Results (133)
Search Parameters:
Keyword: InternetCoordination between Heterogeneous Models Using a Meta-model Composition Approach
The technological advance as well as needs of human beings made that systems became more and more complex. In contrast, the use and creation of new modelling languages became simple and no more reserved for a handful of language experts. Consequently, many new practices of systems implementation emerged, among them, the use of different domain…
Read MoreChatting with Plants (Orchids) in Automated Smart Farming using IoT, Fuzzy Logic and Chatbot
Plants are living organisms that can hear and recognize the environment around them but cannot communicate to inform their needs. Thus, in the past, humans thought that it was impossible to communicate with plants. However, in this modern era, humans can be able to communicate with these plants. In this paper, we propose a model…
Read MoreEvent Monitoring using Distributed Pattern Recognition Approach on Integrated IoT-Blockchain Network
With the advancement in the field of Internet-of-Things (IoT), event monitoring applications have rapidly evolved from a simple event data acquisition towards predictive event analytics involving multi-sensory data aggregation in a distributed environment. Existing event monitoring schemes are mainly relying on ine_cient centralized processing mechanism, which may lead to the common single-point of failure for…
Read MoreDetection the Places of the Heat Energy Leak on the Underground Thermal Pipelines Using the Computer System
The purpose of this paper is to improve the thermographic method for detection the places of heat energy losses on the urban underground thermal pipelines using the computer system. This goal was achieved by building a heat map of the surveyed heating main with data layering directly on a computer map of the area, which…
Read MoreEnabling the Edge – A method for dynamic virtualizable connections for 5G deployments
The telecommunications industry continues to move forward with plans for 5G service with rates including 6Gb/s followed by upgrade paths promising 20Gb/s. Despite advances in wireless technology associated with 5G roll-outs, there remains the problem of providing sufficient backhaul throughput and efficient handling of hand-off services within the relatively small projected cell boundaries that can…
Read MoreVirtualization in Cloud Environment: Bandwidth Management
Cloud computing recently emerged as an interesting model that enables computing and other related internet activities to take place anywhere, anytime. Cloud service providers centralize all servers, networks, and applications to allow their users’ access at any time and from any location. Cloud computing uses already existing resources like server, CPU and storage memory but…
Read MoreDevelopment & Implementation of Smart Vehicle Over Speeding Detector using IoT
Nowadays over speeding is one of the most common traffic violations. Generally, over speeding is the result of restless and bad behavior of drivers. As the accident rates are increasing it is important to develop and implement a system which can automatically detect and report over speeding to the traffic control authorities as early as…
Read MoreA Systematic Mapping Study of Cloud, Fog, and Edge/Mobile Devices Management, Hierarchy Models and Business Models
Cloud computing is an exceptional paradigm, which is facilitating the developments and utilization of resources over the internet. Fog computing operates at the edge of the network saving bandwidth, by not sending all information to the cloud, while edge computing does processing of data at the edge of the cloud. Edge computing reduces the distance…
Read MoreA Spectrum Sharing based Metering Infrastructure for Smart Grid Utilizing LTE and WiFi
In advanced metering infrastructure (AMI) of smart grid, WiFi is an appropriate choice for its bidirectional communication requirement to transmit data to the billing center. But, WiFi functions in the free spectrum bands and LTE also requires to use the same free bands for its network expansion being licensed spectrum is limited and expansive. LTE…
Read MoreA Relation Extraction System for Indian Languages
Relation Extraction is an important subtask of Information Extraction that involves extracting significant facts from natural language text. Extracting structured information from the plaintext is the ultimate goal of IE systems. The Indian language content on the internet is increasing day to day. Extracting relevant information from this huge unstructured data is a challenging task…
Read MoreEnhancing and Monitoring Patient Outcomes Through Customized Learning
Chronic diseases such as heart disease, cancer, diabetes, and asthma continue to increase in the general public within the modern era. With careful observation of the symptoms potential diseases may be detected early and managed properly. For that to happen, the awareness of the symptoms and proper knowledge about the diseases may be needed for…
Read MoreWeb Authentication: no Password; Listen and Touch
Just as electricity has an essential role in our lives, the internet network and especially web services have become of vital importance nowadays. Without security service layers, apparently small things like checking a child’s school schedule on web may turn the daily routine into a nightmare. Web services users are still required to use many…
Read MoreAdaptation of Electronic Book Publishing Technology by The Publishers in Southeast Nigeria
This paper investigates the electronic book production and distribution practices adopted by the Publishers in Southeast Nigeria because of the global growing interest in writing new book titles in digital form as well as converting paper titles to digital content. To investigate this study, the researcher formulated three research questions to guide the study. A…
Read MoreiSensA – A System for Collecting and Integrating Sensor Data
The idea of monitoring several types of parameters in various environments has been motivating significant research works in Internet of Things (IoT). This paper presents the design and construction of iSensA, a system for integrating and collecting information from sensors. The solution implements a multi-sensor monitoring system and then expands the monitoring concept to an…
Read MoreAnalysis and Methods on The Framework and Security Issues for Connected Vehicle Cloud
In the world today, the rapid development of the Internet of Things (IoT) and the application of the Connected Vehicle Cloud (CVC) as the Internet of Things in the intelligent transportation are becoming widespread. They can improve people’s safety, vehicle security as well as reduce the cost of ownership of an automobile. At the same…
Read MoreHolistic Access Control and Privacy Infrastructure in Distributed Environment
This article discusses IoT security in situations whereby devices do not share the same security domains, which raises security, privacy and safety concerns. It then presents an Access Control and Privacy infrastructure for addressing these concerns in the context of distributed environments. IoT deployments allow billions of connected physical devices to collect, process and share…
Read MoreSDN-based Network Control Method for Distributed Storage Systems
With the increasing need for effective storage management due to ever-growing content-generation over the Internet, Distributed Storage Systems (DSS) has arisen as a valuable tool. Although DSS has considerably improved in the past years, it still leverages legacy techniques in its networking. To cope with the demanding requirements, Software Defined Networking (SDN) has revolutionized the…
Read MoreIt Takes Two to Tango: Merging Science and Creativity to Support Continued Innovation in the IoT Domain
The Internet of Things (IoT) is a new concept that has a great appeal for researchers, businesses and the ordinary tech user. It presents new possibilities of connection between devices and people and it stimulates our need and desire to interact, to exchange ideas and to communicate with the surrounding environment. This paper briefly explores…
Read MoreWireless Channel Measurement and Modeling in Industrial Environments
The Industrial Internet of Things (IIoT), a typical use case of the Internet of Things, has been a great prospect for development in the near future. In the developing fifth generation mobile communications, the IIoT is an extremely important application case. In this paper, the channel propagation properties are researched and modeled based on the…
Read MoreEffectiveness of Routing Protocols for Different Networking Scenarios
Selection of a routing protocol is vital for modern arena of Internet communication as network traffic and network complexities are rapidly increasing. This paper evaluates the effectiveness of three routing protocols namely routing information protocol version 2 (RIPv2), open shortest path first (OSPF), enhanced interior gateway routing protocol (EIGRP), and hybrid protocols based on these…
Read MoreWhat Should Be Considered for Acceptance Mobile Payment: An Investigation of the Factors Affecting of the Intention to Use System Services T-Cash
E-Money mobile payments, also called digital money, are electronic payments, payment transactions using an Internet network integrated with NFC-enabled smartphones and prepaid cards. In Indonesia not only banks that issue e-money products, telecom operators from Telkomsel also issued an e-money product called T-cash. T-cash is a new innovation of electronic money presented by Telkomsel. The…
Read MoreInterference Avoidance using Spatial Modulation based Location Aware Beamforming in Cognitive Radio IOT Systems
The Internet of Things (IOT) is a revolutionary communication technology which enables numerous heterogeneous objects to be inter-connected. In such a wireless system, interference management between the operating devices is an important challenge. Cognitive Radio (CR) seems to be a promising enabler transmission technology for the 5G-IOT system. The “sense-and-adapt” smart transmission strategy in CR…
Read MoreA Multilingual System for Cyberbullying Detection: Arabic Content Detection using Machine Learning
With the abundance of Internet and electronic devices bullying has moved its place from schools and backyards into cyberspace; to be now known as Cyberbullying. Cyberbullying is affecting a lot of children around the world, especially Arab countries. Thus concerns from cyberbullying are rising. A lot of research is ongoing with the purpose of diminishing…
Read MoreA Taxonomy for Enhancing Usability, Flexibility, and Security of User Authentication
Two technology trends – a move toward software defined capabilities and toward networked devices – support both unprecedented innovations and requirements for security. A fundamental aspect of security is user authentication, which allows devices and software applications to establish their user’s identity and identity is in turn used to establish which of its capabilities the…
Read MoreA New profiling and pipelining approach for HEVC Decoder on ZedBoard Platform
New multimedia applications such as mobile video, high-quality Internet video or digital television requires high-performance encoding of video signals to meet technical constraints such as runtime, bandwidth or latency. Video coding standard h.265 HEVC (High Efficiency Video Coding) was developed by JCT-VC to replace the MPEG-2, MPEG-4 and h.264 codecs and to respond to these…
Read More
