My advice is to start small and simple at first, and add features one at a time, to gain the most benefit. As of now, you will be part of developing an innovative solution. Keep in mind that this architecture is completely new and innovative.
Tutorials and Demos
Tutorial 1: A general introduction
Watch this video to get a detailed overview of the IoTCrawler architecture.
Tutorial 2: Security, Privacy & Trust
Watch this video for a detailed overview of the “Security, Privacy and Trust pillar” of the IoTCrawler architecture and it’s use of Blockchain technology etc.
Demo: IoTCrawler city data search
Watch this video to see the first demo using the IoTCrawler and machine learning that was built at University of Surrey.
Demo: Smart Parking
Watch this video to see the Smart Parking MVP. The interface is a parking recommendation app, running innovative features refined over time in the city of Murcia. IoTCrawler’s ability to securely integrate diverse external data sources, enriching them and making them searchable makes Smart Parking possible.
Demo: Smart Home Energy Insights
This MVP collects energy readings from smart meters and other devices and visualizes insights about real-time and historic energy consumption data. Using IoTCrawler’s semantic, AI-based annotation component, it categorizes devices automatically according to their type and detects smart home appliances connected to smart plugs including locations, all in real-time.
Demo: Smart Room Booking
Smart Room Booking consists of a mobile app frontend and a dynamic dashboard. It offers next level room booking by leveraging IoTCrawler components like Orchestrator to search room-associated metadata – specific sensors for specific information.
Context and MDR query the data context such as temperature, humidity value or motion detection in real time.
With the IoTCrawler you can search for everything that wants to be searchable, not just IoT devices that are open and that are there.
Our goal is to embed capabilities into IoT devices that allow them to control, who are trying to get information from them and whether they are able to get all or part of the information. We develop this kind of control system, that allows the communication to be secure and at the same time controling efficiently how the information has been disclosed.