scholarly journals A Novel Approach to Arabic Chabot, Utilizing Google Colab and the Internet of Things: A Case Study at a Computer Center

Webology ◽  
2021 ◽  
Vol 18 (2) ◽  
pp. 946-954
Author(s):  
Yasmin Makki Mohialden ◽  
Muhanad Tahrir Younis ◽  
Nadia Mahmood Hussien

A Chabot is a software program for humans to interact with natural-language computers. It has numerous applications in business, service, education, and healthcare, among others. Arabic Chabot’s, on the other hand, fight to generate and display Arabic characters correctly because of linguistic problems. In this paper, we propose a new method for the development of effective Arabic Chabot’s, which is improved by the use of the Internet of things (IOT). An experiment was performed utilizing Google Colab and the Python Chatterbot library to build and deploy an Arabic Chabot for a computer center based on IOT.

Author(s):  
И. У. Хашумов ◽  
М. Р. Хаджиев ◽  
Х. Х. Мальцагов

В данной статье рассматривается проблема информационной безопасности IoT и уязвимость в различных областях использования интернета вещей. В настоящее время мы можем найти статьи о том, как находят уязвимости, например, в такой технике, как автомобиль, холодильник или системах домашней сигнализации. Все эти вещи могут быть объединены одним термином IoT (Интернет вещей), и на сегодняшний день данная тема и данная технология является одной из самых популярных. Само название Интернет вещей (IoT) вызывает в воображении две противоречивые мысли: с одной стороны, это доступность и удобство управления любой техникой, с другой стороны, это опасность со стороны злоумышленников и хакеров, опасение за то, что, если все подключено к интернету, любой хакер может подключиться и навредить, изобретая множество способов проникновения в вашу жизнь с помощью ваших же гаджетов. В статье исследуются потенциальные риски и способы их снижения, необходимые учесть, прежде чем эксплуатировать устройства с поддержкой IoT. This article addresses the issue of IoT information security and vulnerability in various areas of the use of the Internet of things. Currently, we can find articles on how to find vulnerabilities, for example, in such techniques as a car, a refrigerator or home alarm systems. All these things that can be united by one term IoT (Internet of things), and today this topic and this technology is one of the most popular. The very name of the Internet of Things (IoT) conjures up two conflicting thoughts on the one hand, it is the accessibility and convenience of controlling any technology on the other hand, it is a danger from intruders and hackers, the fear that everything is connected to the Internet, any hacker can connect and harm by inventing millions of ways to enter your life with your gadgets. The article examines the potential risks, and the likelihood of their reduction, before using devices with IoT support.


Computer ◽  
2016 ◽  
Vol 49 (5) ◽  
pp. 87-90 ◽  
Author(s):  
Phillip A. Laplante ◽  
Jeffrey Voas ◽  
Nancy Laplante

2021 ◽  
Vol 34 (02) ◽  
pp. 1032-1038
Author(s):  
Arya Majidi

Population growth and urbanization have led to an increase in the rate of waste production, the lack of timely and proper management of which will have adverse effects on human life and the environment. Since most of the waste management costs are spent on waste collection and transportation, it is necessary to find solutions to control the huge costs of this sector. On the other hand, today, intelligent technologies are used globally as solutions to meet challenges in various fields such as agriculture to improve agro-industrial production, transportation, and waste management, which creates a concept called smart cities. One of the categories that has changed the concept of cities and made them have easier and smarter answers to various events and needs is the "Internet of Things", in which many cases and infrastructures with new hardware technologies and Software are integrated. Waste collection is no exception to this rule and efforts have been made to make it smarter. In this research, some of the latest innovations presented globally in order to make trash smarter have been examined.


Author(s):  
Tanweer Alam

In next-generation computing, the role of cloud, internet and smart devices will be capacious. Nowadays we all are familiar with the word smart. This word is used a number of times in our daily life. The Internet of Things (IoT) will produce remarkable different kinds of information from different resources. It can store big data in the cloud. The fog computing acts as an interface between cloud and IoT. The extension of fog in this framework works on physical things under IoT. The IoT devices are called fog nodes, they can have accessed anywhere within the range of the network. The blockchain is a novel approach to record the transactions in a sequence securely. Developing a new blockchains based middleware framework in the architecture of the Internet of Things is one of the critical issues of wireless networking where resolving such an issue would result in constant growth in the use and popularity of IoT. The proposed research creates a framework for providing the middleware framework in the internet of smart devices network for the internet of things using blockchains technology. Our main contribution links a new study that integrates blockchains to the Internet of things and provides communication security to the internet of smart devices.


2018 ◽  
Vol 5 (2) ◽  
pp. 1275-1284 ◽  
Author(s):  
Gopika Premsankar ◽  
Mario Di Francesco ◽  
Tarik Taleb

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Jean-Éric Pelet ◽  
Erhard Lick ◽  
Basma Taieb

Purpose This study bridges the gap between sensory marketing and the use of the internet of things (IoT) in upscale hotels. This paper aims to investigate how stimulating guests’ senses through IoT devices influenced their emotions, affective experiences, eudaimonism (well-being), and ultimately, guest behavior. The authors examined the potential moderating effects of gender. Design/methodology/approach Research conducted comprised an exploratory study, which consisted of interviews with hotel managers (Study 1) and an online confirmatory survey (n = 357) among hotel guests (Study 2). Findings The results showed that while the senses of smell, hearing and sight had an impact on guests’ emotions, the senses of touch, hearing and sight impacted guests’ affective experiences. The senses of smell and taste influenced guests’ eudaimonism. The sense of smell had a greater effect on eudaimonism and behavioral intentions among women compared to men. Research limitations/implications This study concentrated on upscale hotels located in Europe. Further research may explore the generalizability of the findings (e.g. in other cultures, comparison between high-end and low-end hotels). Practical implications Managers of upscale hotels should apply congruent sensory stimuli from all five senses. Stimuli may be customized (“SoCoIoT” marketing). IoT in hotels may be useful in the aftermath of the COVID pandemic, as voice commands help guests avoid touching surfaces. Originality/value IoT can be applied in creating customized multi-sensory hotel experiences. For example, hotels may offer unique and diverse ambiances in their rooms and suites to improve guest experiences.


Author(s):  
Neetu Faujdar

Pervasive computing has been greatly supported by the internet of things. The use of internet of things has created the environment that helps in the management of the different modules that are the part of the complete system, which can work effectively without the interference with the other components of the system. The cloud environment with the internet of things can help in getting the greater extend of data sharing. Little attention has been provided to the security of the various stakeholders that are the part of the system. IoT cloud integration involved privacy, security, and personal safety risk of the stakeholders. Not only are these types of security attacks possible, but there is also the possibility of attack on the IoT components like hardware manipulation to disrupt the services. As we are on the network, all the communication attacks of network are also possible. This chapter will cover common aspects of regarding the cloud and internet of things (IOT) with 5G networks.


Author(s):  
Zelal Gültekin Kutlu

In this study, the periodical differences of industrial revolutions, which is one of the effects of technological developments in the industrial field, and the last stage of it are mentioned. With the latest industrial revolution called Industry 4.0, machines work in harmony with technology at every stage of industrial areas. This period, known as Industry 4.0 or the fourth industrial revolution, refers to the system in which the latest production technologies, automation systems, and the technologies that make up this system exchange data with each other. In addition to the information technologies and automation systems used in Industry 3.0, industrial production has gained a whole new dimension with the use of the internet. With internet networks, machines, operators, and robots now work in harmony. At this point, the concept of internet of objects becomes important. Therefore, another focus of the study is the concept of internet of objects. There are some assumptions about the uses, benefits, and future status of the internet of things.


Sign in / Sign up

Export Citation Format

Share Document