Iot Ecosystems Enable Smart Communication Solutions: A Case Study,
2022
Department of Computer Science & Engineering, Institute of Technical Education and Research, Siksha ‘O’ Anusandhan (Deemed to be) University, Bhubaneswar, India-751030
Iot Ecosystems Enable Smart Communication Solutions: A Case Study, Debasish Swapnesh Kumar Nayak, Shreerudra Pratik, Jogeswar Tripathy
International Journal of Smart Sensor and Adhoc Network
The Internet of Things (IoT) is a platform for innovation, allowing people to invest in and use IoT to improve life, business, and society. It will be applicable to all or any industry sectors, verticals, people, machines, and everything. This creates difficult requirements in terms of higher system capacity, extremely low latency, such as for the tactile Internet, extremely high throughput values, a wide range of services, such as IoT and M2M, and a more uninterrupted experience. As a symbiotic confluence of up to date and existing technologies, the IOT architecture will use Hetnet RAN, Cloud enhanced RAN, and SW …
Tourism Decision Making System & Auto Guidance Technique Using Data Analytics,
2022
Dept. of Tourism & Hotel Management , Penguin School of Hotel Management, Kolkata, India
Tourism Decision Making System & Auto Guidance Technique Using Data Analytics, Asik Rahaman Jamader Mr., Puja Das Ms., Biswaranjan Acharya Mr., Sandhya Makkar Dr.
International Journal of Computer Science and Informatics
A unique Tourism Decision Making System TDMS) describes and evaluates the evaluation of research and developments in information technology meant for pronouncement sustain as well as examination during the sector of visiting the attractions. Individuals in the tourism sector are classified according to their decision-making technologies. The current trends and growth directions of choice help technologies were analysed for visitors from various advertising categories. The potential to provide customising, augmentation, and help for visitors at all phases of their trips by integrating modern automated approaches with GIS capabilities demonstrates the need for breakthroughs in digital advanced analytics.
A Hybrid Scheme Based On Alternative Scalar Leader Election (Hs-Asle) For Redundant Data Minimization In Multi-Event Occurrence Scenario For Wmsns,
2022
Siksha 'O' Anusandhan Deemed to be University
A Hybrid Scheme Based On Alternative Scalar Leader Election (Hs-Asle) For Redundant Data Minimization In Multi-Event Occurrence Scenario For Wmsns, Sushree Bibhuprada B. Priyadarshini Dr.
International Journal of Smart Sensor and Adhoc Network
The current paper reports a hybrid approach namely “Hybrid Scheme based on Alternative Scalar Leader Election (HS-ASLE)” for camera sensor actuation in multi-event occurrence scenario. In the proposed approach, the whole monitored zone gets segregated into multiple virtual sub-compartments and in each of the sub-compartments, one and three scalar leaders are elected alternatively that behave as the representatives of scalars to report event information. During the event occurrence, the event information gets trapped through the scalar leaders in lieu of scalars and the leaders convey the event occurrence information to the respective camera sensors. Pervasive experiment and …
Books Within Books In Fantasy And Science Fiction: “You Are The Dreamer And The Dream”,
2022
Southwestern Oklahoma State University
Books Within Books In Fantasy And Science Fiction: “You Are The Dreamer And The Dream”, Phillip Fitzsimmons
Faculty Books & Book Chapters
This chapter discusses books that exist only within works of science fiction and fantasy—what the “List of Fictional Books” on Wikipedia calls a “fictional book” and what Claire Fallon calls “invented books” in her article for the Huffpost website, “Fictional Books Within Books We Wish Were Real.”
The David Oberhelman Collection Of Science Fiction, Fantasy, And Tolkieniana At Oklahoma State University,
2022
Southwestern Oklahoma State University
The David Oberhelman Collection Of Science Fiction, Fantasy, And Tolkieniana At Oklahoma State University, Phillip Fitzsimmons
Faculty Books & Book Chapters
In September 2020 I drove to the Oklahoma State University (OSU) Stillwater campus to see “The David Oberhelman J. R. R. Tolkien Collection” exhibit, on display on the Edmon Low Library’s second-floor mezzanine in the Lisa and Mark Snell Gallery.
Experience A Faster And More Private Internet In Library And Information Centres With 1.1.1.1 Dns Resolver,
2022
Chandigarh University, Mohali, Punjab
Experience A Faster And More Private Internet In Library And Information Centres With 1.1.1.1 Dns Resolver, Subhajit Panda
International Journal of Smart Sensor and Adhoc Network
As a densely populated country with a large user base, the library and information centres (LICs) in India always suffer from a lack of internet speed. Indian LICs frequently employ open DNS resolvers to achieve high internet speeds. In the new normal, the cyberattacks on Indian educational institutions have skyrocketed, necessitating the development of a more secure and quicker DNS resolver. To meet this demand, the paper assesses Cloudflare's 1.1.1.1 DNS resolver and demonstrates its suitability for Indian LICs. To examine the demand of Cloudflare’s 1.1.1.1 DNS resolver in providing the most secure and fastest private network, the researchers use …
Iot-Fog-Edge-Cloud Computing Simulation Tools, A Systematic Review,
2022
Siksha 'O' Anusandhan (Deemed to be University)
Iot-Fog-Edge-Cloud Computing Simulation Tools, A Systematic Review, Abhilash Pati, Manoranjan Parhi, Binod Kumar Pattanayak
International Journal of Smart Sensor and Adhoc Network
The Internet of Things (IoT) perspective promises substantial advancements in sectors such as smart homes and infrastructure, smart health, smart environmental conditions, smart cities, energy, transportation and mobility, manufacturing and retail, farming, and so on. Cloud computing (CC) offers appealing computational and storage options; nevertheless, cloud-based explanations are frequently conveyed by downsides and constraints, such as energy consumption, latency, privacy, and bandwidth. To address the shortcomings related to CC, the advancements like Fog Computing (FC) and Edge Computing (EC) are introduced later on. FC is a novel and developing technology that connects the cloud to the network edges, allowing for …
A Voice Controlled Home Automation System,
2022
Research Scholar, IMIT
A Voice Controlled Home Automation System, Priyanka Maharana, Arpita Mahapatra
International Journal of Smart Sensor and Adhoc Network
Home automation is the process of making the home appliances operate on the voice command or the movement. For the current research work the voice-controlled home automation is considered. In the current research work the main objective is to develop a voice-controlled home automation system. The appliances like light, fan and door have been considered for making them operate on voice command. For developing the project the ESP 8266 wifi module is considered along with servo motor, toy motor, light and fan. All of the appliances are configured by using the Blynk application and IFTTT server. Finally, Arduino IDE is …
Survey On Security Issues And Protective Measures In Different Layers Of Internet Of Things (Iot),
2022
Udayanath (Auto.) College of Science and Technology, Adaspur Cuttack, Odisha
Survey On Security Issues And Protective Measures In Different Layers Of Internet Of Things (Iot), Rasmita Jena, Anil Kumar Biswal, Debabrata Singh, Arundhati Lenka
International Journal of Smart Sensor and Adhoc Network
In general perspective, Internet of things is defined as a network of physical objects by connecting” things to things” through the sensors, actuators and processors, to communicate and exchange data and information among each other along with other related devices and systems spread over different locations, without human-to-human or human-to-computer interactions. This survey summarises all the security threats along with privacy issues that may be confronted by the end users in Internet of Things (IoT). The majority of survey is to gather information about the current security requirements for IoT, the further scope and the challenges in IoT and the …
Changing Care Paradigms: A Pilot Study On User-Interface And Design Implications On The Efficacy Of Medical Record Systems In Low-Resource Settings,
2022
University of Pennsylvania
Changing Care Paradigms: A Pilot Study On User-Interface And Design Implications On The Efficacy Of Medical Record Systems In Low-Resource Settings, Raveen S. Kariyawasam
Wharton Research Scholars
Electronic Medical Record Systems (EMRS) has quickly become the backbone of the healthcare delivery ecosystem in developed countries. Their reaches range from insurance to billing to physician charting. Despite the mainstream use of EMRS in developed countries, their implementation in low-resource settings has faced more barriers and challenges. During the development of EMRS, the concerns, hurdles, and considerations of developed nations are what were used as inspiration when designing these systems. This thesis explores the use of effective User Interface and User Experience (UI/UX) design to help lower the accessibility barriers associated with EMRS implementation and usage in low-resource settings. …
Dielectrophoretic Trapping Of Carbon Nanotubes For Temperature Sensing,
2022
Marshall University
Dielectrophoretic Trapping Of Carbon Nanotubes For Temperature Sensing, Kaylee Burdette
Theses, Dissertations and Capstones
Conventional sensors are rapidly approaching efficiency limitations at their current size. In designing more efficient sensors, low dimensional materials such as carbon nanotubes (CNTs), quantum dots, and DNA origami can be used to enable higher degrees of sensitivity. Because of the high atomic surface to core ratio, these materials can be used to detect slight changes in chemical composition, strain, and temperature. CNTs offer unique advantages in different types of sensors due to their electromechanical properties. In temperature sensing, the high responsiveness to temperature and durability can be used to produce an accurate, reliable sensor in even extreme temperatures. This …
Removing Physical Presence Requirements For A Remote And Automated World - Api Controlled Patch Panel For Conformance Testing,
2022
University of New Hampshire, Durham
Removing Physical Presence Requirements For A Remote And Automated World - Api Controlled Patch Panel For Conformance Testing, Hunter George Wells
Honors Theses and Capstones
Quality assurance test engineers at the UNH-InterOperability Lab must run tests that require driving and monitoring a selection of DC signals. While the number of signals is numerous, there are limited ports on the test equipment, and only a few signals need patching for any given test. The selection of signals may vary between the 209 different tests and must be re-routed frequently. Currently, testers must leave their desk to manually modify the test setup in another room. This posed a considerable issue at the onset of the COVID-19 Pandemic when physical access was not possible. In order to enable …
Developing Reactive Distributed Aerial Robotics Platforms For Real-Time Contaminant Mapping,
2022
University of Kentucky
Developing Reactive Distributed Aerial Robotics Platforms For Real-Time Contaminant Mapping, Joshua Ashley
Theses and Dissertations--Electrical and Computer Engineering
The focus of this research is to design a sensor data aggregation system and centralized sensor-driven trajectory planning algorithm for fixed-wing aircraft to optimally assist atmospheric simulators in mapping the local environment in real-time. The proposed application of this work is to be used in the event of a hazardous contaminant leak into the atmosphere as a fleet of sensing unmanned aerial vehicles (UAVs) could provide valuable information for evacuation measures. The data aggregation system was designed using a state-of-the-art networking protocol and radio with DigiMesh and a process/data management system in the ROS2 DDS. This system was tested to …
A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency,
2022
DePaul College of Law
A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan
Dickinson Law Review (2017-Present)
Times of emergency present an inherent conflict between the public interest and the preservation of individual rights. Such times require granting emergency powers to the government on behalf of the public interest and relaxing safeguards against government actions that infringe rights. The lack of theoretical framework to assess governmental decisions in times of emergency leads to a polarized and politicized discourse about potential policies, and often, to public distrust and lack of compliance.
Such a discourse was evident regarding Digital Tracing Apps (“DTAs”), which are apps installed on cellular phones to alert users that they were exposed to people who …
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth,
2022
Penn State Dickinson Law
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Dickinson Law Review (2017-Present)
No abstract provided.
Garden Bot: Autonomous Home Garden Weed Removal Robot,
2022
The University of Akron
Garden Bot: Autonomous Home Garden Weed Removal Robot, Brendon Lovejoy, Robert Connolly, Isaac Lucas, Stevan Veselinov
Williams Honors College, Honors Research Projects
With frequent weeding being a tedious chore and an essential task for a successful garden, there is need for an automated method of handling this routine. Existing technologies utilize computer vision, GPS, multiple units and other tools to remove weeds from garden plots. However, these solutions are often complex and expensive, suited for large agricultural plots in contrast to small-scale home gardens. In addition, many of these technologies, along with manual tillers and cultivators suited for home use, are unable to perform weeding within rows of crops in a process known as intra-row weeding. The Garden Bot is an autonomous, …
Penetration Testing In A Small Business Network,
2022
The University of Akron
Penetration Testing In A Small Business Network, Lee Kandle
Williams Honors College, Honors Research Projects
Penetration testing on a business network consisting of three routers, one switch, and one computer. Access Control Lists (ACLs) on the routers act as the firewall(s) for the network. 10 of the twelve ACLs do not deny any form of traffic to reflect the lax security standards common in small networks. Router 1 acts as the primary router of the Attacker/Pen Tester. Router 2 represents the edge router for the business and Router 3 is the inner router closest to end-user devices. Switch 1 is connected to Router 3 with one computer connected to the switch acting as an end-user. …
Improving Network Policy Enforcement Using Natural Language Processing And Programmable Networks,
2022
University of Kentucky
Improving Network Policy Enforcement Using Natural Language Processing And Programmable Networks, Pinyi Shi
Theses and Dissertations--Computer Science
Computer networks are becoming more complex and challenging to operate, manage, and protect. As a result, Network policies that define how network operators should manage the network are becoming more complex and nuanced. Unfortunately, network policies are often an undervalued part of network design, leaving network operators to guess at the intent of policies that are written and fill in the gaps where policies don’t exist. Organizations typically designate Policy Committees to write down the network policies in the policy documents using high-level natural languages. The policy documents describe both the acceptable and unacceptable uses of the network. Network operators …
Protocols And Architecture For Privacy-Preserving Authentication And Secure Message Dissemination In Vehicular Ad Hoc Networks,
2022
University of Kentucky
Protocols And Architecture For Privacy-Preserving Authentication And Secure Message Dissemination In Vehicular Ad Hoc Networks, Shafika Showkat Moni
Theses and Dissertations--Computer Science
The rapid development in the automotive industry and wireless communication technologies have enhanced the popularity of Vehicular ad hoc networks (VANETs). Today, the automobile industry is developing sophisticated sensors that can provide a wide range of assistive features, including accident avoidance, automatic lane tracking, semi-autonomous driving, suggested lane changes, and more. VANETs can provide drivers a safer and more comfortable driving experience, as well as many other useful services by leveraging such technological advancements. Even though this networking technology enables smart and autonomous driving, it also introduces a plethora of attack vectors. However, the main issues to be sorted out …
Incentive Analysis Of Blockchain Technology,
2022
West Virginia University
Incentive Analysis Of Blockchain Technology, Rahul Reddy Annareddy
Graduate Theses, Dissertations, and Problem Reports
Blockchain technology was invented in the Bitcoin whitepaper released in 2008. Since then, several decentralized cryptocurrencies and applications have become mainstream. There has been an immense amount of engineering effort put into developing blockchain networks. Relatively few projects backed by blockchain technology have succeeded and maintained a large community of developers, users, and customers, while many popular projects with billions of dollars in funding and market capitalizations have turned out to be complete scams.
This thesis discusses the technological innovations introduced in the Bitcoin whitepaper and the following work of the last fifteen years that has enabled blockchain technology. A …