International Journal of Hyperconnectivity and the Internet of Things
Latest Publications


TOTAL DOCUMENTS

50
(FIVE YEARS 33)

H-INDEX

4
(FIVE YEARS 1)

Published By Igi Global

2473-4373, 2473-4365

The extend of clever gadgets has accelerated touchy statistics trade on the Internet the usage of most of the time unsecured channels. Since a large use of RFID (Radio-frequency Identification) tags in the transportation and development industries from 1980 to 1990, with the multiplied use of the Internet with 2G/3G or 4G when you consider that 2000, we are witnessing a new generation of related objects. . This paper aims to understand and additionally grant continuing doe’s research topic, challenge, and Future Direction related to Iot security. A systematic mapping finds out about (SMS) is thus utilized on the way to organize the chosen Articles into the following classification: contribution type, Type of Research, Iot Security, and their approach. We take out an overall of twenty-four Articles in support of this systematic discover out about also they categorize the following described criterion. The findings of this SMS are mentioned and the researcher was once given hints on the possible route for future research


There are many people in this world who don’t have the ability to communicate with others due to some unforeseen accident. User’s who are paralyzed and/or suffering from different Motor Neuron Diseases (MND) like Amyotrophic Lateral Sclerosis (ALS), Primary Lateral Sclerosis etc, by making them more independent. Patients suffering from these diseases are not able to move their arms and legs, lose their body balance and the ability to speak. Here we propose an IoT based communication controller using the concept of Morse Code Technology which controls the smartphone of the user. This paper proposes a solution to give the user ability to communicate to other people using machine as an intermediator. The device will require minimal inputs from the user.


Implicit Cognitive Vulnerability is a developing theoretical understanding, wherein feeling safe within an instructional environment is of significant impact upon short-term and long-term memory’s cognitive acquisition of information so as to embed new information within a learner’s conceptual framework of understanding. Towards successfully individualizing a learner’s implicit cognitive vulnerability, the primary focus has been upon the larger community environment in which the learner is housed, yet the viability of the learner’s ability and cognitive viability must also be addressed through nudges, boosts and bounces of motivational support. Recognizing this individualized need of learners, this discussion revolves around the ability of a learner to embed implicit cognitive vulnerability within their own cognitive viability through structured and unstructured synchronous and asynchronous nudges and boosts that support self-regulatory and self-efficacy understandings.


in this paper we will see the application of computer science algorithms to the plumbing system. We propose a fault tolerant tap water system which is impossible without Internet of things and algorithms . We will show that the problem is a mutual exclusion group problem and we propose an adapted algorithm version from the literature as a solution . Coupling algorithms with the configurable plumbing network we believe that this will open new field of research on IoT we called it software defined plumbing Network where components that have been traditionally implemented in hardware (e.g. water mixers, spring faucets ,flow sensors, etc.) are instead implemented by means of software . This way we can solve other problem like instantaneous hot water,automatic cleaning of the water heater..etc since due to computer algorithms the systems can be easily smart, extensible and adaptive.


Author(s):  
Anup Kumar Kolya ◽  
Debasish Mondal ◽  
Alokesh Ghosh ◽  
Subhashree Basu

This paper presents the design and implementation of control strategy for both the speed and direction of a direct current (DC) motor using Android-based application in smart phone. The Raspberry Pi 3 with a motor driver controller has been used to implement the control action via Python-based user-defined programming. The Android application has been developed using Android Developer Tools (ADT) in Java platform. The Android apps work like a client and communicates with Raspberry Pi through wi-fi connectivity. Finally, a small graphical user interface (GUI) has been created in Python in order to interface and control the motor with buttons in GUI. The advantages of GUI are that it is attractive, user friendly, and even a layman can work with the application developed in GUI.


Author(s):  
Caroline M. Crawford ◽  
Sharon Andrews ◽  
Jennifer K. Young Wallace

With the rise of the digital age, the concept of anywhere and anytime learning has become a stunning reality, therefore embedding learning within one's daily life more securely than previous decades. Impactful is one's daily community through which each person engages, formally and informally engaging. As distance learning environments stealthily become a normal expectation, the embedding of learning experiences into communities of engagement arises. Focusing upon curricular design that emphasizes the engagement of different colleagues within the community, towards framing information in new and different ways, is of grounding impact upon the success of online learning success. A presentation of earning understandings, framed through digital pedagogy, andragogy, and heutagogy, are advanced supports through the social collegial community in which one currently lives. Further, embedding the concept of collegial communities within distance learning supports rethinking curricular design, thru values, professional standards, competences, capabilities, and behavioral dispositions.


Author(s):  
Mohammad Nabil Almunawar ◽  
Muhammad Anshari ◽  
Syamimi Ariff Lim

A digital marketplace is a virtual platform that creates values by managing interactions and transactions among participants in a multi-sided network. It creates a business ecosystem to support all participants, especially buyers and sellers, to transact efficiently and conveniently. Lately, digital marketplaces have created significant impact and disruption in many industries all over the world. As digital marketplace firms provide innovative, efficient business models as well as supportive business ecosystems, they may disrupt conventional firms that rely on physical interactions. Equipped with digital tools for transactions and interactions and supported by digital business ecosystems, digital marketplace firms can grow quickly and hence pose a serious threat to conventional firms. This paper discusses foundation theories related to digital marketplace such as transaction cost economy, network externalities, two-sided markets, and value network and uses these theories to construct a framework for observing digital marketplace.


Author(s):  
Darrell Norman Burrell

A leading consulting and cybersecurity research firm, Consulting Ventures, predicted that cybercrime will cost $6 trilling annually by 2021. That amount is a significant increase from the $3 trillion in 2015. According to growing estimates, there could be as many as 3.5 million unfilled cybersecurity jobs by 2021. This has created a need for new expertise and workers in cybersecurity and information security from Generation Y and Generation Z. These professionals have different career interests from previous generations in terms of work environments and cultures. These younger professionals are a product of new degree programs that have been newly developed in the last 10 years. But in order to attract, recruit, and retain this younger generation of professionals with these critically needed workforce skills, managers must consider alternative management approaches that look to empower, energize, and engage this new and different generation of employees instead of the use of micromanaging and controlling antiqued performance management approaches.


Author(s):  
Praneet Amul Akash Cherukuri ◽  
Bala Sai Allagadda ◽  
Anil Kumar Reddy Konda

Data science is the most sought over domain in today's world and has been known for its accurate decision-making capabilities, delivering recommendations that have the best profits and much more. The demand for this analysis is the growing technology and population that opens a new dimension of demands leading to the world crisis in every sector. Clustering is the part that helps in making these decisions more accurate and has been evolving through time. Impacts of neighborhoods and localities for businesses are often marked by many factors. To understand the factors and outline them to the proper perspective, through this research the authors performed perspective data cleaning, wrangling, visualization to understand the factors and cluster them for a much prospective decision-making process.


Author(s):  
Jean C. Essila ◽  
Jaideep Motwani ◽  
Farouq Alhourani

As organizations are all moving into the e-commerce platform to gain market shares, they realize that electronic supply chain management (e-SCM) powered by enterprise resource planning systems (ERPs) are the new norms and no business organization can operate without both in the new world of e-commerce. Because business via the internet requires different fulfillment approaches, traditional drivers of regular supply chains are no longer adequate for explaining how e-SCM performance is driven. Little attention has been devoted to e-SCM dynamic with ERP and the challenges they pose to organizations. In the e-commerce environment, e-SCM is among the most important factors to organizational success. Effective e-SCM can enhance competitiveness and increase market share leading a higher profitability. Nevertheless, the new e-SCM professionals and other actors must understand the factors that undergird e-SCM performance, their drivers, and the necessity of fully functional ERPs for an effective e-SCM.


Sign in / Sign up

Export Citation Format

Share Document