556 research outputs found

    Survey on Quality of Observation within Sensor Web Systems

    Get PDF
    The Sensor Web vision refers to the addition of a middleware layer between sensors and applications. To bridge the gap between these two layers, Sensor Web systems must deal with heterogeneous sources, which produce heterogeneous observations of disparate quality. Managing such diversity at the application level can be complex and requires high levels of expertise from application developers. Moreover, as an information-centric system, any Sensor Web should provide support for Quality of Observation (QoO) requirements. In practice, however, only few Sensor Webs provide satisfying QoO support and are able to deliver high-quality observations to end consumers in a specific manner. This survey aims to study why and how observation quality should be addressed in Sensor Webs. It proposes three original contributions. First, it provides important insights into quality dimensions and proposes to use the QoO notion to deal with information quality within Sensor Webs. Second, it proposes a QoO-oriented review of 29 Sensor Web solutions developed between 2003 and 2016, as well as a custom taxonomy to characterise some of their features from a QoO perspective. Finally, it draws four major requirements required to build future adaptive and QoO-aware Sensor Web solutions

    Experimental design for a next generation residential gateway

    Get PDF
    Puolella eurooppalaisista kotitalouksista on laajakaistaliittymä. Yleensä käyttäjä kytkeytyy ulkoiseen verkkoon kotireitittimen avulla (residential gateway). Internet-yhteyden ja IP-perustaisten palveluiden kuten VoIP- ja IPTV-palveluiden lisäksi kotireititin muodostaa kotiverkon ytimen kodin verkkolaitteiden liittyessä siihen. Kotiverkkojen lukumäärän ja koon kasvun seurauksena kotiverkoissa voidaan tunnistaa kolme ongelmaa. Ensinnäkin kotiverkkojen hallinta on haastavaa kotiverkossa tuettavien verkkotekniikoiden ja laitteiden määrän kasvaessa. Toiseksi sisällönhallinta. on monimutkaistunut käyttäjien luodessa ja kuluttaessa yhä enemmän sisältöä. Kolmanneksi uudet verkkoperustaiset tekniikat kuten sähköisen terveydenhuollon ratkaisut (e-health) integroituvat usein heikosti olemassa olevien kotiverkkolaitteiden kanssa. Tässä diplomityössä edellä mainittuihin ongelmiin pyritään löytämään yhtenäinen ratkaisu kotireititintä apuna käyttäen. Työssä analysoidaan uudentyyppisen kotireitittimen vaatimuksia käyttämällä hyväksi joukkoa käyttötapauksia. Vaativuusanalyysin perusteella luodaan malli, joka sisältää seuraavat pääkomponentit. (i) Virtuaalisointitekniikkaan pohjautuva kotireititinarkkitehtuuri. (ii) Kotireititinperustainen mekanismi yhteisöverkostoiden pystyttämiseen kotiverkkojen välillä. (iii) Hajautettu tiedostojärjestelmä yhteisöverkkojen pystyttämiseksi ja parannetun sisällönhallinnan ja sisällön jakamisen mahdollistamiseksi. (iv) Mekanismeja joiden avulla vierailevat käyttäjät voivat hyödyntää muiden käyttäjien kotireitittimien resursseja. Työssä. toteutetaan em. ydintoimintoja laaditun mallin perusteella ja toteutuksen toimivuus verifioidaan käyttötapauksiin perustuvalla testauksellaToday over half of the European homes have a broadband Internet connection. Typically, this connection is enabled through a residential gateway device at the users' premises. In addition to facilitating triple play services, this gateway also forms the core of users' home networks by connecting their network-enabled devices. While the number and the size of such home networks keep on increasing, three major problems can be identified in current systems. First, home network management is getting increasingly complex, and a growing number of networking technologies and connected devices must be supported and managed. Second, content management has become difficult. Users are generating an increasing amount of content and this content is stored (and sometimes shared) in an almost anarchical manner across different home network devices as well as online. Third, new network-enabled services, such as e-health systems, are emerging, but are typically poorly integrated into existing home networks. There is a clear need for home networking solutions that address these problems. In this thesis, we adopt a gateway-centric approach to address these problems in a unified manner. We concretise the requirements for a next generation residential gateway by analysing a set of future home networking use cases. These requirements serve as input to our gateway system design. In summary, our design includes the following main components. (i) A residential gateway architecture based on virtualization. This enables new features and new ways to implement the other components of our design. (ii) A gateway-based mechanism to set up community networks between different home networks. (iii) A distributed file system to establish community networks and to enable improved content management and sharing. (iv) Mechanisms for visiting gateway users to utilize other users' gateway resources. We implement these core functionalities and develop a proof-of concept prototype. We successfully validate our prototype through use case driven testbed experiments. Finally, we believe that the insights gained from this study and the prototype implementations are important overall contributions that can be used in the future research to further explore the limitations and opportunities of this gateway-centric approach

    Cognitive Hyperconnected Digital Transformation

    Get PDF
    Cognitive Hyperconnected Digital Transformation provides an overview of the current Internet of Things (IoT) landscape, ranging from research, innovation and development priorities to enabling technologies in a global context. It is intended as a standalone book in a series that covers the Internet of Things activities of the IERC-Internet of Things European Research Cluster, including both research and technological innovation, validation and deployment. The book builds on the ideas put forward by the European Research Cluster, the IoT European Platform Initiative (IoT-EPI) and the IoT European Large-Scale Pilots Programme, presenting global views and state-of-the-art results regarding the challenges facing IoT research, innovation, development and deployment in the next years. Hyperconnected environments integrating industrial/business/consumer IoT technologies and applications require new IoT open systems architectures integrated with network architecture (a knowledge-centric network for IoT), IoT system design and open, horizontal and interoperable platforms managing things that are digital, automated and connected and that function in real-time with remote access and control based on Internet-enabled tools. The IoT is bridging the physical world with the virtual world by combining augmented reality (AR), virtual reality (VR), machine learning and artificial intelligence (AI) to support the physical-digital integrations in the Internet of mobile things based on sensors/actuators, communication, analytics technologies, cyber-physical systems, software, cognitive systems and IoT platforms with multiple functionalities. These IoT systems have the potential to understand, learn, predict, adapt and operate autonomously. They can change future behaviour, while the combination of extensive parallel processing power, advanced algorithms and data sets feed the cognitive algorithms that allow the IoT systems to develop new services and propose new solutions. IoT technologies are moving into the industrial space and enhancing traditional industrial platforms with solutions that break free of device-, operating system- and protocol-dependency. Secure edge computing solutions replace local networks, web services replace software, and devices with networked programmable logic controllers (NPLCs) based on Internet protocols replace devices that use proprietary protocols. Information captured by edge devices on the factory floor is secure and accessible from any location in real time, opening the communication gateway both vertically (connecting machines across the factory and enabling the instant availability of data to stakeholders within operational silos) and horizontally (with one framework for the entire supply chain, across departments, business units, global factory locations and other markets). End-to-end security and privacy solutions in IoT space require agile, context-aware and scalable components with mechanisms that are both fluid and adaptive. The convergence of IT (information technology) and OT (operational technology) makes security and privacy by default a new important element where security is addressed at the architecture level, across applications and domains, using multi-layered distributed security measures. Blockchain is transforming industry operating models by adding trust to untrusted environments, providing distributed security mechanisms and transparent access to the information in the chain. Digital technology platforms are evolving, with IoT platforms integrating complex information systems, customer experience, analytics and intelligence to enable new capabilities and business models for digital business

    Cognitive Hyperconnected Digital Transformation

    Get PDF
    Cognitive Hyperconnected Digital Transformation provides an overview of the current Internet of Things (IoT) landscape, ranging from research, innovation and development priorities to enabling technologies in a global context. It is intended as a standalone book in a series that covers the Internet of Things activities of the IERC-Internet of Things European Research Cluster, including both research and technological innovation, validation and deployment. The book builds on the ideas put forward by the European Research Cluster, the IoT European Platform Initiative (IoT-EPI) and the IoT European Large-Scale Pilots Programme, presenting global views and state-of-the-art results regarding the challenges facing IoT research, innovation, development and deployment in the next years. Hyperconnected environments integrating industrial/business/consumer IoT technologies and applications require new IoT open systems architectures integrated with network architecture (a knowledge-centric network for IoT), IoT system design and open, horizontal and interoperable platforms managing things that are digital, automated and connected and that function in real-time with remote access and control based on Internet-enabled tools. The IoT is bridging the physical world with the virtual world by combining augmented reality (AR), virtual reality (VR), machine learning and artificial intelligence (AI) to support the physical-digital integrations in the Internet of mobile things based on sensors/actuators, communication, analytics technologies, cyber-physical systems, software, cognitive systems and IoT platforms with multiple functionalities. These IoT systems have the potential to understand, learn, predict, adapt and operate autonomously. They can change future behaviour, while the combination of extensive parallel processing power, advanced algorithms and data sets feed the cognitive algorithms that allow the IoT systems to develop new services and propose new solutions. IoT technologies are moving into the industrial space and enhancing traditional industrial platforms with solutions that break free of device-, operating system- and protocol-dependency. Secure edge computing solutions replace local networks, web services replace software, and devices with networked programmable logic controllers (NPLCs) based on Internet protocols replace devices that use proprietary protocols. Information captured by edge devices on the factory floor is secure and accessible from any location in real time, opening the communication gateway both vertically (connecting machines across the factory and enabling the instant availability of data to stakeholders within operational silos) and horizontally (with one framework for the entire supply chain, across departments, business units, global factory locations and other markets). End-to-end security and privacy solutions in IoT space require agile, context-aware and scalable components with mechanisms that are both fluid and adaptive. The convergence of IT (information technology) and OT (operational technology) makes security and privacy by default a new important element where security is addressed at the architecture level, across applications and domains, using multi-layered distributed security measures. Blockchain is transforming industry operating models by adding trust to untrusted environments, providing distributed security mechanisms and transparent access to the information in the chain. Digital technology platforms are evolving, with IoT platforms integrating complex information systems, customer experience, analytics and intelligence to enable new capabilities and business models for digital business

    Internet of Things From Hype to Reality

    Get PDF
    The Internet of Things (IoT) has gained significant mindshare, let alone attention, in academia and the industry especially over the past few years. The reasons behind this interest are the potential capabilities that IoT promises to offer. On the personal level, it paints a picture of a future world where all the things in our ambient environment are connected to the Internet and seamlessly communicate with each other to operate intelligently. The ultimate goal is to enable objects around us to efficiently sense our surroundings, inexpensively communicate, and ultimately create a better environment for us: one where everyday objects act based on what we need and like without explicit instructions

    Demystifying Internet of Things Security

    Get PDF
    Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms

    Actas da 10ª Conferência sobre Redes de Computadores

    Get PDF
    Universidade do MinhoCCTCCentro AlgoritmiCisco SystemsIEEE Portugal Sectio

    A survey of the application of soft computing to investment and financial trading

    Get PDF

    Service Encounters and Technology: the Role of Attachment Styles in Technology Readiness and Technology Acceptance

    Get PDF
    Amid ongoing innovation of technology and technological devices, service firms are continuously searching for alternative ways to deliver services to their customers. Service firms can struggle trying to strike a balance between self-service technology and the human interaction of the service encounter. This study examined the role of attachment theory in the relationship between technology readiness and technology acceptance. The objective of the research was to gain a better understanding through attachment theory of how consumers' cognitive processes will affect their perceptions of technology as a delivery mechanism of the service encounter. The study was conducted by surveying current clients of a financial services firm to determine their technology readiness, technology acceptance, and attachment style. The results showed that technology readiness is a key driver to technology acceptance; however, attachment styles showed a limited moderation effect on the relationship between technology readiness and technology acceptance.Business Administratio

    Parallel and Distributed Computing

    Get PDF
    The 14 chapters presented in this book cover a wide variety of representative works ranging from hardware design to application development. Particularly, the topics that are addressed are programmable and reconfigurable devices and systems, dependability of GPUs (General Purpose Units), network topologies, cache coherence protocols, resource allocation, scheduling algorithms, peertopeer networks, largescale network simulation, and parallel routines and algorithms. In this way, the articles included in this book constitute an excellent reference for engineers and researchers who have particular interests in each of these topics in parallel and distributed computing
    corecore