8 research outputs found

    Edge Computing for Internet of Things

    Get PDF
    The Internet-of-Things is becoming an established technology, with devices being deployed in homes, workplaces, and public areas at an increasingly rapid rate. IoT devices are the core technology of smart-homes, smart-cities, intelligent transport systems, and promise to optimise travel, reduce energy usage and improve quality of life. With the IoT prevalence, the problem of how to manage the vast volumes of data, wide variety and type of data generated, and erratic generation patterns is becoming increasingly clear and challenging. This Special Issue focuses on solving this problem through the use of edge computing. Edge computing offers a solution to managing IoT data through the processing of IoT data close to the location where the data is being generated. Edge computing allows computation to be performed locally, thus reducing the volume of data that needs to be transmitted to remote data centres and Cloud storage. It also allows decisions to be made locally without having to wait for Cloud servers to respond

    Advanced Energy Harvesting Technologies

    Get PDF
    Energy harvesting is the conversion of unused or wasted energy in the ambient environment into useful electrical energy. It can be used to power small electronic systems such as wireless sensors and is beginning to enable the widespread and maintenance-free deployment of Internet of Things (IoT) technology. This Special Issue is a collection of the latest developments in both fundamental research and system-level integration. This Special Issue features two review papers, covering two of the hottest research topics in the area of energy harvesting: 3D-printed energy harvesting and triboelectric nanogenerators (TENGs). These papers provide a comprehensive survey of their respective research area, highlight the advantages of the technologies and point out challenges in future development. They are must-read papers for those who are active in these areas. This Special Issue also includes ten research papers covering a wide range of energy-harvesting techniques, including electromagnetic and piezoelectric wideband vibration, wind, current-carrying conductors, thermoelectric and solar energy harvesting, etc. Not only are the foundations of these novel energy-harvesting techniques investigated, but the numerical models, power-conditioning circuitry and real-world applications of these novel energy harvesting techniques are also presented

    How digital data are used in the domain of health: A short review of current knowledge

    Get PDF
    In the era of digitalization, digital data is available about every aspect of our daily lives, including our physical and mental health. Digital data has been applied in the domain of healthcare for the detection of an outbreak of infectious diseases, clinical decision support, personalized care, and genomics. This paper will serve as a review of the rapidly evolving field of digital health. More specifically, we will discuss (1) big data and physical health, (2) big data and mental health, (3) digital contact tracing during the COVID-19 pandemic, and finally, (4) ethical issues with using digital data for health-related purposes. With this review, we aim to stimulate a public debate on the appropriate usage of digital data in the health sector

    Internet of Things and Sensors Networks in 5G Wireless Communications

    Get PDF
    The Internet of Things (IoT) has attracted much attention from society, industry and academia as a promising technology that can enhance day to day activities, and the creation of new business models, products and services, and serve as a broad source of research topics and ideas. A future digital society is envisioned, composed of numerous wireless connected sensors and devices. Driven by huge demand, the massive IoT (mIoT) or massive machine type communication (mMTC) has been identified as one of the three main communication scenarios for 5G. In addition to connectivity, computing and storage and data management are also long-standing issues for low-cost devices and sensors. The book is a collection of outstanding technical research and industrial papers covering new research results, with a wide range of features within the 5G-and-beyond framework. It provides a range of discussions of the major research challenges and achievements within this topic

    Internet of Things and Sensors Networks in 5G Wireless Communications

    Get PDF
    This book is a printed edition of the Special Issue Internet of Things and Sensors Networks in 5G Wireless Communications that was published in Sensors

    Internet of Things and Sensors Networks in 5G Wireless Communications

    Get PDF
    This book is a printed edition of the Special Issue Internet of Things and Sensors Networks in 5G Wireless Communications that was published in Sensors

    Cyber-storms come from clouds:Security of cloud computing in the IoT era

    Get PDF
    The Internet of Things (IoT) is rapidly changing our society to a world where every “thing” is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every business. However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage. From a security perspective, the technological revolution introduced by IoT and Cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. While the literature mostly focuses on the security of IoT and Cloud computing as separate entities, in this article we provide an up-to-date and well-structured survey of the security issues of cloud computing in the IoT era. We give a clear picture of where security issues occur and what their potential impact is. As a result, we claim that it is not enough to secure IoT devices, as cyber-storms come from Clouds
    corecore