core, IoT on Google Cloud Platform, and Microsoft Azure IoT Hub among others. We meticulously analyze each platform across nine key features: Security, Scalability and Performance, Interoperability, Data Analytics and AI/ML Integration, Edge Computing Support, Pricing Models and Cost-effectiveness, Developer Tools and SDK Support, Compliance and Standards, and Over-The-Air (OTA) Update Capabilities. For each feature, platforms are quantitatively scored (1–10) based on an in-depth assessment of their capabilities and offerings at the time of research. Recognizing the dynamic nature of this domain, we present our findings in a two-dimensional table to provide a clear comparative overview. Furthermore, to empower users in their decision-making process, we introduce a novel, web-based tool for evaluating IoT Cloud Platforms, called the “IoT Cloud Platforms Selector”. This interactive tool allows users to assign personalized weights to each feature, dynamically calculating and displaying weighted scores for each platform, thereby facilitating a tailored selection process. This research provides a valuable resource for researchers, practitioners, and organizations seeking to navigate the complex landscape of IoT Cloud Platforms. Full article
Show Figures

Figure 1

44 pages, 1716 KB  
Article
Creating Automated Microsoft Bicep Application Infrastructure from GitHub in the Azure Cloud
by Vladislav Manolov, Daniela Gotseva and Nikolay Hinov
Future Internet 2025, 17(8), 359; https://doi.org/10.3390/fi17080359 - 7 Aug 2025
Viewed by 473
Abstract
Infrastructure as code (IaC) is essential for modern cloud development, enabling teams to define, deploy, and manage infrastructure in a consistent and repeatable manner. As organizations migrate to Azure, selecting the right approach is crucial for managing complexity, minimizing errors, and supporting DevOps [...] Read more.
Infrastructure as code (IaC) is essential for modern cloud development, enabling teams to define, deploy, and manage infrastructure in a consistent and repeatable manner. As organizations migrate to Azure, selecting the right approach is crucial for managing complexity, minimizing errors, and supporting DevOps practices. This paper examines the use of Azure Bicep with GitHub Actions to automate infrastructure deployment for an application in the Azure cloud. It explains how Bicep improves readability, modularity, and integration compared to traditional ARM templates and other automation tools. The solution utilizes a modular Bicep design to deploy resources, including virtual networks, managed identities, container apps, databases, and AI services, with environment-specific parameters for development, QA, and production. GitHub Actions workflows automate the building, deployment, and tearing down of infrastructure, ensuring consistent deployments across environments. Security considerations include managed identities, private networking, and secret management in continuous integration (CI) and continuous delivery (CD) pipelines. This paper provides a detailed architectural overview, workflow analysis, and implementation guidance to help teams adopt a robust, automated approach to Azure infrastructure deployment. By leveraging automation tooling and modern DevOps practices, organizations can streamline delivery and maintain secure, maintainable cloud environments. Full article
(This article belongs to the Special Issue IoT, Edge, and Cloud Computing in Smart Cities, 2nd Edition)
Show Figures

Graphical abstract

22 pages, 2229 KB  
Article
A Structured Data Model for Asset Health Index Integration in Digital Twins of Energy Converters
by Juan F. Gómez Fernández, Eduardo Candón Fernández and Adolfo Crespo Márquez
Energies 2025, 18(12), 3148; https://doi.org/10.3390/en18123148 - 16 Jun 2025
Viewed by 645
Abstract
A persistent challenge in digital asset management is the lack of standardized models for integrating health assessment—such as the Asset Health Index (AHI)—into Digital Twins, limiting their extended implementation beyond individual projects. Asset managers in the energy sector face challenges of digitalization such [...] Read more.
A persistent challenge in digital asset management is the lack of standardized models for integrating health assessment—such as the Asset Health Index (AHI)—into Digital Twins, limiting their extended implementation beyond individual projects. Asset managers in the energy sector face challenges of digitalization such as digital environment selection, employed digital modules (absence of an architecture guide) and their interconnection, sources of data, and how to automate the assessment and provide the results in a friendly decision support system. Thus, for energy systems, the integration of Asset Assessment in virtual replicas by Digital Twins is a complete way of asset management by enabling real-time monitoring, predictive maintenance, and lifecycle optimization. Another challenge in this context is how to compound in a structured assessment of asset condition, where the Asset Health Index (AHI) plays a critical role by consolidating heterogeneous data into a single, actionable indicator easy to interpret as a level of risk. This paper tries to serve as a guide against these digital and structured assessments to integrate AHI methodologies into Digital Twins for energy converters. First, the proposed AHI methodology is introduced, and after a structured data model specifically designed, orientated to a basic and economic cloud implementation architecture. This model has been developed fulfilling standardized practices of asset digitalization as the Reference Architecture Model for Industry 4.0 (RAMI 4.0), organizing asset-related information into interoperable domains including physical hierarchy, operational monitoring, reliability assessment, and risk-based decision-making. A Unified Modeling Language (UML) class diagram formalizes the data model for cloud Digital Twin implementation, which is deployed on Microsoft Azure Architecture using native Internet of Things (IoT) and analytics services to enable automated and real-time AHI calculation. This design and development has been realized from a scalable point of view and for future integration of Machine-Learning improvements. The proposed approach is validated through a case study involving three high-capacity converters in distinct operating environments, showing the model’s effective assistance in anticipating failures, optimizing maintenance strategies, and improving asset resilience. In the case study, AHI-based monitoring reduced unplanned failures by 43% and improved maintenance planning accuracy by over 30%. Full article
(This article belongs to the Section A1: Smart Grids and Microgrids)
Show Figures

Figure 1

32 pages, 1473 KB  
Article
Strengthening Trust in Virtual Trusted Platform Modules: Integrity-Based Anchoring Mechanism for Hyperconverged Environments
by Marcela Santos and Reinaldo Gomes
Appl. Sci. 2025, 15(10), 5698; https://doi.org/10.3390/app15105698 - 20 May 2025
Viewed by 570
Abstract
Virtual Trusted Platform Modules (vTPMs) are widely adopted in commercial cloud platforms such as VMware Cloud, Google Cloud, Microsoft Azure, and Amazon AWS. However, as software-based components, vTPMs do not provide the same security guarantees as hardware TPMs. The existing solutions attempt to [...] Read more.
Virtual Trusted Platform Modules (vTPMs) are widely adopted in commercial cloud platforms such as VMware Cloud, Google Cloud, Microsoft Azure, and Amazon AWS. However, as software-based components, vTPMs do not provide the same security guarantees as hardware TPMs. The existing solutions attempt to mitigate this limitation by anchoring vTPMs to physical TPMs, but such approaches often face challenges in heterogeneous environments and in failure recovery or migration scenarios. Meanwhile, the evolution of data center architectures toward hyperconverged infrastructures introduces new opportunities for security mechanisms by integrating compute, storage, and networking into a single solution. This work proposes a novel mechanism to securely anchor vTPMs in hyperconverged environments. The proposed approach introduces a unified software layer capable of aggregating and managing the physical TPMs available in the data center, establishing a root of trust for vTPM anchoring. It supports scenarios where hardware TPMs are not uniformly available and enables anchoring replication for critical systems. The solution was implemented and evaluated in terms of its performance impact. The results show low computational overhead, albeit with an increase in anchoring time due to the remote anchoring process. Full article
(This article belongs to the Special Issue Secure Cloud Computing Infrastructures)
Show Figures

Figure 1

41 pages, 10397 KB  
Article
Analysis of Azure Zero Trust Architecture Implementation for Mid-Size Organizations
by Vedran Dakić, Zlatan Morić, Ana Kapulica and Damir Regvart
J. Cybersecur. Priv. 2025, 5(1), 2; https://doi.org/10.3390/jcp5010002 - 30 Dec 2024
Cited by 2 | Viewed by 37702
Abstract
The Zero Trust Architecture (ZTA) security system follows the “never trust, always verify” principle. The process constantly verifies users and devices trying to access resources. This paper describes how Microsoft Azure uses ZTA to enforce strict identity verification and access rules across the [...] Read more.
The Zero Trust Architecture (ZTA) security system follows the “never trust, always verify” principle. The process constantly verifies users and devices trying to access resources. This paper describes how Microsoft Azure uses ZTA to enforce strict identity verification and access rules across the cloud environment to improve security. Implementation takes time and effort. Azure’s extensive services and customizations require careful design and implementation. Azure administrators need help navigating and changing configurations due to its complex user interface (UI). Each Azure ecosystem component must meet ZTA criteria. ZTAs comprehensive policy definitions, multi-factor and passwordless authentication, and other advanced features are tested in a mid-size business scenario. The document delineates several principal findings concerning the execution of Azure’s ZTA within mid-sized enterprises. Azure ZTA significantly improves security by reducing attack surfaces via ongoing identity verification, stringent access controls, and micro-segmentation. Nonetheless, its execution is resource-demanding and intricate, necessitating considerable expertise and meticulous planning. A notable disparity exists between theoretical ZTA frameworks and their practical implementation, characterized by disjointed management interfaces and user fatigue resulting from incessant authentication requests. The case studies indicate that although Zero Trust Architecture enhances organizational security and mitigates risks, it may disrupt operations and adversely affect user experience, particularly in hybrid and fully cloud-based settings. The study underscores the necessity for customized configurations and the equilibrium between security and usability to ensure effective ZTA implementation. Full article
Show Figures

Figure 1

19 pages, 2376 KB  
Article
Modeling Data Sovereignty in Public Cloud—A Comparison of Existing Solutions
by Stanisław Galij, Grzegorz Pawlak and Sławomir Grzyb
Appl. Sci. 2024, 14(23), 10803; https://doi.org/10.3390/app142310803 - 21 Nov 2024
Cited by 1 | Viewed by 2536
Abstract
Data sovereignty has emerged as a critical concern for enterprises, cloud service providers (hyperscalers), end-users, and policymakers at both national and international levels. In response, cloud-based distributed computing models have been proposed as frameworks to enforce data sovereignty requirements. This study aims to [...] Read more.
Data sovereignty has emerged as a critical concern for enterprises, cloud service providers (hyperscalers), end-users, and policymakers at both national and international levels. In response, cloud-based distributed computing models have been proposed as frameworks to enforce data sovereignty requirements. This study aims to evaluate and enhance data sovereignty practices within public cloud environments. Through a comprehensive literature review, we analyze existing reference architectures and solutions that address data sovereignty, identifying the technological and economic constraints they impose, such as increased computational costs associated with specific frameworks and cryptographic measures. To address these challenges, we propose an abstract data sovereignty model designed to aid system designers and architects in developing compliant cloud-based systems. Additionally, we conduct computational experiments assessing the performance of the IDS connector, a key data sovereignty tool, deployed on the Google Cloud Platform and Microsoft Azure. Results reveal that while the geographic location of the software significantly impacts performance, the choice of cloud platform minimally influences the IDS connector’s efficiency. These findings offer insights into optimizing data sovereignty strategies for cloud solutions, with implications for future system design and policy development. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

17 pages, 3807 KB  
Review
A Survey on IoT Application Architectures
by Abdulkadir Dauda, Olivier Flauzac and Florent Nolot
Sensors 2024, 24(16), 5320; https://doi.org/10.3390/s24165320 - 17 Aug 2024
Cited by 4 | Viewed by 5421
Abstract
The proliferation of the IoT has led to the development of diverse application architectures to optimize IoT systems’ deployment, operation, and maintenance. This survey provides a comprehensive overview of the existing IoT application architectures, highlighting their key features, strengths, and limitations. The architectures [...] Read more.
The proliferation of the IoT has led to the development of diverse application architectures to optimize IoT systems’ deployment, operation, and maintenance. This survey provides a comprehensive overview of the existing IoT application architectures, highlighting their key features, strengths, and limitations. The architectures are categorized based on their deployment models, such as cloud, edge, and fog computing approaches, each offering distinct advantages regarding scalability, latency, and resource efficiency. Cloud architectures leverage centralized data processing and storage capabilities to support large-scale IoT applications but often suffer from high latency and bandwidth constraints. Edge architectures mitigate these issues by bringing computation closer to the data source, enhancing real-time processing, and reducing network congestion. Fog architectures combine the strengths of both cloud and edge paradigms, offering a balanced solution for complex IoT environments. This survey also examines emerging trends and technologies in IoT application management, such as the solutions provided by the major IoT service providers like Intel, AWS, Microsoft Azure, and GCP. Through this study, the survey identifies latency, privacy, and deployment difficulties as key areas for future research. It highlights the need to advance IoT Edge architectures to reduce network traffic, improve data privacy, and enhance interoperability by developing multi-application and multi-protocol edge gateways for efficient IoT application management. Full article
(This article belongs to the Special Issue Cloud and Edge Computing for IoT Applications)
Show Figures

Figure 1

13 pages, 385 KB  
Article
Availability, Scalability, and Security in the Migration from Container-Based to Cloud-Native Applications
by Bruno Nascimento, Rui Santos, João Henriques, Marco V. Bernardo and Filipe Caldeira
Computers 2024, 13(8), 192; https://doi.org/10.3390/computers13080192 - 9 Aug 2024
Cited by 3 | Viewed by 4506
Abstract
The shift from traditional monolithic architectures to container-based solutions has revolutionized application deployment by enabling consistent, isolated environments across various platforms. However, as organizations look for improved efficiency, resilience, security, and scalability, the limitations of container-based applications, such as their manual scaling, resource [...] Read more.
The shift from traditional monolithic architectures to container-based solutions has revolutionized application deployment by enabling consistent, isolated environments across various platforms. However, as organizations look for improved efficiency, resilience, security, and scalability, the limitations of container-based applications, such as their manual scaling, resource management challenges, potential single points of failure, and operational complexities, become apparent. These challenges, coupled with the need for sophisticated tools and expertise for monitoring and security, drive the move towards cloud-native architectures. Cloud-native approaches offer a more robust integration with cloud services, including managed databases and AI/ML services, providing enhanced agility and efficiency beyond what standalone containers can achieve. Availability, scalability, and security are the cornerstone requirements of these cloud-native applications. This work explores how containerized applications can be customized to address such requirements during their shift to cloud-native orchestrated environments. A Proof of Concept (PoC) demonstrated the technical aspects of such a move into a Kubernetes environment in Azure. The results from its evaluation highlighted the suitability of Kubernetes in addressing such a demand for availability and scalability while safeguarding security when moving containerized applications to cloud-native environments. Full article
Show Figures

Figure 1

17 pages, 3042 KB  
Article
Multimodality Video Acquisition System for the Assessment of Vital Distress in Children
by Vincent Boivin, Mana Shahriari, Gaspar Faure, Simon Mellul, Edem Donatien Tiassou, Philippe Jouvet and Rita Noumeir
Sensors 2023, 23(11), 5293; https://doi.org/10.3390/s23115293 - 2 Jun 2023
Cited by 2 | Viewed by 2650
Abstract
In children, vital distress events, particularly respiratory, go unrecognized. To develop a standard model for automated assessment of vital distress in children, we aimed to construct a prospective high-quality video database for critically ill children in a pediatric intensive care unit (PICU) setting. [...] Read more.
In children, vital distress events, particularly respiratory, go unrecognized. To develop a standard model for automated assessment of vital distress in children, we aimed to construct a prospective high-quality video database for critically ill children in a pediatric intensive care unit (PICU) setting. The videos were acquired automatically through a secure web application with an application programming interface (API). The purpose of this article is to describe the data acquisition process from each PICU room to the research electronic database. Using an Azure Kinect DK and a Flir Lepton 3.5 LWIR attached to a Jetson Xavier NX board and the network architecture of our PICU, we have implemented an ongoing high-fidelity prospectively collected video database for research, monitoring, and diagnostic purposes. This infrastructure offers the opportunity to develop algorithms (including computational models) to quantify vital distress in order to evaluate vital distress events. More than 290 RGB, thermographic, and point cloud videos of each 30 s have been recorded in the database. Each recording is linked to the patient’s numerical phenotype, i.e., the electronic medical health record and high-resolution medical database of our research center. The ultimate goal is to develop and validate algorithms to detect vital distress in real time, both for inpatient care and outpatient management. Full article
Show Figures

Figure 1

19 pages, 7980 KB  
Article
Indoor 3D Reconstruction of Buildings via Azure Kinect RGB-D Camera
by Chaimaa Delasse, Hamza Lafkiri, Rafika Hajji, Ishraq Rached and Tania Landes
Sensors 2022, 22(23), 9222; https://doi.org/10.3390/s22239222 - 27 Nov 2022
Cited by 8 | Viewed by 4089
Abstract
With the development of 3D vision techniques, RGB-D cameras are increasingly used to allow easier and cheaper access to the third dimension. In this paper, we focus on testing the potential of the Kinect Azure RGB-D camera in the 3D reconstruction of indoor [...] Read more.
With the development of 3D vision techniques, RGB-D cameras are increasingly used to allow easier and cheaper access to the third dimension. In this paper, we focus on testing the potential of the Kinect Azure RGB-D camera in the 3D reconstruction of indoor scenes. First, a series of investigations of the hardware was performed to evaluate its accuracy and precision. The results show that the measurements made with the Azure could be exploited for close-range survey applications. Second, we performed a methodological workflow for indoor reconstruction based on the Open3D framework, which was applied to two different indoor scenes. Based on the results, we can state that the quality of 3D reconstruction significantly depends on the architecture of the captured scene. This was supported by a comparison of the point cloud from the Kinect Azure with that from a terrestrial laser scanner and another from a mobile laser scanner. The results show that the average differences do not exceed 8 mm, which confirms that the Kinect Azure can be considered a 3D measurement system at least as reliable as a mobile laser scanner. Full article
(This article belongs to the Section Intelligent Sensors)
Show Figures

Figure 1

26 pages, 7233 KB  
Article
Cloud Data-Driven Intelligent Monitoring System for Interactive Smart Farming
by Kristina Dineva and Tatiana Atanasova
Sensors 2022, 22(17), 6566; https://doi.org/10.3390/s22176566 - 31 Aug 2022
Cited by 32 | Viewed by 6613
Abstract
Smart farms, as a part of high-tech agriculture, collect a huge amount of data from IoT devices about the conditions of animals, plants, and the environment. These data are most often stored locally and are not used in intelligent monitoring systems to provide [...] Read more.
Smart farms, as a part of high-tech agriculture, collect a huge amount of data from IoT devices about the conditions of animals, plants, and the environment. These data are most often stored locally and are not used in intelligent monitoring systems to provide opportunities for extracting meaningful knowledge for the farmers. This often leads to a sense of missed transparency, fairness, and accountability, and a lack of motivation for the majority of farmers to invest in sensor-based intelligent systems to support and improve the technological development of their farm and the decision-making process. In this paper, a data-driven intelligent monitoring system in a cloud environment is proposed. The designed architecture enables a comprehensive solution for interaction between data extraction from IoT devices, preprocessing, storage, feature engineering, modelling, and visualization. Streaming data from IoT devices to interactive live reports along with built machine learning (ML) models are included. As a result of the proposed intelligent monitoring system, the collected data and ML modelling outcomes are visualized using a powerful dynamic dashboard. The dashboard allows users to monitor various parameters across the farm and provides an accessible way to view trends, deviations, and patterns in the data. ML models are trained on the collected data and are updated periodically. The data-driven visualization enables farmers to examine, organize, and represent collected farm’s data with the goal of better serving their needs. Performance and durability tests of the system are provided. The proposed solution is a technological bridge with which farmers can easily, affordably, and understandably monitor and track the progress of their farms with easy integration into an existing IoT system. Full article
(This article belongs to the Special Issue Ubiquitous Sensing and Intelligent Systems)
Show Figures

Figure 1

20 pages, 1653 KB  
Article
SCADA-Based Message Generator for Multi-Vendor Smart Grids: Distributed Integration and Verification of TASE.2
by Petr Ilgner, Petr Cika and Martin Stusek
Sensors 2021, 21(20), 6793; https://doi.org/10.3390/s21206793 - 13 Oct 2021
Cited by 3 | Viewed by 2694
Abstract
Recent developments in massive machine-type communication (mMTC) scenarios have given rise to never-seen requirements, which triggered the Industry 4.0 revolution. The new scenarios bring even more pressure to comply with the reliability and communication security and enable flawless functionality of the critical infrastructure, [...] Read more.
Recent developments in massive machine-type communication (mMTC) scenarios have given rise to never-seen requirements, which triggered the Industry 4.0 revolution. The new scenarios bring even more pressure to comply with the reliability and communication security and enable flawless functionality of the critical infrastructure, e.g., smart grid infrastructure. We discuss typical network grid architecture, communication strategies, and methods for building scalable and high-speed data processing and storage platform. This paper focuses on the data transmissions using the sets of standards IEC 60870-6 (ICCP/TASE.2). The main goal is to introduce the TASE.2 traffic generator and the data collection back-end with the implemented load balancing functionality to understand the limits of current protocols used in the smart grids. To this end, the assessment framework enabling generating and collecting TASE.2 communication with long-term data storage providing high availability and load balancing capabilities was developed. The designed proof-of-concept supports complete cryptographic security and allows users to perform the complex testing and verification of the TASE.2 network nodes configuration. Implemented components were tested in a cloud-based Microsoft Azure environment in four geographically separated locations. The findings from the testing indicate the high performance and scalability of the proposed platform, allowing the proposed generator to be also used for high-speed load testing purposes. The load-balancing performance shows the CPU usage of the load-balancer below 15% while processing 5000 messages per second. This makes it possible to achieve up to a 7-fold improvement of performance resulting in processing up to 35,000 messages per second. Full article
Show Figures

Figure 1

25 pages, 19693 KB  
Article
MoSIoT: Modeling and Simulating IoT Healthcare-Monitoring Systems for People with Disabilities
by Santiago Meliá, Shahabadin Nasabeh, Sergio Luján-Mora and Cristina Cachero
Int. J. Environ. Res. Public Health 2021, 18(12), 6357; https://doi.org/10.3390/ijerph18126357 - 11 Jun 2021
Cited by 27 | Viewed by 5556
Abstract
The need to remotely monitor people with disabilities has increased due to growth in their number in recent years. The democratization of Internet of Things (IoT) devices facilitates the implementation of healthcare-monitoring systems (HMSs) that are capable of supporting disabilities and diseases. However, [...] Read more.
The need to remotely monitor people with disabilities has increased due to growth in their number in recent years. The democratization of Internet of Things (IoT) devices facilitates the implementation of healthcare-monitoring systems (HMSs) that are capable of supporting disabilities and diseases. However, to achieve their full potential, these devices must efficiently address the customization demanded by different IoT HMS scenarios. This work introduces a new approach, called Modeling Scenarios of Internet of Things (MoSIoT), which allows healthcare experts to model and simulate IoT HMS scenarios defined for different disabilities and diseases. MoSIoT comprises a set of models based on the model-driven engineering (MDE) paradigm, which first allows simulation of a complete IoT HMS scenario, followed by generation of a final IoT system. In the current study, we used a real scenario defined by a recognized medical publication for a patient with Alzheimer’s disease to validate this proposal. Furthermore, we present an implementation based on an enterprise cloud architecture that provides the simulation data to a commercial IoT hub, such as Azure IoT Central. Full article
Show Figures

Figure 1

20 pages, 2710 KB  
Article
Internet of Measurement Things Architecture: Proof of Concept with Scope of Accreditation
by M. Cagri Kaya, Mahdi Saeedi Nikoo, Michael L. Schwartz and Halit Oguztuzun
Sensors 2020, 20(2), 503; https://doi.org/10.3390/s20020503 - 16 Jan 2020
Cited by 12 | Viewed by 4101
Abstract
Many industries, such as manufacturing, aviation, and power generation, employ sensitive measurement devices to be calibrated by certified experts. The diversity and sophistication of measurement devices and their calibration needs require networked and automated solutions. Internet of Measurement Things (IoMT) is an architectural [...] Read more.
Many industries, such as manufacturing, aviation, and power generation, employ sensitive measurement devices to be calibrated by certified experts. The diversity and sophistication of measurement devices and their calibration needs require networked and automated solutions. Internet of Measurement Things (IoMT) is an architectural framework that is based on the Industrial Internet of Things for the calibration industry. This architecture involves a layered model with a cloud-centric middle layer. In this article, the realization of this conceptual architecture is described. The applicability of the IoMT architecture in the calibration industry is shown through an editor application for Scope of Accreditation. The cloud side of the implementation is deployed to Microsoft Azure. The editor itself is created as a cloud service, and IoT Hub is used to collect data from calibration laboratories. By adapting the IoMT architecture to a commonly used cloud platform, considerable progress is achieved to encompass Metrology data and serve the majority of the stakeholders. Full article
Show Figures

Figure 1

Back to TopTop