5G next-generation networking paradigm with its envisioned capacity, coverage, and data transfer rates provide a developmental field for novel applications scenarios. Virtual, Mixed, and Augmented Reality will play a key role as visualization, interaction, and information delivery platforms. The recent hardware and software developments in immersive technologies including AR, VR and MR in terms of the commercial
availability of advanced headsets equipped with XR-accelerated processing units and Software Development Kits (SDKs) are significantly increasing the penetration of such devices for entertainment, corporate and industrial use. This trend creates next-generation usage models which rise serious technical challenges within all networking and software architecture levels to support the immersive digital transformation.
The document discusses data spaces and the truzzt solution. Data spaces aim to virtually integrate dispersed data by leaving data where it is generated and managing it locally, with semantic integration instead of a centralized database. Truzzt provides services like clearing, search/discovery, and connectors to enable secure and compliant data sharing within data spaces while respecting data sovereignty. It onboarding process involves registering companies and devices and issuing certificates to authenticate participants and enable traceable, terms-compliant data exchange.
IMMERSIVE TECHNOLOGIES IN 5G-ENABLED APPLICATIONS: SOME TECHNICAL CHALLENGES ...ijcsit
5G next-generation networking paradigm with its envisioned capacity, coverage, and data transfer rates
provide a developmental field for novel applications scenarios. Virtual, Mixed, and Augmented Reality will
play a key role as visualization, interaction, and information delivery platforms. The recent hardware and
software developments in immersive technologies including AR, VR and MR in terms of the commercial
availability of advanced headsets equipped with XR-accelerated processing units and Software
Development Kits (SDKs) are significantly increasing the penetration of such devices for entertainment,
corporate and industrial use. This trend creates next-generation usage models which rise serious technical
challenges within all networking and software architecture levels to support the immersive digital
transformation. The focus of this paper is to detect, discuss and propose system development approaches
and architectures for successful integration of the immersive technologies in the future information and
communication concepts like Tactile Internet and Internet of Skills.
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsYogeshIJTSRD
Digital watermarking is a method of identifying the rightful owner of digital data by embedding a known message in the data. These methods can be applied to a wide range of digital material, including still images, videos, and music. To safeguard the copyright of digital media, digital watermarking techniques have been created. This study seeks to provide a comprehensive overview and background on the definition, idea, and major accomplishments in the subject of watermarking. It starts with a broad review of digital watermarking, then moves on to assaults, applications, and eventually a detailed examination of existing and new watermarking systems. We classify the techniques according various categories such as host signal, perceptivity, and robustness, and watermark type, necessary data for extraction, processing domain, and applications. Preeti Sondhi | Soufia Gull "Survey on Digital Video Watermarking Techniques, Attacks and Applications" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd43776.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/43776/survey-on-digital-video-watermarking-techniques-attacks-and-applications/preeti-sondhi
Design and implementation of remotely managed embedded digital signage systemIJCSEA Journal
This paper is about a remotely managed digital signage system design considering embedded system design
rules and characteristics. Digital signage system design is based on various methods of using computer and
television screens as well as other kinds of display devices in ways that are as efficient as possible to
provide advertising and information to people in public areas. In modern digital signage systems, the
screens are divided into regions and layers, and the content on the screens is made up of several files. The
goals of this study are broadcasting information, advertisements at display contents in public areas such
as; subways, buses, malls, city squares and control these digital signs remotely.
Role of artificial intelligence in cloud computing, IoT and SDN: Reliability ...IJECEIAES
Information technology fields are now more dominated by artificial intelligence, as it is playing a key role in terms of providing better services. The inherent strengths of artificial intelligence are driving the companies into a modern, decisive, secure, and insight-driven arena to address the current and future challenges. The key technologies like cloud, internet of things (IoT), and software-defined networking (SDN) are emerging as future applications and rendering benefits to the society. Integrating artificial intelligence with these innovations with scalability brings beneficiaries to the next level of efficiency. Data generated from the heterogeneous devices are received, exchanged, stored, managed, and analyzed to automate and improve the performance of the overall system and be more reliable. Although these new technologies are not free of their limitations, nevertheless, the synthesis of technologies has been challenged and has put forth many challenges in terms of scalability and reliability. Therefore, this paper discusses the role of artificial intelligence (AI) along with issues and opportunities confronting all communities for incorporating the integration of these technologies in terms of reliability and scalability. This paper puts forward the future directions related to scalability and reliability concerns during the integration of the above-mentioned technologies and enable the researchers to address the current research gaps.
The document discusses recent trends and research areas related to the Internet of Things (IoT). It begins with an introduction to IoT, describing it as enabling connections between devices anytime, anywhere through any media. It then covers IoT architecture and applications, challenges including interoperability and security, and potential research directions such as developing energy efficient and secure algorithms for edge devices. The document also discusses IoT user growth ratios, platforms for IoT development, and potential future innovations. It concludes that IoT will play a major role in monitoring the environment and that further research is still needed in areas like applications, edge/fog/cloud systems, and addressing security and privacy concerns.
The document discusses M2M (machine-to-machine) communication and the Eclipse M2M Industry Workgroup's efforts to standardize and promote open interoperability in the field. It outlines key trends driving growth in the M2M market, challenges facing development, and the Workgroup's goals of providing open communication protocols, application frameworks, tools, and a developer portal to support an ecosystem of integrated M2M solutions. Use cases illustrate potential applications in vertical markets like logistics, medical services, and more.
The document discusses data spaces and the truzzt solution. Data spaces aim to virtually integrate dispersed data by leaving data where it is generated and managing it locally, with semantic integration instead of a centralized database. Truzzt provides services like clearing, search/discovery, and connectors to enable secure and compliant data sharing within data spaces while respecting data sovereignty. It onboarding process involves registering companies and devices and issuing certificates to authenticate participants and enable traceable, terms-compliant data exchange.
IMMERSIVE TECHNOLOGIES IN 5G-ENABLED APPLICATIONS: SOME TECHNICAL CHALLENGES ...ijcsit
5G next-generation networking paradigm with its envisioned capacity, coverage, and data transfer rates
provide a developmental field for novel applications scenarios. Virtual, Mixed, and Augmented Reality will
play a key role as visualization, interaction, and information delivery platforms. The recent hardware and
software developments in immersive technologies including AR, VR and MR in terms of the commercial
availability of advanced headsets equipped with XR-accelerated processing units and Software
Development Kits (SDKs) are significantly increasing the penetration of such devices for entertainment,
corporate and industrial use. This trend creates next-generation usage models which rise serious technical
challenges within all networking and software architecture levels to support the immersive digital
transformation. The focus of this paper is to detect, discuss and propose system development approaches
and architectures for successful integration of the immersive technologies in the future information and
communication concepts like Tactile Internet and Internet of Skills.
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsYogeshIJTSRD
Digital watermarking is a method of identifying the rightful owner of digital data by embedding a known message in the data. These methods can be applied to a wide range of digital material, including still images, videos, and music. To safeguard the copyright of digital media, digital watermarking techniques have been created. This study seeks to provide a comprehensive overview and background on the definition, idea, and major accomplishments in the subject of watermarking. It starts with a broad review of digital watermarking, then moves on to assaults, applications, and eventually a detailed examination of existing and new watermarking systems. We classify the techniques according various categories such as host signal, perceptivity, and robustness, and watermark type, necessary data for extraction, processing domain, and applications. Preeti Sondhi | Soufia Gull "Survey on Digital Video Watermarking Techniques, Attacks and Applications" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd43776.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/43776/survey-on-digital-video-watermarking-techniques-attacks-and-applications/preeti-sondhi
Design and implementation of remotely managed embedded digital signage systemIJCSEA Journal
This paper is about a remotely managed digital signage system design considering embedded system design
rules and characteristics. Digital signage system design is based on various methods of using computer and
television screens as well as other kinds of display devices in ways that are as efficient as possible to
provide advertising and information to people in public areas. In modern digital signage systems, the
screens are divided into regions and layers, and the content on the screens is made up of several files. The
goals of this study are broadcasting information, advertisements at display contents in public areas such
as; subways, buses, malls, city squares and control these digital signs remotely.
Role of artificial intelligence in cloud computing, IoT and SDN: Reliability ...IJECEIAES
Information technology fields are now more dominated by artificial intelligence, as it is playing a key role in terms of providing better services. The inherent strengths of artificial intelligence are driving the companies into a modern, decisive, secure, and insight-driven arena to address the current and future challenges. The key technologies like cloud, internet of things (IoT), and software-defined networking (SDN) are emerging as future applications and rendering benefits to the society. Integrating artificial intelligence with these innovations with scalability brings beneficiaries to the next level of efficiency. Data generated from the heterogeneous devices are received, exchanged, stored, managed, and analyzed to automate and improve the performance of the overall system and be more reliable. Although these new technologies are not free of their limitations, nevertheless, the synthesis of technologies has been challenged and has put forth many challenges in terms of scalability and reliability. Therefore, this paper discusses the role of artificial intelligence (AI) along with issues and opportunities confronting all communities for incorporating the integration of these technologies in terms of reliability and scalability. This paper puts forward the future directions related to scalability and reliability concerns during the integration of the above-mentioned technologies and enable the researchers to address the current research gaps.
The document discusses recent trends and research areas related to the Internet of Things (IoT). It begins with an introduction to IoT, describing it as enabling connections between devices anytime, anywhere through any media. It then covers IoT architecture and applications, challenges including interoperability and security, and potential research directions such as developing energy efficient and secure algorithms for edge devices. The document also discusses IoT user growth ratios, platforms for IoT development, and potential future innovations. It concludes that IoT will play a major role in monitoring the environment and that further research is still needed in areas like applications, edge/fog/cloud systems, and addressing security and privacy concerns.
The document discusses M2M (machine-to-machine) communication and the Eclipse M2M Industry Workgroup's efforts to standardize and promote open interoperability in the field. It outlines key trends driving growth in the M2M market, challenges facing development, and the Workgroup's goals of providing open communication protocols, application frameworks, tools, and a developer portal to support an ecosystem of integrated M2M solutions. Use cases illustrate potential applications in vertical markets like logistics, medical services, and more.
Intelligenza artificiale: le sue potenzialità, la bozza di regolamento UE e r...Giulio Coraggio
Quali sono le potenzialità di business dell’intelligenza artificiale, quale è il potenziale impatto del regolamento sull’IA sulle stesse e quali sono le questioni legali ed etiche che rimangono irrisolte dopo il regolamento? Ne abbiamo discusso in webinar organizzato da AIGI con lo studio legale DLA Piper. La presentazione qui pubblicata è stata realizzata da Pietro Scarpino – VP, Head of IoT, VR & AI Service Line di NTT Data e
Giulio Coraggio – Location Head of Italian Intellectual Property and Technology Department di DLA Piper
Wireless and Mobile Computing Build Secure and Maintain Wireless SolutionsYogeshIJTSRD
Today’s fast growing world needs faster communication. Technology is making rapid progress and is making many things easier. The innovative idea’s that have been emerged from the tender minds of young scientists led to the evolution of many techniques where our present topic -˜MOBILE COMPUTING’ fits in. “MOBILE COMPUTING- and COMMUNICATIONS is a major part of wireless communication technology. Mobile computing in means computing done by intermittently connected users who access network resources. It requires a wireless medium such as cellular radio, radio nets and low orbit satellites. It incorporates wireless adapters using cellular telephone technology to connect portable computers with the cabled network. Mobile voice communication is widely established throughout the world and had a very rapid increase in the number of subscribers to the various cellular networks over the last few years. An extension of this technology is the ability to send and receive data across these cellular networks. This is the principle of mobile computing. Mobile data communication has become a very important and rapidly evolving technology as it allows users to transmit data from remote locations to other remote or fixed locations. This proves to be the solution to the biggest problem of business people on the move mobility. We in this paper describes about the Mobility Services Architecture which supports applications by a middleware stub. Mobile Computing evolved during the last few years as a result of shrinking portables and growing wireless networks. It enlarges the usability of computers, but raises demanding challenges. The paper describes about the methodology, problems in wireless industry, and how J2SE is used in this technology .The paper concludes with the pros and cons of this mobile computing and its future. Akhilesh Bholanath Patel "Wireless and Mobile Computing: Build Secure and Maintain Wireless Solutions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd43757.pdf Paper URL: https://www.ijtsrd.com/management/other/43757/wireless-and-mobile-computing-build-secure-and-maintain-wireless-solutions/akhilesh-bholanath-patel
1) Modern computer network technologies provide the basic infrastructure for information and communication in hospitals today. Ethernet and ATM are the two major technologies used to build enterprise networks.
2) Networking is changing faster than ever due to a growing emphasis on AI technology. Emerging technologies like AI-driven networks, the Internet of Things, 5G, edge computing, and cloud repatriation are transforming computer networking.
3) Looking ahead to the 2020s, next generation wireless technologies like 5G and WiFi 6 will drive major changes in networking. Software-defined wide area networks will also become more common as workloads continue moving to the cloud.
IoT–smart contracts in data trusted exchange supplied chain based on block ch...IJECEIAES
This document discusses using blockchain technology and smart contracts to enable trusted data exchange in IoT supply chains. Specifically, it proposes a blockchain-based solution to address the lack of trust provided by centralized infrastructure for IoT data exchange. The system would use blockchain to verify transactions in a decentralized manner without an intermediary. Sensor devices using blockchain could publicly record temperature, location, and damage data during shipping to guarantee product quality. Smart contracts on the Ethereum blockchain could then automatically assess the sensor data against product attributes.
This document discusses standards for the Internet of Things (IoT). It makes three key points:
1. Achieving interoperability across different industry sectors and standards bodies will be challenging due to competing business interests but is crucial for IoT success.
2. Testbeds that allow for plug-and-play testing of components from different vendors can help advance interoperability and assess new business models.
3. Viewing testbeds as a service could help recoup the large investments required and facilitate collaboration across organizations.
The document discusses IBM's involvement in the Internet of Things (IoT) space. It outlines that since 2009, IBM has been pioneering work in smarter cities and smarter planet initiatives which have delivered practical IoT applications across industries. IBM leads in enterprise IoT implementations that securely combine and analyze data from different sources. With its Bluemix platform, IoT cloud services, and developer tools, IBM helps both enterprises and startups integrate data from IoT and traditional sources on an open platform. This allows engineers and developers to design new connected devices and applications optimized for IoT.
Top 10 Trending Technologies To Master In 2021LokeshLusifer
Change is the only constant. This applies to your professional life as well. Upskilling Yourself is needed nowadays, the reason is pretty simple, technology is evolving very quickly? I have listed the top trending technologies which are expected to acquire a huge market in 2021.
2. You can also the link for getting special offers and related article
https://www.learntek.org/blog/top-10-technology-trends-in-2019/
Learntek is global online training provider on Big Data Analytics, Hadoop, Machine Learning, Deep Learning, IOT, AI, Cloud Technology, DEVOPS, Digital Marketing and other IT and Management courses.
Latest Trends in Information Technology - Wikki VermaWikki Verma
This document discusses the latest trends in information technology. It outlines how semiconductor technology and advanced storage devices have made microchips and data storage smaller and more efficient. Networking has also advanced significantly with the development of optical fiber networks, allowing more computers to connect. Popular applications of information technology mentioned include video conferencing, voice over internet protocol (VoIP) like Skype, and webcasting.
The document summarizes Gartner's top 10 strategic technology trends for 2014 presented at their annual conference. The trends include:
1) Increased mobile device diversity and management challenges for IT as employees use 3-5 devices by 2016.
2) Growing demand for cross-platform mobile apps as apps shrink and become more targeted.
3) Emergence of the "Internet of Everything" connecting 25 billion devices by 2020 and creating opportunities for data analytics.
4) Evolution to hybrid cloud architectures that combine internal and external services in various compositions.
5) Movement to cloud-based, client-agnostic applications accessible from any device.
6) Transition to personal clouds centered on user-defined services rather
Creating a Playbook to Exploit the Long Tail of IoTAricent
This document outlines a playbook for companies to exploit opportunities in the long tail of the IoT market. It discusses four essential aspects of a strategy to unlock IoT's potential: having knowledge of the competitive landscape; embracing extreme volatility; accepting commercial uncertainty; and being fast, agile and flexible. It provides examples of companies applying these strategies in markets like smart metering, wearables and automotive software. The overall message is that IoT value will come from many small use cases, requiring experimentation and an ability to learn and pivot quickly as technologies and markets evolve.
Gartner identified the top 10 strategic technology trends for 2014, including mobile device diversity and management, mobile apps and applications, and the Internet of Everything. Other trends include hybrid cloud/IT as a service broker, cloud/client architecture, the era of personal cloud, software defined anything, web-scale IT, smart machines, and 3D printing. Gartner predicts these trends will have significant impacts on IT organizations through 2018 as mobile use expands, cloud adoption grows, and new technologies like smart machines and 3D printing disrupt existing models.
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...IndianAppDevelopers
This document discusses how the emergence of IoT and AI impacts cloud computing vulnerability. It explains that while these technologies can improve user experience and business operations, they also create new security risks if not implemented properly. Specifically, the interconnected devices and sensors from IoT expand the attack surface, while AI and cloud computing aim to detect threats but have their own weaknesses. The author argues these technologies must be developed with strict data access protocols and focus on eliminating known vulnerabilities.
Artificial intelligence is part of almost every business today; it facilitates business operations, increases productivity, and offers a variety of ways to speed up communication processes. Artificial intelligence and software (or software applications installed on it), as well as automation through AI systems, perform many of the tasks previously performed by employees and workers. Switching to an automated working environment has resulted in a lot of unnecessary business expenses, substantial time savings and a gradual increase in profits. The automation through AI of various business processes has taken many companies and organizations to the next level in terms of production and management.So, this article explains the role of artificial intelligence, machine learning and cloud computing in business. by Dr. Pawan Whig 2019. Artificial Intelligence and Machine Learning In Business. International Journal on Integrated Education. 2, 2 (Jun. 2019). https://journals.researchparks.org/index.php/IJIE/article/view/516/493 https://journals.researchparks.org/index.php/IJIE/article/view/516
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...IRJET Journal
This document proposes an e-toll payment system using Azure cloud that automates toll payments. A mobile app allows users to pay tolls digitally via wallet, credit/debit cards, or banking. Successful payments are recorded on Azure cloud along with the vehicle's RFID tag ID. At toll gates, RFID readers scan tags and check the cloud to see if payment was made. If so, the gate opens, streamlining the toll process and reducing congestion. The system aims to provide a more convenient cashless toll payment alternative compared to existing smart card or queue-based systems.
Hash Box GmbH is developing an IoT platform called #box that allows users to monitor and control both smart devices and non-smart devices from their smartphone or computer. #box is an small cube-shaped device that connects to the home WiFi and provides an interface to integrate various electronic devices and appliances. It comes with additional helper devices called #devices that can make non-smart devices internet-connected by adding smart sockets, switches, and bulbs. The #box platform software forms the infrastructure to connect different IoT components and devices together into a single system that can be managed remotely.
The document discusses five emerging technologies in industry: 1) Internet of Things (IoT) which refers to the growing network of physical objects connected to the internet; 2) Artificial Intelligence (AI) which simulates human intelligence through machine learning and problem solving; 3) 5G networks which will provide faster wireless speeds and lower latency; 4) Serverless computing which allows users to deploy code without managing infrastructure and be charged based on usage; 5) Blockchain which is a distributed database existing across multiple computers that records transactions in an immutable digital ledger. These emerging technologies are expected to significantly impact businesses and create new opportunities across various industries over the next 5-10 years.
The internet of things: Taking the technology and communication space by st...Christiana Wu
The Internet of Things (IoT) is an emerging topic of technical, social, and economic significance. Everyday objects such as consumer products, cars, and industrial components are being combined with internet connectivity and powerful data analysis capabilities that promise to transform the way we work, live, and play. The projections for growth in IoT are impressive, with some anticipating as many as 100 billion connected IoT devices and a global value of over USD 11 trillion by 2025E.
With such unprecedented growth, which sectors might benefit the most? Find out more on how IoT is changing the landscape of IT and bringing in lucrative opportunities along the value chain.
Cloud, Big Data, IoT, ML - together to build a real world use case!Krishna-Kumar
Open Source India Conference 2017 - Cloud Big Data IoT ML together to build a real world use case / solution. Comparative study of various software stacks included.
Technology Forecast - Driving Growth With Cloud ComputingPier Paolo Mucelli
This article discusses how cloud computing can enable companies to become an "extensible enterprise" and unlock new business growth opportunities by making internal capabilities available to external partners and customers. It provides the following examples:
- Automatic Data Processing (ADP) leveraged cloud computing to integrate more deeply with ecosystem partners and offer their payroll services to a wider range of customers, allowing them to maintain revenue stability during an economic downturn.
- Amazon Web Services (AWS) used modular cloud services to build a business model where they offer internal infrastructure capabilities to external customers, creating a large new revenue stream.
- Cloud computing allows companies to encode internal business services into software and provision them in the cloud, opening them up to third
This review article provides a comprehensive overview of recent advances in evolving computing paradigms including cloud, edge, and fog computing. It discusses the limitations of cloud computing that led to the development of edge and fog computing paradigms. Specifically, it explores how edge and fog computing aim to address issues like latency, bandwidth constraints, and privacy concerns of cloud computing. It also examines the convergence of machine learning with edge/fog computing and its significance. Additionally, it identifies several open challenges and future research directions in these evolving computing paradigms.
This document discusses emerging technologies related to the Internet of Things (IoT). It defines IoT as physical objects communicating via the internet, with estimates of 30-50 billion connected objects by 2020. Key areas of focus for IoT include facilities management, industrial applications, energy, healthcare, transportation, and more. The document also discusses technology trends driving IoT like automation, robotics, AI, 3D printing, and analytics. It notes issues around ethics, security, privacy and jobs related to IoT.
Intelligenza artificiale: le sue potenzialità, la bozza di regolamento UE e r...Giulio Coraggio
Quali sono le potenzialità di business dell’intelligenza artificiale, quale è il potenziale impatto del regolamento sull’IA sulle stesse e quali sono le questioni legali ed etiche che rimangono irrisolte dopo il regolamento? Ne abbiamo discusso in webinar organizzato da AIGI con lo studio legale DLA Piper. La presentazione qui pubblicata è stata realizzata da Pietro Scarpino – VP, Head of IoT, VR & AI Service Line di NTT Data e
Giulio Coraggio – Location Head of Italian Intellectual Property and Technology Department di DLA Piper
Wireless and Mobile Computing Build Secure and Maintain Wireless SolutionsYogeshIJTSRD
Today’s fast growing world needs faster communication. Technology is making rapid progress and is making many things easier. The innovative idea’s that have been emerged from the tender minds of young scientists led to the evolution of many techniques where our present topic -˜MOBILE COMPUTING’ fits in. “MOBILE COMPUTING- and COMMUNICATIONS is a major part of wireless communication technology. Mobile computing in means computing done by intermittently connected users who access network resources. It requires a wireless medium such as cellular radio, radio nets and low orbit satellites. It incorporates wireless adapters using cellular telephone technology to connect portable computers with the cabled network. Mobile voice communication is widely established throughout the world and had a very rapid increase in the number of subscribers to the various cellular networks over the last few years. An extension of this technology is the ability to send and receive data across these cellular networks. This is the principle of mobile computing. Mobile data communication has become a very important and rapidly evolving technology as it allows users to transmit data from remote locations to other remote or fixed locations. This proves to be the solution to the biggest problem of business people on the move mobility. We in this paper describes about the Mobility Services Architecture which supports applications by a middleware stub. Mobile Computing evolved during the last few years as a result of shrinking portables and growing wireless networks. It enlarges the usability of computers, but raises demanding challenges. The paper describes about the methodology, problems in wireless industry, and how J2SE is used in this technology .The paper concludes with the pros and cons of this mobile computing and its future. Akhilesh Bholanath Patel "Wireless and Mobile Computing: Build Secure and Maintain Wireless Solutions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd43757.pdf Paper URL: https://www.ijtsrd.com/management/other/43757/wireless-and-mobile-computing-build-secure-and-maintain-wireless-solutions/akhilesh-bholanath-patel
1) Modern computer network technologies provide the basic infrastructure for information and communication in hospitals today. Ethernet and ATM are the two major technologies used to build enterprise networks.
2) Networking is changing faster than ever due to a growing emphasis on AI technology. Emerging technologies like AI-driven networks, the Internet of Things, 5G, edge computing, and cloud repatriation are transforming computer networking.
3) Looking ahead to the 2020s, next generation wireless technologies like 5G and WiFi 6 will drive major changes in networking. Software-defined wide area networks will also become more common as workloads continue moving to the cloud.
IoT–smart contracts in data trusted exchange supplied chain based on block ch...IJECEIAES
This document discusses using blockchain technology and smart contracts to enable trusted data exchange in IoT supply chains. Specifically, it proposes a blockchain-based solution to address the lack of trust provided by centralized infrastructure for IoT data exchange. The system would use blockchain to verify transactions in a decentralized manner without an intermediary. Sensor devices using blockchain could publicly record temperature, location, and damage data during shipping to guarantee product quality. Smart contracts on the Ethereum blockchain could then automatically assess the sensor data against product attributes.
This document discusses standards for the Internet of Things (IoT). It makes three key points:
1. Achieving interoperability across different industry sectors and standards bodies will be challenging due to competing business interests but is crucial for IoT success.
2. Testbeds that allow for plug-and-play testing of components from different vendors can help advance interoperability and assess new business models.
3. Viewing testbeds as a service could help recoup the large investments required and facilitate collaboration across organizations.
The document discusses IBM's involvement in the Internet of Things (IoT) space. It outlines that since 2009, IBM has been pioneering work in smarter cities and smarter planet initiatives which have delivered practical IoT applications across industries. IBM leads in enterprise IoT implementations that securely combine and analyze data from different sources. With its Bluemix platform, IoT cloud services, and developer tools, IBM helps both enterprises and startups integrate data from IoT and traditional sources on an open platform. This allows engineers and developers to design new connected devices and applications optimized for IoT.
Top 10 Trending Technologies To Master In 2021LokeshLusifer
Change is the only constant. This applies to your professional life as well. Upskilling Yourself is needed nowadays, the reason is pretty simple, technology is evolving very quickly? I have listed the top trending technologies which are expected to acquire a huge market in 2021.
2. You can also the link for getting special offers and related article
https://www.learntek.org/blog/top-10-technology-trends-in-2019/
Learntek is global online training provider on Big Data Analytics, Hadoop, Machine Learning, Deep Learning, IOT, AI, Cloud Technology, DEVOPS, Digital Marketing and other IT and Management courses.
Latest Trends in Information Technology - Wikki VermaWikki Verma
This document discusses the latest trends in information technology. It outlines how semiconductor technology and advanced storage devices have made microchips and data storage smaller and more efficient. Networking has also advanced significantly with the development of optical fiber networks, allowing more computers to connect. Popular applications of information technology mentioned include video conferencing, voice over internet protocol (VoIP) like Skype, and webcasting.
The document summarizes Gartner's top 10 strategic technology trends for 2014 presented at their annual conference. The trends include:
1) Increased mobile device diversity and management challenges for IT as employees use 3-5 devices by 2016.
2) Growing demand for cross-platform mobile apps as apps shrink and become more targeted.
3) Emergence of the "Internet of Everything" connecting 25 billion devices by 2020 and creating opportunities for data analytics.
4) Evolution to hybrid cloud architectures that combine internal and external services in various compositions.
5) Movement to cloud-based, client-agnostic applications accessible from any device.
6) Transition to personal clouds centered on user-defined services rather
Creating a Playbook to Exploit the Long Tail of IoTAricent
This document outlines a playbook for companies to exploit opportunities in the long tail of the IoT market. It discusses four essential aspects of a strategy to unlock IoT's potential: having knowledge of the competitive landscape; embracing extreme volatility; accepting commercial uncertainty; and being fast, agile and flexible. It provides examples of companies applying these strategies in markets like smart metering, wearables and automotive software. The overall message is that IoT value will come from many small use cases, requiring experimentation and an ability to learn and pivot quickly as technologies and markets evolve.
Gartner identified the top 10 strategic technology trends for 2014, including mobile device diversity and management, mobile apps and applications, and the Internet of Everything. Other trends include hybrid cloud/IT as a service broker, cloud/client architecture, the era of personal cloud, software defined anything, web-scale IT, smart machines, and 3D printing. Gartner predicts these trends will have significant impacts on IT organizations through 2018 as mobile use expands, cloud adoption grows, and new technologies like smart machines and 3D printing disrupt existing models.
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...IndianAppDevelopers
This document discusses how the emergence of IoT and AI impacts cloud computing vulnerability. It explains that while these technologies can improve user experience and business operations, they also create new security risks if not implemented properly. Specifically, the interconnected devices and sensors from IoT expand the attack surface, while AI and cloud computing aim to detect threats but have their own weaknesses. The author argues these technologies must be developed with strict data access protocols and focus on eliminating known vulnerabilities.
Artificial intelligence is part of almost every business today; it facilitates business operations, increases productivity, and offers a variety of ways to speed up communication processes. Artificial intelligence and software (or software applications installed on it), as well as automation through AI systems, perform many of the tasks previously performed by employees and workers. Switching to an automated working environment has resulted in a lot of unnecessary business expenses, substantial time savings and a gradual increase in profits. The automation through AI of various business processes has taken many companies and organizations to the next level in terms of production and management.So, this article explains the role of artificial intelligence, machine learning and cloud computing in business. by Dr. Pawan Whig 2019. Artificial Intelligence and Machine Learning In Business. International Journal on Integrated Education. 2, 2 (Jun. 2019). https://journals.researchparks.org/index.php/IJIE/article/view/516/493 https://journals.researchparks.org/index.php/IJIE/article/view/516
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...IRJET Journal
This document proposes an e-toll payment system using Azure cloud that automates toll payments. A mobile app allows users to pay tolls digitally via wallet, credit/debit cards, or banking. Successful payments are recorded on Azure cloud along with the vehicle's RFID tag ID. At toll gates, RFID readers scan tags and check the cloud to see if payment was made. If so, the gate opens, streamlining the toll process and reducing congestion. The system aims to provide a more convenient cashless toll payment alternative compared to existing smart card or queue-based systems.
Hash Box GmbH is developing an IoT platform called #box that allows users to monitor and control both smart devices and non-smart devices from their smartphone or computer. #box is an small cube-shaped device that connects to the home WiFi and provides an interface to integrate various electronic devices and appliances. It comes with additional helper devices called #devices that can make non-smart devices internet-connected by adding smart sockets, switches, and bulbs. The #box platform software forms the infrastructure to connect different IoT components and devices together into a single system that can be managed remotely.
The document discusses five emerging technologies in industry: 1) Internet of Things (IoT) which refers to the growing network of physical objects connected to the internet; 2) Artificial Intelligence (AI) which simulates human intelligence through machine learning and problem solving; 3) 5G networks which will provide faster wireless speeds and lower latency; 4) Serverless computing which allows users to deploy code without managing infrastructure and be charged based on usage; 5) Blockchain which is a distributed database existing across multiple computers that records transactions in an immutable digital ledger. These emerging technologies are expected to significantly impact businesses and create new opportunities across various industries over the next 5-10 years.
The internet of things: Taking the technology and communication space by st...Christiana Wu
The Internet of Things (IoT) is an emerging topic of technical, social, and economic significance. Everyday objects such as consumer products, cars, and industrial components are being combined with internet connectivity and powerful data analysis capabilities that promise to transform the way we work, live, and play. The projections for growth in IoT are impressive, with some anticipating as many as 100 billion connected IoT devices and a global value of over USD 11 trillion by 2025E.
With such unprecedented growth, which sectors might benefit the most? Find out more on how IoT is changing the landscape of IT and bringing in lucrative opportunities along the value chain.
Cloud, Big Data, IoT, ML - together to build a real world use case!Krishna-Kumar
Open Source India Conference 2017 - Cloud Big Data IoT ML together to build a real world use case / solution. Comparative study of various software stacks included.
Technology Forecast - Driving Growth With Cloud ComputingPier Paolo Mucelli
This article discusses how cloud computing can enable companies to become an "extensible enterprise" and unlock new business growth opportunities by making internal capabilities available to external partners and customers. It provides the following examples:
- Automatic Data Processing (ADP) leveraged cloud computing to integrate more deeply with ecosystem partners and offer their payroll services to a wider range of customers, allowing them to maintain revenue stability during an economic downturn.
- Amazon Web Services (AWS) used modular cloud services to build a business model where they offer internal infrastructure capabilities to external customers, creating a large new revenue stream.
- Cloud computing allows companies to encode internal business services into software and provision them in the cloud, opening them up to third
This review article provides a comprehensive overview of recent advances in evolving computing paradigms including cloud, edge, and fog computing. It discusses the limitations of cloud computing that led to the development of edge and fog computing paradigms. Specifically, it explores how edge and fog computing aim to address issues like latency, bandwidth constraints, and privacy concerns of cloud computing. It also examines the convergence of machine learning with edge/fog computing and its significance. Additionally, it identifies several open challenges and future research directions in these evolving computing paradigms.
This document discusses emerging technologies related to the Internet of Things (IoT). It defines IoT as physical objects communicating via the internet, with estimates of 30-50 billion connected objects by 2020. Key areas of focus for IoT include facilities management, industrial applications, energy, healthcare, transportation, and more. The document also discusses technology trends driving IoT like automation, robotics, AI, 3D printing, and analytics. It notes issues around ethics, security, privacy and jobs related to IoT.
IRJET- Data Visualization using Augmented RealityIRJET Journal
This document summarizes a research paper on using augmented reality for data visualization. It discusses how augmented reality can provide a 3D view of machines in an industry by overlaying 3D models onto the camera view. Sensors collect real-time machine data that is stored in a cloud database. When users view machines through their device camera, they can see status information by clicking on the overlaid 3D models. The document also discusses challenges like hardware limitations, information filtering, and tracking accuracy that must be addressed for practical augmented reality applications.
BRIDGING THE GAP BETWEEN PHYSICAL AND DIGITAL REALITIES
The key role that connectivity plays in our personal and professional lives has never been more obvious than it is today. Thankfully, despite the sudden, dramatic changes in our behavior earlier this year, networks all around the world have proven to be highly resilient. At Ericsson, we’re committed to ensuring that the network platform continues to improve its ability to meet the full range of societal needs as well as supporting enterprises to stay competitive in the long term. We know that greater agility and speed will be essential.
This issue of our magazine includes several articles that explain Ericsson’s approach to future network development, including my annual technology trends article. The seven trends on this year’s list serve as a critical cornerstone in the development of a common Ericsson vision of what future networks will provide, and what sort of technology evolution will be required to get there.
ERIK EKUDDEN
Senior Vice President, Chief Technology Officer and Head of Group Function Technology
Understanding the IoT Connectivity Landscape – A Contemporary M2M Radio Techn...Ericsson
1. The document discusses the emerging landscape of machine-to-machine (M2M) connectivity technologies that enable the Internet of Things (IoT).
2. Early M2M technologies like Zigbee have not lived up to expectations in large-scale real-world deployments due to issues with reliability, coverage, mobility support and delays.
3. New and promising M2M connectivity solutions that are emerging include low-power WiFi, low-power wide area networks, and improved cellular M2M systems using technologies like LTE and LPWA networks. These newer solutions aim to provide better reliability, availability and performance needed to enable a sustainable IoT ecosystem.
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AIIRJET Journal
This document presents a study on using artificial intelligence to optimize resource allocation in 5G and beyond 5G cellular networks. It discusses the increasing demand for network resources due to more connected devices and applications. A dynamic nested neural network model is developed that can adjust its structure online to meet the changing resource allocation needs. An AI-driven algorithm called ADRA is used that combines the neural network with a Markov decision process to train a model for dynamic resource allocation in modern cellular networks. The algorithm is found to improve the average resource hit rate and reduce average delay time compared to other methods.
Internet of things: review, architecture and applicationsCSITiaesprime
Devices linked to the internet of things (IoT) may communicate with one another in several settings. Furthermore, rather of relying on an existing centralized system, users may develop their own network by using wireless capabilities. This kind of network is known as a wireless mobile ad hoc network. The mobile ad-hoc network (MANET) enables IoT devices to connect with one another in an unstructured networked environment. IoT devices may connect, establish linkages, and share data on a continuous basis. In this system, the cloud's purpose is to store and analyze data acquired from IoT devices. One of the most significant challenges in cloud computing has been identified as information security, and its resolution will result in an even bigger increase in cloud computing usage and popularity in the future. Finally, the goal of this project is to create a framework for facilitating communication between IoT devices in a Cloud and MANET context. Our major contribution is a ground-breaking research initiative that combines cloud computing with the MANET and connects the internet of things. This research might be used to the IoT in the future.
The network extended not just internationally but also throughout a broad
variety of application areas in this age, with healthcare being one of the most
well-known and vital industries. Improvements in healthcare are possible if
we start using the popular internet of things (IoT) technology as a key
instead of focusing on other disciplines. Wireless body area network
(WBAN) is a field in which we communicate with a network of human
people and medical equipment that may be used in conjunction with internet
of things technology to perform any function. Additional features for
software defined networks will be added in the future. In the event of a
critical crisis, the suggested suggestions will be to take care of the patient's
life. Because the fitted equipment keeps a lot better eye on the patient than
previously advised methods. This study combines WBAN, IoT, and software
defined network (SDN) to make sense in the healthcare field.
Authentication Devices in Fog-mobile Edge Computing Environments through a Wi...ijujournal
The rapid growth of the Internet of Things (IoT), cloud computing, Fog computing, mobile edge computing and wireless grids has resulted in the
wide spread deployment of relatively immature technology. These technologies, which will primarily use 5G wireless communication networks, are becoming popular because they can be deployed quickly with little infrastructure and lends themselves to environments
utilizing numerous internet connected devices (ICD). There are, however, many significant challenges faced by security designers, engineers and implementers of these networks in ensuring that the level of
security afforded is appropriate. Because of the threat of exploitation, these networks have to be protected by a robust security architecture due to these technologies being plagued with security problems. The authentication of smart ICDs to IoT networks is a critical mechanism for achieving security on these new information system platforms. This article identifies an authentication process required for these ICDs, which will need to prove their identity to authenticate to an IoT fog-mobile edge computing (FMEC) cloud
network through a wireless grid authentication process. The purpose of this article is to hypothesize a generic authentication methodology for these FMEC clouds uses in an IoT architecture. The proposed
methodology, called wg-IoT, must include the integration of Fog computing, wireless grids and mobile edge computing clouds to create this new IoT architecture. An authentication process developed from the resource sharing protocol (RSP) from a wireless grid is first developed and proposed for the authentication of ICDs. The wireless grid core components must be embedded in IoT devices or sensors
depending on their capability to handle five primary functions: management of identification [ID] andpresence, permissions
management, data transferability, application-programming interface [API] and security.
This document proposes an e-toll payment system using Azure cloud that automates toll gate payments. The system uses RFID tags attached to vehicles with their registration number embedded. When a vehicle reaches the toll gate, the RFID reader obtains the registration number and sends it to the Azure cloud to check if payment was made using a mobile app. If payment was completed, the cloud responds to open the toll gate. This allows drivers to pay electronically without waiting in queues and avoids using cash. The system aims to reduce congestion and fuel consumption at toll plazas through automated payment verification and toll gate control.
How telecom industry realte with IoT as a new area of business- TDC a case studyMd. Kamrul Islam
The document discusses Internet of Things (IoT) and TDC's potential future role in the IoT market in Denmark. It defines IoT and notes that the number of connected devices is expected to grow dramatically by 2020 and 2025. It also discusses the potential economic impact of IoT globally. The document then examines TDC's role in the evolving IoT ecosystem in Denmark, how TDC can create value and generate profit through partnerships and by providing connectivity and services. It identifies key market areas like consumer, public, and business where TDC can expand its IoT business.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
The common vision of smart systems today, is by and large associated with one single concept,
the internet of things (IoT), where the whole physical infrastructure is linked with intelligent
monitoring and communication technologies through the use of wireless sensors. In such an
intelligent vibrant system, sensors are connected to send useful information and control
instructions via distributed sensor networks. Wireless sensors have an easy deployment and
better flexibility of devices contrary to wired setup. With the rapid technological development of
sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an
invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also
important to consider whether the sensors of a WSN should be completely integrated into IoT or
not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a
number of security primitives that can be taken to protect their data over the internet.
Analysis of Media Discourse on Intellectual Property Rights Related to Metave...ClaraZara1
This study examines the evolving discourse on intellectual property rights (IPR) within the metaverse's Korean context, facilitated by the BIGKinds analytics program. As the metaverse transitions from a nascent concept to a complex reality, it reshapes digital interactions and poses new challenges for IPR, necessitating a comprehensive investigation into societal interest and legal discourse. The findings reveal a significant surge in metaverse-related IPR engagement over the past three years, aligning with the broader digital shift amid the COVID-19 pandemic. This pattern suggests an increasing need for nuanced legal approaches to copyright, trademark, and design patent protection in virtual environments. Thus, the urgency for legal reform to accommodate the metaverse's unique characteristics, the necessity for international collaboration on IPR in a borderless digital domain, and the intersection of technological advances, like NFTs and blockchain, with legal frameworks impacting creators' rights. As a result, this study provides policymakers and the digital community with real-time guidance on protecting intellectual property amid the transformative growth of the metaverse.
Huawei proposes the New IP to shape the future network and address its challenges and requirements. The New IP enhances traditional IP with user-definable priorities, ultra-high throughput to connect heterogeneous networks, intrinsic security, and deterministic forwarding. It also supports flexible addressing, space-terrestrial networks, and service-oriented routing to interconnect diverse devices and applications. Huawei suggests ITU-T focus research efforts on the New IP to guide global network evolution in the coming decades.
Fog computing is a system level architecture that distributes computing, storage, control and networking functions closer to users along the continuum between IoT devices and the cloud. It aims to address issues like high latency and network congestion that result from processing and analyzing IoT data solely in the cloud. Key characteristics include supporting real-time interactions, mobility, low latency applications and an extremely large number of heterogeneous devices.
This document proposes a middleware called MSOAH-IoT to address heterogeneity issues in IoT applications. The middleware is based on a service-oriented architecture and uses REST APIs to collect data from heterogeneous sensors. It introduces heterogeneous networking interfaces and has been tested on gateways running different operating systems. The middleware aims to support various smart objects using different networking interfaces and OS systems while unifying various data formats. It is implemented on a Raspberry Pi gateway to manage communications at the network edge and handle heterogeneity issues.
AUTHENTICATING DEVICES IN FOG-MOBILE EDGE COMPUTING ENVIRONMENTS THROUGH A WI...ijujournal
The rapid growth of the Internet of Things (IoT), cloud computing, Fog computing, mobile edge computing
and wireless grids has resulted in the widespread deployment of relatively immature technology. These
technologies, which will primarily use 5G wireless communication networks, are becoming popular
because they can be deployed quickly with little infrastructure and lends themselves to environments
utilizing numerous internet connected devices (ICD). There are, however, many significant challenges
faced by security designers, engineers and implementers of these networks in ensuring that the level of
security afforded is appropriate. Because of the threat of exploitation, these networks have to be protected
by a robust security architecture due to these technologies being plagued with security problems. The
authentication of smart ICDs to IoT networks is a critical mechanism for achieving security on these new
information system platforms. This article identifies an authentication process required for these ICDs,
which will need to prove their identity to authenticate to an IoT fog-mobile edge computing (FMEC) cloud
network through a wireless grid authentication process. The purpose of this article is to begin to
hypothesize a generic authentication methodology for these FMEC clouds uses in an IoT architecture. The
proposed methodology, called wg-IoT, must include the integration of Fog computing, wireless grids and
mobile edge computing clouds to create this new IoT architecture. An authentication process developed
from the resource sharing protocol (RSP) from a wireless grid is first developed and proposed for the
authentication of ICDs. The wireless grid core components must be embedded in IoT devices or sensors
depending on their capability to handle five primary functions: management of identification [ID] and
presence, permissions management, data transferability, application-programming interface [API] and
security.
AUTHENTICATING DEVICES IN FOG-MOBILE EDGE COMPUTING ENVIRONMENTS THROUGH A WI...ijujournal
The rapid growth of the Internet of Things (IoT), cloud computing, Fog computing, mobile edge computing
and wireless grids has resulted in the widespread deployment of relatively immature technology. These
technologies, which will primarily use 5G wireless communication networks, are becoming popular
because they can be deployed quickly with little infrastructure and lends themselves to environments
utilizing numerous internet connected devices (ICD). There are, however, many significant challenges
faced by security designers, engineers and implementers of these networks in ensuring that the level of
security afforded is appropriate. Because of the threat of exploitation, these networks have to be protected
by a robust security architecture due to these technologies being plagued with security problems. The
authentication of smart ICDs to IoT networks is a critical mechanism for achieving security on these new
information system platforms. This article identifies an authentication process required for these ICDs,
which will need to prove their identity to authenticate to an IoT fog-mobile edge computing (FMEC) cloud
network through a wireless grid authentication process. The purpose of this article is to begin to
hypothesize a generic authentication methodology for these FMEC clouds uses in an IoT architecture. The
proposed methodology, called wg-IoT, must include the integration of Fog computing, wireless grids and
mobile edge computing clouds to create this new IoT architecture. An authentication process developed
from the resource sharing protocol (RSP) from a wireless grid is first developed and proposed for the
authentication of ICDs. The wireless grid core components must be embedded in IoT devices or sensors
depending on their capability to handle five primary functions: management of identification [ID] and
presence, permissions management, data transferability, application-programming interface [API] and
security.
Lightweight IoT middleware for rapid application developmentTELKOMNIKA JOURNAL
Sensors connected to the cloud services equipped with data analytics has created a plethora of new type of applications ranging from personal to an industrial level forming to what is known today as Internet of Things (IoT). IoT-based system follows a pattern of data collection, data analytics, automation, and system improvement recommendations. However, most applications would have its own unique requirements in terms of the type of the smart devices, communication technologies as well as its application provisioning service. In order to enable an IoT-based system, various services are commercially available that provide services such as backend-as-a-service (BaaS) and software-as-a-service (SaaS) hosted in the cloud. This, in turn, raises the issues of security and privacy. However there is no plug-and-play IoT middleware framework that could be deployed out of the box for on-premise server. This paper aims at providing a lightweight IoT middleware that can be used to enable IoT applications owned by the individuals or organizations that effectively securing the data on-premise or in remote server. Specifically, the middleware with a standardized application programming interface (API) that could adapt to the application requirements through high level abstraction and interacts with the application service provider is proposed. Each API endpoint would be secured using Access Control List (ACL) and easily integratable with any other modules to ensure the scalability of the system as well as easing system deployment. In addition, this middleware could be deployed in a distributed manner and coordinate among themselves to fulfil the application requirements. A middleware is presented in this paper with GET and POST requests that are lightweight in size with a footprint of less than 1 KB and a round trip time of less than 1 second to facilitate rapid application development by individuals or organizations for securing IoT resources.
A MIDDLEWARE FOR THE INTERNET OF THINGSIJCNCJournal
The Internet of Things (IoT) connects everyday objects including a vast array of sensors, actuators, and smart devices, referred to as “things” to the Internet, in an intelligent and pervasive fashion. This connectivity gives rise to the possibility of using the tracking capabilities of things to impinge on the location privacy of users. Most of the existing management and location privacy protection solutions do not consider the low-cost and low-power requirements of things; or, they do not account for the heterogeneity, scalability, or autonomy of communications supported in the IoT. Moreover, these traditional solutions do not consider the case where a user wishes to control the granularity of the disclosed information based on
the context of their use (e.g. based on the time or the current location of the user). To fill this gap, a middleware, referred to as the Internet of Things Management Platform (IoT-MP) is proposed in this paper.
Similar to Immersive Technologies in 5G-Enabled Applications: Some Technical Challenges of the Novel Usage Models (20)
Home security is of paramount importance in today's world, where we rely more on technology, home
security is crucial. Using technology to make homes safer and easier to control from anywhere is
important. Home security is important for the occupant’s safety. In this paper, we came up with a low cost,
AI based model home security system. The system has a user-friendly interface, allowing users to start
model training and face detection with simple keyboard commands. Our goal is to introduce an innovative
home security system using facial recognition technology. Unlike traditional systems, this system trains
and saves images of friends and family members. The system scans this folder to recognize familiar faces
and provides real-time monitoring. If an unfamiliar face is detected, it promptly sends an email alert,
ensuring a proactive response to potential security threats.
In the era of data-driven warfare, the integration of big data and machine learning (ML) techniques has
become paramount for enhancing defence capabilities. This research report delves into the applications of
big data and ML in the defence sector, exploring their potential to revolutionize intelligence gathering,
strategic decision-making, and operational efficiency. By leveraging vast amounts of data and advanced
algorithms, these technologies offer unprecedented opportunities for threat detection, predictive analysis,
and optimized resource allocation. However, their adoption also raises critical concerns regarding data
privacy, ethical implications, and the potential for misuse. This report aims to provide a comprehensive
understanding of the current state of big data and ML in defence, while examining the challenges and
ethical considerations that must be addressed to ensure responsible and effective implementation.
Cloud Computing, being one of the most recent innovative developments of the IT world, has been
instrumental not just to the success of SMEs but, through their productivity and innovative contribution to
the economy, has even made a remarkable contribution to the economic growth of the United States. To
this end, the study focuses on how cloud computing technology has impacted economic growth through
SMEs in the United States. Relevant literature connected to the variables of interest in this study was
reviewed, and secondary data was generated and utilized in the analysis section of this paper. The findings
of this paper revealed that there have been meaningful contributions that the usage of virtualization has
made in the commercial dealings of small firms in the United States, and this has also been reflected in the
economic growth of the country. This paper further revealed that as important as cloud-based software is,
some SMEs are still skeptical about how it can help improve their business and increase their bottom line
and hence have failed to adopt it. Apart from the SMEs, some notable large firms in different industries,
including information and educational services, have adopted cloud computing technology and hence
contributed to the economic growth of the United States. Lastly, findings from our inferential statistics
revealed that no discernible change has occurred in innovation between small and big businesses in the
adoption of cloud computing. Both categories of businesses adopt cloud computing in the same way, and
their contribution to the American economy has no significant difference in the usage of virtualization.
Energy-constrained Wireless Sensor Networks (WSNs) have garnered significant research interest in
recent years. Multiple-Input Multiple-Output (MIMO), or Cooperative MIMO, represents a specialized
application of MIMO technology within WSNs. This approach operates effectively, especially in
challenging and resource-constrained environments. By facilitating collaboration among sensor nodes,
Cooperative MIMO enhances reliability, coverage, and energy efficiency in WSN deployments.
Consequently, MIMO finds application in diverse WSN scenarios, spanning environmental monitoring,
industrial automation, and healthcare applications.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication. IJCSIT publishes original research papers and review papers, as well as auxiliary material such as: research papers, case studies, technical reports etc.
With growing, Car parking increases with the number of car users. With the increased use of smartphones
and their applications, users prefer mobile phone-based solutions. This paper proposes the Smart Parking
Management System (SPMS) that depends on Arduino parts, Android applications, and based on IoT. This
gave the client the ability to check available parking spaces and reserve a parking spot. IR sensors are
utilized to know if a car park space is allowed. Its area data are transmitted using the WI-FI module to the
server and are recovered by the mobile application which offers many options attractively and with no cost
to users and lets the user check reservation details. With IoT technology, the smart parking system can be
connected wirelessly to easily track available locations.
Welcome to AIRCC's International Journal of Computer Science and Information Technology (IJCSIT), your gateway to the latest advancements in the dynamic fields of Computer Science and Information Systems.
Computer-Assisted Language Learning (CALL) are computer-based tutoring systems that deal with
linguistic skills. Adding intelligence in such systems is mainly based on using Natural Language
Processing (NLP) tools to diagnose student errors, especially in language grammar. However, most such
systems do not consider the modeling of student competence in linguistic skills, especially for the Arabic
language. In this paper, we will deal with basic grammar concepts of the Arabic language taught for the
fourth grade of the elementary school in Egypt. This is through Arabic Grammar Trainer (AGTrainer)
which is an Intelligent CALL. The implemented system (AGTrainer) trains the students through different
questions that deal with the different concepts and have different difficulty levels. Constraint-based student
modeling (CBSM) technique is used as a short-term student model. CBSM is used to define in small grain
level the different grammar skills through the defined skill structures. The main contribution of this paper
is the hierarchal representation of the system's basic grammar skills as domain knowledge. That
representation is used as a mechanism for efficiently checking constraints to model the student knowledge
and diagnose the student errors and identify their cause. In addition, satisfying constraints and the number
of trails the student takes for answering each question and fuzzy logic decision system are used to
determine the student learning level for each lesson as a long-term model. The results of the evaluation
showed the system's effectiveness in learning in addition to the satisfaction of students and teachers with its
features and abilities.
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
This research aims to further understanding in the field of continuous authentication using behavioural
biometrics. We are contributing a novel dataset that encompasses the gesture data of 15 users playing
Minecraft with a Samsung Tablet, each for a duration of 15 minutes. Utilizing this dataset, we employed
machine learning (ML) binary classifiers, being Random Forest (RF), K-Nearest Neighbors (KNN), and
Support Vector Classifier (SVC), to determine the authenticity of specific user actions. Our most robust
model was SVC, which achieved an average accuracy of approximately 90%, demonstrating that touch
dynamics can effectively distinguish users. However, further studies are needed to make it viable option
for authentication systems. You can access our dataset at the following
link:https://github.com/AuthenTech2023/authentech-repo
This paper discusses the capabilities and limitations of GPT-3 (0), a state-of-the-art language model, in the
context of text understanding. We begin by describing the architecture and training process of GPT-3, and
provide an overview of its impressive performance across a wide range of natural language processing
tasks, such as language translation, question-answering, and text completion. Throughout this research
project, a summarizing tool was also created to help us retrieve content from any types of document,
specifically IELTS (0) Reading Test data in this project. We also aimed to improve the accuracy of the
summarizing, as well as question-answering capabilities of GPT-3 (0) via long text
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification.
This work highlights transfer learning’s effectiveness in image classification using CNNs and VGG 16 that
provides insights into the selection of pre-trained models and hyper parameters for optimal performance.
We have proposed a comprehensive approach for image segmentation and classification, incorporating preprocessing techniques, the K-means algorithm for segmentation, and employing deep learning models such
as CNN and VGG 16 for classification.
- The document presents 6 different models for defining foot size in Tunisia: 2 statistical models, 2 neural network models using unsupervised learning, and 2 models combining neural networks and fuzzy logic.
- The statistical models (SM and SHM) are based on applying statistical equations to morphological foot data.
- The neural network models (MSK and MHSK) use self-organizing Kohonen maps to cluster foot data and model full and half sizes.
- The fuzzy neural network models (MSFK and MHSFK) incorporate fuzzy logic into the neural network learning process to better account for uncertainty in foot sizes.
The security of Electric Vehicle (EV) charging has gained momentum after the increase in the EV adoption
in the past few years. Mobile applications have been integrated into EV charging systems that mainly use a
cloud-based platform to host their services and data. Like many complex systems, cloud systems are
susceptible to cyberattacks if proper measures are not taken by the organization to secure them. In this
paper, we explore the security of key components in the EV charging infrastructure, including the mobile
application and its cloud service. We conducted an experiment that initiated a Man in the Middle attack
between an EV app and its cloud services. Our results showed that it is possible to launch attacks against
the connected infrastructure by taking advantage of vulnerabilities that may have substantial economic and
operational ramifications on the EV charging ecosystem. We conclude by providing mitigation suggestions
and future research directions.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Mechatronics is a multidisciplinary field that refers to the skill sets needed in the contemporary, advanced automated manufacturing industry. At the intersection of mechanics, electronics, and computing, mechatronics specialists create simpler, smarter systems. Mechatronics is an essential foundation for the expected growth in automation and manufacturing.
Mechatronics deals with robotics, control systems, and electro-mechanical systems.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Transcat
Join us for this solutions-based webinar on the tools and techniques for commissioning and maintaining PV Systems. In this session, we'll review the process of building and maintaining a solar array, starting with installation and commissioning, then reviewing operations and maintenance of the system. This course will review insulation resistance testing, I-V curve testing, earth-bond continuity, ground resistance testing, performance tests, visual inspections, ground and arc fault testing procedures, and power quality analysis.
Fluke Solar Application Specialist Will White is presenting on this engaging topic:
Will has worked in the renewable energy industry since 2005, first as an installer for a small east coast solar integrator before adding sales, design, and project management to his skillset. In 2022, Will joined Fluke as a solar application specialist, where he supports their renewable energy testing equipment like IV-curve tracers, electrical meters, and thermal imaging cameras. Experienced in wind power, solar thermal, energy storage, and all scales of PV, Will has primarily focused on residential and small commercial systems. He is passionate about implementing high-quality, code-compliant installation techniques.
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
smart pill dispenser is designed to improve medication adherence and safety f...
Immersive Technologies in 5G-Enabled Applications: Some Technical Challenges of the Novel Usage Models
1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 6, December 2021
DOI: 10.5121/ijcsit.2021.13603 31
IMMERSIVE TECHNOLOGIES IN 5G-ENABLED
APPLICATIONS: SOME TECHNICAL CHALLENGES
OF THE NOVEL USAGE MODELS
Nikola Rendevski, Andrijana Bocevska, Zoran Kotevski and Tome Dimovski
Faculty of Information and Communication Technologies,
University St. Kliment Ohridski – Bitola, Macedonia
ABSTRACT
5G next-generation networking paradigm with its envisioned capacity, coverage, and data transfer rates
provide a developmental field for novel applications scenarios. Virtual, Mixed, and Augmented Reality will
play a key role as visualization, interaction, and information delivery platforms. The recent hardware and
software developments in immersive technologies including AR, VR and MR in terms of the commercial
availability of advanced headsets equipped with XR-accelerated processing units and Software
Development Kits (SDKs) are significantly increasing the penetration of such devices for entertainment,
corporate and industrial use. This trend creates next-generation usage models which rise serious technical
challenges within all networking and software architecture levels to support the immersive digital
transformation. The focus of this paper is to detect, discuss and propose system development approaches
and architectures for successful integration of the immersive technologies in the future information and
communication concepts like Tactile Internet and Internet of Skills.
KEYWORDS
5G, Virtual Reality, Augmented Reality, Immersive Technologies, Extended Reality, Information Systems.
1. INTRODUCTION
The implementation of the fifth-generation mobile network 5G is currently happening globally in
both the developed and developing world. Besides the serious radio network infrastructure
investments caused by the move from micro- to millimeter-wave bands [1], the mobile networks
service providers have determined the future business potential and income generation models.
Day-by-day the availability of certain 5G-envisioned characteristics such as guaranteed gigabit
data transfers, improved coverage, and sub-millisecond latencies are becoming reality.
Several novel 5G-enabled technology concepts inspired by the 5G envisaged capabilities
emerged in the past 7 years. In this paper we will consider two of the most promising
technological visions, to analyse and detect the main technical challenges coming from the
massive involvement of immersive technologies (Augmented Reality, Virtual Reality, and Mixed
Reality) as one of the key elements for interaction and information delivery in their ecosystems:
Tactile Internet [2,3] and Internet of Skills [4].
2. VR, AR, MR AND XR
The technologies we collectively refer to as XR (eXtendedReality) nowadays are Augmented
Reality (AR), Virtual Reality (VR), and Mixed Reality (MR), which includes other hybrid,
2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 6, December 2021
32
immersive experiences. Figure 1 depicts the XR technologies diagram showing the Mixed Reality
(MR) as the space where AR and VR technologies overlap. Virtual Reality (VR) is a computer-
generated artificial environment where the scenes and objects in the user visual feed are artificial
(digital) making the user to feel as immersed in the virtual world. On the other side, Augmented
Reality (AR) allows the user to see the real environment combined with digital objects overlaid in
the physical space. Mixed Reality (MR) not only merges the physical and digital world, as it is
purely AR characteristic but creates physical-digital coexistence and interaction known as a
hybrid of reality. In the past decade, the advancements in both hardware and software
development platforms in all three domains enabled the significantly easier creation of various
XR applications applicable in various areas of industry, medicine, science, and entertainment.
Figure 1. Extended Reality, Augmented Reality, Mixed Reality and Virtual Reality Diagram (source:
IBM)
3. IMMERSIVE TECHNOLOGIES IN THE TACTILE INTERNET CONCEPT
The term Tactile Internet (TI) was coined in 2014 by Professor Gerhard Fettweis from the
Technical University of Dresden, Germany. Later in the same year, International
Telecommunication Union (ITU) defined it in its Technology Watch from the aspect of the
existing standards and their potential impact on future standardization. Tactile Internet paradigm
aims to contribute to the solution of the complex challenges faced by modern societies such as
education and lifelong learning, healthcare, personal safety zones, smart city, energy. Tactile
Internet is envisioned to create a paradigm shift from content-oriented communication to
control-based communication by allowing real-time transfer of haptics like touch, motion,
vibration, surface texture over the network along with the conventional audio and visual data. TI
as the next evolution stage of the Internet of Things (IoT), is expected to create numerous
business opportunities for applications in various technology markets.
The shift from content-oriented to control-oriented communication, from the other side, creates
a guaranteed and important role for immersive technologies as Virtual Reality, Augmented
Reality, and Mixed Reality. The general challenges from the aspect of technical requirements for
networking architectures, processing models, software architectures, virtualization, and haptics
within the TI are widely investigated in academia and industry.
Virtual Reality (VR) video streaming is considered the best-suited technology to provide the
immersive visual feed towards achieving the envisioned levels of real-time interaction in TI. In
[5] the authors pinpointed the open challenges to enable VR video streaming technologies for the
Tactile Internet through analysis of the state-of-the-art on VR video streaming technologies both,
theoretically and by means of an experimental demonstrator. It was shown that to achieve the
real-timeliness (maximum 5 milliseconds end-to-end latency) and link quality (5 Gbps data
transfer speed) required by the TI, VR content streaming needs to overcome several challenges
such as improvements of transport and application protocols, improvements of the edge
3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 6, December 2021
33
infrastructure to migrating the processing-intensive tasks from the processing constrained VR
units and enabling precise synchronization of the complex haptics sensor systems within VR
scenes. The VR technical challenges pointed in [5] obviously stand for Augmented and
Mixed/Extended Reality applications also, as the currently available and future AR/MR headset
devices and platforms practically share the processing units with VR in terms of chip
architectures and processing power needed to render the digital content and process the sensor
data feed to navigate in the virtual/mixed environment.
To analyze and discuss the VR / AR / MR technical challenges in the TI environment, within all
hardware and software design architecture layers, we must precisely define the new elements that
TI will originally incorporate in the VR technology which development was certainly
independent of TI concept in the past decade. One of the main differences the of TI immersive
environment from the classic XR applications is certainly the so-called Shared Haptic Virtual
Environment (SHVE), where several users are physically coupled via XR simulation to perform
tasks that require fine-motor skills. Haptic feedback is a prerequisite for a high level of
interaction [6], allowing the user to perceive the objects in the XR not only by audio and visual
feed but also via the sense of touch. Such an environment allows manipulating with objects as
envisioned in remote medical interventions, complex robotized machinery remote operation,
micro-assembling, and numerous other applications sharing common important technical
demands such as high level of sensitivity, and precision. The SHVE’s are creating a direct impact
on the immersive applications from several aspects. First, from the hardware perspective, TI
requires coupling and integration with complex input/output XR controllers with capabilities for
haptic input and feedback. Second, from software and hardware aspects, the so-called
multiplayer/multiuser VR environments should significantly evolve in terms of providing reliable
and low latency communications in both haptic controller-XR local physical connections and XR
to XR device distant communications. In the following, we will analyze and discuss both, haptic
controller connections in the SHVE and the networking aspects towards achieving high-speed
communication and sub-millisecond latencies.
3.1. Haptic Rendering and SHVE
Haptic rendering is the process of calculating and applying force feedback to the user’s haptic
device directly from the virtual environment. The implementation of the haptic rendering
technique depends on the application requirements. In [7], the authors classified the SHVE
architectures in three major classes: static, collaborative, and cooperative shared virtual
simulations and analysed two different approaches of haptic rendering: impulsive haptic
rendering and continuous haptic rendering. In a cooperative virtual environment, users can
simultaneously modify and interact with the same virtual object. In this paper, we will focus on
the continuous haptic rendering in cooperative SHVE since it corresponds to the above-
mentioned mission-critical Tactile Internet application scenarios.
Figure 2. Basic Architecture of a XR application with haptic feedback
4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 6, December 2021
34
Figure 2 illustrate basic interaction flow architecture of a XR application with haptic feedback.
From the image, we can conclude that besides the classic audio-visual feed, in such applications
haptic devices are present and the communication with the haptic devices is happening outside
the XR feed physically, but the actions are or might be caused by interaction with a digital object
in the XR scene. This digital object can be representation of a real object or virtual simulation of
the real object behaviour.
In contrast to regular displays which are stimulating other human senses, the haptic devices create
bidirectional energy flow, to and from the operator. This creates a feedback loop consisted of the
user, XR device, haptic device, and haptic rendering mechanism. It is well known that such loops
can create instability and the problem of stable haptic interaction in general has attracted serious
attention in the past decade. In [8], two main sets of techniques were classified which can be
adopted in the contemporary immersive environments:
Using virtual damping to limit the flow of energy from virtual environment toward user
when this could create unstable behaviour, and
Decoupling force response algorithms from other slower algorithms, such as the ones
computing collision detection, visual rendering, and virtual environment physics.
With the concept of virtual coupling, virtual environments can be created allowing unlimited
feedback levels, but the haptic device will render only the maximum level set by the virtual
coupling. Decoupling haptic response algorithms from other slower algorithms, provides a
simpler local representation of a virtual object at the highest possible rate that can be
achieved on the system. This can be realized by running all the algorithms in different threads
featuring different haptic feedback rates.
Considering the above-mentioned facts and the characteristics of the Tactile Internet concept
such as sub-millisecond latencies and the stability required for the envisioned mission-critical
applications, it is obvious that nowadays there are no sophisticated immersive application
development environments nor standards and protocols for interfacing the haptic devices in the
complex next-generation immersive environments. In fact, these are the main technical
challenges to be solved: the creation of Haptic Devices Pairing Protocols (HDPP) and API
architectures forbi-directional logical communication of the XR scene and the haptic devices.
3.1. Haptic I/O Controllers and XR Devices Coupling
Most of the commercially available XR headsets nowadays don’t share universal protocols for
coupling with external devices. This is certainly possible, but it requires deep knowledge of the
hardware platform (XR headset devices) and the platform-specific software development
environment to enable input/output to/from the XR scene.
Since the haptic transfer, interaction, and feedback set is finite in terms of the physical interaction
senses, such as force, motion, texture, touch, temperature, pressure, etc., it is naturally expected
that with the evolution of such devices, the need for XR platform-independent integration will be
necessary for rapid development of next-generation immersive applications and services.
It is well known that a human can distinguish various stimulations within three sensory systems:
Cutaneous receptors (found in the skin) [9]. Cutaneous receptors include
mechanoreceptors (pressure or distortion), nociceptors (pain), and thermo receptors
(temperature).
Kinaesthetic (body motion and perception of the motion)
5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 6, December 2021
35
Haptic (experiencing the surfaces of various objects and object recognition)
There are several ways to implement the senses in the tactile devices as vibration, force
feedback, and temperature sensation.
Vibration is one of the most common ways that haptic devices use to generate haptic feedback. It
can be implemented as ERM (Eccentric Rotating Mass) – rotating non-balanced weight [10],
[11] and LRA (Linear Resonant Actuator)– converting electrical signals into motion.
Force feedback devices use electric motors to manipulate the movement of an item held by the
user. Nowadays, there are numerous commercial solutions for providing force feedback - widely
used in gaming controllers.
The thermal sensation [12] is a cutaneous sense also. The thermal haptic devices, in most cases,
use IR (infrared radiation) to heat surfaces of interest where the thermal sensation should be
provided.
Figure 3 presents a proposed architecture flow for physical coupling of the haptic devices and
API block for enabling the logical high-level communication with the XR software application.
Figure 3. Proposed architecture for haptic devices coupling in XR
The open API block should contain the abstraction of all the functions and senses the device can
deliver to and emulate from the XR scene. If we assume that all the input and feedback from and
to the haptic device is falling within the main sense-providers such as vibration, force feedback,
and temperature, then one may conclude that each feedback or input corresponding with the sense
that has to be delivered is a combination of senses to the exact device. In other words, the device
should receive/provide a set of instructions from/to the API, to encode the sense of interest such
as texture, pressure (force), temperature, etc. The creation of highly abstracted open API
specifications for logical communication with the XR devices (XR scenes) may provide a huge
developmental field and stimulate the creation of various haptic devices capable to be used in the
Tactile Internet XR scenarios. Figure 4, presents exemplary API abstraction parameters which
provide:
Device ID (Selecting the device bydevice_id)
6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 6, December 2021
36
Intensity (intensity of the feedback to be provided such force, vibration, temperature)
Frequency (vibration, linear motion, rotation, etc.)
Type (force, vibration, temperature)
Subtype (method for providing the sense such ERM, LRA)
Duration (time duration of the certain sense applied)
The existence of a universal Open API can guarantee that the creators of the next-generation
haptic devices will be able to connect the devices with XR (AR/MR/VR) platforms and realize
the logical communication with the virtual objects in the XR scenes. Regarding the physical
network connection of the haptic device with the XR headset, various technologies may be used.
Currently, Bluetooth connections are dominating but since the sensor fusion data may
significantly increase, the low bandwidth communication technologies may be inefficient to
provide the data rates required to transmit and receive massive sensor data. As an alternative,
next-generation Wi-Fi technologies may be used or even 60 GHz bands [13],[14] which allow
huge data rates and low latency in the case of real-time multimedia content transmission.
4. CONCLUSIONS
In this paper, we focused to detect several challenges for successful implementation of the XR in
the next-generation communication concepts as Tactile Internet. The paradigm shift from
content-oriented communication to control-based communication requires real-time transfer of
haptics over the communication links along with the conventional audio and visual data.
Currently, the development of the XR technologies and the advancement of haptic devices are
unrelated and such situations produce numerous technical difficulties for co-existence and
integration. We emphasized the serious need for open API specifications (from a software design
perspective) and the design of effective protocols for physical communication between the XR
devices and the haptic controllers and proposed initial development architecture which will
enable the integration of the SHVE in the next generation so-called metaverses. As the senses and
methods for their realization are a finite well known set, the standardization in the haptic devices
design, pairing and communication mechanisms, and software design is a real requirement for the
advancement of the next-generation concepts such as Tactile Internet and Internet of Skills where
the XR technologies will play a key role. As future work, we plan to further investigate the tactile
haptic device architectures and propose a more precise definition of the communication protocols
and universal API structure capable to provide a mechanism for efficient involvement of the
future haptic devices in the XR technology platforms.
REFERENCES
[1] S. Painuly, S. Sharma and P. Matta, "Future Trends and Challenges in Next Generation Smart
Application of 5G-IoT," 2021 5th International Conference on Computing Methodologies and
Communication (ICCMC), 2021, pp. 354-357, doi: 10.1109/ICCMC51019.2021.9418471.
[2] M. Simsek, A. Aijaz, M. Dohler, J. Sachs and G. Fettweis, "5G-Enabled Tactile Internet," in IEEE
Journal on Selected Areas in Communications, vol. 34, no. 3, pp. 460-473, March 2016, doi:
10.1109/JSAC.2016.2525398.
[3] S. K. Sharma, I. Woungang, A. Anpalagan and S. Chatzinotas, "Toward Tactile Internet in Beyond
5G Era: Recent Advances, Current Issues, and Future Directions," in IEEE Access, vol. 8, pp. 56948-
56991, 2020, doi: 10.1109/ACCESS.2020.2980369.
[4] M. Dohleret al., "Internet of skills, where robotics meets AI, 5G and the Tactile Internet," 2017
European Conference on Networks and Communications (EuCNC), 2017, pp. 1-5, doi:
10.1109/EuCNC.2017.7980645.
[5] M. T. Vega, T. Mehmli, J. v. d. Hooft, T. Wauters and F. D. Turck, "Enabling Virtual Reality for the
Tactile Internet: Hurdles and Opportunities," 2018 14th International Conference on Network and
Service Management (CNSM), 2018, pp. 378-383.
7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 6, December 2021
37
[6] The Tactile Internet, ITU-T Technology Watch Report, August 2014,
https://www.itu.int/dms_pub/itu-t/oth/23/01/T23010000230001PDFE.pdf, accessed online,
November 2021
[7] P. Buttolo, R. Oboe, Blake Hannaford, Architectures for shared haptic virtual environments,
Computers & Graphics, Volume 21, Issue 4, 1997, pp. 421-429, ISSN 0097-8493,
[8] K. Salisbury, F. Conti and F. Barbagli, "Haptic rendering: introductory concepts," in IEEE Computer
Graphics and Applications, vol. 24, no. 2, pp. 24-32, March-April 2004, doi:
10.1109/MCG.2004.1274058.
[9] Colum D. MacKinnon, Chapter 1 - Sensorimotor anatomy of gait, balance, and falls, Editor(s): Brian
L. Day, Stephen R. Lord, Handbook of Clinical Neurology, Elsevier, Volume 159, 2018, Pages 3-26,
ISSN 0072-9752, ISBN 9780444639165, https://doi.org/10.1016/B978-0-444-63916-5.00001-X.
[10] G. García-Valle, S. Arranz-Paraíso, I. Serrano-Pedraza and M. Ferre, "Estimation of Torso
Vibrotactile Thresholds Using Eccentric Rotating Mass Motors," in IEEE Transactions on Haptics,
vol. 14, no. 3, pp. 538-550, 1 July-Sept. 2021, doi: 10.1109/TOH.2020.3048290.
[11] G. G. Poyraz and Ö. Tamer, "Different Haptic Senses with Multiple Vibration Motors," 2019 11th
International Conference on Electrical and Electronics Engineering (ELECO), 2019, pp. 870-874,
doi: 10.23919/ELECO47770.2019.8990480.
[12] E. Hendler and J. D. Hardy, "Infrared and Microwave Effects on Skin Heating and Temperature
Sensation," in IRE Transactions on Medical Electronics, vol. ME-7, no. 3, pp. 143-152, July 1960,
doi: 10.1109/IRET-ME.1960.5008037
[13] N. Rendevski and D. Cassioli, "60 GHz UWB rake receivers in a realistic scenario for wireless home
entertainment," 2015 IEEE International Conference on Communications (ICC), 2015, pp. 2744-
2749, doi: 10.1109/ICC.2015.7248741.
[14] Rendevski N., Cassioli D. (2014) UWB and mmWave Communication Techniques and Systems for
Healthcare. In: Yuce M. (eds) Ultra-Wideband and 60 GHz Communications for Biomedical
Applications. Springer, Boston, MA. https://doi.org/10.1007/978-1-4614-8896-5_1