65,403 research outputs found

    A survey on subjecting electronic product code and non-ID objects to IP identification

    Full text link
    Over the last decade, both research on the Internet of Things (IoT) and real-world IoT applications have grown exponentially. The IoT provides us with smarter cities, intelligent homes, and generally more comfortable lives. However, the introduction of these devices has led to several new challenges that must be addressed. One of the critical challenges facing interacting with IoT devices is to address billions of devices (things) around the world, including computers, tablets, smartphones, wearable devices, sensors, and embedded computers, and so on. This article provides a survey on subjecting Electronic Product Code and non-ID objects to IP identification for IoT devices, including their advantages and disadvantages thereof. Different metrics are here proposed and used for evaluating these methods. In particular, the main methods are evaluated in terms of their: (i) computational overhead, (ii) scalability, (iii) adaptability, (iv) implementation cost, and (v) whether applicable to already ID-based objects and presented in tabular format. Finally, the article proves that this field of research will still be ongoing, but any new technique must favorably offer the mentioned five evaluative parameters.Comment: 112 references, 8 figures, 6 tables, Journal of Engineering Reports, Wiley, 2020 (Open Access

    ISO/EPC Addressing Methods to Support Supply Chain in the Internet of Things

    Full text link
    RFID systems are among the major infrastructures of the Internet of Things, which follow ISO and EPC standards. In addition, ISO standard constitutes the main layers of supply chain, and many RFID systems benefit from ISO standard for different purposes. In this paper, we tried to introduce addressing systems based on ISO standards, through which the range of things connected to the Internet of Things will grow. Our proposed methods are addressing methods which can be applied to both ISO and EPC standards. The proposed methods are simple, hierarchical, and low cost implementation. In addition, the presented methods enhance interoperability among RFIDs, and also enjoys a high scalability, since it well covers all of EPC schemes and ISO supply chain standards. Further, by benefiting from a new algorithm for long EPCs known as selection algorithm, they can significantly facilitate and accelerate the operation of address mapping.Comment: arXiv admin note: text overlap with arXiv:1807.0217

    Characterizing Transgender Health Issues in Twitter

    Full text link
    Although there are millions of transgender people in the world, a lack of information exists about their health issues. This issue has consequences for the medical field, which only has a nascent understanding of how to identify and meet this population's health-related needs. Social media sites like Twitter provide new opportunities for transgender people to overcome these barriers by sharing their personal health experiences. Our research employs a computational framework to collect tweets from self-identified transgender users, detect those that are health-related, and identify their information needs. This framework is significant because it provides a macro-scale perspective on an issue that lacks investigation at national or demographic levels. Our findings identified 54 distinct health-related topics that we grouped into 7 broader categories. Further, we found both linguistic and topical differences in the health-related information shared by transgender men (TM) as com-pared to transgender women (TW). These findings can help inform medical and policy-based strategies for health interventions within transgender communities. Also, our proposed approach can inform the development of computational strategies to identify the health-related information needs of other marginalized populations

    Year One Evaluation of the New York City Department of Education Respect for All Training Program

    Get PDF
    The GLSEN Research Department conducted an evaluation of the New York City Department of Education's (NYC DOE) Respect for All training program for secondary school educators. The two-day training program, which was one component of the NYC DOE's Respect for All initiative, was implemented so that every secondary school in the district had at least one staff member who could support lesbian, gay, bisexual, transgender, and questioning (LGBTQ) students and combat all forms of bias-based bullying and harassment, particularly bias based on sexual orientation, gender identity, and gender expression.In order to evaluate Year One of the training program, GLSEN surveyed 813 educators who participated in the training at three times -- before the training, six weeks after, and six months after. Training participants were also compared to educators who had not yet completed the training. Focus groups were conducted in order to gain a greater, in-depth understanding of participants' experiences in the training. Key findings are listed below.Compared to before the training, after the training educators demonstrated increased:Knowledge of appropriate terms;Access to LGBTQ-related resources;Awareness of how their own practices might have been harmful to LGBTQ students;Empathy for LGBTQ students;Belief in the importance of intervening in anti-LGBTQ remarks;Communication with students and staff about LGBTQ issues;Engagement in activities to create safer schools for LGBTQ students (i.e., supporting Gay-Straight Alliances, including LGBTQ content in curriculum); andFrequency of intervention in anti-LGBTQ name-calling, bullying, and harassment.In addition, compared to educators who had not yet participated in the training, those who had participated in the training indicated higher levels of:Communication with students and staff about LGBTQ issues; andEngagement in activities to create safer schools for LGBTQ students.Findings from the Year One evaluation demonstrate that this training program is an effective means for developing the competency of educators to address bias-based bullying and harassment, and to create safer school environments for LGBTQ students. The findings suggest that providing such training to all school staff, including administrators, would result in an even stronger effect on the school environment. Furthermore, ensuring sufficient opportunities for developing educators' skills in intervening in anti-LGBTQ behaviors could enhance the effectiveness of trainings. To maintain the benefits of training, staff should receive continued and advanced professional development opportunities related to supporting LGBTQ students and combating bias-based bullying and harassment

    Federated Embedded Systems – a review of the literature in related fields

    Get PDF
    This report is concerned with the vision of smart interconnected objects, a vision that has attracted much attention lately. In this paper, embedded, interconnected, open, and heterogeneous control systems are in focus, formally referred to as Federated Embedded Systems. To place FES into a context, a review of some related research directions is presented. This review includes such concepts as systems of systems, cyber-physical systems, ubiquitous computing, internet of things, and multi-agent systems. Interestingly, the reviewed fields seem to overlap with each other in an increasing number of ways

    A Middleware for the Internet of Things

    Full text link
    The Internet of Things (IoT) connects everyday objects including a vast array of sensors, actuators, and smart devices, referred to as things to the Internet, in an intelligent and pervasive fashion. This connectivity gives rise to the possibility of using the tracking capabilities of things to impinge on the location privacy of users. Most of the existing management and location privacy protection solutions do not consider the low-cost and low-power requirements of things, or, they do not account for the heterogeneity, scalability, or autonomy of communications supported in the IoT. Moreover, these traditional solutions do not consider the case where a user wishes to control the granularity of the disclosed information based on the context of their use (e.g. based on the time or the current location of the user). To fill this gap, a middleware, referred to as the Internet of Things Management Platform (IoT-MP) is proposed in this paper.Comment: 20 pages, International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 201
    • …
    corecore