4,982 research outputs found

    Collaboration of Smart IoT Devices Exemplified With Smart Cupboards

    Full text link
    [EN] The variety of smart things connected to Internet hampers the possibility of having a standalone solution for service-centric provisioning in the Internet of Things (IoT). The different features of smart objects in processing capabilities, memory, and size make it difficult for final users to learn the installation and usage of all these devices in collaboration with other IoT objects, hindering the user experience. In this context, we propose a collaboration mechanism for IoT devices based on the multi-agent systems with mobile agents. This paper illustrates the current approach with smart cupboards for potentially tracking memory losses. The user study revealed that users found working products of this approach usable, easy-to-learn and useful, and they agreed that the current approach could provide a high quality of experience not only in the specific case of service-centric IoT devices for tracking memory losses but also in other domains. The learning capability by means of this approach was showed with significant reductions of reaction times and number of errors over the first and second tests with the current approach. System response timesThis work was supported in part by the Dpto. de Innovacion, Investigacion y Universidad del Gobierno de Aragon through the program FEDER Aragon 2014-2020 Construyendo Europa desde Aragon under Grant T49_17R, in part by the University of Zaragoza and the Foundation Ibercaja through the Research Project Construccion de un framework para agilizar el desarrollo de aplicaciones moviles en el ambito de la salud under Grant JIUZ-2017-TEC-03, in part by the Estancias de movilidad en el extranjero Jose Castillejo para jovenes doctores Program, Spanish Ministry of Education, Culture and Sport, under Grant CAS17/00005, in part by the Universidad de Zaragoza, Fundacion Bancaria Ibercaja and Fundacion CAI, Programa Ibercaja-CAI de Estancias de Investigacion, under Grant IT24/16 and Grant IT1/18, in part by the Research Project Desarrollo Colaborativo de Soluciones AAL, Spanish Ministry of Economy and Competitiveness, under Grant TIN2014-57028-R, in part by the Organismo Autonomo Programas Educativos Europeos under Grant 2013-1-CZ1-GRU06-14277, and in part by the Ministerio de Economia y Competitividad through the Programa Estatal de Fomento de la Investigacion Cientifica y Tecnica de Excelencia, Subprograma Estatal de Generacion de Conocimiento, under Grant TIN2017-84802-C2-1-P.García-Magariño, I.; González-Landero, F.; Amariglio, R.; Lloret, J. (2019). Collaboration of Smart IoT Devices Exemplified With Smart Cupboards. IEEE Access. 7:9881-9892. https://doi.org/10.1109/ACCESS.2018.2890393S98819892

    Plataforma de serviços para monitorização da cadeia de valor do pescado

    Get PDF
    Traceability in the food value chain is a topic of interest due to the advantages it brings to both the consumers, producers and regulatory authorities. This thesis describes my contributions during the design and implementation of a microservice based middleware for the Portuguese fish value chain considering current practices in the industry and the requirements of the stakeholders involved in the project, with the goal of integrating all the traceability information available from each operator to provide customers with the full story of the products they purchase. During this project I assumed many roles such as development, operations and even some security allowing me to improve my skills in all these fields and experimenting with the latest cloud native technologies such as containers and with DevOps practices.A rastreabilidade na cadeia de valor alimentar é um tema de interesse pelas vantagens que traz aos consumidores, produtores e autoridades reguladoras. Esta dissertação descreve as minhas contribuições durante a conceção e implementação de um middleware baseado em micro-serviços para a cadeia de valor do pescado portuguesa considerando as práticas atuais da indústria e os requisitos das partes interessadas envolvidas no projeto, com o objetivo de integrar toda a informação de rastreabilidade disponível de cada um dos operadores para fornecer aos clientes a história completa dos produtos que adquirem. Durante este projeto, assumi muitas funções, como desenvolvimento, operações e até mesmo alguma segurança, o que me permitiu melhorar as minhas capacidades em todos essas disciplinas e experimentar as mais recentes tecnologias nativas da nuvem, como contentores e práticas de DevOps.Mestrado em Engenharia Informátic

    Internet Predictions

    Get PDF
    More than a dozen leading experts give their opinions on where the Internet is headed and where it will be in the next decade in terms of technology, policy, and applications. They cover topics ranging from the Internet of Things to climate change to the digital storage of the future. A summary of the articles is available in the Web extras section

    Holistic System Design for Distributed National eHealth Services

    Get PDF
    publishedVersio

    Algorithmic Mechanism Construction bridging Secure Multiparty Computation and Intelligent Reasoning

    Get PDF
    This work presents the construction of intelligent algorithmic mechanism based on multidimensional view of intelligent reasoning, threat analytics, cryptographic solutions and secure multiparty computation. It is basically an attempt of the cross fertilization of distributed AI, algorithmic game theory and cryptography. The mechanism evaluates innate and adaptive system immunity in terms of collective, machine, collaborative, business and security intelligence. It also shows the complexity analysis of the mechanism and experimental results on three test cases: (a) intrusion detection, (b) adaptively secure broadcast and (c) health security

    Cyber-Physical Threat Intelligence for Critical Infrastructures Security

    Get PDF
    Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries between physical security and cybersecurity are blurred. Emerging systems for Critical Infrastructures Security and Protection must therefore consider integrated approaches that emphasize the interplay between cybersecurity and physical security techniques. Hence, there is a need for a new type of integrated security intelligence i.e., Cyber-Physical Threat Intelligence (CPTI). This book presents novel solutions for integrated Cyber-Physical Threat Intelligence for infrastructures in various sectors, such as Industrial Sites and Plants, Air Transport, Gas, Healthcare, and Finance. The solutions rely on novel methods and technologies, such as integrated modelling for cyber-physical systems, novel reliance indicators, and data driven approaches including BigData analytics and Artificial Intelligence (AI). Some of the presented approaches are sector agnostic i.e., applicable to different sectors with a fair customization effort. Nevertheless, the book presents also peculiar challenges of specific sectors and how they can be addressed. The presented solutions consider the European policy context for Security, Cyber security, and Critical Infrastructure protection, as laid out by the European Commission (EC) to support its Member States to protect and ensure the resilience of their critical infrastructures. Most of the co-authors and contributors are from European Research and Technology Organizations, as well as from European Critical Infrastructure Operators. Hence, the presented solutions respect the European approach to CIP, as reflected in the pillars of the European policy framework. The latter includes for example the Directive on security of network and information systems (NIS Directive), the Directive on protecting European Critical Infrastructures, the General Data Protection Regulation (GDPR), and the Cybersecurity Act Regulation. The sector specific solutions that are described in the book have been developed and validated in the scope of several European Commission (EC) co-funded projects on Critical Infrastructure Protection (CIP), which focus on the listed sectors. Overall, the book illustrates a rich set of systems, technologies, and applications that critical infrastructure operators could consult to shape their future strategies. It also provides a catalogue of CPTI case studies in different sectors, which could be useful for security consultants and practitioners as well
    corecore