23 research outputs found

    Video Analytics in Elite Soccer: A Distributed Computing Perspective

    Get PDF
    Ubiquitous sensors and Internet of Things (IoT)technologies have revolutionized the sports industry, providing new methodologies for planning, effective coordination of training, and match analysis post-game. New methods, including machine learning, image, and video processing, have been developed for performance evaluation, allowing the analyst to track the performance of a player in real-time. Following FIFA’s 2015 approval of electronics performance and tracking system during games, performance data of a single player or the entire team is allowed to be collected using GPS-based wearables. Data from practice sessions outside the sporting arena is being collected in greater numbers than ever before. Realizing the significance of data in professional soccer, this paper presents video analytics, examines recent state-of-the-art literature in elite soccer, and summarizes existing real-time video analytics algorithms. We also discuss real-time crowdsourcing of the obtained data, tactical and technical performance, distributed computing, and its importance in video analytics and propose a future research perspective.acceptedVersio

    The Adoption Of Next Generation Computing Architectures: A Meta Learning On The Adoption Of Fog, Mobile Edge, Serverless, And SoftwareDefined Computing

    Get PDF
    There have been several shifts in the cloud computing during the last decade. The next generation of cloud computing builds on the strengths of the current model while expanding its applicability. There will be far-reaching effects from the evolving cloud infrastructure and new computing architecture. They will be critical in facilitating the Internet-of-Things paradigm by enhancing connection between humans and IoT devices. The first purpose of this research is to review and discuss the next generation computing architectures, such as, Fog, Mobile Edge, Serverless, And Software-Defined Computing. Organizations have turned to cloud adoption as a way to increase the scalability of their Internet-based database capabilities with little outlay of resources. Cloud adoption is a deliberate decision made by businesses to reduce costs, mitigate risk, and achieve expansion of data base abilities. Depending on the amount of adoption, an organization may have varying degrees of cloud adoption. The second purpose of this is to investigate the adoption strategies of next generation cloud computing. We applied two meta learning algorithms, namely, Ensemble Voting voting and Stacking classifiers. Our results shows that most organizations with low levels of IT competence and high levels of perceived challenges are not planning to use the next generation cloud computing in the near future. Most organizations with a modest view of risk and IT competence are undecided about whether or not to adopt. Even organizations that have access to cutting-edge technology and a low level of concern about the potential challenges have mixed feelings about next generation cloud computing. Results from both classifier algorithms are almost comparable, validating the empirical findings

    The Internet of Things as a Privacy-Aware Database Machine

    Get PDF
    Instead of using a computer cluster with homogeneous nodes and very fast high bandwidth connections, we want to present the vision to use the Internet of Things (IoT) as a database machine. This is among others a key factor for smart (assistive) systems in apartments (AAL, ambient assisted living), offices (AAW, ambient assisted working), Smart Cities as well as factories (IIoT, Industry 4.0). It is important to massively distribute the calculation of analysis results on sensor nodes and other low-resource appliances in the environment, not only for reasons of performance, but also for reasons of privacy and protection of corporate knowledge. Thus, functions crucial for assistive systems, such as situation, activity, and intention recognition, are to be automatically transformed not only in database queries, but also in local nodes of lower performance. From a database-specific perspective, analysis operations on large quantities of distributed sensor data, currently based on classical big-data techniques and executed on large, homogeneously equipped parallel computers have to be automatically transformed to billions of processors with energy and capacity restrictions. In this visionary paper, we will focus on the database-specific perspective and the fundamental research questions in the underlying database theory

    ROUTER:Fog Enabled Cloud based Intelligent Resource Management Approach for Smart Home IoT Devices

    Get PDF
    There is a growing requirement for Internet of Things (IoT) infrastructure to ensure low response time to provision latency-sensitive real-time applications such as health monitoring, disaster management, and smart homes. Fog computing offers a means to provide such requirements, via a virtualized intermediate layer to provide data, computation, storage, and networking services between Cloud datacenters and end users. A key element within such Fog computing environments is resource management. While there are existing resource manager in Fog computing, they only focus on a subset of parameters important to Fog resource management encompassing system response time, network bandwidth, energy consumption and latency. To date no existing Fog resource manager considers these parameters simultaneously for decision making, which in the context of smart homes will become increasingly key. In this paper, we propose a novel resource management technique (ROUTER) for fog-enabled Cloud computing environments, which leverages Particle Swarm Optimization to optimize simultaneously. The approach is validated within an IoT-based smart home automation scenario, and evaluated within iFogSim toolkit driven by empirical models within a small-scale smart home experiment. Results demonstrate our approach results a reduction of 12% network bandwidth, 10% response time, 14% latency and 12.35% in energy consumption

    Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity

    Get PDF
    Cybersecurity is a fast-evolving discipline that is always in the news over the last decade, as the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of law enforcement. Over the years, although the original motives for carrying out cyberattacks largely remain unchanged, cybercriminals have become increasingly sophisticated with their techniques. Traditional cybersecurity solutions are becoming inadequate at detecting and mitigating emerging cyberattacks. Advances in cryptographic and Artificial Intelligence (AI) techniques (in particular, machine learning and deep learning) show promise in enabling cybersecurity experts to counter the ever-evolving threat posed by adversaries. Here, we explore AI\u27s potential in improving cybersecurity solutions, by identifying both its strengths and weaknesses. We also discuss future research opportunities associated with the development of AI techniques in the cybersecurity field across a range of application domains
    corecore