733 research outputs found

    Social-aware hybrid mobile offloading

    Get PDF
    Mobile offloading is a promising technique to aid the constrained resources of a mobile device. By offloading a computational task, a device can save energy and increase the performance of the mobile applications. Unfortunately, in existing offloading systems, the opportunistic moments to offload a task are often sporadic and short-lived. We overcome this problem by proposing a social-aware hybrid offloading system (HyMobi), which increases the spectrum of offloading opportunities. As a mobile device is always co- located to at least one source of network infrastructure throughout of the day, by merging cloudlet, device-to-device and remote cloud offloading, we increase the availability of offloading support. Integrating these systems is not trivial. In order to keep such coupling, a strong social catalyst is required to foster user's participation and collaboration. Thus, we equip our system with an incentive mechanism based on credit and reputation, which exploits users' social aspects to create offload communities. We evaluate our system under controlled and in-the-wild scenarios. With credit, it is possible for a device to create opportunistic moments based on user's present need. As a result, we extended the widely used opportunistic model with a long-term perspective that significantly improves the offloading process and encourages unsupervised offloading adoption in the wild

    The 10 Research Topics in the Internet of Things

    Full text link
    Since the term first coined in 1999 by Kevin Ashton, the Internet of Things (IoT) has gained significant momentum as a technology to connect physical objects to the Internet and to facilitate machine-to-human and machine-to-machine communications. Over the past two decades, IoT has been an active area of research and development endeavours by many technical and commercial communities. Yet, IoT technology is still not mature and many issues need to be addressed. In this paper, we identify 10 key research topics and discuss the research problems and opportunities within these topics.Comment: 10 pages. IEEE CIC 2020 vision pape

    Recent Advances in Cellular D2D Communications

    Get PDF
    Device-to-device (D2D) communications have attracted a great deal of attention from researchers in recent years. It is a promising technique for offloading local traffic from cellular base stations by allowing local devices, in physical proximity, to communicate directly with each other. Furthermore, through relaying, D2D is also a promising approach to enhancing service coverage at cell edges or in black spots. However, there are many challenges to realizing the full benefits of D2D. For one, minimizing the interference between legacy cellular and D2D users operating in underlay mode is still an active research issue. With the 5th generation (5G) communication systems expected to be the main data carrier for the Internet-of-Things (IoT) paradigm, the potential role of D2D and its scalability to support massive IoT devices and their machine-centric (as opposed to human-centric) communications need to be investigated. New challenges have also arisen from new enabling technologies for D2D communications, such as non-orthogonal multiple access (NOMA) and blockchain technologies, which call for new solutions to be proposed. This edited book presents a collection of ten chapters, including one review and nine original research works on addressing many of the aforementioned challenges and beyond

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    ERP and functional fit: how integrated systems fail to provide improved control.

    Get PDF
    Companies have been investing in integrated enterprise applications (such as ERP) for over a decade, without firm evidence of a return from these investments. Much research has centred on the factors which will lead to a successful implementation project (eg: Holland and Light, 1999; Shanks and Seddon, 2000), but to date there appears to be little research on the longer term impact of ERP systems on the organisation (Heili and Vinck, 2008). Although the greater level of system integration brought on by ERP has meant that there is more operational information available to managers than ever before, the information stored in ERP applications requires much off-line manipulation in order to be meaningful to managers. The data held in ERP databases originate in physical processes that evolve over time, and thus inevitably a gap opens between the ERP system, and the reality it is designed to capture (Lee and Lee, 2000). Taking the evaluation of management performance against organisationa

    The e-revolution and post-compulsory education: using e-business models to deliver quality education

    Get PDF
    The best practices of e-business are revolutionising not just technology itself but the whole process through which services are provided; and from which important lessons can be learnt by post-compulsory educational institutions. This book aims to move debates about ICT and higher education beyond a simple focus on e-learning by considering the provision of post-compulsory education as a whole. It considers what we mean by e-business, why e-business approaches are relevant to universities and colleges and the key issues this raises for post-secondary education

    RFID Technology in Intelligent Tracking Systems in Construction Waste Logistics Using Optimisation Techniques

    Get PDF
    Construction waste disposal is an urgent issue for protecting our environment. This paper proposes a waste management system and illustrates the work process using plasterboard waste as an example, which creates a hazardous gas when land filled with household waste, and for which the recycling rate is less than 10% in the UK. The proposed system integrates RFID technology, Rule-Based Reasoning, Ant Colony optimization and knowledge technology for auditing and tracking plasterboard waste, guiding the operation staff, arranging vehicles, schedule planning, and also provides evidence to verify its disposal. It h relies on RFID equipment for collecting logistical data and uses digital imaging equipment to give further evidence; the reasoning core in the third layer is responsible for generating schedules and route plans and guidance, and the last layer delivers the result to inform users. The paper firstly introduces the current plasterboard disposal situation and addresses the logistical problem that is now the main barrier to a higher recycling rate, followed by discussion of the proposed system in terms of both system level structure and process structure. And finally, an example scenario will be given to illustrate the system’s utilization

    Selective Outsourcing in Global IT Services : Operational Level Challenges and Opportunities

    Get PDF
    Companies need to answer and react timely and efficiently to their customers’ perception in order to stay in business. Companies are finding ways to control and reduce costs. Increasingly, internal IT development and service delivery activities are outsourced to external suppliers. The most common outsourcing forms are total and selective outsourcing, which are produced in nearshore and/or offshore mode. In this dissertation, the case units are two global units in Nokia Devices: IT unit and Delivery Quality and Corrective Action Preventive Action (DQ and CAPA) unit. This dissertation consists of five publications and five research questions. The motives for the research questions originate from the case units’ real-life needs and challenges. The research approach used is qualitative. Action research was conducted during years 2009-2013. This research gives focus on the global IT service delivery, although the case company’s core-competence was to produce end-consumer products. The target was to get operational level knowledge from the case units’ outsourcing operation and practices in a Global Selective Outsourcing Environment (GSOE). This dissertation addresses the opportunities and challenges of outsourcing faced by the operational level personnel. In the GSOE, the service purchasing company’s personnel and the supplier’s personnel jointly cooperate to produce the expected outcomes and IT services. This research found that the GSOE-based operation includes multi-level customer- and supplier-ships. In order to answer the customers’ perception, the operation included quality and customer-centric practices. This research found that defining and implementing customer centricity is challenging. Unclear definitions, requirements, roles, responsibilities, and activities can negatively affect the operational level implementation. The GSOEbased operation includes also contract negotiations among the GSOE parties. Successful IT outsourcing is not built only on formal contracts. Focus is needed also on building trust, commitment, communication, and mutual cooperation and dependence. This study found that retaining operational level progress and information visibility inside the service purchasing company made it possible to hold the ownership and avoid getting into a “supplier trap.” The operational level cooperation, interaction and quality management practices affected the service purchasing company’s trust and satisfaction. The trust in the case units was found to exist among people, and this trust was formed based on an individual’s knowledge, capabilities, behavior, and performance. Quality management practices played a significant role in building trust that added to the credibility of the operation
    • 

    corecore