2,203 research outputs found

    Investigation on Design and Development Methods for Internet of Things

    Get PDF
    The thesis work majorly focuses on the development methodologies of the Internet of Things (IoT). A detailed literature survey is presented for the discussion of various challenges in the development of software and design and deployment of hardware. The thesis work deals with the efficient development methodologies for the deployment of IoT system. Efficient hardware and software development reduces the risk of the system bugs and faults. The optimal placement of the IoT devices is the major challenge for the monitoring application. A Qualitative Spatial Reasoning (QSR) and Qualitative Temporal Reasoning (QTR) methodologies are proposed to build software systems. The proposed hybrid methodology includes the features of QSR, QTR, and traditional databased methodologies. The hybrid methodology is proposed to build the software systems and direct them to the specific goal of obtaining outputs inherent to the process. The hybrid methodology includes the support of tools and is detailed, integrated, and fits the general proposal. This methodology repeats the structure of Spatio-temporal reasoning goals. The object-oriented IoT device placement is the major goal of the proposed work. Segmentation and object detection is used for the division of the region into sub-regions. The coverage and connectivity are maintained by the optimal placement of the IoT devices using RCC8 and TPCC algorithms. Over the years, IoT has offered different solutions in all kinds of areas and contexts. The diversity of these challenges makes it hard to grasp the underlying principles of the different solutions and to design an appropriate custom implementation on the IoT space. One of the major objective of the proposed thesis work is to study numerous production-ready IoT offerings, extract recurring proven solution principles, and classify them into spatial patterns. The method of refinement of the goals is employed so that complex challenges are solved by breaking them down into simple and achievable sub-goals. The work deals with the major sub-goals e.g. efficient coverage of the field, connectivity of the IoT devices, Spatio-temporal aggregation of the data, and estimation of spatially connected regions of event detection. We have proposed methods to achieve each sub-goal for all different types of spatial patterns. The spatial patterns developed can be used in ongoing and future research on the IoT to understand the principles of the IoT, which will, in turn, promote the better development of existing and new IoT devices. The next objective is to utilize the IoT network for enterprise architecture (EA) based IoT application. EA defines the structure and operation of an organization to determine the most effective way for it to achieve its objectives. Digital transformation of EA is achieved through analysis, planning, design, and implementation, which interprets enterprise goals into an IoT-enabled enterprise design. A blueprint is necessary for the readying of IT resources that support business services and processes. A systematic approach is proposed for the planning and development of EA for IoT-Applications. The Enterprise Interface (EI) layer is proposed to efficiently categorize the data. The data is categorized based on local and global factors. The clustered data is then utilized by the end-users. A novel four-tier structure is proposed for Enterprise Applications. We analyzed the challenges, contextualized them, and offered solutions and recommendations. The last objective of the thesis work is to develop energy-efficient data consistency method. The data consistency is a challenge for designing energy-efficient medium access control protocol used in IoT. The energy-efficient data consistency method makes the protocol suitable for low, medium, and high data rate applications. The idea of energyefficient data consistency protocol is proposed with data aggregation. The proposed protocol efficiently utilizes the data rate as well as saves energy. The optimal sampling rate selection method is introduced for maintaining the data consistency of continuous and periodic monitoring node in an energy-efficient manner. In the starting phase, the nodes will be classified into event and continuous monitoring nodes. The machine learning based logistic classification method is used for the classification of nodes. The sampling rate of continuous monitoring nodes is optimized during the setup phase by using optimized sampling rate data aggregation algorithm. Furthermore, an energy-efficient time division multiple access (EETDMA) protocol is used for the continuous monitoring on IoT devices, and an energy-efficient bit map assisted (EEBMA) protocol is proposed for the event driven nodes

    Integrating IS success model with cybersecurity factors for e-government implementation in the Kingdom of Saudi Arabia

    Get PDF
    The electronic government (E-Gov) Systems are currently getting recognized as an authentic strategically tool in delivering E-services. Considering the development of information system (IS) as well as the expanding of the internet-based applications in KSA, E-Gov has always been a significant aspect in delivering governmental services. This research has adopted the (IS) success model by both DeLone and McLean (D&M), moreover, it adopted technology acceptance model (TAM) with cybersecurity factors, both models were implemented to discover the status of the IS success then investigate cybersecurity aspects that impact the service efficiency and effectiveness in KSA. Consequently, this research aims to create a model to investigate the IS success model along with cybersecurity factors that influence E-Gov services effectiveness and usage. Therefore, a survey has been applied as the major data gathering approach; the survey has been distributed among 211 users of E-Gov services consistently. Moreover, all research findings were attained through a quantitative method using the structural equation modelling (SEM). Findings revealed that the constructs fundamental of the (IS) success model are strongly influencing users' satisfaction (US) of the E-Gov services; correspondingly, the fundamental constructs factors of cybersecurity with TAM appear to have a strong impacts on perceived risk (PR), in addition, both which affect the E-Gov services towards usage and effectiveness

    AN EXTENDED POISSON-LOMAX DISTRIBUTION

    Get PDF

    The Effectiveness of International Humanitarian Law (IHL) in the Environmental Protection at Armed Conflict Areas

    Get PDF
    The essential need for human protection and care for the survival requirements at all times is the main motive that encouraged the researcher to write this paper. Man is the essence of life, and the basis of his survival is his sense of security and peace and guarantees his freedoms and respect for his dignity at all times. As human rights expand, this is reflected in the provisions of international humanitarian law, which is one of the most important branches of international public law, because it is closely linked to human. It has thus far saved millions of people provided that they abide by this law and abide by its rules and provisions.This paper aims to identify and determine whether the provisions of International Humanitarian Law (IHL) are beneficial to the protection of the natural environment through the collection of previous studies and consideration of conferences, treaties and international conventions dealing with international humanitarian law. Keywords: human protection, international humanitarian law,Environmental protection

    Charged Particles Circular Orbits around Weakly Charged and Magnetized Kerr Black Holes

    Full text link
    We study the circular orbits of charged particles around a weakly charged Kerr black hole immersed in a weak, axisymmetric magnetic field. Firstly, we review the circular orbits of neutral particles. We then review the circular orbits of charged particles around a weakly charged Kerr black hole and weakly magnetized Kerr black hole. The case of a weakly magnetized and charged black hole is investigated thereafter. We investigate, in particular, the effect of the electromagnetic forces on the charged particles' innermost stable circular orbits. We examine the conditions for the existence of negative-energy stable circular orbits and the possibility of the emergence of a gap or double orbit in thin accretion disks. Some of the interesting astrophysical consequences of our findings are discussed as well.Comment: Accepted for publication in the Astrophysical Journal. arXiv admin note: substantial text overlap with arXiv:2208.1395

    Effect of diet control and exercise on the lipid profile of obese men

    Get PDF
    Background: Obesity is a major health problem which might contribute to many other problems such as heart disease and hypertension as well as diabetes due to abnormal lipid profile. The main objective of the current study was to compare the effectiveness of diet or treadmill exercise on normalizing the lipid profile of obese subjects.Methods: Forty women complaining from obesity was enrolled in this study and was randomly divided into 4 groups: control group: 10 obese women which don’t receive any thing, diet group: 10 obese women which received polysaturated fatty acid diet, exercise group: 10 obese women which received treadmill exercise for 30 minutes and lastly diet/exercise group: 10 obese women which received both diet and exercise. Measurement of weight, body mass index, and lipid profile for all groups was measured before and after 60 days of treatment intervention. Results: Diet and exercise should have a highly significant decrease of weight and body mass index and normalizing the lipid profile (p≤0.05) under the current situation used in this study.Conclusions: It was concluded that the combination of diet and exercise was highly effective in normalizing the lipid profile and overcoming obesity.
    • …
    corecore