Mobility and Computations: Some Open Research Directions

Author(s):  
Nicola Santoro
ISRN Genomics ◽  
2013 ◽  
Vol 2013 ◽  
pp. 1-8 ◽  
Author(s):  
Neelam Goel ◽  
Shailendra Singh ◽  
Trilok Chand Aseri

In the past decade, various genomes have been sequenced in both plants and animals. The falling cost of genome sequencing manifests a great impact on the research community with respect to annotation of genomes. Genome annotation helps in understanding the biological functions of the sequences of these genomes. Gene prediction is one of the most important aspects of genome annotation and it is an open research problem in bioinformatics. A large number of techniques for gene prediction have been developed over the past few years. In this paper a theoretical review of soft computing techniques for gene prediction is presented. The problem of gene prediction, along with the issues involved in it, is first described. A brief description of soft computing techniques, before discussing their application to gene prediction, is then provided. In addition, a list of different soft computing techniques for gene prediction is compiled. Finally some limitations of the current research and future research directions are presented.


Author(s):  
Akrati Saxena ◽  
George Fletcher ◽  
Mykola Pechenizkiy

AbstractThe evolution of online social networks is highly dependent on the recommended links. Most of the existing works focus on predicting intra-community links efficiently. However, it is equally important to predict inter-community links with high accuracy for diversifying a network. In this work, we propose a link prediction method, called HM-EIICT, that considers both the similarity of nodes and their community information to predict both kinds of links, intra-community links as well as inter-community links, with higher accuracy. The proposed framework is built on the concept that the connection likelihood between two given nodes differs for inter-community and intra-community node-pairs. The performance of the proposed methods is evaluated using link prediction accuracy and network modularity reduction. The results are studied on real-world networks and show the effectiveness of the proposed method as compared to the baselines. The experiments suggest that the inter-community links can be predicted with a higher accuracy using community information extracted from the network topology, and the proposed framework outperforms several measures especially proposed for community-based link prediction. The paper is concluded with open research directions.


2021 ◽  
Author(s):  
Kamesh Namuduri

Advanced Air Mobility (AAM) is a newly emerging industry focus, as well as a research and development discipline. Innovations and technologies resulting from AAM will change the way that we move cargo and people in and around cities. Industry is moving fast with excitement to deploy AAM solutions. However, there are multiple technical challenges that need to be overcome before AAM becomes a reality. This article takes a closer look at the technology readiness level of AAM solutions, identifies open research problems and directions to address them.


Author(s):  
Mo'ath Alluwaici ◽  
Ahmad Kadri Junoh ◽  
Farzana Kabir Ahmad ◽  
Mohamad Farhan Mohamad Mohsen ◽  
Raed Alazaidah

Author(s):  
Andre M. H. Teixeira ◽  
Aida O. P. D. C. Guerra ◽  
Steffi Knorn ◽  
Kjell Staffas ◽  
Damiano Varagnolo

Author(s):  
Nagesh UB ◽  
Nayana MS ◽  
Shruthi CS ◽  
Sudeep Poojary ◽  
Vaishnavi PS ◽  
...  

Internet of Things (IoT) has drawn important attention in recent years since it has made revolutionary changes in human life. The IoT enables the exchange of information or data in a wide variety of applications such as smart buildings, smart health, smart transport, and so on. As billions of connected things communicate with each other and can interchange sensitive information that may be revealed. Hence, strengthening IoT’s security and preserving users’ privacy is a crucial challenge. The aim of this paper is to provide a comprehensive study of the IoT security. Several IoT security attacks are examined and a taxonomy of the security requirements based on the attacks purposes is proposed. Furthermore, recent security solutions are described and classified based on their application area. Ultimately, open research directions and security challenges are discussed.


2021 ◽  
Author(s):  
Kamesh Namuduri

Advanced Air Mobility (AAM) is a newly emerging industry focus, as well as a research and development discipline. Innovations and technologies resulting from AAM will change the way that we move cargo and people in and around cities. Industry is moving fast with excitement to deploy AAM solutions. However, there are multiple technical challenges that need to be overcome before AAM becomes a reality. This article takes a closer look at the technology readiness level of AAM solutions, identifies open research problems and directions to address them.


Author(s):  
Rao Naveed Bin Rais ◽  
Osman Khalid

Existing architecture of Internet is IP-centric, having capability to cope with the needs of the Internet users. Due to the recent advancements and emerging technologies, a need to have ubiquitous connectivity has become the primary focus. Increasing demands for location-independent content raised the requirement of a new architecture and hence it became a research challenge. Content Centric Networking (CCN) paradigm emerges as an alternative to IP-centric model and is based on name-based forwarding and in-network data caching. It is likely to address certain challenges that have not been solved by IP-based protocols in wireless networks. Three important factors that require significant research related to CCN are mobility, security, and caching. While a number of studies have been conducted on CCN and its proposed technologies, none of the studies target all three significant research directions in a single article, to the best of our knowledge. This paper is an attempt to discuss the three factors together within context of each other. In this paper, we discuss and analyze basics of CCN principles with distributed properties of caching, mobility, and secure access control. Different comparisons are made to examine the strengths and weaknesses of each aforementioned aspect in detail. The final discussion aims to identify the open research challenges and some future trends for CCN deployment on a large scale.


Sign in / Sign up

Export Citation Format

Share Document