Implementation of Internet of Things in the market of Bosnia and Herzegovina: Business market and technological review

Author(s):  
Amra Sofic ◽  
Jasmina Barakovic Husic
Crisis ◽  
2010 ◽  
Vol 31 (3) ◽  
pp. 160-164 ◽  
Author(s):  
Almir Fajkic ◽  
Orhan Lepara ◽  
Martin Voracek ◽  
Nestor D. Kapusta ◽  
Thomas Niederkrotenthaler ◽  
...  

Background: Evidence on youth suicides from Southeastern Europe is scarce. We are not aware of previous reports from Bosnia and Herzegovina, which experienced war from 1992 to 1995. Durkheim’s theory of suicide predicts decreased suicide rates in wartime and increased rates afterward. Aims: To compare child and adolescent suicides in Bosnia and Herzegovina before and after the war. Methods: Data on youth suicide for prewar (1986–90) and postwar (2002–06) periods were analyzed with respect to prevalence, sex and age differences, and suicide methods. Suicide data from 1991 through 2001 were not available. Results: Overall youth suicide rates were one-third lower in the postwar than in the prewar period. This effect was most pronounced for girls, whose postwar suicide rates almost halved, and for 15–19-year-old boys, whose rates decreased by about a one-fourth. Suicides increased among boys aged 14 or younger. Firearm suicides almost doubled proportionally and were the predominant postwar method, while the most common prewar method had been hanging. Conclusions: The findings from this study indicate the need for public education in Bosnia and Herzegovina on the role of firearm accessibility in youth suicide and for instructions on safe storage in households. Moreover, raising societal awareness about suicide risk factors and suicide prevention is needed.


2020 ◽  
pp. 1-12
Author(s):  
Zhang Caiqian ◽  
Zhang Xincheng

The existing stand-alone multimedia machines and online multimedia machines in the market have certain deficiencies, so they cannot meet the actual needs. Based on this, this research combines the actual needs to design and implement a multi-media system based on the Internet of Things and cloud service platform. Moreover, through in-depth research on the MQTT protocol, this study proposes a message encryption verification scheme for the MQTT protocol, which can solve the problem of low message security in the Internet of Things communication to a certain extent. In addition, through research on the fusion technology of the Internet of Things and artificial intelligence, this research designs scheme to provide a LightGBM intelligent prediction module interface, MQTT message middleware, device management system, intelligent prediction and push interface for the cloud platform. Finally, this research completes the design and implementation of the cloud platform and tests the function and performance of the built multimedia system database. The research results show that the multimedia database constructed in this paper has good performance.


2007 ◽  
pp. 85-96 ◽  
Author(s):  
I. Kasparova

The article considers the financial tools of corporate control transfers and mergers and acquisitions financing forms. In western countries tax and informative factors are more important, but in the Russian business market lack of development of the stock market and low cost of securities of Russian companies play the main role. The analysis has shown that in Russia the monetary form of M&A financing dominates over other financing forms (90% of reviewed cases), still there are individual cases of M&A financing by buying company’s shares (10% of reviewed cases).


Author(s):  
Uppuluri Sirisha ◽  
G. Lakshme Eswari

This paper briefly introduces Internet of Things(IOT) as a intellectual connectivity among the physical objects or devices which are gaining massive increase in the fields like efficiency, quality of life and business growth. IOT is a global network which is interconnecting around 46 million smart meters in U.S. alone with 1.1 billion data points per day[1]. The total installation base of IOT connecting devices would increase to 75.44 billion globally by 2025 with a increase in growth in business, productivity, government efficiency, lifestyle, etc., This paper familiarizes the serious concern such as effective security and privacy to ensure exact and accurate confidentiality, integrity, authentication access control among the devices.


Author(s):  
Shreya Joshi ◽  
Ms Bhavyaa ◽  
Suhani Gupta ◽  
Lalita Luthra

Blockchain is considered to be a disruptive core technology. Although many researchers have realized the importance of blockchain, but the research of it is still emerging. It is the record-keeping technology behind bitcoin and is one of the hottest and fastest growing skills in the IT sector today. It serves as an immutable ledger which allows transactions to take place in a decentralized man Blockchain-based applications are rising up, covering numerous fields including finance, healthcare, product management, Internet of Things (IoT), and many more. However, there are still some challenges of blockchain technology such as scalability and security problems which need to be overcome. This paper comprises of a comprehensive study of Blockchain technology. We have included here a deep dive into how blockchains work, its architecture, consensus and various applications. Furthermore, technical challenges are briefly listed.


Sign in / Sign up

Export Citation Format

Share Document