three layer architecture
Recently Published Documents


TOTAL DOCUMENTS

60
(FIVE YEARS 24)

H-INDEX

4
(FIVE YEARS 1)

2022 ◽  
pp. 104-130
Author(s):  
Sudhakar Hallur ◽  
Roopa Kulkarni ◽  
Prashant P. Patavardhan ◽  
Vishweshkumar Aithal

A majority of the applications now go wireless involving IoT as a technology to communicate to their respective destination. IoT is considered as a future of internet. The internet of things integration and efficient communication of the patient health monitoring parameters is the need of the hour in this pandemic. This chapter discusses the three-layer architecture involving hardware communication protocols supporting a layer of healthcare services and applications. Also, the data-guarantee, security and integrity issues, threats risks, and solutions involving deployment of efficient privacy, control, integration methods to confront various prominent and erroneous data manipulation techniques, malicious, and a series of cyber-attacks are proposed. The deployment of various efficient privacy and security protocols in IoT networks is of extreme need to ensure the confidentiality, access-control, authentication, and integrity of the health data transferred and to guarantee the availability of the services to the user at any point of time.


2021 ◽  
Vol 16 (24) ◽  
pp. 108-120
Author(s):  
Ying Liu ◽  
Hong Yan

A predicament facing education is that the traditional teaching mode could no longer meet the requirements of modern society. The fast development of mobile Internet technology has brought online education platforms into existence, and these newborn things are very helpful to solve the mentioned contradiction. To deepen the research of the application of mobile Internet technology in modern education, this paper designed the functional modules of an intelligent online English teaching (IOET) system and implemented the proposed system. In our study, satisfying students’ learning requirements had been taken as the core principle when building the proposed system, and the database design had followed the principles of standardization, consistency, security, integrity, scalability, and ease of maintenance. The IOET system adopts a three-layer architecture, from top down, the system has a representation layer, a business logic layer, and a data service layer. The main management modules of the system include course notification module, visitor management module, and homework management module, etc. Through this paper, we hope to provide a piece of evidence for the basic research on the upgrade and improvement of intelligent online English teaching platforms.


2021 ◽  
Vol 2021 ◽  
pp. 1-22
Author(s):  
Jinwen Xi ◽  
Shihong Zou ◽  
Guoai Xu ◽  
Yanhui Guo ◽  
Yueming Lu ◽  
...  

Blockchain technology has been widely used in many fields, such as smart cities, smart health care, and smart manufacturing, due to its anonymity, decentralization, and tamper resistance in peer-to-peer (P2P) networks. However, poor scalability has severely affected the widespread adoption of traditional blockchain technology in high-throughput and low-latency applications. Therefore, based on the three-layer architecture, this study presents a variety of solutions to improve the scalability of the blockchain. As the scale of the network expands, one of the most practical ways to achieve horizontal scalability is sharding, where the network is divided into multiple subnetworks to avoid repeated communication overhead, storage, and calculations. This study provides a systematic and comprehensive introduction to blockchain sharding, along with a detailed comparison and evaluation for primarily considered sharding mechanisms. We also provide the detailed calculations and then analyze the characteristics of existing solutions along with our insights.


Coatings ◽  
2021 ◽  
Vol 11 (12) ◽  
pp. 1471
Author(s):  
Alexey Vereschaka ◽  
Nikolay Sitnikov ◽  
Marina Volosova ◽  
Anton Seleznev ◽  
Catherine Sotova ◽  
...  

The article describes the results of the investigation focused on the properties of the Zr,Hf-(Zr,Hf)N-(Zr,Hf,Me,Al)N coatings, where Me means chromium (Cr), titanium (Ti), or molybdenum (Mo). These coatings have three-layer architecture, including adhesion, transition, and wear-resistant layers, while the latter, in turn, has a nanolayer structure. Despite the fact that the coatings under study have close values of hardness and critical fracture load LC2, there are noticeable differences in wear resistance during the turning of steel. The tools with the coatings under study demonstrated better wear resistance compared to an uncoated tool and the tool with the commercial ZrN coating. The best wear resistance was detected for a tool with the Zr,Hf-(Zr,Hf)N-(Zr,Hf,Ti,Al)N coating. The study of the pattern of cracking in the structure of the coatings has found that, during the cutting process, active cracking occurs in the coating with Cr, which leads to the fracture of the coating, while the process of cracking is noticeably less active in the coatings with Ti or Mo.


2021 ◽  
Vol 14 (9) ◽  
pp. 5487-5506
Author(s):  
Haipeng Lin ◽  
Daniel J. Jacob ◽  
Elizabeth W. Lundgren ◽  
Melissa P. Sulprizio ◽  
Christoph A. Keller ◽  
...  

Abstract. Emissions are a central component of atmospheric chemistry models. The Harmonized Emissions Component (HEMCO) is a software component for computing emissions from a user-selected ensemble of emission inventories and algorithms. It allows users to re-grid, combine, overwrite, subset, and scale emissions from different inventories through a configuration file and with no change to the model source code. The configuration file also maps emissions to model species with appropriate units. HEMCO can operate in offline stand-alone mode, but more importantly it provides an online facility for models to compute emissions at runtime. HEMCO complies with the Earth System Modeling Framework (ESMF) for portability across models. We present a new version here, HEMCO 3.0, that features an improved three-layer architecture to facilitate implementation into any atmospheric model and improved capability for calculating emissions at any model resolution including multiscale and unstructured grids. The three-layer architecture of HEMCO 3.0 includes (1) the Data Input Layer that reads the configuration file and accesses the HEMCO library of emission inventories and other environmental data, (2) the HEMCO Core that computes emissions on the user-selected HEMCO grid, and (3) the Model Interface Layer that re-grids (if needed) and serves the data to the atmospheric model and also serves model data to the HEMCO Core for computing emissions dependent on model state (such as from dust or vegetation). The HEMCO Core is common to the implementation in all models, while the Data Input Layer and the Model Interface Layer are adaptable to the model environment. Default versions of the Data Input Layer and Model Interface Layer enable straightforward implementation of HEMCO in any simple model architecture, and options are available to disable features such as re-gridding that may be done by independent couplers in more complex architectures. The HEMCO library of emission inventories and algorithms is continuously enriched through user contributions so that new inventories can be immediately shared across models. HEMCO can also serve as a general data broker for models to process input data not only for emissions but for any gridded environmental datasets. We describe existing implementations of HEMCO 3.0 in (1) the GEOS-Chem “Classic” chemical transport model with shared-memory infrastructure, (2) the high-performance GEOS-Chem (GCHP) model with distributed-memory architecture, (3) the NASA GEOS Earth System Model (GEOS ESM), (4) the Weather Research and Forecasting model with GEOS-Chem (WRF-GC), (5) the Community Earth System Model Version 2 (CESM2), and (6) the NOAA Global Ensemble Forecast System – Aerosols (GEFS-Aerosols), as well as the planned implementation in the NOAA Unified Forecast System (UFS). Implementation of HEMCO in CESM2 contributes to the Multi-Scale Infrastructure for Chemistry and Aerosols (MUSICA) by providing a common emissions infrastructure to support different simulations of atmospheric chemistry across scales.


2021 ◽  
pp. 393-403
Author(s):  
Ranjit Kumar Behera ◽  
Mohit Misra ◽  
Amrut Patro ◽  
Diptendu Sinha Roy

2021 ◽  
Vol 13 (16) ◽  
pp. 9463
Author(s):  
Ritika Raj Krishna ◽  
Aanchal Priyadarshini ◽  
Amitkumar V. Jha ◽  
Bhargav Appasani ◽  
Avireni Srinivasulu ◽  
...  

The Internet of Things (IoT) plays a vital role in interconnecting physical and virtual objects that are embedded with sensors, software, and other technologies intending to connect and exchange data with devices and systems around the globe over the Internet. With a multitude of features to offer, IoT is a boon to mankind, but just as two sides of a coin, the technology, with its lack of securing information, may result in a big bane. It is estimated that by the year 2030, there will be nearly 25.44 billion IoT devices connected worldwide. Due to the unprecedented growth, IoT is endangered by numerous attacks, impairments, and misuses due to challenges such as resource limitations, heterogeneity, lack of standardization, architecture, etc. It is known that almost 98% of IoT traffic is not encrypted, exposing confidential and personal information on the network. To implement such a technology in the near future, a comprehensive implementation of security, privacy, authentication, and recovery is required. Therefore, in this paper, the comprehensive taxonomy of security and threats within the IoT paradigm is discussed. We also provide insightful findings, presumptions, and outcomes of the challenges to assist IoT developers to address risks and security flaws for better protection. A five-layer and a seven-layer IoT architecture are presented in addition to the existing three-layer architecture. The communication standards and the protocols, along with the threats and attacks corresponding to these three architectures, are discussed. In addition, the impact of different threats and attacks along with their detection, mitigation, and prevention are comprehensively presented. The state-of-the-art solutions to enhance security features in IoT devices are proposed based on Blockchain (BC) technology, Fog Computing (FC), Edge Computing (EC), and Machine Learning (ML), along with some open research problems.


Author(s):  
Serhii Tsybulnyk ◽  
Danylo Bidnyk

The development of information and computer technologies has led to the need to evolve the concept of universal bibliographic control. The creation of the Internet and web technologies has allowed this concept to reach a new level by creating a number of common international standards. In addition, to ensure control and exchange of bibliographic information public bibliographic and scientometric databases were created. Today, software for managing bibliographic records is in demand in various countries in Europe and America. The most popular software in these countries is EndNote, RefWorks, BibTeX and Zotero. The development of such automated bibliographic system and the adaptation of its functionality to standards and requirements within Ukraine is relevant for a number of reasons. The main reasons are the need for every scientist and lecturer of higher education institutions to confirm their scientific achievements when hiring, submitting scientific work to various competitions, to obtain a scientific degree and so on. Today the rapid development of information and computer technology allows us to abandon the list of scientific papers in manual mode and move to the use of specialized software on smartphones. That is why the architecture of an automated bibliographic system, which is developed as a mobile application based on the Android operating system, was designed. Java is chosen as the programming language in which the software will be written, as the vast majority of the Android operating system is written in this language. A number of technologies were chosen for the selected operating system. They will simplify the process of developing a mobile application. The three-layer architecture of the automated bibliographic system is designed on the basis of the multilevel model of architecture and the MVVM template. This architecture allows to provide the main non-functional characteristics of the quality of the developed software, as well as to effectively implement the rules of business logic within the object-oriented programming paradigm.


Sign in / Sign up

Export Citation Format

Share Document