message queue
Recently Published Documents


TOTAL DOCUMENTS

125
(FIVE YEARS 59)

H-INDEX

7
(FIVE YEARS 3)

2022 ◽  
Vol 355 ◽  
pp. 02025
Author(s):  
Yiyi Yin ◽  
Yong Zhang ◽  
Zhengzheng Wei ◽  
Xiang Zhao

In order to solve the limitation of traditional offline forecasting application scenarios, the author uses a variety of big data open source frameworks and tools to combine with railway real-time data, and proposes a real-time prediction model of railway passenger flow. The model architecture is divided into four levels from bottom to top: data source layer, data transmission layer, prediction calculation layer and application layer. The main components of the model are data flow and prediction flow. Through message queue and ETL, the data process part realizes the synchronization of offline data and real-time data; through the big data technology frameworks such as Spark, Redis and Hive and the GBDT (Gradient Boosting Tree) algorithm, the prediction process partially realizes the real-time passenger flow of the train OD section prediction. The experimental results show that the model proposed by the author has certain practicability and accuracy both in performance and prediction accuracy.


2021 ◽  
Vol 57 (2) ◽  
pp. 025013
Author(s):  
Rohit Singh ◽  
Amit Kumar Singh ◽  
Sonal Singhal

Abstract Air pollution is one of our day’s significant reasons for human health problems and affects every community throughout the world. Monitoring air pollution is a key aspect of raising awareness and pollution mitigation approaches followed by different nations. This paper targets to develop a low-cost Internet of things-based embedded system to measure and maintain air quality index (AQI) indicators at any locality. The system implemented here is minimal and can be deployed quickly and easily. The AQI measurement system was developed and tested for several periods, and recorded values of AQI were found to be in close agreement with actual values obtained from standard databases. In addition, several starting physics and electronics laboratory courses train students on measuring physical parameters over time. In this context, along with the introduction to the current pollution scenario and the challenges, this experiment will give a first-hand exposure of setting up a simple experiment and measuring a physical parameter to time. Students also learn to write simple programs and interface the experiment with a computer to record the results. The current work also demonstrates how to publish/subscribe the data using the message queue telemetry transport protocol.


Energies ◽  
2021 ◽  
Vol 15 (1) ◽  
pp. 109
Author(s):  
Piotr Powroźnik ◽  
Paweł Szcześniak ◽  
Krzysztof Piotrowski

Currently, ensuring the correct functioning of the electrical grid is an important issue in terms of maintaining the normative voltage parameters and local line overloads. The unpredictability of Renewable Energy Sources (RES), the occurrence of the phenomenon of peak demand, as well as exceeding the voltage level above the nominal values in a smart grid makes it justifiable to conduct further research in this field. The article presents the results of simulation tests and experimental laboratory tests of an electricity management system in order to reduce excessively high grid load or reduce excessively high grid voltage values resulting from increased production of prosumer RES. The research is based on the Elastic Energy Management (EEM) algorithm for smart appliances (SA) using IoT (Internet of Things) technology. The data for the algorithm was obtained from a message broker that implements the Message Queue Telemetry Transport (MQTT) protocol. The complexity of selecting power settings for SA in the EEM algorithm required the use of a solution that is applied to the NP difficult problem class. For this purpose, the Greedy Randomized Adaptive Search Procedure (GRASP) was used in the EEM algorithm. The presented results of the simulation and experiment confirmed the possibility of regulating the network voltage by the Elastic Energy Management algorithm in the event of voltage fluctuations related to excessive load or local generation.


2021 ◽  
Vol 13 (2) ◽  
pp. 71-78
Author(s):  
Awang Noor Indra Wardana ◽  
Yahya Bachtiar ◽  
M Bobby Andriansyah ◽  
Rifdahlia Salma

Process industries such as oil refineries, petrochemical plants, and power plants require a human-machine interface system to monitor continuously. The operator usually carries out monitoring via a human-machine interface. However, it is difficult to know the condition of process equipment in real-time. The implementation of augmented reality allows engineers to visualize process equipment in real-time when conducting field inspections. The implementation of augmented reality at the human-machine interface to the fluid catalytic cracking process in an oil refinery is discussed in this paper. The design was started by developing a three-dimensional process equipment model using Autodesk Inventor. The result of the three-dimensional model then using Unity 3D software connected to the Vuforia Engine was implemented on a gadget into an augmented reality application. Data communication performance analysis was carried out using inferential statistics methods to test variations in service quality at levels 0, 1, and 2. The result of the Tukey test showed that the communication network latency value in level 2 was significantly higher than levels 0 and 1, which was 0.704±0.108 seconds. These results indicate that augmented reality can be implemented on human-machine interfaces by ensuring the quality of data communication services using Message Queue Telemetry Transport (MQTT) protocol at levels 0 or 1.


2021 ◽  
Author(s):  
Alonso Tenorio-Trigoso ◽  
Manuel Castillo-Cara ◽  
Giovanny Mondragóón-Ruiz ◽  
Carmen Carrión ◽  
Blanca Caminero

Abstract Information and communication technologies backbone of a smart city is an Internet of Things (IoT) application that combines technologies such as low power IoT networks, device management, analytics or event stream processing. Hence, designing an efficient IoT architecture for real-time IoT applications brings technical challenges that include the integration of application network protocols and data processing. In this context, the system scalability of two architectures has been analysed: the first architecture, named as POST architecture, integrates the hyper text transfer protocol with an Extract-Transform-Load technique, and is used as baseline; the second architecture, named as MQTT-CEP, is based on a publish-subscribe protocol, i.e. message queue telemetry transport, and a complex event processor engine. In this analysis, SAVIA, a smart city citizen security application, has been deployed following both architectural approaches. Results show that the design of the network protocol and the data analytic layer impacts highly in the Quality of Service experimented by the final IoT users. The experiments show that the integrated MQTT-CEP architecture scales properly, keeps energy consumption limited and thereby, promotes the development of a distributed IoT architecture based on constraint resources. The drawback is an increase in latency, mainly caused by the loosely coupled communication pattern of MQTT, but within reasonable levels which stabilize with increasing workloads.


F1000Research ◽  
2021 ◽  
Vol 10 ◽  
pp. 998
Author(s):  
Adrian Viehweger ◽  
Christian Brandt ◽  
Martin Hölzer
Keyword(s):  

Newly sequenced genomes are often not noticed by potential stakeholders because submission to public databases is delayed, and search options are limited. However, the discovery of genomes can be vital: in pathogen outbreaks, fast updates are essential to coordinate containment efforts and prevent further spread. Here we introduce DarkQ, a message queue that allows for instant sharing and discovery of genomes. DarkQ is released under the BSD-2 license at github.com/phiweger/darkq.


Author(s):  
Imane Sahmi ◽  
Abderrahim Abdellaoui ◽  
Tomader Mazri ◽  
Nabil Hmina

The big challenge to raise for deploying the application's domain of the Internet of Things is security. As one of the popular messaging protocols in the IoT world, the message queue telemetry transport (MQTT) is designed for constrained devices and machine-to-machine communications, based on the publish-subscribe model, it offers a basic authentication using username and password. However, this authentication method might have a problem in terms of security and scalability. In this paper, we provide an analysis of the current research in the literature related to the security for the MQTT protocol, before we give a brief description of each algorithm used on our approach, to finally propose a new approach to secure this protocol based on AugPAKE algorithm and PRESENT encryption. This solution provides mutual authentication between the broker and their clients (publishers and subscribers), the confidentiality of the published message is protected twice, the integrity and non-repudiation of MQTT messages which is protected during the process of transmission.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Siriboon Chaisawat ◽  
Chalee Vorakulpipat

The growing number of e-voting applications indicates the need in resolving issues that exist in the traditional election model. By integrating with blockchain technology, we could extend the model’s capabilities by presenting transparency in logic execution and integrity in data storage. Despite these advantages, blockchain brings in new challenges regarding system performance and data privacy. Due to distributed nature of blockchain, any new updating request needs to be reflected in all network’s peers before proceeding to the subsequence requests. This process produces delay and possibility in request rejection due to update conflict. In addition, data removal is no longer feasible since each record is protected by immutable hashed link. To overcome these limitations, the integration model of blockchain and message queue is proposed in this paper. The design addresses security concerns in data exchanging patterns, voter anonymization, and proof of system actor’s legitimacy. Performance tests are conducted on system prototypes which were deployed on two different settings. The result shows that the system can perform well in production environment, and introduction of message queue handling scheme can cope with blockchain’s errors in unexpected scenarios.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Zhenyu Gao ◽  
Jian Cao ◽  
Wei Wang ◽  
Huayun Zhang ◽  
Zengrong Xu

Industry 4.0 focuses on continuous interconnection services, allowing for the continuous and uninterrupted exchange of signals or information between related parties. The application of messaging protocols for transferring data to remote locations must meet specific specifications such as asynchronous communication, compact messaging, operating in conditions of unstable connection of the transmission line of data, limited network bandwidth operation, support multilevel Quality of Service (QoS), and easy integration of new devices. The Message Queue Telemetry Transport (MQTT) protocol is used in software applications that require asynchronous communication. It is a light and simplified protocol based on publish-subscribe messaging and is placed functionally over the TCP/IP protocol. It is designed to minimize the required communication bandwidth and system requirements increasing reliability and probability of successful message transmission, making it ideal for use in Machine-to-Machine (M2M) communication or networks where bandwidth is limited, delays are long, coverage is not reliable, and energy consumption should be as low as possible. Despite the fact that the advantage that MQTT offers its way of operating does not provide a serious level of security in how to achieve its interconnection, as it does not require protocol dependence on one intermediate third entity, the interface is dependent on each application. This paper presents an innovative real-time anomaly detection system to detect MQTT-based attacks in cyber-physical systems. This is an online-semisupervised learning neural system based on a small number of sampled patterns that identify crowd anomalies in the MQTT protocol related to specialized attacks to undermine cyber-physical systems.


2021 ◽  
Vol 3 (3) ◽  
pp. 138-143
Author(s):  
Kartarina Kartarina ◽  
Miftahul Madani ◽  
Made Nugraha Dwitama

Securities an safety room are important, creating a sense of security all around. managers of buildings, companies or the environment, employ workers as security officers to be safe from various acts of theft. hiring security personnel is not efficient, because it takes a long time, and it is also tiring. To create room security there are many ways that we can do, one of which is by utilizing technology as a way to maintain security. Internet of Things (IoT) is a very promising technological development to optimize the way with smart sensors and smart devices that work together through the internet network. Data from sensor devices that have been processed can be represented to users through various platforms, one of which is Smartphones with the Android operating system. To build a prototyping of this system, the Message Queue Telemetry Transport (MQTT) communication protocol is used, it takes several tools that are components of the IoT, including a micro controller for example a NodeMCU, which is a relay whose function is as a breaker and current connector, a switch as a door sensors, Selenoid Door Lock as an electronic door lock, and power supply as a power supplier for the entire series built with Web App, rogressive Web App (PWA) technology is a web application development method adopted by Google, making web applications appear as if they can run like native applications on each platform, such as native Android, Windows, Mac, and Linux applications. By building a prototyping of this IoT system, it can help monitor and control the security of doors and windows in the room.


Sign in / Sign up

Export Citation Format

Share Document