scholarly journals Application and Recent Trends in Implementation of Internet of Things: A comprehensive review

YMER Digital ◽  
2021 ◽  
Vol 20 (12) ◽  
pp. 533-544
Author(s):  
S Karthik ◽  
◽  
N Satish ◽  

Internet of Things (IoT) is an evolving technology in the current era with a combination of diverse computational technologies, objects, animals and human. The objects in the IoT framework transmit data among themselves and they are assigned with unique numbers for identification. The communication among the network is established by identification system and functions without any centralized system. Advancement in the sensor network has made automation in numerous field and integration of soft computing technology in the IoT system has made effective decision making. The objects resides in the IoT system acts intelligent and perform the actions intelligently. The IoT based technology enhances daily life of humans via connected devices and makes living things context-aware. The information collected from sensors will be processed with the computational algorithms and effective predictions are accomplished. In this article, recent applications and soft computing algorithms are reviewed. In addition to that numerous applications based on IoT is also discussed in this article.

2021 ◽  
Author(s):  
AISDL

The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions of nodes. This results in Big Data congestion, data management, storage issues and various inefficiencies. Fog Computing aims at solving the issues with data management as it includes intelligent computational components and storage closer to the data sources.


2015 ◽  
Vol 2015 ◽  
pp. 1-8 ◽  
Author(s):  
Sungwook Kim

The Internet has become an evolving entity, growing in importance and creating new value through its expansion and added utilization. The Internet of Things (IoT) is a new concept associated with the future Internet and has recently become popular in a dynamic and global network infrastructure. However, in an IoT implementation, it is difficult to satisfy different Quality of Service (QoS) requirements and achieve rapid service composition and deployment. In this paper, we propose a new QoS control scheme for IoT systems. Based on the Markov game model, the proposed scheme can effectively allocate IoT resources while maximizing system performance. In multiagent environments, a game theory approach can provide an effective decision-making framework for resource allocation problems. To verify the results of our study, we perform a simulation and confirm that the proposed scheme can achieve considerably improved system performance compared to existing schemes.


2020 ◽  
Vol 0 (0) ◽  
Author(s):  
Dipalee Ashok Chaudhari ◽  
Ekambaram Umamaheswari

AbstractInternet of Things (IoT) plays a prominent role in health-care of patients, which assist the physicians and patients through the assistance in effective decision-making and additionally, in the medical field, IoT plays a significant role in real-time monitoring of the patients. Even though the data provided by the IoT devices ensure the effective decision-making, the data is susceptible to the network attacks. Thus, the paper proposes an authentication protocol for enabling the secure data transmission in IoT based on three functions, such as encryption function, hashing function, and adaptive XOR function. The proposed authentication protocol is named as, Adaptive XOR, hashing and Encryption Key Exchange (AXHE) protocol, which is the combination of the functions, such as encryption function, hashing function, and adaptive XOR function. The protocol ensures the security in the communication through two successive phases, such as registration and authentication of the user, where the user name, password, public keys, private keys, and security factor are employed. The authentication is progressed as seven levels and whenever the security factor matches, the user is authenticated and the communication continues. The analysis of the proposed AXHE is performed using 50 and 100 nodes in the presence of DOS and black hole attacks, which acquires the detection rate, throughput, and detection delay of 0.3859, 0.32, and 6.535 s, respectively.


Author(s):  
Lokesh B. Bhajantri ◽  
Prashant M. Baluragi

In the past, the existing Internet of Things caused traffic congestion and receiver uncertainty problems due to insufficient data transfer between the nodes or devices for data perception. The authors have proposed the method for context-aware data perception in the cognitive internet of things environment. The proposed context-aware data perception is described in the following stages, initially nodes in Cognitive Internet of Things network are clustered effectively using adaptive pillar ‘K' means clustering algorithm. After the formation of effective clusters, the cognitive agent performs the effective context-aware data learning using support-based convolutional neural networks. Finally, adaptive fuzzy logic defines the effective decision for data perception. The experimental results show that the proposed method outperforms the cognitive agent approaches of data perception in terms of network lifetime, energy consumption, data perception accuracy, and throughput in the cognitive internet of things.


Author(s):  
Shafagat Mahmudova

The study machine learning for software based on Soft Computing technology. It analyzes Soft Computing components. Their use in software, their advantages and challenges are studied. Machine learning and its features are highlighted. The functions and features of neural networks are clarified, and recommendations were given.


Author(s):  
András Sajó ◽  
Renáta Uitz

This chapter examines the relationship between parliamentarism and the legislative branch. It explores the evolution of the legislative branch, leading to disillusionment with the rationalized law-making factory, a venture run by political parties beyond the reach of constitutional rules. The rise of democratically bred party rule is positioned between the forces favouring free debate versus effective decision-making in the legislature. The chapter analyses the institutional make-up and internal operations of the legislature, the role of the opposition in the legislative assembly, and explores the benefits of bicameralism for boosting the powers of the legislative branch. Finally, it looks at the law-making process and its outsourcing via delegating legislative powers to the executive.


Author(s):  
Lyon Salia Awuah ◽  
Kwame Oduro Amoako ◽  
Stephen Yeboah ◽  
Emmanuel Opoku Marfo ◽  
Peter Ansu-Mensah

AbstractThis paper aims to explore the motivations and challenges of engaging host communities in CSR practices within the context of Newmont Ahafo Mines (NAM), a subsidiary of a Multinational Mining Enterprise (MNE) operating in Ghana’s mining sector. This paper draws insights from stakeholder theory and interviews conducted with internal stakeholders (management and employees) and stakeholders in host communities (traditional rulers and community members). The findings indicate that effective decision-making, gaining legitimacy, cost savings, management of risks, and accountability are some of the perceived motivations of NAM’s stakeholder engagement in CSR. Nonetheless, the most critical challenges to NAM in improving stakeholder engagement in CSR practices are the lack of community members’ support in CSR projects, communities’ high expectations of NAM on development projects and over-dependency on NAM on the part of host communities. Therefore, it is reasonable for MNEs in emerging economies to attune engagement practices to the host community’s context. This will enable CSR practices and policies to fully exploit the latent benefits of CSR in the mining sector.


Author(s):  
Patrizio Armeni ◽  
Marianna Cavazza ◽  
Entela Xoxi ◽  
Domenica Taruscio ◽  
Yllka Kodra

In the field of rare diseases (RDs), the evidence standard is often lower than that required by health technology assessment (HTA) and payer authorities. In this commentary, we propose that appropriate economic evaluation for rare disease treatments should be initially informed by cost-of-illness (COI) studies conducted using a societal perspective. Such an approach contributes to improving countries’ understanding of RDs in their entirety as societal and not merely clinical, or product-specific issues. In order to exemplify how the disease burden’s distribution has changed over the last fifteen years, key COI studies for Hemophilia, Fragile X Syndrome, Cystic Fibrosis, and Juvenile Idiopathic Arthritis are examined. Evidence shows that, besides methodological variability and cross-country differences, the disease burden’s share represented by direct costs generally grows over time as novel treatments become available. Hence, to support effective decision-making processes, it seems necessary to assess the re-allocation of the burden produced by new medicinal products, and this approach requires identifying cost drivers through COI studies with robust design and standardized methodology.


Sign in / Sign up

Export Citation Format

Share Document