Potentials of Internet of Things (IoT) in Malaysian Construction Industry
Journal: Annals of Emerging Technologies in Computing (AETiC) (Vol.2, No. 4)Publication Date: 2018-10-01
Authors : Syamsul H. Mahmud; Laromi Assan; Rashidul Islam;
Page : 44-52
Keywords : Internet of Things; Construction Industry; Industrial Revolution 4.0; Augmented Reality; Waste Management;
Abstract
IoT is a man-made technology conceptualized by intelligent virtual objects, which capable of knowing all things and allows the devices around themselves to interact automatically without human control. Every year, the number of IoT devices usage is exponentially increasing and estimated as much as 75.44 billion devices will be connected in IoT network. In line with the expansion of the IoT network, the construction industry should take into consideration as otherwise the construction industry will be left behind by other industries. This is because the construction industry should utilize the applications offered by IoT to ensure the smoothness of the construction industry in the project. Therefore, the objective of this study is to identify the types of IoT applications used in the construction industry in Malaysia. The research method used to identify the types of IoT applications used is through the questionnaire method. The questionnaire was analysed using nominal analysis. A study was conducted on construction industry players which comprising of government agencies, developers, architects, engineers, quantity surveyors and class G7 contractors covering all states in Malaysia. The findings show that among the many types of IoT applications used by construction industry players are social media such as WhatsApp, Telegram and Facebook for discussion and communication purposes, the use of email for information and communication exchange and website usage as a source of reference to obtain data on company profiles, acts and policy, price quotes and so on.
Other Latest Articles
- Sensor Networks Attacks Classifications and Mitigation
- Hardening CISCO Devices based on Cryptography and Security Protocols - Part II: Implementation and Evaluation
- Object Identification Based on the Automated Extraction of Spatial Semantics from Web3D Scenes
- The British Electronics and Computing Industries: Past, Present and Future
- Hardening CISCO Devices based on Cryptography and Security Protocols - Part One: Background Theory
Last modified: 2019-01-01 22:31:00