35,346 research outputs found
A Lightweight and Flexible Mobile Agent Platform Tailored to Management Applications
Mobile Agents (MAs) represent a distributed computing technology that
promises to address the scalability problems of centralized network management.
A critical issue that will affect the wider adoption of MA paradigm in
management applications is the development of MA Platforms (MAPs) expressly
oriented to distributed management. However, most of available platforms impose
considerable burden on network and system resources and also lack of essential
functionality. In this paper, we discuss the design considerations and
implementation details of a complete MAP research prototype that sufficiently
addresses all the aforementioned issues. Our MAP has been implemented in Java
and tailored for network and systems management applications.Comment: 7 pages, 5 figures; Proceedings of the 2006 Conference on Mobile
Computing and Wireless Communications (MCWC'2006
Management system requirements for wireless systems beyond 3G
This paper presents a comprehensive description of various management system requirements for systems beyond 3G, which have been identified as a result of the Software Based Systems activities within the Mobile VCE Core 2 program. Specific requirements for systems beyond 3G are discussed and potential technologies to address them proposed. The analysis has been carried out from network, service and security viewpoints
Mobile Water Payment Innovations in Urban Africa
This study assess mobile payment options for water service bills in four urban African contexts. Systems are evaluated to identify differences in adoption levels and motivations and barriers to uptake; how costs are distributed among water service providers, mobile network operators, and customers; and mobile payment applications and designs. Data was collected through interviews with water service providers, mobile network operators and service regulators, as well as a household survey in one of the study regions and the aid of World Bank and national water regulator data. Mobile water payment adoption rates were low, but there was also evidence that key barriers such as limited awareness, lack of physical proof of payment, and high transaction tariffs, could be overcome. Increased mobile water payment is found to result in considerable savings in time and money for consumers, revenue for mobile network operators, and perhaps most importantly, strengthened finances for water service providers to improve their ability to provide sustainable service
The Digitalisation of African Agriculture Report 2018-2019
An inclusive, digitally-enabled agricultural transformation could help achieve meaningful livelihood improvements for Africaâs smallholder farmers and pastoralists. It could drive greater engagement in agriculture from women and youth and create employment opportunities along the value chain. At CTA we staked a claim on this power of digitalisation to more systematically transform agriculture early on. Digitalisation, focusing on not individual ICTs but the application of these technologies to entire value chains, is a theme that cuts across all of our work. In youth entrepreneurship, we are fostering a new breed of young ICT âagripreneursâ. In climate-smart agriculture multiple projects provide information that can help towards building resilience for smallholder farmers. And in women empowerment we are supporting digital platforms to drive greater inclusion for women entrepreneurs in agricultural value chains
Community-Based Security for the Internet of Things
With more and more devices becoming connectable to the internet, the number
of services but also a lot of threats increases dramatically. Security is often
a secondary matter behind functionality and comfort, but the problem has
already been recognized. Still, with many IoT devices being deployed already,
security will come step-by-step and through updates, patches and new versions
of apps and IoT software. While these updates can be safely retrieved from app
stores, the problems kick in via jailbroken devices and with the variety of
untrusted sources arising on the internet. Since hacking is typically a
community effort? these days, security could be a community goal too. The
challenges are manifold, and one reason for weak or absent security on IoT
devices is their weak computational power. In this chapter, we discuss a
community based security mechanism in which devices mutually aid each other in
secure software management. We discuss game-theoretic methods of community
formation and light-weight cryptographic means to accomplish authentic software
deployment inside the IoT device community
Internet of robotic things : converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT Platforms
The Internet of Things (IoT) concept is evolving rapidly and influencing newdevelopments in various application domains, such as the Internet of MobileThings (IoMT), Autonomous Internet of Things (A-IoT), Autonomous Systemof Things (ASoT), Internet of Autonomous Things (IoAT), Internetof Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc.that are progressing/advancing by using IoT technology. The IoT influencerepresents new development and deployment challenges in different areassuch as seamless platform integration, context based cognitive network integration,new mobile sensor/actuator network paradigms, things identification(addressing, naming in IoT) and dynamic things discoverability and manyothers. The IoRT represents new convergence challenges and their need to be addressed, in one side the programmability and the communication ofmultiple heterogeneous mobile/autonomous/robotic things for cooperating,their coordination, configuration, exchange of information, security, safetyand protection. Developments in IoT heterogeneous parallel processing/communication and dynamic systems based on parallelism and concurrencyrequire new ideas for integrating the intelligent âdevicesâ, collaborativerobots (COBOTS), into IoT applications. Dynamic maintainability, selfhealing,self-repair of resources, changing resource state, (re-) configurationand context based IoT systems for service implementation and integrationwith IoT network service composition are of paramount importance whennew âcognitive devicesâ are becoming active participants in IoT applications.This chapter aims to be an overview of the IoRT concept, technologies,architectures and applications and to provide a comprehensive coverage offuture challenges, developments and applications
- âŠ