1,846 research outputs found
Security and Privacy for Green IoT-based Agriculture: Review, Blockchain solutions, and Challenges
open access articleThis paper presents research challenges on security and privacy issues in the field of green IoT-based agriculture. We start by describing a four-tier green IoT-based agriculture architecture and summarizing the existing surveys that deal with smart agriculture. Then, we provide a classification of threat models against green IoT-based agriculture into five categories, including, attacks against privacy, authentication, confidentiality, availability, and integrity properties. Moreover, we provide a taxonomy and a side-by-side comparison of the state-of-the-art methods toward secure and privacy-preserving technologies for IoT applications and how they will be adapted for green IoT-based agriculture. In addition, we analyze the privacy-oriented blockchain-based solutions as well as consensus algorithms for IoT applications and how they will be adapted for green IoT-based agriculture. Based on the current survey, we highlight open research challenges and discuss possible future research directions in the security and privacy of green IoT-based agriculture
FLBP: A Federated Learning-enabled and Blockchain-supported Privacy-Preserving of Electronic Patient Records for the Internet of Medical Things
The evolution of the computing paradigms and the Internet of Medical Things (IoMT) have transfigured the healthcare sector with an alarming rise of privacy issues in healthcare records. The rapid growth of medical data leads to privacy and security concerns to protect the confidentiality and integrity of the data in the feature-loaded infrastructure and applications. Moreover, the sharing of medical records of a patient among hospitals rises security and interoperability issues. This article, therefore, proposes a Federated Learning-and-Blockchain-enabled framework to protect electronic medical records from unauthorized access using a deep learning technique called Artificial Neural Network (ANN) for a collaborative IoMT-Fog-Cloud environment. ANN is used to identify insiders and intruders. An Elliptical Curve Digital Signature (ECDS) algorithm is adopted to devise a secured Blockchain-based validation method. To process the anti-malicious propagation method, a Blockchain-based Health Record Sharing (BHRS) is implemented. In addition, an FL approach is integrated into Blockchain for scalable applications to form a global model without the need of sharing and storing the raw data in the Cloud. The proposed model is evident from the simulations that it improves the operational cost and communication (latency) overhead with a percentage of 85.2% and 62.76%, respectively. The results showcase the utility and efficacy of the proposed model
Artificial intelligence in construction asset management: a review of present status, challenges and future opportunities
The built environment is responsible for roughly 40% of global greenhouse emissions, making the sector a crucial factor for climate change and sustainability. Meanwhile, other sectors (like manufacturing) adopted Artificial Intelligence (AI) to solve complex, non-linear problems to reduce waste, inefficiency, and pollution. Therefore, many research efforts in the Architecture, Engineering, and Construction community have recently tried introducing AI into building asset management (AM) processes. Since AM encompasses a broad set of disciplines, an overview of several AI applications, current research gaps, and trends is needed. In this context, this study conducted the first state-of-the-art research on AI for building asset management. A total of 578 papers were analyzed with bibliometric tools to identify prominent institutions, topics, and journals. The quantitative analysis helped determine the most researched areas of AM and which AI techniques are applied. The areas were furtherly investigated by reading in-depth the 83 most relevant studies selected by screening the articles’ abstracts identified in the bibliometric analysis. The results reveal many applications for Energy Management, Condition assessment, Risk management, and Project management areas. Finally, the literature review identified three main trends that can be a reference point for future studies made by practitioners or researchers: Digital Twin, Generative Adversarial Networks (with synthetic images) for data augmentation, and Deep Reinforcement Learning
Cognitive Machine Individualism in a Symbiotic Cybersecurity Policy Framework for the Preservation of Internet of Things Integrity: A Quantitative Study
This quantitative study examined the complex nature of modern cyber threats to propose the establishment of cyber as an interdisciplinary field of public policy initiated through the creation of a symbiotic cybersecurity policy framework. For the public good (and maintaining ideological balance), there must be recognition that public policies are at a transition point where the digital public square is a tangible reality that is more than a collection of technological widgets. The academic contribution of this research project is the fusion of humanistic principles with Internet of Things (IoT) technologies that alters our perception of the machine from an instrument of human engineering into a thinking peer to elevate cyber from technical esoterism into an interdisciplinary field of public policy. The contribution to the US national cybersecurity policy body of knowledge is a unified policy framework (manifested in the symbiotic cybersecurity policy triad) that could transform cybersecurity policies from network-based to entity-based. A correlation archival data design was used with the frequency of malicious software attacks as the dependent variable and diversity of intrusion techniques as the independent variable for RQ1. For RQ2, the frequency of detection events was the dependent variable and diversity of intrusion techniques was the independent variable. Self-determination Theory is the theoretical framework as the cognitive machine can recognize, self-endorse, and maintain its own identity based on a sense of self-motivation that is progressively shaped by the machine’s ability to learn. The transformation of cyber policies from technical esoterism into an interdisciplinary field of public policy starts with the recognition that the cognitive machine is an independent consumer of, advisor into, and influenced by public policy theories, philosophical constructs, and societal initiatives
IoT system for the validation of conditions in shipping couriers
The growth in online activity these days has caused an increase in the number of online
shopping businesses. As the shopping experience becomes less personal, some people
try to abuse online businesses with return fraud. The number of IoT devices has also
experienced growth due to the fourth industrial revolution, or Industry 4.0, which consists
of process automation and data exchange in the industry through IoT and machine
learning.
This dissertation includes research questions, hypotheses, objectives, and a methodology
for the development of a system that integrates IoT to solve the problem of fraudulent
returns.
The prototype developed monitors when packages leave the facilities and when they
are delivered, in addition to allowing to check upon the packages’ integrity at these
same moments. This is achieved by using a Raspberry Pi with a camera attached and an
ESP32 with a motion sensor, connected via the MQTT and Node-RED protocol.
To evaluate the system, several tests were created to simulate a scenario of
real-world application. With the results obtained, it is possible to conclude that the
development was a success and that the prototype can be used in logistics business to
prevent return fraud.O aumento da atividade online nos dias de hoje tem causado um aumento no nĂşmero
de lojas de comércio online. À medida que a experiência de compra se torna menos
pessoal, algumas pessoas tentam abusar negócios online com fraudes de devolução. O
número de dispositivos IoT também tem crescido devido à quarta revolução industrial,
ou Indústria 4.0, que consiste na automação de processos e troca de dados na indústria
através de IoT e machine learning.
Esta dissertação inclui questões de investigação, hipóteses, objetivos e uma
metodologia para o desenvolvimento de um sistema que integra IoT para resolver o problema
de devoluções fraudulentas.
O protótipo desenvolvido monitoriza quando encomendas saem das instalações e
quando sĂŁo entregues, para alĂ©m de permitir a verificação da integridade fĂsica das
encomendas nestes mesmos momentos. Isto é alcançado com o uso de um Raspberry Pi
com uma câmara associada e um ESP32 com um sensor de movimento, conectados entre
si através do protocolo MQTT e Node-RED.
Para avaliar o sistema, vários testes foram criados de forma a simular um cenário
de aplicação no mundo real. Os resultados obtidos permitem concluir que o desenvolvimento
foi um sucesso e que o protĂłtipo pode ser usado em empresas de logĂstica,
distribuição e transporte para evitar fraudes de devolução
The Internet of Things: Multi-faceted Research Perspectives
Living beyond the hype, the Internet of things (IoT) continues to grow and has clearly emerged as a leading-edge topic in information systems. As the IoT moves beyond novel technologies and exploratory sandbox initiatives to ubiquitous technologies and full production, understanding the phenomenon surrounding IoT challenges and issues has become even more important. In this paper, we explore the critical issues and challenges currently facing IoT adoption and implementation in order to identify areas that require further study. Specifically, we discuss IoT from several key perspectives including IoT connectivity, platforms and 5G, IoT analytics, IoT privacy, security, and litigation risks, IoT business value and monetization, and human interaction with IoT and design considerations Finally, through identifying the current state of IoT and IoT research, we identify potential areas of contribution and future directions for IoT research
Temporal Information in Data Science: An Integrated Framework and its Applications
Data science is a well-known buzzword, that is in fact composed of two distinct keywords, i.e., data and science. Data itself is of great importance: each analysis task begins from a set of examples. Based on such a consideration, the present work starts with the analysis of a real case scenario, by considering the development of a data warehouse-based decision support system for an Italian contact center company. Then, relying on the information collected in the developed system, a set of machine learning-based analysis tasks have been developed to answer specific business questions, such as employee work anomaly detection and automatic call classification. Although such initial applications rely on already available algorithms, as we shall see, some clever analysis workflows had also to be developed. Afterwards, continuously driven by real data and real world applications, we turned ourselves to the question of how to handle temporal information within classical decision tree models. Our research brought us the development of J48SS, a decision tree induction algorithm based on Quinlan's C4.5 learner, which is capable of dealing with temporal (e.g., sequential and time series) as well as atemporal (such as numerical and categorical) data during the same execution cycle. The decision tree has been applied into some real world analysis tasks, proving its worthiness. A key characteristic of J48SS is its interpretability, an aspect that we specifically addressed through the study of an evolutionary-based decision tree pruning technique. Next, since a lot of work concerning the management of temporal information has already been done in automated reasoning and formal verification fields, a natural direction in which to proceed was that of investigating how such solutions may be combined with machine learning, following two main tracks. First, we show, through the development of an enriched decision tree capable of encoding temporal information by means of interval temporal logic formulas, how a machine learning algorithm can successfully exploit temporal logic to perform data analysis. Then, we focus on the opposite direction, i.e., that of employing machine learning techniques to generate temporal logic formulas, considering a natural language processing scenario. Finally, as a conclusive development, the architecture of a system is proposed, in which formal methods and machine learning techniques are seamlessly combined to perform anomaly detection and predictive maintenance tasks. Such an integration represents an original, thrilling research direction that may open up new ways of dealing with complex, real-world problems.Data science is a well-known buzzword, that is in fact composed of two distinct keywords, i.e., data and science. Data itself is of great importance: each analysis task begins from a set of examples. Based on such a consideration, the present work starts with the analysis of a real case scenario, by considering the development of a data warehouse-based decision support system for an Italian contact center company. Then, relying on the information collected in the developed system, a set of machine learning-based analysis tasks have been developed to answer specific business questions, such as employee work anomaly detection and automatic call classification. Although such initial applications rely on already available algorithms, as we shall see, some clever analysis workflows had also to be developed. Afterwards, continuously driven by real data and real world applications, we turned ourselves to the question of how to handle temporal information within classical decision tree models. Our research brought us the development of J48SS, a decision tree induction algorithm based on Quinlan's C4.5 learner, which is capable of dealing with temporal (e.g., sequential and time series) as well as atemporal (such as numerical and categorical) data during the same execution cycle. The decision tree has been applied into some real world analysis tasks, proving its worthiness. A key characteristic of J48SS is its interpretability, an aspect that we specifically addressed through the study of an evolutionary-based decision tree pruning technique. Next, since a lot of work concerning the management of temporal information has already been done in automated reasoning and formal verification fields, a natural direction in which to proceed was that of investigating how such solutions may be combined with machine learning, following two main tracks. First, we show, through the development of an enriched decision tree capable of encoding temporal information by means of interval temporal logic formulas, how a machine learning algorithm can successfully exploit temporal logic to perform data analysis. Then, we focus on the opposite direction, i.e., that of employing machine learning techniques to generate temporal logic formulas, considering a natural language processing scenario. Finally, as a conclusive development, the architecture of a system is proposed, in which formal methods and machine learning techniques are seamlessly combined to perform anomaly detection and predictive maintenance tasks. Such an integration represents an original, thrilling research direction that may open up new ways of dealing with complex, real-world problems
Recommended from our members
Pairing a Circular Economy and the 5G-Enabled Internet of Things: Creating a Class of “Looping Smart Assets”
The increase in the world’s population has led to a
massive rise in human consumption of the planet’s natural
resources, well beyond their replacement rate. Traditional
recycling concepts and methods are not enough to counter such
effects. In this context, a circular economy (CE), that is, a
restorative and regenerative by-design economy, can reform
today’s “take–make–dispose” economic model. On the other hand,
the Internet of Things (IoT) continues to gradually transform our
everyday lives, allowing for the introduction of novel types of
services while enhancing legacy ones. Taking this as our
motivation, in this article we analyze the CE/IoT interplay,
indicating innovative ways in which this interaction can drastically
affect products and services, their underlying business models,
and the associated ecosystems. Moreover, we present an IoT
architecture that enables smart object integration into the IoT
ecosystem. The presented architecture integrates circularityenabling
features by maximizing the exploitation of assets toward
a new type of IoT ecosystem that is circular by design (CbD).
Finally, we provide a proof-of-concept implementation and an
application study of the proposed architecture and results
regarding the applicability of the proposed approach for the
telecommunications (telecom) sector
From Personalized Medicine to Population Health: A Survey of mHealth Sensing Techniques
Mobile Sensing Apps have been widely used as a practical approach to collect
behavioral and health-related information from individuals and provide timely
intervention to promote health and well-beings, such as mental health and
chronic cares. As the objectives of mobile sensing could be either \emph{(a)
personalized medicine for individuals} or \emph{(b) public health for
populations}, in this work we review the design of these mobile sensing apps,
and propose to categorize the design of these apps/systems in two paradigms --
\emph{(i) Personal Sensing} and \emph{(ii) Crowd Sensing} paradigms. While both
sensing paradigms might incorporate with common ubiquitous sensing
technologies, such as wearable sensors, mobility monitoring, mobile data
offloading, and/or cloud-based data analytics to collect and process sensing
data from individuals, we present a novel taxonomy system with two major
components that can specify and classify apps/systems from aspects of the
life-cycle of mHealth Sensing: \emph{(1) Sensing Task Creation \&
Participation}, \emph{(2) Health Surveillance \& Data Collection}, and
\emph{(3) Data Analysis \& Knowledge Discovery}. With respect to different
goals of the two paradigms, this work systematically reviews this field, and
summarizes the design of typical apps/systems in the view of the configurations
and interactions between these two components. In addition to summarization,
the proposed taxonomy system also helps figure out the potential directions of
mobile sensing for health from both personalized medicines and population
health perspectives.Comment: Submitted to a journal for revie
A Strategic Roadmap for the Manufacturing Industry to Implement Industry 4.0
Industry 4.0 (also referred to as digitization of manufacturing) is characterized by cyber physical systems, automation, and data exchange. It is no longer a future trend and is being employed worldwide by manufacturing organizations, to gain benefits of improved performance, reduced inefficiencies, and lower costs, while improving flexibility. However, the implementation of Industry 4.0 enabling technologies is a difficult task and becomes even more challenging without any standardized approach. The barriers include, but are not limited to, lack of knowledge, inability to realistically quantify the return on investment, and lack of a skilled workforce. This study presents a systematic and content-centric literature review of Industry 4.0 enabling technologies, to highlight their impact on the manufacturing industry. It also provides a strategic roadmap for the implementation of Industry 4.0, based on lean six sigma approaches. The basis of the roadmap is the design for six sigma approach for the development of a new process chain, followed by a continuous improvement plan. The reason for choosing lean six sigma is to provide manufacturers with a sense of familiarity, as they have been employing these principles for removing waste and reducing variability. Major reasons for the rejection of Industry 4.0 implementation methodologies by manufactures are fear of the unknown and resistance to change, whereas the use of lean six sigma can mitigate them. The strategic roadmap presented in this paper can offer a holistic view of phases that manufacturers should undertake and the challenges they might face in their journey toward Industry 4.0 transition
- …