scholarly journals Networking-Aware IoT Application Development

Sensors ◽  
2020 ◽  
Vol 20 (3) ◽  
pp. 897
Author(s):  
Arne Bröring ◽  
Jan Seeger ◽  
Manos Papoutsakis ◽  
Konstantinos Fysarakis ◽  
Ahmad Caracalli

Various tools support developers in the creation of IoT applications. In general, such tools focus on the business logic, which is important for application development, however, for IoT applications in particular, it is crucial to consider the network, as they are intrinsically based on interconnected devices and services. IoT application developers do not have in depth expertise in configuring networks and physical connections between devices. Hence, approaches are required that automatically deduct these configurations. We address this challenge in this work with an architecture and associated data models that enable networking-aware IoT application development. We evaluate our approach in the context of an application for oil leakage detection in wind turbines.

2021 ◽  
Vol 15 (04) ◽  
pp. 513-537
Author(s):  
Marcel Tiator ◽  
Anna Maria Kerkmann ◽  
Christian Geiger ◽  
Paul Grimm

The creation of interactive virtual reality (VR) applications from 3D scanned content usually includes a lot of manual and repetitive work. Our research aim is to develop agents that recognize objects to enhance the creation of interactive VR applications. We trained partition agents in our superpoint growing environment that we extended with an expert function. This expert function solves the sparse reward signal problem of the previous approaches and enables to use a variant of imitation learning and deep reinforcement learning with dense feedback. Additionally, the function allows to calculate a performance metric for the degree of imitation for different partitions. Furthermore, we introduce an environment to optimize the superpoint generation. We trained our agents with 1182 scenes of the ScanNet data set. More specifically, we trained different neural network architectures with 1170 scenes and tested their performance with 12 scenes. Our intermediate results are promising such that our partition system might be able to assist the VR application development from 3D scanned content in near future.


2021 ◽  
Author(s):  
Hayeon Park ◽  
Rut Diane Cuebas ◽  
Kyoung-Soo We ◽  
Sung Hoon Kim ◽  
Chang-Gun Lee

Author(s):  
Shesagiri Taminana ◽  
◽  
Lalitha Bhaskari ◽  
Arwa Mashat ◽  
Dragan Pamučar ◽  
...  

With the Present days increasing demand for the higher performance with the application developers have started considering cloud computing and cloud-based data centres as one of the prime options for hosting the application. Number of parallel research outcomes have for making a data centre secure, the data centre infrastructure must go through the auditing process. During the auditing process, auditors can access VMs, applications and data deployed on the virtual machines. The downside of the data in the VMs can be highly sensitive and during the process of audits, it is highly complex to permits based on the requests and can increase the total time taken to complete the tasks. Henceforth, the demand for the selective and adaptive auditing is the need of the current research. However, these outcomes are criticised for higher time complexity and less accuracy. Thus, this work proposes a predictive method for analysing the characteristics of the VM applications and the characteristics from the auditors and finally granting the access to the virtual machine by building a predictive regression model. The proposed algorithm demonstrates 50% of less time complexity to the other parallel research for making the cloud-based application development industry a safer and faster place.


Author(s):  
Leonardo Candela ◽  
Donatella Castelli ◽  
Pasquale Pagano

This chapter introduces OpenDLib, a digital library service system developed at ISTI-CNR for easing the creation and management of digital libraries. It discusses the motivations underlying the development of such a system and describes it by presenting (i) the characteristics of the huge kind of content it is capable of managing, (ii) the set of functions it natively provides its digital libraries with, (iii) the powerful and flexibility of its component-oriented architectural paradigm as a key feature for addressing different application scenarios, and (iv) the technologies the system development relies on. The authors hope that understanding the OpenDLib foundational principles will not only inform stakeholders and decision makers of the features implemented by this existing system, but also assist researchers and application developers in the understanding of the issues, and their possible solutions, that arises when building digital library systems aimed at serving such a broad class of application scenarios.


Author(s):  
Mhafuzul Islam ◽  
Mizanur Rahman ◽  
Sakib Mahmud Khan ◽  
Mashrur Chowdhury ◽  
Lipika Deka

Connected vehicle (CV) application developers need a development platform to build, test, and debug real-world CV applications, such as safety, mobility, and environmental applications, in edge-centric cyber-physical system (CPS). The objective of this paper is to develop and evaluate a scalable and secure CV application development platform (CVDeP) that enables application developers to build, test, and debug CV applications in real-time while meeting the functional requirements of any CV applications. The efficacy of the CVDeP was evaluated using two types of CV applications (one safety and one mobility application) and they were validated through field experiments at the South Carolina Connected Vehicle Testbed (SC-CVT). The analyses show that the CVDeP satisfies the functional requirements in relation to latency and throughput of the selected CV applications while maintaining the scalability and security of the platform and applications.


2012 ◽  
Vol 4 (4) ◽  
pp. 1-21 ◽  
Author(s):  
Eyal Eshet

Mobile platforms (e.g., Google Android, Apple iOS) and their closely integrated app stores transformed the mobile industry and opened the market for mobile application developers. Consequently, applications for smartphones quickly soared to phenomena levels. As mobile technology continues to evolve and shape human interaction with technology, human-centered design (HCD) methods adapt to the capabilities of technology and to the needs of mobile application development. This study presents a preliminary review of 79 research papers on the practice of HCD in mobile application development for the smartphone touch era. The aim of the study is to highlight emerging methods and their implications for mobile application development. The methods discovered by this study assist mobile application developers to better understand their target users. Further research is needed, particularly in exploring what user research and evaluation methods are the most effective in the context of mobile application development.


10.29007/cfm3 ◽  
2019 ◽  
Author(s):  
Salman Faizi ◽  
Shawon Rahman

Software application development must include implementation of core functionality along with secure coding to contain security vulnerabilities of applications. Considering the life cycle that a software application undergoes, application developers have many opportunities to include security starting from the very first stage of planning or requirement gathering. However, before even starting requirement gathering, the software application development team must select a framework to use for the application’s lifecycle. Based on the application and organizational characteristics, software application developers must select the best-fit framework for the lifecycle. A software application’s functionality and security start with picking the right lifecycle framework.When it comes to application development frameworks, one size does not fit all. Based on the characteristics of the application development organization such as the number of application developers involved, project budget and criticality, and the number of teams, one of the five frameworks will work better than others.Keywords: Software development lifecycle, software functionality, software security, application development, framework security


2021 ◽  
Author(s):  
Deepika Prakash ◽  
Naveen Prakash

An IoT system is specified in terms of sensors/actuators and communication between them. However, we argue for performing upstream activities of the Systems Development Life Cycle during IoT application development. We propose the conceptual design stage followed by conversion to an IoT system and show that we need concepts for autonomy, perception, input processing, changing the external world, maintenance of historical information and communication. To handle these, we use the notion of communicative agents, COMMAGs and develop the Communicative Agent Model. We show conversion of this model into the IoT system to be.


Sensors ◽  
2021 ◽  
Vol 21 (19) ◽  
pp. 6546
Author(s):  
Andrea Detti ◽  
Hidenori Nakazato ◽  
Juan Antonio Martínez Navarro ◽  
Giuseppe Tropea ◽  
Ludovico Funari ◽  
...  

Many cloud providers offer IoT services that simplify the collection and processing of IoT information. However, the IoT infrastructure composed of sensors and actuators that produces this information remains outside the cloud; therefore, application developers must install, connect and manage the cloud. This requirement can be a market barrier, especially for small/medium software companies that cannot afford the infrastructural costs associated with it and would only prefer to focus on IoT application developments. Motivated by the wish to eliminate this barrier, this paper proposes a Cloud of Things platform, called VirIoT, which fully brings the Infrastructure as a service model typical of cloud computing to the world of Internet of Things. VirIoT provides users with virtual IoT infrastructures (Virtual Silos) composed of virtual things, with which users can interact through dedicated and standardized broker servers in which the technology can be chosen among those offered by the platform, such as oneM2M, NGSI and NGSI-LD. VirIoT allows developers to focus their efforts exclusively on IoT applications without worrying about infrastructure management and allows cloud providers to expand their IoT services portfolio. VirIoT uses external things and cloud/edge computing resources to deliver the IoT virtualization services. Its open-source architecture is microservice-based and runs on top of a distributed Kubernetes platform with nodes in central and edge data centers. The architecture is scalable, efficient and able to support the continuous integration of heterogeneous things and IoT standards, taking care of interoperability issues. Using a VirIoT deployment spanning data centers in Europe and Japan, we conducted a performance evaluation with a two-fold objective: showing the efficiency and scalability of the architecture; and leveraging VirIoT’s ability to integrate different IoT standards in order to make a fair comparison of some open-source IoT Broker implementations, namely Mobius for oneM2M, Orion for NGSIv2, Orion-LD and Scorpio for NGSI-LD.


Sign in / Sign up

Export Citation Format

Share Document