ARTICLE | doi:10.20944/preprints201902.0143.v2
Subject: Social Sciences, Education Keywords: e-mail; scientific productivity; internet; digital era
Online: 8 October 2019 (11:40:06 CEST)
From professors overwhelmed by anxiety-driven e-mails from students, through faculty and administrative staff wasting valued time on e-mail minutia, misuse of electronic mail in the academy has become ubiquitous. After a brief overview of the unique features of e-mail communication, this study provides insight and guidelines to plan new educational activities on healthy and productive utilization of e-mail in the academy of the digital era. The overall aim is to prioritize scholarly deep work by focusing on teaching and research work, freeing working time wasted on unproductive use of e-mail.
ARTICLE | doi:10.20944/preprints202205.0270.v1
Subject: Social Sciences, Psychology Keywords: adolescents; Internet addiction; problematic Internet use; game addiction; social media addiction; Russia
Online: 20 May 2022 (08:26:04 CEST)
We aimed to assess the prevalence, content structure and psychological comorbidity of PIU in Russian adolescents. In addition, the design of our research provided an opportunity to compare demographic and psychological patterns of different forms of PIU: generalised (PIUgen) and specific – problematic video game use (PUgame) as well as problematic social media use (PUsocial). Methods: This is a one-stage cross-sectional observational study of school sampling in three major Siberian cities. A total of 4514 schoolchildren aged 12-18 (mean age 14.52±1.52 years) were surveyed. Chen Internet Addiction Scale, Game Addiction Scale for Adolescents”, and The Social Media Disorder Scale were used to identify PIU and its types. Results: The prevalence of PIUgen among adolescents in Central Siberia was 7.2%; the prevalence of PUgame was 10.4%; the prevalence of PUsocial was 8.0%. The results of structural equation modelling, as well as the correlation analysis data, suggest two possible patterns of psychosocial problems with PIU – the first one characteristic of both PIUgen and PUsocial, the second one, significantly different, – of PUgame. Conclusions: Urban adolescents in Central Siberia do not differ significantly from their Asian and European peers. Our findings support the concept of rejecting the term “generalised PIU” as a single psychological construct.
ARTICLE | doi:10.20944/preprints201810.0579.v1
Subject: Social Sciences, Psychology Keywords: Problematic Internet use, sleep disturbance, sex difference, adolescents
Online: 24 October 2018 (14:15:09 CEST)
The Internet use has become an integral part of daily life, adolescents are especially at a higher risk to develop problematic Internet use (PIU). Although one of the most well-known comorbid conditions of PIU is sleep disturbance, little is known about the sex disparity in this association. This school-based survey in students of grades 7-9 was conducted to estimate the prevalence of PIU and sleep disturbance among Chinese adolescents, to test the association between PIU and sleep disturbance, and to investigate the role of the child’s sex in this association. A two-stage stratified cluster sampling method was used to recruit participants, and a two-level logistic regression models were fitted. The mean Internet addiction test scores was 37.2 (SD: 13.2), and 15.5% (736) met the criteria for PIU. After adjusting for control variables, problematic Internet users were at a higher risk of sleep disturbance (adjusted odds ratio=2.41, 95% CI=2.07-3.19). Sex-stratified analyses also demonstrated that association was greater in girls than boys. In this respect, paying more attention to the sleep patterns of adolescents who report excessive Internet use is recommended, and this early identification may be of practical importance for schools, parents, and adolescents themselves.
ARTICLE | doi:10.20944/preprints202107.0201.v1
Subject: Business, Economics And Management, Accounting And Taxation Keywords: Internet use; social capital; income gap between farmers; mechanism
Online: 8 July 2021 (13:26:17 CEST)
Based on 2010, 2013 and 2015 CGSS data, the impact of Internet use and social capital on the income gap among farmers in the past five years is assessed at three time points using the OLS method and a quantile regression method. The study finds that (1) the income gap among farmers increases continuously in the five-year period, while Internet use plays a positive impact on farmers’ income growth in all five quartiles; the coefficient differences are all significantly negative, indicating that Internet use plays a positive role in alleviating the income gap between high-income and low-income farmer subgroups, and (2) social capital plays a positive role in moderating the income gap among farmers and that Internet use by farmers expands the boundary of social capital, which in turn increases the income level of and alleviates the income gap among farmers.
ARTICLE | doi:10.20944/preprints201801.0236.v1
Subject: Social Sciences, Psychology Keywords: Internet addiction; mobile phone addiction; online social network; university students; technological addictions; behavioral addictions
Online: 25 January 2018 (05:10:00 CET)
1) Background: It has been more than a decade since the concern about addictive use of the Internet and mobile phones was first expressed and its possible inclusion into the lists of mental disorders has been a popular topic of discussion recently, thus it seems to be a fitting moment to investigate the evolution of this issue over time. The aim of the present study was to analyze the evolution of the perception of problematic Internet and smartphone use in young people over the period 2006–2017; 2) Methods: To this end, a questionnaire on Internet use habits and the CERI and CERM questionnaires on negative consequences of Internet and smartphone use were administered to a sample of 792 university students and compared with data from former studies over the period 2006–2017; 3) Results: The perception of problematic Internet and mobile phone use has increased over the last decade, social networks are considered responsible for this increase, and females are the ones perceived to be more affected than males. The degree to which participants agree with the statement “I am addicted to the Internet” can be used as a screening item for problematic use.
ARTICLE | doi:10.20944/preprints202007.0513.v1
Subject: Engineering, Control And Systems Engineering Keywords: C2; command and control; Identity; Internet of Things; IoT; MQTT; NFC; security; QR Code
Online: 22 July 2020 (10:17:33 CEST)
This paper examines dynamic identity, as it pertains to the IoT; and explores the practical implementation of a mitigation to some of the key weaknesses of a conventional dynamic identity model. This paper explores human-centric and machine-based observer approaches for confirming device identity, permitting automated identity confirmation for deployed systems. It also assesses the advantages of dynamic identity in the context of identity revocation permitting secure change of ownership for IoT devices. The paper explores use-cases for human and machine-based observation for authentication of device identity when devices join a C2 network, and considers the relative merits for these two approaches for different types of system.
ARTICLE | doi:10.20944/preprints202108.0163.v1
Subject: Computer Science And Mathematics, Computer Science Keywords: Service Computing; Internet of Things; Situation Response; Services in Internet of Things
Online: 6 August 2021 (13:12:33 CEST)
A large number of smart devices (things) are being deployed with the swift development of Inter- net of Things (IOT). These devices, owned by different organizations, have a wide variety of services to offer over the web. During a natural disaster or emergency (i.e., a situation), for example, relevant IOT services can be found and put to use. However, appropriate service matching methods are required to find the relevant services. Organizations that manage situation responses and organizations that provide IOT services are likely to be independent of each other, and therefore it is difficult for them to adopt a common ontological model to facilitate the service matching. Moreover, there exists a large conceptual gap between the domain of discourse for situations and the domain of discourse for services, which cannot be adequately bridged by existing techniques. In this paper, we address these issues and propose a new method, WikiServe, to identify IOT services that are functionally relevant to a given situation. Using concepts (terms) from situation and service descriptions, WikiServe employs Wikipedia as a knowledge source to bridge the conceptual gap between situation and service descriptions and match functionally relevant IOT services for a situation. It uses situation terms to retrieve situation related articles from Wikipedia. Then it creates a ranked list of services for the situation using the weighted occurrences of service terms in weighted situation articles. WikiServe performs better than a commonly used baseline method in terms of Precision, Recall and F measure for service matching.
REVIEW | doi:10.20944/preprints202110.0312.v1
Subject: Computer Science And Mathematics, Security Systems Keywords: Cyber Security; Internet of Things
Online: 21 October 2021 (14:01:19 CEST)
Nowadays, people live amidst the smart home domain, business opportunities in the industrial smart city and health care, though, along with concerns about security. Security is central for IoT systems to protect sensitive data and infrastructure, whilst security issues become increasingly expensive, in particular in Industrial Internet of Things (IIoT) domains. Nonetheless, there are some key challenges for dealing with those security issues in IoT domains: Applications operate in distributed environments such as Blockchain, varied smart objects are used, and sensors are limited in what comes to machine resources. In this way, traditional security does not fit in IoT systems. In this vein, the issue of cyber security has become paramount to the Internet of Things (IoT) and Industrial Internet of Things (IIoT) in mitigating cyber security risk for organizations and end users. New cyber security technologies / applications present improvements for IoT security management. Nevertheless, there is a gap on the effectiveness of IoT cyber risk solutions. This review article discusses the, trends around opportunities and threats in cyber security for IIoT.
ARTICLE | doi:10.20944/preprints201911.0312.v1
Subject: Social Sciences, Behavior Sciences Keywords: Internet; television; academic performance; utilization.
Online: 26 November 2019 (10:51:18 CET)
An investigation was carried out to study the effects of television and internet on academic performance of senior secondary schools students in Rigachukun Inspectorate of Kaduna state. A well structured and designed questionnaire was adopted in eliciting information from the respondents. The respondents were sampled from schools within Kaduna state. The information obtained showed that the percentage of senior secondary school students who made use of internet for academic purpose was as much as those who could not operate a computer or even browse the internet. Good number of students applied internet mostly through phones and computer with internet access in solving their assignment. A larger percentage of students devoted their time to watching non-educative programs on television, even though it was discovered that some of them also watch educative programs. Positive impacts of television and internet are however obscuring and not glaring. Investigation carried out revealed that students in senior secondary schools need to be sensitized and oriented on how they can derive the best from internet and television. Schools should be encouraged in using television and internet as an instrument of learning and teaching.
ARTICLE | doi:10.20944/preprints201612.0112.v1
Subject: Social Sciences, Law Keywords: internet; technology; shame; abuse; privacy
Online: 22 December 2016 (09:48:05 CET)
This paper advances privacy theory through examination of online shaming, focusing in particular on persecution by internet mobs. While shaming is nothing new, the technology used for modern shaming is new and evolving, making it a revealing lens through which to analyze points of analytical friction within and between traditional conceptions of privacy. To that end, this paper first explores the narrative and structure of online shaming, identifying broad categories of shaming of vigilantism, bullying, bigotry and gossiping, which are then used throughout the paper to evaluate different angles to the privacy problems raised. Second, this paper examines shaming through three dominant debates concerning privacy - privacy’s link with dignity, the right to privacy in public places and the social dimension of privacy. Certain themes emerged from this analysis. A common feature of online shaming is public humiliation. A challenge is to differentiate between a humbling (rightly knocking someone down a peg for a social transgression) and a humiliation that is an affront to dignity (wrongly knocking someone down a peg). In addition, the privacy concern of shamed individuals is not necessarily about intrusion on seclusion or revelation of embarrassing information, but rather about the disruption in their ability to continue to participate in online spaces free from attack. The privacy interest therefore becomes more about enabling participation in social spaces, enabling connections and relationships to form, and about enabling identity-making. Public humiliation through shaming can disrupt all of these inviting closer scrutiny concerning how law can be used as an enabling rather than secluding tool.
REVIEW | doi:10.20944/preprints202107.0211.v1
Subject: Biology And Life Sciences, Biochemistry And Molecular Biology Keywords: suicidal ideation; adolescent; internet addiction; loneliness
Online: 9 July 2021 (09:59:03 CEST)
The Internet has become an essential tool for adolescents. It is part of their social integration within peers and supports their identity construction. The Internet can also become a source of addiction; especially when used as a coping strategy towards unpleasant life situations. The feeling of loneliness is an emotion present during the adolescence. However, when in excess, it can lead to suicidal ideations. We questioned ourselves on the impact of an excessive use of the Internet by adolescents, with their feeling of loneliness and the risks of suicidal ideations. We attempted to find an answer to this question by performing a literature review. We found one result matching our search criteria’s, which is itself a literature review. We noted the absence of studies with regards to the interaction between the feeling of loneliness, the addiction to the Internet, and the risk of suicidal ideations amongst adolescents. We established a theoretical model which could be used as a lead for future research. We insist on the importance that studies are made in this domain, in order to enable us to establish efficient preventive measure on the risks of suicidal ideations amongst adolescents.
ARTICLE | doi:10.20944/preprints201812.0219.v1
Subject: Engineering, Control And Systems Engineering Keywords: Internet of Things; Security; Dynamic Protection
Online: 18 December 2018 (10:42:48 CET)
A Smart Home is characterized by the presence of a huge number of small, low power devices, along with more classical devices. According to the Internet of Things (IoT) paradigm, all of them are expected to be always connected to the Internet in order to provide enhanced services. In this scenario, an attacker can undermine both the network security and the user’s security/privacy. Traditional security measures are not sufficient, because they are too difficult to setup and are either too weak to effectively protect the user or too limiting for the new services effectiveness. The paper suggests to dynamically adapt the security level of the smart home network according to the user perceived risk level what we have called network sentiment analysis. The security level is not fixed, established by a central system (usually by the Internet Service Provider) but can be changed with the users cooperation. The security of the smart home network is improved by a distributed firewalling and Intrusion Detection Systems both to the smart home side as to the Internet Service Provider side. These two parts must cooperate and integrate their actions for reacting dynamically to new and ongoing threats. Moreover, the level of network sentiment detected can be propagate to nearby home networks (e.g. the smart home networks of the apartments inside a building) to increase/decrease their level of security, thus creating a true in-line Intrusion Prevention System (IPS). The paper also presents a test bed for Smart Home to detect and counteract to different attacks against the IoT devices,,Wi-Fi and Ethernet connections .
ARTICLE | doi:10.20944/preprints201805.0358.v1
Subject: Social Sciences, Sociology Keywords: China; Internet; well-being; hukou; migrant
Online: 25 May 2018 (10:25:29 CEST)
Using data from the China Family Panel Studies, this study examines the socioeconomic characteristics of Internet users, as well as the relationships between the dynamics of different forms of online activities and the subjective well-being of urbanites and rural migrants in urban China. The study finds that online behaviour may clearly reflect differences in individuals’ personal traits and socioeconomic positions. Patterns of the association between online activities and subjective well-being tend to differ among rural migrants and urbanites, especially in terms of depression. A difference-in-differences model is employed to estimate the impact of intensified engagement in online activities on depression and life satisfaction from 2010 to 2016. The results show that increased frequency of online entertainment exhibits a comparatively positive effect on depression and life satisfaction. Spending more time on online social networking has a similar impact on rural migrants, but not on urbanites. These findings suggest that the rapid development of urban China’s online community has important implications for residents’ subjective well-being.
Subject: Engineering, Control And Systems Engineering Keywords: Industrial Internet of Things; Cyber Physical Systems; Internet of Everything; Industry 4.0; Digital Industry; Digital Economy
Online: 14 September 2020 (05:47:48 CEST)
This article conducts a literature review of current and future challenges in the use of artificial intelligence (AI) in cyber physical systems. The literature review is focused on identifying a conceptual framework for increasing resilience with AI through automation supporting both, a technical and human level. The methodology applied resembled a literature review and taxonomic analysis of complex internet of things (IoT) interconnected and coupled cyber physical systems. There is an increased attention on propositions on models, infrastructures and frameworks of IoT in both academic and technical papers. These reports and publications frequently represent a juxtaposition of other related systems and technologies (e.g. Industrial Internet of Things, Cyber Physical Systems, Industry 4.0 etc.). We review academic and industry papers published between 2010 and 2020. The results determine a new hierarchical cascading conceptual framework for analysing the evolution of AI decision-making in cyber physical systems. We argue that such evolution is inevitable and autonomous because of the increased integration of connected devices (IoT) in cyber physical systems. To support this argument, taxonomic methodol- ogy is adapted and applied for transparency and justifications of concepts selection decisions through building summary maps that are applied for designing the hierarchical cascading conceptual framework.
ARTICLE | doi:10.20944/preprints202206.0380.v1
Subject: Computer Science And Mathematics, Information Systems Keywords: Information System; Information Audit; Audit; Internet Banking
Online: 28 June 2022 (07:30:01 CEST)
This report is on online banking and information systems in online banking. It throws some light on the introduction and historical background of online banking. Next, in this term report online banking information is explained in detailed. We collected a few articles, related to internet banking, on which other researchers have worked. Then further we have brief them into a table where we have mentioned their problems and limitations. Next, we discussed them in detail, giving an overview of each article. Lastly, recommendations for the online banking sectors are also mentioned.
REVIEW | doi:10.20944/preprints202001.0359.v1
Subject: Computer Science And Mathematics, Information Systems Keywords: Internet of things; healthcare; ethics; data privacy
Online: 30 January 2020 (10:51:54 CET)
Implications of the novel usage adoption of the internet of things in various sectors of works and life are researched and documented at pace. This is related to the overall high rate at which new technologies are adopted in modern society. Healthcare is a vital aspect of everyday activities and as such overlaps with the increasingly important role played by use of the internet and associated technologies. The purpose of this review article is to draw attention to the potential social, ethical, legal and professional limitations to using IoT in the context of healthcare. The social and ethical aspects in particular, focus on IoT usage in care of the elderly with relevant case studies as reference.
REVIEW | doi:10.20944/preprints201903.0063.v1
Subject: Computer Science And Mathematics, Computer Science Keywords: 5G wireless, Distributed Cloud, Internet of Things
Online: 5 March 2019 (12:15:16 CET)
This article will provide an overview on internet of things (IoT), 5G communication System and Distributed Clouds. The basic concepts and benefits will be briefly presented, along with current standardization activities. In a nutshell, but the research will focus on relating internet of things, 5G and Distributed Cloud Computing.
ARTICLE | doi:10.20944/preprints201801.0203.v1
Subject: Engineering, Control And Systems Engineering Keywords: Internet of Things; greement; Intelligent Transportation Systems
Online: 22 January 2018 (13:53:58 CET)
The era of Internet of Things (IoT) has begun to evolve and with this the devices around us are getting more and more connected. Vehicular Ad-hoc NETworks (VANETs) is one of the applications of IoT. VANET allow vehicles within these networks to communicate effectively with each another. VANETs can provide an extensive range of applications that support and enhance passenger safety and comfort. It is important that VANETs are applied within a safe and reliable network topology; however, the challenging nature of reaching reliable and trustworthy agreement in such distributed systems is one of the most important issues in designing a fault-tolerant system. Therefore, protocols are required so that systems can still be correctly executed, reaching agreement on the same values in a distributed system, even if certain components in the system fail. In this study, the agreement problem is revisited in a VANET with multiple damages. The proposed protocol allows all fault-free nodes (vehicles) to reach agreement with minimal rounds of message exchanges, and tolerates the maximal number of allowable faulty components in the VANET.
ARTICLE | doi:10.20944/preprints202303.0043.v1
Subject: Social Sciences, Education Keywords: Digital transformation; Education; Educational sciences; Internet of things
Online: 2 March 2023 (10:49:37 CET)
First came the digital banks without offices, and then the “fintech” companies that combined technology and finance to achieve greater efficiency and new business models. Later was the turn of transport and logistics, understood as the sector whose economic activities derived from the transport of people and goods, while on the one hand, it has had a new spring thanks to factors such as online sales. Then, perhaps catalyzed by the pandemic scenario, the turn has reached education, where years ago was only a complement of traditional education, now is a central part with multiple modern methodologies. Numerous studies exist about using or implementing these e-learning procedures, but technical analysis is barely found in references. This work aims to analyze the digital transformation of the main sectors of our society, including finances, transport, and education, together with several examples of how technology was helping to fight the pandemic scenario.
ARTICLE | doi:10.20944/preprints202301.0292.v1
Subject: Medicine And Pharmacology, Psychiatry And Mental Health Keywords: gaming; IGD; adolescents; children; adult; internet; Saudi Arabia
Online: 17 January 2023 (01:45:28 CET)
Abstract: Objective: Internet gaming disorder (IGD) is an emerging psychiatric disorder that has received attention over the past decade. Few studies have attempted to describe this disorder in the Saudi population. This study aimed to examine the prevalence of IGD and associated factors. A cross-sectional study was conducted using translated Arabic and a validated questionnaire targeting both genders in Saudi Arabia. Methodology: A cross-sectional study using a validated questionnaire (IGD-20) and targeting Arabic-speaking children, youth, and transitional age including both genders. A snowball approach was used to sample our population using an electronic survey. Logistic regression was used to examine factors associated with IGD diagnosis. The study was guided by the STROBE statement. Results: Among 419 individuals who participated in the study, 171 were classified as non-IGD, 167 were at risk for IGD (RIGD), and 72 were IGD. There is no significant association between IGD diagnosis and gender, nationality, residence, and family income. Time playing per week was significantly associated with IGD diagnosis (X2=49.256, p<0.01). There is a significant association between IGD-20 groups and categorical age groups (X2=10.096, p<0.01). Among our sample, the percentages of males (54.2%) and females (45.8%) who met the criteria for IGD were comparable. Conclusion: IGD and RIGD prevalence was significantly high in both age groups. Both males and females were affected similarly.
ARTICLE | doi:10.20944/preprints202208.0469.v1
Subject: Social Sciences, Psychology Keywords: Escapism; addiction; excessive behaviors; internet use; gambling; gaming
Online: 29 August 2022 (07:16:59 CEST)
Excessive online behaviors refer to harmful or disproportionate use of digital network applications. Such behaviors are likely to be associated with escapist motives. Our aim was to analyze whether escapism predicts excessive gambling, excessive gaming, and excessive internet use over time. A longitudinal sample of Finnish residents aged 18–75 years (N = 1,022, 51.27% male) was surveyed at three time points in 6-month intervals: April 2021 (Time 1), October–November 2021 (Time 2), April–May 2022 (Time 3). Of the original Time 1 respondents, 66.80% took part in the surveys at both Time 2 and Time 3. All surveys included measures for excessive gambling (Problem Gambling Severity Index), excessive gaming (Internet Gaming Disorder Test), and excessive internet use (Compulsive Internet Use Scale). Three escapism-specific questions were used to construct a dedicated escapism variable. Socio-demographic variables, alcohol consumption, and psychological distress were used as controls. The study was conducted with multilevel regression analyses using hybrid models. Our research showed that escapism had strong within-person effects on excessive gambling, B = 0.18, p = .003; excessive gaming, B = 0.50, p < .001; and excessive internet use, B = 0.77, p < .001 over time. The between-person effect of escapism was demonstrated on excessive gaming B = 0.91, p <.001; and excessive internet use B = 0.61, p = .036. Adverse societal events and uncertain times can manifest in excessive online behaviors motivated by escapism, highlighting a need to focus prevention efforts on healthy coping methods.
ARTICLE | doi:10.20944/preprints202208.0188.v1
Subject: Computer Science And Mathematics, Computer Science Keywords: Internet of Things; security protocol; authentication; authorization; networks
Online: 10 August 2022 (04:11:00 CEST)
The Internet of Things (IoT) has become one of the most attractive domains nowadays. It works by creating a special network between physical devices such as vehicles, home equipment, and other items. In recent days, the common technologies of communication such as Wi-Fi and 2G/3G/4G cellular are insufficient for the IoT networks because they are designed to serve appliances with immense processing capabilities such as laptops and PCs. Moreover, most of these technologies are centralized and use an existing infrastructure. Currently, the new communication technologies such as Z-Wave, 6LowPAN, and Thread are dedicated to the IoT and have been developed to meet its requirements. These technologies can handle many factors such as range, data requirements, security, power demands, and battery life. Nevertheless, the security issues in IoT systems have major concerns and matters because vulnerabilities in such systems may result in fatal catastrophes. In this paper, an enhanced IoT security framework for authentication and authorization is proposed and implemented to protect the IoT protocols from different types of attacks such as man-in-the-middle attack, reply attack, and brute force attack. The proposed framework combines an enhanced token authentication that has identity verification capabilities and a new sender verification mechanism on the IoT device side based on time stamp, which in turn can mitigate the need for local identity verification methods in IoT devices. The proposed IoT security framework is tested using security analysis with different types of attacks compared with previous related frameworks. The analysis shows the high capability of the proposed framework to protect IoT networks against many types of attacks compared with current available security frameworks. Finally, the proposed framework is developed using Windows application to simulate the framework phases, check its validity through the real network, and calculate the payload time is adds.
ARTICLE | doi:10.20944/preprints202208.0115.v1
Subject: Computer Science And Mathematics, Computer Networks And Communications Keywords: Dew computing; Internet of Things; Blockchain; Hotspot Network
Online: 5 August 2022 (03:46:27 CEST)
Building a widely distributed hotspot network is a very tedious task due to its complexity. Providing security, fully distributed network services, and cost-conscious impact are the major challenges behind this goal. To overcome these issues, we have presented a novel distributed hotspot network architecture with five layers that can provide large-scale hotspot coverage as an assimilated result. Our contributions to this new architecture highlight important aspects. First, scalability can be increased by including many Internet-of-Things (IoT) devices with sensors and Wi-Fi and/or LoraWAN connectivity modules. Second, hotspot owners can rent out their hotspots to create a distributed hotspot network in which the hotspots can act as an ordinary data gateway, a full-fledged hotspot miner, and a lightweight hotspot miner to earn crypto tokens as rewards for certain activities. Third, the advantages of Wi-Fi and LoraWAN can be seamlessly leveraged to achieve optimal coverage, higher network security, and suitable data transmission rate for transferring sensor data from IoT devices to remote application servers and users. Fourth, blockchain is used to enhance the decentralized behavior of the architecture presented here by providing immutability and independence from a centralized regulator and making the network architecture more reliable and transparent. The main feature of our paper is the use of the tau-computing paradigm along with hotspots to improve availability, Internet backhaul-agnostic network coverage, and synchronous update capability, and tau-aware leasing to strengthen and improve coverage. We also discuss the key challenges and future roadmap that require further investment and deployment.
COMMUNICATION | doi:10.20944/preprints202203.0243.v2
Subject: Computer Science And Mathematics, Probability And Statistics Keywords: data analysis; surveys and questionnaires; internet; social class
Online: 13 April 2022 (06:32:09 CEST)
Automated software bots infiltrate online surveys and corrupt data integrity, not to mention waste researcher time and budgets. Although resources exist to help keep bots out and identify bots when they do evade survey barriers, bot attacks may be a persistent problem for online surveys for a long time to come. Bots are evolving -- even as survey designers try ever more sophisticated methods to fend them off and weed their answers out. Vigilance needs to be high and the bot generators should not be under-estimated. We recount here some bot features we encountered after our own survey was attacked that helped to identify them, and that have not been detailed elsewhere. We also discuss reasons why commonly recommended strategies for how to keep bots out may not be feasible for many scientific researchers.
CONCEPT PAPER | doi:10.20944/preprints202201.0341.v1
Subject: Engineering, Control And Systems Engineering Keywords: Internet of Things; Sensors; Real-Time; Edge Computing
Online: 24 January 2022 (10:30:54 CET)
Rapid growth of IoT applications and their interference in our daily lives led to many different IoT devices which generates enormous data. The IoT devices’ resources are very limited, so storing and processing IoT data in the devices is very inefficient. Several resources of cloud-computing are efficiently used to handle some IoT resources issues. While using resources in the cloud centers cause some other issues, like latency in the IoT applications, which are time-critical. Thus, the technology of edge cloud has evolved recently. This technology permits storage and data processing at the network edge. This paper studies edge computing in-depth for timeless sensitive devices in IoT. In-depth, cutting-edge IoT computing systems (ECAs-IoT) are evaluated and characterized in this paper according to numerous criteria, such as information placement, improvisation facilities, reliability, and data visualization. Moreover, according to distinctive properties, the paper aims at comparing each structure in detail. The paper also highlights the significant limitations of the new ECAs-IoT and recommends solutions to them. The studies also introduce and propose solutions to some of the most important restrictions of the current ECAs-IoT. Consequently, in the edge computing domain, this survey outlines the IoT implementations. Lastly, with the use of IoT implementations for ECAs-IoT, the paper suggests four distinct scenarios.
REVIEW | doi:10.20944/preprints202109.0461.v1
Subject: Engineering, Control And Systems Engineering Keywords: cyber-attacks; honeypots; internet of things; IoT; scada
Online: 28 September 2021 (10:21:26 CEST)
In recent years, due to their frequent use and widespread use, IoT (Internet of Things) devices have become an attractive target for hackers. As a result of their limited network resources and complex operating systems, they are vulnerable to attacks. Using a honeypot can, therefore, be a very effective way of detecting malicious requests and capturing samples of exploits. The purpose of this article is to introduce honeypots, the rise of IoT devices, and how they can be exploited by attackers. Various honeypot ecosystems will be investigated further for capturing and analyzing information from attacks against these IoT devices. As well as how to leverage proactive strategies in terms of IoT security, it will provide insights on the attack vectors present in most IoT systems, along with understanding attack patterns.
Subject: Environmental And Earth Sciences, Atmospheric Science And Meteorology Keywords: smartphones; balloons, internet of things; cyber-physical systems
Online: 8 September 2021 (12:34:09 CEST)
A smartphone plummeted from a stratospheric height of 36 km (~119,000 feet), providing a complete record of its rapid descent and abrupt deceleration when it hit the ground. The smartphone was configured to collect internal sensor data at high rates. We discuss the state-of-the-art of smartphone environmental and sensing capabilities at the closing of year 2020 and present a flexible mobile sensor data model. The associated open-source application programing interface (API) and python software development kit (SDK) used in this work is transportable to any hardware platform and operating system.
REVIEW | doi:10.20944/preprints202106.0164.v1
Subject: Computer Science And Mathematics, Computer Networks And Communications Keywords: Blockchain, Internet of Things, Security, Privacy, Wireless Communication.
Online: 7 June 2021 (10:50:54 CEST)
In the age of next-generation computer, the role of the cloud, the internet and smart devices will become stronger. These days we all know the word smart well. This word is often used in our daily lives. The Internet of Things (IoT) will generate a variety of information from a variety of resources. It can store big data in the cloud. Fog computing acts as a signal between cloud and IoT. Fog extensions in this framework apply to material under IoT. IoT devices are called Fog nodes, which can be accessed anywhere within the network range. A blockchain is a novel way of recording in a secure sequence. Creating a new framework in the development of Internet of Things is one of the critical problems of wireless communication where solving such a problem can lead to continued growth in the use and popularity of IoT. Proposed research creates a framework for providing a framework for middleware on the internet of smart devices network for the internet of things using blockchains technology. Our great offering connects new research that integrates blockchains into the Internet of Things and provides secure Internet connection for smart devices. Blockchain (BC) Internet of Things (IoT) is a new technology that works with low-level, distributed, public and real-time leaders to maintain transactions between IoT sites. A blockchain is a series of blocks, each block being linked to its previous blocks. All blocks have cryptographic hash code, previous block hash, and its data. Transactions in BC are the basic components used to transfer data between IoT nodes. IoT nodes are a variety of portable but smart devices with embedded sensors, actuators, systems and the ability to communicate with other IoT nodes. The role of BC in IoT is to provide a process for processing secure data records using IoT nodes. BC is a protected technology that can be used publicly and openly. IoT requires this type of technology to allow secure communication between IoT nodes in different environments. Events in BC can be tracked and monitored by anyone who is certified to communicate within IoT.
ARTICLE | doi:10.20944/preprints202104.0166.v1
Subject: Engineering, Automotive Engineering Keywords: Wireless Sensor network (WSN); Internet of Things (I.o.T)
Online: 6 April 2021 (10:13:26 CEST)
Surveillance along the Kenya-Somalia border has been a big challenge that has continuously puzzled the security personnel, due to insurgency of armed militia Al-Shabaab from Somalia , the Kenyan government proposed construction of a barrier wall. This project developed a low cost wireless sensor network surveillance system to be deployed along the Kenya-Somalia border. The research study utilized two PIR sensor for detecting human intrusion, one motion is detected the sensor transmit the data via an Xbee module. Arduino microcontroller was used to process the data collected by the sensor before transmission. The system developed has two units, the Transmitter unit and a User Graphic interface running on Tuna Term software that displays the received data. During testing, the prototype system detected human intrusion, using the Arduino serial monitor the results were displayed before being package for transmission.
Subject: Engineering, Automotive Engineering Keywords: FMIS; Internet of Things; Precision Agriculture; PoC; UML
Online: 17 March 2021 (19:45:27 CET)
The rising world population has made it imperative to get rid of time-consuming and non-economical agricultural practices. Thus, advances in Internet of Things (IoT) technology have recently propelled significant advancements in agriculture, similar to several other sectors. Through the combination of IoT and Farm Management Information Systems (FMIS), field data can be automatically collected, stored, analysed and accessed by farmers in real-time. In this paper, we present Proof-of-Concept (PoC) IoT circuit and FMIS web app for precision agriculture. The IoT circuit incorporates sensors, microcontroller and Wi-Fi module, which acquire and transfer field data to the FMIS web app. We designed and simulated the IoT circuit using Proteus, Arduino Uno, and Arduino Integrated Development Environment (IDE). The FMIS PoC web app was modelled with relevant Unified Modeling Language (UML) diagrams and Django (a Python framework) was employed to implement the app. Our simulation result illustrates how essentila field parameters can be monitored remotely and seamlessly by agriculture practitioners. It further provides a blueprint for real-time precision agriculture at scale and could serve as a learning aid for students in engineering and agricultural science.
REVIEW | doi:10.20944/preprints202008.0494.v1
Subject: Business, Economics And Management, Business And Management Keywords: internet; Society 5.0; sustainable development; automated content analysis
Online: 22 August 2020 (09:57:13 CEST)
(1) Background: The importance of this article is to analyze the technological developments in the field of the Internet and Internet technologies and to determine their significance for the sustainable development which will result in the emergence of the Society 5.0; (2) The authors used automated content analysis for the analysis of 552 articles published in 306 scientific journals indexed by SCII and/or SCI - EXPANDED (Web of Science (WOS) platform) between the years 1996 and 4/2020. The goal of the research was to present the relationship between the internet and sustainable development. (3) Results: The results of the analysis show that the top four most important themes in the selected journals were “development”, “information”, “data”, and “business and services”. (4) Conclusions: Our research approach emphasizes the importance of the culmination of scientific innovation with the conceptual, technological and contextual frameworks of the internet and internet technology usage and its impact on sustainable development and emergence of the Society 5.0
ARTICLE | doi:10.20944/preprints202007.0542.v1
Subject: Business, Economics And Management, Marketing Keywords: famous people; personal brand; Internet users; social media
Online: 23 July 2020 (08:29:28 CEST)
The article is of a research nature. The aim of the article is to identify the role of social media in shaping personal brand. To this end, the first part discusses the concept of personal brand, components of brand capital in case of famous people, including consumer-based capital. Attention was also paid to the great importance of social media and the growing role of their users in the process of shaping personal brand. Based on the analysis of the source literature, a research gap was identified, related to the lack of empirical verification of the relationship between users’ online activity and the brand capital of famous people, also known as celebrities, associated with artistic and cultural activities. The article uses the results of direct research carried out in the years 2019-2020. The second (empirical) part of the article presents research hypotheses, methodology, as well as results and conclusions from the research. Based on 26 in-depth individual interviews that were conducted with people famous in Poland (mainly engaged in artistic and cultural activities) and surveys on a group of 324 social media users, it was shown, among others, that online activity of Internet users stimulates the brand capital of famous people. Statistically significant relationships were observed for such components of the personal brand as awareness / associations with the personal brand and for the relationship regarding the perception of the quality of activities carried out by a famous person.
Subject: Computer Science And Mathematics, Computer Networks And Communications Keywords: blockchain; Internet of Things (IoT); bryptography; security; communication
Online: 28 May 2019 (17:44:06 CEST)
Blockchain (BC) in the Internet of Things (IoT) is a novel technology that acts with decentralized, distributed, public and real-time ledger to store transactions among IoT nodes. A blockchain is a series of blocks, each block is linked to its previous blocks. Every block has the cryptographic hash code, previous block hash, and its data. The transactions in BC are the basic units that are used to transfer data between IoT nodes. The IoT nodes are different kind of physical but smart devices with embedded sensors, actuators, programs and able to communicate with other IoT nodes. The role of BC in IoT is to provide a procedure to process secured records of data through IoT nodes. BC is a secured technology that can be used publicly and openly. IoT requires this kind of technology to allow secure communication among IoT nodes in heterogeneous environment. The transactions in BC could be traced and explored through anyone who are authenticated to communicate within the IoT. The BC in IoT may help to improve the communication security. In this paper, I explored this approach, its opportunities and challenges.
ARTICLE | doi:10.20944/preprints201902.0107.v1
Subject: Social Sciences, Psychology Keywords: hangover; alcohol; internet; attention; executive function; working memory
Online: 12 February 2019 (17:24:43 CET)
Studies into the cognitive effects of alcohol have been mixed. They also present methodological challenges, often relying on self-report of alcohol consumption leading to hangover. The current study used BAC (obtained via breathalyser) and self-reported drinking behavior during a night out and related these to hangover severity and cognitive function measured over the internet in the same subjects the following morning. Volunteers were breathalysed and interviewed as they left a central entertainment district of an Australian state capital. They were provided with a unique identifier and, the following morning, logged on to a website. This included an online version of the Alcohol Hangover Severity Scale (AHSS), and number and type of drinks consumed the previous night and the eTMT-B - a validated, online analogue of the Trail Making Test B of executive function and working memory. Hangover severity was significantly correlated with one measure only, namely the previous night’s BAC (r = .228, p = .019). Completion time on the eTMT-B was significantly correlated with hangover severity ( r = .245, p = .012), previous night’s BAC (r = .197, p = .041) and time spent dinking (r = .376, p < .001). These findings confirm that alcohol hangover negatively affects cognitive functioning and that poorer working memory and executive performance correlates with hangover severity. The results also support the utility of using online measures in hangover research.
SHORT NOTE | doi:10.20944/preprints201809.0293.v1
Subject: Engineering, Electrical And Electronic Engineering Keywords: Brain-Computer Interfaces; Internet of Things; Smart Home
Online: 17 September 2018 (09:47:11 CEST)
A brain-computer interface for controlling elements commonly used at home is presented in this paper. It includes the electroencephalography device needed to acquire signals associated to the brain activity, the algorithms for artefact reduction and event classification, and the communication protocol.
ARTICLE | doi:10.20944/preprints201804.0043.v1
Subject: Engineering, Civil Engineering Keywords: monitoring; SfM-MVS; photogrammetry; internet of things; M3C2
Online: 4 April 2018 (04:53:34 CEST)
Multi-view stereo (MVS) employs multi-point photography for image point positioning and three-dimensional reconstruction technology. Recently, this technology has been introduced into the monitoring of road slopes due to advances in photography and computing technology. In general, the various phases of post-image processing procedures are applied to various photographic data. In this study a novel, automated image-monitoring system is proposed to improve the ability of automatic processing. First, an Internet of things (IoT)-based digital photography system architecture was constructed to provide automatic control of camera photography and real-time transmission of image data. In addition, a visual SfM-MVS 3D reconstruction technique was used to develop related software and hardware interfaces based on the built-in Python computing framework of Photoscan Pro. The software integrates fully automatic photography, image transmission, monitoring of data processing and product release programs. The experimental results show that the system architecture can be applied to fully automatic three-dimensional monitoring of road slopes.
ARTICLE | doi:10.20944/preprints201705.0195.v1
Subject: Engineering, Electrical And Electronic Engineering Keywords: precision agriculture, electronic insect traps, internet of things
Online: 29 May 2017 (10:02:26 CEST)
Τhe concept of remote insect surveillance at large spatial scales for a number of serious insect pests of agricultural and medical importance is introduced in a series of our papers. We augment typical, low-cost plastic traps for many insect pests with the necessary optoelectronic sensors to guard the entrance of the trap in order to detect, time-stamp, GPS tag, and –in relevant cases- identify the species of the incoming insect from their wingbeat. For every important crop pest there are monitoring protocols to be followed in order to decide when to initiate a treatment procedure before a serious infestation occurs. Monitoring protocols are mainly based on specifically designed insect traps. Traditional insect monitoring suffers in that the scope of such monitoring: is curtailed by its cost, requires intensive labor, is time consuming, an expert is often needed for sufficient accuracy and can sometimes raise safety issues for humans. These disadvantages reduce the extent to which manual insect monitoring is applied and therefore its accuracy, which finally results in significant crop loss due to damage caused by pests. With the term ‘surveillance’ we intend to push the monitoring idea to unprecedented levels of information extraction regarding the presence, time-stamping detection events, species identification and population density of targeted insect pests. Insect counts as well as environmental parameters that correlate with insect’s population development are wirelessly transmitted to the central monitoring agency in real time, are visualized and streamed to statistical methods to assist enforcement of security control to insect pests. In this work we emphasize on how the traps can be self-organized in networks that collectively report data at local, regional, country, continental, and global scales using the emerging technology of the Internet of Things (IoT). This research is necessarily interdisciplinary and falls at the intersection of entomology, optoelectronic engineering, data-science and crop science and encompasses the design and implementation of low-cost, low-power technology to help reduce the extent of quantitative and qualitative crop losses by many the most significant agricultural pests. We argue that smart traps communicating through IoT to report in real-time the level of the pest population from the field straight to a human controlled agency can, in the very near future, have a profound impact on the decision making process in crop protection and will be disruptive of existing manual practices. In the present study, three cases are investigated : monitoring Rhynchophorus ferrugineus (Olivier) (Coleoptera: Curculionidae) using a) Picusan and b) Lindgren trap, and c) monitoring various stored grain beetle pests using the pitfall trap.
ARTICLE | doi:10.20944/preprints202304.0541.v1
Subject: Computer Science And Mathematics, Information Systems Keywords: Social Internet of Things; Social Internet of Vehicle; Vehicle-to-Vehicle; Vehicle-to-Infrastructure; Vehicle Ad-hoc Network; Social Networks
Online: 19 April 2023 (04:27:27 CEST)
The number of people owning vehicles has been steadily growing, resulting in increased numbers of vehicles on the roads, making roads more congested, and increasing the risk of accidents. In addition, heavy rain, snow, and fog have increased due to abnormal weather caused by global warming. These bad weather conditions can also affect the safety of vehicles and drivers. The need to disseminate safety messages on the social internet of vehicles due to these problems has been steadily increasing. In this paper, we propose an efficient safety message dissemination scheme that focuses on urban environments with high vehicle density and mobility to address these problems. The proposed scheme reduces packet loss by considering frequent cluster departures and subscriptions through an efficient cluster management technique. In a vehicle-to-vehicle environment, the dissemination of safety messages is divided into an intra-cluster and an inter-cluster emergency as well as general safety message dissemination technique. In a vehicle to infrastructure environment, the proposed scheme reduces the number of processing requests and duplicate messages made to roadside units (RSUs) through a request operation process for each vehicle and an RSU scheduling technique. We conducted several performance evaluations of message packet loss and the number of RSU processing requests to demonstrate the superiority of the proposed scheme.
REVIEW | doi:10.20944/preprints202105.0663.v1
Subject: Computer Science And Mathematics, Computer Science Keywords: Big Data, Internet Data Sources (IDS), Internet of Things (IoT), Sustainable Development Goals (SDGs), Big data Technologies, Big data Challenges
Online: 27 May 2021 (10:31:03 CEST)
It is strongly believed that technology can reap the best only when it can be tamed by all stakeholders. Big data technology has no exception for this and even after a decade of emergence, the technology is still a herculean task and is in nascent stage with respect to applicability for many people. Having understood the gaps in the technology adoption for big data in the contemporary world, the present exploratory research work intended to highlight the possible prospects of big data technologies. It is also advocated as to how the challenges of various fields can be converted as opportunities with the shift in the perspective towards this evolving concept. Examples of apex organizations like (IMF and ITU) and their initiatives of big data technologies with respect to the Sustainable Development Goals (SDGs) are also cited for a broader outlook. The intervention of the responsible organizations along with the respective governments is also much sought for encouraging the technology adoption across all the sections of the market players.
REVIEW | doi:10.20944/preprints202306.0002.v1
Subject: Computer Science And Mathematics, Information Systems Keywords: IoT; Smart Cities; Internet-of-Medical-Things; Sensors; Security
Online: 1 June 2023 (02:27:23 CEST)
The Internet of Things (IoT) technology and devices constitute an exciting field in computer science that is rapidly emerging worldwide. IoT devices function by connecting real-world objects to the internet, resulting in a higher number of interconnected devices than ever witnessed in history. Through internet connectivity, these devices can be utilized in various ways, such as monitoring and tracking. Their prevalence is increasing exponentially, coinciding with advancements in wireless networking technologies. The internet’s enhanced connectivity has played a vital role in fostering the proliferation of IoT devices. Presently, almost any everyday object can be network-connected. The demand for automation and efficiency has also been a contributing factor to the advancements in this technology. This paper aims to review the emergence of IoT devices, analyze their common applications, and explore the future prospects in this promising field of computer science. The examined applications encompass healthcare, agriculture, and smart cities. Although IoT technology exhibits similar deployment trends, this paper will explore different fields to discern the subtle nuances that exist among them. IoT technology can be applied to nearly any domain, and each use case has unique requirements. To comprehend the future of IoT, it is essential to comprehend the driving forces behind its advancements in various industries. By gaining a better understanding of the emergence of IoT devices, readers will develop insights into the factors that have propelled their growth and the conditions that led to technological advancements. Moreover, a comprehensive understanding of the prevalent methodologies will enable readers to distinguish between current practices and future methods. Given the rapid rate at which IoT technology is advancing, this paper aims to provide researchers with an understanding of the factors that have brought us to this point and the ongoing efforts to shape the future of IoT.
ARTICLE | doi:10.20944/preprints202305.1638.v1
Subject: Social Sciences, Tourism, Leisure, Sport And Hospitality Keywords: population aging; household tourism consumption; intergenerational care; Internet use
Online: 23 May 2023 (10:26:41 CEST)
The ever deepening population aging has brought opportunities and challenges to the continued expansion of tourism consumption in China. In this article, the impact of population aging on household tourism consumption was studied from both theoretical and empirical aspects. First, the micro mechanisms of the impact of population aging on household tourism consumption were analyzed, which include economic condition mechanism, intergenerational care mechanism, health status mechanism and Internet use mechanism. Subsequently, the impact of population aging on household tourism consumption and its impact mechanisms were tested, and the heterogeneity analysis was conducted, by using the data of China Family Panel Studies (CFPS) from 2014, 2016 and 2018. The main conclusions of the article are as follows: (1) Population aging has a significant negative impact on household tourism consumption, and a series of robustness test results such as endogenous treatment support this finding. (2) The results of the impact mechanism test show that population aging has a negative mediating effect on household tourism consumption by reducing household economic conditions. The moderating effect of intergenerational care on the effect of population aging on household tourism consumption is insignificant. Health status of the elderly and Internet use have a significant positive moderating effect on the impact of population aging on household tourism consumption. (3) The results of the heterogeneity analysis show that the negative impact of population aging on household tourism consumption in urban areas is greater than that in rural areas, and the negative impact of population aging on household tourism consumption of families with the old-old elderly is greater than that of falimies with the young-old elderly. The conclusions of this article provide important references for activating tourism consumption in China in the context of population aging.
ARTICLE | doi:10.20944/preprints202109.0405.v1
Subject: Computer Science And Mathematics, Computer Science Keywords: models of using internet; bonding social capital; social identity
Online: 23 September 2021 (11:58:40 CEST)
In this research, we are attempting to review the relationship between users' models of using internet and bonding social capitals in Iran. The theoretical framework of the research are based on theoretical approaches of Dearnly and Feder, Velleman, Katz in the field of internet and models of using it and views of Putnam, Woolcock regarding social capital. The method used in this research is a qualitative – quantitative mixed method and the sampling method which has been used in the qualitative method is the purposive sampling method (theoretical sampling) and in the quantitative method, a combination of clustering, systematic and stratified sampling method in proportion with age and gender has been used. The statistical population of all persons who are 15 years old and more in Kerman city has been estimated to be 515114 persons in 2019 and the research sample has been estimated to be about 400 persons. Research results indicate that the rate of citizens' usage of internet in Kerman city is very low (less than 5 hours per week). Other results of the research indicate that regarding the model based on information associated with news, mostly filtered and unpermitted news sites such as VOA, BBC and other networks have been used. Research data regarding social identity is indicative of formation of identity evolutions in the contemporary society of Iran. The results of the path model test of the research indicate that news and economic information based models have about (0.11) direct and positive impact and ethnic identity has a direct and positive impact (0.189) and group identity has about (-0.131) impact and entertainment based model has about (0.130) impact on social capital. The results of variables' indirect impacts have also been expressed in the research
ARTICLE | doi:10.20944/preprints202105.0289.v3
Subject: Business, Economics And Management, Economics Keywords: internet access; nutritional intake; rural China; propensity score matching
Online: 11 June 2021 (14:54:42 CEST)
Over the past four decades, China has experienced a nutritional transition and has developed the largest population of internet users. In this study, we evaluated the impacts of internet access on the nutritional intake in Chinese rural residents. An IV-Probit-based propensity score matching method was used to determine the impact of internet access on nutritional intake. The data were collected from 10042 rural households in six Chinese provinces. The results reveal that rural residents with internet access have significantly higher energy, protein, and fat intake than those without. Chinese rural residents with internet access consumed 1.35% (28.62 kcal), 5.02% (2.61 g), and 4.33% (3.30 g) more energy, protein, and fat, respectively. There was heterogeneity as regards the intake of energy, protein, and fat among those in different income groups. Moreover, non-staple food consumption is the main channel through which internet access affects nutritional intake. The results demonstrate that the local population should use the internet to improve their nutritional status. Further studies are required to investigate the impact of internet use on food consumed away from home and micronutrients intake.
HYPOTHESIS | doi:10.20944/preprints202104.0614.v1
Subject: Business, Economics And Management, Accounting And Taxation Keywords: smart cities; artificial intelligence; internet of things; air pollution
Online: 22 April 2021 (14:18:12 CEST)
Air pollution contributes to a critical environmental problem in various towns and cities. With the emergence of the smart cities concept, appropriate methods to curb associated with exposure to pollutants must have been a portion of appropriate urban development policy. This study presents a technologically driven air quality solution in smart cities to advertise energy-efficient and cleaner sequestration in these areas. It aims to address the issue of how to integrate the data-based strategies and artificial intelligence into efficient public sector pollution management in smart cities as a core part of the smart city definition. Exploratory research has been used in 152 smart cities, and environmental experts contributed to this study. It further addresses the technical criteria for implementing such a framework that the public administration uses to prepare the renovation of public buildings, minimize energy use and costs, and link these smart police stations to monitor air pollution as a part of integrated cities. Such a digital transition in resource management will increase public governance's energy performance, a higher standard of operation, and a healthier environment.
ARTICLE | doi:10.20944/preprints202103.0685.v1
Subject: Social Sciences, Anthropology Keywords: death; grief; Internet; photograph; comparative study; social network sites
Online: 29 March 2021 (11:34:58 CEST)
Abstract: As innovative way to express grief, social media posts about the deceased have become fairly common. However, few studies examined grief photos commonly posted. The purpose of the present study was to examine such pictures, as well as the motivation and reactions of those who posted, among Italians and Americans. Surveys were sent to both Italian and U.S. participants. The U.S. group yielded 262 responses (Mean age = 22 years; 81% female), the Italian yielded 51 (Mean age = 32. Several key issues emerged, such as the need to receive empathic support from other users, the desire to maintain continuing bonds, the wish to remember the deceased, and the desire to share beauty and symbolic pictures. The images were analyzed using content analysis. Both samples posted photos to remember and to enhance their posts. A strong preference for pictures with a positive emotional connotation appeared, depicting the deceased in a conjoint appearance with the participant. Results suggest that imagery used for the expression of grief in social media sites, an “iconography of grief,” is a popular means of expression for grievers.
ARTICLE | doi:10.20944/preprints202010.0385.v1
Subject: Business, Economics And Management, Accounting And Taxation Keywords: Internet use; Participation in international trade; Tax revenue instability
Online: 19 October 2020 (14:36:10 CEST)
This paper investigates the effect of the Internet on tax revenue instability, notably through the international trade channel. It has used a sample of 142 countries over the period 1995-2017, and relied primarily on the two-step system Generalized Methods of Moments (GMM) estimators (but also incidentally on the Error Component Two-Stage Least Squares estimator). Tax revenue instability is primarily measured by the instability of non-resource tax revenue, but also by the instability of total tax revenue (for robustness check). The findings indicate that the Internet exerts a negative effect on tax revenue instability. Interestingly, this effect genuinely translates through the international trade channel, regardless of the measure of tax revenue instability considered. Countries enjoy a higher negative effect of the Internet on tax revenue instability as they enjoy a greater participation in international trade. These findings, therefore, add to the potential benefits of the Internet adoption (e.g., strengthening countries' participation in international trade, enhance their tax revenue performance and promote tax reform, including in developing countries) by showing that it could also help to stabilize tax revenue, particularly through the degree of countries' participation in international trade.
ARTICLE | doi:10.20944/preprints201808.0263.v1
Subject: Engineering, Electrical And Electronic Engineering Keywords: IEEE 802.11ax; multiple NAVs; Internet-of-Things (IoT); beamforming
Online: 15 August 2018 (04:33:59 CEST)
The increased deployment of IoT devices in specific areas results in an interference among them and the quality of communications can be severely degraded. To deal with this interference issue, the IEEE 802.11ax standard has been established in hyper-densely wireless networking systems. The 802.11ax adopts a new candidate technology that is called multiple network allocation vector in order to mitigate the interference problem. In this paper, we point out potential problem in multiple network allocation vector which can cause delays to the communication among IoT devices in hyper-dense wireless networks. Furthermore, this paper introduces an adaptive beam alignment algorithm for interference issue resolution. In addition, we analyze potential delays of communications among IoT devices under interference conditions. Lastly, we simulate our proposed algorithm in densely deployed environment and show that the interference issue can be mitigated and the IEEE 802.11ax-based IoT devices can utilize the air interface more fairly compared to conventional IEEE 802.11 distributed coordination function.
ARTICLE | doi:10.20944/preprints201903.0094.v1
Subject: Engineering, Control And Systems Engineering Keywords: Internet of Things; Cyber Physical Systems; Digital Economy; Industrial Internet of Things; Industry 4.0; empirical analysis; cyber risk assessment; cyber risk target state
Online: 7 March 2019 (12:25:15 CET)
The world is currently experiencing the fourth industrial revolution driven by the newest wave of digitisation in the manufacturing sector. The term Industry 4.0 (I4.0) represents at the same time: a paradigm shift in industrial production, a generic designation for sets of strategic initiatives to boost national industries, a technical term to relate to new emerging business assets, processes and services, and a brand to mark a very particular historical and social period. I4.0 is also referred to as Industrie 4.0 the New Industrial France, the Industrial Internet, the Fourth Industrial Revolution and the digital economy. These terms are used interchangeably in this text. The aim of this article is to discuss major developments in this space in relation to the integration of new developments of IoT and cyber physical systems in the digital economy, to better understand cyber risks and economic value and risk impact. The objective of the paper is to map the current evolution and its associated cyber risks for the digital economy sector and to discuss the future developments in the Industrial Internet of Things and Industry 4.0.
ARTICLE | doi:10.20944/preprints202305.2147.v1
Subject: Computer Science And Mathematics, Computer Networks And Communications Keywords: Contactless; head movement; health monitoring; WiFi CSI; internet of things
Online: 30 May 2023 (13:05:29 CEST)
Detecting human head movement during sleep is important as it can help doctor to access some physical or mental health problems like infantile eczema, calcium deficiency, insomnia, anxiety disorder and even Parkinson’s disease, and provide useful clues for scientific diagnosing. To obtain the information of sleep head movement, current solutions either use the camera or require the user to wear intrusive sensors to collect the image or motion data. However, the vision-based schemes depend on the environmental light conditions and also bring privacy concerns. Some people including the elderly and infant may be reluctant to wear wearable devices during sleep. In this paper, we propose a novel system called Wi-Senser to address the issues mentioned above. Our Wi-Senser directly reuses the existing WiFi infrastructure and exploits the fine-grained channel state information (CSI) of WiFi signals to capture the minute human head movement during sleep without attaching any sensors to the human body. We design and implement our system with just one commercial off-the-shelf (COTS) router and one laptop equipped with Intel 5300 network interface card (NIC). We evaluate the performance of Wi-Senser with 6 volunteers (4 adults and 2 children). Extensive experiments demonstrate that Wi-Senser can achieve a 98.5% accuracy for head movement detection during sleep. Wi-Senser provides a new solution for achieving noninvasive, continuous and accurate human minute movement detection without any additional cost.
ARTICLE | doi:10.20944/preprints202305.0527.v1
Subject: Engineering, Electrical And Electronic Engineering Keywords: Internet of Remote Things; LEO satellite transmission; water-level monitoring
Online: 8 May 2023 (10:55:13 CEST)
This paper deals with the use of low earth orbit (LEO) satellite links in long-term monitoring of water, ice and snow levels across wide geographic areas, where no other communication links can be applied. Unlike geostationary satellites, LEO satellites do not maintain the same position relative to the ground station, and transmissions need to be scheduled for satellite overfly periods. For our application, the energy consumption optimization is critical, and we develop a learning approach for scheduling the transmission times from the sensors. Our approach is based on online learning, and is applicable to any LEO satellite transmissions.
ARTICLE | doi:10.20944/preprints202211.0387.v1
Subject: Engineering, Energy And Fuel Technology Keywords: renewable energy, Internet of Thinks, renewable energy storage, smart city
Online: 21 November 2022 (09:53:30 CET)
Transportation, environmental conditions, quality of human life within smart cities, and system infrastructure have all needed practical and dependable smart solutions as urbanization has accelerated in recent years. In addition, the emerging Internet of Things (IoT) provides access to a plethora of cutting-edge, all-encompassing apps for smart cities, all of which contribute significantly to lowering energy consumption and other negative environmental impacts. For smart cities to meet the challenge of using less energy, the authors of this research article suggest planning and implementing an integrated power and heat architecture that puts renewable energy infrastructure and energy-storage infrastructure at the top of the list. To address these issues, we describe a smart proposed NEOSRD architecture that uses a distributed smart area domain to optimize renewable demand energy in a smart city across a wide area network. The energy requirements of desalination procedures are negligible when compared to the total local energy consumption and transportation, a feat accomplished by the proposed NEOSRD system. Here, the computational model shows how the established system is a valuable response to our problems and a cost-effective strategy for creating smarter structural elements that cut down on overall smart cities' energy costs.
ARTICLE | doi:10.20944/preprints202102.0324.v1
Subject: Engineering, Automotive Engineering Keywords: LoRa; LoRaWAN; Trial; Waste Management; Smart City; Internet of Things
Online: 16 February 2021 (13:32:05 CET)
The city of Lisbon, has any other capital of a European country, has a large number of issues while managing the waste and recycling containers spread throughout the city. This document presents the results of a study promoted by the Lisbon City Council for trialing LPWAN technology on the waste management vertical under the Lisbon Smart City initiative. Current waste management is done using GSM sensors, and the aim is to use LPWAN to reduce the costs, improve range and reduce provisioning times when changing the communications provider. After an initial study, LoRa was selected as the LPWAN of choice for the trials. The study is composed of multiple use cases at different distances, types of recycling waste containers, placements (underground and surface) and different kinds of waste level measurement LoRa sensors, deployed in order to assess the impact of the different use cases on the LoRa sensor usage. The results shown that the underground waste containers present the most difficult challenge, where the container itself imposes attenuation levels of 26dB on the link budget. The results promoted the deployment of a city wide LoRa network available to all departments inside the Lisbon City Council, and considering the network capacity the network, the network is also available to citizens to be used freely.
ARTICLE | doi:10.20944/preprints202102.0170.v1
Subject: Engineering, Automotive Engineering Keywords: Internet of things; Artificial Intelligence; Smart University; Microcontroller; Smart buildings
Online: 5 February 2021 (21:52:06 CET)
In this paper we designed system for smart university building based on artificial intelligence (AI) and internet of things (IOT). Our idea can be summarized in smart security system that has different sensors to detect the surrounding environment of the class room in campus which keep everyone and everything on campus safer. By using (IOT), (AI) technologies and applications and by using microcontroller programming we can make the university building safer, secure and more energy saves.
Subject: Engineering, Automotive Engineering Keywords: Internet of Things; IEEE 802.15.4g; Smart Utility Networks; Retransmission Shaping
Online: 19 January 2021 (13:58:34 CET)
In this paper, we propose and evaluate two mechanisms aimed at improving the communication reliability of IEEE 802.15g SUN (Smart Utility Networks) in industrial scenarios: RTS (Re-Transmission Shaping), which uses acknowledgements to track channel conditions and dynamically adapt the number of re-transmissions per packet, and AMS (Adaptive Modulation Selection), which makes use of reinforcement learning based on MAB (Multi-Armed Bandits) to choose the modulation that provides the best reliability for each packet re-transmission. The evaluation of both mechanisms is performed through computer simulations using a dataset obtained from a real-world deployment and two widely used metrics, the PDR (Packet Delivery Ratio) and the RNP (Required Number of Packet transmissions). The PDR measures the ratio between received and transmitted packets, whereas the RNP is the number of packet repetitions before a successful transmission. The results show that both mechanisms allow to increase the communication reliability while not jeopardizing the battery life-time constraints of end devices. For example, when three re-transmissions per packet are allowed, the PDR reaches 98/96\% with a RNP of 2.03/1.32 using RTS and AMS, respectively. Additionally, the combination of both proposed mechanisms allows to reach a 99% PDR with a RNP of 1.7, making IEEE 802.15.4g SUN compliant with the stringent data delivery requirements of industrial applications.
ARTICLE | doi:10.20944/preprints202010.0461.v1
Subject: Engineering, Automotive Engineering Keywords: Internet of Things; IEEE 802.15.4g; Smart Utility Networks; Retransmission Shaping
Online: 22 October 2020 (12:04:23 CEST)
Packet re-transmissions are a common technique to improve link reliability in low-power wireless networks. However, since packet re-transmissions increase the end-device energy consumption and the network load, a maximum number of re-transmissions per packet is typically set, also considering the duty-cycle limitations imposed by radio-frequency regulations. Moreover, the number of re-transmissions per packet is typically set to a constant value, meaning that all packet re-transmissions are treated the same regardless of actual channel conditions (i.e., multi-path propagation or internal/external interference effects). Taking that into account, in this paper we propose and evaluate the concept of re-transmission shaping, a mechanism that manages packet re-transmissions to maximize link reliability, while minimizing energy consumption and meeting radio-frequency regulation constraints. The proposed re-transmission shaping mechanism operates by keeping track of unused packet re-transmissions and allocating additional retransmission when the instantaneous link quality decreases due to channel impairments. To evaluate the re-transmission shaping mechanism we use trace-based simulations using a IEEE 802.15.4g SUN data-set and two widely used metrics, the PDR (Packet Delivery Ratio) and the RNP (Required Number of Packets). The obtained results show that re-transmission shaping is a useful mechanism to improve link reliability of low-power wireless communications, as it can increase PDR from 77.9% to 99.2% while sustaining a RNP of 2.35 re-transmissions per packet, when compared to using a single re-transmission per packet.
ARTICLE | doi:10.20944/preprints202001.0170.v1
Subject: Engineering, Control And Systems Engineering Keywords: internet of things; smart grids; protocol communication; interoperability; CoAP; OSGP
Online: 16 January 2020 (11:41:25 CET)
The evolution and miniaturization of the technologies for processing, storage, and communication have enabled computer systems to process a high volume of information and make decisions without human intervention. Within this context, several systems architectures and models have gained prominences, such as the Internet of Things (IoT) and Smart Grids (SGs). SGs use communication protocols to exchange information, among which the Open Smart Grid Protocol (OSGP) stands out. In contrast, this protocol does not have integration support with IoT systems that use some already consolidated communication protocols, such as the Constrained Application Protocol (CoAP). Thus, this work develops the integration of the protocols OSGP and CoAP to allow the communication between conventional IoT systems and systems dedicated to SGs. Results demonstrate the effectiveness of this integration, with the minimum impact on the flow of commands and data, making possible the use of the developed CoAP-OSGP Interface for Internet of Things (COIIoT).
ARTICLE | doi:10.20944/preprints201912.0417.v1
Subject: Engineering, Mechanical Engineering Keywords: tangible interfaces; Internet of Things tangibles; children with hearing impairment
Online: 31 December 2019 (16:48:04 CET)
A Tangible User Interface (TUI) is a new interaction option that uses nontraditional input and output elements. A tangible interface thus allows the manipulation of physical objects using digital information. The exploration and manipulation of physical objects is a factor to be considered in learning in children, especially those with some kind of disability such as hearing, who maximize the use of other senses such as vision and touch. In a tangible interface, three elements are related - physical, digital and social. The potential of IoT for children is growing. This technology IoT integrated with TUI, can help for that parents or teachers can monitoring activities of the child. Also to identify behavior patterns in the child with hearing impairment. This article shows four case studies, where had been designed different products of Internet of Things Tangible applied a several contexts and with products of low cost.
Subject: Computer Science And Mathematics, Artificial Intelligence And Machine Learning Keywords: Internet of Things (IoT); Quality Assurance; Testing; Artificial Intelligence (AI)
Online: 9 December 2019 (07:39:47 CET)
IoT is a fast growing technology that has Promising potential for shaping our future. In this fast growing world of IoT, IoT systems are released without proper testing which effect its quality and does not guarantee user satisfaction. Different testing methodologies are carried out to ensure Quality assurance of IoT before releasing it to the market. In this paper we have reviewed different testing techniques using AI and different tools to ensure Quality of IoT. In this paper we have also reviewed different IoT challenges related to its quality.
ARTICLE | doi:10.20944/preprints201909.0092.v1
Subject: Social Sciences, Education Keywords: Internet-assisted; English reading teaching; innovative designs; impact; constructivism theory
Online: 9 September 2019 (07:55:44 CEST)
With the development of Internet technology, teachers are constantly seeking innovative teaching methods to match the potential of enhanced technology. Although many studies have been performed before , they aren’t enough in this field. The purpose of this paper is to explore innovative teaching designs and examine the impact of Internet-assisted English teaching of reading based on constructivism. The case is carried out in NO.9 middle school of Bengbu, a underdeveloped area of China, most of students aren’t interested in learning English .We compared Internet-assisted with traditional textbook literature methods to improve the reading proficiency of students, using a questionnaire survey,pre-test and post-tests comparisons. The result showed Internet-assisted English reading teaching is better than textbook. It can arouse students' interest and motivation,reading proficiency and exam result of students have been improved significantly, created a positive learning situation.
ARTICLE | doi:10.20944/preprints201904.0143.v1
Subject: Engineering, Industrial And Manufacturing Engineering Keywords: autonomous electrical vehicles; the Internet of Things; supply chain strategy
Online: 11 April 2019 (12:59:18 CEST)
This paper outlines a new methodology for developing strategy for supply chain integration of Autonomous Electrical Vehicles (AEV) to the Internet of Things (IoT). The methodology consists of external architecture and internal design that anticipates the business strategy in the development process. The methodology is designed to anticipate the impact of developments in new road transport technologies, such as Tesla Truck or Tesla Pickup. Since the methodology is designed to anticipate the impact of non-existing technologies, it represents green-field analysis. Green-field is defined as a new and non-existent operation. Green-field strategy architecture in this paper is presented as a process of accepting the world and acting upon that version of the world. The results of the analysis are presented as pathways and outcomes, emerging from the interrelated relationship between AEV and IoT. The emerging methodology is applied through two case studies to evaluate the impact to environment, performance and operationalisation. The methodology proposes architecture and design for integrating AEV and IoT in the supply chain strategy, and a set of new evaluation criteria that promote acceptance of Artificial Intelligence (AI) in the design process. The main contribution to knowledge is a new methodology for integrating AEV and the IoT to the supply chains. The paper applies interplay between inductive and deductive case study and grounded theory approach to build upon the concept of supply chain architecture and contribute to knowledge to the topic of formulating green-field integrated AEV- IoT supply chain strategy.
ARTICLE | doi:10.20944/preprints201903.0111.v1
Subject: Engineering, Control And Systems Engineering Keywords: Industry 4.0., Internet of Things, case study, cyber security framework
Online: 8 March 2019 (15:27:11 CET)
This research article reports the results of a qualitative case study that correlates academic literature with five Industry 4.0 cyber trends, seven cyber risk frameworks and two cyber risk models. While there is a strong interest in industry and academia to standardise existing cyber risk frameworks, models and methodologies, an attempt to combine these approaches has not been done until present. We apply the grounded theory approach to derive with integration criteria for the reviewed frameworks, models and methodologies. Then, we propose a new architecture for the integration of the reviewed frameworks, models and methodologies. We therefore advance the efforts of integrating standards and governance into Industry 4.0 and offer a better understanding of a holistic economic impact assessment model for IoT cyber risk.
ARTICLE | doi:10.20944/preprints201705.0076.v1
Subject: Computer Science And Mathematics, Computer Networks And Communications Keywords: user authentication; multi server; internet of things; formal verification; security
Online: 9 May 2017 (04:38:37 CEST)
In recent years, the internet of things has been widely utilized in various fields, such as in smart factories or connected cars. As its domain of application has expanded, it has begun to be employed using multi-server architectures for a more efficient use of resources. However, because users wishing to receive IoT services connect to multi-servers over wireless networks, this can expose systems to various attacks and result in serious security risks. To protect systems (and users) from potential security vulnerabilities, a secure authentication technology is necessary. In this paper, we propose a smart card-based authentication protocol, which performs the authentication for each entity by allowing users to go through the authentication process using a smart card transmitted from an authentication server, and to login to a server connected to the IoT. Furthermore, the security of our proposed authentication protocol is verified by simulating a formal verification scenario using AVISPA, a security protocol-verification tool.
Subject: Social Sciences, Education Keywords: digital competence; teacher education; privacy; cyber security; Internet; teachers; university; initial training; Competencia digital; formación del profesorado; privacidad; seguridad cibernética; Internet; docentes; universidad; formación inicial
Online: 17 October 2019 (12:22:39 CEST)
The use of technologies and the Internet poses problems and risks related to digital security. This article presents the results of a study on the evaluation of the digital competence of future teachers in the DigCompEdu European framework. 317 undergraduate students from Spain and Portugal answered a questionnaire with 59 items, validated by experts, in order to assess the level and predominant competence profile in initial training (including knowledge, uses and interactions and attitudinal patterns). The results show that 47% of the participants belong to the profile of teachers at medium digital risk, evidencing habitual practices that involve risks such as sharing information and digital content inappropriately, not using strong passwords, and ignoring concepts such as identity, digital “footprint” and digital reputation. The average valuations of each item in the seven categories show that future teachers have an average competence in the area of digital security. They have good attitudes toward security but less knowledge and fewer skills and practices related to the safe and responsible use of the Internet. Future lines of work are proposed, aimed at responding to the demand for a better prepared and more digitally competent citizenry. The demand for education in security, privacy and digital identity is becoming increasingly important, and these elements form an essential part of initial training.
REVIEW | doi:10.20944/preprints202304.0426.v2
Subject: Computer Science And Mathematics, Computer Science Keywords: Internet of Medical Things (IoMT); data exchange: healthcare; medical data; interoperability
Online: 5 June 2023 (08:12:36 CEST)
A medical entity (hospital, nursing home, rest home, revalidation center, etc.) usually includes a multitude of information systems that allow for quick decision-making close to the medical sensors. The Internet of Medical Things (IoMT) is an area of IoT that generates a lot of data of different natures (radio, CT scan, medical reports, medical sensor data). However, these systems need to share and exchange medical information in a seamless, timely, and efficient manner with systems that are either located within the same entity or located in other healthcare entities. The lack of inter and intra entity interoperability causes major problems in the analysis of patient records and leads to additional financial costs (e.g., redone examinations). In order to develop a medical data interoperability architecture model that will allow providers and different actors in the medical community to exchange patient summary information with other caregivers and partners in order to improve the quality of care, the level of data security, and the efficiency of care, we take stock of the state of knowledge.
ARTICLE | doi:10.20944/preprints202305.0304.v1
Subject: Computer Science And Mathematics, Computer Networks And Communications Keywords: Blockchain Technology; Transportation Systems; Internet of Vehicles; IoV Communication; Vehicle Security
Online: 5 May 2023 (05:09:42 CEST)
The Internet of Vehicles (IoV) is an emerging field that has attracted significant attention due to its potential to transform transportation and mobility. IoV enables the development of new services and applications that can improve transportation systems' efficiency, safety, and sustainability. However, ensuring secure and trustworthy communication among the different components of an IoV system is a critical challenge that needs to be addressed. This paper proposes a blockchain-enabled communication framework for secure and trustworthy IoV applications. The proposed framework leverages the security and decentralization features of blockchain technology to provide secure communication channels for different components of the IoV system, including vehicles, infrastructure, and service providers. The proposed framework provides an identity management system to authenticate and authorize users and devices, thereby preventing unauthorized access and data breaches. To evaluate the effectiveness of the proposed framework, we conducted experiments using a real-world IoV scenario, and the results demonstrate that the proposed framework can provide secure and trustworthy communication for IoV applications. The proposed blockchain-enabled communication framework offers a promising approach to address the security and trust challenges in IoV communication systems.
ARTICLE | doi:10.20944/preprints202304.0283.v1
Subject: Engineering, Electrical And Electronic Engineering Keywords: low power consumption; Internet of Things; Intelligent manhole cover; attitude solving
Online: 13 April 2023 (03:12:11 CEST)
This paper addresses the difficulty of balancing real-time response and low power consumption in intelligent manhole cover application scenarios. It proposes a method to distinguish normal and abnormal events by segmenting the boundary where the acceleration of the intelligent manhole cover deviates from a set threshold and lasts for a certain period, based on the difference in vibration patterns of the intelligent manhole cover when a normal event and an abnormal event occur. This paper uses digital output motion sensor data autonomous data fusion to implement the pattern mentioned above recognition algorithm, which reduces the MCU computing and working time and the overall power consumption of the system while meeting the real-time response requirements. The test results demonstrate that the method has a high rate of anomaly recognition accuracy. The method ensures the system's real-time response capability, and the actual low power consumption test demonstrates that the device can operate continuously for 9.5 years. The low power consumption index exceeds the requirements of the existing national standard, thereby resolving the issue that it is challenging to balance intelligent manhole cover abnormality recognition and low power consumption.
ARTICLE | doi:10.20944/preprints202303.0331.v1
Subject: Engineering, Chemical Engineering Keywords: Cyber-physical system; Internet of things; Security pattern; Security solution frame
Online: 20 March 2023 (02:12:35 CET)
Sensors and actuators are fundamental units in Cyber-Physical and Internet of Things systems. Because they are included in a variety of systems, using many technologies, it is very useful to characterize their functions abstractly by describing them as Abstract Entity Patterns (AEPs), that are patterns that describe abstract conceptual entities. For concreteness, we study them here in the context of autonomous cars. An autonomous car is a complex system because, in ad-dition to its own complex design, it interacts with other vehicles and with the surrounding in-frastructure. To handle these functions, it must incorporate various technologies from different sources. An autonomous car is an example of a Cyber-Physical System, where some of its func-tions are performed by Internet of Things units. Sensors are extensively used in autonomous cars to measure physical quantities; actuators are commanded by controllers to perform appro-priate physical actions. From AEPs we can derive concrete patterns, a structure combining re-lated AEPs is an Entity Solution Frame (ESF). Both sensors and actuators are susceptible to mali-cious attacks due to the large attack surface of the system where they are used. Our work is in-tended to make autonomous cars more secure, which also increases their safety. Our final objec-tive is to build a Security Solution Frame for sensors and actuators of autonomous cars that will facilitate their secure design. A Security Solution Frame is a solution structure that groups to-gether and organizes related security patterns. This article is the first stage of a secure unit that can be used to design not only secure autonomous cars but also any system where sensors and actuators are used. This paper concentrates on AEPs and ESFs for sensors and actuators; that is, on the functional aspects of these devices.
ARTICLE | doi:10.20944/preprints202210.0431.v1
Subject: Computer Science And Mathematics, Artificial Intelligence And Machine Learning Keywords: Supervised machine learning; intrusion detection; data engineering; cybersecurity; Internet of Things.
Online: 27 October 2022 (10:57:09 CEST)
Nowadays, the Internet of Things (IoT) devices and applications have rapidly expanded worldwide due to their benefits in improving the business environment, industrial environment, and people's daily lives. However, the IoT devices are not immune to malicious network traffic, which causes potential negative consequences and sabotages IoT operating devices. Therefore, developing a method for screening network traffic is necessary to detect and classify malicious activity to mitigate its negative impacts. Therefore, this research proposes a predictive machine learning model to detect and classify network activity in an IoT system. Specifically, our model distinguishes between normal and anomaly network activity. Furthermore, it classifies network traffic into five categories, normal, Mirai attack, denial of service (DoS) attack, Scan attack, and man-in-the-middle (MITM) attack. Five supervised learning models were implemented to characterize their performance in detecting and classifying network activities for IoT systems. This includes models shallow neural networks (SNN), decision trees (DT), bagging trees (BT), support vector machine (SVM), and k-nearest neighbor (kNN). The learning models were evaluated on a new and broad dataset for IoT attacks, the IoTID20 dataset. Besides, a deep feature engineering process was applied to the dataset to improve the accuracy of the learning models. Our experimental evaluation exhibited an accuracy of 100% recorded for the detection using all implemented models and an accuracy of 99.4%-99.9% recorded for the classification process.
ARTICLE | doi:10.20944/preprints202105.0018.v1
Subject: Computer Science And Mathematics, Algebra And Number Theory Keywords: Ambient Intelligence; Internet of Things; Context; Prediction; Context Histories; Alzheimer’s Disease
Online: 4 May 2021 (13:47:01 CEST)
The new Internet of Things (IoT) applications are enabling the development of projects that help monitoring people with different diseases in their daily lives. Alzheimer’s is a disease that affects neurological functions and needs support to maintain maximum independence and security of patients during this stage of life, as the cure and reversal of symptoms have not yet been discovered. The IoT-based monitoring system provides the caregivers’ support in monitoring people with Alzheimer’s Disease (AD). This paper presents an ontology-based computational model which receives physiological data from external IoT applications, allowing to identify of potentially dangerous behaviors for patients with AD. The main scientific contribution of this work is the specification of a model focusing on Alzheimer’s disease using the analysis of Context Histories and Context Prediction, which considering the state of the art, it is the only one that uses analysis of Context Histories to perform predictions. The research also proposes a simulator to generate activities of the daily life of patients allowing the creation of datasets. These datasets were used to evaluate the contributions of the model and were generated according to the standardization of the ontology. The simulator generated 1025 scenarios applied to guide the predictions, which achieved average accurary of 97.44%. The experiments also allowed the learning of 20 relevant lessons on technological, medical and methodological aspects of DCARE that are recorded in this article.
ARTICLE | doi:10.20944/preprints202006.0177.v2
Subject: Chemistry And Materials Science, Analytical Chemistry Keywords: Sensor; Smart machine; Internet of Things (IoT); Arrhythmia; Arrhythmic Signs; Biosensor
Online: 3 February 2021 (10:51:22 CET)
It is important to increase the quality of health and medicine. A wearable system for continuous monitoring of the patient is important to overcome this issue. Thus a patient with Arrhythmia due to its low cost and success in saving the life of the patient was the right option for the care partner. In addition, the device will provide a consumer with a smart smartphone application with accurate pulse beat and body temperature data in real time. MAX 30100 and LM35 are primarily used for the detection of human heart and temperature. The performance of these sensors is generated by an arrhythmia algorithm in the esp32 segment.
ARTICLE | doi:10.20944/preprints202101.0595.v1
Subject: Social Sciences, Psychology Keywords: pathological gambling; social ecological model; adolescents; emerging adults; internet; online communities
Online: 28 January 2021 (16:16:00 CET)
Problem gambling among young people is an emerging trend globally. The online environment in particular offers various possibilities for gambling engagement. This is the first cross-national survey study using the social ecological model to analyze problem gambling, especially in the online context. The aim was to analyze how different social ecological spheres explain problem gambling. Participants were young people aged 15–25 in the United States (n = 1,212), South Korea (n = 1,192), Spain (n = 1,212), and Finland (n = 1,200). The South Oaks Gambling Screen (SOGS) instrument was used as a measure for problem gambling. Regression models predicted problem gambling with measures of intrapersonal, interpersonal, organizational, and societal spheres. Spanish participants had the highest SOGS score for problem gambling. Out of the spheres, organizational-sphere measures best explained the variation in problem gambling in all countries (26%) when compared to the societal (3%), interpersonal (5%) and intrapersonal (11%) spheres. In the full model, organizational-sphere measures had strong associations with problem gambling. These included consumer debt, online gambling community participation, online casino participation, and exposure to online pop-up advertisements. Other robust predictors of problem gambling included conformity to group norms in the interpersonal sphere and male gender and impulsivity in the intrapersonal sphere. Cross-national results were similar in different countries. The online context plays a major role in problem gambling behavior. The social ecological model is a useful tool by which to tackle problem gambling and develop preventative measures.
ARTICLE | doi:10.20944/preprints202005.0163.v1
Subject: Biology And Life Sciences, Virology Keywords: COVID-19; pulsoximeter; Internet of Things; maker culture; medically underserved area
Online: 9 May 2020 (10:55:48 CEST)
Family doctors can have an active role in identifying significant population needs and solutions. During COVID-19 epidemic, patient home monitoring with pulse oximetry has been a key aspect of care of patients. However, pandemics bring shortage medical equipment such as pulse oximetry. Through the local maker community in a matter of days four “smart” pulsoximeters were created and built. Following Internet of Things principles, the pulsoximeters were programmed to transmit recorded data through Wi-Fi, in real time, directly to the doctors. Each protype pulsoximeter served a family doctor during the pandemic. Building instructions were shared in maker-oriented websites, potentially leading to additional small-scale productions.
ARTICLE | doi:10.20944/preprints201912.0097.v1
Subject: Computer Science And Mathematics, Information Systems Keywords: IoT (Internet of Things); bot; botnet; propagation; nodes; sensor; infectious; mitigation
Online: 7 December 2019 (17:03:34 CET)
Nodes in wireless sensor networks (WSN) are characterized particularly by their limited power and memory capabilities. Limited memory is an important parameter as it defines the size of the operating system and the processing code. As established previously, energy and memory efficiency is the most important evaluation factors of WSNs as they are directly related to data loss and network lifetime. However, based on our simulation results, memory efficiency determines the selection or abandon of nodes by the botmaster for the propagation of bots in an IoT infrastructure. Consequently, the node’s memory efficiency determined the spread of bots in the network and provides defense actors with an insight of the botmaster behavior for mitigation of the attack. Conventional botnet propagation and mitigation models did not consider the impact of node’s memory efficiency in the IoT platform. To address this gap, we build IoT-SIEF, a novel propagation model with forensic capability that will analyze command and control propagation behavior based on the perspective of the node’s memory efficiency. IoT-SIEF model used to explore the dynamics of propagation using numerical simulation with more than 50% outperform other models in mitigating the number of secondary bots. Consequently, it can serve as a basis for assisting the planning, design, and defense of such networks from the investigator's point of view.
ARTICLE | doi:10.20944/preprints201905.0134.v2
Subject: Computer Science And Mathematics, Artificial Intelligence And Machine Learning Keywords: data aggregation methods; learning automata; RPL; routing; internet of thing (IoT)
Online: 15 May 2019 (12:28:23 CEST)
As a novel concept in technology and communication world, “Internet of Things (IoT)” has been emerged. In such modern technology, the capability to transmit data through data communication networks (such as Internet or Intranet) is provided for each organism (e.g. human being, animals, things, and so forth). Due to the limited hardware and communication operational capability as well as small dimensions, IoT undergoes quite a few challenges. Such inherent challenges not only cause fundamental restrictions in the efficiency of aggregation, transmission, and communication between nodes; but they also degrade routing performance. To cope with the reduced availability time and unstable communications among nodes, data aggregation and transmission approaches in such networks are designed more intelligently. In this paper, a distributed method is proposed to set child balance among nodes. In this method, the height of the network graph is increased through restricting the degree; and network congestion is reduced as a result. Besides, a dynamic data aggregation approach -named as LA-RPL- is proposed for RPL networks. More specifically, each node is equipped with learning automata in order to perform data aggregation and transmissions. Simulation results demonstrate that the proposed approach outperforms previously suggested based approaches in terms of energy consumption, network control overhead, and packet loss rate.
ARTICLE | doi:10.20944/preprints201902.0180.v2
Subject: Physical Sciences, Applied Physics Keywords: Zenneck waves; wireless power transfer; power; internet of things; electromagnetic shielding
Online: 7 May 2019 (10:06:47 CEST)
A decade ago, non-radiative wireless power transmission reemerged a promising alternative to deliver electrical power to devices where a physical wiring proved to be unfeasible. However, conventional coupling-based approaches are neither scalable nor efficient when multiple devices are involved, as they are restricted by factors like coupling and external environments. Zenneck waves are excited at interfaces, like surface plasmons and have the potential to deliver electrical power to devices placed on a conducting surface. Here, we demonstrate, efficient and long range delivery of electrical power by exciting non-radiative waves over metal surfaces to multiple loads.Our modeling and simulation using Maxwells equation with proper boundary conditions shows Zenneck type behavior for the excited waves and are in excellent agreement with experimental results. In conclusion, we physically realize a radically different power transfer system, based on a wave, whose existence has been fiercely debated for over a century.
ARTICLE | doi:10.20944/preprints201903.0069.v1
Subject: Engineering, Control And Systems Engineering Keywords: Healthcare; Internet of Things; IoT; Medical Assistance; Medical Kiosk; Rural people
Online: 6 March 2019 (10:29:46 CET)
After conducting a detailed survey among the villagers of Pallissery and Karukutty, it was observed that in most of the villages the native people have to travel long distances for their basic health needs. Also most of the villagers lack knowledge regarding live health updates. At times, these problems have even resulted in death of many people including pregnant women and children. The objective of our research is to propose an integrated and easy to use Medical Kiosk that can be installed at various locations in rural areas. The Kiosk will provide an integrated environment for all medical related activities and would perform numerous functions like sending notifications regarding medical camps, mobile medical help, important dates for vaccinations, child care, insurance policies and provide other live medical updates to the villagers. It would also support the basic facilities for measurement of body parameters like height, weight, BMI, blood pressure, and heartbeat and also facilitate live consultation facilities with specialized doctors through video and voice chats.
ARTICLE | doi:10.20944/preprints201901.0305.v1
Subject: Computer Science And Mathematics, Information Systems Keywords: Internet of Things; fog computing; security; blockchain; traffic; latency; SDN; OpenFlow
Online: 30 January 2019 (07:17:57 CET)
IoT is a new communication paradigm that gains a very high importance in the past few years. This communication paradigm supports various heterogeneous applications in many fields and with the dramatic increase of the number of sensor devices, it becomes a demand. Designing IoT networks faces many challenges that include security, massive traffic, high availability, high reliability and energy constraints. Thus, new communication technologies and paradigms should be deployed for IoT networks to overcome these challenges and achieve high system performance. Distributed computing techniques (e.g. fog and MEC), software defined networking (SDN), network virtualization and blockchain are common recent paradigms that should be deployed for IoT networks, either combined or individually, to achieve the main requirements of the IoT networks at a high system performance. Fog computing is a form of edge computing that has been developed to provide the computing capabilities (e.g. storage and processing) at the edge of the access network. Employing Fog computing in IoT networks, as an intermediate layer between IoT devices and the remote cloud, becomes a demand to make use of the edge computing benefits. In this work, we provide a framework for the IoT system structure that employs an edge computing layer of Fog nodes controlled and managed by SDN network with the blockchain technology to achieve a high level of security for latency sensitive IoT applications. The proposed system employs SDN network with distributed controllers and distributed OpenFlow switches; these switches are enabled with limited computing and processing capabilities. Furthermore, a data offloading algorithm is developed to allocate different processing and computing tasks to the distributed OpenFlow switches with available resources. Moreover, a traffic model is proposed to model and analyze the traffic among different parts of the network. The proposed work achieves various benefits to the IoT network, such as the latency reduction, security improvement and high efficiency of resources utilization. The proposed algorithm is simulated and also the proposed system is experimentally tested over a developed testbed to validate the proposed structure. Experimental results show that the proposed system achieves higher efficiency in terms of latency, security and resource utilization.
ARTICLE | doi:10.20944/preprints201811.0407.v1
Subject: Computer Science And Mathematics, Information Systems Keywords: participatory sensing; smart city; Internet of Things; distributed event-based systems
Online: 16 November 2018 (11:23:30 CET)
Since smart cities aim at becoming self-monitoring and self-response systems, their deployment relies on close resource monitoring through large-scale urban sensing. The subsequent gathering of massive amounts of data makes essential the development of event filtering mechanisms that enable the selection of what is relevant and trustworthy. Due to the rise of mobile event producers, location information has become a valuable filtering criterion as it not only offers extra information on the event described but also enhances trust on the producer. Implementing mechanisms that validate the quality of location information becomes then imperative. The lack of such strategies in cloud architectures compels the adoption of new communication schemes for IoT-based urban services. To serve the demand for location verification in urban event-based systems (DEBS), we have designed three different fog architectures that combine proximity and cloud communication. Moreover, we have successfully assessed their performance using network simulations with realistic urban traces.
ARTICLE | doi:10.20944/preprints201809.0381.v1
Subject: Engineering, Electrical And Electronic Engineering Keywords: energy internet; multi-energy complementary; integrated energy systems; distribution network planning
Online: 19 September 2018 (10:22:42 CEST)
Many research work has demonstrated that taken the Combined Cooling Heating and Power system (CCHP) as the core equipment, the integrated energy system (IES) can bring obvious benefit to energy efficiency, CO2 emission reduction and operation economy in urban areas. Compared with isolated IES, integrated energy micro-grid (IEMG) which is formed by connecting multiple regions IES together, through distribution and thermal network, can further improve the reliability, flexibility, cleanliness and economy of regional energy supply. Based on the existing IES model, this paper describes the basic structure of IEMG and built a IEMG planning model. The planning based on the mixed integer linear programming, and economically construction planning scheme are calculated by using known electricity, heating and cooling loads information and the given multiple equipment selection schemes. At last, the model is validated by a case study. The results show that the application of IEMG can effectively improve the economy of regional energy supply.
ARTICLE | doi:10.20944/preprints201610.0032.v1
Subject: Computer Science And Mathematics, Computer Networks And Communications Keywords: internet of thing; IoT; cognitive sensor networks; forwarding; spectrum-availability; retransmission
Online: 10 October 2016 (12:17:22 CEST)
The widespread proliferation of sensor nodes in the era of Internet of Things (IoT) coupled with increasing usage of wireless spectrums especially the ISM band makes it difficult to deploy real-life IoT. Currently, the cognitive radio technology enables sensor nodes communicate with each other through the licensed spectrum bands as well as the free ISM bands. Cognitive radio networks (CRSNs) are considered as a promising solution to the problem of spectrum under utilization and artificial radio spectrum scarcity. The paradigm of dynamic spectrum access allows secondary users (SUs) to utilize wireless spectrum resources which belong to primary users (PUs) with minimal interference to PUs. Due to the dynamic spectrum availability and quality, routing for SUs in multi-hop CRSNs is a challenge. In this paper, we introduce novel routing metrics that estimate both the future spectrum availability and the average transmission time with the consideration of both the global statistical spectrum usage and local instant spectrum resources. In our novel routing metrics, one retransmission is allowed and considered to reduce the probability of rerouting upon PU's arrival. Then, we propose two routing algorithms for multi-hop CRSNs. Finally, we conduct simulations, whose results show that our proposed algorithms lead to a significant performance improvement over the reference algorithm.
ARTICLE | doi:10.20944/preprints202306.0529.v1
Subject: Engineering, Other Keywords: Internet of Things; Performance; Raspberry Pi; Security; Devices; OpenSSL; Hash functions; Tests.
Online: 7 June 2023 (09:37:29 CEST)
Data security is a fundamental aspect to be considered in Internet of Things (IoT) information gathering systems, as IoT is a network of interconnected devices that collect and share real-time data, becoming increasingly prevalent in our lives. However, data security in IoT systems presents unique challenges due to the large number of devices and access points involved. This study aims to conduct a literature review on IoT security to analyze the performance of security mechanisms on current development platforms, specifically on a Raspberry Pi 3. Some functions from the OpenSSL library were used, including popular hash functions and cipher algorithms. Additionally, a bash code was developed to obtain the time spent in seconds and the memory consumption in kilobytes. In addition to time and memory calculations, statistical values such as variance and standard deviation were also obtained and compared with results obtained on a personal computer. The tests conducted in this study demonstrated that it is possible to implement these algorithms on platforms with more limited resources, with AES and RSA algorithms being the most suitable for IoT scenarios.
ARTICLE | doi:10.20944/preprints202305.1904.v1
Subject: Public Health And Healthcare, Public Health And Health Services Keywords: internet-delivered therapy; depression; anxiety; cultural adaptation; patient-oriented research; digital health
Online: 26 May 2023 (09:46:55 CEST)
There has been limited research on improving Internet-delivered Cognitive Behavioural Therapy (ICBT) in routine online therapy clinics that serve people from diverse ethnocultural groups (PDEGs). This article describes a patient-oriented adaptation approach used to address this gap in research. A working group consisting of people with lived experience, community stakeholders, ICBT clinicians, managers, and researchers, was formed. The working group examined archival feedback on ICBT from past clients who self-identified as being from diverse ethnocultural back-grounds (N=278) and results of interviews with current patients (N=16), community stakeholders (N=6), and clinicians (N=3). The archival data and interviews revealed the majority of the pa-tients reported being satisfied with and benefitting from ICBT. Suggestions for improvement were not related to the cognitive-behavioural model and techniques, but rather to making treatment materials more inclusive. Consequently, the ICBT adaptation focused on adding content related to cultural influences on mental health, addressing stigma, diversifying case stories, examples and imagery, adding audiovisual introductions, and replacing English idioms with more descriptive language. Moreover, further training was offered to clinicians and efforts were made to improve community outreach. This study demonstrates a process for using patient-oriented research to improve ICBT within routine care serving patients of diverse backgrounds.
ARTICLE | doi:10.20944/preprints202305.1178.v1
Subject: Engineering, Other Keywords: construction machinery leasing; Industrial Internet platform; closed-loop supply chain; coordination contract
Online: 17 May 2023 (04:07:15 CEST)
Leasing and recycling are important issues to achieve low-carbon sustainable development of construction machinery industry, however there are some dilemmas bothering which is caused by excessive restriction of product service life. Focusing on the problem of pricing and coordination, a two-stage model of leasing closed-loop supply chain based on the Industrial Internet platform practical application was proposed. Under the centralized and decentralized decision-making scenarios, the price of leasing and selling, maintenance effort and recovery rate are calculated respectively. By using the Shapley value method to optimize the selling price, and the two-part pricing contract to calculate the compensation fee, the global profit is reasonably distributed, while the supply chain achieving Pareto optimality. The performance of different contracts on the improvement of supply chain profit was investigated. And the correlation among parameters was also explored through sensitivity analysis and numerical simulation. The findings showed that maintenance and recycling of construction machinery can be improved with the advantage of the Industrial Internet platform, while achieving the supply chain coordination by contracts. The enhancement of maintenance effort can decrease the remanufacturing cost which is positively correlated to the selling price and leasing price of product, furthermore promoting the recovery rate of used products. In the future, reasonable control of platform cost can help improve the recycling of construction machinery.
ARTICLE | doi:10.20944/preprints202304.0831.v1
Subject: Environmental And Earth Sciences, Remote Sensing Keywords: Digital agriculture; Innovations, Artificial Intelligence; Internet of Things; Machine Learning; West Africa.
Online: 24 April 2023 (06:18:10 CEST)
Agriculture is the primary source of economic growth in many countries in West Africa. It provides food and livelihoods for the population. The purpose of this study is to review the digital agriculture status in five countries, namely Benin, Burkina Faso, Coˆte d’Ivoire, Ghana, and Nigeria. The study consisted of a bibliometric analysis using a database exported from the web of science through a well-defined search string. Additionally, the cases of digital technology deployment in the countries were assessed through a systematic review approach comparing the technologies used in the target countries. Representative articles from the bibliometric review published in the last five years were selected for the comparative analysis. The bibliometric analysis based on 3,249 publications revealed that the research interests have significantly increased since 2014. The top two countries in terms of authors’ nationality were Nigeria and Ghana, respectively. Climate change, Machine Learning (ML) and adoption were the hot topics of discussion. The digital agriculture survey showed that publications in Nigeria were focused on Internet of Things (IoT), Wireless Sensors Networks, blockchain, and Artificial Intelligence (IA) technologies. Ghana also has a strong interest in blockchain, AI, and big data, while Burkina Faso focused on IoT and AI. Cote d’Ivoire and Benin focused only on AI.
ARTICLE | doi:10.20944/preprints202304.0028.v1
Subject: Medicine And Pharmacology, Cardiac And Cardiovascular Systems Keywords: excessive Internet gaming; heart rate variability; high frequency; impulsivity, young male adults
Online: 3 April 2023 (13:46:36 CEST)
Several studies have reported a relationship between autonomic dysfunction during tasks and Internet addiction. Changes within 24 h regarding heart rate variability (HRV) may be a more sensitive indicator than short term observations. We evaluated the influence of excessive Internet usage on HRV using a 24 h electrocardiogram (ECG) and examined acute changes during computer game tasks. A total 13 high school students and 22 young adults were recruited, and divided into excessive Internet user and non- excessive user groups based on Internet addiction test scores. The ECG was recorded continuously for 24 h by a wearable sensor and during two computer games (the Iowa gambling task and each participant’s preferred game) using a standard type ECG system. Multiple psychometric tests were also conducted. The excessive Internet user group exhibited clinically significant depressive symptoms, and higher self-reported scores for anxiety, impulsivity, autistic tendencies, and sleep problems than the non- excessive internet user group. There were weak differences within the 24 h high-frequency (HF) band power between two groups. During the Iowa gambling task, younger participants exhibited a reduced HF response, which may be related to weaker top- down self- regulatory mechanisms.
ARTICLE | doi:10.20944/preprints202302.0306.v1
Subject: Engineering, Electrical And Electronic Engineering Keywords: Internet of Medical Things; physical unclonable functions; machine learning; security and privacy
Online: 17 February 2023 (08:40:29 CET)
The health equipment are used to keep track of significant health indicators, automate health interventions, and analyze health indicators. People have begun using mobile applications to track health characteristics and medical demands because all devices are linked to high-speed internet and phones. Such a combination of smart devices, the internet, and mobile applications expands the usage of remote health monitoring through the Internet of Medical Things (IoMT). The accessibility and unpredictable aspects of IoMT create massive security and confidentiality threats in IoMT systems. In this proposed paper - Octopus, Physically Unclonable Functions (PUFs) have been used to provide privacy to the healthcare device by masking the data, and machine learning (ML) technique is used to retrieve the health data back and for reducing security breaches on networks. This technique has exhibited 99.45% accuracy, which proves that this technique could be used to secure health data with masking.
ARTICLE | doi:10.20944/preprints202211.0425.v1
Subject: Engineering, Electrical And Electronic Engineering Keywords: Energy Internet; Energy Systems; IEEE Xplore; bibliometric analysis; actual research issues; VOSviewer
Online: 22 November 2022 (12:07:18 CET)
This article is devoted to a bibliometric analysis of IEEE Energy Internet and Energy Systems Integration Conference proceedings posted in IEEE Xplore in 2017-2021. The main objective of the study was to identify the actual research issues on the Energy Internet topic. Author Keywords, INSPEC Controlled Terms, and terms compiled from n-grams derived from conference papers title and abstract texts were used to describe the actual issues. The terms were clustered using VOSviewer, and the terms included in each cluster were treated as a description of the actual issues. Brief descriptions of several publications relevant to the issue in question were given for task detail. The actual issue, which in my opinion deserves further, more detailed analysis, is proposed.
ARTICLE | doi:10.20944/preprints202206.0223.v1
Subject: Computer Science And Mathematics, Artificial Intelligence And Machine Learning Keywords: biometrics; ECG; Internet of Things; machine learning; Personalised Healthcare; PPG; Smart Aging
Online: 15 June 2022 (10:31:04 CEST)
With the advent of modern technologies, the healthcare industry is moving towards a more Personalised smart care model. The enablers of such care models are the Internet of Things (IoT) and Artificial Intelligence. These technologies collect and analyse data from persons in care to alert relevant parties if any anomaly is detected in a patient’s regular pattern. However, such reliance on IoT devices to capture continuous data extends the attack surfaces and demands high-security measures. Both patients and devices need to be authenticated to mitigate a large number of attack vectors. The biometric authentication method has been seen as a promising technique in these scenarios. To this end, this paper proposes an AI-based multimodal biometric authentication model for single and group-based users’ device-level authentication that increases protection against the traditional single modal approach. To test the efficacy of the proposed model, a series of AI models are trained and tested using physiological biometric features such as ECG (Electrocardiogram) and PPG (Photoplethysmography) signals from five publicly available datasets from Physionet and Mendeley data repositories. The multimodal fusion authentication model shows promising results with 99.8% accuracy and an Equal Error Rate (EER) of 0.16.
REVIEW | doi:10.20944/preprints202202.0083.v2
Subject: Computer Science And Mathematics, Artificial Intelligence And Machine Learning Keywords: Machine Learning; COVID-19; Internet of Things (IoT); Deep Learning; Big Data
Online: 19 April 2022 (08:21:00 CEST)
Early diagnosis, prioritization, screening, clustering and tracking of COVID-19 patients, and production of drugs and vaccines are some of the applications that have made it necessary to use a new style of technology to involve, to manage and deal with this epidemic. Strategies backed by artificial intelligence (AI) and the Internet of Things (IoT) have been undeniable to understand how the virus works and try to prevent it from spreading. Accordingly, the main aim of this survey article is to highlight the methods of ML, IoT and the integration of IoT and ML-based techniques in the applications related to COVID-19 from the diagnosis of the disease to the prediction of its outbreak. According to the main findings, IoT provided a prompt and efficient approach of following the disease spread. Most of the studies developed by ML-based techniques for handling COVID-19 based dataset provided performance criteria. The most popular performance criteria, is related to accuracy factor. It can be employed for comparing the ML-based methods with different datasets. According to the results, CNN with SVM classifier, Genetic CNN and pre-trained CNN followed by ResNet, provided highest accuracy values. On the other hand, the lowest accuracy was related to single CNN followed by XGboost and KNN methods.
ARTICLE | doi:10.20944/preprints202203.0161.v1
Subject: Computer Science And Mathematics, Artificial Intelligence And Machine Learning Keywords: multi-agent systems; multi-agent reinforcement learning; internet of vehicles; urban area
Online: 11 March 2022 (05:13:15 CET)
Smart Internet of Vehicles (IoVs) combined with Artificial Intelligence (AI) will contribute to vehicle decision-making in the Intelligent Transportation System (ITS). Multi-Vehicle Pursuit games (MVP), a multi-vehicle cooperative ability to capture mobile targets, is becoming a hot research topic gradually. Although there are some achievements in the field of MVP in the open space environment, the urban area brings complicated road structures and restricted moving spaces as challenges to the resolution of MVP games. We define an Observation-constrained MVP (OMVP) problem in this paper and propose a Transformer-based Time and Team Reinforcement Learning scheme (T3OMVP) to address the problem. First, a new multi-vehicle pursuit model is constructed based on decentralized partially observed Markov decision processes (Dec-POMDP) to instantiate this problem. Second, by introducing and modifying the transformer-based observation sequence, QMIX is redefined to adapt to the complicated road structure, restricted moving spaces and constrained observations, so as to control vehicles to pursue the target combining the vehicle’s observations. Third, a multi-intersection urban environment is built to verify the proposed scheme. Extensive experimental results demonstrate that the proposed T3OMVP scheme achieves significant improvements relative to state-of-the-art QMIX approaches by 9.66%~106.25%. Code is available at https://github.com/pipihaiziguai/T3OMVP.
ARTICLE | doi:10.20944/preprints202108.0472.v1
Subject: Social Sciences, Psychology Keywords: adolescents; Internet addiction; game addiction; social media addiction; sleep problems; daytime sleepiness
Online: 24 August 2021 (14:07:14 CEST)
This study aims to establish a link between disturbances in the night sleep habitus, quality of sleep, and daytime sleepiness in adolescents with Internet addiction and different types of content consumed. Methods: This is a cross-sectional observational study of a school sample in three large cities in Central Siberia. 4,615 schoolchildren of 12–18 years old were examined. The Russian-language versions of the Chen Internet Addiction Scale, the Game Addiction Scale for Adolescents, and the Social Media Disorder Scale were used to identify Internet addiction. Questions from the Pittsburgh Sleep Quality Index questionnaire were used to assess nighttime sleep. Daytime sleepiness was assessed using the Pediatric Daytime Sleepiness Scale questionnaire. Results: Adolescents with Internet addiction go to bed and wake up late; they are characterized by a decrease in the duration of nighttime sleep, an increase in sleep onset latency, and frequent nighttime awakenings, as well as more pronounced daytime sleepiness. Among the sleep parameters studied, the indicators of daytime sleepiness and night awakening scales have the highest effect size in Internet-addicted adolescents, regardless of the media consumed. Conclusion: Internet-addicted adolescents are characterized by significant disturbances in the quality of nighttime sleep and excessive daytime sleepiness, which requires appropriate psychological correction.
ARTICLE | doi:10.20944/preprints202107.0429.v1
Subject: Computer Science And Mathematics, Algebra And Number Theory Keywords: Blockchain; Multi-Factor Authentication; Access Control; Internet of Vehicles; Cloud-Enabled Systems
Online: 20 July 2021 (09:27:29 CEST)
Continuous and emerging advances in Information and Communication Technology (ICT) have enabled IoT-to-Cloud applications to be induced by data pipelines coupled with Edge Intelligence-based architectures. Advanced vehicular networks greatly benefit from these architectures due to the implicit functionalities that are focused on realizing the Internet-of-Vehicle (IoV) vision. However, IoV is susceptible to attacks, where adversaries can easily exploit existing vulnerabilities. Several attacks may succeed due to inadequate or weaker authentication techniques. Hence, there is a timely need for hardening the authentication process through cutting-edge access control mechanisms. This paper proposes a Blockchain-based Multi-Factor authentication model that uses an embedded Digital Signature (MFBC_eDS) for vehicular clouds and Cloud-enabled IoV. Our proposed MFBC_eDS model consists of a scheme that integrates the Security Assertion Mark-up Language (SAML) to the Single Sign-On (SSO) capabilities for a connected Edge-to Cloud ecosystem. MFBC_eDS draws an essential comparison with the baseline authentication scheme suggested by Karla and Sood. Based on the foundations of Karla and Sood’s scheme, an embedded Probabilistic Polynomial-Time Algorithm (ePPTA) and an additional Hash function for the Pi generated during Karla and Sood’s authentication are proposed and discussed. The preliminary analysis of the proposition shows that the approach is more suitable to counter major adversarial attacks in an IoV-centered environment based on Dolev-Yao adversarial model while satisfying aspects of the CIA triad.
ARTICLE | doi:10.20944/preprints202107.0399.v1
Subject: Social Sciences, Psychology Keywords: mental health; psychosomatic rehabilitation; internet delivered digital trainings; multidisciplinary and interdisciplinary interventions
Online: 19 July 2021 (09:32:39 CEST)
The need for new technologies into healthcare services has been stressed. However, little is known about the effectiveness of digital interventions integrated in psychosomatic rehabilitation processes. Data from 724 patients from psychosomatic rehabilitation clinics were analyzed for effectiveness of digital trainings examined by a change in symptoms related to depression, anxiety, stress and loneliness from pre- to post-rehabilitation. Rehabilitation satisfaction was examined in association with reaching rehabilitation goals and satisfaction with communication. Mixed repeated measures analysis of covariances, analysis of covariances, and hierarchical stepwise regression analyses were performed. Results indicated a superior effectiveness for the intervention group receiving all offered digital treatments in addition to the regular face-to-face rehabilitation program with regard to symptoms of depression, F(2,674)=3.93, p<.05, ηp2=.01), and anxiety, F(2,678)=3.68, p<.05, ηp2=.01), post-rehabilitation with large effect sizes for both depression (d=1.28) and anxiety (d=1.08). In addition, rehabilitation satisfaction was positively associated with reaching rehabilitation goals and perceived communication with healthcare workers. Digital interventions appeared effective in supporting mental health of psychosomatic rehabilitation patients post-rehabilitation. This finding supports the inclusion of multidisciplinary and interdisciplinary digital and face-to-face treatment programs and call for more implementations of new technologies in a context of complexity to improve health and healthcare service.
ARTICLE | doi:10.20944/preprints202011.0650.v1
Subject: Computer Science And Mathematics, Algebra And Number Theory Keywords: Internet of Thing (IoT); Hierarchical Routing; Overlap clustering; Fog computing; Cloud computing
Online: 25 November 2020 (15:16:33 CET)
Considering the great growth of IoT networks and the need for highly reliable networks and also considering the manufacturing divides of IoT equipment which are highly limited by their memory, processing power and battery; we need a highly efficient routing for guaranteeing our network's high life span. So, this paper has suggested an efficient energy routing method based on the overlapping clustering method which is inspired from the Grey theory. The Overlap clustering method means that some Things collect data that must be sent to two or more Fog nodes for processing. In the suggested method the best node is selected as the cluster head based on factors such as remaining energy, distance, link expiration time, signal power for receiving data from things by the Fog nodes. In the next step the Fog node's data are sent in a hierarchical method using a symmetrical tree of processed data to the server. Thus, the main issue here is making using a proper routing method for data sending to the Cloud that doesn't just focus on energy, but also considers other factors such as delay and network life span. The simulation results show that the HR-IoT reduces the average end to end delay more than 17.2% and 23.1%, decreases the response time more than 20.1% and 25.78% and increase packet delivery rate more than 23.1% and 28.78% and lifetime more than 25.1% and 28.78% compared to EECRP and ERGID approaches.
ARTICLE | doi:10.20944/preprints202011.0624.v1
Subject: Computer Science And Mathematics, Algebra And Number Theory Keywords: Internet of Things; Load aware; Energy-efficient; Gray System Theory; Multipath protocol
Online: 24 November 2020 (16:23:43 CET)
Internet of things (IoT) is a network of smart things. This indicates the ability of these physical things to transfer information with other physical things. The characteristics of these networks, such as topology dynamicity and energy constraint, challenges the routing problem in these networks. Previous routing methods could not achieve the required performance in this type of network. Therefore, developers of this network designed and developed specific methods in order to satisfy the requirements of these networks. One of the routing methods is utilization of multipath protocols which send data to its destination using routes with separate links. One of such protocols is RPL routing protocol. In this paper, this method is improved using composite metrics which chooses the best paths used for separate routes to send packets. We propose Energy and Load aware RPL (ELaM-IoT) protocol, which is an enhancement of RPL protocol. It uses a composite metric, calculated based on remaining energy, hop count, Link Expiration Time (LET), load and battery depletion index (BDI) for the route selection. In order to evaluate and report the results, the proposed ELaM-IoT method is compared to the ERGID and ADRM-IoT approaches with regard to average remaining energy, and network lifetime. The results demonstrate the superior performance of the proposed ELaM-IoT compared to the ERGID and ADRM-IoT approaches.
ARTICLE | doi:10.20944/preprints202006.0180.v1
Subject: Computer Science And Mathematics, Information Systems Keywords: mHealth; Blockchain; Internet of Things; Smart devices; Communication; Smart Devices; Emerging Technologies
Online: 14 June 2020 (15:07:26 CEST)
The mHealth is a term that is used for mobile health supported by smart devices such as mobile phones, tablets, and wearable smart devices, etc. The smart devices strengthen the efficiency and effectiveness of interaction with patients, physicians, and specialists. Patients nowadays would like to be intimately involved in their diagnosis as well as to make more informed decisions concerning their care. It has begun to measure the success of the quality of treatment. This was a reason that patients trust mHealth to provide them with consistency in their communications with the physicians. Most wireless strategies do not measure up to this standard so that patient engagement ultimately ended up decreasing. The blockchain can boost mHealth through storing and sharing electronic data securely and transparently. It can enhance the accessibility of patient information in real-time. The Internet of Things (IoT) provides a unique identification number to every connected device such as mobile devices, medical devices, and wearable devices. This framework uses the blockchain and IoT technologies together to provide quick help to the patients, monitor remotely, reduce the cost and unnecessarily hospitalization physically and find the real diagnosis. In order to increase patient involvement, mHealth framework with blockchain and IoT technologies has built with the key objective of providing patients with full information on their treatment and diagnosis.
ARTICLE | doi:10.20944/preprints202002.0294.v1
Subject: Engineering, Electrical And Electronic Engineering Keywords: bitmap indexing; processing in memory; memory wall; Big Data; Internet Of Things
Online: 20 February 2020 (08:24:48 CET)
To live in the information society means to be surrounded by billions of electronic devices full of sensors that constantly acquire data. This enormous amount of data must be processed and classified. A solution commonly adopted is to send these data to server farms to be remotely elaborated. The drawback is a huge battery drain due to high amount of information that must be exchanged. To compensate this problem data must be processed locally, near the sensor itself. But this solution requires huge computational capabilities. While microprocessors, even mobile ones, nowadays have enough computational power, their performance are severely limited by the Memory Wall problem. Memories are too slow, so microprocessors cannot fetch enough data from them, greatly limiting their performance. A solution is the Processing-In-Memory (PIM) approach. New memories are designed that are able to elaborate data inside them eliminating the Memory Wall problem. In this work we present an example of such system, using as a case of study the Bitmap Indexing algorithm. Such algorithm is used to classify data coming from many sources in parallel. We propose an hardware accelerator designed around the Processing-In-Memory approach, that is capable of implementing this algorithm and that can also be reconfigured to do other tasks or to work as standard memory. The architecture has been synthesized using CMOS technology. The results that we have obtained highlights that, not only it is possible to process and classify huge amount of data locally, but also that it is possible to obtain this result with a very low power consumption.
ARTICLE | doi:10.20944/preprints202001.0304.v1
Subject: Computer Science And Mathematics, Computer Science Keywords: Internet of Things (IoT); Gray System Theory; Multi-Path Routing; GSTMPR-IoT
Online: 26 January 2020 (04:00:20 CET)
Internet of things (IoT) is a network of smart things. This indicates the ability of these physical things to transfer information with other physical things. IoT has introduced various services and daily human life depends on its reliable and accessible operation. The characteristics of these networks, such as topology dynamicity and energy constraint, challenges the routing problem in these networks. Previous routing methods could not achieve the required performance in this type of network. Therefore, developers of this network designed and developed specific methods in order to satisfy the requirements of these networks. One of the routing methods is utilization of multi-path protocols which send data to its destination using routs with separate links. One of such protocols is AOMDV routing protocol. AOMDV protocol is a multi-path protocol which uses multiple different paths for sending information in order to maintain the network traffic balance, manage and control node energy, decrease latency, etc. In this paper, this method is improved using gray system theory which chooses the best paths used for separate routes to send packets. To do this, AOMDV packet format is altered and some fields are added to it so that energy criteria, link expiration time, and signal to noise ratio can also be considered while selecting the best route. The proposed method named GSTMPR-IoT is introduced which chooses the routs with highest rank for concurrent transmission of data, using a specific routine based on the gray system theory. In order to evaluate and report the results, the proposed GSTMPR-IoT method is compared to the EECRP and AOMDV approaches with regard to throughput, packet delivery rate, end to end delay, average residual energy, and network lifetime. The results demonstrate the superior performance of the proposed GSTMPR-IoT compared to the EECRP and AOMDV approaches.
ARTICLE | doi:10.20944/preprints202001.0303.v1
Subject: Computer Science And Mathematics, Security Systems Keywords: Internet of Things (IoT); physical layer attack; routing security; Average Packet Transmission
Online: 26 January 2020 (03:57:09 CET)
Through the Internet of Things (IoT) the internet scope is established by the aid of physical objects integration to classify themselves to mutual things. A physical object can be created by this inventive perception to signify itself in the digital world. Regarding the physical objects that are related to the internet, it is worth to mention that considering numerous theories and upcoming predictions, they mostly require protected structures, moreover, they are at risk of several attacks. IoTs are endangered by particular routing disobedience called physical layer attack owing to their distributed features. The physical layer attack as a security warning makes possible for the invader to abuse the resources and bandwidth of the network through overloading the network via unimportant packets. This protocol is called LSFA-IoT consisting of two key sections of the physical layer detection system and misbehavior detection system. The first section is utilized in stabilizing the status of the network. The second section is in charge of discovering the misbehavior sources within the IoT network through , the Average Packet Transmission RREQ. By detecting a malicious node, the status of the node is checked by LSFA-IoT prior to sending a data packet and in case detecting the node as malicious, no packet is sent to that node and that node is added to the detention list. Here, the technique is assessed through wide simulations performed within the NS-3 environment. Based on the results of the simulation, it is indicated that the IoT network behaviour metrics are enhanced based on the detection rate, false-negative rate, false-positive rate, and packet delivery rate.
Subject: Engineering, Control And Systems Engineering Keywords: Internet of Things(IoTs); Challenges; Test Strategies; Quality Assurance; Suggestion; Interoperability; Security
Online: 10 December 2019 (16:15:13 CET)
Immense challenges arise in the Quality Assurance area due to contemporary development in Internet of Things (IoT) technology. Current issues are mainly related to test coverage, test diversity, IoT Stability, Use of Cellular Networks in IoTs, IoT Devices updates, Security, Data Integration, and interoperability. In this paper, we present all those issues with suggestions for tackling those issues.