scholarly journals The Merger of Technology & Talent

2017 ◽  
Vol 139 (01) ◽  
pp. 34-39 ◽  
Author(s):  
Marc Goldsmith

This article discusses various challenges faced by the utilities industry in retaining knowledge and important institutional awareness as trained engineers are closing their retirement age. Utilities need to find a way to hold onto critical knowledge and important institutional awareness of these long-time employees while letting go of the obsolete information that they also hold. However, through various technological innovations, the industry is trying to take full advantage of the Internet of Things (IoT) and the wired and wireless world. Advanced Meter Infrastructure—the so-called Smart Grid—and the suite of devices known as the IoT will play a key role in the transition to a new workforce, and change the types of workers utilities employ. This latest technology will require new skill sets to construct, operate, maintain, and decommission. Digital technology, combined with and contained in such devices as cameras, strain gauges, accelerometers, microphones, and the like, can replace the senses of workers. Software coupled with computing power can improve the speed and accuracy of the engineering calculations or better analyze risk. Robots or unmanned vehicles can carry tools and sensors where it is dangerous or uneconomical to send workers.

The railway system is one of the most widely used modes of transportation due to its low cost. To keep the railway system running smoothly, continuous track monitoring is needed. These days, the railway system is manually supervised. As a result, there is a greater risk of disasters, such as fatalities, occurring as a result of human error while monitoring. The main problem with manual system monitoring is that it takes a long time to process all of the necessary data. Since railway tracks are built over thousands of miles, it is virtually impossible to manually control the device over such a longdistance. At railway crossings, a lot of accidents happen. Crossing gates are usually opened and closed after receiving direct input from the station. If there is a delay in obtaining information from the station, there is a risk of swearing incidents. The main goal of this research is to simplify and protect the railway system. The proposed system employs Force Sensitive Resistor (FSR) detectors for automatic side road crossing protection. Any type of breakage, as well as vibration, can be efficiently detected with a higher degree of precision using Light Dependent Resistor (LRR) and laser detectors. In the event of an unexpected situation, such as an accident, the GSM module will begin communicating via message with the nearest control room for assistance. Sonar sensors are often used for obstacle avoidance when something unexpectedly appears in front of the train. The Internet of Things (IoT) has been added to the system to allow it to be monitored from anywhere in the sphere. The Arduino UNO is a microcontroller that serves as the system's backbone. The framework has the potential to be extremely beneficial to our country's railway economic growth.


2021 ◽  
Vol 3 ◽  
pp. 27
Author(s):  
Valérie Rocchi ◽  
Daniel Brissaud

Industry 4.0 is a promising concept that allows industries to meet customers’ demands with flexible and resilient processes, and highly personalised products. This concept is made up of different dimensions. For a long time, innovative digital technology has been thought of as the only dimension to succeed in digital transformation projects. Other dimensions have been identified such as organisation, strategy, and human resources as key while rolling out digital technology in factories. From these findings, researchers have designed industry 4.0 theoretical models and then built readiness models that allow for analysing the gap between the company initial situation and the theoretical model. Nevertheless, this purely deductive approach does not take into consideration a company’s background and context, and eventually favours one single digital transformation model. This article aims at analysing four actual digital transformation projects and demonstrating that the digital transformation’s success or failure depends on the combination of two variables related to a company’s background and context. This research is based on a double approach: deductive and inductive. First, a literature review has been carried out to define industry 4.0 concept and its main dimensions and digital transformation success factors, as well as barriers, have been investigated. Second, a qualitative survey has been designed to study in-depth four actual industry digital transformation projects, their genesis as well as their execution, to analyse the key variables in succeeding or failing. 46 semi-structured interviews were carried out with projects’ members; interviews have been analysed with thematic content analysis. Then, each digital transformation project has been modelled regarding the key variables and analysed with regards to succeeding or failing. Investigated projects have consolidated the models of digital transformation. Finally, nine digital transformation models have been identified. Industry practitioners could design their digital transformation project organisation and strategy according to the right model.


SAGE Open ◽  
2016 ◽  
Vol 6 (4) ◽  
pp. 215824401668068 ◽  
Author(s):  
Frank Alpert

Today, the lecture class as a format for higher education is under attack more than ever. This article addresses the research question of how lectures can be modernized and revitalized through new uses of digital technology—in particular, video. Critics of lecturing have for a long time observed that lecture classes can be weak on student engagement and motivation to attend class. This article introduces one way to help modernize and revitalize the live lecture class session, a new conceptualization of the instructor-created video. Instructor-created videos are defined and distinguished from current hybrid and alternative forms of technology integration that are proliferating in higher education such as flipped and blended classrooms. Many, if not most, videos used in lectures are “third party videos” (made by others), whereas instructor-created videos are “first party videos.” The author develops and defines the concept of VIDS (Videos Instructor Designed and Starring). VIDS examples illustrate the concept from the author’s experience in a course with 158 students. Student feedback based on survey results is positive. Suggestions for making better videos are offered based on the implementation experience. The VIDS innovation is discussed within the context of the “crisis of the lecture” and offered as one tool to help modernize and revitalize the live lecture class.


Author(s):  
Dani Sasmoko ◽  
Dzyo Bachtiar

Internet of Things (IoT) connects a global infrastructure in communities so they can take benefit of advanced services, by connecting objects (things) both physical and virtual with the Internet so that objects can communicate each other. The object of this study is a baby box to control the baby’s condition. When the baby cries too long it may cause Baby Distressed Tantrum which is the feeling of being depressed in the baby because they feel ignored. If this happens for a long time will endanger the baby's health as it is related to respiratory function and cardiac performance. The function of the baby box is to observe a baby when left without supervision. It will enable users to know if the baby is sleeping, awake or crying. Leaving a crying baby too long may have a negative effect. By applying the Internet of Things (IoT) in the design of an intelligent a baby box will help the parents and babysitter in controlling the baby if they have other activities to do. The baby box monitoring system has a dht11 temperature and humidity sensor, and a noise sensor to detect the baby crying. An esp8266 module on Wemos d1 will send data to an android smartphone and notify the user by sound or vibration.


Sensors ◽  
2019 ◽  
Vol 20 (1) ◽  
pp. 207 ◽  
Author(s):  
Yongjun Ren ◽  
Fujian Zhu ◽  
Pradip Kumar Sharma ◽  
Tian Wang ◽  
Jin Wang ◽  
...  

In the IoT (Internet of Things) environment, smart homes, smart grids, and telematics constantly generate data with complex attributes. These data have low heterogeneity and poor interoperability, which brings difficulties to data management and value mining. The promising combination of blockchain and the Internet of things as BCoT (blockchain of things) can solve these problems. This paper introduces an innovative method DCOMB (dual combination Bloom filter) to firstly convert the computational power of bitcoin mining into the computational power of query. Furthermore, this article uses the DCOMB method to build blockchain-based IoT data query model. DCOMB can implement queries only through mining hash calculation. This model combines the data stream of the IoT with the timestamp of the blockchain, improving the interoperability of data and the versatility of the IoT database system. The experiment results show that the random reading performance of DCOMB query is higher than that of COMB (combination Bloom filter), and the error rate of DCOMB is lower. Meanwhile, both DCOMB and COMB query performance are better than MySQL (My Structured Query Language).


2014 ◽  
Vol 584-586 ◽  
pp. 2626-2630
Author(s):  
Yue Huang ◽  
Li Xin Li ◽  
Yu Mei Liu

The speed and accuracy of project cost are improving with the development of building construction technology and management, however, it often takes a long time to estimate the proposed project. This essay bases on the method of fuzzy math, we researched quick estimating of project cost in order to provide an effective method in evaluating project cost on proposed project.


2020 ◽  
Author(s):  
Shamim Muhammad ◽  
Inderveer Chana ◽  
Supriya Thilakanathan

Edge computing is a technology that allows resources to be processed or executed close to the edge of the internet. The interconnected network of devices in the Internet of Things has led to an increased amount of data, increasing internet traffic usage every year. Also, edge computing is driving applications and computing power away from the integrated points to areas close to users, leading to improved performance of the application. Despite the explosive growth of the edge computing paradigm, there are common security vulnerabilities associated with the Internet of Things applications. This paper will evaluate and analyze some of the most common security issues that pose a serious threat to the edge computing paradigm.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Gaopan Hou ◽  
Jianfeng Ma ◽  
Jiayi Li ◽  
Chen Liang

With the increase in network transmission rates, the Internet of Things (IoT) has gradually become a trend. Users can upload the data generated by the device to the cloud database to save local storage space, thereby reducing local storage costs. Because uploading data to the cloud loses physical control of the data, an audit is required. Traditional audit protocols are not completely suitable for lightweight devices in the IoT. This paper proposes a new type of audit protocol suitable for lightweight devices with weak computing power. This protocol transfers part of the computation of data tags to a cloud storage provider (CSP) with strong computing power, thereby reducing the introduction of computing entities. Our scheme supports the dynamic operation of data and guarantees the effectiveness of challenge response by blockchain. Compared with existing schemes, our scheme is more secure and effective.


2019 ◽  
pp. 689-693
Author(s):  
Veselka Stoyanova

The Internet of Things (IoT) will connect not only computers and mobile devices, but it will also interconnect smart buildings, homes, and cities, as well as electrical grids, gas, and water networks, automobiles, airplanes, etc. IoT will lead to the development of a wide range of advanced information services that need to be processed in real-time and require data centers with large storage and computing power. In this paper, we present an IoT security framework for smart infrastructures such as Smart Homes (SH) and smart buildings (SB). I also present a general threat model that can be used to develop a security protection methodology for IoT services against cyber-attacks (known or unknown).


2021 ◽  
Author(s):  
O. Vishali Priya ◽  
R. Sudha

In today’s world, technology is constantly evolving; various instruments and techniques are available in the agricultural field. And within the agrarian division, the IoT preferences are Knowledge processing. With the help of introduced sensors, all information can be gathered. The reduction of risks, the mechanization of industry, the enhancement of production, the inspection of livestock, the monitoring of environment conditions, the roboticization of greenhouses, and crop monitoring Nearly every sector, like smart agriculture, has been modified by Internet-of-Things (IoT)-based technology, which has shifted the industry from factual to quantitative approaches. The ideas help to link real devices that are equipped with sensors, actuators, and computing power, allowing them to collaborate on a task while staying connected to the Internet, dubbed the “Internet of Things” (IoT). According to the World Telecommunication Union’s Worldwide Guidelines Operation, the Internet of Things (IoT) is a set of sensors, computers, software, and other devices that are connected to the Internet. The paper is highly susceptible to the consequences of its smart agriculture breakthrough.


Sign in / Sign up

Export Citation Format

Share Document