1,610 research outputs found

    Overlay networks for smart grids

    Get PDF

    Internet of robotic things : converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT Platforms

    Get PDF
    The Internet of Things (IoT) concept is evolving rapidly and influencing newdevelopments in various application domains, such as the Internet of MobileThings (IoMT), Autonomous Internet of Things (A-IoT), Autonomous Systemof Things (ASoT), Internet of Autonomous Things (IoAT), Internetof Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc.that are progressing/advancing by using IoT technology. The IoT influencerepresents new development and deployment challenges in different areassuch as seamless platform integration, context based cognitive network integration,new mobile sensor/actuator network paradigms, things identification(addressing, naming in IoT) and dynamic things discoverability and manyothers. The IoRT represents new convergence challenges and their need to be addressed, in one side the programmability and the communication ofmultiple heterogeneous mobile/autonomous/robotic things for cooperating,their coordination, configuration, exchange of information, security, safetyand protection. Developments in IoT heterogeneous parallel processing/communication and dynamic systems based on parallelism and concurrencyrequire new ideas for integrating the intelligent “devices”, collaborativerobots (COBOTS), into IoT applications. Dynamic maintainability, selfhealing,self-repair of resources, changing resource state, (re-) configurationand context based IoT systems for service implementation and integrationwith IoT network service composition are of paramount importance whennew “cognitive devices” are becoming active participants in IoT applications.This chapter aims to be an overview of the IoRT concept, technologies,architectures and applications and to provide a comprehensive coverage offuture challenges, developments and applications

    Quality assessment technique for ubiquitous software and middleware

    Get PDF
    The new paradigm of computing or information systems is ubiquitous computing systems. The technology-oriented issues of ubiquitous computing systems have made researchers pay much attention to the feasibility study of the technologies rather than building quality assurance indices or guidelines. In this context, measuring quality is the key to developing high-quality ubiquitous computing products. For this reason, various quality models have been defined, adopted and enhanced over the years, for example, the need for one recognised standard quality model (ISO/IEC 9126) is the result of a consensus for a software quality model on three levels: characteristics, sub-characteristics, and metrics. However, it is very much unlikely that this scheme will be directly applicable to ubiquitous computing environments which are considerably different to conventional software, trailing a big concern which is being given to reformulate existing methods, and especially to elaborate new assessment techniques for ubiquitous computing environments. This paper selects appropriate quality characteristics for the ubiquitous computing environment, which can be used as the quality target for both ubiquitous computing product evaluation processes ad development processes. Further, each of the quality characteristics has been expanded with evaluation questions and metrics, in some cases with measures. In addition, this quality model has been applied to the industrial setting of the ubiquitous computing environment. These have revealed that while the approach was sound, there are some parts to be more developed in the future

    Semantic IoT Solutions - A Developer Perspective

    Get PDF
    Semantic technologies have recently gained significant support in a number of communities, in particular the IoT community. An important problem to be solved is that, on the one hand, it is clear that the value of IoT increases significantly with the availability of information from a wide variety of domains. On the other hand, existing solutions target specific applications or application domains and there is no easy way of sharing information between the resulting silos. Thus, a solution is needed to enable interoperability across information silos. As there is a huge heterogeneity regarding IoT technologies on the lower levels, the semantic level is seen as a promising approach for achieving interoperability (i.e. semantic interoperability) to unify IoT device description, data, bring common interaction, data exploration, etc.This work has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreements No.732240 (SynchroniCity) and No. 688467 (VICINITY); from ETSI under Specialist Task Forces 534, 556, 566 and 578. This work is partially funded by Hazards SEES NSF Award EAR 1520870, and KHealth NIH 1 R01 HD087132-01

    A Framework for Service-Oriented Architecture (SOA)-Based IoT Application Development

    Get PDF
    Funding: This research was partially supported by funds provided by the European Commission in the scope of FoF/H2020-723710 vf-OS, ICT/H2020-825631 ZDMP projects, and by the FCT— Fundação para a Ciência e a Tecnologia in the scope of UIDB/00066/2020 related to CTS—Centro de Tecnologia e Sistemas research unit.In the last decades, the increasing complexity of industrial information technology has led to the emergence of new trends in manufacturing. Factories are using multiple Internet of Things (IoT) platforms to harvest sensor information to improve production. Such a transformation contributes to efficiency growth and reduced production costs. To deal with the heterogeneity of the services within an IoT system, Service-Oriented Architecture (SOA) is referred to in the literature as being advantageous for the design and development of software to support IoT-based production processes.The aim of SOA-based design is to provide the leverage to use and reuse loosely coupled IoT services at the middleware layer to minimise system integration problems. We propose a system architecture that follows the SOA architectural pattern and enables developers and business process designers to dynamically add, query or use instances of existing modular software in the IoT context. Furthermore, an analysis of utilization of modular software that presents some challenges and limitations of this approach is also in the scope of this workpublishersversionpublishe

    An overview of machine learning and 5G for people with disabilities

    Get PDF
    Currently, over a billion people, including children (or about 15% of the world’s population), are estimated to be living with disability, and this figure is going to increase to beyond two billion by 2050. People with disabilities generally experience poorer levels of health, fewer achievements in education, fewer economic opportunities, and higher rates of poverty. Artificial intelligence and 5G can make major contributions towards the assistance of people with disabilities, so they can achieve a good quality of life. In this paper, an overview of machine learning and 5G for people with disabilities is provided. For this purpose, the proposed 5G network slicing architecture for disabled people is introduced. Different application scenarios and their main benefits are considered to illustrate the interaction of machine learning and 5G. Critical challenges have been identified and addressed.This work has been supported by the Agencia Estatal de Investigación of Ministerio de Ciencia e Innovación of Spain under project PID2019-108713RB-C51 MCIN/ AEI /10.13039/501100011033.Postprint (published version

    BAMBI: BLUETOOTH ACCESS MANAGEMENT & BEACON IDENTIFICATION

    Get PDF
    Cybersecurity is a constantly developing field. Patches that secured yesterday’s technology do not safeguard against occurring threats, necessitating continuous research in the field. The outbreak of Bluetooth Low Energy (BLE) devices dramatically expands the attack surface. BLE is one of the most widely applicable low-power connectivity standards. The low cost, low power consumption, and ready availability of BLE modules have made them a popular wireless technology for Internet of Things (IoT) devices and power constrained applications. However, the deployment of BLE-enabled devices enlarges the network attack surface. In spite of that, access management is insufficient for Bluetooth Low Energy devices. To elucidate, understanding the difference between known and unknown, malicious and non-malicious devices within a perimeter can be crucial in today’s cyberspace. This research proposes an approach called BAMBI - Beacon Access Management and Beacon Identification, which sought to develop an efficient, accurate, and easy-to implement solution for device/beacon identification and access management. The proposed solution, BAMBI, addresses these areas for the Bluetooth Low Energy Protocol. There are a few components to BAMBI that make up this solution. Device Identification, Device Classification, and Access Management are components that make BAMBI the first of its kind for the BLE protocol. Although this research is limited to the BLE protocol, it does introduce avenues for other connectivity standards such as Zig-bee and Bluetooth to adapt without much overhead
    corecore