scholarly journals A Pervasive Collaborative Architectural Model at the Network’s Periphery

IoT ◽  
2021 ◽  
Vol 2 (3) ◽  
pp. 524-548
Author(s):  
Ghassan Fadlallah ◽  
Hamid Mcheick ◽  
Djamal Rebaine

Pervasive collaborative computing within the Internet of Things (IoT) has progressed rapidly over the last decade. Nevertheless, emerging architectural models and their applications still suffer from limited capacity in areas like power, efficient computing, memory, connectivity, latency and bandwidth. Technological development is still in progress in the fields of hardware, software and wireless communications. Their communication is usually done via the Internet and wireless via base stations. However, these models are sometimes subject to connectivity failures and limited coverage. The models that incorporate devices with peer-to-peer (P2P) communication technologies are of great importance, especially in harsh environments. Nevertheless, their power-limited devices are randomly distributed on the periphery where their availability can be limited and arbitrary. Despite these limitations, their capabilities and efficiency are constantly increasing. Accelerating development in these areas can be achieved by improving architectures and technologies of pervasive collaborative computing, which refers to the collaboration of mobile and embedded computing devices. To enhance mobile collaborative computing, especially in the models acting at the network’s periphery, we are interested in modernizing and strengthening connectivity using wireless technologies and P2P communication. Therefore, the main goal of this paper is to enhance and maintain connectivity and improve the performance of these pervasive systems while performing the required and expected services in a challenging environment. This is especially important in catastrophic situations and harsh environments, where connectivity is used to facilitate and enhance rescue operations. Thus, we have established a resilient mobile collaborative architectural model comprising a peripheral autonomous network of pervasive devices that considers the constraints of these resources. By maintaining the connectivity of its devices, this model can operate independently of wireless base stations by taking advantage of emerging P2P connection technologies such as Wi-Fi Direct and those enabled by LoPy4 from Pycom such as LoRa, BLE, Sigfox, Wi-Fi, Radio Wi-Fi and Bluetooth. Likewise, we have designed four algorithms to construct a group of devices, calculate their scores, select a group manager, and exchange inter- and intra-group messages. The experimental study we conducted shows that this model continues to perform efficiently, even in circumstances like the breakdown of wireless connectivity due to an extreme event or congestion from connecting a huge number of devices.

2015 ◽  
Vol 8 (4) ◽  
pp. 93
Author(s):  
Muhammad Aqib ◽  
Jonathan Cazalas

With the advent in mobile and internet technologies, there is a significant increase in the number of users using smartphones and other internet based applications. There are a large number of applications available online that use the internet and provide useful information to the users. These include ones that provide location-based services e.g. google maps etc. These applications provide many facilities to the users who want information regarding a specific area or directions using an optimal path to a destination. Due to these reasons, the number of clients using these applications is increasing on a daily basis. Although these services are very useful and are making it easy for us to get information about our surroundings, some issues are also linked with the use of these applications and their services. One of the more significant issues of using these services is privacy with respect to sending personal location information to location-based services servers. Researchers have provided many solutions to solve these issues. One of the solutions is through caching and use of k-anonymity techniques. In this paper, we have proposed a method to solve the privacy issue that uses caching data approach to reduce the number of queries sent to the location-based services server. We also discuss the use of the concept of k-anonymity when no relevant data is available in cache, and queries are sent to the server.


2021 ◽  
Vol 8 (2) ◽  
pp. 183-212
Author(s):  
Agung Kurniawan Sihombing ◽  
Rika Ratna Permata ◽  
Tasya Safiranita Ramli

In the rapid technological development, physical boundaries have begun to disappear. The internet has created a ‘free culture’. In addition, the era is challenging the copyright concept along with the emergence of ‘digital copyright’. It has become the main commodity of Over-the-Top services providing means of communication and entertainment through the internet. Content streaming service like Netflix uses films, as well as other cinematographic works, as its main commodities. OTT Streaming media helps to protect copyright holders' rights that previously have been violated by illegal streaming sites on the internet. Unfortunately, it also raises a new question: how digital copyright-objects can be protected in this kind of service. Without physical form, copyright object can be distributed easily on the internet, and it may lead to right violations. To answer this problem, the authors aim to describe the digital copyright protection on OTT Streaming Content Media in Indonesia and compare them to the 1998 Digital Millennium Copyright Act (DMCA) of the United States of America using a descriptive-analytical approach. This study employed a normative juridical approach with secondary data. The results of this study indicate that digital copyright protection in Indonesia is still centered on conventional copyright objects, and a sui generis law is needed to provide better protection for digital copyright objects.


Crowdsourcing ◽  
2019 ◽  
pp. 838-863
Author(s):  
Maria Antonia Brovelli ◽  
Blagoj Delipetrev ◽  
Giorgio Zamboni

The availability of new mobile devices (tablets and smartphones) equipped with many sensors is changing or, better, enriching the way we monitor and sense the world that surrounds us. The internet has permeated completely not only our scientific and technological development, but also our life. Only some years ago, we used geospatial data and GIS software installed within our computers. Nowadays, data and operators are provided via the net by means of distributed and shared geo-services and a simple and powerless mobile device is enough to connect them. The possibility of interaction has become not only faster and more user friendly but also active, being individuals and communities free of adding, deleting, and changing contents in real time in the new GeoWeb2.0. This chapter explores GeoWeb2.0.


Politeja ◽  
2019 ◽  
Vol 16 (4(61)) ◽  
pp. 131-148
Author(s):  
Joanna Talewicz-Kwiatkowska

Stereotypical perceptions of Roma people as those who like to walk along forest paths to camps, or stories about Gypsy fairies with crystal balls have nothing in common with such trendy and contemporary terms as new technologies. How can one imagine a stereotypical Roma who loves horses and campfires surfing the Internet? How do we discuss changes in men-women relations in the context of a patriarchal community in which women have no right to express their opinions and are literally captive? Undoubtedly, a lack of knowledge about Roma people, and with often the only alternative in the form of stereotypical information excludes them from the discussion on cultural changes related to technological development. At the same time media, including the Internet, are important not only in the context of activism of Roma leaders and organizations, but also with reference to people who want to fight against the negative image of Roma people in public space, regardless of membership or lack of membership in Roma organizations.


Author(s):  
Hala A. Naman ◽  
Naseer Ali Hussien ◽  
Mohand Lokman Al-dabag ◽  
Haider Th.Salim Alrikabi

<p class="0abstract">One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion of Internet science and the use of the Internet worldwide, we will establish a security feature of the IOT service that will work more reliably and more effectively to deal with the Internet of Things and ensure the work of the services that the customer interacts with. A secret-key stenographic scheme that embeds four gray-scale secret size (128*128) pixel images into a size (512*512) pixel cover image in this work. Wavelet transform is the method used in this project to analyze the cover into its frequency components. In this work, combinations of steganography and cryptography were made to increase the level of safety and make the device more difficult for attackers to beat. The resulting stego-image that will be transmitted did not raise any suspicion by both objective and subjective evaluation, so the primary objective of Steganography is achieved. The proposed system was designed by using (MATLAB R2018b) and running on a Pentium-4 computer. The Internet of Things works with the encryption system for data in a synchronized manner with the technological development, and in order to maintain the stability of any Internet of things service, whether it is information signal services, visual or audio data, a remote control system, or data storage in the Internet cloud, we must focus on data preservation from internet pirates and internet system hackers. The picture Figure<strong> </strong>4 below shows the method of encryption and dealing with the Internet of things system..</p>


MEDIASI ◽  
2020 ◽  
Vol 1 (1) ◽  
pp. 41-53
Author(s):  
Putri Surya Cempaka

This article discussed radio broadcasting technology in general and how the industry is relatively resilient amid the development of other media technologies today, such as the Internet. Internet technology is able to present number of social networks through social media that are interactive, direct, and user generated. In addition, the Internet forces conventional broadcasting industries such as radio to penetrate digital mechanisms by practicing radio streaming. Radio broadcasting also add this type of interaction to their listeners, for example through websites, blogs, vlogs (video blogs), Twitter, Instagram, Snapchat, and Facebook accounts. This integrated conventional media technology and new media is often called media convergence. By using qualitative approach and descriptive method, this paper explained a case of media convergence by one of the radio broadcast station in Indonesia that is Delta FM. As a result, Delta FM presents its broadcasts with the help of new media in order to survive in the broadcasting industry amid the current widespread use of new media.


Author(s):  
Ziad Hunaiti ◽  
Daniel Tairo ◽  
Eliamani Sedoyeka ◽  
Sammi Elgazzar

This chapter discuss the challenges facing mobile commerce deployment in the United Kingdom. Although the number of mobile phone users is increasing and the technology is available for successful implementation of m-commerce, only a small number of users utilise m-commerce services. At the same time, mobile phones are becoming smarter, and most of latest phones are capable of connecting to the Internet. This chapter looks at the background of m-commerce as well as the technological development of mobile phones to their current stage. Also, technical and non technical issues which hinder the adoption of m-commerce are discussed and solutions and recommendations are given.


Author(s):  
Hanny Hafiar ◽  
Priyo Subekti ◽  
Aat Ruchiat Nugraha

As a millennial generation, teenagers have the need to use the internet in their daily activities. The need to access the internet is also felt by students with visually impaired. Although many various sources of information are still in the form of text, with the help of various types of assistance programs, students with visually impaired can access this information. With the existence of various assistance programs, teenagers with visually impaired can access the internet more unimpeded. Based on this background, the purpose of this research is to find out the use of the internet by students with visually impaired. The results are sequentially stated that the use of the internet includes access to WhatsApp, YouTube, Google, Social Media (Facebook and Instagram), radio streaming, video downloads, music downloads, Map/location identifiers, online shopping and TV streaming to watch football broadcasts. However, there are still a number of obstacles faced by students with visually impaired who still need technological development so that the opportunity for people with visually impaired to access the internet is increasingly open. In addition, directing efforts from related institutions are needed to improve the ability of students to use the internet as well as supervision so as not to be contaminated with negative content from the internet.


2012 ◽  
Vol 165 (3) ◽  
pp. 102-107
Author(s):  
Adam MUSIOŁ ◽  
Sabina MUSIOŁ

The growing popularity of computers can result in a number of new problems that were unknown in the past. Recently, apart from military, religious and political threats, one can also distinguish a cyber threat. This term denotes all the hazards resulting from technological development, especially the Internet. This type of threat emerged at the end of last century and it is becoming more and more serious.


2019 ◽  
Vol 24 ◽  
pp. 33-38
Author(s):  
Jarosław Nadobnik

A pro-health lifestyle, recreation and sport, as well as social media are closely related. A lot of people want to look good, eat well, be fi t and engage in physical activity. As a consequence, companies from the fi tness industry and producers of dietary supplements employ social media specialists in marketing agencies. Information published on Facebook, Instagram, Twitter or YouTube reach up to thousands of people in a short time period. The Internet is full of profi les of people who publish their relationship with trainings, show progress on the way to a dream fi gure, talk about the fi ght against overweightness, diets rules, etc. The tools from the Instagram social network, as well as the number of users and hashtags associated with physical activity, fi tness and promotion of a healthy lifestyle, are vast. On Instagram, the most popular hashtags were #love, #instagood, #me, #happy, #girl, but the #fi tness hashtag was 18th, the #sport 152nd, place for a total of about 92 million hashtags. The matter of physical activity is important for many users of this social platform. If the user consciously makes use of the possibilities of digital technology and treats the Internet as a tool to satisfy higher needs, then one can certainly talk about the positive aspects of technological development and technology for the proper functioning of a pro-health lifestyle.


Sign in / Sign up

Export Citation Format

Share Document