WorldWideScience

Sample records for io sodium cloud

  1. A survey of IoT cloud platforms

    Directory of Open Access Journals (Sweden)

    Partha Pratim Ray

    2016-12-01

    Full Text Available Internet of Things (IoT envisages overall merging of several “things” while utilizing internet as the backbone of the communication system to establish a smart interaction between people and surrounding objects. Cloud, being the crucial component of IoT, provides valuable application specific services in many application domains. A number of IoT cloud providers are currently emerging into the market to leverage suitable and specific IoT based services. In spite of huge possible involvement of these IoT clouds, no standard cum comparative analytical study has been found across the literature databases. This article surveys popular IoT cloud platforms in light of solving several service domains such as application development, device management, system management, heterogeneity management, data management, tools for analysis, deployment, monitoring, visualization, and research. A comparison is presented for overall dissemination of IoT clouds according to their applicability. Further, few challenges are also described that the researchers should take on in near future. Ultimately, the goal of this article is to provide detailed knowledge about the existing IoT cloud service providers and their pros and cons in concrete form.

  2. High Resolution Integral Field Spectroscopy of Europa's Sodium Clouds: Evidence for a Component with Origins in Iogenic Plasma.

    Science.gov (United States)

    Schmidt, C.; Johnson, R. E.; Mendillo, M.; Baumgardner, J. L.; Moore, L.; O'Donoghue, J.; Leblanc, F.

    2015-12-01

    With the object of constraining Iogenic contributions and identifying drivers for variability, we report new observations of neutral sodium in Europa's exosphere. An R~20000 integral field spectrograph at McDonald Observatory is used to generate Doppler maps of sodium cloud structures with a resolution of 2.8 km/s/pixel. In the five nights of observations since 2011, measurements on UT 6.15-6.31 May 2015 uniquely feature fast (10s of km/s) neutral sodium clouds extending nearly 100 Europa radii, more distant than in any previous findings. During these measurements, the satellite geometry was favorable for the transfer of Na from Io to Europa, located at 1:55 to 4:00 and 3:38 to 4:39 Jovian local time, respectively. Eastward emission (away from Jupiter) extends 10-20 Europa radii retaining the moon's rest velocity, while westward emission blue-shifts with distance, and a broad range of velocities are measured, reaching at least 70 km/s at 80 Europa radii. These cloud features are distinct from Io's "banana" and "stream" features, the distant Jupiter-orbiting nebula, and from terrestrial OH and Na contaminant emissions. Io's production was quiescent during this observation, following an extremely active phase in February 2015. These results are consistent with previous findings that Europa's Na exosphere has peak emission between midnight and dawn Jovian local time and support the idea that sodium escape from Io can significantly enhance the emission intensity measured at Europa.

  3. iOS cloud development dor dummies

    CERN Document Server

    Goldstein, Neal

    2012-01-01

    Want to create robust, data-driven, iOS cloud apps? This book makes it easier! Apple's mobile operating system (iOS) supports iPhones, iPads, iPods and other Apple devices, and while even beginners can now develop apps to run just on these devices themselves, sometimes you want to create an app with more heft. Applications such as live weather reports or multi-player games require a lot of data to be pulled from outside—often from cloud-based Web Services, such as Google or Amazon. This book, written by application development experts Sujee Maniyam and Neal Goldstein, shows you how to we

  4. A Location-Based Interactive Model of Internet of Things and Cloud (IoT-Cloud) for Mobile Cloud Computing Applications.

    Science.gov (United States)

    Dinh, Thanh; Kim, Younghan; Lee, Hyukjoon

    2017-03-01

    This paper presents a location-based interactive model of Internet of Things (IoT) and cloud integration (IoT-cloud) for mobile cloud computing applications, in comparison with the periodic sensing model. In the latter, sensing collections are performed without awareness of sensing demands. Sensors are required to report their sensing data periodically regardless of whether or not there are demands for their sensing services. This leads to unnecessary energy loss due to redundant transmission. In the proposed model, IoT-cloud provides sensing services on demand based on interest and location of mobile users. By taking advantages of the cloud as a coordinator, sensing scheduling of sensors is controlled by the cloud, which knows when and where mobile users request for sensing services. Therefore, when there is no demand, sensors are put into an inactive mode to save energy. Through extensive analysis and experimental results, we show that the location-based model achieves a significant improvement in terms of network lifetime compared to the periodic model.

  5. A Location-Based Interactive Model of Internet of Things and Cloud (IoT-Cloud for Mobile Cloud Computing Applications

    Directory of Open Access Journals (Sweden)

    Thanh Dinh

    2017-03-01

    Full Text Available This paper presents a location-based interactive model of Internet of Things (IoT and cloud integration (IoT-cloud for mobile cloud computing applications, in comparison with the periodic sensing model. In the latter, sensing collections are performed without awareness of sensing demands. Sensors are required to report their sensing data periodically regardless of whether or not there are demands for their sensing services. This leads to unnecessary energy loss due to redundant transmission. In the proposed model, IoT-cloud provides sensing services on demand based on interest and location of mobile users. By taking advantages of the cloud as a coordinator, sensing scheduling of sensors is controlled by the cloud, which knows when and where mobile users request for sensing services. Therefore, when there is no demand, sensors are put into an inactive mode to save energy. Through extensive analysis and experimental results, we show that the location-based model achieves a significant improvement in terms of network lifetime compared to the periodic model.

  6. A Location-Based Interactive Model of Internet of Things and Cloud (IoT-Cloud) for Mobile Cloud Computing Applications †

    Science.gov (United States)

    Dinh, Thanh; Kim, Younghan; Lee, Hyukjoon

    2017-01-01

    This paper presents a location-based interactive model of Internet of Things (IoT) and cloud integration (IoT-cloud) for mobile cloud computing applications, in comparison with the periodic sensing model. In the latter, sensing collections are performed without awareness of sensing demands. Sensors are required to report their sensing data periodically regardless of whether or not there are demands for their sensing services. This leads to unnecessary energy loss due to redundant transmission. In the proposed model, IoT-cloud provides sensing services on demand based on interest and location of mobile users. By taking advantages of the cloud as a coordinator, sensing scheduling of sensors is controlled by the cloud, which knows when and where mobile users request for sensing services. Therefore, when there is no demand, sensors are put into an inactive mode to save energy. Through extensive analysis and experimental results, we show that the location-based model achieves a significant improvement in terms of network lifetime compared to the periodic model. PMID:28257067

  7. Radial and azimuthal distribution of Io's oxygen neutral cloud observed by Hisaki/EXCEED

    Science.gov (United States)

    Koga, R.; Tsuchiya, F.; Kagitani, M.; Sakanoi, T.; Yoneda, M.; Yoshikawa, I.; Yoshioka, K.; Murakami, G.; Yamazaki, A.; Kimura, T.; Smith, H. T.

    2017-12-01

    We report the spatial distributions of oxygen neural cloud surrounding Jupiter's moon Io and along Io's orbit observed by the HISAKI satellite. Atomic oxygen and sulfur in Io's atmosphere escape from the exobase and move to corona ( 5.8 Io radii) mainly due to atmospheric sputtering. Io plasma torus is formed by ionization of these atoms by electron impact and charge exchange processes. It is essential to examine the dominant source of Io plasma torus, particularly in the vicinity of Io (5.8 Io radii; extended neutral clouds). The spatial distribution of oxygen and sulfur neutral clouds is important to understand the source. The extreme ultraviolet spectrometer called EXCEED (Extreme Ultraviolet Spectroscope for Exospheric Dynamics) installed on the Hisaki satellite observed Io plasma torus continuously in 2014-2015, and we carried out the monitoring of the distribution of atomic oxygen emission at 130.4 nm. The emission averaged over the distance range of 4.5-6.5 Jovian radii on the dawn and dusk sides strongly depends on the Io phase angle (IPA), and has a emission peak between IPA of 60-90 degrees on the dawn side, and between 240-270 degrees on the dusk side, respectively. It also shows the asymmetry with respect to Io's position: the intensity averaged for IPA 60-90 degrees (13.3 Rayleighs (R)) is 1.2 times greater than that for IPA 90-120 degrees (11.1 R) on the dawn side. The similar tendency is found on the dusk side. Weak atomic oxygen emission (4 R) uniformly distributes in every IPA. We also examined the radial distribution of the oxygen neutral cloud during the same period and found the emission peak near Io's orbit with decreasing the intensity toward 8.0 Jupiter radii. The results show the high density component of the oxygen neutral cloud is concentrated around Io and extends mainly toward leading side of Io. In addition, the low density neutrals uniformly exist along Io's orbit. Both components extend radially outward up to 8 Jovian radii with

  8. City Hub : a cloud based IoT platform for Smart Cities

    OpenAIRE

    Lea, Rodger; Blackstock, Michael

    2014-01-01

    Cloud based Smart City hubs are an attractive approach to addressing some of the complex issues faced when deploying PaaS infrastructure for Smart Cities. In this paper we introduce the general notion of IoT hubs and then discusses our work to generalize our IoT hub as a Smart City PaaS. Two key issues are identified, support for hybrid public/private cloud and interoperability. We briefly describe our approach to these issues and discuss our experiences deploying two cloud-based Smart City h...

  9. A General Cross-Layer Cloud Scheduling Framework for Multiple IoT Computer Tasks.

    Science.gov (United States)

    Wu, Guanlin; Bao, Weidong; Zhu, Xiaomin; Zhang, Xiongtao

    2018-05-23

    The diversity of IoT services and applications brings enormous challenges to improving the performance of multiple computer tasks' scheduling in cross-layer cloud computing systems. Unfortunately, the commonly-employed frameworks fail to adapt to the new patterns on the cross-layer cloud. To solve this issue, we design a new computer task scheduling framework for multiple IoT services in cross-layer cloud computing systems. Specifically, we first analyze the features of the cross-layer cloud and computer tasks. Then, we design the scheduling framework based on the analysis and present detailed models to illustrate the procedures of using the framework. With the proposed framework, the IoT services deployed in cross-layer cloud computing systems can dynamically select suitable algorithms and use resources more effectively to finish computer tasks with different objectives. Finally, the algorithms are given based on the framework, and extensive experiments are also given to validate its effectiveness, as well as its superiority.

  10. QAaaS in a Cloud IoT Ecosystem

    Directory of Open Access Journals (Sweden)

    Bogdan GHILIC-MICU

    2017-01-01

    Full Text Available The current transition state of the global society, both from economic and (mostly technological perspective, goes – again – into overtime. Borrowed from fundamental domains and applied into science and research, the latest technological developments are built on graphene, silicene, phosphorene and stanene. The fourth industrial revolution changes perceptions and redefines the status of the individual, transforming him from con-sumer into pro-sumer of energy. Spintronics stimulates the production of accessories specific to the Internet of Things (IoT, like smart clothes connected to internet and implanted phones. Additionally, technology influences software development methodologies facing us with paradigms that transcend philosophies like green, grid, cloud computing and advance toward a superior manifestation of computer programming: Fog Computing (with the next level being presumably Rainbow Computing. Within this avalanche of transformations, technologies and paradigms, one aspect that has to evolve continuously is the quality assurance (QA. Hidden under various concept or methodology encapsulations, quality assurance in all fields and mostly in technological development and software paradigm play a key role. In an ecosystem defined by the context of Cloud IoT, quality assurance as service becomes a real challenge. In this paper we highlight the ways the ecosystem engages in its development not only things, beings, energies, sensors or objects but also technologies. One such popular technology is cloud computing which, in the context of IoT, sees a spectacular development of its own cluster of services, a potential such service being QAaaS.

  11. The atmosphere and ionosphere of Io

    International Nuclear Information System (INIS)

    McElroy, M.B.; Yung, Y.L.

    1975-01-01

    A variety of models for Io's atmosphere, ionosphere, surface, and environment are developed and discussed in the context of recent observational data. The sodium emission detected by Brown appears to require a collisional excitation process in Io's atmosphere, and the extended sodium emission measured by Trafton et al. may require scattering of the planetary radiation by an extended sodium cloud. The sodium is presumably present initially in bound form on Io's surface and may be released by the sputtering mechanism suggested by Matson et al. The ionosphere detected by the radio occultation experiment on Pioneer 10 could be attributed to photoionization of atmospheric sodium if Io's atmosphere could sustain significant vertical motions, of order 1 s/sup -1/ directed up during the day, down at night. Vertical motions of this magnitude could be driven by condensation of atmospheric NH 3 . The total density of gas at Io's surface appears to lie in the range 10 10 -10 12 molecules cm/sup -3/. Corpuscular ionization could play an additional role for the ionosphere. In this case the sateSe should exhibit an exceedingly bright, approx.10 kR, airglow at Lα. The incomplete hydrogen torus observed by Judge and Carlson in the vicinity of Io requires a large supply of hydrogen from the satellite's atmosphere. The escape flux should be of order 10 11 cm/sup -2/ s/sup -1/ and could be maintained by photolysis of atmospheric NH 3 . The observed geometry of the hydrogen torus appears to require a surprisingly short lifetime, approx.10 5 s, for neutral hydrogen near Io's orbit, and may indicate the presence of a large flux, approx.10 9 cm/sup -2/ s/sup -1/, of low-energy protons in Jupiter's magnetosphere. Implications of the hydrogen torus for the energy and mass balance of Jupiter's magnetosphere are discussed briefly, and observational programs are identified which might illuminate present uncertainties in our understanding of Io

  12. Design and Implementation of Cloud-Centric Configuration Repository for DIY IoT Applications.

    Science.gov (United States)

    Ahmad, Shabir; Hang, Lei; Kim, Do Hyeun

    2018-02-06

    The Do-It-Yourself (DIY) vision for the design of a smart and customizable IoT application demands the involvement of the general public in its development process. The general public lacks the technical knowledge for programming state-of-the-art prototyping and development kits. The latest IoT kits, for example, Raspberry Pi, are revolutionizing the DIY paradigm for IoT, and more than ever, a DIY intuitive programming interface is required to enable the masses to interact with and customize the behavior of remote IoT devices on the Internet. However, in most cases, these DIY toolkits store the resultant configuration data in local storage and, thus, cannot be accessed remotely. This paper presents the novel implementation of such a system, which not only enables the general public to customize the behavior of remote IoT devices through a visual interface, but also makes the configuration available everywhere and anytime by leveraging the power of cloud-based platforms. The interface enables the visualization of the resources exposed by remote embedded resources in the form of graphical virtual objects (VOs). These VOs are used to create the service design through simple operations like drag-and-drop and the setting of properties. The configuration created as a result is maintained as an XML document, which is ingested by the cloud platform, thus making it available to be used anywhere. We use the HTTP approach for the communication between the cloud and IoT toolbox and the cloud and real devices, but for communication between the toolbox and actual resources, CoAP is used. Finally, a smart home case study has been implemented and presented in order to assess the effectiveness of the proposed work.

  13. Design and Implementation of Cloud-Centric Configuration Repository for DIY IoT Applications

    Directory of Open Access Journals (Sweden)

    Shabir Ahmad

    2018-02-01

    Full Text Available The Do-It-Yourself (DIY vision for the design of a smart and customizable IoT application demands the involvement of the general public in its development process. The general public lacks the technical knowledge for programming state-of-the-art prototyping and development kits. The latest IoT kits, for example, Raspberry Pi, are revolutionizing the DIY paradigm for IoT, and more than ever, a DIY intuitive programming interface is required to enable the masses to interact with and customize the behavior of remote IoT devices on the Internet. However, in most cases, these DIY toolkits store the resultant configuration data in local storage and, thus, cannot be accessed remotely. This paper presents the novel implementation of such a system, which not only enables the general public to customize the behavior of remote IoT devices through a visual interface, but also makes the configuration available everywhere and anytime by leveraging the power of cloud-based platforms. The interface enables the visualization of the resources exposed by remote embedded resources in the form of graphical virtual objects (VOs. These VOs are used to create the service design through simple operations like drag-and-drop and the setting of properties. The configuration created as a result is maintained as an XML document, which is ingested by the cloud platform, thus making it available to be used anywhere. We use the HTTP approach for the communication between the cloud and IoT toolbox and the cloud and real devices, but for communication between the toolbox and actual resources, CoAP is used. Finally, a smart home case study has been implemented and presented in order to assess the effectiveness of the proposed work.

  14. An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing

    Directory of Open Access Journals (Sweden)

    Jin-Xin Hu

    2017-01-01

    Full Text Available Internet of Things (IoT is the network of physical objects where information and communication technology connect multiple embedded devices to the Internet for collecting and exchanging data. An important advancement is the ability to connect such devices to large resource pools such as cloud. The integration of embedded devices and cloud servers offers wide applicability of IoT to many areas of our life. With the aging population increasing every day, embedded devices with cloud server can provide the elderly with more flexible service without the need to visit hospitals. Despite the advantages of the sensor-cloud model, it still has various security threats. Therefore, the design and integration of security issues, like authentication and data confidentiality for ensuring the elderly’s privacy, need to be taken into consideration. In this paper, an intelligent and secure health monitoring scheme using IoT sensor based on cloud computing and cryptography is proposed. The proposed scheme achieves authentication and provides essential security requirements.

  15. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO.

    Science.gov (United States)

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-02-07

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy.

  16. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO

    Science.gov (United States)

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-01-01

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy. PMID:28178214

  17. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO

    Directory of Open Access Journals (Sweden)

    Antonio Celesti

    2017-02-01

    Full Text Available Nowadays, in the panorama of Internet of Things (IoT, finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy.

  18. Access Control in IoT/M2M - Cloud Platform

    DEFF Research Database (Denmark)

    Anggorojati, Bayu

    Billions of devices are connected to the Internet nowadays, and the number will continue to grow in the future thanks to the advances in the electronics and telecommunication technology developments. Its application in broad aspects of human’s life brings a lot of benefits by improving productivity...... and quality of life. This paradigm, which is often called Internet of Things (IoT) or Machine-to-Machine (M2M), will provide an unprecedented opportunity to create applications and services that go far beyond the mere purpose of each participant. Many studies on the both technical and social aspects of Io......T have shown that the concern about the security and privacy play a huge role for the mass adoption of the IoT/M2M as cloud services. Among the important topics within the security and privacy, the access control is an important mechanism, which essentially manages how the important assets or resource...

  19. Cloud Computing and Validated Learning for Accelerating Innovation in IoT

    Science.gov (United States)

    Suciu, George; Todoran, Gyorgy; Vulpe, Alexandru; Suciu, Victor; Bulca, Cristina; Cheveresan, Romulus

    2015-01-01

    Innovation in Internet of Things (IoT) requires more than just creation of technology and use of cloud computing or big data platforms. It requires accelerated commercialization or aptly called go-to-market processes. To successfully accelerate, companies need a new type of product development, the so-called validated learning process.…

  20. An IoT-cloud Based Wearable ECG Monitoring System for Smart Healthcare.

    Science.gov (United States)

    Yang, Zhe; Zhou, Qihao; Lei, Lei; Zheng, Kan; Xiang, Wei

    2016-12-01

    Public healthcare has been paid an increasing attention given the exponential growth human population and medical expenses. It is well known that an effective health monitoring system can detect abnormalities of health conditions in time and make diagnoses according to the gleaned data. As a vital approach to diagnose heart diseases, ECG monitoring is widely studied and applied. However, nearly all existing portable ECG monitoring systems cannot work without a mobile application, which is responsible for data collection and display. In this paper, we propose a new method for ECG monitoring based on Internet-of-Things (IoT) techniques. ECG data are gathered using a wearable monitoring node and are transmitted directly to the IoT cloud using Wi-Fi. Both the HTTP and MQTT protocols are employed in the IoT cloud in order to provide visual and timely ECG data to users. Nearly all smart terminals with a web browser can acquire ECG data conveniently, which has greatly alleviated the cross-platform issue. Experiments are carried out on healthy volunteers in order to verify the reliability of the entire system. Experimental results reveal that the proposed system is reliable in collecting and displaying real-time ECG data, which can aid in the primary diagnosis of certain heart diseases.

  1. Real-time Monitoring System for Rotating Machinery with IoT-based Cloud Platform

    Energy Technology Data Exchange (ETDEWEB)

    Jeong, Haedong; Kim, Suhyun; Woo, Sunhee; Kim, Songhyun; Lee, Seungchul [Ulsan Nat’l Institute Science and Technology, Ulsan (Korea, Republic of)

    2017-06-15

    The objective of this research is to improve the efficiency of data collection from many machine components on smart factory floors using IoT(Internet of things) techniques and cloud platform, and to make it easy to update outdated diagnostic schemes through online deployment methods from cloud resources. The short-term analysis is implemented by a micro-controller, and it includes machine-learning algorithms for inferring snapshot information of the machine components. For long-term analysis, time-series and high-dimension data are used for root cause analysis by combining a cloud platform and multivariate analysis techniques. The diagnostic results are visualized in a webbased display dashboard for an unconstrained user access. The implementation is demonstrated to identify its performance in data acquisition and analysis for rotating machinery.

  2. Real-time Monitoring System for Rotating Machinery with IoT-based Cloud Platform

    International Nuclear Information System (INIS)

    Jeong, Haedong; Kim, Suhyun; Woo, Sunhee; Kim, Songhyun; Lee, Seungchul

    2017-01-01

    The objective of this research is to improve the efficiency of data collection from many machine components on smart factory floors using IoT(Internet of things) techniques and cloud platform, and to make it easy to update outdated diagnostic schemes through online deployment methods from cloud resources. The short-term analysis is implemented by a micro-controller, and it includes machine-learning algorithms for inferring snapshot information of the machine components. For long-term analysis, time-series and high-dimension data are used for root cause analysis by combining a cloud platform and multivariate analysis techniques. The diagnostic results are visualized in a webbased display dashboard for an unconstrained user access. The implementation is demonstrated to identify its performance in data acquisition and analysis for rotating machinery.

  3. Design and Implementation of IoT Cloud Moveable SCADA Supported by GSM for Industrial Applications

    Directory of Open Access Journals (Sweden)

    Mahmoud Shaker Nasr

    2017-05-01

    Full Text Available The world at the beginning of a new era of innovation and development with the rise of the industrial Internet or Internet of Things, IoT. It takes the space through the convergence of the global industrial system with the power of advanced computing, analytics, and low cost sensor devices and innovation of communication allowed by the Internet. One of the most important developments is IoT SCADA systems, which are considered as infrastructure of society because of their potential enormous in several industrial applications. This paper presents the design of a new generation of SCADA, named moveable SCADA , based on IoT cloud, and supported by GSM for more flexibility and reliability. The system is applied to industrial application that consists of three-control processes which are temperature, liquid level and motor processes. The three control processes data acquisition and controllers are implemented using embedded microcontroller system while a gateway is used to transfer the data proceed in field supervisor at first as well as main supervisor and monitoring engineer through IoT cloud. The system supported by GSM unit to support the system in case of internet failure. Also a camera is added to the system in order to monitor any location, any location (determined by any of the authorities in the field where the camera is mounted. The proposed SCADA is implemented practically and tested for many cases; the presented obtained results demonstrate that the system operation is very fair and meet the required targets.

  4. A Cloud-Based Car Parking Middleware for IoT-Based Smart Cities: Design and Implementation

    Directory of Open Access Journals (Sweden)

    Zhanlin Ji

    2014-11-01

    Full Text Available This paper presents the generic concept of using cloud-based intelligent car parking services in smart cities as an important application of the Internet of Things (IoT paradigm. This type of services will become an integral part of a generic IoT operational platform for smart cities due to its pure business-oriented features. A high-level view of the proposed middleware is outlined and the corresponding operational platform is illustrated. To demonstrate the provision of car parking services, based on the proposed middleware, a cloud-based intelligent car parking system for use within a university campus is described along with details of its design, implementation, and operation. A number of software solutions, including Kafka/Storm/Hbase clusters, OSGi web applications with distributed NoSQL, a rule engine, and mobile applications, are proposed to provide ‘best’ car parking service experience to mobile users, following the Always Best Connected and best Served (ABC&S paradigm.

  5. A Cloud-Based Car Parking Middleware for IoT-Based Smart Cities: Design and Implementation

    Science.gov (United States)

    Ji, Zhanlin; Ganchev, Ivan; O'Droma, Máirtín; Zhao, Li; Zhang, Xueji

    2014-01-01

    This paper presents the generic concept of using cloud-based intelligent car parking services in smart cities as an important application of the Internet of Things (IoT) paradigm. This type of services will become an integral part of a generic IoT operational platform for smart cities due to its pure business-oriented features. A high-level view of the proposed middleware is outlined and the corresponding operational platform is illustrated. To demonstrate the provision of car parking services, based on the proposed middleware, a cloud-based intelligent car parking system for use within a university campus is described along with details of its design, implementation, and operation. A number of software solutions, including Kafka/Storm/Hbase clusters, OSGi web applications with distributed NoSQL, a rule engine, and mobile applications, are proposed to provide ‘best’ car parking service experience to mobile users, following the Always Best Connected and best Served (ABC&S) paradigm. PMID:25429416

  6. A cloud-based car parking middleware for IoT-based smart cities: design and implementation.

    Science.gov (United States)

    Ji, Zhanlin; Ganchev, Ivan; O'Droma, Máirtín; Zhao, Li; Zhang, Xueji

    2014-11-25

    This paper presents the generic concept of using cloud-based intelligent car parking services in smart cities as an important application of the Internet of Things (IoT) paradigm. This type of services will become an integral part of a generic IoT operational platform for smart cities due to its pure business-oriented features. A high-level view of the proposed middleware is outlined and the corresponding operational platform is illustrated. To demonstrate the provision of car parking services, based on the proposed middleware, a cloud-based intelligent car parking system for use within a university campus is described along with details of its design, implementation, and operation. A number of software solutions, including Kafka/Storm/Hbase clusters, OSGi web applications with distributed NoSQL, a rule engine, and mobile applications, are proposed to provide 'best' car parking service experience to mobile users, following the Always Best Connected and best Served (ABC&S) paradigm.

  7. IO strategies and data services for petascale data sets from a global cloud resolving model

    International Nuclear Information System (INIS)

    Schuchardt, K L; Palmer, B J; Daily, J A; Elsethagen, T O; Koontz, A S

    2007-01-01

    Global cloud resolving models at resolutions of 4km or less create significant challenges for simulation output, data storage, data management, and post-simulation analysis and visualization. To support efficient model output as well as data analysis, new methods for IO and data organization must be evaluated. The model we are supporting, the Global Cloud Resolving Model being developed at Colorado State University, uses a geodesic grid. The non-monotonic nature of the grid's coordinate variables requires enhancements to existing data processing tools and community standards for describing and manipulating grids. The resolution, size and extent of the data suggest the need for parallel analysis tools and allow for the possibility of new techniques in data mining, filtering and comparison to observations. We describe the challenges posed by various aspects of data generation, management, and analysis, our work exploring IO strategies for the model, and a preliminary architecture, web portal, and tool enhancements which, when complete, will enable broad community access to the data sets in familiar ways to the community

  8. On I/O Virtualization Management

    Science.gov (United States)

    Danciu, Vitalian A.; Metzker, Martin G.

    The quick adoption of virtualization technology in general and the advent of the Cloud business model entail new requirements on the structure and the configuration of back-end I/O systems. Several approaches to virtualization of I/O links are being introduced, which aim at implementing a more flexible I/O channel configuration without compromising performance. While previously the management of I/O devices could be limited to basic technical requirments (e.g. the establishment and termination of fixed-point links), the additional flexibility carries in its wake additional management requirements on the representation and control of I/O sub-systems.

  9. Fog Computing: An Overview of Big IoT Data Analytics

    Directory of Open Access Journals (Sweden)

    Muhammad Rizwan Anawar

    2018-01-01

    Full Text Available A huge amount of data, generated by Internet of Things (IoT, is growing up exponentially based on nonstop operational states. Those IoT devices are generating an avalanche of information that is disruptive for predictable data processing and analytics functionality, which is perfectly handled by the cloud before explosion growth of IoT. Fog computing structure confronts those disruptions, with powerful complement functionality of cloud framework, based on deployment of micro clouds (fog nodes at proximity edge of data sources. Particularly big IoT data analytics by fog computing structure is on emerging phase and requires extensive research to produce more proficient knowledge and smart decisions. This survey summarizes the fog challenges and opportunities in the context of big IoT data analytics on fog networking. In addition, it emphasizes that the key characteristics in some proposed research works make the fog computing a suitable platform for new proliferating IoT devices, services, and applications. Most significant fog applications (e.g., health care monitoring, smart cities, connected vehicles, and smart grid will be discussed here to create a well-organized green computing paradigm to support the next generation of IoT applications.

  10. Internet of Cloud: Security and Privacy issues

    OpenAIRE

    Cook, Allan; Robinson, Michael; Ferrag, Mohamed Amine; Maglaras, Leandros A.; He, Ying; Jones, Kevin; Janicke, Helge

    2017-01-01

    The synergy between the cloud and the IoT has emerged largely due to the cloud having attributes which directly benefit the IoT and enable its continued growth. IoT adopting Cloud services has brought new security challenges. In this book chapter, we pursue two main goals: 1) to analyse the different components of Cloud computing and the IoT and 2) to present security and privacy problems that these systems face. We thoroughly investigate current security and privacy preservation solutions th...

  11. Towards Blockchain-based Auditable Storage and Sharing of IoT Data

    OpenAIRE

    Shafagh, Hossein; Burkhalter, Lukas; Hithnawi, Anwar; Duquennoy, Simon

    2017-01-01

    Today the cloud plays a central role in storing, processing, and distributing data. Despite contributing to the rapid development of IoT applications, the current IoT cloud-centric architecture has led into a myriad of isolated data silos that hinders the full potential of holistic data-driven analytics within the IoT. In this paper, we present a blockchain-based design for the IoT that brings a distributed access control and data management. We depart from the current trust model that delega...

  12. Virtual Replication of IoT Hubs in the Cloud: A Flexible Approach to Smart Object Management

    Directory of Open Access Journals (Sweden)

    Simone Cirani

    2018-03-01

    Full Text Available In future years, the Internet of Things is expected to interconnect billions of highly heterogeneous devices, denoted as “smart objects”, enabling the development of innovative distributed applications. Smart objects are constrained sensor/actuator-equipped devices, in terms of computational power and available memory. In order to cope with the diverse physical connectivity technologies of smart objects, the Internet Protocol is foreseen as the common “language” for full interoperability and as a unifying factor for integration with the Internet. Large-scale platforms for interconnected devices are required to effectively manage resources provided by smart objects. In this work, we present a novel architecture for the management of large numbers of resources in a scalable, seamless, and secure way. The proposed architecture is based on a network element, denoted as IoT Hub, placed at the border of the constrained network, which implements the following functions: service discovery; border router; HTTP/Constrained Application Protocol (CoAP and CoAP/CoAP proxy; cache; and resource directory. In order to protect smart objects (which cannot, because of their constrained nature, serve a large number of concurrent requests and the IoT Hub (which serves as a gateway to the constrained network, we introduce the concept of virtual IoT Hub replica: a Cloud-based “entity” replicating all the functions of a physical IoT Hub, which external clients will query to access resources. IoT Hub replicas are constantly synchronized with the physical IoT Hub through a low-overhead protocol based on Message Queue Telemetry Transport (MQTT. An experimental evaluation, proving the feasibility and advantages of the proposed architecture, is presented.

  13. Fault Detection Variants of the CloudBus Protocol for IoT Distributed Embedded Systems

    Directory of Open Access Journals (Sweden)

    BARKALOV, A.

    2017-05-01

    Full Text Available Distributed embedded systems have become larger, more complex and complicated. More often, such systems operate accordingly to the IoT or Industry 4.0 concept. However, large number of end modules operating in the system leads to a significant load and consequently, to an overload of the communication interfaces. The CloudBus protocol is one of the methods which is used for data exchange and concurrent process synchronization in the distributed systems. It allows the significant savings in the amount of transmitted data between end modules, especially when compared with the other protocols used in the industry. Nevertheless, basic version of the protocol does not protect against the system failure in the event of failure of one of the nodes. This paper proposes four novel variants of the CloudBus protocol, which allow the fault detection. The comparison and performance analysis was executed for all proposed CloudBus variants. The verification and behavior analysis of the distributed systems were performed on SoC hardware research platform. Furthermore, a simple test application was proposed.

  14. Analysis of the frontier technology of agricultural IoT and its predication research

    Science.gov (United States)

    Han, Shuqing; Zhang, Jianhua; Zhu, Mengshuai; Wu, Jianzhai; Shen, Chen; Kong, Fantao

    2017-09-01

    Agricultural IoT (Internet of Things) develops rapidly. Nanotechnology, biotechnology and optoelectronic technology are successfully integrated into the agricultural sensor technology. Big data, cloud computing and artificial intelligence technology have also been successfully used in IoT. This paper carries out the research on integration of agricultural sensor technology, nanotechnology, biotechnology and optoelectronic technology and the application of big data, cloud computing and artificial intelligence technology in agricultural IoT. The advantages and development of the integration of nanotechnology, biotechnology and optoelectronic technology with agricultural sensor technology were discussed. The application of big data, cloud computing and artificial intelligence technology in IoT and their development trend were analysed.

  15. An integrated system for land resources supervision based on the IoT and cloud computing

    Science.gov (United States)

    Fang, Shifeng; Zhu, Yunqiang; Xu, Lida; Zhang, Jinqu; Zhou, Peiji; Luo, Kan; Yang, Jie

    2017-01-01

    Integrated information systems are important safeguards for the utilisation and development of land resources. Information technologies, including the Internet of Things (IoT) and cloud computing, are inevitable requirements for the quality and efficiency of land resources supervision tasks. In this study, an economical and highly efficient supervision system for land resources has been established based on IoT and cloud computing technologies; a novel online and offline integrated system with synchronised internal and field data that includes the entire process of 'discovering breaches, analysing problems, verifying fieldwork and investigating cases' was constructed. The system integrates key technologies, such as the automatic extraction of high-precision information based on remote sensing, semantic ontology-based technology to excavate and discriminate public sentiment on the Internet that is related to illegal incidents, high-performance parallel computing based on MapReduce, uniform storing and compressing (bitwise) technology, global positioning system data communication and data synchronisation mode, intelligent recognition and four-level ('device, transfer, system and data') safety control technology. The integrated system based on a 'One Map' platform has been officially implemented by the Department of Land and Resources of Guizhou Province, China, and was found to significantly increase the efficiency and level of land resources supervision. The system promoted the overall development of informatisation in fields related to land resource management.

  16. IoT-Based Car's Parking Monitoring System

    OpenAIRE

    Dwiputra Albertus Ega; Khoswanto Handry; Sutjiadi Raymond; Lim Resmana

    2018-01-01

    Internet-of-things-based technologies have advanced so much and helped public necessities. The use of IoT at a parking lot will help vehicle users to know the availability of a parking location through smartphones. This IoT-based parking system is created by using controllers, sensors, servers and cloud. Controllers and sensors will be placed on the ceiling of each parking slots to detect the presence of a car. Server collect the results of the sensors and store them in Cloud. System test is ...

  17. IoT-based flood embankments monitoring system

    Science.gov (United States)

    Michta, E.; Szulim, R.; Sojka-Piotrowska, A.; Piotrowski, K.

    2017-08-01

    In the paper a concept of flood embankments monitoring system based on using Internet of Things approach and Cloud Computing technologies will be presented. The proposed system consists of sensors, IoT nodes, Gateways and Cloud based services. Nodes communicates with the sensors measuring certain physical parameters describing the state of the embankments and communicates with the Gateways. Gateways are specialized active devices responsible for direct communication with the nodes, collecting sensor data, preprocess the data, applying local rules and communicate with the Cloud Services using communication API delivered by cloud services providers. Architecture of all of the system components will be proposed consisting IoT devices functionalities description, their communication model, software modules and services bases on using a public cloud computing platform like Microsoft Azure will be proposed. The most important aspects of maintaining the communication in a secure way will be shown.

  18. iOS 5 Essentials

    CERN Document Server

    Daniel, Steven F

    2012-01-01

    Each chapter will take you through a new major feature of iOS 5. You will learn how to integrate each feature into your applications. If you ever wanted to learn about the latest features of iOS 5 and learn how to incorporate Twitter, iCloud and Core Image framework effects functionality into your applications, then this book is for you. You should have a good knowledge of programming experience with Objective-C, and have used Xcode 4. iPhone programming experience is not required.

  19. Proof of Concept of Home IoT Connected Vehicles

    OpenAIRE

    Kim, Younsun; Oh, Hyunggoy; Kang, Sungho

    2017-01-01

    The way in which we interact with our cars is changing, driven by the increased use of mobile devices, cloud-based services, and advanced automotive technology. In particular, the requirements and market demand for the Internet of Things (IoT) device-connected vehicles will continuously increase. In addition, the advances in cloud computing and IoT have provided a promising opportunity for developing vehicular software and services in the automotive domain. In this paper, we introduce the con...

  20. Context-aware distributed cloud computing using CloudScheduler

    Science.gov (United States)

    Seuster, R.; Leavett-Brown, CR; Casteels, K.; Driemel, C.; Paterson, M.; Ring, D.; Sobie, RJ; Taylor, RP; Weldon, J.

    2017-10-01

    The distributed cloud using the CloudScheduler VM provisioning service is one of the longest running systems for HEP workloads. It has run millions of jobs for ATLAS and Belle II over the past few years using private and commercial clouds around the world. Our goal is to scale the distributed cloud to the 10,000-core level, with the ability to run any type of application (low I/O, high I/O and high memory) on any cloud. To achieve this goal, we have been implementing changes that utilize context-aware computing designs that are currently employed in the mobile communication industry. Context-awareness makes use of real-time and archived data to respond to user or system requirements. In our distributed cloud, we have many opportunistic clouds with no local HEP services, software or storage repositories. A context-aware design significantly improves the reliability and performance of our system by locating the nearest location of the required services. We describe how we are collecting and managing contextual information from our workload management systems, the clouds, the virtual machines and our services. This information is used not only to monitor the system but also to carry out automated corrective actions. We are incrementally adding new alerting and response services to our distributed cloud. This will enable us to scale the number of clouds and virtual machines. Further, a context-aware design will enable us to run analysis or high I/O application on opportunistic clouds. We envisage an open-source HTTP data federation (for example, the DynaFed system at CERN) as a service that would provide us access to existing storage elements used by the HEP experiments.

  1. Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT

    Directory of Open Access Journals (Sweden)

    Hongyang Yan

    2018-06-01

    Full Text Available In recent years, the Internet of Things (IoT has found wide application and attracted much attention. Since most of the end-terminals in IoT have limited capabilities for storage and computing, it has become a trend to outsource the data from local to cloud computing. To further reduce the communication bandwidth and storage space, data deduplication has been widely adopted to eliminate the redundant data. However, since data collected in IoT are sensitive and closely related to users’ personal information, the privacy protection of users’ information becomes a challenge. As the channels, like the wireless channels between the terminals and the cloud servers in IoT, are public and the cloud servers are not fully trusted, data have to be encrypted before being uploaded to the cloud. However, encryption makes the performance of deduplication by the cloud server difficult because the ciphertext will be different even if the underlying plaintext is identical. In this paper, we build a centralized privacy-preserving duplicate removal storage system, which supports both file-level and block-level deduplication. In order to avoid the leakage of statistical information of data, Intel Software Guard Extensions (SGX technology is utilized to protect the deduplication process on the cloud server. The results of the experimental analysis demonstrate that the new scheme can significantly improve the deduplication efficiency and enhance the security. It is envisioned that the duplicated removal system with privacy preservation will be of great use in the centralized storage environment of IoT.

  2. Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT.

    Science.gov (United States)

    Yan, Hongyang; Li, Xuan; Wang, Yu; Jia, Chunfu

    2018-06-04

    In recent years, the Internet of Things (IoT) has found wide application and attracted much attention. Since most of the end-terminals in IoT have limited capabilities for storage and computing, it has become a trend to outsource the data from local to cloud computing. To further reduce the communication bandwidth and storage space, data deduplication has been widely adopted to eliminate the redundant data. However, since data collected in IoT are sensitive and closely related to users' personal information, the privacy protection of users' information becomes a challenge. As the channels, like the wireless channels between the terminals and the cloud servers in IoT, are public and the cloud servers are not fully trusted, data have to be encrypted before being uploaded to the cloud. However, encryption makes the performance of deduplication by the cloud server difficult because the ciphertext will be different even if the underlying plaintext is identical. In this paper, we build a centralized privacy-preserving duplicate removal storage system, which supports both file-level and block-level deduplication. In order to avoid the leakage of statistical information of data, Intel Software Guard Extensions (SGX) technology is utilized to protect the deduplication process on the cloud server. The results of the experimental analysis demonstrate that the new scheme can significantly improve the deduplication efficiency and enhance the security. It is envisioned that the duplicated removal system with privacy preservation will be of great use in the centralized storage environment of IoT.

  3. Application development with Parse using iOS SDK

    CERN Document Server

    Birani, Bhanu

    2013-01-01

    A practical guide, featuring step-by-step instructions showing you how to use Parse iOS, and handle your data on cloud.If you are a developer who wants to build your applications instantly using Parse iOS as a back end application development, this book is ideal for you. This book will help you to understand Parse, featuring examples to help you get familiar with the concepts of Parse iOS.

  4. Comparing the Atmospheric Losses at Io and Europa

    Science.gov (United States)

    Dols, V. J.; Bagenal, F.; Crary, F. J.; Cassidy, T.

    2017-12-01

    At Io and Europa, the interaction of the Jovian plasma with the moon atmosphere leads to a significant loss of atomic/molecular neutrals and ions to space. The processes that lead to atmospheric escape are diverse: atmospheric sputtering, molecular dissociation, molecular ion recombination, Jeans escape etc. Each process leads to neutrals escaping at different velocities (i.e. electron impact dissociation leads to very slow atomic neutrals, sputtering might eject faster molecular neutrals). Some neutrals will be ejected out of the Jovian system; others will form extended neutral clouds along the orbit of the moons. These atomic/molecular extended neutral clouds are probably the main source of plasma for the Jovian magnetosphere. They are difficult to observe directly thus their composition and density are still poorly constrained. A future modeling of the formation of these extended clouds requires an estimate of their atmospheric sources. We estimate the atmospheric losses at Io and Europa for each loss process with a multi-species chemistry model, using a prescribed atmospheric distribution consistent with the observations. We compare the neutral losses at Io and Europa.

  5. Proof of Concept of Home IoT Connected Vehicles

    Science.gov (United States)

    Kim, Younsun; Oh, Hyunggoy; Kang, Sungho

    2017-01-01

    The way in which we interact with our cars is changing, driven by the increased use of mobile devices, cloud-based services, and advanced automotive technology. In particular, the requirements and market demand for the Internet of Things (IoT) device-connected vehicles will continuously increase. In addition, the advances in cloud computing and IoT have provided a promising opportunity for developing vehicular software and services in the automotive domain. In this paper, we introduce the concept of a home IoT connected vehicle with a voice-based virtual personal assistant comprised of a vehicle agent and a home agent. The proposed concept is evaluated by implementing a smartphone linked with home IoT devices that are connected to an infotainment system for the vehicle, a smartphone-based natural language interface input device, and cloud-based home IoT devices for the home. The home-to-vehicle connected service scenarios that aim to reduce the inconvenience due to simple and repetitive tasks by improving the urban mobility efficiency in IoT environments are substantiated by analyzing real vehicle testing and lifestyle research. Remarkable benefits are derived by making repetitive routine tasks one task that is executed by a command and by executing essential tasks automatically, without any request. However, it should be used with authorized permission, applied without any error at the right time, and applied under limited conditions to sense the habitants’ intention correctly and to gain the required trust regarding the remote execution of tasks. PMID:28587246

  6. Proof of Concept of Home IoT Connected Vehicles.

    Science.gov (United States)

    Kim, Younsun; Oh, Hyunggoy; Kang, Sungho

    2017-06-05

    The way in which we interact with our cars is changing, driven by the increased use of mobile devices, cloud-based services, and advanced automotive technology. In particular, the requirements and market demand for the Internet of Things (IoT) device-connected vehicles will continuously increase. In addition, the advances in cloud computing and IoT have provided a promising opportunity for developing vehicular software and services in the automotive domain. In this paper, we introduce the concept of a home IoT connected vehicle with a voice-based virtual personal assistant comprised of a vehicle agent and a home agent. The proposed concept is evaluated by implementing a smartphone linked with home IoT devices that are connected to an infotainment system for the vehicle, a smartphone-based natural language interface input device, and cloud-based home IoT devices for the home. The home-to-vehicle connected service scenarios that aim to reduce the inconvenience due to simple and repetitive tasks by improving the urban mobility efficiency in IoT environments are substantiated by analyzing real vehicle testing and lifestyle research. Remarkable benefits are derived by making repetitive routine tasks one task that is executed by a command and by executing essential tasks automatically, without any request. However, it should be used with authorized permission, applied without any error at the right time, and applied under limited conditions to sense the habitants' intention correctly and to gain the required trust regarding the remote execution of tasks.

  7. Volcanogenic Sulfur on Earth and Io: Composition and Spectroscopy

    Science.gov (United States)

    Kargel, J.S.; Delmelle, P.; Nash, D.B.

    1999-01-01

    The causes of Io's variegated surface, especially the roles of sulfur, and the geochemical history of sulfur compounds on Io are not well understood. Suspecting that minor impurities in sulfur might be important, we have investigated the major and trace element chemistry and spectroscopic reflectance of natural sulfur from a variety of terrestrial volcanic-hydrothermal environments. Evidence suggests that Io may be substantially coated with impure sulfur. On Earth, a few tenths of a percent to a few percent of chalcophile trace elements (e.g., As and Se) comonly occur in sulfur and appear to stabilize material of yellow, brown, orange, and red hues, which may persist even at low temperatures. Percentage levels of chalcophile impurities are reasonably expected to occur on Io in vapor sublimate deposits and flows derived from such deposits. Such impurities join a host of other mechanisms that might explain Io's reds and yellows. Two-tenths to two percent opaque crystalline impurities, particularly pyrite (FeS2), commonly produces green, gray, and black volcanic sulfur on Earth and might explain areas of Io having deposits of these colors. Pyrite produces a broad absorption near 1 ??m that gradually diminishes out to 1.6 ??m - similar but not identical to the spectrum of Io seen in Galileo NIMS data. Percentage amounts of carbonaceous impurities and tens of percent SiO2 (as silicates) also strongly affect the spectral properties of Earth's sulfur. Io's broad absorption between 0.52 and 0.64 ??m remains unexplained by these data but could be due to sodium sulfides, as suggested previously by others, or to As, Se, or other impurities. These impurities and others, such as P and Cl (which could exist on Io's surface in amounts over 1% that of sulfur), greatly alter the molecular structure of molten and solid sulfur. Minor impurities could impact Io's geology, such as the morphology of sulfur lava flows and the ability of sulfur to sustain high relief. We have not found

  8. Leveraging Fog Computing for Scalable IoT Datacenter Using Spine-Leaf Network Topology

    Directory of Open Access Journals (Sweden)

    K. C. Okafor

    2017-01-01

    Full Text Available With the Internet of Everything (IoE paradigm that gathers almost every object online, huge traffic workload, bandwidth, security, and latency issues remain a concern for IoT users in today’s world. Besides, the scalability requirements found in the current IoT data processing (in the cloud can hardly be used for applications such as assisted living systems, Big Data analytic solutions, and smart embedded applications. This paper proposes an extended cloud IoT model that optimizes bandwidth while allowing edge devices (Internet-connected objects/devices to smartly process data without relying on a cloud network. Its integration with a massively scaled spine-leaf (SL network topology is highlighted. This is contrasted with a legacy multitier layered architecture housing network services and routing policies. The perspective offered in this paper explains how low-latency and bandwidth intensive applications can transfer data to the cloud (and then back to the edge application without impacting QoS performance. Consequently, a spine-leaf Fog computing network (SL-FCN is presented for reducing latency and network congestion issues in a highly distributed and multilayer virtualized IoT datacenter environment. This approach is cost-effective as it maximizes bandwidth while maintaining redundancy and resiliency against failures in mission critical applications.

  9. IoTFLiP: IoT-based flipped learning platform for medical education

    Directory of Open Access Journals (Sweden)

    Maqbool Ali

    2017-08-01

    Full Text Available Case-Based Learning (CBL has become an effective pedagogy for student-centered learning in medical education, which is founded on persistent patient cases. Flippped learning and Internet of Things (IoTs concepts have gained significant attention in recent years. Using these concepts in conjunction with CBL can improve learning ability by providing real evolutionary medical cases. It also enables students to build confidence in their decision making, and efficiently enhances teamwork in the learing environment. We propose an IoT-based Flip Learning Platform, called IoTFLiP, where an IoT infrastructure is exploited to support flipped case-based learning in a cloud environment with state of the art security and privacy measures for personalized medical data. It also provides support for application delivery in private, public, and hybrid approaches. The proposed platform is an extension of our Interactive Case-Based Flipped Learning Tool (ICBFLT, which has been developed based on current CBL practices. ICBFLT formulates summaries of CBL cases through synergy between students' and medical expert knowledge. The low cost and reduced size of sensor device, support of IoTs, and recent flipped learning advancements can enhance medical students' academic and practical experiences. In order to demonstrate a working scenario for the proposed IoTFLiP platform, real-time data from IoTs gadgets is collected to generate a real-world case for a medical student using ICBFLT.

  10. Enhancing Privacy in Wearable IoT through a Provenance Architecture

    Directory of Open Access Journals (Sweden)

    Richard K. Lomotey

    2018-04-01

    Full Text Available The Internet of Things (IoT is inspired by network interconnectedness of humans, objects, and cloud services to facilitate new use cases and new business models across multiple enterprise domains including healthcare. This creates the need for continuous data streaming in IoT architectures which are mainly designed following the broadcast model. The model facilitates IoT devices to sense and deliver information to other nodes (e.g., cloud, physical objects, etc. that are interested in the information. However, this is a recipe for privacy breaches since sensitive data, such as personal vitals from wearables, can be delivered to undesired sniffing nodes. In order to protect users’ privacy and manufacturers’ IP, as well as detecting and blocking malicious activity, this research paper proposes privacy-oriented IoT architecture following the provenance technique. This ensures that the IoT data will only be delivered to the nodes that subscribe to receive the information. Using the provenance technique to ensure high transparency, the work is able to provide trace routes for digital audit trail. Several empirical evaluations are conducted in a real-world wearable IoT ecosystem to prove the superiority of the proposed work.

  11. Internet of robotic things : converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT Platforms

    OpenAIRE

    Vermesan, Ovidiu; Bröring, Arne; Tragos, Elias; Serrano, Martin; Bacciu, Davide; Chessa, Stefano; Gallicchio, Claudio; Micheli, Alessio; Dragone, Mauro; Saffiotti, Alessandro; Simoens, Pieter; Cavallo, Filippo; Bahr, Roy

    2017-01-01

    The Internet of Things (IoT) concept is evolving rapidly and influencing newdevelopments in various application domains, such as the Internet of MobileThings (IoMT), Autonomous Internet of Things (A-IoT), Autonomous Systemof Things (ASoT), Internet of Autonomous Things (IoAT), Internetof Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc.that are progressing/advancing by using IoT technology. The IoT influencerepresents new development and deployment challenges in different a...

  12. An Architecture of IoT Service Delegation and Resource Allocation Based on Collaboration between Fog and Cloud Computing

    Directory of Open Access Journals (Sweden)

    Aymen Abdullah Alsaffar

    2016-01-01

    Full Text Available Despite the wide utilization of cloud computing (e.g., services, applications, and resources, some of the services, applications, and smart devices are not able to fully benefit from this attractive cloud computing paradigm due to the following issues: (1 smart devices might be lacking in their capacity (e.g., processing, memory, storage, battery, and resource allocation, (2 they might be lacking in their network resources, and (3 the high network latency to centralized server in cloud might not be efficient for delay-sensitive application, services, and resource allocations requests. Fog computing is promising paradigm that can extend cloud resources to edge of network, solving the abovementioned issue. As a result, in this work, we propose an architecture of IoT service delegation and resource allocation based on collaboration between fog and cloud computing. We provide new algorithm that is decision rules of linearized decision tree based on three conditions (services size, completion time, and VMs capacity for managing and delegating user request in order to balance workload. Moreover, we propose algorithm to allocate resources to meet service level agreement (SLA and quality of services (QoS as well as optimizing big data distribution in fog and cloud computing. Our simulation result shows that our proposed approach can efficiently balance workload, improve resource allocation efficiently, optimize big data distribution, and show better performance than other existing methods.

  13. Collaborative Working Architecture for IoT-Based Applications.

    Science.gov (United States)

    Mora, Higinio; Signes-Pont, María Teresa; Gil, David; Johnsson, Magnus

    2018-05-23

    The new sensing applications need enhanced computing capabilities to handle the requirements of complex and huge data processing. The Internet of Things (IoT) concept brings processing and communication features to devices. In addition, the Cloud Computing paradigm provides resources and infrastructures for performing the computations and outsourcing the work from the IoT devices. This scenario opens new opportunities for designing advanced IoT-based applications, however, there is still much research to be done to properly gear all the systems for working together. This work proposes a collaborative model and an architecture to take advantage of the available computing resources. The resulting architecture involves a novel network design with different levels which combines sensing and processing capabilities based on the Mobile Cloud Computing (MCC) paradigm. An experiment is included to demonstrate that this approach can be used in diverse real applications. The results show the flexibility of the architecture to perform complex computational tasks of advanced applications.

  14. IoT-Based Car's Parking Monitoring System

    Directory of Open Access Journals (Sweden)

    Dwiputra Albertus Ega

    2018-01-01

    Full Text Available Internet-of-things-based technologies have advanced so much and helped public necessities. The use of IoT at a parking lot will help vehicle users to know the availability of a parking location through smartphones. This IoT-based parking system is created by using controllers, sensors, servers and cloud. Controllers and sensors will be placed on the ceiling of each parking slots to detect the presence of a car. Server collect the results of the sensors and store them in Cloud. System test is conducted by installing three sensor circuits and server in a parking lot. The tests consist of measuring time that required for data transmission and the rate of success of data transmission from the parking lot to the Cloud. Based on above tests, it is observed that the sensor circuit and Radio Frequency Identification are able to transmit the parking lot data without error. This system require maximum 1 min to update parking lot data. The process of obtaining data until the data being stored in Cloud takes 12 s and the process of acquiring parking condition data from Cloud to smartphone takes 30 s. The accuracy level of parking lot data transfer is 100 %.

  15. Internet of Robotic Things – Converging Sensing/Actuating, Hyperconnectivity, Artificial Intelligence and IoT Platforms

    OpenAIRE

    Vermesan, Ovidiu; Bröring, Arne; Tragos, Elias Z.; Serrano, Martin; Bacciu, Davide; Chessa, Stefano; Gallicchio, Claudio; Micheli, Alessio; Dragone, Mauro; Saffiotti, Alessandro; Simoens, Pieter; Cavallo, Filippo; Bahr, Roy

    2017-01-01

    The Internet of Things (IoT) concept is evolving rapidly and influencing new developments in various application domains, such as the Internet of Mobile Things (IoMT), Autonomous Internet of Things (A-IoT), Autonomous System of Things (ASoT), Internet of Autonomous Things (IoAT), Internet of Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc. that are progressing/advancing by using IoT technology. The IoT influence represents new development and deployment challenges in diffe...

  16. The CTTC 5G End-to-End Experimental Platform : Integrating Heterogeneous Wireless/Optical Networks, Distributed Cloud, and IoT Devices

    OpenAIRE

    Munoz, Raul; Mangues-Bafalluy, Josep; Vilalta, Ricard; Verikoukis, Christos; Alonso-Zarate, Jesus; Bartzoudis, Nikolaos; Georgiadis, Apostolos; Payaro, Miquel; Perez-Neira, Ana; Casellas, Ramon; Martinez, Ricardo; Nunez-Martinez, Jose; Requena Esteso, Manuel; Pubill, David; Font-Bach, Oriol

    2016-01-01

    The Internet of Things (IoT) will facilitate a wide variety of applications in different domains, such as smart cities, smart grids, industrial automation (Industry 4.0), smart driving, assistance of the elderly, and home automation. Billions of heterogeneous smart devices with different application requirements will be connected to the networks and will generate huge aggregated volumes of data that will be processed in distributed cloud infrastructures. On the other hand, there is also a gen...

  17. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications.

    Science.gov (United States)

    Suárez-Albela, Manuel; Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Castedo, Luis

    2017-08-29

    Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up to

  18. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications

    Science.gov (United States)

    Castedo, Luis

    2017-01-01

    Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up

  19. Towards Blockchain-based Auditable Storage and Sharing of IoT Data

    OpenAIRE

    Shafagh , Hossein; Hithnawi , Anwar; Duquennoy , Simon

    2017-01-01

    International audience; Today the cloud plays a central role in storing, processing , and distributing data. Despite contributing to the rapid development of various applications, including the IoT, the current centralized storage architecture has led into a myriad of isolated data silos and is preventing the full potential of holistic data-driven analytics for IoT data. In this abstract, we advocate a data-centric design for IoT with focus on resilience, sharing, and auditable protection of ...

  20. Online Monitoring and Controlling Water Plant System Based on IoT Cloud Computing and Arduino

    Directory of Open Access Journals (Sweden)

    Ali Najim Abdullah

    2017-07-01

    Full Text Available Water is basis of the existence of life on earth and its invaluable because it’s an essential requirement for all the human beings but, presently water preparation and processing systems are suffering from different problems such as real-time operations problems, loss of large amounts of water in the liquidation and distribution operations, less amount of water sources, i.e. The increase in water problems coincides with the increase in population numbers and residential areas such as (water distribution, consumption, Interrupted water sources problems as well as water quality. Therefore, to eliminate these problems and make more efficient water systems, effective and reliable there is necessity for accurate monitoring and proper controlling system. In this paper, we are focusing on the design of water system in real-time and on the continuous monitoring of water based on IoT cloud computing and Arduino microcontroller. Water system with proper control algorithm and continuous monitoring any place and any time makes a stable distribution so that, we can have a record of height of water in tanks and we can change the devices status in the plant. Internet of things is a network of physical connected objects equipped with software, electronics circuits, sensors, and network connection part which allow monitoring and controlling anywhere around the world. Through using cloud computing proved by free severs, the water system’s data continuously is uploaded to cloud allowing the real time monitoring operation by the use of sensors and microcontroller (Arduino as Minicomputer to control and monitor the system operation from cloud with efficient (client to server connection.

  1. CLOUD COMPUTING AND INTERNET OF THINGS FOR SMART CITY DEPLOYMENTS

    Directory of Open Access Journals (Sweden)

    GEORGE SUCIU

    2013-05-01

    Full Text Available Cloud Computing represents the new method of delivering hardware and software resources to the users, Internet of Things (IoT is currently one of the most popular ICT paradigms. Both concepts can have a major impact on how we build smart or/and smarter cities. Cloud computing represents the delivery of hardware and software resources on-demand over the Internet as a Service. At the same time, the IoT concept envisions a new generation of devices (sensors, both virtual and physical that are connected to the Internet and provide different services for value-added applications. In this paper we present our view on how to deploy Cloud computing and IoT for smart or/and smarter cities. We demonstrate that data gathered from heterogeneous and distributed IoT devices can be automatically managed, handled and reused with decentralized cloud services.

  2. Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud

    OpenAIRE

    Dong, Qingkuan; Tong, Jiaqing; Chen, Yuan

    2015-01-01

    With the rapid developments of the IoT (Internet of Things) and the cloud computing, cloud-based RFID systems attract more attention. Users can reduce their cost of deploying and maintaining the RFID system by purchasing cloud services. However, the security threats of cloud-based RFID systems are more serious than those of traditional RFID systems. In cloud-based RFID systems, the connection between the reader and the cloud database is not secure and cloud service provider is not trusted. Th...

  3. An Application-Driven Modular IoT Architecture

    Directory of Open Access Journals (Sweden)

    Kumar Yelamarthi

    2017-01-01

    Full Text Available Building upon the advancements in the recent years, a new paradigm in technology has emerged in Internet of Things (IoT. IoT has allowed for communication with the surrounding environment through a multitude of sensors and actuators, yet operating on limited energy. Several researchers have presented IoT architectures for respective applications, often challenged by requiring major updates for adoption to a different application. Further, this comes with several uncertainties such as type of computational device required at the edge, mode of wireless connectivity required, methods to obtain power efficiency, and not ensuring rapid deployment. This paper starts with providing a horizontal overview of each layer in IoT architecture and options for different applications. Then it presents a broad application-driven modular architecture, which can be easily customized for rapid deployment. This paper presents the diverse hardware used in several IoT layers such as sensors, embedded processors, wireless transceivers, internet gateway, and application management cloud server. Later, this paper presents implementation results for diverse applications including healthcare, structural health monitoring, agriculture, and indoor tour guide systems. It is hoped that this research will assist the potential user to easily choose IoT hardware and software as it pertains to their respective needs.

  4. HUBBLE CLICKS IMAGES OF IO SWEEPING ACROSS JUPITER

    Science.gov (United States)

    2002-01-01

    While hunting for volcanic plumes on Io, NASA's Hubble Space Telescope captured these images of the volatile moon sweeping across the giant face of Jupiter. Only a few weeks before these dramatic images were taken, the orbiting telescope snapped a portrait of one of Io's volcanoes spewing sulfur dioxide 'snow.' These stunning images of the planetary duo are being released to commemorate the ninth anniversary of the Hubble telescope's launch on April 24, 1990. All of these images were taken with the Wide Field and Planetary Camera 2. The three overlapping snapshots show in crisp detail Io passing above Jupiter's turbulent clouds. The close-up picture of Io (bottom right) reveal a 120-mile-high (200-kilometer) plume of sulfur dioxide 'snow' emanating from Pillan, one of the moon's active volcanoes. 'Other observations have inferred sulfur dioxide 'snow' in Io's plumes, but this image offers direct observational evidence for sulfur dioxide 'snow' in an Io plume,' explains John R. Spencer of Lowell Observatory in Flagstaff, Ariz. A Trip Around Jupiter The three snapshots of the volcanic moon rounding Jupiter were taken over a 1.8-hour time span. Io is roughly the size of Earth's moon but 2,000 times farther away. In two of the images, Io appears to be skimming Jupiter's cloud tops, but it's actually 310,000 miles (500,000 kilometers) away. Io zips around Jupiter in 1.8 days, whereas the moon circles Earth every 28 days. The conspicuous black spot on Jupiter is Io's shadow and is about the size of the moon itself (2,262 miles or 3,640 kilometers across). This shadow sails across the face of Jupiter at 38,000 mph (17 kilometers per second). The smallest details visible on Io and Jupiter measure 93 miles (150 kilometers) across, or about the size of Connecticut. These images were further sharpened through image reconstruction techniques. The view is so crisp that one would have to stand on Io to see this much detail on Jupiter with the naked eye. The bright patches on Io

  5. Energy-Aware Computation Offloading of IoT Sensors in Cloudlet-Based Mobile Edge Computing.

    Science.gov (United States)

    Ma, Xiao; Lin, Chuang; Zhang, Han; Liu, Jianwei

    2018-06-15

    Mobile edge computing is proposed as a promising computing paradigm to relieve the excessive burden of data centers and mobile networks, which is induced by the rapid growth of Internet of Things (IoT). This work introduces the cloud-assisted multi-cloudlet framework to provision scalable services in cloudlet-based mobile edge computing. Due to the constrained computation resources of cloudlets and limited communication resources of wireless access points (APs), IoT sensors with identical computation offloading decisions interact with each other. To optimize the processing delay and energy consumption of computation tasks, theoretic analysis of the computation offloading decision problem of IoT sensors is presented in this paper. In more detail, the computation offloading decision problem of IoT sensors is formulated as a computation offloading game and the condition of Nash equilibrium is derived by introducing the tool of a potential game. By exploiting the finite improvement property of the game, the Computation Offloading Decision (COD) algorithm is designed to provide decentralized computation offloading strategies for IoT sensors. Simulation results demonstrate that the COD algorithm can significantly reduce the system cost compared with the random-selection algorithm and the cloud-first algorithm. Furthermore, the COD algorithm can scale well with increasing IoT sensors.

  6. IoT-B&B: Edge-Based NFV for IoT Devices with CPE Crowdsourcing

    Directory of Open Access Journals (Sweden)

    He Zhu

    2018-01-01

    Full Text Available For embracing the ubiquitous Internet-of-Things (IoT devices, edge computing and Network Function Virtualization (NFV have been enabled in branch offices and homes in the form of virtual Customer-Premises Equipment (vCPE. A Service Provider (SP deploys vCPE instances as Virtual Network Functions (VNFs on top of generic physical Customer-Premises Equipment (pCPE to ease administration. Upon a usage surge of IoT devices at a certain part of the network, vCPU, memory, and other resource limitations of a single pCPE node make it difficult to add new services handling the high demand. In this paper, we present IoT-B&B, a novel architecture featuring resource sharing of pCPE nodes. When a pCPE node has sharable resources available, the SP will utilize its free resources as a “bed-and-breakfast” place to deploy vCPE instances in need. A placement algorithm is also presented to assign vCPE instances to a cost-efficient pCPE node. By keeping vCPE instances at the network edge, their costs of hosting are reduced. Meanwhile, the transmission latencies are maintained at acceptable levels for processing real-time data burst from IoT devices. The traffic load to the remote, centralized cloud can be substantially reduced.

  7. An IoT architecture for cloud connected electric vehicles

    NARCIS (Netherlands)

    Ramamurthy, P.

    2015-01-01

    This report presents the EV-user scenario as an use-case of a hyper-connected environment. The need for efforts on standardisation in the IoT world is explained with a detailed view of the software architecture to achieve it.

  8. Modeling Remote I/O versus Staging Tradeoff in Multi-Data Center Computing

    International Nuclear Information System (INIS)

    Suslu, Ibrahim H

    2014-01-01

    In multi-data center computing, data to be processed is not always local to the computation. This is a major challenge especially for data-intensive Cloud computing applications, since large amount of data would need to be either moved the local sites (staging) or accessed remotely over the network (remote I/O). Cloud application developers generally chose between staging and remote I/O intuitively without making any scientific comparison specific to their application data access patterns since there is no generic model available that they can use. In this paper, we propose a generic model for the Cloud application developers which would help them to choose the most appropriate data access mechanism for their specific application workloads. We define the parameters that potentially affect the end-to-end performance of the multi-data center Cloud applications which need to access large datasets over the network. To test and validate our models, we implemented a series of synthetic benchmark applications to simulate the most common data access patterns encountered in Cloud applications. We show that our model provides promising results in different settings with different parameters, such as network bandwidth, server and client capabilities, and data access ratio

  9. Top-Down Delivery of IoT-based Applications for Seniors Behavior Change Capturing Exploiting a Model-Driven Approach

    OpenAIRE

    Fiore, Alessandro; Caione, Adriana; Mainetti, Luca; Manco, Luigi; Vergallo, Roberto

    2018-01-01

    Developing Internet of Things (IoT) requires expertise and considerable skills in different fields in order to cover all the involved heterogeneous technologies, communication formats and protocols. Developers and experts ask for new solutions that speed up the prototyping of IoT applications. One of these solutions is Web of Topics (WoX) middleware, a model-driven Cloud platform that aims to ease IoT applications developing, introducing a strong semantic abstraction of the IoT concepts. In W...

  10. Hubble Captures Volcanic Eruption Plume From Io

    Science.gov (United States)

    1997-01-01

    The Hubble Space Telescope has snapped a picture of a 400-km-high (250-mile-high) plume of gas and dust from a volcanic eruption on Io, Jupiter's large innermost moon.Io was passing in front of Jupiter when this image was taken by the Wide Field and Planetary Camera 2 in July 1996. The plume appears as an orange patch just off the edge of Io in the eight o'clock position, against the blue background of Jupiter's clouds. Io's volcanic eruptions blasts material hundreds of kilometers into space in giant plumes of gas and dust. In this image, material must have been blown out of the volcano at more than 2,000 mph to form a plume of this size, which is the largest yet seen on Io.Until now, these plumes have only been seen by spacecraft near Jupiter, and their detection from the Earth-orbiting Hubble Space Telescope opens up new opportunities for long-term studies of these remarkable phenomena.The plume seen here is from Pele, one of Io's most powerful volcanos. Pele's eruptions have been seen before. In March 1979, the Voyager 1 spacecraft recorded a 300-km-high eruption cloud from Pele. But the volcano was inactive when the Voyager 2 spacecraft flew by Jupiter in July 1979. This Hubble observation is the first glimpse of a Pele eruption plume since the Voyager expeditions.Io's volcanic plumes are much taller than those produced by terrestrial volcanos because of a combination of factors. The moon's thin atmosphere offers no resistance to the expanding volcanic gases; its weak gravity (one-sixth that of Earth) allows material to climb higher before falling; and its biggest volcanos are more powerful than most of Earth's volcanos.This image is a contrast-enhanced composite of an ultraviolet image (2600 Angstrom wavelength), shown in blue, and a violet image (4100 Angstrom wavelength), shown in orange. The orange color probably occurs because of the absorption and/or scattering of ultraviolet light in the plume. This light from Jupiter passes through the plume and is

  11. Twenty security considerations for cloud-supported Internet of Things

    OpenAIRE

    Singh, Jatinder; Pasquier, Thomas; Bacon, Jean Margaret; Ko, Hajoon; Eyers, David

    2015-01-01

    To realise the broad vision of pervasive computing, underpinned by the “Internet of Things” (IoT), it is essential to break down application and technology-based silos and support broad connectivity and data sharing; the cloud being a natural enabler. Work in IoT tends towards the subsystem, often focusing on particular technical concerns or application domains, before offloading data to the cloud. As such, there has been little regard given to the security, privacy and p...

  12. Io

    International Nuclear Information System (INIS)

    Nash, D.B.; Yoder, C.F.; Carr, M.H.; Gradie, J.; Hunten, D.M.

    1986-01-01

    The present work reviews the history of Io studies and describes the current level of understanding of Io's physics, chemistry, geology, orbital dynamics, and geophysics. Consideration is given to the satellite's internal, superficial, atmospheric, plasma, and magnetospheric properties and how they interrelate. A pictorial map of Io's surface based on Voyager 1 and 2 images is presented. It is found that Io's surface color and spectra are dominated by sulfur compounds which may include various sulfur allotropes. Volcanic processes yielding three kinds of surface features (vent regions, plains, and mountains) dominate Io's surface geology. The Io plasma torus corotates with Jupiter's magnetic field in the plane of Jupiter's centrifugal equator centered at Io's orbital radius

  13. Cross-Layer Energy Optimization for IoT Environments: Technical Advances and Opportunities

    Directory of Open Access Journals (Sweden)

    Kirshna Kumar

    2017-12-01

    Full Text Available Energy efficiency is a significant characteristic of battery-run devices such as sensors, RFID and mobile phones. In the present scenario, this is the most prominent requirement that must be served while introducing a communication protocol for an IoT environment. IoT network success and performance enhancement depend heavily on optimization of energy consumption that enhance the lifetime of IoT nodes and the network. In this context, this paper presents a comprehensive review on energy efficiency techniques used in IoT environments. The techniques proposed by researchers have been categorized based on five different layers of the energy architecture of IoT. These five layers are named as sensing, local processing and storage, network/communication, cloud processing and storage, and application. Specifically, the significance of energy efficiency in IoT environments is highlighted. A taxonomy is presented for the classification of related literature on energy efficient techniques in IoT environments. Following the taxonomy, a critical review of literature is performed focusing on major functional models, strengths and weaknesses. Open research challenges related to energy efficiency in IoT are identified as future research directions in the area. The survey should benefit IoT industry practitioners and researchers, in terms of augmenting the understanding of energy efficiency and its IoT-related trends and issues.

  14. Intra-Minute Cloud Passing Forecasting Based on a Low Cost IoT Sensor—A Solution for Smoothing the Output Power of PV Power Plants

    Science.gov (United States)

    Sukič, Primož; Štumberger, Gorazd

    2017-01-01

    Clouds moving at a high speed in front of the Sun can cause step changes in the output power of photovoltaic (PV) power plants, which can lead to voltage fluctuations and stability problems in the connected electricity networks. These effects can be reduced effectively by proper short-term cloud passing forecasting and suitable PV power plant output power control. This paper proposes a low-cost Internet of Things (IoT)-based solution for intra-minute cloud passing forecasting. The hardware consists of a Raspberry PI Model B 3 with a WiFi connection and an OmniVision OV5647 sensor with a mounted wide-angle lens, a circular polarizing (CPL) filter and a natural density (ND) filter. The completely new algorithm for cloud passing forecasting uses the green and blue colors in the photo to determine the position of the Sun, to recognize the clouds, and to predict their movement. The image processing is performed in several stages, considering selectively only a small part of the photo relevant to the movement of the clouds in the vicinity of the Sun in the next minute. The proposed algorithm is compact, fast and suitable for implementation on low cost processors with low computation power. The speed of the cloud parts closest to the Sun is used to predict when the clouds will cover the Sun. WiFi communication is used to transmit this data to the PV power plant control system in order to decrease the output power slowly and smoothly. PMID:28505078

  15. Industrial Cloud: Toward Inter-enterprise Integration

    Science.gov (United States)

    Wlodarczyk, Tomasz Wiktor; Rong, Chunming; Thorsen, Kari Anne Haaland

    Industrial cloud is introduced as a new inter-enterprise integration concept in cloud computing. The characteristics of an industrial cloud are given by its definition and architecture and compared with other general cloud concepts. The concept is then demonstrated by a practical use case, based on Integrated Operations (IO) in the Norwegian Continental Shelf (NCS), showing how industrial digital information integration platform gives competitive advantage to the companies involved. Further research and development challenges are also discussed.

  16. NIMS: hotspots on Io during G2 (continued)

    Science.gov (United States)

    1997-01-01

    This is another Near Infrared Mapping Spectrometer (NIMS) image of Io, taken during the G2 encounter in September 1996. This is a dayside image of Io (on the right) against the clouds of Jupiter (the blue background). On the left is a Voyager mosaic of Io with the same viewing geometry for comparison purposes. This NIMS data set has been processed to highlight the positions of hot spots on the surface of Io. At least 11 can be seen. Two of the hotspots are newly discovered by the NIMS instrument. Others correspond to sites of plume eruptions and volcanic calderas and volcanic flows. This image can be compared with the SSI image P-47971 released on October 23, 1996, which was taken almost exactly the same position.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA's Office of Space Science, Washington, DC.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA's Office of Space Science, Washington, DC.This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov.

  17. Data-Filtering System to Avoid Total Data Distortion in IoT Networking

    Directory of Open Access Journals (Sweden)

    Dae-Young Kim

    2017-01-01

    Full Text Available In the Internet of Things (IoT networking, numerous objects are connected to a network. They sense events and deliver the sensed information to the cloud. A lot of data is generated in the IoT network, and servers in the cloud gather the sensed data from the objects. Then, the servers analyze the collected data and provide proper intelligent services to users through the results of the analysis. When the server analyzes the collected data, if there exists malfunctioning data, distortional results of the analysis will be generated. The distortional results lead to misdirection of the intelligent services, leading to poor user experience. In the analysis for intelligent services in IoT, malfunctioning data should be avoided because integrity of the collected data is crucial. Therefore, this paper proposes a data-filtering system for the server in the cloud. The proposed data-filtering system is placed in front of the server and firstly receives the sensed data from the objects. It employs the naïve Bayesian classifier and, by learning, classifies the malfunctioning data from among the collected data. Data with integrity is delivered to the server for analysis. Because the proposed system filters the malfunctioning data, the server can obtain accurate analysis results and reduce computing load. The performance of the proposed data-filtering system is evaluated through computer simulation. Through the simulation results, the efficiency of the proposed data-filtering system is shown.

  18. An Efficient SDN Multicast Architecture for Dynamic Industrial IoT Environments

    Directory of Open Access Journals (Sweden)

    Hyeong-Su Kim

    2018-01-01

    Full Text Available Large-scale industrial IoT services appear in smart factory domains such as factory clouds which integrate distributed small factories into a large virtual factory with dynamic combination based on orders of consumers. A smart factory has so many industrial elements including various sensors/actuators, gateways, controllers, application servers, and IoT clouds. Since there are complex connections and relations, it is hard to handle them in point-to-point manner. In addition, many duplicated traffics are exchanged between them through the Internet. Multicast is believed as an effective many-to-many communication mechanism by establishing multicast trees between sources and receivers. There are, however, some issues for adopting multicast to large-scale industrial IoT services in terms of QoS. In this paper, we propose a novel software-defined network multicast based on group shared tree which includes near-receiver rendezvous point selection algorithm and group shared tree switching mechanism. As a result, the proposed multicast mechanism can reduce the packet loss by 90% compared to the legacy methods under severe congestion condition. GST switching method obtains to decreased packet delay effect, respectively, 2%, 20% better than the previously studied multicast and the legacy SDN multicast.

  19. Turning Internet of Things(IoT) into Internet of Vulnerabilities (IoV) : IoT Botnets

    OpenAIRE

    Angrishi, Kishore

    2017-01-01

    Internet of Things (IoT) is the next big evolutionary step in the world of internet. The main intention behind the IoT is to enable safer living and risk mitigation on different levels of life. With the advent of IoT botnets, the view towards IoT devices has changed from enabler of enhanced living into Internet of vulnerabilities for cyber criminals. IoT botnets has exposed two different glaring issues, 1) A large number of IoT devices are accessible over public Internet. 2) Security (if cons...

  20. Proactive vs reactive failure recovery assessment in combined fog-to-cloud (F2C) systems

    OpenAIRE

    Souza, Vitor Barbosa Carlos de; Masip Bruin, Xavier; Marín Tordera, Eva; Ramirez Almonte, Wilson; Sánchez López, Sergio

    2017-01-01

    The increasing number of end user devices at the edge of the network, along with their ever increasing computing capacity, as well as the advances in Data Center technologies, paved the way for the generation of Internet of Things (IoT). Several IoT services have been deployed leveraging Cloud Computing and, more recently, Fog Computing. In order to enable efficient control of cloud and fog premises, Fog-to-Cloud (F2C) has been recently proposed as a distributed architecture for coordinated m...

  1. Reliable IoT Storage: Minimizing Bandwidth Use in Storage Without Newcomer Nodes

    DEFF Research Database (Denmark)

    Zhao, Xiaobo; Lucani Rötter, Daniel Enrique; Shen, Xiaohong

    2018-01-01

    This letter characterizes the optimal policies for bandwidth use and storage for the problem of distributed storage in Internet of Things (IoT) scenarios, where lost nodes cannot be replaced by new nodes as is typically assumed in Data Center and Cloud scenarios. We develop an information flow...... model that captures the overall process of data transmission between IoT devices, from the initial preparation stage (generating redundancy from the original data) to the different repair stages with fewer and fewer devices. Our numerical results show that in a system with 10 nodes, the proposed optimal...

  2. Use of new components in ios5

    OpenAIRE

    Cvenkel, Gašper

    2012-01-01

    Technological development of mobile technology is very fast now days, which contribute to increasing number of smart phones available on the market. Those phones are driven by different operating systems, which are developing, getting new features and upgrades. That is one of the reasons to introduce new features of iOS 5 (iCloud, Storyboard, Notification Center), compare them with competition and present pros and cons. The very rapid development is also reflected by the fact, that it is alre...

  3. The role of sodium bicarbonate in the nucleation of noctilucent clouds

    Directory of Open Access Journals (Sweden)

    J. M. C. Plane

    2000-07-01

    Full Text Available It is proposed that a component of meteoric smoke, sodium bicarbonate (NaHCO3, provides particularly effective condensation nuclei for noctilucent clouds. This assertion is based on three conditions being met. The first is that NaHCO3 is present at sufficient concentration (±104 cm-3 in the upper mesosphere between 80 and 90 km. It is demonstrated that there is strong evidence for this based on recent laboratory measurements coupled with atmospheric modelling. The second condition is that the thermodynamics of NaHCO3(H2On cluster formation allow spontaneous nucleation to occur under mesospheric conditions at temperatures below 140 K. The Gibbs free energy changes for forming clusters with n = 1 and 2 were computed from quantum calculations using hybrid density functional/Hartree-Fock (B3LYP theory and a large basis set with added polarization and diffuse functions. The results were then extrapolated to higher n using an established dependence of the free energy on cluster size and the free energy for the sublimation of H2O to bulk ice. A 1-dimensional model of sodium chemistry was then employed to show that spontaneous nucleation to form ice particles (n >100 should occur between 84 and 89 km in the high-latitude summer mesosphere. The third condition is that other metallic components of meteoric smoke are less effective condensation nuclei, so that the total number of potential nuclei is small relative to the amount of available H2O. Quantum calculations indicate that this is probably the case for major constituents such as Fe(OH2, FeO3 and MgCO3.Key words: Atmospheric composition and structure (aerosols and particles; cloud physics and chemistry; middle atmosphere · composition and chemistry

  4. Contribution of nonlinear acoustic to the characterization of micro-bubbles clouds in liquid sodium. Application to the generation IV nuclear reactors

    International Nuclear Information System (INIS)

    Cavaro, M.

    2010-11-01

    The SFR system chosen (Sodium Fast Reactor: fast neutron reactors cooled by liquid sodium) by France led to a fourth-generation prototype named ASTRID. The development of this kind of reactors presents several challenges, particularly in terms of improving the safety and monitoring operation. This involves, among other things, characterization of the bubbles presence in liquid sodium. The characterization of the bubbles presence is the subject of this thesis. It involves the determination of void fraction (gas volume fraction) and histogram of the radii of bubbles. The bibliographic work done has shown that linear acoustic techniques for the characterization of bubble clouds are inadequate to achieve this. However promising leads have been identified by studying nonlinear acoustic techniques. This last idea has therefore been explored. An experimental water bench for the generation and optical control of micro-bubbles cloud allowed us to validate finely the reconstruction of histograms of radii through a technique of nonlinear mixing of a high frequency with a low frequency. The potential of the mixing of two high frequencies, more interesting for the industrial point of view has also been demonstrated. Finally, the bases of the transposition of an original technique of nonlinear resonance spectroscopy applied to a bubbles cloud were explored through the introduction of acoustic resonators. The results offer many interesting opportunities, both in terms of industrial applications and for more fundamental understanding of non-linear behavior of a bubble excited by multiple frequencies and of bubbles clouds excited at low frequency. (author)

  5. Volcanism on Io

    Science.gov (United States)

    Davies, Ashley Gerard

    2014-03-01

    Preface; Introduction; Part I. Io, 1610 to 1995: Galileo to Galileo: 1. Io, 1610-1979; 2. Between Voyager and Galileo: 1979-95; 3. Galileo at Io; Part II. Planetary Volcanism: Evolution and Composition: 4. Io and Earth: formation, evolution, and interior structure; 5. Magmas and volatiles; Part III. Observing and Modeling Volcanic Activity: 6. Observations: thermal remote sensing of volcanic activity; 7. Models of effusive eruption processes; 8. Thermal evolution of volcanic eruptions; Part IV. Galileo at Io: the Volcanic Bestiary: 9. The view from Galileo; 10. The lava lake at Pele; 11. Pillan and Tvashtar: lava fountains and flows; 12. Prometheus and Amirani: Effusive activity and insulated flows; 13. Loki Patera: Io's powerhouse; 14. Other volcanoes and eruptions; Part V. Volcanism on Io: The Global View: 15. Geomorphology: paterae, shields, flows and mountains; 16. Volcanic plumes; 17. Hot spots; Part VI. Io after Galileo: 18. Volcanism on Io: a post-Galileo view; 19. The future of Io observations; Appendix 1; Appendix 2; References; Index.

  6. Remote Monitoring of Soil Water Content, Temperature, and Heat Flow Using Low-Cost Cellular (3G) IoT Technology

    Science.gov (United States)

    Ham, J. M.

    2016-12-01

    New microprocessor boards, open-source sensors, and cloud infrastructure developed for the Internet of Things (IoT) can be used to create low-cost monitoring systems for environmental research. This project describes two applications in soil science and hydrology: 1) remote monitoring of the soil temperature regime near oil and gas operations to detect the thermal signature associated with the natural source zone degradation of hydrocarbon contaminants in the vadose zone, and 2) remote monitoring of soil water content near the surface as part of a global citizen science network. In both cases, prototype data collection systems were built around the cellular (2G/3G) "Electron" microcontroller (www.particle.io). This device allows connectivity to the cloud using a low-cost global SIM and data plan. The systems have cellular connectivity in over 100 countries and data can be logged to the cloud for storage. Users can view data real time over any internet connection or via their smart phone. For both projects, data logging, storage, and visualization was done using IoT services like Thingspeak (thingspeak.com). The soil thermal monitoring system was tested on experimental plots in Colorado USA to evaluate the accuracy and reliability of different temperature sensors and 3D printed housings. The soil water experiment included comparison opens-source capacitance-based sensors to commercial versions. Results demonstrate the power of leveraging IoT technology for field research.

  7. Enabling Large-Scale IoT-Based Services through Elastic Publish/Subscribe.

    Science.gov (United States)

    Vavassori, Sergio; Soriano, Javier; Fernández, Rafael

    2017-09-19

    In this paper, we report an algorithm that is designed to leverage the cloud as infrastructure to support Internet of Things (IoT) by elastically scaling in/out so that IoT-based service users never stop receiving sensors' data. This algorithm is able to provide an uninterrupted service to end users even during the scaling operation since its internal state repartitioning is transparent for publishers or subscribers; its scaling operation is time-bounded and depends only on the dimension of the state partitions to be transmitted to the different nodes. We describe its implementation in E-SilboPS, an elastic content-based publish/subscribe (CBPS) system specifically designed to support context-aware sensing and communication in IoT-based services. E-SilboPS is a key internal asset of the FIWARE IoT services enablement platform, which offers an architecture of components specifically designed to capture data from, or act upon, IoT devices as easily as reading/changing the value of attributes linked to context entities. In addition, we discuss the quantitative measurements used to evaluate the scale-out process, as well as the results of this evaluation. This new feature rounds out the context-aware content-based features of E-SilboPS by providing, for example, the necessary middleware for constructing dashboards and monitoring panels that are capable of dynamically changing queries and continuously handling data in IoT-based services.

  8. Estudio de las mejoras de aplicar Fog Computing en la distribución de servicios en Cloud Computing

    OpenAIRE

    Rodríguez, Nelson R.; Murazzo, María Antonia; Chávez, Susana Beatriz; Martín, Adriana Elba; Medel, Diego; Mercado, Jorge; Montiveros, Matías

    2017-01-01

    La amplia adopción de Internet de las cosas (IoT) por parte de los usuarios y la industria, sumada a las estimaciones de crecimiento por parte de las consultoras, anticipa la generación de cantidades excesivas de datos hacia el Cloud. Sin bien el modelo tradicional de Cloud Computing ha dado respuesta a IT y ha tenido en crecimiento notable en los últimos años, está mostrando dificultades con estas nuevas tendencias. En consecuencia aparecieron nuevos requerimientos de IoT que Cloud no puede ...

  9. An Application-Based Performance Evaluation of NASAs Nebula Cloud Computing Platform

    Science.gov (United States)

    Saini, Subhash; Heistand, Steve; Jin, Haoqiang; Chang, Johnny; Hood, Robert T.; Mehrotra, Piyush; Biswas, Rupak

    2012-01-01

    The high performance computing (HPC) community has shown tremendous interest in exploring cloud computing as it promises high potential. In this paper, we examine the feasibility, performance, and scalability of production quality scientific and engineering applications of interest to NASA on NASA's cloud computing platform, called Nebula, hosted at Ames Research Center. This work represents the comprehensive evaluation of Nebula using NUTTCP, HPCC, NPB, I/O, and MPI function benchmarks as well as four applications representative of the NASA HPC workload. Specifically, we compare Nebula performance on some of these benchmarks and applications to that of NASA s Pleiades supercomputer, a traditional HPC system. We also investigate the impact of virtIO and jumbo frames on interconnect performance. Overall results indicate that on Nebula (i) virtIO and jumbo frames improve network bandwidth by a factor of 5x, (ii) there is a significant virtualization layer overhead of about 10% to 25%, (iii) write performance is lower by a factor of 25x, (iv) latency for short MPI messages is very high, and (v) overall performance is 15% to 48% lower than that on Pleiades for NASA HPC applications. We also comment on the usability of the cloud platform.

  10. The role of sodium bicarbonate in the nucleation of noctilucent clouds

    Directory of Open Access Journals (Sweden)

    J. M. C. Plane

    Full Text Available It is proposed that a component of meteoric smoke, sodium bicarbonate (NaHCO3, provides particularly effective condensation nuclei for noctilucent clouds. This assertion is based on three conditions being met. The first is that NaHCO3 is present at sufficient concentration (±104 cm-3 in the upper mesosphere between 80 and 90 km. It is demonstrated that there is strong evidence for this based on recent laboratory measurements coupled with atmospheric modelling. The second condition is that the thermodynamics of NaHCO3(H2On cluster formation allow spontaneous nucleation to occur under mesospheric conditions at temperatures below 140 K. The Gibbs free energy changes for forming clusters with n = 1 and 2 were computed from quantum calculations using hybrid density functional/Hartree-Fock (B3LYP theory and a large basis set with added polarization and diffuse functions. The results were then extrapolated to higher n using an established dependence of the free energy on cluster size and the free energy for the sublimation of H2O to bulk ice. A 1-dimensional model of sodium chemistry was then employed to show that spontaneous nucleation to form ice particles (n >100 should occur between 84 and 89 km in the high-latitude summer mesosphere. The third condition is that other metallic components of meteoric smoke are less effective condensation nuclei, so that the total number of potential nuclei is small relative to the amount of available H2O. Quantum calculations indicate that this is probably the case for major constituents such as Fe(OH2, FeO3 and MgCO3.

    Key words: Atmospheric composition and structure (aerosols and particles; cloud physics and chemistry; middle atmosphere · composition and chemistry

  11. Io after Galileo

    International Nuclear Information System (INIS)

    Lopes, Rosaly M C; Williams, David A

    2005-01-01

    Io, the volcanically active innermost large moon of Jupiter, was a target of intense study during the recently completed NASA Galileo mission to Jupiter (1989-2003). Galileo's suite of instruments obtained unprecedented observations of Io, including high spatial resolution imaging in the visible and infrared. This paper reviews the insights gained about Io's surface, atmosphere and space environment during the Galileo mission. Io is thought to have a large Fe-FeS core, whose radius is slightly less than half the radius of Io and whose mass is 20% of the moon. The lack of an intrinsic magnetic field implies that the core is either completely solid or completely liquid. The mantle of Io appears to undergo a high degree of partial melting (20-50% molten) that produces ultramafic lavas dominated by Mg-rich orthopyroxene in an apparent 'mushy magma ocean', suggesting an undifferentiated mantle. The crust of Io is thought to be rigid, 20-30 km thick, cold away from volcanic heat sources and composed of mafic to ultramafic silicates. Tidal flexing due to Io's orbital resonance produces ∼100 m tides at the surface, generating heat that powers Io's volcanism. Silicate volcanism appears to be dominant at most hot spots, although secondary sulfur volcanism may be important in some areas. The key discoveries of the Galileo era at Io were: (1) the detection of high-temperature volcanism (ultramafic, superheated mafic or 'ceramic'); (2) the detection of both S 2 and SO 2 gas in Ionian plumes; (3) the distinction between eruption styles, including between Pelean plumes (originating from central vents) and Promethean plumes (originating from silicate lava flow fronts); (4) the relationship between mountains and paterae, which indicates that many paterae are formed as magma preferentially ascends along tectonic faults associated with mountain building; (5) the lack of detection of an intrinsic magnetic field; (6) a new estimate of global heat flow; and (7) increased understanding

  12. Understanding the Performance of Low Power Raspberry Pi Cloud for Big Data

    Directory of Open Access Journals (Sweden)

    Wajdi Hajji

    2016-06-01

    Full Text Available Nowadays, Internet-of-Things (IoT devices generate data at high speed and large volume. Often the data require real-time processing to support high system responsiveness which can be supported by localised Cloud and/or Fog computing paradigms. However, there are considerably large deployments of IoT such as sensor networks in remote areas where Internet connectivity is sparse, challenging the localised Cloud and/or Fog computing paradigms. With the advent of the Raspberry Pi, a credit card-sized single board computer, there is a great opportunity to construct low-cost, low-power portable cloud to support real-time data processing next to IoT deployments. In this paper, we extend our previous work on constructing Raspberry Pi Cloud to study its feasibility for real-time big data analytics under realistic application-level workload in both native and virtualised environments. We have extensively tested the performance of a single node Raspberry Pi 2 Model B with httperf and a cluster of 12 nodes with Apache Spark and HDFS (Hadoop Distributed File System. Our results have demonstrated that our portable cloud is useful for supporting real-time big data analytics. On the other hand, our results have also unveiled that overhead for CPU-bound workload in virtualised environment is surprisingly high, at 67.2%. We have found that, for big data applications, the virtualisation overhead is fractional for small jobs but becomes more significant for large jobs, up to 28.6%.

  13. Big Data, Internet of Things and Cloud Convergence--An Architecture for Secure E-Health Applications.

    Science.gov (United States)

    Suciu, George; Suciu, Victor; Martian, Alexandru; Craciunescu, Razvan; Vulpe, Alexandru; Marcu, Ioana; Halunga, Simona; Fratu, Octavian

    2015-11-01

    Big data storage and processing are considered as one of the main applications for cloud computing systems. Furthermore, the development of the Internet of Things (IoT) paradigm has advanced the research on Machine to Machine (M2M) communications and enabled novel tele-monitoring architectures for E-Health applications. However, there is a need for converging current decentralized cloud systems, general software for processing big data and IoT systems. The purpose of this paper is to analyze existing components and methods of securely integrating big data processing with cloud M2M systems based on Remote Telemetry Units (RTUs) and to propose a converged E-Health architecture built on Exalead CloudView, a search based application. Finally, we discuss the main findings of the proposed implementation and future directions.

  14. A Taxonomy and Future Directions for Sustainable Cloud Computing: 360 Degree View

    OpenAIRE

    Gill, Sukhpal Singh; Buyya, Rajkumar

    2017-01-01

    The cloud computing paradigm offers on-demand services over the Internet and supports a wide variety of applications. With the recent growth of Internet of Things (IoT) based applications the usage of cloud services is increasing exponentially. The next generation of cloud computing must be energy-efficient and sustainable to fulfill the end-user requirements which are changing dynamically. Presently, cloud providers are facing challenges to ensure the energy efficiency and sustainability of ...

  15. Neutral hydrogen in elliptical and IO galaxies

    International Nuclear Information System (INIS)

    Bottinelli, L.; Gouguenheim, L.

    1979-01-01

    New HI detections have been obtained using the Nancay radiotelescope for NGC 2974 and 3962. These results and the large scale distribution obtained for NGC 3962 indicate that the HI-rich elliptical galaxies exhibit common properties which are not easily explained by accretion of an intergalactic cloud. The field aroud NGC 1052 has been mapped and there is an HI connection with the neighbouring galaxies. The HI content of several IO galaxies indicates that the galaxies which are members of groups are relatively HI-rich; this could be produced by additional HI coming from companion galaxies [fr

  16. IoT Architectural Framework: Connection and Integration Framework for IoT Systems

    OpenAIRE

    Uviase, Onoriode; Kotonya, Gerald

    2018-01-01

    The proliferation of the Internet of Things (IoT) has since seen a growing interest in architectural design and adaptive frameworks to promote the connection between heterogeneous IoT devices and IoT systems. The most widely favoured software architecture in IoT is the Service Oriented Architecture (SOA), which aims to provide a loosely coupled systems to leverage the use and reuse of IoT services at the middle-ware layer, to minimise system integration problems. However, despite the flexibil...

  17. IoT gateway architecture

    OpenAIRE

    Leleika, Paulius

    2017-01-01

    This paper provides an overview of HTTP, CoAP, AMQP, DDS, MQTT, XMPP communication protocols. The main IoT problem is that IoT devices uses many different communication protocols and devices cannot communicate with each other directly. IoT gateway helps to solve that problem. This paper also identifies requirements for IoT gateway software. Provides solution for communication between devices which are using different messaging architectures. Presents security aspects and ways to secure IoT ga...

  18. Analysis of establishing back-end system for mobile devices IOS and Android on Google App Engine platform

    OpenAIRE

    Kambič, Dušan

    2013-01-01

    The following thesis discusses the Google App Engine (GAE), in relation to Google Cloud Endpoints (GCE). GAE is an example of cloud computing model, which is called Platform as a Service (PaaS). It enables developers to develop and host scalable applications on Google's infrastructure. The companies can hire the right amount of server resources for current needs, thereby reducing business costs. For developed GAE applications we can automatically generate libraries for Android, iOS and Javasc...

  19. Architecting Cloud-Enabled Systems: A Systematic Survey of Challenges and Solutions

    DEFF Research Database (Denmark)

    Chauhan, Aufeef; Babar, Muhammad Ali; Benatallah, Boualem

    2016-01-01

    architectures for cloud-based systems. Our key conclusions are that a large number of primary studies focus on middleware services aimed at achieving scalability, performance, response time and efficient resource optimization. Architecting cloud-based systems presents unique challenges as the systems...... to be designed range from pervasive embedded systems and enterprise applications to smart devices with Internet of Things (IoTs). We also conclude that there is a huge potential of research on architecting cloud-based systems in areas related to green computing, energy efficient systems, mobile cloud computing...

  20. EDGE TECHNOLOGIES IN IoT AND APPLICATION SCENARIO OF RFID BASED IoT

    OpenAIRE

    Dharam Gami *, Asst. Prof. Dhaval Nimavat, Asst. Prof. Shubham Sharma

    2016-01-01

    Internet of Things possesses the power to change the era. IoT will offer an advance connectivity between objects which will change the face of machine-to-machine communication. IoT will connect autonomous systems, devices and heterogeneous machines and make them communicate without human interactions. Many technologies will play significant role in IoT implementation. In this paper, we aim to describe the candidate of edge technologies in IoT and demonstrate how RFID based IoT system will loo...

  1. IoT gateways, cloud and the last mile for energy efficiency and sustainability in the era of CPS expansion: "A bot is irrigating my farm.. "

    Science.gov (United States)

    Papageorgas, Panagiotis G.; Agavanakis, Kyriakos; Dogas, Ioannis; Piromalis, Dimitrios D.

    2018-05-01

    A cloud-based architecture is presented for the internetworking of sensors and actuators through a universal gateway, network server and application user interface design. The proposed approach targets to Energy Efficiency and sustainability in a holistic way, by integrating an open-source test bed prototype based on long-range low-bandwidth wireless networking technology for sensing and actuation as the elementary block of a viable, cost-effective and reliable solution. The prototype presented is capable of supporting both sensors and actuators, processing data locally and transmitting the results of the imposed computations to a higher level node. Additionally, it is combined with a service-oriented architecture and involves publish/subscribe middleware protocols and cloud technology to confront with the system needs in terms of data volume and processing power. In this context, the integration of instant message (chat) services is demonstrated so that they can be part of an emerging global-scope eco-system of Cyber-Physical Systems to support a wide variety of IoT applications, with strong advantages such as usability, scalability and security, while adopting a unified gateway design and a simple - yet powerful - user interface.

  2. AntibIoTic: Protecting IoT Devices Against DDoS Attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2018-01-01

    The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack. This character, along with the increasing...... availability of connected and insecure IoT devices, makes DDoS and IoT the perfect pair for the malware industry. In this paper we present the main idea behind AntibIoTic, a palliative solution to prevent DDoS attacks perpetrated through IoT devices....

  3. Using Formal Grammars to Predict I/O Behaviors in HPC: The Omnisc'IO Approach

    Energy Technology Data Exchange (ETDEWEB)

    Dorier, Matthieu; Ibrahim, Shadi; Antoniu, Gabriel; Ross, Rob

    2016-08-01

    The increasing gap between the computation performance of post-petascale machines and the performance of their I/O subsystem has motivated many I/O optimizations including prefetching, caching, and scheduling. In order to further improve these techniques, modeling and predicting spatial and temporal I/O patterns of HPC applications as they run has become crucial. In this paper we present Omnisc'IO, an approach that builds a grammar-based model of the I/O behavior of HPC applications and uses it to predict when future I/O operations will occur, and where and how much data will be accessed. To infer grammars, Omnisc'IO is based on StarSequitur, a novel algorithm extending Nevill-Manning's Sequitur algorithm. Omnisc'IO is transparently integrated into the POSIX and MPI I/O stacks and does not require any modification in applications or higher-level I/O libraries. It works without any prior knowledge of the application and converges to accurate predictions of any N future I/O operations within a couple of iterations. Its implementation is efficient in both computation time and memory footprint.

  4. There is no I/O like no I/O

    International Nuclear Information System (INIS)

    Johnston, T.Y.

    1985-01-01

    On most computer systems the most common cause of performance degradation is I/O contention. This paper will examine some efforts that can be taken in a VM environment to reduce I/O or its effect at both the global and local levels

  5. AP-IO: asynchronous pipeline I/O for hiding periodic output cost in CFD simulation.

    Science.gov (United States)

    Xiaoguang, Ren; Xinhai, Xu

    2014-01-01

    Computational fluid dynamics (CFD) simulation often needs to periodically output intermediate results to files in the form of snapshots for visualization or restart, which seriously impacts the performance. In this paper, we present asynchronous pipeline I/O (AP-IO) optimization scheme for the periodically snapshot output on the basis of asynchronous I/O and CFD application characteristics. In AP-IO, dedicated background I/O processes or threads are in charge of handling the file write in pipeline mode, therefore the write overhead can be hidden with more calculation than classic asynchronous I/O. We design the framework of AP-IO and implement it in OpenFOAM, providing CFD users with a user-friendly interface. Experimental results on the Tianhe-2 supercomputer demonstrate that AP-IO can achieve a good optimization effect for the periodical snapshot output in CFD application, and the effect is especially better for massively parallel CFD simulations, which can reduce the total execution time up to about 40%.

  6. AP-IO: Asynchronous Pipeline I/O for Hiding Periodic Output Cost in CFD Simulation

    Directory of Open Access Journals (Sweden)

    Ren Xiaoguang

    2014-01-01

    Full Text Available Computational fluid dynamics (CFD simulation often needs to periodically output intermediate results to files in the form of snapshots for visualization or restart, which seriously impacts the performance. In this paper, we present asynchronous pipeline I/O (AP-IO optimization scheme for the periodically snapshot output on the basis of asynchronous I/O and CFD application characteristics. In AP-IO, dedicated background I/O processes or threads are in charge of handling the file write in pipeline mode, therefore the write overhead can be hidden with more calculation than classic asynchronous I/O. We design the framework of AP-IO and implement it in OpenFOAM, providing CFD users with a user-friendly interface. Experimental results on the Tianhe-2 supercomputer demonstrate that AP-IO can achieve a good optimization effect for the periodical snapshot output in CFD application, and the effect is especially better for massively parallel CFD simulations, which can reduce the total execution time up to about 40%.

  7. CERNBox: Petabyte-Scale Cloud Synchronisation and Sharing Platform

    OpenAIRE

    Hugo González Labrador

    2016-01-01

    CERNBox is a cloud synchronisation service for end-users: it allows syncing and sharing files on all major mobile and desktop platforms (Linux, Windows, MacOSX, Android, iOS) aiming to provide offline availability to any data stored in the CERN EOS infrastructure. There is a high demand in the community for an easily accessible cloud storage solution such as CERNBox. Integration of the CERNBox service with the EOS storage back-end is the next step towards providing ’synchronisation and sharin...

  8. A Novel Location-Centric IoT-Cloud Based On-Street Car Parking Violation Management System in Smart Cities.

    Science.gov (United States)

    Dinh, Thanh; Kim, Younghan

    2016-06-02

    Nowadays, in big cities, parking management is a critical issue from both the driver's side and the city government's side. From the driver's side, how to find an available parking lot in a city is a considerable concern. As a result, smart parking systems recently have received great interest, both in academia and industry. From the city government's side, how to manage and distribute such a limited public parking resource efficiently to give every visitor a fair chance of finding an on-street parking lot is also a considerable concern. However, existing studies of smart parking management focus only on assisting the driver's side to find available parking spaces. This study aims to raise a new perspective on such smart parking management and to propose a novel location-centric IoT-cloud-based parking violation management system. The system is designed to assist authoritative officers in finding parking violations easily and recommends the least cost path for officers so that officers can achieve their highest productivity in finding parking violations and issuing parking tickets. Experimental results show that the system not only improves the productivity of officers in finding parking violations and issuing tickets, but also helps reduce the traveling cost of officers and to reduce the average violation period of violating cars considerably.

  9. High performance parallel I/O

    CERN Document Server

    Prabhat

    2014-01-01

    Gain Critical Insight into the Parallel I/O EcosystemParallel I/O is an integral component of modern high performance computing (HPC), especially in storing and processing very large datasets to facilitate scientific discovery. Revealing the state of the art in this field, High Performance Parallel I/O draws on insights from leading practitioners, researchers, software architects, developers, and scientists who shed light on the parallel I/O ecosystem.The first part of the book explains how large-scale HPC facilities scope, configure, and operate systems, with an emphasis on choices of I/O har

  10. SDTCP: Towards Datacenter TCP Congestion Control with SDN for IoT Applications.

    Science.gov (United States)

    Lu, Yifei; Ling, Zhen; Zhu, Shuhong; Tang, Ling

    2017-01-08

    The Internet of Things (IoT) has gained popularity in recent years. Today's IoT applications are now increasingly deployed in cloud platforms to perform Big Data analytics. In cloud data center networks (DCN), TCP incast usually happens when multiple senders simultaneously communicate with a single receiver. However, when TCP incast happens, DCN may suffer from both throughput collapse for TCP burst flows and temporary starvation for TCP background flows. In this paper, we propose a software defined network (SDN)-based TCP congestion control mechanism, referred to as SDTCP, to leverage the features, e.g., centralized control methods and the global view of the network, in order to solve the TCP incast problems. When we detect network congestion on an OpenFlow switch, our controller can select the background flows and reduce their bandwidth by adjusting the advertised window of TCP ACK packets of the corresponding background flows so as to reserve more bandwidth for burst flows. SDTCP is transparent to the end systems and can accurately decelerate the rate of background flows by leveraging the global view of the network gained via SDN. The experiments demonstrate that our SDTCP can provide high tolerance for burst flows and achieve better flow completion time for short flows. Therefore, SDTCP is an effective and scalable solution for the TCP incast problem.

  11. SDTCP: Towards Datacenter TCP Congestion Control with SDN for IoT Applications

    Directory of Open Access Journals (Sweden)

    Yifei Lu

    2017-01-01

    Full Text Available The Internet of Things (IoT has gained popularity in recent years. Today’s IoT applications are now increasingly deployed in cloud platforms to perform Big Data analytics. In cloud data center networks (DCN, TCP incast usually happens when multiple senders simultaneously communicate with a single receiver. However, when TCP incast happens, DCN may suffer from both throughput collapse for TCP burst flows and temporary starvation for TCP background flows. In this paper, we propose a software defined network (SDN-based TCP congestion control mechanism, referred to as SDTCP, to leverage the features, e.g., centralized control methods and the global view of the network, in order to solve the TCP incast problems. When we detect network congestion on an OpenFlow switch, our controller can select the background flows and reduce their bandwidth by adjusting the advertised window of TCP ACK packets of the corresponding background flows so as to reserve more bandwidth for burst flows. SDTCP is transparent to the end systems and can accurately decelerate the rate of background flows by leveraging the global view of the network gained via SDN. The experiments demonstrate that our SDTCP can provide high tolerance for burst flows and achieve better flow completion time for short flows. Therefore, SDTCP is an effective and scalable solution for the TCP incast problem.

  12. Road to Io

    International Nuclear Information System (INIS)

    Chang, T.

    1989-01-01

    The potential study of Io by the Galileo mission is discussed. The mission, which is scheduled for launch from the Space Shuttle in 1989, is expected to fly 20 to 100 times closer to the Galilean moons of Jupiter than the Voyager missions. Topics which the mission hopes to address include volcanism, tidal forces and continental drift on Io, and the torus of charged particles that accompanies Io on its orbit of Jupiter. The Venus-earth-earth gravity assist route of the mission and the NIR mapping spectrometer aboard Galileo are considered

  13. Dangoraižio projektavimo ypatumai

    Directory of Open Access Journals (Sweden)

    Robertas Volvačiovas

    2011-06-01

    Full Text Available Santrauka. Straipsnyje išskiriami pagrindiniai dangoraižio įgyvendinimo ir gyvavimo etapai, aptariamas dangoraižio projektavimo etapas, dangoraižio techninio projekto (TP ir darbo projekto (DP sudėtis, išskiriamos pagrindinės dangoraižių problemos, iškylančios projektavimo etape, ir pateikiami sprendimo būdai.Straipsnis lietuvių kalba

  14. A Self-Provisioning Mechanism in OpenStack for IoT Devices.

    Science.gov (United States)

    Solano, Antonio; Dormido, Raquel; Duro, Natividad; Sánchez, Juan Miguel

    2016-08-17

    The aim of this paper is to introduce a plug-and-play mechanism for an Internet of Things (IoT) device to instantiate a Software as a Service (SaaS) application in a private cloud, built up with OpenStack. The SaaS application is the digital avatar of a physical object connected to Internet. As a proof of concept, a Vending Machine is retrofitted and connected to Internet with and Arduino Open Hardware device. Once the self-configuration mechanism is completed, it is possible to order a product from a mobile communication device.

  15. A Novel Location-Centric IoT-Cloud Based On-Street Car Parking Violation Management System in Smart Cities

    Science.gov (United States)

    Dinh, Thanh; Kim, Younghan

    2016-01-01

    Nowadays, in big cities, parking management is a critical issue from both the driver’s side and the city government’s side. From the driver’s side, how to find an available parking lot in a city is a considerable concern. As a result, smart parking systems recently have received great interest, both in academia and industry. From the city government’s side, how to manage and distribute such a limited public parking resource efficiently to give every visitor a fair chance of finding an on-street parking lot is also a considerable concern. However, existing studies of smart parking management focus only on assisting the driver’s side to find available parking spaces. This study aims to raise a new perspective on such smart parking management and to propose a novel location-centric IoT-cloud-based parking violation management system. The system is designed to assist authoritative officers in finding parking violations easily and recommends the least cost path for officers so that officers can achieve their highest productivity in finding parking violations and issuing parking tickets. Experimental results show that the system not only improves the productivity of officers in finding parking violations and issuing tickets, but also helps reduce the traveling cost of officers and to reduce the average violation period of violating cars considerably. PMID:27271620

  16. A Novel Location-Centric IoT-Cloud Based On-Street Car Parking Violation Management System in Smart Cities

    Directory of Open Access Journals (Sweden)

    Thanh Dinh

    2016-06-01

    Full Text Available Nowadays, in big cities, parking management is a critical issue from both the driver’s side and the city government’s side. From the driver’s side, how to find an available parking lot in a city is a considerable concern. As a result, smart parking systems recently have received great interest, both in academia and industry. From the city government’s side, how to manage and distribute such a limited public parking resource efficiently to give every visitor a fair chance of finding an on-street parking lot is also a considerable concern. However, existing studies of smart parking management focus only on assisting the driver’s side to find available parking spaces. This study aims to raise a new perspective on such smart parking management and to propose a novel location-centric IoT-cloud-based parking violation management system. The system is designed to assist authoritative officers in finding parking violations easily and recommends the least cost path for officers so that officers can achieve their highest productivity in finding parking violations and issuing parking tickets. Experimental results show that the system not only improves the productivity of officers in finding parking violations and issuing tickets, but also helps reduce the traveling cost of officers and to reduce the average violation period of violating cars considerably.

  17. IOs as Social Sites

    DEFF Research Database (Denmark)

    Park, Susan M.; Vetterlein, Antje

    Norms research has made significant inroads into examining their emergence and influence in international relations, while recognizing international organizations (IOs) as key social sites for norms to be created and/or disseminated. This paper interrogates how IOs as “organizational platforms......” (Finnemore 1996) influence the norm building process. Going beyond state-centric approaches to norm construction, it argues that the process of taking up a norm by an IO does affect the norm’s power. A norm’s strength is determined by the extent to which it is uncontested and taken for granted as appropriate...... the norm building process in this way provides insight into the effect of IOs as social sites in strengthening a norm....

  18. K2 Au(IO3)5 and β-KAu(IO3)4: Polar Materials with Strong SHG Responses Originating from Synergistic Effect of AuO4 and IO3 Units.

    Science.gov (United States)

    Xu, Xiang; Hu, Chun-Li; Li, Bing-Xuan; Mao, Jiang-Gao

    2016-01-26

    Two new polar potassium gold iodates, namely, K2 Au(IO3)5 (Cmc21) and β-KAu(IO3)4 (C2), have been synthesized and structurally characterized. Both compounds feature zero-dimensional polar [Au(IO3)4](-) units composed of an AuO4 square-planar unit coordinated by four IO3(-) ions in a monodentate fashion. In β-KAu(IO3)4, isolated [Au(IO3)4](-) ions are separated by K(+) ions, whereas in K2 Au(IO3)5, isolated [Au(IO3)4](-) ions and non-coordinated IO3(-) units are separated by K(+) ions. Both compounds are thermally stable up to 400 °C and exhibit high transmittance in the NIR region (λ=800-2500 nm) with measured optical band gaps of 2.65 eV for K2 Au(IO3 )5 and 2.75 eV for β-KAu(IO3)4. Powder second-harmonic generation measurements by using λ=2.05 μm laser radiation indicate that K2 Au(IO3)5 and β-KAu(IO3)4 are both phase-matchable materials with strong SHG responses of approximately 1.0 and 1.3 times that of KTiOPO4, respectively. Theoretical calculations based on DFT methods confirm that such strong SHG responses originate from a synergistic effect of the AuO4 and IO3 units. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  19. Relationships between radiation, clouds, and convection during DYNAMO

    Science.gov (United States)

    Ciesielski, Paul E.; Johnson, Richard H.; Jiang, Xianan; Zhang, Yunyan; Xie, Shaocheng

    2017-03-01

    The relationships between radiation, clouds, and convection on an intraseasonal time scale are examined with data taken during the Dynamics of the Madden-Julian Oscillation (MJO) field campaign. Specifically, column-net, as well as vertical profiles of radiative heating rates, computed over Gan Island in the central Indian Ocean (IO) are used along with an objective analysis of large-scale fields to examine three MJO events that occurred during the 3 month period (October to December 2011) over this region. Longwave (LW) and shortwave radiative heating rates exhibit tilted structures, reflecting radiative effects associated with the prevalence of shallow cumulus during the dry, suppressed MJO phase followed by increasing deep convection leading into the active phase. As the convection builds going into the MJO active phase, there are increasingly top-heavy anomalous radiative heating rates while the column-net radiative cooling rate progressively decreases. Temporal fluctuations in the cloud radiative forcing, being quite sensitive to changes in high cloudiness, are dominated by LW effects with an intraseasonal variation of 0.4-0.6 K/d. While both the water vapor and cloud fields are inextricably linked, it appears that the tilted radiative structures are more related to water vapor effects. The intraseasonal variation of column-net radiative heating enhances the convective signal in the mean by 20% with a minimum in this enhancement 10 days prior to peak MJO rainfall and maximum 7 days after. This suggests that as MJO convective envelope weakens over the central IO, cloud-radiative feedbacks help maintain the mature MJO as it moves eastward.

  20. High-performance file I/O in Java : existing approaches and bulk I/O extensions.

    Energy Technology Data Exchange (ETDEWEB)

    Bonachea, D.; Dickens, P.; Thakur, R.; Mathematics and Computer Science; Univ. of California at Berkeley; Illinois Institute of Technology

    2001-07-01

    There is a growing interest in using Java as the language for developing high-performance computing applications. To be successful in the high-performance computing domain, however, Java must not only be able to provide high computational performance, but also high-performance I/O. In this paper, we first examine several approaches that attempt to provide high-performance I/O in Java - many of which are not obvious at first glance - and evaluate their performance on two parallel machines, the IBM SP and the SGI Origin2000. We then propose extensions to the Java I/O library that address the deficiencies in the Java I/O API and improve performance dramatically. The extensions add bulk (array) I/O operations to Java, thereby removing much of the overhead currently associated with array I/O in Java. We have implemented the extensions in two ways: in a standard JVM using the Java Native Interface (JNI) and in a high-performance parallel dialect of Java called Titanium. We describe the two implementations and present performance results that demonstrate the benefits of the proposed extensions.

  1. Contrasting Cloud Composition Between Coupled and Decoupled Marine Boundary Layer Clouds

    Science.gov (United States)

    WANG, Z.; Mora, M.; Dadashazar, H.; MacDonald, A.; Crosbie, E.; Bates, K. H.; Coggon, M. M.; Craven, J. S.; Xian, P.; Campbell, J. R.; AzadiAghdam, M.; Woods, R. K.; Jonsson, H.; Flagan, R. C.; Seinfeld, J.; Sorooshian, A.

    2016-12-01

    Marine stratocumulus clouds often become decoupled from the vertical layer immediately above the ocean surface. This study contrasts cloud chemical composition between coupled and decoupled marine stratocumulus clouds. Cloud water and droplet residual particle composition were measured in clouds off the California coast during three airborne experiments in July-August of separate years (E-PEACE 2011, NiCE 2013, BOAS 2015). Decoupled clouds exhibited significantly lower overall mass concentrations in both cloud water and droplet residual particles, consistent with reduced cloud droplet number concentration and sub-cloud aerosol (Dp > 100 nm) number concentration, owing to detachment from surface sources. Non-refractory sub-micrometer aerosol measurements show that coupled clouds exhibit higher sulfate mass fractions in droplet residual particles, owing to more abundant precursor emissions from the ocean and ships. Consequently, decoupled clouds exhibited higher mass fractions of organics, nitrate, and ammonium in droplet residual particles, owing to effects of long-range transport from more distant sources. Total cloud water mass concentration in coupled clouds was dominated by sodium and chloride, and their mass fractions and concentrations exceeded those in decoupled clouds. Conversely, with the exception of sea salt constituents (e.g., Cl, Na, Mg, K), cloud water mass fractions of all species examined were higher in decoupled clouds relative to coupled clouds. These results suggest that an important variable is the extent to which clouds are coupled to the surface layer when interpreting microphysical data relevant to clouds and aerosol particles.

  2. Klasifikace v oblasti IoT

    OpenAIRE

    Flégl, Jaroslav

    2017-01-01

    This bachelor thesis is focused on classification of IoT. The aim of this thesis is classifying and categorizing IoT using systematic literature review. Several steps are needed to fulfill this aim. First part of this thesis focuses on defining IoT. Top ten companies, which invest the most to IoT are introduced with their view on IoT. Then follows characterization of classification and categorization including differences between them. Second part focuses on describing SLR. First of all the p...

  3. Modular HPC I/O characterization with Darshan

    Energy Technology Data Exchange (ETDEWEB)

    Snyder, Shane; Carns, Philip; Harms, Kevin; Ross, Robert; Lockwood, Glenn K.; Wright, Nicholas J.

    2016-11-13

    Contemporary high-performance computing (HPC) applications encompass a broad range of distinct I/O strategies and are often executed on a number of different compute platforms in their lifetime. These large-scale HPC platforms employ increasingly complex I/O subsystems to provide a suitable level of I/O performance to applications. Tuning I/O workloads for such a system is nontrivial, and the results generally are not portable to other HPC systems. I/O profiling tools can help to address this challenge, but most existing tools only instrument specific components within the I/O subsystem that provide a limited perspective on I/O performance. The increasing diversity of scientific applications and computing platforms calls for greater flexibililty and scope in I/O characterization.

  4. Big Data Clustering via Community Detection and Hyperbolic Network Embedding in IoT Applications.

    Science.gov (United States)

    Karyotis, Vasileios; Tsitseklis, Konstantinos; Sotiropoulos, Konstantinos; Papavassiliou, Symeon

    2018-04-15

    In this paper, we present a novel data clustering framework for big sensory data produced by IoT applications. Based on a network representation of the relations among multi-dimensional data, data clustering is mapped to node clustering over the produced data graphs. To address the potential very large scale of such datasets/graphs that test the limits of state-of-the-art approaches, we map the problem of data clustering to a community detection one over the corresponding data graphs. Specifically, we propose a novel computational approach for enhancing the traditional Girvan-Newman (GN) community detection algorithm via hyperbolic network embedding. The data dependency graph is embedded in the hyperbolic space via Rigel embedding, allowing more efficient computation of edge-betweenness centrality needed in the GN algorithm. This allows for more efficient clustering of the nodes of the data graph in terms of modularity, without sacrificing considerable accuracy. In order to study the operation of our approach with respect to enhancing GN community detection, we employ various representative types of artificial complex networks, such as scale-free, small-world and random geometric topologies, and frequently-employed benchmark datasets for demonstrating its efficacy in terms of data clustering via community detection. Furthermore, we provide a proof-of-concept evaluation by applying the proposed framework over multi-dimensional datasets obtained from an operational smart-city/building IoT infrastructure provided by the Federated Interoperable Semantic IoT/cloud Testbeds and Applications (FIESTA-IoT) testbed federation. It is shown that the proposed framework can be indeed used for community detection/data clustering and exploited in various other IoT applications, such as performing more energy-efficient smart-city/building sensing.

  5. A Self-Provisioning Mechanism in OpenStack for IoT Devices

    Directory of Open Access Journals (Sweden)

    Antonio Solano

    2016-08-01

    Full Text Available The aim of this paper is to introduce a plug-and-play mechanism for an Internet of Things (IoT device to instantiate a Software as a Service (SaaS application in a private cloud, built up with OpenStack. The SaaS application is the digital avatar of a physical object connected to Internet. As a proof of concept, a Vending Machine is retrofitted and connected to Internet with and Arduino Open Hardware device. Once the self-configuration mechanism is completed, it is possible to order a product from a mobile communication device.

  6. Bindings and RESTlets: A Novel Set of CoAP-Based Application Enablers to Build IoT Applications

    Directory of Open Access Journals (Sweden)

    Girum Ketema Teklemariam

    2016-08-01

    Full Text Available Sensors and actuators are becoming important components of Internet of Things (IoT applications. Today, several approaches exist to facilitate communication of sensors and actuators in IoT applications. Most communications go through often proprietary gateways requiring availability of the gateway for each and every interaction between sensors and actuators. Sometimes, the gateway does some processing of the sensor data before triggering actuators. Other approaches put this processing logic further in the cloud. These approaches introduce significant latencies and increased number of packets. In this paper, we introduce a CoAP-based mechanism for direct binding of sensors and actuators. This flexible binding solution is utilized further to build IoT applications through RESTlets. RESTlets are defined to accept inputs and produce outputs after performing some processing tasks. Sensors and actuators could be associated with RESTlets (which can be hosted on any device through the flexible binding mechanism we introduced. This approach facilitates decentralized IoT application development by placing all or part of the processing logic in Low power and Lossy Networks (LLNs. We run several tests to compare the performance of our solution with existing solutions and found out that our solution reduces communication delay and number of packets in the LLN.

  7. Bindings and RESTlets: A Novel Set of CoAP-Based Application Enablers to Build IoT Applications.

    Science.gov (United States)

    Teklemariam, Girum Ketema; Van Den Abeele, Floris; Moerman, Ingrid; Demeester, Piet; Hoebeke, Jeroen

    2016-08-02

    Sensors and actuators are becoming important components of Internet of Things (IoT) applications. Today, several approaches exist to facilitate communication of sensors and actuators in IoT applications. Most communications go through often proprietary gateways requiring availability of the gateway for each and every interaction between sensors and actuators. Sometimes, the gateway does some processing of the sensor data before triggering actuators. Other approaches put this processing logic further in the cloud. These approaches introduce significant latencies and increased number of packets. In this paper, we introduce a CoAP-based mechanism for direct binding of sensors and actuators. This flexible binding solution is utilized further to build IoT applications through RESTlets. RESTlets are defined to accept inputs and produce outputs after performing some processing tasks. Sensors and actuators could be associated with RESTlets (which can be hosted on any device) through the flexible binding mechanism we introduced. This approach facilitates decentralized IoT application development by placing all or part of the processing logic in Low power and Lossy Networks (LLNs). We run several tests to compare the performance of our solution with existing solutions and found out that our solution reduces communication delay and number of packets in the LLN.

  8. Application verification research of cloud computing technology in the field of real time aerospace experiment

    Science.gov (United States)

    Wan, Junwei; Chen, Hongyan; Zhao, Jing

    2017-08-01

    According to the requirements of real-time, reliability and safety for aerospace experiment, the single center cloud computing technology application verification platform is constructed. At the IAAS level, the feasibility of the cloud computing technology be applied to the field of aerospace experiment is tested and verified. Based on the analysis of the test results, a preliminary conclusion is obtained: Cloud computing platform can be applied to the aerospace experiment computing intensive business. For I/O intensive business, it is recommended to use the traditional physical machine.

  9. Erosional scarps on Io

    International Nuclear Information System (INIS)

    McCauley, J.F.; Soderblom, L.A.; Smith, B.A.

    1979-01-01

    Irregular or fretted scarps on Io as revealed during the voyager 1 mission are similar to those found on Earth and Mars. A sapping mechanism involving liquid SO 2 is proposed to explain these complexly eroded terrains on Io. (author)

  10. Atlas2 Cloud: a framework for personal genome analysis in the cloud.

    Science.gov (United States)

    Evani, Uday S; Challis, Danny; Yu, Jin; Jackson, Andrew R; Paithankar, Sameer; Bainbridge, Matthew N; Jakkamsetti, Adinarayana; Pham, Peter; Coarfa, Cristian; Milosavljevic, Aleksandar; Yu, Fuli

    2012-01-01

    Until recently, sequencing has primarily been carried out in large genome centers which have invested heavily in developing the computational infrastructure that enables genomic sequence analysis. The recent advancements in next generation sequencing (NGS) have led to a wide dissemination of sequencing technologies and data, to highly diverse research groups. It is expected that clinical sequencing will become part of diagnostic routines shortly. However, limited accessibility to computational infrastructure and high quality bioinformatic tools, and the demand for personnel skilled in data analysis and interpretation remains a serious bottleneck. To this end, the cloud computing and Software-as-a-Service (SaaS) technologies can help address these issues. We successfully enabled the Atlas2 Cloud pipeline for personal genome analysis on two different cloud service platforms: a community cloud via the Genboree Workbench, and a commercial cloud via the Amazon Web Services using Software-as-a-Service model. We report a case study of personal genome analysis using our Atlas2 Genboree pipeline. We also outline a detailed cost structure for running Atlas2 Amazon on whole exome capture data, providing cost projections in terms of storage, compute and I/O when running Atlas2 Amazon on a large data set. We find that providing a web interface and an optimized pipeline clearly facilitates usage of cloud computing for personal genome analysis, but for it to be routinely used for large scale projects there needs to be a paradigm shift in the way we develop tools, in standard operating procedures, and in funding mechanisms.

  11. iOS app development for dummies

    CERN Document Server

    Feiler, Jesse

    2014-01-01

    If you've got incredible iOS ideas, get this book and bring them to life! iOS 7 represents the most significant update to Apple's mobile operating system since the first iPhone was released, and even the most seasoned app developers are looking for information on how to take advantage of the latest iOS 7 features in their app designs. That's where iOS App Development For Dummies comes in! Whether you're a programming hobbyist wanting to build an app for fun or a professional developer looking to expand into the iOS market, this book will walk you through the fundamentals of building a univer

  12. Flujo de control en iOS Flow control in iOS

    Directory of Open Access Journals (Sweden)

    Franklin Hernández Castro

    2012-11-01

    Full Text Available El objetivo de este artículo es explicar los flujos de control que se usan en la programación de las aplicaciones en iOS, con el fin de resumir los aspectos más relevantes que se deben tomar en cuenta para programar una tarea a ser realizada por un dispositivo móvil del tipo iPhone o iPad. Debido a que el ambiente iOS es estrictamente orientado a objetos (OOP, los flujos de control no son obvios; además, los estándares de la firma Apple® definen patrones de diseño en el sistema que son altamente recomendados en este tipo de diseño. En este artículo se introducen algunos de ellos.This paper explain the control flows that are used by programming applications in iOS, trying to summarize the most important aspects to be considered by programming mobile devices like iPhone and iPad. Because iOS environment, is strictly a object-oriented one(OOP, control flows are not obvious, besides Apple® use design patterns highly recommended in this type of programming. Here we introduces some of them.

  13. A Fast Synthetic Aperture Radar Raw Data Simulation Using Cloud Computing.

    Science.gov (United States)

    Li, Zhixin; Su, Dandan; Zhu, Haijiang; Li, Wei; Zhang, Fan; Li, Ruirui

    2017-01-08

    Synthetic Aperture Radar (SAR) raw data simulation is a fundamental problem in radar system design and imaging algorithm research. The growth of surveying swath and resolution results in a significant increase in data volume and simulation period, which can be considered to be a comprehensive data intensive and computing intensive issue. Although several high performance computing (HPC) methods have demonstrated their potential for accelerating simulation, the input/output (I/O) bottleneck of huge raw data has not been eased. In this paper, we propose a cloud computing based SAR raw data simulation algorithm, which employs the MapReduce model to accelerate the raw data computing and the Hadoop distributed file system (HDFS) for fast I/O access. The MapReduce model is designed for the irregular parallel accumulation of raw data simulation, which greatly reduces the parallel efficiency of graphics processing unit (GPU) based simulation methods. In addition, three kinds of optimization strategies are put forward from the aspects of programming model, HDFS configuration and scheduling. The experimental results show that the cloud computing based algorithm achieves 4_ speedup over the baseline serial approach in an 8-node cloud environment, and each optimization strategy can improve about 20%. This work proves that the proposed cloud algorithm is capable of solving the computing intensive and data intensive issues in SAR raw data simulation, and is easily extended to large scale computing to achieve higher acceleration.

  14. Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System.

    Science.gov (United States)

    Deng, Yong-Yuan; Chen, Chin-Ling; Tsaur, Woei-Jiunn; Tang, Yung-Wen; Chen, Jung-Hsuan

    2017-12-15

    As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN). These personal wireless devices collect and integrate patients' personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack.

  15. Big Data Clustering via Community Detection and Hyperbolic Network Embedding in IoT Applications

    Directory of Open Access Journals (Sweden)

    Vasileios Karyotis

    2018-04-01

    Full Text Available In this paper, we present a novel data clustering framework for big sensory data produced by IoT applications. Based on a network representation of the relations among multi-dimensional data, data clustering is mapped to node clustering over the produced data graphs. To address the potential very large scale of such datasets/graphs that test the limits of state-of-the-art approaches, we map the problem of data clustering to a community detection one over the corresponding data graphs. Specifically, we propose a novel computational approach for enhancing the traditional Girvan–Newman (GN community detection algorithm via hyperbolic network embedding. The data dependency graph is embedded in the hyperbolic space via Rigel embedding, allowing more efficient computation of edge-betweenness centrality needed in the GN algorithm. This allows for more efficient clustering of the nodes of the data graph in terms of modularity, without sacrificing considerable accuracy. In order to study the operation of our approach with respect to enhancing GN community detection, we employ various representative types of artificial complex networks, such as scale-free, small-world and random geometric topologies, and frequently-employed benchmark datasets for demonstrating its efficacy in terms of data clustering via community detection. Furthermore, we provide a proof-of-concept evaluation by applying the proposed framework over multi-dimensional datasets obtained from an operational smart-city/building IoT infrastructure provided by the Federated Interoperable Semantic IoT/cloud Testbeds and Applications (FIESTA-IoT testbed federation. It is shown that the proposed framework can be indeed used for community detection/data clustering and exploited in various other IoT applications, such as performing more energy-efficient smart-city/building sensing.

  16. Zabezpečení platformy iOS

    OpenAIRE

    Nidl, Michal

    2014-01-01

    This bachelor's thesis is focused on security of operating system iOS from Apple. The thesis is divided into six chapters. The first chapter describes iOS and Apple company. The second chapter deals with iOS security architecture in terms of security model and security mechanisms. The third chapter deals with the security of iOS applications and options of their testing. The fourth chapter describes software attacks against iOS in the form of malware and exploitation. The fifth chapter descri...

  17. Volcanic features of Io

    International Nuclear Information System (INIS)

    Carr, M.H.; Masursky, H.; Strom, R.G.; Terrile, R.J.

    1979-01-01

    The volcanic features of Io as detected during the Voyager mission are discussed. The volcanic activity is apparently higher than on any other body in the Solar System. Its volcanic landforms are compared with features on Earth to indicate the type of volcanism present on Io. (U.K.)

  18. Investigation Methodology of a Virtual Desktop Infrastructure for IoT

    Directory of Open Access Journals (Sweden)

    Doowon Jeong

    2015-01-01

    Full Text Available Cloud computing for IoT (Internet of Things has exhibited the greatest growth in the IT market in the recent past and this trend is expected to continue. Many companies are adopting a virtual desktop infrastructure (VDI for private cloud computing to reduce costs and enhance the efficiency of their servers. As a VDI is widely used, threats of cyber terror and invasion are also increasing. To minimize the damage, response procedure for cyber intrusion on a VDI should be systematized. Therefore, we propose an investigation methodology for VDI solutions in this paper. Here we focus on a virtual desktop infrastructure and introduce various desktop virtualization solutions that are widely used, such as VMware, Citrix, and Microsoft. In addition, we verify the integrity of the data acquired in order that the result of our proposed methodology is acceptable as evidence in a court of law. During the experiment, we observed an error: one of the commonly used digital forensic tools failed to mount a dynamically allocated virtual disk properly.

  19. iOS 6 foundations

    CERN Document Server

    Feiler, Jesse

    2013-01-01

    A practical introduction for using iOS 6 to create universal apps If you have prior experience programming in an object-oriented language and are eager to start building universal apps for iPad and iPhone (including the iPod touch), then this is the book for you! Using the latest version of iOS (iOS 6) along with the latest version of Xcode (Xcode 4.5), this book is a practical introduction rather than just a catalog of components. Full-color and packed with groundbreaking, innovative designs, this book teaches you how to create eye-catching, unique apps. Teaches you the va

  20. A comprehensive model of ion diffusion and charge exchange in the cold Io torus

    Science.gov (United States)

    Barbosa, D. D.; Moreno, M. A.

    1988-01-01

    A comprehensive analytic model of radial diffusion in the cold Io torus is developed. The model involves a generalized molecular cloud theory of SO2 and its dissociation fragments SO, O2, S, and O, which are formed at a relatively large rate by solar UV photodissociation of SO2. The key component of the new theory is SO, which can react with S(+) through a near-resonant charge exchange process that is exothermic. This provides a mechanism for the rapid depletion of singly ionized sulfur in the cold torus and can account for the large decrease in the total flux tube content inward of Io's orbit. The model is used to demonstrate quantitatively the effects of radial diffusion in a charge exchange environment that acts as a combined source and sink for ions in various charge states. A detailed quantitative explanation for the O(2+) component of the cold torus is given, and insight is derived into the workings of the so-called plasma 'ribbon'.

  1. Volcanic eruption plumes on Io

    International Nuclear Information System (INIS)

    Strom, R.G.; Terrile, R.J.; Masursky, H.; Hansen, C.

    1979-01-01

    The detection of an umbrella-shaped plume extending about 280 km above the bright limb of Io was one of the most important discoveries made during the Voyager 1 encounter with the jovian system. This discovery proves that Io is volcanically active at present, and the number and magnitude of these eruptions indicate that Io is the most volcanically active body so far discovered in the Solar System. Preliminary analyses of these eruptive plumes are presented. (U.K.)

  2. Ranking System for IoT Industry Platform

    OpenAIRE

    Mukherjee, Somshree

    2016-01-01

    The Internet of Things (IoT) has seen a huge growth spurt in the last few years which has resulted in the need for more standardised IoT technology. Because of this, numerous IoT platforms have sprung up that offer a variety of features and use different technologies which may not necessarily be compliant with each other or with other technologies. Companies that wish to enter theIoT market are in constant need to find the most suitable IoT platform for their business and have a certain set o...

  3. uFlip: Understanding Flash IO Patterns

    DEFF Research Database (Denmark)

    Bouganim, Luc; Jonsson, Bjørn; Bonnet, Philippe

    2009-01-01

    want to establish what kind of IOs should be favored (or avoided) when designing algorithms and architectures for flash-based systems. In this paper, we focus on flash IO patterns, that capture relevant distribution of IOs in time and space, and our goal is to quantify their performance. We define uFLIP...

  4. On-the-fly green generation and dispersion of AgI nanoparticles for cloud seeding nuclei

    Energy Technology Data Exchange (ETDEWEB)

    Hu, Xiuli; Zhou, Wenbo; Wang, Xizheng; Wu, Tao; Delisio, Jeffery B.; Zachariah, Michael R., E-mail: mrz@umd.edu [University of Maryland, Department of Chemical and Biomolecular Engineering (United States)

    2016-07-15

    This study reports on an on-the-fly green synthesis/dispersion of silver iodide (AgI) nanoparticles from the combustion of AgIO{sub 3}/carbon black (CB)/nitrocellulose (NC) composites, which could be used as a candidate for a cloud-seeding pyrotechnic. Films were formed by direct electrospray deposition of a mixture of synthesized silver iodate with CB and NC. The decomposition pathways of AgIO{sub 3}/CB and AgIO{sub 3}/CB/NC were evaluated by temperature jump time of flight mass spectrometry (T-jump TOFMS) and XRD, showing that AgI particles and CO{sub 2} are released from the reaction between AgIO{sub 3} and CB without other toxic residuals. The flame propagation velocity of AgIO{sub 3}/CB/NC films increases with the increasing of particle mass loading of AgIO{sub 3} and CB and peaks at 40 wt%, which is much higher than that of an AgI/AP/NC film. The mean diameter of the resultant AgI nanoparticles is from 51 to 97 nm. The mass loading of AgIO{sub 3} and CB was found to play a major role in size control of the AgI nanoparticles.

  5. IoT Platforms: Analysis for Building Projects

    Directory of Open Access Journals (Sweden)

    Rusu Liviu DUMITRU

    2017-01-01

    Full Text Available This paper presents a general survey of IoT platforms in terms of features for IoT project de-velopers. I will briefly summarize the state of knowledge in terms of technology regarding “In-ternet of Things” first steps in developing this technology, history, trends, sensors and micro-controllers used. I have evaluated a number of 5 IoT platforms in terms of the features needed to develop a IoT project. I have listed those components that are most appreciated by IoT pro-ject developers and the results have been highlighted in a comparative analysis of these plat-forms from the point of view of IoT project developers and which are strictly necessary as a de-velopment environment for an IoT project based. I’ve also considered the users' views of such platforms in terms of functionality, advantages, disadvantages and dangers presented by this technology.

  6. I/O in the ATLAS multithreaded framework

    CERN Document Server

    Cranshaw, Jack; The ATLAS collaboration; Nowak, Marcin

    2018-01-01

    Scalable multithreading poses challenges to I/O, and the performance of a thread-safe I/O strategy may depend upon many factors, including I/O latencies, whether tasks are CPU- or I/O-intensive, and thread count. In a multithreaded framework, an I/O infrastructure must efficiently supply event data to and collect it from many threads processing multiple events in flight. In particular, on-demand reading from multiple threads may challenge caching strategies that were developed for serial processing and may need to be enhanced. This I/O infrastructure must also address how to read, make available, and propagate in-file metadata and other non-event data needed as context for event processing. We describe the design and scheduling of I/O components in the ATLAS multithreaded control framework, AthenaMT, for both event and non-event I/O. We discuss issues associated with exploiting the multithreading capabilities of our underlying persistence technology, ROOT, in a manner harmonious with the ATLAS framework’s o...

  7. From BPM to IoT

    OpenAIRE

    Cherrier , Sylvain; Deshpande , Varun

    2017-01-01

    International audience; IoT’s presence is increasingly felt. There are already more connected devices to the internet than total human population and sales are starting to rise. As there is extensive research ongoing in order to propose a global architecture to build IoT applications, the domain will rise as soon as a common solution will be widespread. Further, we would need to integrate IoT applications into the legacy data processing solutions. Business Process Model, for example, is a com...

  8. VisIO: enabling interactive visualization of ultra-scale, time-series data via high-bandwidth distributed I/O systems

    Energy Technology Data Exchange (ETDEWEB)

    Mitchell, Christopher J [Los Alamos National Laboratory; Ahrens, James P [Los Alamos National Laboratory; Wang, Jun [UCF

    2010-10-15

    Petascale simulations compute at resolutions ranging into billions of cells and write terabytes of data for visualization and analysis. Interactive visuaUzation of this time series is a desired step before starting a new run. The I/O subsystem and associated network often are a significant impediment to interactive visualization of time-varying data; as they are not configured or provisioned to provide necessary I/O read rates. In this paper, we propose a new I/O library for visualization applications: VisIO. Visualization applications commonly use N-to-N reads within their parallel enabled readers which provides an incentive for a shared-nothing approach to I/O, similar to other data-intensive approaches such as Hadoop. However, unlike other data-intensive applications, visualization requires: (1) interactive performance for large data volumes, (2) compatibility with MPI and POSIX file system semantics for compatibility with existing infrastructure, and (3) use of existing file formats and their stipulated data partitioning rules. VisIO, provides a mechanism for using a non-POSIX distributed file system to provide linear scaling of 110 bandwidth. In addition, we introduce a novel scheduling algorithm that helps to co-locate visualization processes on nodes with the requested data. Testing using VisIO integrated into Para View was conducted using the Hadoop Distributed File System (HDFS) on TACC's Longhorn cluster. A representative dataset, VPIC, across 128 nodes showed a 64.4% read performance improvement compared to the provided Lustre installation. Also tested, was a dataset representing a global ocean salinity simulation that showed a 51.4% improvement in read performance over Lustre when using our VisIO system. VisIO, provides powerful high-performance I/O services to visualization applications, allowing for interactive performance with ultra-scale, time-series data.

  9. Interaction between users and IoT clusters

    DEFF Research Database (Denmark)

    Shinde, Gitanjali; Olesen, Henning

    2015-01-01

    The Internet of Things (IoT) is paving the way for a vast number of objects in our environment to react, respond and work autonomously as and when required and as per their capability, role and position. They will be able to announce and offer their services to the users, and together this will e......The Internet of Things (IoT) is paving the way for a vast number of objects in our environment to react, respond and work autonomously as and when required and as per their capability, role and position. They will be able to announce and offer their services to the users, and together...... this will enable the vision of an "Internet of People, Things and Services" (IoPTS). Application areas for IoT include smart cities, smart homes, environmental control, security & emergency, retail, logistics, industrial control, smart farming, and e-Health. All the IoT objects are organized in clusters, which...... framework that is needed to realize IoPTS. In particular, we focus on the interaction between the users and the IoT clusters, where the user profile (role, privileges, and preferences) should be matched with the services offered by the IoT cluster, including the initial set-up, access control...

  10. RapidIO as a multi-purpose interconnect

    Science.gov (United States)

    Baymani, Simaolhoda; Alexopoulos, Konstantinos; Valat, Sébastien

    2017-10-01

    RapidIO (http://rapidio.org/) technology is a packet-switched high-performance fabric, which has been under active development since 1997. Originally meant to be a front side bus, it developed into a system level interconnect which is today used in all 4G/LTE base stations world wide. RapidIO is often used in embedded systems that require high reliability, low latency and scalability in a heterogeneous environment - features that are highly interesting for several use cases, such as data analytics and data acquisition (DAQ) networks. We will present the results of evaluating RapidIO in a data analytics environment, from setup to benchmark. Specifically, we will share the experience of running ROOT and Hadoop on top of RapidIO. To demonstrate the multi-purpose characteristics of RapidIO, we will also present the results of investigating RapidIO as a technology for high-speed DAQ networks using a generic multi-protocol event-building emulation tool. In addition we will present lessons learned from implementing native ports of CERN applications to RapidIO.

  11. Students versus IoT Security

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    What happens when you introduce students to IoT security for the first time? In this talk I will tell you about my first experience with IoT Security and the thought process behind the decisions I made.

  12. Cloud/Fog Computing System Architecture and Key Technologies for South-North Water Transfer Project Safety

    Directory of Open Access Journals (Sweden)

    Yaoling Fan

    2018-01-01

    Full Text Available In view of the real-time and distributed features of Internet of Things (IoT safety system in water conservancy engineering, this study proposed a new safety system architecture for water conservancy engineering based on cloud/fog computing and put forward a method of data reliability detection for the false alarm caused by false abnormal data from the bottom sensors. Designed for the South-North Water Transfer Project (SNWTP, the architecture integrated project safety, water quality safety, and human safety. Using IoT devices, fog computing layer was constructed between cloud server and safety detection devices in water conservancy projects. Technologies such as real-time sensing, intelligent processing, and information interconnection were developed. Therefore, accurate forecasting, accurate positioning, and efficient management were implemented as required by safety prevention of the SNWTP, and safety protection of water conservancy projects was effectively improved, and intelligential water conservancy engineering was developed.

  13. Understanding IoT systems: a life cycle approach

    NARCIS (Netherlands)

    Rahman, Leila Fatmasari; Ozcelebi, Tanir; Lukkien, Johan

    2018-01-01

    Internet of Things (IoT) systems and the corresponding network architectures are complex due to distributed services on many IoT devices collaboratively fulfilling common goals of IoT applications. System requirements for different types of IoT application domains are still not well-established. The

  14. Towards multi-layer interoperability of heterogeneous IoT platforms : the INTER-IoT approach

    NARCIS (Netherlands)

    Fortino, Giancarlo; Savaglio, Claudio; Palau, Carlos E.; de Puga, Jara Suarez; Ghanza, Maria; Paprzycki, Marcin; Montesinos, Miguel; Liotta, Antonio; Llop, Miguel; Gravina, R.; Palau, C.E.; Manso, M.; Liotta, A.; Fortino, G.

    2018-01-01

    Open interoperability delivers on the promise of enabling vendors and developers to interact and interoperate, without interfering with anyone’s ability to compete by delivering a superior product and experience. In the absence of global IoT standards, the INTER-IoT voluntary approach will support

  15. Juno-UVS observation of the Io footprint: Influence of Io's local environment and passage into eclipse on the strength of the interaction

    Science.gov (United States)

    Hue, V.; Gladstone, R.; Greathouse, T. K.; Versteeg, M.; Bonfond, B.; Saur, J.; Davis, M. W.; Roth, L.; Grodent, D. C.; Gerard, J. C. M. C.; Kammer, J.; Bolton, S. J.; Levin, S.; Connerney, J. E. P.

    2017-12-01

    The Juno mission offers an unprecedented opportunity to study Jupiter, from its internal structure to its magnetospheric environment. Juno-UVS is a UV spectrograph with a bandpass of 70vantage point above the poles. In particular, UVS has observed the instantaneous Io footprint and extended tail as Io enters into eclipse. This observation may better constrain whether the atmosphere of Io is sustained via volcanic activity or sublimation. Among other processes, the modulation of Io's footprint brightness correlates to the strength of the interaction between the Io plasma torus and its ionosphere, which, in turn, is likely to be affected by the atmospheric collapse. UVS observed the Io footprint during two eclipses that occurred on PJ1 and PJ3, and one additional eclipse observation is planned during PJ9 (24 Oct. 2017). We present how the electrodynamic coupling between Io and Jupiter is influenced by changes in Io's local environment, e.g. Io's passage in and out of eclipse and Io's traverse of the magnetodisc plasma sheet.

  16. Design of an IoT Enabled Local Network Based Home Monitoring System with a Priority Scheme

    Directory of Open Access Journals (Sweden)

    V. Tiwari

    2017-04-01

    Full Text Available Internet of things (IoT is a concept where all devices get connected to the internet to exchange information. IoT can be utilized in order to make a home environment interactive and smart. The required connectivity can be provided by either making all the devices Wi-Fi capable, which is costly, or by setting a local wireless sensor network (WSN which later connects to internet. In this work various devices and sensors are designed and connected in a wireless sensor network within a home environment which generates a sensor dependent data packet. These data packets are then sent to the cloud through a master node. The master sends the data using a proposed priority scheme so that the critical information can be sent early. Simulations were performed to show that under the proposed scheme the loss of critical sensors information is reduced by around 75%.

  17. Internet of Things (IoT Based Design of a Secure and Lightweight Body Area Network (BAN Healthcare System

    Directory of Open Access Journals (Sweden)

    Yong-Yuan Deng

    2017-12-01

    Full Text Available As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT. At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN. These personal wireless devices collect and integrate patients’ personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack.

  18. Building cross-platform apps using Titanium, Alloy, and Appcelerator cloud services

    CERN Document Server

    Saunders, Aaron

    2014-01-01

    Skip Objective-C and Java to get your app to market faster, using the skills you already have Building Cross-Platform Apps using Titanium, Alloy, and Appcelerator Cloud Services shows you how to build cross-platform iOS and Android apps without learning Objective-C or Java. With detailed guidance given toward using the Titanium Mobile Platform and Appcelerator Cloud Services, you will quickly develop the skills to build real, native apps- not web apps-using existing HTML, CSS, and JavaScript know-how. This guide takes you step-by-step through the creation of a photo-sharing app that leverages

  19. IoT interoperability : a hub-based approach

    OpenAIRE

    Blackstock, Michael; Lea, Rodger

    2014-01-01

    Interoperability in the Internet of Things is critical for emerging services and applications. In this paper we advocate the use of IoT ‘hubs’ to aggregate things using web protocols, and suggest a staged approach to interoperability. In the context of a UK government funded project involving 8 IoT projects to address cross-domain IoT interoperability, we introduce the HyperCat IoT catalogue specification. We then describe the tools and techniques we developed to adapt an existing data portal...

  20. Human‐Centric IoT Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena Dimitrova; Prasad, Ramjee; Pejanovic, Milica

    2017-01-01

    The current Internet of things (IoT) concept is characterized with billions and billions of devices interworking through a myriad of technologies for the delivery of smart personalized services and applications. At the center of these is the human user who drives his/her own interconnected cluster....... This concept has also been introduced elsewhere as “human center sensing (HCS).” The vision pushed by the authors of this chapter for the IoT beyond 2050 is one of the large‐scale and dense HCS connectivities, the complexity of which can be used to extract new IoT value proposition....

  1. A high performance scientific cloud computing environment for materials simulations

    Science.gov (United States)

    Jorissen, K.; Vila, F. D.; Rehr, J. J.

    2012-09-01

    We describe the development of a scientific cloud computing (SCC) platform that offers high performance computation capability. The platform consists of a scientific virtual machine prototype containing a UNIX operating system and several materials science codes, together with essential interface tools (an SCC toolset) that offers functionality comparable to local compute clusters. In particular, our SCC toolset provides automatic creation of virtual clusters for parallel computing, including tools for execution and monitoring performance, as well as efficient I/O utilities that enable seamless connections to and from the cloud. Our SCC platform is optimized for the Amazon Elastic Compute Cloud (EC2). We present benchmarks for prototypical scientific applications and demonstrate performance comparable to local compute clusters. To facilitate code execution and provide user-friendly access, we have also integrated cloud computing capability in a JAVA-based GUI. Our SCC platform may be an alternative to traditional HPC resources for materials science or quantum chemistry applications.

  2. Evaluation of the Huawei UDS cloud storage system for CERN specific data

    International Nuclear Information System (INIS)

    Resines, M Zotes; Hughes, J; Wang, L; Heikkila, S S; Duellmann, D; Adde, G; Toebbicke, R

    2014-01-01

    Cloud storage is an emerging architecture aiming to provide increased scalability and access performance, compared to more traditional solutions. CERN is evaluating this promise using Huawei UDS and OpenStack SWIFT storage deployments, focusing on the needs of high-energy physics. Both deployed setups implement S3, one of the protocols that are emerging as a standard in the cloud storage market. A set of client machines is used to generate I/O load patterns to evaluate the storage system performance. The presented read and write test results indicate scalability both in metadata and data perspectives. Futher the Huawei UDS cloud storage is shown to be able to recover from a major failure of losing 16 disks. Both cloud storages are finally demonstrated to function as back-end storage systems to a filesystem, which is used to deliver high energy physics software.

  3. Evaluation of the Huawei UDS cloud storage system for CERN specific data

    Science.gov (United States)

    Zotes Resines, M.; Heikkila, S. S.; Duellmann, D.; Adde, G.; Toebbicke, R.; Hughes, J.; Wang, L.

    2014-06-01

    Cloud storage is an emerging architecture aiming to provide increased scalability and access performance, compared to more traditional solutions. CERN is evaluating this promise using Huawei UDS and OpenStack SWIFT storage deployments, focusing on the needs of high-energy physics. Both deployed setups implement S3, one of the protocols that are emerging as a standard in the cloud storage market. A set of client machines is used to generate I/O load patterns to evaluate the storage system performance. The presented read and write test results indicate scalability both in metadata and data perspectives. Futher the Huawei UDS cloud storage is shown to be able to recover from a major failure of losing 16 disks. Both cloud storages are finally demonstrated to function as back-end storage systems to a filesystem, which is used to deliver high energy physics software.

  4. Providing healthcare services on-the-fly using multi-player cooperation game theory in Internet of Vehicles (IoV environment

    Directory of Open Access Journals (Sweden)

    Neeraj Kumar

    2015-08-01

    Full Text Available Internet of Vehicles (IoV is a leading technology of the present era. It has gained huge attention with respect to its implementation in wide variety of domains ranging from traffic safety to infotainment applications. However, IoV can also be extended to healthcare domain, where the patients can be provided healthcare services on-the-fly. We extend this novel concept in this paper and refer it as “Healthcare services on-the-fly”. The concept of game theory has been used among the vehicles to access the healthcare services while traveling. The vehicles act as players in the game and tend to form and split coalitions to access these services. Learning automata (LA act as the players for interaction with the environment and take appropriate actions based on reward and penalty. Apart from this, Virtual Machine (VM scheduling algorithm for efficient utilization of resources at cloud level has also been formulated. A stochastic reward net (SRN-based model is used to represent the coalition formation and splitting with respect to availability of resources at cloud level. The performance of the proposed scheme is evaluated using various performance evaluation metrics. The results obtained prove the effectiveness of the proposed scheme in comparison to the best, first, and random fit schemes.

  5. How IoT, AAI Can Contribute to Smart Home and Smart Cities Services - the Role of Innovation

    DEFF Research Database (Denmark)

    Skouby, Knud Erik; Lynggaard, Per; Windekilde, Iwona Maria

    between ICT based infrastructure and innovation. The theory of innovation will be used to explain the phenomenon by which the technological and service innovation transforms existing cities into smart cities. We will demonstrate the innovative use of distributed IoT, CoT, AAI to solve problems in the area...... non-static concepts that evolve over time. To address these challenges the latest information and communication technology (ICT) including its available services is needed. ICT offers a concept that fuels sustainable economic development and a high quality of life together with a wise management...... of natural resources. A valuable smart city ICT infrastructure must be able to integrate the smart homes into a coherent smart city concept. Vitale elements in this concept are Internet of Things (IoT), Clouds of Things (CoT), and Artificial Intelligence (AI). The integration of a smart city, its embedded...

  6. Securing IoT Devices at CERN

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    CERN has more than 1000 Internet of Things (IoT) devices, which are connected to the office network. We have been doing the research to find all vulnerable IoT devices in CERN and mitigated them. We are currently working on detecting IoT devices automatically and, moreover, identifying the manufacturer, model and the running firmware version. This will help the CERN Computer Security Team to spot vulnerable devices and to show the security risks associated with them.

  7. Does Io's ionosphere influence Jupiter's radio bursts.

    Science.gov (United States)

    Webster, D. L.; Alksne, A. Y.; Whitten, R. C.

    1972-01-01

    Goldreich and Lynden-Bell's theory of Jupiter's Io-correlated decametric radiation sets a lower limit to Io's conductivity, high enough to carry the current associated with the radiated power. Dermott's analysis of conductivities of rocks and ice shows no such conductivity at Io's temperature. However, we show that if Io has even a small atmosphere, say of methane as suggested by Binder and Cruikshank, or of argon or nitrogen, it will have an ionosphere with adequate conductivity to meet the above criterion. A requirement for higher conductivity was found by Goldreich and Lynden-Bell on the basis of motion of magnetic lines past Io. This requirement appears to us unnecessary in view of experiments which prove that motion of the lines is not the source of the electromotance.

  8. Retinal Cell Death Caused by Sodium Iodate Involves Multiple Caspase-Dependent and Caspase-Independent Cell-Death Pathways

    Directory of Open Access Journals (Sweden)

    Jasmin Balmer

    2015-07-01

    Full Text Available Herein, we have investigated retinal cell-death pathways in response to the retina toxin sodium iodate (NaIO3 both in vivo and in vitro. C57/BL6 mice were treated with a single intravenous injection of NaIO3 (35 mg/kg. Morphological changes in the retina post NaIO3 injection in comparison to untreated controls were assessed using electron microscopy. Cell death was determined by TdT-mediated dUTP-biotin nick end labeling (TUNEL staining. The activation of caspases and calpain was measured using immunohistochemistry. Additionally, cytotoxicity and apoptosis in retinal pigment epithelial (RPE cells, primary retinal cells, and the cone photoreceptor (PRC cell line 661W were assessed in vitro after NaIO3 treatment using the ApoToxGlo™ assay. The 7-AAD/Annexin-V staining was performed and necrostatin (Nec-1 was administered to the NaIO3-treated cells to confirm the results. In vivo, degenerating RPE cells displayed a rounded shape and retracted microvilli, whereas PRCs featured apoptotic nuclei. Caspase and calpain activity was significantly upregulated in retinal sections and protein samples from NaIO3-treated animals. In vitro, NaIO3 induced necrosis in RPE cells and apoptosis in PRCs. Furthermore, Nec-1 significantly decreased NaIO3-induced RPE cell death, but had no rescue effect on treated PRCs. In summary, several different cell-death pathways are activated in retinal cells as a result of NaIO3.

  9. Future of IoT Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Suk Kyu Lee

    2017-10-01

    Full Text Available The introduction of mobile devices has changed our daily lives. They enable users to obtain information even in a nomadic environment and provide information without limitations. A decade after the introduction of this technology, we are now facing the next innovation that will change our daily lives. With the introduction of the Internet of Things (IoT, our communication ability will not be restricted to only mobile devices. Rather, it will expand to all things with which we coexist. Many studies have discussed IoT-related services and platforms. However, there are only limited discussions about the IoT network. In this paper, we will thoroughly analyze the technical details about the IoT network. Based on our survey of papers, we will provide insight about the future IoT network and the crucial components that will enable it.

  10. Heat flow from Io /JI/

    Science.gov (United States)

    Matson, D. L.; Ransford, G. A.; Johnson, T. V.

    1981-01-01

    The existing ground-based measurements of Io's thermal emission at infrared wavelengths of 8.4, 10.6, and 21 microns have been reexamined. Present in these data is the signature of hot spots, presumably similar to the hot spots seen by the IRIS experiment on Voyager. It is possible to extract from these data the total amount of power radiated. Since the hot spots are believed to be a result of deep-seated activity in Io and since the remainder of Io's surface is an extraordinarily poor thermal conductor, the power radiated by the hot spots is essentially the total heat flow. The analysis yields a heat flow of 2 + or - 1 W/sq m. This value is tremendously large in comparison to the average heat flow of the earth (0.06 W/sq m) and the moon (0.02 W/sq m), but is characteristic of active geothermal areas on the earth. A heat flow this large requires that the interior of Io be at least partially molten on a global scale.

  11. TRIO: Burst Buffer Based I/O Orchestration

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Teng [Auburn University; Oral, H Sarp [ORNL; Pritchard, Michael [Auburn University; Wang, Bin [Auburn University; Yu, Weikuan [Auburn University

    2015-01-01

    The growing computing power on leadership HPC systems is often accompanied by ever-escalating failure rates. Checkpointing is a common defensive mechanism used by scientific applications for failure recovery. However, directly writing the large and bursty checkpointing dataset to parallel filesystem can incur significant I/O contention on storage servers. Such contention in turn degrades the raw bandwidth utilization of storage servers and prolongs the average job I/O time of concurrent applications. Recently burst buffer has been proposed as an intermediate layer to absorb the bursty I/O traffic from compute nodes to storage backend. But an I/O orchestration mechanism is still desired to efficiently move checkpointing data from bursty buffers to storage backend. In this paper, we propose a burst buffer based I/O orchestration framework, named TRIO, to intercept and reshape the bursty writes for better sequential write traffic to storage severs. Meanwhile, TRIO coordinates the flushing orders among concurrent burst buffers to alleviate the contention on storage server bandwidth. Our experimental results reveal that TRIO can deliver 30.5% higher bandwidth and reduce the average job I/O time by 37% on average for data-intensive applications in various checkpointing scenarios.

  12. IoT Contextual Factors on Healthcare.

    Science.gov (United States)

    Michalakis, Konstantinos; Caridakis, George

    2017-01-01

    With the emergence of the Internet of Things, new services in healthcare will be available and existing systems will be integrated in the IoT framework, providing automated medical supervision and efficient medical treatment. Context awareness plays a critical role in realizing the vision of the IoT, providing rich contextual information that can help the system act more efficiently. Since context in healthcare has its unique characteristics, it is necessary to define an appropriate context aware framework for healthcare IoT applications. We identify this context as perceived in healthcare applications and describe the context aware procedures. We also present an architecture that connects the sensors that measure biometric data with the sensory networks of the environment and the various IoT middleware that reside in the geographical area. Finally, we discuss the challenges for the realization of this vision.

  13. Rutes amb iOS

    OpenAIRE

    Nofuentes Azcárate, Pedro

    2011-01-01

    Projecte de l'implementació d'una aplicació per registrar i gestionar recorreguts basada al sistema operatiu iOS amb la possibilitat de sincronitzar amb un servei web sobre la plataforma Google App Engine. Proyecto de implementación de una aplicación para registrar y gestionar recorridos basada en el sistema operativo iOS con la posibilidad de sincronizar con un servicio web sobre la plataforma Google App Engine. Implementation project for an application to record and manage routes, bas...

  14. Efficient proof of ownership for cloud storage systems

    Science.gov (United States)

    Zhong, Weiwei; Liu, Zhusong

    2017-08-01

    Cloud storage system through the deduplication technology to save disk space and bandwidth, but the use of this technology has appeared targeted security attacks: the attacker can deceive the server to obtain ownership of the file by get the hash value of original file. In order to solve the above security problems and the different security requirements of the files in the cloud storage system, an efficient and information-theoretical secure proof of ownership sceme is proposed to support the file rating. Through the K-means algorithm to implement file rating, and use random seed technology and pre-calculation method to achieve safe and efficient proof of ownership scheme. Finally, the scheme is information-theoretical secure, and achieve better performance in the most sensitive areas of client-side I/O and computation.

  15. Performance analysis of routing protocols for IoT

    Science.gov (United States)

    Manda, Sridhar; Nalini, N.

    2018-04-01

    Internet of Things (IoT) is an arrangement of advancements that are between disciplinary. It is utilized to have compelling combination of both physical and computerized things. With IoT physical things can have personal virtual identities and participate in distributed computing. Realization of IoT needs the usage of sensors based on the sector for which IoT is integrated. For instance, in healthcare domain, IoT needs to have integration with wearable sensors used by patients. As sensor devices produce huge amount of data, often called big data, there should be efficient routing protocols in place. To the extent remote systems is worried there are some current protocols, for example, OLSR, DSR and AODV. It additionally tosses light into Trust based routing protocol for low-power and lossy systems (TRPL) for IoT. These are broadly utilized remote directing protocols. As IoT is developing round the corner, it is basic to investigate routing protocols that and evaluate their execution regarding throughput, end to end delay, and directing overhead. The execution experiences can help in settling on very much educated choices while incorporating remote systems with IoT. In this paper, we analyzed different routing protocols and their performance is compared. It is found that AODV showed better performance than other routing protocols aforementioned.

  16. Understanding Information Hiding in iOS

    OpenAIRE

    Caviglione, Luca; Mazurczyk, Wojciech

    2014-01-01

    The Apple operating system (iOS) has so far proved resistant to information-hiding techniques, which help attackers covertly communicate. However, Siri - a native iOS service that controls iPhones and iPads via voice commands - could change this trend.

  17. FIRE - Flyby of Io with Repeat Encounters: A conceptual design for a New Frontiers mission to Io

    Science.gov (United States)

    Suer, Terry-Ann; Padovan, Sebastiano; Whitten, Jennifer L.; Potter, Ross W. K.; Shkolyar, Svetlana; Cable, Morgan; Walker, Catherine; Szalay, Jamey; Parker, Charles; Cumbers, John; Gentry, Diana; Harrison, Tanya; Naidu, Shantanu; Trammell, Harold J.; Reimuller, Jason; Budney, Charles J.; Lowes, Leslie L.

    2017-09-01

    A conceptual design is presented for a low complexity, heritage-based flyby mission to Io, Jupiter's innermost Galilean satellite and the most volcanically active body in the Solar System. The design addresses the 2011 Decadal Survey's recommendation for a New Frontiers class mission to Io and is based upon the result of the June 2012 NASA-JPL Planetary Science Summer School. A science payload is proposed to investigate the link between the structure of Io's interior, its volcanic activity, its surface composition, and its tectonics. A study of Io's atmospheric processes and Io's role in the Jovian magnetosphere is also planned. The instrument suite includes a visible/near-IR imager, a magnetic field and plasma suite, a dust analyzer, and a gimbaled high gain antenna to perform radio science. Payload activity and spacecraft operations would be powered by three Advanced Stirling Radioisotope Generators (ASRG). The primary mission includes 10 flybys with close-encounter altitudes as low as 100 km. The mission risks are mitigated by ensuring that relevant components are radiation tolerant and by using redundancy and flight-proven parts in the design. The spacecraft would be launched on an Atlas V rocket with a delta-v of 1.3 km/s. Three gravity assists (Venus, Earth, Earth) would be used to reach the Jupiter system in a 6-year cruise. The resulting concept demonstrates the rich scientific return of a flyby mission to Io.

  18. Programming iOS 6

    CERN Document Server

    Neuburg, Matt

    2013-01-01

    Get a solid grounding in all the fundamentals of Cocoa Touch, and avoid problems during iPhone and iPad app development. With this revised and expanded edition, you'll dig into Cocoa and learn how to work effectively with Objective-C and Xcode. This book covers iOS 6 in a rigorous, orderly fashion-ideal whether you're approaching iOS for the first time or need a reference to bolster existing skills. Learn about features introduced with iOS 6, including Objective-C language advances, autosynthesis, autolayout, new view controller rotation rules, unwind segues, state restoration, styled text, and collection views. * Learn Objective-C language details and object-oriented programming concepts * Understand the anatomy of an Xcode project and all the stages of its lifecycle * Grasp key Cocoa concepts such as relationships between classes, receiving events, and model-view-controller architecture * Learn how views and layers are managed, drawn, composited, and animated * Become familiar with view controllers and thei...

  19. A time-dependent anisotropic plasma chemistry model of the Io plasma torus

    Science.gov (United States)

    Arridge, C. S.

    2016-12-01

    The physics of the Io plasma torus is typically modelled using one box neutral-plasma chemistry models, often referred to as neutral cloud theory models (e.g., Barbosa 1994; Delamere and Bagenal 2003). These models incorporate electron impact and photoionisation, charge exchange, molecular dissociation/recombination reactions, atomic radiatiative losses and Coulomb collisional heating. Isotropic Maxwellian distributions are usually assumed in the implementation of these models. Observationally a population of suprathermal electrons has been identified in the plasma torus and theoretically they have been shown to be important in reproducing the observed ionisation balance in the torus (e.g., Barbosa 1994). In this paper we describe an anisotropic plasma chemistry model for the Io torus that is inspired by ion cyclotron wave observations (Huddleston et al. 1994; Leisner et al. 2011), ion anisotropies due to pick up (Wilson et al. 2008), and theoretical ideas on the maintenance of the suprathermal electron population (Barbosa 1994). We present both steady state calculations and also time varying solutions (e.g., Delamere et al. 2004) where increases in the neutral source rate in the torus generates perturbations in ion anisotropies that subsequently decay over a timescale much longer than the duration of the initial perturbation. We also present a method for incorporating uncertainties in reaction rates into the model.

  20. Towards the Characterization of the Bubble Presence in Liquid Sodium of Sodium Cooled Fast Reactors

    International Nuclear Information System (INIS)

    Cavaro, M.; Jeannot, J.P.; Payan, C.

    2013-06-01

    In a Sodium cooled Fast Reactors (SFR), different phenomena such as gas entrainment or nucleation can lead to gaseous micro-bubbles presence in the liquid sodium of the primary vessel. Although this free gas presence has no direct impact on the core neutronics, the French Atomic Energy and Alternative Energies Commission (CEA) currently works on its characterization to, among others, check the absence of risk of large gas pocket formation and to assess the induced modifications of the sodium acoustic properties. The main objective is to evaluate the void fraction values (volume fraction of free gas) and the radii histogram of the bubbles present in liquid sodium. Acoustics and electromagnetic techniques are currently developed at CEA: - The low-frequency speed of sound measurement, which allows us to link - thanks to Wood's model - the measured speed of sound to the actual void fraction. - The nonlinear mixing of two frequencies, based on the nonlinear resonance behavior of a bubble. This technique allows knowing the radius histogram associated to a bubble cloud. Two different mixing techniques are presented in this paper: the mixing of two high frequencies and the mixing of a high and a low frequency. - The Eddy-current flowmeter (ECFM), the output signal of which is perturbed by free gas presence and in consequence allows detecting bubbles. For each technique, initial results are presented. Some of them are really promising. So far, acoustic experiments have been led with an air-water experimental set-up. Micro-bubbles clouds are generated with a dissolved air flotation device and monitored by an optical device which provides reference measurements. Generated bubbles have radii range from few micrometers to several tens of micrometers. Present and future air/water experiments are presented. Furthermore, a development plan of in-sodium tests is presented in terms of a device set-up, instrumentation, modeling tools and experiments. (authors)

  1. Designing a Patient Monitoring System Using Cloud and Semantic Web Technologies

    OpenAIRE

    Chryssa Thermolia; Ekaterini S. Bei; Stelios Sotiriadis; Kostas Stravoskoufos; Euripides G.M. Petrakis

    2015-01-01

    Moving into a new era of healthcare, new tools and devices are developed to extend and improve health services, such as remote patient monitoring and risk prevention. In this concept, Internet of Things (IoT) and Cloud Computing present great advantages by providing remote and efficient services, as well as cooperation between patients, clinicians, researchers and other health professionals. This paper focuses on patients suffering from bipolar disorder, a brain disorder ...

  2. Choosing your IoT programming framework : architectural aspects

    NARCIS (Netherlands)

    Rahman, L.F.; Ozcelebi, T.; Lukkien, J.J.

    2016-01-01

    The Internet of Things (IoT) is turning into practice. To drive innovations, it is crucial that programmers have means to develop IoT applications in the form of IoT programming frameworks. These are toolkits to develop applications according to a certain style or method and that let developers

  3. Synthesizing Knowledge on Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Liu, Fei; Tan, Chee-Wee; Lim, Eric T. K.

    2016-01-01

    Research on Internet of Things (IoT) has been booming for past couple of years due to technological advances and its potential for application. Nonetheless, the rapid growth of IoT articles as well as the heterogeneous nature of IoT pose challenges in synthesizing prior research on the phenomenon...

  4. Remote I/O : fast access to distant storage.

    Energy Technology Data Exchange (ETDEWEB)

    Foster, I.; Kohr, D., Jr.; Krishnaiyer, R.; Mogill, J.

    1997-12-17

    As high-speed networks make it easier to use distributed resources, it becomes increasingly common that applications and their data are not colocated. Users have traditionally addressed this problem by manually staging data to and from remote computers. We argue instead for a new remote I/O paradigm in which programs use familiar parallel I/O interfaces to access remote file systems. In addition to simplifying remote execution, remote I/O can improve performance relative to staging by overlapping computation and data transfer or by reducing communication requirements. However, remote I/O also introduces new technical challenges in the areas of portability, performance, and integration with distributed computing systems. We propose techniques designed to address these challenges and describe a remote I/O library called RIO that we have developed to evaluate the effectiveness of these techniques. RIO addresses issues of portability by adopting the quasi-standard MPI-IO interface and by defining a RIO device and RIO server within the ADIO abstract I/O device architecture. It addresses performance issues by providing traditional I/O optimizations such as asynchronous operations and through implementation techniques such as buffering and message forwarding to off load communication overheads. RIO uses the Nexus communication library to obtain access to configuration and security mechanisms provided by the Globus wide area computing tool kit. Microbenchmarks and application experiments demonstrate that our techniques achieve acceptable performance in most situations and can improve turnaround time relative to staging.

  5. NIMS Observation of Hotspots on Io

    Science.gov (United States)

    1996-01-01

    Io has been imaged by the Near Infrared Mapping Spectrometer (NIMS) on Galileo. The image on the right shows for the first time the distribution of volcanic hotspots on the surface of Io, as seen by NIMS. Three of these hotspots are new discoveries, only detectable with the NIMS instrument. This image was taken during the G1 encounter on June 29 1996. The image on the left shows the same view of Io as seen by the Voyager spacecraft in 1979. At least one dozen hotspots have been identified from this NIMS image. Most of the hotspot locations can be matched with volcanic features on the surface of Io, including the vent area of the active Prometheus plume.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA's Office of Space Science, Washington, DC.This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov.

  6. iOS 7 programming pushing the limits

    CERN Document Server

    Napier, Rob

    2014-01-01

    Get ready to create killer apps for iPad and iPhone on the new iOS 7! With Apple's introduction of iOS 7, demand for developers who know the new iOS will be high. You need in-depth information about the new characteristics and capabilities of iOS 7, and that's what you'll find in this book. If you have experience with C or C++, this guide will show you how to create amazing apps for iPhone, iPad, and iPod touch. You'll also learn to maximize your programs for mobile devices using iPhone SDK 7.0. Advanced topics such as security services, running on multiple iPlatforms, and local networking w

  7. Enabling Research Network Connectivity to Clouds with Virtual Router Technology

    Science.gov (United States)

    Seuster, R.; Casteels, K.; Leavett-Brown, CR; Paterson, M.; Sobie, RJ

    2017-10-01

    The use of opportunistic cloud resources by HEP experiments has significantly increased over the past few years. Clouds that are owned or managed by the HEP community are connected to the LHCONE network or the research network with global access to HEP computing resources. Private clouds, such as those supported by non-HEP research funds are generally connected to the international research network; however, commercial clouds are either not connected to the research network or only connect to research sites within their national boundaries. Since research network connectivity is a requirement for HEP applications, we need to find a solution that provides a high-speed connection. We are studying a solution with a virtual router that will address the use case when a commercial cloud has research network connectivity in a limited region. In this situation, we host a virtual router in our HEP site and require that all traffic from the commercial site transit through the virtual router. Although this may increase the network path and also the load on the HEP site, it is a workable solution that would enable the use of the remote cloud for low I/O applications. We are exploring some simple open-source solutions. In this paper, we present the results of our studies and how it will benefit our use of private and public clouds for HEP computing.

  8. An Eruption on Io

    Science.gov (United States)

    2007-01-01

    The first images returned to Earth by New Horizons during its close encounter with Jupiter feature the Galilean moon Io, snapped with the Long Range Reconnaissance Imager (LORRI) at 0840 UTC on February 26, while the moon was 2.5 million miles (4 million kilometers) from the spacecraft. Io is intensely heated by its tidal interaction with Jupiter and is thus extremely volcanically active. That activity is evident in these images, which reveal an enormous dust plume, more than 150 miles high, erupting from the volcano Tvashtar. The plume appears as an umbrella-shaped feature of the edge of Io's disk in the 11 o'clock position in the right image, which is a long-exposure (20-millisecond) frame designed specifically to look for plumes like this. The bright spots at 2 o'clock are high mountains catching the setting sun; beyond them the night side of Io can be seen, faintly illuminated by light reflected from Jupiter itself. The left image is a shorter exposure -- 3 milliseconds -- designed to look at surface features. In this frame, the Tvashtar volcano shows as a dark spot, also at 11 o'clock, surrounded by a large dark ring, where an area larger than Texas has been covered by fallout from the giant eruption. This is the clearest view yet of a plume from Tvashtar, one of Io's most active volcanoes. Ground-based telescopes and the Galileo Jupiter orbiter first spotted volcanic heat radiation from Tvashtar in November 1999, and the Cassini spacecraft saw a large plume when it flew past Jupiter in December 2000. The Keck telescope in Hawaii picked up renewed heat radiation from Tvashtar in spring 2006, and just two weeks ago the Hubble Space Telescope saw the Tvashtar plume in ultraviolet images designed to support the New Horizons flyby. Most of those images will be stored onboard the spacecraft for downlink to Earth in March and April.

  9. Sensitive Information Tracking in Commodity IoT

    OpenAIRE

    Celik, Z. Berkay; Babun, Leonardo; Sikder, Amit K.; Aksu, Hidayet; Tan, Gang; McDaniel, Patrick; Uluagac, A. Selcuk

    2018-01-01

    Broadly defined as the Internet of Things (IoT), the growth of commodity devices that integrate physical processes with digital connectivity has had profound effects on society--smart homes, personal monitoring devices, enhanced manufacturing and other IoT apps have changed the way we live, play, and work. Yet extant IoT platforms provide few means of evaluating the use (and potential avenues for misuse) of sensitive information. Thus, consumers and organizations have little information to as...

  10. Xamarin mobile application development for iOS

    CERN Document Server

    Johnson, Paul F

    2013-01-01

    This book is a standard tutorial aimed at teaching you everything you need to know about iOS app development using Xamarin.This book is written for those who are new to iOS app development as well as more experienced developers who just need a quick reference book. It is assumed that you are already comfortable using C#. Those teaching iOS to new students will also find this book invaluable as a form of reference material.

  11. iOS app development portable genius

    CERN Document Server

    Wentk, Richard

    2012-01-01

    The essential skills and technologies needed for iOS development in one handy guide! The unprecedented popularity of iOS devices, such as the iPhone, iPad, and iPod touch, has led to a development boom. If you’re eager to become part of the action, then this is the book for you! Packed with must-have information on iOS development, this handy guide covers Objective-C, Xcode, Frameworks, and sound design principles and explains how to upload an app to the app store and integrate apps with the latest advances that Apple offers developers. The featured tips and tricks will get you up and ru

  12. RubyMotion iOS develoment essentials

    CERN Document Server

    Nalwaya, Abhishek

    2013-01-01

    This is a step-by-step book that builds on your knowledge by adding to an example app over the course of each chapter. Each topic uses example code that can be compiled and tested to show how things work practically instead of just telling you the theory. Complicated tasks are broken down into easy to follow steps with clear explanations of what each line of code is doing.Whether you are a novice to iOS development or looking for a simpler alternative to Objective-C; with RubyMotion iOS Development Essentials, you will become a pro at writing great iOS apps

  13. Cloud computing: a new business paradigm for biomedical information sharing.

    Science.gov (United States)

    Rosenthal, Arnon; Mork, Peter; Li, Maya Hao; Stanford, Jean; Koester, David; Reynolds, Patti

    2010-04-01

    We examine how the biomedical informatics (BMI) community, especially consortia that share data and applications, can take advantage of a new resource called "cloud computing". Clouds generally offer resources on demand. In most clouds, charges are pay per use, based on large farms of inexpensive, dedicated servers, sometimes supporting parallel computing. Substantial economies of scale potentially yield costs much lower than dedicated laboratory systems or even institutional data centers. Overall, even with conservative assumptions, for applications that are not I/O intensive and do not demand a fully mature environment, the numbers suggested that clouds can sometimes provide major improvements, and should be seriously considered for BMI. Methodologically, it was very advantageous to formulate analyses in terms of component technologies; focusing on these specifics enabled us to bypass the cacophony of alternative definitions (e.g., exactly what does a cloud include) and to analyze alternatives that employ some of the component technologies (e.g., an institution's data center). Relative analyses were another great simplifier. Rather than listing the absolute strengths and weaknesses of cloud-based systems (e.g., for security or data preservation), we focus on the changes from a particular starting point, e.g., individual lab systems. We often find a rough parity (in principle), but one needs to examine individual acquisitions--is a loosely managed lab moving to a well managed cloud, or a tightly managed hospital data center moving to a poorly safeguarded cloud? 2009 Elsevier Inc. All rights reserved.

  14. Sabatilles : Adaptació a iOS

    OpenAIRE

    Cots Sanfeliu, Jordi

    2015-01-01

    Adaptació del conte en format paper Sabatilles a aplicació en iOS per a dispositius mòbils d'Apple. Adaptación del cuento en formato papel Sabatilles a aplicación en iOS para dispositivos móviles de Apple. Bachelor thesis for the Computer Science program.

  15. FabIO

    DEFF Research Database (Denmark)

    Bergbäck Knudsen, Erik; Sørensen, Henning O.; Wright, Jonathan P.

    2013-01-01

    FabIO is a Python module written for easy and transparent reading of raw two-dimensional data from various X-ray detectors. The module provides a function for reading any image and returning a fabioimage object which contains both metadata (header information) and the raw data. All fabioimage...

  16. Locally Minimum Storage Regenerating Codes in Distributed Cloud Storage Systems

    Institute of Scientific and Technical Information of China (English)

    Jing Wang; Wei Luo; Wei Liang; Xiangyang Liu; Xiaodai Dong

    2017-01-01

    In distributed cloud storage sys-tems, inevitably there exist multiple node fail-ures at the same time. The existing methods of regenerating codes, including minimum storage regenerating (MSR) codes and mini-mum bandwidth regenerating (MBR) codes, are mainly to repair one single or several failed nodes, unable to meet the repair need of distributed cloud storage systems. In this paper, we present locally minimum storage re-generating (LMSR) codes to recover multiple failed nodes at the same time. Specifically, the nodes in distributed cloud storage systems are divided into multiple local groups, and in each local group (4, 2) or (5, 3) MSR codes are constructed. Moreover, the grouping method of storage nodes and the repairing process of failed nodes in local groups are studied. The-oretical analysis shows that LMSR codes can achieve the same storage overhead as MSR codes. Furthermore, we verify by means of simulation that, compared with MSR codes, LMSR codes can reduce the repair bandwidth and disk I/O overhead effectively.

  17. Internet of Things (IoT) Applicability in a Metropolitan City

    OpenAIRE

    Dr. D Mohammed

    2015-01-01

    Internet of Things (IoT)is defined here as a network of interconnected objects. These objects can include several technological systems. This paper examines the wireless communication systems and IoT sensors. IoT is technically feasible today, allowing people and things to be connected anytime, anyplace, with anything and anyone. IoT privacy is a concern but security solutions exist today to solve these issues. A proposal is made to use secure IoT solutions in supporting the metropolitan need...

  18. Internet of Tangible Things (IoTT: Challenges and Opportunities for Tangible Interaction with IoT

    Directory of Open Access Journals (Sweden)

    Leonardo Angelini

    2018-01-01

    Full Text Available In the Internet of Things era, an increasing number of everyday objects are able to offer innovative services to the user. However, most of these devices provide only smartphone or web user interfaces. As a result, the interaction is disconnected from the physical world, decreasing the user experience and increasing the risk of user alienation from the physical world. We argue that tangible interaction can counteract this trend and this article discusses the potential benefits and the still open challenges of tangible interaction applied to the Internet of Things. After an analysis of open challenges for Human-Computer Interaction in IoT, we summarize current trends in tangible interaction and extrapolate eight tangible interaction properties that could be exploited for designing novel interactions with IoT objects. Through a systematic review of tangible interaction applied to IoT, we show what has been already explored in the systems that pioneered the field and the future explorations that still have to be conducted. In order to guide future work in this field, we propose a design card set for supporting the generation of tangible interfaces for IoT objects. The card set has been evaluated during a workshop with 21 people and the results are discussed.

  19. Io's Pele Hemisphere

    Science.gov (United States)

    1996-01-01

    Jupiter's moon Io with Pele prominently in view. The inset images are from the Voyager 1 (top) and 2 (bottom) spacecraft using the violet, blue, and orange filters. The large image is from Galileo, using the violet, green, and red filters. The colors in the Galileo image are closer to what the human eye would see. With the filters used in the Solid State Imaging system on Galileo, it is clear now that some of the recent volcanic deposits on Io are indeed very red, a point not resolved by Voyager. Scientists speculate that the red deposits are a form of Sulfur produced in volcanic eruptions on Io. Note the rapid changes seen in the shape of the distal (far from the vent) plume deposits from Pele between Voyagers 1 (April, 1979) and 2 (July, 1979). The Galileo image was obtained by the imaging system on board the spacecraft in June, 1996. North is to the top.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA'is Office of Space Science, Washington, DC.This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov. Background information and educational context for the images can be found at URL http://www.jpl.nasa.gov/galileo/sepo

  20. On the road to secure and privacy-preserving IoT ecosystems

    OpenAIRE

    Hernández Serrano, Juan; Muñoz Tapia, José Luis; Bröring, Arne; Esparza Martín, Óscar; Mikkelsen, Lars; Schwarzott, Wolfgang; León Abarca, Olga; Zibuschka, Jan

    2017-01-01

    The Internet of Things (IoT) is on the rise. Today, various IoT platforms are already available, giving access to myriads of things. Initiatives such as BIG IoT are bringing those IoT platforms together in order to form ecosystems. BIG IoT aims to facilitate cross-platform and cross-domain application developments and establish centralized marketplaces to allow resource monetization. This combination of multi-platform applications, heterogeneity of the IoT, as well as enabling marketing and a...

  1. An Optimizing Compiler for Petascale I/O on Leadership Class Architectures

    Energy Technology Data Exchange (ETDEWEB)

    Choudhary, Alok [Northwestern Univ., Evanston, IL (United States); Kandemir, Mahmut [Pennsylvania State Univ., State College, PA (United States)

    2015-03-18

    In high-performance computing systems, parallel I/O architectures usually have very complex hierarchies with multiple layers that collectively constitute an I/O stack, including high-level I/O libraries such as PnetCDF and HDF5, I/O middleware such as MPI-IO, and parallel file systems such as PVFS and Lustre. Our project explored automated instrumentation and compiler support for I/O intensive applications. Our project made significant progress towards understanding the complex I/O hierarchies of high-performance storage systems (including storage caches, HDDs, and SSDs), and designing and implementing state-of-the-art compiler/runtime system technology that targets I/O intensive HPC applications that target leadership class machine. This final report summarizes the major achievements of the project and also points out promising future directions.

  2. Network Security Issues in The Internet of Things (IoT)

    OpenAIRE

    Millar, Stuart

    2016-01-01

    This paper surveys a broad range of other research works in order to discuss network security issues in the Internet of Things (IoT). We begin with setting the scene generally with an outline of IoT, followed by a discussion of IoT layer models and topologies. After this, IoT standardization efforts and protocols are analysed, before we discuss in depth vulnerabilities, attacks and mitigations with regard IoT. It is concluded that ample research and narrative exists for protocols and vulnerab...

  3. A Step Towards Checking Security in IoT

    Directory of Open Access Journals (Sweden)

    Chiara Bodei

    2016-08-01

    Full Text Available The Internet of Things (IoT is smartifying our everyday life. Our starting point is IoT-LySa, a calculus for describing IoT systems, and its static analysis, which will be presented at Coordination 2016. We extend the mentioned proposal in order to begin an investigation about security issues, in particular for the static verification of secrecy and some other security properties.

  4. A Step Towards Checking Security in IoT

    OpenAIRE

    Bodei, Chiara; Degano, Pierpaolo; Ferrari, Gian-Luigi; Galletta, Letterio

    2016-01-01

    The Internet of Things (IoT) is smartifying our everyday life. Our starting point is IoT-LySa, a calculus for describing IoT systems, and its static analysis, which will be presented at Coordination 2016. We extend the mentioned proposal in order to begin an investigation about security issues, in particular for the static verification of secrecy and some other security properties.

  5. Io's Active Eruption Plumes: Insights from HST

    Science.gov (United States)

    Jessup, K. L.; Spencer, J. R.

    2011-10-01

    Taking advantage of the available data, we recently [10] completed a detailed analysis of the spectral signature of Io's Pele-type Tvashtar plume as imaged by the HST Wide Field and Planetary Camera 2 (HST/WFPC2) via absorption during Jupiter transit and via reflected sunlight in 2007, as well as HST/WFPC2 observations of the 1997 eruption of Io's Prometheus-type Pillan plume (Fig. 1). These observations were obtained in the 0.24-0.42 μm range, where the plumes gas absorption and aerosol scattering properties are most conspicuous. By completing a detailed analysis of these observations, several key aspects of the reflectance and the absorption properties of the two plumes have been revealed. Additionally, by considering the analysis of the HST imaging data in light of previously published spectral analysis of Io's Prometheus and Pele-type plumes several trends in the plume properties have been determined, allowing us to define the relative significance of each plume on the rate of re-surfacing occurring on Io and providing the measurements needed to better assess the role the volcanoes play in the stability of Io's tenuous atmosphere.

  6. Clustering Approaches for Pragmatic Two-Layer IoT Architecture

    Directory of Open Access Journals (Sweden)

    J. Sathish Kumar

    2018-01-01

    Full Text Available Connecting all devices through Internet is now practical due to Internet of Things. IoT assures numerous applications in everyday life of common people, government bodies, business, and society as a whole. Collaboration among the devices in IoT to bring various applications in the real world is a challenging task. In this context, we introduce an application-based two-layer architectural framework for IoT which consists of sensing layer and IoT layer. For any real-time application, sensing devices play an important role. Both these layers are required for accomplishing IoT-based applications. The success of any IoT-based application relies on efficient communication and utilization of the devices and data acquired by the devices at both layers. The grouping of these devices helps to achieve the same, which leads to formation of cluster of devices at various levels. The clustering helps not only in collaboration but also in prolonging overall network lifetime. In this paper, we propose two clustering algorithms based on heuristic and graph, respectively. The proposed clustering approaches are evaluated on IoT platform using standard parameters and compared with different approaches reported in literature.

  7. IoT Applications with 5G Connectivity in Medical Tourism Sector Management: Third-Party Service Scenarios.

    Science.gov (United States)

    Psiha, Maria M; Vlamos, Panayiotis

    2017-01-01

    5G is the next generation of mobile communication technology. Current generation of wireless technologies is being evolved toward 5G for better serving end users and transforming our society. Supported by 5G cloud technology, personal devices will extend their capabilities to various applications, supporting smart life. They will have significant role in health, medical tourism, security, safety, and social life applications. The next wave of mobile communication is to mobilize and automate industries and industry processes via Machine-Type Communication (MTC) and Internet of Things (IoT). The current key performance indicators for the 5G infrastructure for the fully connected society are sufficient to satisfy most of the technical requirements in the healthcare sector. Thus, 5G can be considered as a door opener for new possibilities and use cases, many of which are as yet unknown. In this paper we present heterogeneous use cases in medical tourism sector, based on 5G infrastructure technologies and third-party cloud services.

  8. Building IoT Services for Aging in Place Using Standard-Based IoT Platforms and Heterogeneous IoT Products

    Directory of Open Access Journals (Sweden)

    Sheik Mohammad Mostakim Fattah

    2017-10-01

    Full Text Available An aging population and human longevity is a global trend. Many developed countries are struggling with the yearly increasing healthcare cost that dominantly affects their economy. At the same time, people living with old adults suffering from a progressive brain disorder such as Alzheimer’s disease are enduring even more stress and depression than those patients while caring for them. Accordingly, seniors’ ability to live independently and comfortably in their current home for as long as possible has been crucial to reduce the societal cost for caregiving and thus give family members peace of mind, called ‘aging in place’ (AIP. In this paper we present a way of building AIP services using standard-based IoT platforms and heterogeneous IoT products. An AIP service platform is designed and created by combining previous standard-based IoT platforms in a collaborative way. A service composition tool is also created that allows people to create AIP services in an efficient way. To show practical usability of our proposed system, we choose a service scenario for medication compliance and implement a prototype service which could give old adults medication reminder appropriately at the right time (i.e., when it is time to need to take pills through light and speaker at home but also wrist band and smartphone even outside the home.

  9. Building IoT Services for Aging in Place Using Standard-Based IoT Platforms and Heterogeneous IoT Products.

    Science.gov (United States)

    Fattah, Sheik Mohammad Mostakim; Sung, Nak-Myoung; Ahn, Il-Yeup; Ryu, Minwoo; Yun, Jaeseok

    2017-10-11

    An aging population and human longevity is a global trend. Many developed countries are struggling with the yearly increasing healthcare cost that dominantly affects their economy. At the same time, people living with old adults suffering from a progressive brain disorder such as Alzheimer's disease are enduring even more stress and depression than those patients while caring for them. Accordingly, seniors' ability to live independently and comfortably in their current home for as long as possible has been crucial to reduce the societal cost for caregiving and thus give family members peace of mind, called 'aging in place' (AIP). In this paper we present a way of building AIP services using standard-based IoT platforms and heterogeneous IoT products. An AIP service platform is designed and created by combining previous standard-based IoT platforms in a collaborative way. A service composition tool is also created that allows people to create AIP services in an efficient way. To show practical usability of our proposed system, we choose a service scenario for medication compliance and implement a prototype service which could give old adults medication reminder appropriately at the right time (i.e., when it is time to need to take pills) through light and speaker at home but also wrist band and smartphone even outside the home.

  10. IOS SAFETY APPLICATION FOR UITM

    Directory of Open Access Journals (Sweden)

    MOHAMAD FAHMI HUSSIN

    2016-04-01

    Full Text Available This paper presents an iOS application, which is developed, to ensure that every task related to safety and health such as inspection, deviation analysis and accident reporting becomes more simple and easier. Normally, these three (3 tasks are done separately and the data are saved in different ways. These situations make the tasks become complicated and consume a lot of time. Therefore, this application is developed to overcome all the problems that occurred. The main objective of this application is to allow the user to handle inspection checklist, deviation analysis and accident reporting efficiently by using iOS devices such as iPhone and iPad. Hence, using iOS device, instead of using a lot of paper, can do all the tasks. Using Xcode SDK, which is the software that is used to develop iOS application, developed this application. Xcode use Objective-C as the programming language, which is quite similar with other programming languages such as C and C++. The final result of this project is that this application can handle all the three (3 tasks and the form or the findings can be emailed to the Safety and Health Officer (SHO. This application will reduce time consume to conduct safety inspection, deviation and reporting tasks as well as avoid delay that might happen while using the traditional method.

  11. Getting Priorities Straight: Improving Linux Support for Database I/O

    DEFF Research Database (Denmark)

    Hall, Christoffer; Bonnet, Philippe

    2005-01-01

    advantage of Linux asynchronous I/O and how Linux can help MySQL/InnoDB best take advantage of the underlying I/O bandwidth. This is a crucial problem for the increasing number of MySQL servers deployed for very large database applications. In this paper, we rst show that the conservative I/O submission......The Linux 2.6 kernel supports asynchronous I/O as a result of propositions from the database industry. This is a positive evolution but is it a panacea? In the context of the Badger project, a collaboration between MySQL AB and University of Copenhagen, we evaluate how MySQL/InnoDB can best take...... policy used by InnoDB (as well as Oracle 9.2) leads to an under-utilization of the available I/O bandwidth. We then show that introducing prioritized asynchronous I/O in Linux will allow MySQL/InnoDB and the other Linux databases to fully utilize the available I/O bandwith using a more aggressive I...

  12. Stability-indicating HPLC–DAD methods for determination of two binary mixtures: Rabeprazole sodium–mosapride citrate and rabeprazole sodium–itopride hydrochloride

    Directory of Open Access Journals (Sweden)

    Hamed M. El-Fatatry

    2014-08-01

    Full Text Available Two selective stability-indicating HPLC methods are described for determination of rabeprazole sodium (RZ–mosapride citrate (MR and RZ–itopride hydrochloride (IO mixtures in the presence of their ICH-stress formed degradation products. Separations were achieved on X-Bridge C18 column using two mobile phases: the first for RZ–MR mixture consisted of acetonitrile: 0.025 M KH2PO4 solution: TEA (30:69:1 v/v; pH 7.0; the second for RZ–IO mixture was at ratio of 25:74:1 (v/v; pH 9.25. The detection wavelength was 283 nm. The two methods were validated and validation acceptance criteria were met in all cases. Peak purity testing using contrast angle theory, relative absorbance and log A versus the wavelengths plots were presented. The % recoveries of the intact drugs were between 99.1% and 102.2% with RSD% values less than 1.6%. Application of the proposed HPLC methods indicated that the methods could be adopted to follow the stability of their formulations. Keywords: Rabeprazole sodium, Mosapride citrate, Itopride hydrochloride, Stability-indicating HPLC–DAD, Peak purity

  13. An Innovative Speech-Based User Interface for Smarthomes and IoT Solutions to Help People with Speech and Motor Disabilities.

    Science.gov (United States)

    Malavasi, Massimiliano; Turri, Enrico; Atria, Jose Joaquin; Christensen, Heidi; Marxer, Ricard; Desideri, Lorenzo; Coy, Andre; Tamburini, Fabio; Green, Phil

    2017-01-01

    A better use of the increasing functional capabilities of home automation systems and Internet of Things (IoT) devices to support the needs of users with disability, is the subject of a research project currently conducted by Area Ausili (Assistive Technology Area), a department of Polo Tecnologico Regionale Corte Roncati of the Local Health Trust of Bologna (Italy), in collaboration with AIAS Ausilioteca Assistive Technology (AT) Team. The main aim of the project is to develop experimental low cost systems for environmental control through simplified and accessible user interfaces. Many of the activities are focused on automatic speech recognition and are developed in the framework of the CloudCAST project. In this paper we report on the first technical achievements of the project and discuss future possible developments and applications within and outside CloudCAST.

  14. iOS application security analysis

    OpenAIRE

    Βλάχος, Κωνσταντίνος Γ.; Vlachos, Konstantinos G.

    2017-01-01

    The purpose of this research is to explain the nature of the Apple iOS applications and provide all the available Open Source tools for analyzing them, starting from decrypting any application’s binary downloaded from the AppStore to reverse engineering it and even altering the flow of its running process on the actual device. We start introducing the basic theory of the iOS operating system and its applications including the security mechanisms incorporated by Apple that are a...

  15. Strong tidal dissipation in Io and Jupiter from astrometric observations.

    Science.gov (United States)

    Lainey, Valéry; Arlot, Jean-Eudes; Karatekin, Ozgür; Van Hoolst, Tim

    2009-06-18

    Io is the volcanically most active body in the Solar System and has a large surface heat flux. The geological activity is thought to be the result of tides raised by Jupiter, but it is not known whether the current tidal heat production is sufficiently high to generate the observed surface heat flow. Io's tidal heat comes from the orbital energy of the Io-Jupiter system (resulting in orbital acceleration), whereas dissipation of energy in Jupiter causes Io's orbital motion to decelerate. Here we report a determination of the tidal dissipation in Io and Jupiter through its effect on the orbital motions of the Galilean moons. Our results show that the rate of internal energy dissipation in Io (k(2)/Q = 0.015 +/- 0.003, where k(2) is the Love number and Q is the quality factor) is in good agreement with the observed surface heat flow, and suggest that Io is close to thermal equilibrium. Dissipation in Jupiter (k(2)/Q = (1.102 +/- 0.203) x 10(-5)) is close to the upper bound of its average value expected from the long-term evolution of the system, and dissipation in extrasolar planets may be higher than presently assumed. The measured secular accelerations indicate that Io is evolving inwards, towards Jupiter, and that the three innermost Galilean moons (Io, Europa and Ganymede) are evolving out of the exact Laplace resonance.

  16. An Optimizing Compiler for Petascale I/O on Leadership-Class Architectures

    Energy Technology Data Exchange (ETDEWEB)

    Kandemir, Mahmut Taylan [PSU; Choudary, Alok [Northwestern; Thakur, Rajeev [ANL

    2014-03-01

    In high-performance computing (HPC), parallel I/O architectures usually have very complex hierarchies with multiple layers that collectively constitute an I/O stack, including high-level I/O libraries such as PnetCDF and HDF5, I/O middleware such as MPI-IO, and parallel file systems such as PVFS and Lustre. Our DOE project explored automated instrumentation and compiler support for I/O intensive applications. Our project made significant progress towards understanding the complex I/O hierarchies of high-performance storage systems (including storage caches, HDDs, and SSDs), and designing and implementing state-of-the-art compiler/runtime system technology that targets I/O intensive HPC applications that target leadership class machine. This final report summarizes the major achievements of the project and also points out promising future directions Two new sections in this report compared to the previous report are IOGenie and SSD/NVM-specific optimizations.

  17. OS X and iOS Kernel Programming

    CERN Document Server

    Halvorsen, Ole Henry

    2011-01-01

    OS X and iOS Kernel Programming combines essential operating system and kernel architecture knowledge with a highly practical approach that will help you write effective kernel-level code. You'll learn fundamental concepts such as memory management and thread synchronization, as well as the I/O Kit framework. You'll also learn how to write your own kernel-level extensions, such as device drivers for USB and Thunderbolt devices, including networking, storage and audio drivers. OS X and iOS Kernel Programming provides an incisive and complete introduction to the XNU kernel, which runs iPhones, i

  18. Stability-indicating HPLC-DAD methods for determination of two binary mixtures: Rabeprazole sodium-mosapride citrate and rabeprazole sodium-itopride hydrochloride.

    Science.gov (United States)

    El-Fatatry, Hamed M; Mabrouk, Mokhtar M; Hewala, Ismail I; Emam, Ehab H

    2014-08-01

    Two selective stability-indicating HPLC methods are described for determination of rabeprazole sodium (RZ)-mosapride citrate (MR) and RZ-itopride hydrochloride (IO) mixtures in the presence of their ICH-stress formed degradation products. Separations were achieved on X-Bridge C18 column using two mobile phases: the first for RZ-MR mixture consisted of acetonitrile: 0.025 M KH 2 PO 4 solution: TEA (30:69:1 v/v; pH 7.0); the second for RZ-IO mixture was at ratio of 25:74:1 (v/v; pH 9.25). The detection wavelength was 283 nm. The two methods were validated and validation acceptance criteria were met in all cases. Peak purity testing using contrast angle theory, relative absorbance and log  A versus the wavelengths plots were presented. The % recoveries of the intact drugs were between 99.1% and 102.2% with RSD% values less than 1.6%. Application of the proposed HPLC methods indicated that the methods could be adopted to follow the stability of their formulations.

  19. Convergence of Secure Vehicular Ad-Hoc Network and Cloud in Internet of Things

    DEFF Research Database (Denmark)

    Kulkarni, Nandkumar P.; Prasad, Neeli R.; Lin, Tao

    2016-01-01

    that VANET could be the basis of many new applications in the field of Internet of Things (IoT). The applications of VANET are not limited to be the driver for safety, traffic management, entertainment, commerce, etc. In the future, VANETs are expected to transport the enormous amount of information. Some......-as-a-Service (STaaS), Platform-as-a-Service (PaaS), etc. over the internet via Cloud vendors....

  20. IoT Security Techniques Based on Machine Learning

    OpenAIRE

    Xiao, Liang; Wan, Xiaoyue; Lu, Xiaozhen; Zhang, Yanyong; Wu, Di

    2018-01-01

    Internet of things (IoT) that integrate a variety of devices into networks to provide advanced and intelligent services have to protect user privacy and address attacks such as spoofing attacks, denial of service attacks, jamming and eavesdropping. In this article, we investigate the attack model for IoT systems, and review the IoT security solutions based on machine learning techniques including supervised learning, unsupervised learning and reinforcement learning. We focus on the machine le...

  1. Challenges when bringing IoT into Industrial Automation

    OpenAIRE

    Lennvall, Tomas; Gidlund, Mikael; Åkerberg, Johan

    2017-01-01

    The Internet of Things (IoT) is captivating the society because of its potential to rapidly transform businesses and people’s lives. It is widely believed that IoT will also transform the industrial automation business in terms of improved productivity, less cost, flexibility, and increased revenues. Hence, there are some challenges that needs to be addressed when IoT is introduced to the industrial automation domain. This paperaims to present realistic requirements and highlights identified ...

  2. UbiCompass: An IoT Interaction Concept

    Directory of Open Access Journals (Sweden)

    Günter Alce

    2018-01-01

    Full Text Available Lately, different wearable form factors have reached the consumer domain. Wearables enable at-a-glance access to information and can continually sense the surrounding environment. Internet of Things (IoT researchers have focused on the main enabling factors: the integration of several technologies and communication solutions. Less effort has been devoted to exploring how not-so-tech-savvy end users can discover and directly interact with the numerous connected things predicted by the IoT vision. This paper presents a novel IoT interaction concept called UbiCompass. A functional, smartwatch face prototype of the UbiCompass was developed and integrated with an existing smart home system, in which five different connected devices could be controlled using simple interaction. It was then compared to a traditional smartphone mobile application in a controlled experiment. The results show statistically significant differences in favor of the proposed concept. This highlights the potential the UbiCompass has as an IoT interaction concept.

  3. Topographic evidence for shield volcanism on Io

    International Nuclear Information System (INIS)

    Moore, J.M.; Mcewen, A.S.; Albin, E.F.; Greeley, R.

    1986-01-01

    Similarities between terrestrial shield volcanoes and a volcano on Io observed in Voyager I imagery of the satellite at 30 0 S, 246 0 W are delineated. A photoclinometry model was used to numerically estimate the slope based on the Minnaert photometric function. The slope values are accurate to within 10 deg on the sun-facing slope and 1 deg on the shadow side. As found with shield volcanoes, the feature has a central edifice, 40-50 km in diameter, and a broad, elliptical base, 77 x 90 km across. The summit of the Io volcano is 2.2-2.8 km above the surrounding plane and contains a caldera about 5 km in diameter. The similarity in shape between basaltic terrestrial shield volcanoes and the Io volcano indicates that the Io feature may also be composed of basalt. The composition could be sulfur if the heat flow was under 0.05 W/sq m, as it might have been in later stages of formation. 9 references

  4. Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study.

    Science.gov (United States)

    Teing, Yee-Yang; Dehghantanha, Ali; Choo, Kim-Kwang Raymond; Dargahi, Tooska; Conti, Mauro

    2017-05-01

    Researchers envisioned Storage as a Service (StaaS) as an effective solution to the distributed management of digital data. Cooperative storage cloud forensic is relatively new and is an under-explored area of research. Using Symform as a case study, we seek to determine the data remnants from the use of cooperative cloud storage services. In particular, we consider both mobile devices and personal computers running various popular operating systems, namely Windows 8.1, Mac OS X Mavericks 10.9.5, Ubuntu 14.04.1 LTS, iOS 7.1.2, and Android KitKat 4.4.4. Potential artefacts recovered during the research include data relating to the installation and uninstallation of the cloud applications, log-in to and log-out from Symform account using the client application, file synchronization as well as their time stamp information. This research contributes to an in-depth understanding of the types of terrestrial artifacts that are likely to remain after the use of cooperative storage cloud on client devices. © 2016 American Academy of Forensic Sciences.

  5. Practical comparison of distributed ledger technologies for IoT

    Science.gov (United States)

    Red, Val A.

    2017-05-01

    Existing distributed ledger implementations - specifically, several blockchain implementations - embody a cacophony of divergent capabilities augmenting innovations of cryptographic hashes, consensus mechanisms, and asymmetric cryptography in a wide variety of applications. Whether specifically designed for cryptocurrency or otherwise, several distributed ledgers rely upon modular mechanisms such as consensus or smart contracts. These components, however, can vary substantially among implementations; differences involving proof-of-work, practical byzantine fault tolerance, and other consensus approaches exemplify distinct distributed ledger variations. Such divergence results in unique combinations of modules, performance, latency, and fault tolerance. As implementations continue to develop rapidly due to the emerging nature of blockchain technologies, this paper encapsulates a snapshot of sensor and internet of things (IoT) specific implementations of blockchain as of the end of 2016. Several technical risks and divergent approaches preclude standardization of a blockchain for sensors and IoT in the foreseeable future; such issues will be assessed alongside the practicality of IoT applications among Hyperledger, Iota, and Ethereum distributed ledger implementations suggested for IoT. This paper contributes a comparison of existing distributed ledger implementations intended for practical sensor and IoT utilization. A baseline for characterizing distributed ledger implementations in the context of IoT and sensors is proposed. Technical approaches and performance are compared considering IoT size, weight, and power limitations. Consensus and smart contracts, if applied, are also analyzed for the respective implementations' practicality and security. Overall, the maturity of distributed ledgers with respect to sensor and IoT applicability will be analyzed for enterprise interoperability.

  6. IoT European Large-Scale Pilots – Integration, Experimentation and Testing

    OpenAIRE

    Guillén, Sergio Gustavo; Sala, Pilar; Fico, Giuseppe; Arredondo, Maria Teresa; Cano, Alicia; Posada, Jorge; Gutierrez, Germán; Palau, Carlos; Votis, Konstantinos; Verdouw, Cor N.; Wolfert, Sjaak; Beers, George; Sundmaeker, Harald; Chatzikostas, Grigoris; Ziegler, Sébastien

    2017-01-01

    The IoT European Large-Scale Pilots Programme includes the innovation consortia that are collaborating to foster the deployment of IoT solutions in Europe through the integration of advanced IoT technologies across the value chain, demonstration of multiple IoT applications at scale and in a usage context, and as close as possible to operational conditions. The programme projects are targeted, goal-driven initiatives that propose IoT approaches to specific real-life industrial/societal challe...

  7. A case study in application I/O on Linux clusters

    International Nuclear Information System (INIS)

    Ross, R.; Nurmi, D.; Cheng, A.; Zingale, M.

    2001-01-01

    A critical but often ignored component of system performance is the I/O system. Today's applications expect a great deal from underlying storage systems and software, and both high performance distributed storage and high level interfaces have been developed to fill these needs. In this paper they discuss the I/O performance of a parallel scientific application on a Linux cluster, the FLASH astrophysics code. This application relies on three I/O software components to provide high performance parallel I/O on Linux clusters: the Parallel Virtual File System (PVFS), the ROMIO MPI-IO implementation, and the Hierarchical Data Format (HDF5) library. First they discuss the roles played by each of these components in providing an I/O solution. Next they discuss the FLASH I/O benchmark and point out its relevance. Following this they examine the performance of the benchmark, and through instrumentation of both the application and underlying system software code they discover the location of major software bottlenecks. They work around the most inhibiting of these bottlenecks, showing substantial performance improvement. Finally they point out similarities between the inefficiencies found here and those found in message passing systems, indicating that research in the message passing field could be leveraged to solve similar problems in high-level I/O interfaces

  8. IoTA: IoT Automated SIP-based Emergency Call Triggering System for general eHealth purposes

    OpenAIRE

    Andriopoulou, F; Orphanoudakis, T; Dagiuklas, A

    2017-01-01

    The expansion of Internet of Things (IoT) and the evolution in communication technologies have enabled homes, cars even whole cities to be network connected. However, during an emergency incident, IoT devices have not been used to trigger emergency calls directly to healthcare providers mainly due to their constrained capabilities and lack of support session-oriented communications. Moreover, emergency services are currently offered by public safety stakeholders that do not support call trigg...

  9. The Structure and Composition of Io's Atmosphere

    Science.gov (United States)

    Smyth, W. H.; Marconi, M. L.

    2011-12-01

    Io's atmosphere is thought to be generated principally by sublimation on the dayside and by multiple volcanoes scattered throughout its surface and more concentrated near the equator. While SO2 seems to be the principle product of these sources, many other chemical species are placed into the atmosphere by these sources, including substantial amounts of SO and S2 as well as smaller but observationally significant amounts of Na bearing molecules. These species in turn interact strongly with the torus plasma generating additional species such as O2, S, O, and Na. The strong interaction of the torus plasma with the neutral atmosphere not only exerts a profound effect on the composition of Io's atmosphere but also strongly affects the dynamics and thermodynamics of Io's atmosphere, particularly at higher altitudes. In addition, as Io orbits Jupiter, the change in location of the sublimation region and the eclipse of Io as it passes through Jupiter's shadow result in substantial variation in the atmosphere. A complex time-dependent three-dimensional atmosphere with strong spatial compositional variation is created. Here we extend the two-dimensional multispecies Navier-Stokes model of Smyth and Wong (2004) to three-dimensions, include two volcanic sources similar to Pele and Loki, and include the effect of Io's movement around Jupiter on sublimation. The effects of the torus plasma are also included as in Smyth and Wong. We will present the overall composition and structure of the atmosphere, O to S ratios in the upper atmosphere, and discuss a potential issue with the O2 abundance. Smyth, W.H. and M.C. Wong, Icarus 171, 171-182, 2004.

  10. Grabens on Io: Evidence for Extensional Tectonics

    Science.gov (United States)

    Hoogenboom, T.; Schenk, P.

    2012-12-01

    Io may well be the most geologically active body in the solar system. A variety of volcanic features have been identified, including a few fissure eruptions, but tectonism is generally assumed to be limited to compression driven mountain formation (Schenk et al., 2001). A wide range of structural features can also be identified including scarps, lineaments, faults, and circular depressions (pits and patera rims). Narrow curvilinear graben (elongated, relatively depressed crustal unit or block that is bounded by faults on its sides) are also scattered across Io's volcanic plains. These features are dwarfed by the more prominent neighboring volcanoes and mountains, and have been largely ignored in the literature. Although they are likely to be extensional in origin, their relationship to local or global stress fields is unknown. We have mapped the locations, length and width of graben on Io using all available Voyager and Galileo images with a resolution better than 5 km. We compare the locations of graben with existing volcanic centers, paterae and mountain data to determine the degree of correlation between these geologic features and major topographic variations (basins/swells) in our global topographic map of Io (White et al., 2011). Graben are best observed in > 1-2 km low-sun angle images. Approximately 300 images were converted from ISIS to ArcMap format to allow easy comparison with the geological map of Io (Williams et al., 2012) along with previous higher resolution structural mapping of local areas (e.g. Crown et al., 1992). We have located >45 graben to date. Typically 1-3 kilometers across, some of these features can stretch for over 500 kilometers in length. Their formation may be related to global tidal stresses or local deformation. Io's orbit is eccentric and its solid surface experiences daily tides of up to ˜0.1 km, leading to repetitive surface strains of 10-4 or greater. These tides flex and stress the lithosphere and can cause it to fracture

  11. Multiscale periodic structure in the Io wake

    Energy Technology Data Exchange (ETDEWEB)

    Smith, P R; Wright, A N

    1989-06-08

    The decametric radio emissions from Jupiter are known to be influenced by the Galilean satellite Io. It is believed that the structure in these emissions is associated with the Alfven-wave wake downstream of Io. However, recent studies have shown that the structure of the wake cannot be as simple as originally thought. Here we present preliminary results from an eigenmode synthesis of the Alfven waves launched by Io, and find that several important periodicities emerge. Observations of the decametric emissions reveal fine, medium-and large-scale structure. The simulation we present here can provide structure on each of these scales, unlike earlier models. (author).

  12. Beginning Swift games development for iOS

    CERN Document Server

    Goodwill, James

    2015-01-01

    Game apps are one of the most popular categories in the Apple iTunes App Store. Well, the introduction of the new Swift programming language will make game development even more appealing and easier to existing and future iOS app developers. In response, James Goodwill, Wesley Matlock and Apress introduce you to this book, Beginning Swift Games Development for iOS. In this book, you'll learn the fundamental elements of the new Swift language as applied to game development for iOS. In part 1, you'll start with a basic 2D game idea and build the game throughout the book introducing each Sprit

  13. APLIKACIJA ZA PRIKAZ SLEDENJA VOZIL NA OPERACIJSKEM SISTEMU iOS

    OpenAIRE

    Mlinar, Tilen

    2011-01-01

    V diplomski nalogi prikazujemo razvoj aplikacije za operacijski sistem iOS. Razvili smo aplikacijo za sledenje vozil. V teoretičnem delu se najprej seznanimo z operacijskim sistemom iOS ter njegovo arhitekturo, nato predstavimo arhitekturo aplikacij iOS. Sledi opis kompleta razvojnih orodij v iOS SDK. V nadaljevanju se seznanimo še s programskim jezikom Objective-C, lokacijsko odvisnimi storitvam, podsistemom MapKit in delovanjem aplikacije v ozadju operacijskega sistema. V praktičnem delu op...

  14. Conflict Detection Algorithm to Minimize Locking for MPI-IO Atomicity

    Science.gov (United States)

    Sehrish, Saba; Wang, Jun; Thakur, Rajeev

    Many scientific applications require high-performance concurrent I/O accesses to a file by multiple processes. Those applications rely indirectly on atomic I/O capabilities in order to perform updates to structured datasets, such as those stored in HDF5 format files. Current support for atomicity in MPI-IO is provided by locking around the operations, imposing lock overhead in all situations, even though in many cases these operations are non-overlapping in the file. We propose to isolate non-overlapping accesses from overlapping ones in independent I/O cases, allowing the non-overlapping ones to proceed without imposing lock overhead. To enable this, we have implemented an efficient conflict detection algorithm in MPI-IO using MPI file views and datatypes. We show that our conflict detection scheme incurs minimal overhead on I/O operations, making it an effective mechanism for avoiding locks when they are not needed.

  15. Economics of Internet of Things (IoT): An Information Market Approach

    OpenAIRE

    Niyato, D.; Lu, X.; Wang, P.; Kim, D. I.; Han, Z.

    2015-01-01

    Internet of things (IoT) has been proposed to be a new paradigm of connecting devices and providing services to various applications, e.g., transportation, energy, smart city, and healthcare. In this paper, we focus on an important issue, i.e., economics of IoT, that can have a great impact to the success of IoT applications. In particular, we adopt and present the information economics approach with its applications in IoT. We first review existing economic models developed for IoT services....

  16. The Haskell Programmer's Guide to the IO Monad : Don't Panic

    NARCIS (Netherlands)

    Klinger, S.

    2005-01-01

    Now, that you have started with Haskell, have you written a program doing IO yet, like reading a file or writing on the terminal? Then you have used the IO monad—but do you understand how it works? The standard explanation is, that the IO monad hides the non-functional IO actions —which do have side

  17. Semantic Interoperability in Heterogeneous IoT Infrastructure for Healthcare

    Directory of Open Access Journals (Sweden)

    Sohail Jabbar

    2017-01-01

    Full Text Available Interoperability remains a significant burden to the developers of Internet of Things’ Systems. This is due to the fact that the IoT devices are highly heterogeneous in terms of underlying communication protocols, data formats, and technologies. Secondly due to lack of worldwide acceptable standards, interoperability tools remain limited. In this paper, we proposed an IoT based Semantic Interoperability Model (IoT-SIM to provide Semantic Interoperability among heterogeneous IoT devices in healthcare domain. Physicians communicate their patients with heterogeneous IoT devices to monitor their current health status. Information between physician and patient is semantically annotated and communicated in a meaningful way. A lightweight model for semantic annotation of data using heterogeneous devices in IoT is proposed to provide annotations for data. Resource Description Framework (RDF is a semantic web framework that is used to relate things using triples to make it semantically meaningful. RDF annotated patients’ data has made it semantically interoperable. SPARQL query is used to extract records from RDF graph. For simulation of system, we used Tableau, Gruff-6.2.0, and Mysql tools.

  18. Sesame IO Library User Manual Version 8

    Energy Technology Data Exchange (ETDEWEB)

    Abhold, Hilary [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Young, Ginger Ann [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-05-15

    This document is a user manual for SES_IO, a low-level library for reading and writing sesame files. The purpose of the SES_IO library is to provide a simple user interface for accessing and creating sesame files that does not change across sesame format type (such as binary, ascii, and xml).

  19. Knowledge driven discovery for opportunistic IoT networking.

    OpenAIRE

    Pozza, Riccardo

    2015-01-01

    So far, the Internet of Things (IoT) has been concerned with the objective of connecting every-thing, or any object to the Internet world. By collaborating towards the creation of new services, the IoT has introduced the opportunity to add smartness to our cities, homes, buildings and healthcare systems, as well as businesses and products. In many scenarios, objects or IoT devices are not always statically deployed, but they may be free to move around being carried by people or vehicles, whil...

  20. Multiple Independent File Parallel I/O with HDF5

    Energy Technology Data Exchange (ETDEWEB)

    Miller, M. C.

    2016-07-13

    The HDF5 library has supported the I/O requirements of HPC codes at Lawrence Livermore National Labs (LLNL) since the late 90’s. In particular, HDF5 used in the Multiple Independent File (MIF) parallel I/O paradigm has supported LLNL code’s scalable I/O requirements and has recently been gainfully used at scales as large as O(106) parallel tasks.

  1. Comparative analysis of video processing and 3D rendering for cloud video games using different virtualization technologies

    Science.gov (United States)

    Bada, Adedayo; Alcaraz-Calero, Jose M.; Wang, Qi; Grecos, Christos

    2014-05-01

    This paper describes a comprehensive empirical performance evaluation of 3D video processing employing the physical/virtual architecture implemented in a cloud environment. Different virtualization technologies, virtual video cards and various 3D benchmarks tools have been utilized in order to analyse the optimal performance in the context of 3D online gaming applications. This study highlights 3D video rendering performance under each type of hypervisors, and other factors including network I/O, disk I/O and memory usage. Comparisons of these factors under well-known virtual display technologies such as VNC, Spice and Virtual 3D adaptors reveal the strengths and weaknesses of the various hypervisors with respect to 3D video rendering and streaming.

  2. Connected car: Engines diagnostic via Internet of Things (IoT)

    Science.gov (United States)

    Hamid, A. F. A.; Rahman, M. T. A.; Khan, S. F.; Adom, A. H.; Rahim, M. A.; Rahim, N. A.; Ismail, M. H. N.; Norizan, A.

    2017-10-01

    This paper is about an experiment for performing engines diagnostic using wireless sensing Internet of Thing (IoT). The study is to overcome problem of current standard On Board Diagnosis (OBD-II) data acquisition method that only can be perform in offline or wired method. From this paper it show a method to determined how the data from engines can be collected, make the data can be easily understand by human and sending data over the wireless internet connection via platform of IOT. This study is separate into three stages that is CAN-bus data collection, CAN data conversion and send data to cloud storage. Every stage is experimented with a two different method and consist five data parameter that is Revolution per Minute (RPM), Manifold Air Pressure (MAP), load-fuel, barometric pressure and engine temperature. The experiment use Arduino Uno as microcontroller, CAN-bus converter and ESP8266 wifi board as transfer medium for data to internet.

  3. Revealing isomerism in sodium-water clusters: Photoionization spectra of Na(H2O)n (n = 2-90)

    Science.gov (United States)

    Dierking, Christoph W.; Zurheide, Florian; Zeuch, Thomas; Med, Jakub; Parez, Stanislav; Slavíček, Petr

    2017-06-01

    Soft ionization of sodium tagged polar clusters is increasingly used as a powerful technique for sizing and characterization of small aerosols with possible application, e.g., in atmospheric chemistry or combustion science. Understanding the structure and photoionization of the sodium doped clusters is critical for such applications. In this work, we report on measurements of photoionization spectra for sodium doped water clusters containing 2-90 water molecules. While most of the previous studies focused on the ionization threshold of the Na(H2O)n clusters, we provide for the first time full photoionization spectra, including the high-energy region, which are used as reference for a comparison with theory. As reported in previous work, we have seen an initial drop of the appearance ionization energy with cluster size to values of about 3.2 eV for n electron cloud. The appearance ionization energy is determined by isomers with fully solvated sodium and a highly delocalized electron cloud, while both fully and incompletely solvated isomers with localized electron clouds can contribute to the high energy part of the photoionization spectrum. Simulations at elevated temperatures show an increased abundance of isomers with low ionization energies, an entropic effect enabling size selective infrared action spectroscopy, based on near threshold photoionization of Na(H2O)n clusters. In addition, simulations of the sodium pick-up process were carried out to study the gradual formation of the hydrated electron which is the basis of the sodium-tagging sizing.

  4. Instant OpenCV for iOS

    CERN Document Server

    Kornyakov, Kirill

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This book uses a very practical approach, with each recipe and their associated sample projects or examples focusing on a particular aspect of the technology.This book is intended for OpenCV developers who are interested in porting their applications to the iOS platform. Basic experience with OpenCV, computer vision, Objective C, and other iOS tools is encouraged.

  5. On Energy Efficiency of Prioritized IoT Systems

    KAUST Repository

    Alabbasi, Abdulrahman; Shihada, Basem; Cavdar, Cicek

    2018-01-01

    The inevitable deployment of 5G and the Internet of Things (IoT) sheds the light on the importance of the energy efficiency (EE) performance of Device-to- Device (DD) communication systems. In this work, we address a potential IoT application, where

  6. Design and Development of Smart Aquaculture System Based on IFTTT Model and Cloud Integration

    Directory of Open Access Journals (Sweden)

    Dzulqornain Muhammad Iskandar

    2018-01-01

    Full Text Available The internet of things technology (IoT is growing very rapidly. IoT implementation has been conducted in several sectors. One of them is for aquaculture. For the traditional farmers, they face problems for monitoring water quality and the way to increase the quality of the water quickly and efficiently. This paper presents a real-time monitoring and controlling system for aquaculture based on If This Then That (IFTTT model and cloud integration. This system was composed of smart sensor module which supports modularity, smart aeration system for controlling system, local network system, cloud computing system and client visualization data. In order to monitor the water condition, we collect the data from smart sensor module. Smart sensor module consists of sensor dissolved oxygen, potential of hydrogen, water temperature and water level. The components of smart aeration system are microcontroller NodeMCU v3, relay, power supply, and propeller that can produce oxygen. The system could set the IFTTT rules for the ideal water condition for the pond in any kinds of aquaculture based on its needs through the web and android application. The experimental result shows that use IFTTT model makes the aquaculture monitoring system more customizable, expandable and dynamic.

  7. New upper limits for atmospheric constituents on Io

    Science.gov (United States)

    Fink, U.; Larson, H. P.; Gautier, T. N., III

    1976-01-01

    A spectrum of Io from 0.86 to 2.7 microns with a resolution of 3.36 per cm and a signal to rms noise ratio of 120 is presented. No absorptions due to any atmospheric constituents on Io could be found in the spectrum. Upper limits of 0.12 cm-atm for NH3, 0.12 cm-atm for CH4, 0.4 cm-atm for N2O, and 24 cm-atm for H2S were determined. Laboratory spectra of ammonia frosts as a function of temperature were compared with the spectrum of Io and showed this frost not to be present at the surface of Io. A search for possible resonance lines of carbon, silicon, and sulfur, as well as the 1.08-micron line of helium, proved negative. Upper emission limits of 60, 18, 27, and 60 kilorayleighs, respectively, were established for these lines.

  8. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    OpenAIRE

    Ana Nieto; Ruben Rios; Javier Lopez

    2018-01-01

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntar...

  9. On Novel Access and Scheduling Schemes for IoT Communications

    Directory of Open Access Journals (Sweden)

    Zheng Jiang

    2016-01-01

    Full Text Available The Internet of Things (IoT is expected to foster the development of 5G wireless networks and requires the efficient support for a large number of simultaneous short message communications. To address these challenges, some existing works utilize new waveform and multiuser superposition transmission schemes to improve the capacity of IoT communication. In this paper, we will investigate the spatial degree of freedom of IoT devices based on their distribution, then extend the multiuser shared access (MUSA which is one of the typical MUST schemes to spatial domain, and propose two novel schemes, that is, the preconfigured access scheme and the joint spatial and code domain scheduling scheme, to enhance IoT communication. The results indicate that the proposed schemes can reduce the collision rate dramatically during the IoT random access procedure and improve the performance of IoT communication obviously. Based on the simulation results, it is also shown that the proposed scheduling scheme can achieve the similar performance to the corresponding brute-force scheduling but with lower complexity.

  10. Sharing Planetary-Scale Data in the Cloud

    Science.gov (United States)

    Sundwall, J.; Flasher, J.

    2016-12-01

    On 19 March 2015, Amazon Web Services (AWS) announced Landsat on AWS, an initiative to make data from the U.S. Geological Survey's Landsat satellite program freely available in the cloud. Because of Landsat's global coverage and long history, it has become a reference point for all Earth observation work and is considered the gold standard of natural resource satellite imagery. Within the first year of Landsat on AWS, the service served over a billion requests for Landsat imagery and metadata, globally. Availability of the data in the cloud has led to new product development by companies and startups including Mapbox, Esri, CartoDB, MathWorks, Development Seed, Trimble, Astro Digital, Blue Raster and Timbr.io. The model of staging data for analysis in the cloud established by Landsat on AWS has since been applied to high resolution radar data, European Space Agency satellite imagery, global elevation data and EPA air quality models. This session will provide an overview of lessons learned throughout these projects. It will demonstrate how cloud-based object storage is democratizing access to massive publicly-funded data sets that have previously only been available to people with access to large amounts of storage, bandwidth, and computing power. Technical discussion points will include: The differences between staging data for analysis using object storage versus file storage Using object stores to design simple RESTful APIs through thoughtful file naming conventions, header fields, and HTTP Range Requests Managing costs through data architecture and Amazon S3's "requester pays" feature Building tools that allow users to take their algorithm to the data in the cloud Using serverless technologies to display dynamic frontends for massive data sets

  11. Efficient operating system level virtualization techniques for cloud resources

    Science.gov (United States)

    Ansu, R.; Samiksha; Anju, S.; Singh, K. John

    2017-11-01

    Cloud computing is an advancing technology which provides the servcies of Infrastructure, Platform and Software. Virtualization and Computer utility are the keys of Cloud computing. The numbers of cloud users are increasing day by day. So it is the need of the hour to make resources available on demand to satisfy user requirements. The technique in which resources namely storage, processing power, memory and network or I/O are abstracted is known as Virtualization. For executing the operating systems various virtualization techniques are available. They are: Full System Virtualization and Para Virtualization. In Full Virtualization, the whole architecture of hardware is duplicated virtually. No modifications are required in Guest OS as the OS deals with the VM hypervisor directly. In Para Virtualization, modifications of OS is required to run in parallel with other OS. For the Guest OS to access the hardware, the host OS must provide a Virtual Machine Interface. OS virtualization has many advantages such as migrating applications transparently, consolidation of server, online maintenance of OS and providing security. This paper briefs both the virtualization techniques and discusses the issues in OS level virtualization.

  12. BRC/IoP standard importance in packaging quality assurance

    Directory of Open Access Journals (Sweden)

    Agnieszka Kawecka

    2014-10-01

    Full Text Available BRC/IoP (British Retail Consortium / Institute of Packaging is the only industry standard dedicated entrepreneurs operating in the packaging industry, primarily intended for contact with food. The requirements of the BRC / IoP guarantee the safety of packaging and fulfillment of all legal and hygienic requirements. The article presents the main features of the standard, the basic requirements contained in the document and the results of research on the implementation of quality management systems, including standard BRC / IoP and the actions that are required checklists. It is noticeable that there is little interest in certification BRC / IoP, due to low awareness of the standard, despite the fulfillment of some of the basic requirements of the surveyed companies.

  13. User Requirements for Internet Of Things (IoT) Applications : An Observational study

    OpenAIRE

    Namirimu, Victoria

    2015-01-01

    Context. Internet of Things (IoT) is a new trending phase of technology. IoT refers to communication and connectivity between things such as technological devices, actuators, sensors, and people or processes with unique identifiers. The importance of IoT is to improve the daily living standards of an average user. IoT is made for the people and used by the people for many reasons such as improved health, business innovations, and personal health trackers. Examples of IoT applications and serv...

  14. Benchmarking Distributed Stream Processing Platforms for IoT Applications

    OpenAIRE

    Shukla, Anshu; Simmhan, Yogesh

    2016-01-01

    Internet of Things (IoT) is a technology paradigm where millions of sensors monitor, and help inform or manage, physical, envi- ronmental and human systems in real-time. The inherent closed-loop re- sponsiveness and decision making of IoT applications makes them ideal candidates for using low latency and scalable stream processing plat- forms. Distributed Stream Processing Systems (DSPS) are becoming es- sential components of any IoT stack, but the efficacy and performance of contemporary DSP...

  15. Stability of sulfur slopes on Io

    Science.gov (United States)

    Clow, G. D.; Carr, M. H.

    1980-01-01

    The mechanical properties of elemental sulfur are such that the upper crust of Io cannot be primarily sulfur. For heat flows in the range 100-1000 ergs/sq cm sec sulfur becomes ductile within several hundred meters of the surface and would prevent the formation of calderas with depths greater than this. However, the one caldera for which precise depth data are available is 2 km deep, and this value may be typical. A study of the mechanical equilibrium of simple slopes shows that the depth to the zone of rapid ductile flow strongly controls the maximum heights for sulfur slopes. Sulfur scarps with heights greater than 1 km will fail for all heat flows greater than 180 ergs/sq cm sec and slope angles greater than 22.5 deg. The observed relief on Io is inconsistent with that anticipated for a predominantly sulfur crust. However, a silicate crust with several percent sulfur included satisfies both the mechanical constraints and the observed presence of sulfur on Io.

  16. Advanced I/O for large-scale scientific applications

    International Nuclear Information System (INIS)

    Klasky, Scott; Schwan, Karsten; Oldfield, Ron A.; Lofstead, Gerald F. II

    2010-01-01

    As scientific simulations scale to use petascale machines and beyond, the data volumes generated pose a dual problem. First, with increasing machine sizes, the careful tuning of IO routines becomes more and more important to keep the time spent in IO acceptable. It is not uncommon, for instance, to have 20% of an application's runtime spent performing IO in a 'tuned' system. Careful management of the IO routines can move that to 5% or even less in some cases. Second, the data volumes are so large, on the order of 10s to 100s of TB, that trying to discover the scientifically valid contributions requires assistance at runtime to both organize and annotate the data. Waiting for offline processing is not feasible due both to the impact on the IO system and the time required. To reduce this load and improve the ability of scientists to use the large amounts of data being produced, new techniques for data management are required. First, there is a need for techniques for efficient movement of data from the compute space to storage. These techniques should understand the underlying system infrastructure and adapt to changing system conditions. Technologies include aggregation networks, data staging nodes for a closer parity to the IO subsystem, and autonomic IO routines that can detect system bottlenecks and choose different approaches, such as splitting the output into multiple targets, staggering output processes. Such methods must be end-to-end, meaning that even with properly managed asynchronous techniques, it is still essential to properly manage the later synchronous interaction with the storage system to maintain acceptable performance. Second, for the data being generated, annotations and other metadata must be incorporated to help the scientist understand output data for the simulation run as a whole, to select data and data features without concern for what files or other storage technologies were employed. All of these features should be attained while

  17. Potenciál IoT v Smart city

    OpenAIRE

    Pavlíček, Tomáš

    2016-01-01

    The aim of this masters thesis is to identify, in which phase of adoption of Internet of Things (IoT) application areas of concept Smart City are nowadays Czech regional cities, what is their outlook to 2025 and also identify in which dimensions of concept Smart city, supported by IoT technologies, perceive Czech regional cities the greatest potential. Based on information obtained from the studied materials, the concept of Internet of Things (IoT) is described, along with a detailed descript...

  18. Intrusion Detection System In IoT

    OpenAIRE

    Nygaard, Frederik

    2017-01-01

    Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing for Low-Power and Lossy Networks (RPL) is the standard routing protocol. In IoT, devices commonly have low energy, storage and memory, which is why the implemented intrusion algorithm in this thesis will try to minimize the usage of these resources. IDS for RPL-networks have been implemented before, but the use of resources or the number of packets sent was too high to be successful when findi...

  19. High-resolution imaging of solar system objects

    International Nuclear Information System (INIS)

    Goldberg, B.A.

    1988-01-01

    The strategy of this investigation has been to develop new high-resolution imaging capabilities and to apply them to extended observing programs. These programs have included Io's neutral sodium cloud and comets. The Io observing program was carried out at Table Mountain Observatory (1976 to 1981), providing a framework interpreting Voyager measurements of the Io torus, and serving as an important reference for studying asymmetries and time variabilities in the Jovian magnetosphere. Comet observations made with the 3.6 m Canada-France-Hawaii Telescope and 1.6 m AMOS telescope (1984 to 1987) provide basis for studying early coma development in Halley, the kinematics of its nucleus, and the internal and external structure of the nucleus. Images of GZ from the ICE encounter period form the basis for unique comparisons with in situ magnetic field and dust impact measurements to determine the ion tail and dust coma structure, respectively

  20. A Model of Socially Connected Web Objects for IoT Applications

    OpenAIRE

    Ali, Sajjad; Kibria, Muhammad Golam; Jarwar, Muhammad Aslam; Lee, Hoon Ki; Chong, Ilyoung

    2018-01-01

    The Internet of Things (IoT) is evolving with the connected objects at an unprecedented rate, bringing about enormous opportunities for the future IoT applications as well as challenges. One of the major challenges is to handle the complexity generated by the interconnection of billions of objects. However, Social Internet of Things (SIoT), emerging from the conglomeration of IoT and social networks, has realized an efficient way to facilitate the development of complex future IoT application...

  1. TMACS I/O termination point listing. Revision 1

    International Nuclear Information System (INIS)

    Scaief, C.C. III.

    1994-01-01

    This document provides a listing of all analog and discrete input/output (I/O) points connected to the Tank Monitor and Control System (TMACS). The list also provides other information such as the point tag name, termination location, description, drawing references and other parameters. The purpose is to define each point's unique tag name and to cross reference the point with other associated information that may be necessary for activities such as maintenance, calibration, diagnostics, or design changes. It provides a list in one document of all I/O points that would otherwise only be available by referring to all I/O termination drawings

  2. TMACS I/O termination point listing. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Scaief, C.C. III

    1994-09-13

    This document provides a listing of all analog and discrete input/output (I/O) points connected to the Tank Monitor and Control System (TMACS). The list also provides other information such as the point tag name, termination location, description, drawing references and other parameters. The purpose is to define each point`s unique tag name and to cross reference the point with other associated information that may be necessary for activities such as maintenance, calibration, diagnostics, or design changes. It provides a list in one document of all I/O points that would otherwise only be available by referring to all I/O termination drawings.

  3. Studi atas Pemanfaatan Blockchain bagi Internet of Things (IoT

    Directory of Open Access Journals (Sweden)

    Lathifah Arief

    2017-08-01

    Full Text Available Ekosistem Internet of Things (IoT berkembang dengan sangat cepat dan diperkirakan akan menghubungkan 5-20 miliar perangkat pada tahun 2020. Data yang dihimpun dari perangkat ini akan mencapai jumlah yang sangat besar. Saat ini, ekosistem IoT pada umumnya menggunakan model sistem terpusat. Model tersebut memiliki beberapa kelemahan, seperti biaya pemeliharaan yang relatif tinggi, Sistem terdistribusi dapat menjadi alternatif solusi. Blockchain, teknologi ledger terditribusi, memungkinkan transaksi peer-to-peer tanpa perlu adanya perantara pihak ketiga yang terpercaya. Paper ini bertujuan untuk mengeksplorasi potensi pengintegrasian Blockchain ke dalam ekosistem IoT. Hasil penelitian berupa model dan use-case pemanfaatan Blockchain dalam IoT.

  4. IoT-based Asset Management System for Healthcare-related Industries

    Directory of Open Access Journals (Sweden)

    Lee Carman Ka Man

    2015-11-01

    Full Text Available The healthcare industry has been focusing efforts on optimizing inventory management procedures through the incorporation of Information and Communication Technology, in the form of tracking devices and data mining, to establish ideal inventory models. In this paper, a roadmap is developed towards a technological assessment of the Internet of Things (IoT in the healthcare industry, 2010–2020. According to the roadmap, an IoT-based healthcare asset management system (IoT-HAMS is proposed and developed based on Artificial Neural Network (ANN and Fuzzy Logic (FL, incorporating IoT technologies for asset management to optimize the supply of resources.

  5. Cloud-Enhanced Robotic System for Smart City Crowd Control

    Directory of Open Access Journals (Sweden)

    Akhlaqur Rahman

    2016-12-01

    Full Text Available Cloud robotics in smart cities is an emerging paradigm that enables autonomous robotic agents to communicate and collaborate with a cloud computing infrastructure. It complements the Internet of Things (IoT by creating an expanded network where robots offload data-intensive computation to the ubiquitous cloud to ensure quality of service (QoS. However, offloading for robots is significantly complex due to their unique characteristics of mobility, skill-learning, data collection, and decision-making capabilities. In this paper, a generic cloud robotics framework is proposed to realize smart city vision while taking into consideration its various complexities. Specifically, we present an integrated framework for a crowd control system where cloud-enhanced robots are deployed to perform necessary tasks. The task offloading is formulated as a constrained optimization problem capable of handling any task flow that can be characterized by a Direct Acyclic Graph (DAG. We consider two scenarios of minimizing energy and time, respectively, and develop a genetic algorithm (GA-based approach to identify the optimal task offloading decisions. The performance comparison with two benchmarks shows that our GA scheme achieves desired energy and time performance. We also show the adaptability of our algorithm by varying the values for bandwidth and movement. The results suggest their impact on offloading. Finally, we present a multi-task flow optimal path sequence problem that highlights how the robot can plan its task completion via movements that expend the minimum energy. This integrates path planning with offloading for robotics. To the best of our knowledge, this is the first attempt to evaluate cloud-based task offloading for a smart city crowd control system.

  6. UMAMI: A Recipe for Generating Meaningful Metrics through Holistic I/O Performance Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Lockwood, Glenn K. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Yoo, Wucherl [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Byna, Suren [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Wright, Nicholas J. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Snyder, Shane [Argonne National Lab. (ANL), Argonne, IL (United States); Harms, Kevin [Argonne National Lab. (ANL), Argonne, IL (United States); Nault, Zachary [Argonne National Lab. (ANL), Argonne, IL (United States); Carns, Philip [Argonne National Lab. (ANL), Argonne, IL (United States)

    2017-11-12

    I/O efficiency is essential to productivity in scientific computing, especially as many scientific domains become more data-intensive. Many characterization tools have been used to elucidate specific aspects of parallel I/O performance, but analyzing components of complex I/O subsystems in isolation fails to provide insight into critical questions: how do the I/O components interact, what are reasonable expectations for application performance, and what are the underlying causes of I/O performance problems? To address these questions while capitalizing on existing component-level characterization tools, we propose an approach that combines on-demand, modular synthesis of I/O characterization data into a unified monitoring and metrics interface (UMAMI) to provide a normalized, holistic view of I/O behavior. We evaluate the feasibility of this approach by applying it to a month-long benchmarking study on two distinct largescale computing platforms. We present three case studies that highlight the importance of analyzing application I/O performance in context with both contemporaneous and historical component metrics, and we provide new insights into the factors affecting I/O performance. By demonstrating the generality of our approach, we lay the groundwork for a production-grade framework for holistic I/O analysis.

  7. Professional iOS database application programming

    CERN Document Server

    Alessi, Patrick

    2013-01-01

    Updated and revised coverage that includes the latest versions of iOS and Xcode Whether you're a novice or experienced developer, you will want to dive into this updated resource on database application programming for the iPhone and iPad. Packed with more than 50 percent new and revised material - including completely rebuilt code, screenshots, and full coverage of new features pertaining to database programming and enterprise integration in iOS 6 - this must-have book intends to continue the precedent set by the previous edition by helping thousands of developers master database

  8. Layout-Aware I/O Scheduling for Terabits Data Movement

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Youngjae [ORNL; Atchley, Scott [ORNL; Vallee, Geoffroy R [ORNL; Shipman, Galen M [ORNL

    2013-01-01

    Many science facilities, such as the Department of Energy s Leadership Computing Facilities and experimental facilities including the Spallation Neutron Source, Stanford Linear Accelerator Center, and Advanced Photon Source, produce massive amounts of experimental and simulation data. These data are often shared among the facilities and with collaborating institutions. Moving large datasets over the wide- area network (WAN) is a major problem inhibiting collaboration. Next- generation, terabit-networks will help alleviate the problem, however, the parallel storage systems on the end-system hosts at these institutions can become a bottleneck for terabit data movement. The parallel storage system (PFS) is shared by simulation systems, experimental systems, analysis and visualization clusters, in addition to wide-area data movers. These competing uses often induce temporary, but significant, I/O load imbalances on the storage system, which impact the performance of all the users. The problem is a serious concern because some resources are more expensive (e.g. super computers) or have time-critical deadlines (e.g. experimental data from a light source), but parallel file systems handle all requests fairly even if some storage servers are under heavy load. This paper investigates the problem of competing workloads accessing the parallel file system and how the performance of wide-area data movement can be improved in these environments. First, we study the I/O load imbalance problems using actual I/O performance data collected from the Spider storage system at the Oak Ridge Leadership Computing Facility. Second, we present I/O optimization solutions with layout-awareness on end-system hosts for bulk data movement. With our evaluation, we show that our I/O optimization techniques can avoid the I/O congested disk groups, improving storage I/O times on parallel storage systems for terabit data movement.

  9. Using a 2D Model of the Io Plasma Torus to Investigate the Effects of Density Variations on the Morphology and Intensity of the Io Footprint

    Science.gov (United States)

    Payan, A. P.; Rajendar, A.; Paty, C. S.; Bonfond, B.; Crary, F.

    2012-12-01

    Io is the primary source of plasma in the Jovian magnetosphere, continuously releasing approximately 1 ton/s of SO2 from volcanic eruptions. The interaction of Io with Jupiter's magnetosphere is strongly influenced by the density structure of the resulting plasma torus and the position of Io relative to the center of the torus [Bonfond et al. 2008]. This unusual interaction produces a complex auroral feature on Jupiter's ionosphere known as the Io footprint. Hubble Space Telescope (HST) observations of Jupiter's far-UV aurora during spring 2007 showed an increased number of isolated auroral blobs along with a continuous expansion of Jupiter's main auroral oval over a few months. These blobs were associated with several large injections of hot plasma between 9 and 27 Jovian radii. These events coincided with a large volcanic eruption of the Tvashtar Paterae on Io, as observed by the New Horizons spacecraft [Spencer et al., 2007]. This, in turn, may have resulted in a significant increase in the plasma torus density. Besides, on June 7th, 2007, the Io footprint momentarily became so faint that it disappeared under a diffuse patch of emission remaining from an injection blob [Bonfond et al., 2012]. The goal of the present study is to examine the relationship between the increased density of the plasma torus and the dimming of the Io footprint. We implement a 2D model of the Io plasma torus that treats the variable-density torus as being composed of discrete layers of uniform density. As the co-rotating plasma in the plasma torus impinges on Io, Alfvén waves are launched at a pushback angle obtained from Gurnett and Goertz [1981]. The waves propagate inside the plasma torus through reflection and refraction at density discontinuities where they lose some of their initial energy. Using the above model, we can track the Alfvén wave fronts in the plasma torus and determine the longitude at which they exit the torus along with the corresponding remaining energy. Since

  10. Learning iOS forensics

    CERN Document Server

    Epifani, Mattia

    2015-01-01

    If you are a digital forensics examiner daily involved in the acquisition and analysis of mobile devices and want to have a complete overview of how to perform your work on iOS devices, this book is definitely for you.

  11. Proceedings First Workshop on Architectures, Languages and Paradigms for IoT

    OpenAIRE

    Pianini, Danilo; Salvaneschi, Guido

    2018-01-01

    The 1st workshop on Architectures, Languages and Paradigms for IoT (ALP4IoT 2017), was held in Turin on September 19th, 2017. ALP4IoT was a satellite event of the 13th International Conference on integrated Formal Methods (iFM 2017). The workshop aimed at critically reviewing the state-of-the-art and the state-of-the-practice of formal techniques and software methods for the IoT, presenting open problems and challenges and triggering a discussion among the participants with different views an...

  12. The Integration of DCS I/O to an Existing PLC

    Science.gov (United States)

    Sadhukhan, Debashis; Mihevic, John

    2013-01-01

    At the NASA Glenn Research Center (GRC), Existing Programmable Logic Controller (PLC) I/O was replaced with Distributed Control System (DCS) I/O, while keeping the existing PLC sequence Logic. The reason for integration of the PLC logic and DCS I/O, along with the evaluation of the resulting system is the subject of this paper. The pros and cons of the old system and new upgrade are described, including operator workstation screen update times. Detail of the physical layout and the communication between the PLC, the DCS I/O and the operator workstations are illustrated. The complex characteristics of a central process control system and the plan to remove the PLC processors in future upgrades is also discussed.

  13. A Federated Capability-based Access Control Mechanism for Internet of Things (IoTs)

    OpenAIRE

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-01-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, l...

  14. A nebula of gases from Io surrounding Jupiter.

    Science.gov (United States)

    Krimigis, Stamatios M; Mitchell, Donald G; Hamilton, Douglas C; Dandouras, Jannis; Armstrong, Thomas P; Bolton, Scott J; Cheng, Andrew F; Gloeckler, George; Hsieh, K C; Keath, Edwin P; Krupp, Norbert; Lagg, Andreas; Lanzerotti, Louis J; Livi, Stefano; Mauk, Barry H; McEntire, Richard W; Roelof, Edmond C; Wilken, Berend; Williams, Donald J

    2002-02-28

    Several planetary missions have reported the presence of substantial numbers of energetic ions and electrons surrounding Jupiter; relativistic electrons are observable up to several astronomical units (au) from the planet. A population of energetic (>30[?]keV) neutral particles also has been reported, but the instrumentation was not able to determine the mass or charge state of the particles, which were subsequently labelled energetic neutral atoms. Although images showing the presence of the trace element sodium were obtained, the source and identity of the neutral atoms---and their overall significance relative to the loss of charged particles from Jupiter's magnetosphere---were unknown. Here we report the discovery by the Cassini spacecraft of a fast (>103[?]km[?]s-1) and hot magnetospheric neutral wind extending more than 0.5[?]au from Jupiter, and the presence of energetic neutral atoms (both hot and cold) that have been accelerated by the electric field in the solar wind. We suggest that these atoms originate in volcanic gases from Io, undergo significant evolution through various electromagnetic interactions, escape Jupiter's magnetosphere and then populate the environment around the planet. Thus a 'nebula' is created that extends outwards over hundreds of jovian radii.

  15. A post-Galileo view of Io's interior

    Science.gov (United States)

    Keszthelyi, L.; Jaeger, W.L.; Turtle, E.P.; Milazzo, M.; Radebaugh, J.

    2004-01-01

    We present a self-consistent model for the interior of Io, taking the recent Galileo data into account. In this model, Io has a completely molten core, substantially molten mantle, and a very cold lithosphere. Heat from magmatic activity can mobilize volatile compounds such as SO2 in the lithosphere, and the movement of such cryogenic fluids may be important in the formation of surface features including sapping scarps and paterae. ?? Published by Elsevier Inc.

  16. SMART-ITEM: IoT-Enabled Smart Living

    OpenAIRE

    Kor, A; Pattinson, C; Yanovsky, M; Kharchenko, V

    2017-01-01

    The main goal of this proposed project is to harness the emerging IoT technology to empower elderly population to self-manage their own health, stay active, healthy, and independent as long as possible within a smart and secured living environment. An integrated open-sourced IoT ecosystem will be developed. It will encompass the entire data lifecycle which involves the following processes: data acquisition, data transportation; data integration, processing, manipulation and computation; visua...

  17. Analysis of DDoS-capable IoT malwares

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2017-01-01

    to the top Distributed Denial of Service (DDoS) attacks, making them more powerful and easier to achieve than ever. This paper aims at provide an up-to-date picture of DDoS attacks in the specific subject of the IoT, studying how these attacks work and considering the most common families in the IoT context...

  18. Green IoT: An Investigation on Energy Saving Practices for 2020 and Beyond

    OpenAIRE

    Arshad, R.; Zahoor, S.; Shah, M.A.; Wahid, A.; Yu, Hongnian

    2017-01-01

    Internet of Things (IoT) is an emerging concept which aims to connect billions of devices with each other. The IoT devices sense, collect and transmit important information from their surroundings. This exchange of very large amount of information amongst billions of devices creates a massive energy need. Green IoT envisions the concept of reducing the energy consumption of IoT devices and making the environment safe. Inspired by achieving a sustainable environment for IoT, we first give the ...

  19. Understanding the I/O Performance Gap Between Cori KNL and Haswell

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Jialin [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Koziol, Quincey [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Tang, Houjun [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Tessier, Francois [Argonne National Lab. (ANL), Argonne, IL (United States); Bhimji, Wahid [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Cook, Brandon [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Austin, Brian [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Byna, Suren [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thakur, Bhupender [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Lockwood, Glenn [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Deslippe, Jack [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Prabhat, None [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC)

    2017-05-01

    The Cori system at NERSC has two compute partitions with different CPU architectures: a 2,004 node Haswell partition and a 9,688 node KNL partition, which ranked as the 5th most powerful and fastest supercomputer on the November 2016 Top 500 list. The compute partitions share a common storage configuration, and understanding the IO performance gap between them is important, impacting not only to NERSC/LBNL users and other national labs, but also to the relevant hardware vendors and software developers. In this paper, we have analyzed performance of single core and single node IO comprehensively on the Haswell and KNL partitions, and have discovered the major bottlenecks, which include CPU frequencies and memory copy performance. We have also extended our performance tests to multi-node IO and revealed the IO cost difference caused by network latency, buffer size, and communication cost. Overall, we have developed a strong understanding of the IO gap between Haswell and KNL nodes and the lessons learned from this exploration will guide us in designing optimal IO solutions in many-core era.

  20. IO and OI. II

    DEFF Research Database (Denmark)

    Engelfriet, Joost; Schmidt, Erik Meineche

    1978-01-01

    In Part 1 of this paper (J. Comput. System Sci. 15, Number 3 (1977)) we presented a fixed point characterization of the (IO and OI) context-free tree languages. We showed that a context-free tree grammar can be viewed as a system of regular equations over a tree language substitution algebra. In ....... In this part we shall use these results to obtain a theory of systems of context-free equations over arbitrary continuous algebras. We refer to the Introduction of Part 1 for a description of the contents of this part.......In Part 1 of this paper (J. Comput. System Sci. 15, Number 3 (1977)) we presented a fixed point characterization of the (IO and OI) context-free tree languages. We showed that a context-free tree grammar can be viewed as a system of regular equations over a tree language substitution algebra...

  1. ATLAS I/O Performance Optimization in As-Deployed Environments

    CERN Document Server

    Maier, Thomas; The ATLAS collaboration; Bhimji, Wahid; Elmsheuser, Johannes; van Gemmeren, Peter; Malon, David; Krumnack, Nils

    2015-01-01

    I/O is a fundamental determinant in the overall performance of physics analysis and other data-intensive scientific computing. It is, further, crucial to effective resource delivery by the facilities and infrastructure that support data-intensive science. To understand I/O performance, clean measurements in controlled environments are essential, but effective optimization requires as well an understanding of the complicated realities of as-deployed environments. These include a spectrum of local and wide-area data delivery and resilience models, heterogeneous storage systems, matches and mismatches between data organization and access patterns, multi-user considerations that may help or hinder individual job performance, and more. The ATLAS experiment has organized an interdisciplinary working group of I/O, persistence, analysis framework, distributed infrastructure, site deployment, and external experts to understand and improve I/O performance in preparation for Run 2 of the Large Hadron Collider. The adopt...

  2. Volcanism on Io: The Galileo NIMS Io Thermal Emission Database (NITED)

    Science.gov (United States)

    Davies, A. G.; Veeder, G. J.; Matson, D. L.; Johnson, T. V.

    2011-12-01

    In order to determine the magnitude of thermal emission from Io's volcanoes and variability with time at local, regional and global scales, we have calculated the 4.7 or 5 μm radiant flux for every hot spot in every Galileo Near Infrared Mapping Spectrometer (NIMS) observation obtained during the Galileo mission between June 1996 and October 2001. The resulting database contains over 1000 measurements of radiant flux, corrected for emission angle, range to target, and, where necessary, incident sunlight. Io's volcanoes produce the most voluminous and most powerful eruptions in the Solar System [1] and NIMS was the ideal instrument for measuring thermal emission from these volcanoes (see [1, 2]). NIMS covered the infrared from 0.7 to 5.2 μm, so measurement of hot spot thermal emission at ~5 μm was possible even in daytime observations. As part of a campaign to quantify magnitude and variability of volcanic thermal emission [1, 3-5] we examined the entire NIMS dataset (196 observations). The resulting NIMS Io Thermal Emission Database (NITED) allows the charting of 5-μm thermal emission at individual volcanoes, identifying individual eruption episodes, and enabling the comparison of activity at different hot spots [e.g., 6] and different regions of Io. Some ionian hot spots were detected only once or twice by NIMS (e.g., Ah Peku Patera, seen during I32), but most were detected many times (e.g., Culann, Tupan and Zamama, [6]). For example, the database contains over 40 observations of Loki Patera (some at high emission angle, and two partial observations). There are 55 observations of Pele. The 27 nighttime observations of Pele show a remarkably steady 5-μm radiant flux of 35 ± 12 GW/μm. There are 34 observations of Pillan, which erupted violently in 1997. Although in many observations low spatial resolution makes it difficult to separate hot spot pairs such as Susanoo Patera and Mulungu Patera; Tawhaki Patera and Hi'iaka Patera; and Janus Patera and Kanehekili

  3. The Method of System Test using I/O Stimulator

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jang Yeol; Lee, Dong Young; Kim, Chang Hoi [KAERI, Daejeon (Korea, Republic of)

    2016-05-15

    In general, the software development life cycle consists of the requirement phase, design phase, implementation phase, testing phase, integration phase (software-software integration, software-hardware integration), installation phase, and operation and maintenance phase. The fundamental parts to the testing phase are component test, software integration test, software hardware integration test, and system test. Among these tests, we focused in particular on system test using I/O stimulator. The system test operates the functionality, performance, and interface because system testing falls within the scope of black box testing, which should not require knowledge of the inner design of the code or logic. The purpose of developing a system test using a I/O stimulator is to save time and effort from the functionality and performance tests. We developed an I/O stimulator for the burning system test based on the operational scenario. The hardware, software, and manmachine- interface (MMI) are fundamental parts to the I/O stimulator. Signal sources from the I/O stimulator contain analog input, analog output, digital input, digital output, a Programmable Power Supply, an RS232C Serial interface and a dual port Ethernet interface. While automation cannot reproduce everything that a software engineer can do, it can be extremely useful for the system test. However, it does require the test criteria and a well-developed test suite of the testing scripts in order to be useful. In this study, we developed a multipurpose and cost-efficient I/O stimulator using LabVIEW program instead of the testing scripts.

  4. The Method of System Test using I/O Stimulator

    International Nuclear Information System (INIS)

    Kim, Jang Yeol; Lee, Dong Young; Kim, Chang Hoi

    2016-01-01

    In general, the software development life cycle consists of the requirement phase, design phase, implementation phase, testing phase, integration phase (software-software integration, software-hardware integration), installation phase, and operation and maintenance phase. The fundamental parts to the testing phase are component test, software integration test, software hardware integration test, and system test. Among these tests, we focused in particular on system test using I/O stimulator. The system test operates the functionality, performance, and interface because system testing falls within the scope of black box testing, which should not require knowledge of the inner design of the code or logic. The purpose of developing a system test using a I/O stimulator is to save time and effort from the functionality and performance tests. We developed an I/O stimulator for the burning system test based on the operational scenario. The hardware, software, and manmachine- interface (MMI) are fundamental parts to the I/O stimulator. Signal sources from the I/O stimulator contain analog input, analog output, digital input, digital output, a Programmable Power Supply, an RS232C Serial interface and a dual port Ethernet interface. While automation cannot reproduce everything that a software engineer can do, it can be extremely useful for the system test. However, it does require the test criteria and a well-developed test suite of the testing scripts in order to be useful. In this study, we developed a multipurpose and cost-efficient I/O stimulator using LabVIEW program instead of the testing scripts

  5. Enabling IoT ecosystems through platform interoperability

    OpenAIRE

    Bröring, Arne; Schmid, Stefan; Schindhelm, Corina-Kim; Khelil, Abdelmajid; Kabisch, Sebastian; Kramer, Denis; Le Phuoc, Danh; Mitic, Jelena; Anicic, Darko; Teniente López, Ernest

    2017-01-01

    Today, the Internet of Things (IoT) comprises vertically oriented platforms for things. Developers who want to use them need to negotiate access individually and adapt to the platform-specific API and information models. Having to perform these actions for each platform often outweighs the possible gains from adapting applications to multiple platforms. This fragmentation of the IoT and the missing interoperability result in high entry barriers for developers and prevent the emergence of broa...

  6. Service framework for Internet of People, Things and Services (IoPTS)

    DEFF Research Database (Denmark)

    Shinde, Gitanjali; Olesen, Henning

    2016-01-01

    Internet of Things (IoT) is a revolutionary technology, where devices around us will be capable of sensing, reacting, responding and working autonomously to provide services to the users e.g. within smart homes, enterprises, utilities and e-Health. In the IoT paradigm, every device...... will be connected to the Internet to provide services to the user. Bringing this together makes it relevant to talk about the "Internet of People, Things and Services (IoPTS)". However, providing the appropriate services to the users depending on their requirements is a major challenge for IoPTS. After reviewing...

  7. NIMS: hotspots on Io during G2

    Science.gov (United States)

    1996-01-01

    The Near Infrared Mapping Spectrometer (NIMS) on the Galileo spacecraft imaged Io at high spectral resolution at a range of 439,000 km (275,000 miles) during the G2 encounter on 7 September 1996. This image shows (on the right) Io as seen in the infrared by NIMS. The image on the left shows the same view from Voyager in 1979. This NIMS image can be compared to the NIMS images from the G1 orbit (June 1996) to monitor changes on Io. The NIMS image is at 4.9 microns, showing thermal emissions from the hotspots. The brightness of the pixels is a function of size and temperature.At least 10 hotspots have been identified and can be matched with surface features. An accurate determination of the position of the hotspot in the vicinity of Shamash Patera is pending. Hotspots are seen in the vicinity of Prometheus, Volund and Marduk, all sites of volcanic plume activity during the Galileo encounters, and also of active plumes in 1979. Temperatures and areas have been calculated for the hotspots shown. Temperatures range from 828 K (1031 F) to 210 K (- 81.4 F). The lowest temperature is significantly higher than the Io background (non-hotspot) surface temperature of about 100 K (-279 F). Hotspot areas range from 6.5 square km (2.5 sq miles) to 40,000 sq km (15,400 sq miles). The hottest hotspots have smallest areas, and the cooler hotspots have the largest areas. NIMS is continuing to observe Io to monitor volcanic activity throughout the Galileo mission.The Galileo mission is managed by the Jet Propulsion Laboratory for NASA's Office of Space Science, Washington, D.C.This image and other images and data received from Galileo are posted on the Galileo mission home page on the World Wide Web at http://galileo.jpl.nasa.gov.

  8. Ultra-low power analog-digital converters for IoT

    NARCIS (Netherlands)

    Harpe, P.J.A.; Alioto, Massimo

    2017-01-01

    This chapter addresses ADCs for IoT nodes, which are needed to digitize sensor information before processing, storage or wireless transmission. ADCs are also required for the radio communication channel. This chapter focusses on successive approximation (SAR) ADCs, a popular architecture for IoT

  9. Attack tree analysis for insider threats on the IoT using isabelle

    DEFF Research Database (Denmark)

    Kammüller, Florian; Nurse, Jason R. C.; Probst, Christian W.

    2016-01-01

    The Internet-of-Things (IoT) aims at integrating small devices around humans. The threat from human insiders in "regular" organisations is real; in a fully-connected world of the IoT, organisations face a substantially more severe security challenge due to unexpected access possibilities and info....... On the classified IoT attack examples, we show how this logical approach can be used to make the models more precise and to analyse the previously identified Insider IoT attacks using Isabelle attack trees....

  10. Internet of Things : a gateway centric solution for providing IoT connectivity

    OpenAIRE

    Karhula, Pekka

    2016-01-01

    The Internet of Things (IoT) is revolutionising the traditional Internet by extending it with smart everyday objects. Wearables, smart grids and home automation systems are just a few examples of the IoT. A noteworthy point is that the amount of devices connected to the Internet will rapidly grow with the IoT. The IoT typically involves devices that are constrained in terms of energy, memory and processing resources. Therefore, they also limit applying the existing Internet pro...

  11. A Multi-Hop Clustering Mechanism for Scalable IoT Networks.

    Science.gov (United States)

    Sung, Yoonyoung; Lee, Sookyoung; Lee, Meejeong

    2018-03-23

    It is expected that up to 26 billion Internet of Things (IoT) equipped with sensors and wireless communication capabilities will be connected to the Internet by 2020 for various purposes. With a large scale IoT network, having each node connected to the Internet with an individual connection may face serious scalability issues. The scalability problem of the IoT network may be alleviated by grouping the nodes of the IoT network into clusters and having a representative node in each cluster connect to the Internet on behalf of the other nodes in the cluster instead of having a per-node Internet connection and communication. In this paper, we propose a multi-hop clustering mechanism for IoT networks to minimize the number of required Internet connections. Specifically, the objective of proposed mechanism is to select the minimum number of coordinators, which take the role of a representative node for the cluster, i.e., having the Internet connection on behalf of the rest of the nodes in the cluster and to map a partition of the IoT nodes onto the selected set of coordinators to minimize the total distance between the nodes and their respective coordinator under a certain constraint in terms of maximum hop count between the IoT nodes and their respective coordinator. Since this problem can be mapped into a set cover problem which is known as NP-hard, we pursue a heuristic approach to solve the problem and analyze the complexity of the proposed solution. Through a set of experiments with varying parameters, the proposed scheme shows 63-87.3% reduction of the Internet connections depending on the number of the IoT nodes while that of the optimal solution is 65.6-89.9% in a small scale network. Moreover, it is shown that the performance characteristics of the proposed mechanism coincide with expected performance characteristics of the optimal solution in a large-scale network.

  12. Sensor-Based Optimization Model for Air Quality Improvement in Home IoT.

    Science.gov (United States)

    Kim, Jonghyuk; Hwangbo, Hyunwoo

    2018-03-23

    We introduce current home Internet of Things (IoT) technology and present research on its various forms and applications in real life. In addition, we describe IoT marketing strategies as well as specific modeling techniques for improving air quality, a key home IoT service. To this end, we summarize the latest research on sensor-based home IoT, studies on indoor air quality, and technical studies on random data generation. In addition, we develop an air quality improvement model that can be readily applied to the market by acquiring initial analytical data and building infrastructures using spectrum/density analysis and the natural cubic spline method. Accordingly, we generate related data based on user behavioral values. We integrate the logic into the existing home IoT system to enable users to easily access the system through the Web or mobile applications. We expect that the present introduction of a practical marketing application method will contribute to enhancing the expansion of the home IoT market.

  13. A survey on LPWA technology: LoRa and NB-IoT

    Directory of Open Access Journals (Sweden)

    Rashmi Sharan Sinha

    2017-03-01

    Full Text Available By 2020, more than twenty five billion devices would be connected through wireless communications. In accordance with the rapid growth of the internet of things (IoT market, low power wide area (LPWA technologies have become popular. In various LPWA technologies, narrowband (NB-IoT and long range (LoRa are two leading technologies. In this paper, we provide a comprehensive survey on NB-IoT and LoRa as efficient solutions connecting the devices. It is shown that unlicensed LoRa has advantages in terms of battery lifetime, capacity, and cost. Meanwhile, licensed NB-IoT offers benefits in terms of QoS, latency, reliability, and range.

  14. Volcanism on Jupiter's moon Io and its relation to interior processes

    Science.gov (United States)

    Hamilton, Christopher

    2013-04-01

    Jupiter's moon Io is the most volcanically active body in the Solar System and offers insight into processes of tidal heating, melt generation, and magma ascent. Investigating these processes contributes to a better understanding of Io's geologic history, internal structure, and tidal dissipation mechanisms, as well as to understanding similar processes operating on other tidally-heated worlds (e.g., Europa, Enceladus, and some exoplanets). Four recent developments provide new observational constraints that prompt re-examination of the relationships between Io's surficial geology and interior structure. These developments include: (1) completion of the first 1:15,000,000 scale geologic map of Io based on a synthesis of Voyager and Galileo data; (2) re-interpretation of Galileo magnetometer data, which suggests that Io has a globally continuous subsurface magma ocean; (3) new global surveys of the power output from volcanic centers on Io; and (4) identification of an offset between volcano concentrations and surface heat flux maxima predicted by solid body tidal heating models. In this study, the spatial distributions of volcanic hotspots and paterae on Io are characterized using distance-based clustering techniques and nearest neighbor statistics. Distance-based clustering results support a dominant role for asthenospheric heating within Io, but show a 30-60° eastward offset in volcano concentrations relative to locations of predicted surface heat flux maxima. The observed asymmetry in volcano concentrations, with respect to the tidal axis, cannot be explained by existing solid body tidal heating models. However, identification of a global magma ocean within Io raises the intriguing possibility that a fluid tidal response—analogous to the heating of icy satellites by fluid tidal dissipation in their liquid oceans—may modify Io's thermal budget and locations of enhanced volcanism. The population density of volcanoes is greatest near the equator, which also

  15. Tractable policy management framework for IoT

    Science.gov (United States)

    Goynugur, Emre; de Mel, Geeth; Sensoy, Murat; Calo, Seraphin

    2017-05-01

    Due to the advancement in the technology, hype of connected devices (hence forth referred to as IoT) in support of automating the functionality of many domains, be it intelligent manufacturing or smart homes, have become a reality. However, with the proliferation of such connected and interconnected devices, efficiently and effectively managing networks manually becomes an impractical, if not an impossible task. This is because devices have their own obligations and prohibitions in context, and humans are not equip to maintain a bird's-eye-view of the state. Traditionally, policies are used to address the issue, but in the IoT arena, one requires a policy framework in which the language can provide sufficient amount of expressiveness along with efficient reasoning procedures to automate the management. In this work we present our initial work into creating a scalable knowledge-based policy framework for IoT and demonstrate its applicability through a smart home application.

  16. Integrating Facebook iOS SDK with your application

    CERN Document Server

    Macrì, Giuseppe

    2013-01-01

    A tutorial-based guide with chapters focusing on learning and embedding crucial Facebook features.If you are a developer who wishes to develop and monetize your apps on the App store, then this is the book for you. This book assumes you have basic knowledge of iOS programming using Objective-C and XCode, however, prior knowledge of Facebook iOS SDK is not required.

  17. Instant Passbook app development for iOS how-to

    CERN Document Server

    Moon, Keith D

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. A step-by-step guide, focusing on simple projects to help you create a Passbook app for iOS 6.Instant Passbook App Development for iOS 6 How-to is for registered Apple iOS developers, experienced in building an app using Objective-C and Xcode, looking to add Passbook functionality to their app. You will need to have an understanding of the JSON format, REST APIs, and a server-side language like Ruby. Familiarity with executing commands via the Terminal app is expected for the exerci

  18. Latitudinal oscillations of plasma within the Io torus

    Science.gov (United States)

    Cummings, W. D.; Dessler, A. J.; Hill, T. W.

    1980-01-01

    The equilibrium latitude and the period of oscillations about this equilibrium latitude are calculated for a plasma in a centrifugally dominated tilted dipole magnetic field representing Jupiter's inner magnetosphere. It is found that for a hot plasma the equilibrium latitude in the magnetic equator, for a cold plasma it is the centrifugal equator, and for a warm plasma it is somewhere in between. An illustrative model is adopted in which atoms are sputtered from the Jupiter-facing hemisphere of Io and escape Io's gravity to be subsequently ionized some distance from Io. Finally, it is shown that ionization generally does not occur at the equilibrium altitude, and that the resulting latitudinal oscillations provide an explanation for the irregularities in electron concentration within the torus, as reported by the radioastronomy experiment aboard Voyager I.

  19. I/O load balancing for big data HPC applications

    Energy Technology Data Exchange (ETDEWEB)

    Paul, Arnab K. [Virginia Polytechnic Institute and State University; Goyal, Arpit [Virginia Polytechnic Institute and State University; Wang, Feiyi [ORNL; Oral, H Sarp [ORNL; Butt, Ali R. [Virginia Tech, Blacksburg, VA; Brim, Michael J. [ORNL; Srinivasa, Sangeetha B. [Virginia Polytechnic Institute and State University

    2018-01-01

    High Performance Computing (HPC) big data problems require efficient distributed storage systems. However, at scale, such storage systems often experience load imbalance and resource contention due to two factors: the bursty nature of scientific application I/O; and the complex I/O path that is without centralized arbitration and control. For example, the extant Lustre parallel file system-that supports many HPC centers-comprises numerous components connected via custom network topologies, and serves varying demands of a large number of users and applications. Consequently, some storage servers can be more loaded than others, which creates bottlenecks and reduces overall application I/O performance. Existing solutions typically focus on per application load balancing, and thus are not as effective given their lack of a global view of the system. In this paper, we propose a data-driven approach to load balance the I/O servers at scale, targeted at Lustre deployments. To this end, we design a global mapper on Lustre Metadata Server, which gathers runtime statistics from key storage components on the I/O path, and applies Markov chain modeling and a minimum-cost maximum-flow algorithm to decide where data should be placed. Evaluation using a realistic system simulator and a real setup shows that our approach yields better load balancing, which in turn can improve end-to-end performance.

  20. Scalable I/O Systems via Node-Local Storage: Approaching 1 TB/sec File I/O

    Energy Technology Data Exchange (ETDEWEB)

    Bronevetsky, G; Moody, A

    2009-08-18

    In the race to PetaFLOP-speed supercomputing systems, the increase in computational capability has been accompanied by corresponding increases in CPU count, total RAM, and storage capacity. However, a proportional increase in storage bandwidth has lagged behind. In order to improve system reliability and to reduce maintenance effort for modern large-scale systems, system designers have opted to remove node-local storage from the compute nodes. Today's multi-TeraFLOP supercomputers are typically attached to parallel file systems that provide only tens of GBs/s of I/O bandwidth. As a result, such machines have access to much less than 1GB/s of I/O bandwidth per TeraFLOP of compute power, which is below the generally accepted limit required for a well-balanced system. In a many ways, the current I/O bottleneck limits the capabilities of modern supercomputers, specifically in terms of limiting their working sets and restricting fault tolerance techniques, which become critical on systems consisting of tens of thousands of components. This paper resolves the dilemma between high performance and high reliability by presenting an alternative system design which makes use of node-local storage to improve aggregate system I/O bandwidth. In this work, we focus on the checkpointing use-case and present an experimental evaluation of the Scalable Checkpoint/Restart (SCR) library, a new adaptive checkpointing library that uses node-local storage to significantly improve the checkpointing performance of large-scale supercomputers. Experiments show that SCR achieves unprecedented write speeds, reaching a measured 700GB/s of aggregate bandwidth on 8,752 processors and an estimated 1TB/s for a similarly structured machine of 12,500 processors. This corresponds to a speedup of over 70x compared to the bandwidth provided by the 10GB/s parallel file system the cluster uses. Further, SCR can adapt to an environment in which there is wide variation in performance or capacity among

  1. Prediction-Based Energy Saving Mechanism in 3GPP NB-IoT Networks.

    Science.gov (United States)

    Lee, Jinseong; Lee, Jaiyong

    2017-09-01

    The current expansion of the Internet of things (IoT) demands improved communication platforms that support a wide area with low energy consumption. The 3rd Generation Partnership Project introduced narrowband IoT (NB-IoT) as IoT communication solutions. NB-IoT devices should be available for over 10 years without requiring a battery replacement. Thus, a low energy consumption is essential for the successful deployment of this technology. Given that a high amount of energy is consumed for radio transmission by the power amplifier, reducing the uplink transmission time is key to ensure a long lifespan of an IoT device. In this paper, we propose a prediction-based energy saving mechanism (PBESM) that is focused on enhanced uplink transmission. The mechanism consists of two parts: first, the network architecture that predicts the uplink packet occurrence through a deep packet inspection; second, an algorithm that predicts the processing delay and pre-assigns radio resources to enhance the scheduling request procedure. In this way, our mechanism reduces the number of random accesses and the energy consumed by radio transmission. Simulation results showed that the energy consumption using the proposed PBESM is reduced by up to 34% in comparison with that in the conventional NB-IoT method.

  2. Internet of things (IoT) in 5G mobile technologies

    CERN Document Server

    Mastorakis, George; Batalla, Jordi

    2016-01-01

    This book reports on the latest advances in the modeling, analysis and efficient management of information in Internet of Things (IoT) applications in the context of 5G access technologies. It presents cutting-edge applications made possible by the implementation of femtocell networks and millimeter wave communications solutions, examining them from the perspective of the universally and constantly connected IoT. Moreover, it describes novel architectural approaches to the IoT and presents the new framework possibilities offered by 5G mobile networks, including middleware requirements, node-centrality and the location of extensive functionalities at the edge. By providing researchers and professionals with a timely snapshot of emerging mobile communication systems, and highlighting the main pitfalls and potential solutions, the book fills an important gap in the literature and will foster the further developments of 5G hosting IoT devices.

  3. A Proof-of-Concept for Semantically Interoperable Federation of IoT Experimentation Facilities

    Directory of Open Access Journals (Sweden)

    Jorge Lanza

    2016-06-01

    Full Text Available The Internet-of-Things (IoT is unanimously identified as one of the main pillars of future smart scenarios. The potential of IoT technologies and deployments has been already demonstrated in a number of different application areas, including transport, energy, safety and healthcare. However, despite the growing number of IoT deployments, the majority of IoT applications tend to be self-contained, thereby forming application silos. A lightweight data centric integration and combination of these silos presents several challenges that still need to be addressed. Indeed, the ability to combine and synthesize data streams and services from diverse IoT platforms and testbeds, holds the promise to increase the potentiality of smart applications in terms of size, scope and targeted business context. In this article, a proof-of-concept implementation that federates two different IoT experimentation facilities by means of semantic-based technologies will be described. The specification and design of the implemented system and information models will be described together with the practical details of the developments carried out and its integration with the existing IoT platforms supporting the aforementioned testbeds. Overall, the system described in this paper demonstrates that it is possible to open new horizons in the development of IoT applications and experiments at a global scale, that transcend the (silo boundaries of individual deployments, based on the semantic interconnection and interoperability of diverse IoT platforms and testbeds.

  4. A Proof-of-Concept for Semantically Interoperable Federation of IoT Experimentation Facilities.

    Science.gov (United States)

    Lanza, Jorge; Sanchez, Luis; Gomez, David; Elsaleh, Tarek; Steinke, Ronald; Cirillo, Flavio

    2016-06-29

    The Internet-of-Things (IoT) is unanimously identified as one of the main pillars of future smart scenarios. The potential of IoT technologies and deployments has been already demonstrated in a number of different application areas, including transport, energy, safety and healthcare. However, despite the growing number of IoT deployments, the majority of IoT applications tend to be self-contained, thereby forming application silos. A lightweight data centric integration and combination of these silos presents several challenges that still need to be addressed. Indeed, the ability to combine and synthesize data streams and services from diverse IoT platforms and testbeds, holds the promise to increase the potentiality of smart applications in terms of size, scope and targeted business context. In this article, a proof-of-concept implementation that federates two different IoT experimentation facilities by means of semantic-based technologies will be described. The specification and design of the implemented system and information models will be described together with the practical details of the developments carried out and its integration with the existing IoT platforms supporting the aforementioned testbeds. Overall, the system described in this paper demonstrates that it is possible to open new horizons in the development of IoT applications and experiments at a global scale, that transcend the (silo) boundaries of individual deployments, based on the semantic interconnection and interoperability of diverse IoT platforms and testbeds.

  5. IoT for Smart Living

    Indian Academy of Sciences (India)

    Professor. Robert Bosch Centre for Cyber-Physical Systems, ... Develop Information models/Knowledge structures to capture “Cities” to enable Intelligent apps. IoT Technology is now easily accessible for anyone to experiment with. Build very ...

  6. Spatiotemporal Stochastic Modeling of IoT Enabled Cellular Networks: Scalability and Stability Analysis

    KAUST Repository

    Gharbieh, Mohammad; Elsawy, Hesham; Bader, Ahmed; Alouini, Mohamed-Slim

    2017-01-01

    The Internet of Things (IoT) is large-scale by nature, which is manifested by the massive number of connected devices as well as their vast spatial existence. Cellular networks, which provide ubiquitous, reliable, and efficient wireless access, will play fundamental rule in delivering the first-mile access for the data tsunami to be generated by the IoT. However, cellular networks may have scalability problems to provide uplink connectivity to massive numbers of connected things. To characterize the scalability of cellular uplink in the context of IoT networks, this paper develops a traffic-aware spatiotemporal mathematical model for IoT devices supported by cellular uplink connectivity. The developed model is based on stochastic geometry and queueing theory to account for the traffic requirement per IoT device, the different transmission strategies, and the mutual interference between the IoT devices. To this end, the developed model is utilized to characterize the extent to which cellular networks can accommodate IoT traffic as well as to assess and compare three different transmission strategies that incorporate a combination of transmission persistency, backoff, and power-ramping. The analysis and the results clearly illustrate the scalability problem imposed by IoT on cellular network and offer insights into effective scenarios for each transmission strategy.

  7. Spatiotemporal Stochastic Modeling of IoT Enabled Cellular Networks: Scalability and Stability Analysis

    KAUST Repository

    Gharbieh, Mohammad

    2017-05-02

    The Internet of Things (IoT) is large-scale by nature, which is manifested by the massive number of connected devices as well as their vast spatial existence. Cellular networks, which provide ubiquitous, reliable, and efficient wireless access, will play fundamental rule in delivering the first-mile access for the data tsunami to be generated by the IoT. However, cellular networks may have scalability problems to provide uplink connectivity to massive numbers of connected things. To characterize the scalability of cellular uplink in the context of IoT networks, this paper develops a traffic-aware spatiotemporal mathematical model for IoT devices supported by cellular uplink connectivity. The developed model is based on stochastic geometry and queueing theory to account for the traffic requirement per IoT device, the different transmission strategies, and the mutual interference between the IoT devices. To this end, the developed model is utilized to characterize the extent to which cellular networks can accommodate IoT traffic as well as to assess and compare three different transmission strategies that incorporate a combination of transmission persistency, backoff, and power-ramping. The analysis and the results clearly illustrate the scalability problem imposed by IoT on cellular network and offer insights into effective scenarios for each transmission strategy.

  8. Tractable Stochastic Geometry Model for IoT Access in LTE Networks

    KAUST Repository

    Gharbieh, Mohammad; Elsawy, Hesham; Bader, Ahmed; Alouini, Mohamed-Slim

    2017-01-01

    The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request represents a major bottleneck to support IoT via LTE cellular networks. Accordingly, this paper develops a mathematical framework to model and study the random access channel (RACH) scalability to accommodate IoT traffic. The developed model is based on stochastic geometry and discrete time Markov chains (DTMC) to account for different access strategies and possible sources of inter-cell and intra-cell interferences. To this end, the developed model is utilized to assess and compare three different access strategies, which incorporate a combination of transmission persistency, back-off, and power ramping. The analysis and the results showcased herewith clearly illustrate the vulnerability of the random access procedure as the IoT intensity grows. Finally, the paper offers insights into effective scenarios for each transmission strategy in terms of IoT intensity and RACH detection thresholds.

  9. IoT’s Tiny Steps towards 5G: Telco’s Perspective

    Directory of Open Access Journals (Sweden)

    Enida Cero

    2017-10-01

    Full Text Available The numerous and diverse applications of the Internet of Things (IoT have the potential to change all areas of daily life of individuals, businesses, and society as a whole. The vision of a pervasive IoT spans a wide range of application domains and addresses the enabling technologies needed to meet the performance requirements of various IoT applications. In order to accomplish this vision, this paper aims to provide an analysis of literature in order to propose a new classification of IoT applications, specify and prioritize performance requirements of such IoT application classes, and give an insight into state-of-the-art technologies used to meet these requirements, all from telco’s perspective. A deep and comprehensive understanding of the scope and classification of IoT applications is an essential precondition for determining their performance requirements with the overall goal of defining the enabling technologies towards fifth generation (5G networks, while avoiding over-specification and high costs. Given the fact that this paper presents an overview of current research for the given topic, it also targets the research community and other stakeholders interested in this contemporary and attractive field for the purpose of recognizing research gaps and recommending new research directions.

  10. Tractable Stochastic Geometry Model for IoT Access in LTE Networks

    KAUST Repository

    Gharbieh, Mohammad

    2017-02-07

    The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request represents a major bottleneck to support IoT via LTE cellular networks. Accordingly, this paper develops a mathematical framework to model and study the random access channel (RACH) scalability to accommodate IoT traffic. The developed model is based on stochastic geometry and discrete time Markov chains (DTMC) to account for different access strategies and possible sources of inter-cell and intra-cell interferences. To this end, the developed model is utilized to assess and compare three different access strategies, which incorporate a combination of transmission persistency, back-off, and power ramping. The analysis and the results showcased herewith clearly illustrate the vulnerability of the random access procedure as the IoT intensity grows. Finally, the paper offers insights into effective scenarios for each transmission strategy in terms of IoT intensity and RACH detection thresholds.

  11. Research on offense and defense technology for iOS kernel security mechanism

    Science.gov (United States)

    Chu, Sijun; Wu, Hao

    2018-04-01

    iOS is a strong and widely used mobile device system. It's annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.

  12. The Io Volcano Observer (IVO) for NASA Discovery 2015

    Science.gov (United States)

    McEwen, Alfred S.; Turtle, Elizabeth P.; Thomas, Nicolas

    2015-04-01

    IVO was first proposed as a NASA Discovery mission in 2010, powered by the Advanced Sterling Radioisotope Generators (ASRGs) to provide a compact spacecraft that points and settles quickly. The 2015 IVO uses advanced lightweight solar arrays and a 1-dimensional pivot to achieve similar observing flexibility during a set of fast (~18 km/s) flybys of Io. The John Hopkins University Applied Physics Lab (APL) leads mission implementation, with heritage from MESSENGER, New Horizons, and the Van Allen Probes. All science objectives from the Io Observer New Frontiers concept recommended in the 2011 Decadal Survey are addressed by IVO. There are 5 instruments plus gravity science: Narrow- and wide-angle cameras (NAC and WAC), Dual fluxgate magnetometers (DMAG), a thermal mapper (TMAP, from DLR), and particle environment package for Io (PEPI) consisting of an ion and neutral mass spectrometer (INMS, from UBE) and a plasma ion analyzer (PIA, from IRF). A student collaboration hotspot mapper (HOTMAP) is an option. The NAC and TMAP are on a ± 90° pivot for off-nadir targeting during encounters and for distant monitoring. The DMAG sensors are on the end and middle of 3.8-m boom and collect data continuously. WAC and HOTMAP are mounted on the S/C nadir deck, and observe during ±20 minutes of each Io closest approach, except orbits I0 and I2. PEPI is mounted on the S/C structure with the INMS field of view in the ram direction when the S/C nadir deck points at Io, and the PIA and has a large (hemispheric) field of view that will often include the upstream direction. Gravity science requires pointing the high-gain antenna at Earth during the I0 and I2 encounters. IVO launches in 2021 and arrives at Jupiter in early 2026. A close Io flyby (I0) ~1.5 hrs. after Jupiter orbit insertion lowers the orbit period, followed by 8 additional encounters achieving the suite of science objectives. The highly elliptical orbit with perijove near Io is inclined >40° to Jupiter's orbital plane

  13. Sensor-Based Optimization Model for Air Quality Improvement in Home IoT

    Directory of Open Access Journals (Sweden)

    Jonghyuk Kim

    2018-03-01

    Full Text Available We introduce current home Internet of Things (IoT technology and present research on its various forms and applications in real life. In addition, we describe IoT marketing strategies as well as specific modeling techniques for improving air quality, a key home IoT service. To this end, we summarize the latest research on sensor-based home IoT, studies on indoor air quality, and technical studies on random data generation. In addition, we develop an air quality improvement model that can be readily applied to the market by acquiring initial analytical data and building infrastructures using spectrum/density analysis and the natural cubic spline method. Accordingly, we generate related data based on user behavioral values. We integrate the logic into the existing home IoT system to enable users to easily access the system through the Web or mobile applications. We expect that the present introduction of a practical marketing application method will contribute to enhancing the expansion of the home IoT market.

  14. Optimizing mission critical data dissemination in massive IoT networks

    KAUST Repository

    Farooq, Muhammad Junaid; Elsawy, Hesham; Zhu, Quanyan; Alouini, Mohamed-Slim

    2017-01-01

    Mission critical data dissemination in massive Internet of things (IoT) networks imposes constraints on the message transfer delay between devices. Due to low power and communication range of IoT devices, data is foreseen to be relayed over multiple

  15. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations.

    Science.gov (United States)

    Nieto, Ana; Rios, Ruben; Lopez, Javier

    2018-02-07

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases.

  16. Cassini-VIMS at Jupiter: Solar occultation measurements using Io

    Science.gov (United States)

    Formisano, V.; D'Aversa, E.; Bellucci, G.; Baines, K.H.; Bibring, J.-P.; Brown, R.H.; Buratti, B.J.; Capaccioni, F.; Cerroni, P.; Clark, R.N.; Coradini, A.; Cruikshank, D.P.; Drossart, P.; Jaumann, R.; Langevin, Y.; Matson, D.L.; McCord, T.B.; Mennella, V.; Nelson, R.M.; Nicholson, P.D.; Sicardy, B.; Sotin, Christophe; Chamberlain, M.C.; Hansen, G.; Hibbits, K.; Showalter, M.; Filacchione, G.

    2003-01-01

    We report unusual and somewhat unexpected observations of the jovian satellite Io, showing strong methane absorption bands. These observations were made by the Cassini VIMS experiment during the Jupiter flyby of December/January 2000/2001. The explanation is straightforward: Entering or exiting from Jupiter's shadow during an eclipse, Io is illuminated by solar light which has transited the atmosphere of Jupiter. This light, therefore becomes imprinted with the spectral signature of Jupiter's upper atmosphere, which includes strong atmospheric methane absorption bands. Intercepting solar light refracted by the jovian atmosphere, Io essentially becomes a "miffor" for solar occultation events of Jupiter. The thickness of the layer where refracted solar light is observed is so large (more than 3000 km at Io's orbit), that we can foresee a nearly continuous multi-year period of similar events at Saturn, utilizing the large and bright ring system. During Cassini's 4-year nominal mission, this probing tecnique should reveal information of Saturn's atmosphere over a large range of southern latitudes and times. ?? 2003 Elsevier Inc. All rights reserved.

  17. Evidence of a global magma ocean in Io's interior.

    Science.gov (United States)

    Khurana, Krishan K; Jia, Xianzhe; Kivelson, Margaret G; Nimmo, Francis; Schubert, Gerald; Russell, Christopher T

    2011-06-03

    Extensive volcanism and high-temperature lavas hint at a global magma reservoir in Io, but no direct evidence has been available. We exploited Jupiter's rotating magnetic field as a sounding signal and show that the magnetometer data collected by the Galileo spacecraft near Io provide evidence of electromagnetic induction from a global conducting layer. We demonstrate that a completely solid mantle provides insufficient response to explain the magnetometer observations, but a global subsurface magma layer with a thickness of over 50 kilometers and a rock melt fraction of 20% or more is fully consistent with the observations. We also place a stronger upper limit of about 110 nanoteslas (surface equatorial field) on the dynamo dipolar field generated inside Io.

  18. BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs

    OpenAIRE

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-01-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide smart services with or without human intervention. While leveraging the large scale IoT based applications like Smart Gird or Smart Cities, IoTs also incur more concerns on privacy and security. Among the top security challenges that IoTs face, access authorization is critical in resource sharing and information protection. One of the weaknesses in today's access control (AC) is ...

  19. Io's UV-V Eclipse Emission: Implications for Pele-type Plumes

    Science.gov (United States)

    Moore, C. H.; Goldstein, D. B.; Varghese, P. L.; Trafton, L. M.

    2010-03-01

    Simulations of Io's NUV-V emission in eclipse show that S2-rich giant plumes' S2 concentrations and activity levels effect the absolute brightness and the east/west intensity ratio across Io allowing for plume activity to be determined from observed spectra.

  20. Proposed Embedded Security Framework for Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Babar, Sachin D.; Stango, Antonietta; Prasad, Neeli R.

    2011-01-01

    IoT is going to be an established part of life by extending the communication and networking anytime, anywhere. Security requirements for IoT will certainly underline the importance of properly formulated, implemented, and enforced security policies throughout their life-cycle. This paper gives...

  1. IoT-Based Smart Garbage System for Efficient Food Waste Management

    Directory of Open Access Journals (Sweden)

    Insung Hong

    2014-01-01

    Full Text Available Owing to a paradigm shift toward Internet of Things (IoT, researches into IoT services have been conducted in a wide range of fields. As a major application field of IoT, waste management has become one such issue. The absence of efficient waste management has caused serious environmental problems and cost issues. Therefore, in this paper, an IoT-based smart garbage system (SGS is proposed to reduce the amount of food waste. In an SGS, battery-based smart garbage bins (SGBs exchange information with each other using wireless mesh networks, and a router and server collect and analyze the information for service provisioning. Furthermore, the SGS includes various IoT techniques considering user convenience and increases the battery lifetime through two types of energy-efficient operations of the SGBs: stand-alone operation and cooperation-based operation. The proposed SGS had been operated as a pilot project in Gangnam district, Seoul, Republic of Korea, for a one-year period. The experiment showed that the average amount of food waste could be reduced by 33%.

  2. IoT-based smart garbage system for efficient food waste management.

    Science.gov (United States)

    Hong, Insung; Park, Sunghoi; Lee, Beomseok; Lee, Jaekeun; Jeong, Daebeom; Park, Sehyun

    2014-01-01

    Owing to a paradigm shift toward Internet of Things (IoT), researches into IoT services have been conducted in a wide range of fields. As a major application field of IoT, waste management has become one such issue. The absence of efficient waste management has caused serious environmental problems and cost issues. Therefore, in this paper, an IoT-based smart garbage system (SGS) is proposed to reduce the amount of food waste. In an SGS, battery-based smart garbage bins (SGBs) exchange information with each other using wireless mesh networks, and a router and server collect and analyze the information for service provisioning. Furthermore, the SGS includes various IoT techniques considering user convenience and increases the battery lifetime through two types of energy-efficient operations of the SGBs: stand-alone operation and cooperation-based operation. The proposed SGS had been operated as a pilot project in Gangnam district, Seoul, Republic of Korea, for a one-year period. The experiment showed that the average amount of food waste could be reduced by 33%.

  3. Understanding I/O workload characteristics of a Peta-scale storage system

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Youngjae [ORNL; Gunasekaran, Raghul [ORNL

    2015-01-01

    Understanding workload characteristics is critical for optimizing and improving the performance of current systems and software, and architecting new storage systems based on observed workload patterns. In this paper, we characterize the I/O workloads of scientific applications of one of the world s fastest high performance computing (HPC) storage cluster, Spider, at the Oak Ridge Leadership Computing Facility (OLCF). OLCF flagship petascale simulation platform, Titan, and other large HPC clusters, in total over 250 thousands compute cores, depend on Spider for their I/O needs. We characterize the system utilization, the demands of reads and writes, idle time, storage space utilization, and the distribution of read requests to write requests for the Peta-scale Storage Systems. From this study, we develop synthesized workloads, and we show that the read and write I/O bandwidth usage as well as the inter-arrival time of requests can be modeled as a Pareto distribution. We also study the I/O load imbalance problems using I/O performance data collected from the Spider storage system.

  4. IoT-Based Smart Garbage System for Efficient Food Waste Management

    Science.gov (United States)

    Lee, Jaekeun

    2014-01-01

    Owing to a paradigm shift toward Internet of Things (IoT), researches into IoT services have been conducted in a wide range of fields. As a major application field of IoT, waste management has become one such issue. The absence of efficient waste management has caused serious environmental problems and cost issues. Therefore, in this paper, an IoT-based smart garbage system (SGS) is proposed to reduce the amount of food waste. In an SGS, battery-based smart garbage bins (SGBs) exchange information with each other using wireless mesh networks, and a router and server collect and analyze the information for service provisioning. Furthermore, the SGS includes various IoT techniques considering user convenience and increases the battery lifetime through two types of energy-efficient operations of the SGBs: stand-alone operation and cooperation-based operation. The proposed SGS had been operated as a pilot project in Gangnam district, Seoul, Republic of Korea, for a one-year period. The experiment showed that the average amount of food waste could be reduced by 33%. PMID:25258730

  5. Towards IoT platforms’ integration : Semantic Translations between W3C SSN and ETSI SAREF

    NARCIS (Netherlands)

    Moreira, João Luiz; Daniele, L.M.; Ferreira Pires, Luis; van Sinderen, Marten J.; Wasielewska, Katarzyna; Szmeja, Pawel; Pawlowski, Wieslaw; Ganzha, Maria; Paprzycki, Marcin

    2017-01-01

    Several IoT ontologies have been developed lately to improve the semantic interoperability of IoT solutions. The most popular of these ontologies, the W3C Semantic Sensor Network (SSN), is considered an ontological foundation for diverse IoT initiatives, particularly OpenIoT. With characteristics

  6. Realizing IoT service's policy privacy over publish/subscribe-based middleware.

    Science.gov (United States)

    Duan, Li; Zhang, Yang; Chen, Shiping; Wang, Shiyao; Cheng, Bo; Chen, Junliang

    2016-01-01

    The publish/subscribe paradigm makes IoT service collaborations more scalable and flexible, due to the space, time and control decoupling of event producers and consumers. Thus, the paradigm can be used to establish large-scale IoT service communication infrastructures such as Supervisory Control and Data Acquisition systems. However, preserving IoT service's policy privacy is difficult in this paradigm, because a classical publisher has little control of its own event after being published; and a subscriber has to accept all the events from the subscribed event type with no choice. Few existing publish/subscribe middleware have built-in mechanisms to address the above issues. In this paper, we present a novel access control framework, which is capable of preserving IoT service's policy privacy. In particular, we adopt the publish/subscribe paradigm as the IoT service communication infrastructure to facilitate the protection of IoT services policy privacy. The key idea in our policy-privacy solution is using a two-layer cooperating method to match bi-directional privacy control requirements: (a) data layer for protecting IoT events; and (b) application layer for preserving the privacy of service policy. Furthermore, the anonymous-set-based principle is adopted to realize the functionalities of the framework, including policy embedding and policy encoding as well as policy matching. Our security analysis shows that the policy privacy framework is Chosen-Plaintext Attack secure. We extend the open source Apache ActiveMQ broker by building into a policy-based authorization mechanism to enforce the privacy policy. The performance evaluation results indicate that our approach is scalable with reasonable overheads.

  7. A Selective Group Authentication Scheme for IoT-Based Medical Information System.

    Science.gov (United States)

    Park, YoHan; Park, YoungHo

    2017-04-01

    The technology of IoT combined with medical systems is expected to support advanced medical services. However, unsolved security problems, such as misuse of medical devices, illegal access to the medical server and so on, make IoT-based medical systems not be applied widely. In addition, users have a high burden of computation to access Things for the explosive growth of IoT devices. Because medical information is critical and important, but users have a restricted computing power, IoT-based medical systems are required to provide secure and efficient authentication for users. In this paper, we propose a selective group authentication scheme using Shamir's threshold technique. The property of selectivity gives the right of choice to users to form a group which consists of things users select and access. And users can get an access authority for those Things at a time. Thus, our scheme provides an efficient user authentication for multiple Things and conditional access authority for safe IoT-based medical information system. To the best of our knowledge, our proposed scheme is the first in which selectivity is combined with group authentication in IoT environments.

  8. Development of eStudent iOS mobile application

    Directory of Open Access Journals (Sweden)

    Mladjan Antic

    2013-01-01

    Full Text Available Abstract— iOS is the Apple mobile operating system, for Apple mobile devices. Initially developed for iPhone, and later for iPod Touch, iPad, AppleTV. The Metropolitan University has a Web application titled eStudent, which enables students by Web to get information about their marks for all subjects, their financies, exam scheduling, professors and assistents, and send exam registration and feedback about teaching, etc. This paper explains the development of the mobile application eStudent on the iOS platform. This application enables students whenever they want, by using their iPhone mobile phone, to get access to the information from the eStudent Web application, and to present it on their iPhone User Interface (UI. This paper explains in details software requirements analysis, system architecture, system modelling, and UI of the eStudent iOS mobile application.

  9. An IoT-enabled supply chain integration framework : empirical case studies

    OpenAIRE

    Wakenshaw, Susan Y. L.; Maple, Carsten; Chen, Daqiang; Micillo, Rosario

    2017-01-01

    Supply chain integration is crucial for supply chain performance, particularly in industry 4.0. With the proliferation of Internet of Things (IoT) and the use of cyber-physical systems, supply chain integration needs to be greatly enhanced. In this paper, we explore supply integration (process and application) in the supply chain network enabled by IoT. Using the case study method, we investigate technical and business applications of IoT in supply chains and how it can interface with the pro...

  10. A neural network and IoT-based scheme for performance assessment in Internet of Robotic Things

    OpenAIRE

    Razafimandimby , Cristanel; Loscri , Valeria; Vegni , Anna Maria

    2016-01-01

    International audience; Internet of Robotic Things (IoRT) is a new concept introduced for the first time by ABI Research. Unlike the Internet of Things (IoT), IoRT provides an active sensorization and is considered as the new evolution of IoT. This new concept will bring new opportunities and challenges, while providing new business ideas for IoT and robotics’ entrepreneurs. In this paper, we will focus particularly on two issues: (i) connectivity maintenance among multiple IoRT robots, and (...

  11. Uncovering the Images and Meanings of International Organizations (IOs) in Higher Education Research

    Science.gov (United States)

    Shahjahan, Riyad A.; Madden, Meggan

    2015-01-01

    Employing Stuart Hall's concept of representation, we examine how international organizations (IOs) are presented in the higher education literature. This paper examines how IOs, such as the World Bank, OECD, and UNESCO, are conceptualized and represented by higher education researchers. We focus on three main representations of IOs in the higher…

  12. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    Directory of Open Access Journals (Sweden)

    Ana Nieto

    2018-02-01

    Full Text Available IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases.

  13. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    Science.gov (United States)

    Lopez, Javier

    2018-01-01

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases. PMID:29414864

  14. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.

    Science.gov (United States)

    Ali, Bako; Awad, Ali Ismail

    2018-03-08

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.

  15. In-Network Data Processing in Software-Defined IoT with a Programmable Data Plane

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2018-01-01

    Full Text Available Making an SDN data plane flexible enough to satisfy the various requirements of heterogeneous IoT applications is very desirable in terms of software-defined IoT (SD-IoT networking. Network devices with a programmable data plane provide an ability to dynamically add new packet- and data-processing procedures to IoT applications. The previously proposed solutions for the addition of the programmability feature to the SDN data plane provide extensibility for the packet-forwarding operations of new protocols, but IoT applications need a more flexible programmability for in-network data-processing operations (e.g., the sensing-data aggregation from thousands of sensor nodes. Moreover, some IoT models such as OMG DDS, oneM2M, and Eclipse SCADA use the publish-subscribe model that is difficult to represent using the operations of the existing message-centric data-plane models. We introduce a new in-network data-processing scheme for the SD-IoT data plane that defines an event-driven data-processing model that can express a variety of in-network data-processing cases in the SD-IoT environment. Also, the proposed model comprises a language for the programming of the data-processing procedures, while a flexible data-plane structure that can install and execute the programs at runtime is additionally presented. We demonstrate the flexibility of the proposed scheme by using sample programs in a number of example SD-IoT cases.

  16. IEEE 802.11ah: A Technology to Face the IoT Challenge.

    Science.gov (United States)

    Baños-Gonzalez, Victor; Afaqui, M Shahwaiz; Lopez-Aguilera, Elena; Garcia-Villegas, Eduard

    2016-11-22

    Since the conception of the Internet of things (IoT), a large number of promising applications and technologies have been developed, which will change different aspects in our daily life. This paper explores the key characteristics of the forthcoming IEEE 802.11ah specification. This future IEEE 802.11 standard aims to amend the IEEE 802.11 legacy specification to support IoT requirements. We present a thorough evaluation of the foregoing amendment in comparison to the most notable IEEE 802.11 standards. In addition, we expose the capabilities of future IEEE 802.11ah in supporting different IoT applications. Also, we provide a brief overview of the technology contenders that are competing to cover the IoT communications framework. Numerical results are presented showing how the future IEEE 802.11ah specification offers the features required by IoT communications, thus putting forward IEEE 802.11ah as a technology to cater the needs of the Internet of Things paradigm.

  17. IoT: Tecnologías, usos, tendencias y desarrollo futuro

    OpenAIRE

    Bliznakoff del Valle, David J.

    2015-01-01

    Trabajo de investigación sobre el estado del IoT en el año 2014, previsiones de crecimiento y tecnologías futuras. Treball de recerca sobre l'estat del IoT l'any 2014, previsions de creixement i tecnologies futures. Master thesis for the Telecommunication Technologies program.

  18. Proposals For The Secure Use Of IoT Technology In The Car Industry - Proposals on how to use IoT technology in the car industry but avoid its negative security consequences

    OpenAIRE

    Ramquist, Robin

    2016-01-01

    The Internet Of Things (IoT) is a hotter topic than ever. As devices and our daily life get connected to the IoT, we also put ourselves at risk. IoT security issues get reported on a regular basis, and experts are concerned that we will lose control of the situation. In this thesis, the IoT usage in the car industry is investigated and analyzed, and proposals for security issue mitigations are presented based on existing research. To do this work, existing research is being looked at and inte...

  19. IoT Service Clustering for Dynamic Service Matchmaking.

    Science.gov (United States)

    Zhao, Shuai; Yu, Le; Cheng, Bo; Chen, Junliang

    2017-07-27

    As the adoption of service-oriented paradigms in the IoT (Internet of Things) environment, real-world devices will open their capabilities through service interfaces, which enable other functional entities to interact with them. In an IoT application, it is indispensable to find suitable services for satisfying users' requirements or replacing the unavailable services. However, from the perspective of performance, it is inappropriate to find desired services from the service repository online directly. Instead, clustering services offline according to their similarity and matchmaking or discovering service online in limited clusters is necessary. This paper proposes a multidimensional model-based approach to measure the similarity between IoT services. Then, density-peaks-based clustering is employed to gather similar services together according to the result of similarity measurement. Based on the service clustering, the algorithms of dynamic service matchmaking, discovery, and replacement will be performed efficiently. Evaluating experiments are conducted to validate the performance of proposed approaches, and the results are promising.

  20. First Mile Challenges for Large-Scale IoT

    KAUST Repository

    Bader, Ahmed

    2017-03-16

    The Internet of Things is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the sheer scale of spatial traffic intensity that must be accommodated, primarily in the uplink direction. To that end, cellular networks are indeed a strong first mile candidate to accommodate the data tsunami to be generated by the IoT. However, IoT devices are required in the cellular paradigm to undergo random access procedures as a precursor to resource allocation. Such procedures impose a major bottleneck that hinders cellular networks\\' ability to support large-scale IoT. In this article, we shed light on the random access dilemma and present a case study based on experimental data as well as system-level simulations. Accordingly, a case is built for the latent need to revisit random access procedures. A call for action is motivated by listing a few potential remedies and recommendations.

  1. I/O routing in a multidimensional torus network

    Science.gov (United States)

    Chen, Dong; Eisley, Noel A.; Heidelberger, Philip

    2018-04-24

    A method, system and computer program product are disclosed for routing data packet in a computing system comprising a multidimensional torus compute node network including a multitude of compute nodes, and an I/O node network including a plurality of I/O nodes. In one embodiment, the method comprises assigning to each of the data packets a destination address identifying one of the compute nodes; providing each of the data packets with a toio value; routing the data packets through the compute node network to the destination addresses of the data packets; and when each of the data packets reaches the destination address assigned to said each data packet, routing said each data packet to one of the I/O nodes if the toio value of said each data packet is a specified value. In one embodiment, each of the data packets is also provided with an ioreturn value used to route the data packets through the compute node network.

  2. Mobile Crowd Sensing for Traffic Prediction in Internet of Vehicles

    OpenAIRE

    Wan, Jiafu; Liu, Jianqi; Shao, Zehui; Vasilakos, Athanasios V.; Imran, Muhammad; Zhou, Keliang

    2016-01-01

    The advances in wireless communication techniques, mobile cloud computing, automotive and intelligent terminal technology are driving the evolution of vehicle ad hoc networks into the Internet of Vehicles (IoV) paradigm. This leads to a change in the vehicle routing problem from a calculation based on static data towards real-time traffic prediction. In this paper, we first address the taxonomy of cloud-assisted IoV from the viewpoint of the service relationship between cloud computing and Io...

  3. A federated capability-based access control mechanism for internet of things (IoTs)

    Science.gov (United States)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  4. Minimizing End-to-End Interference in I/O Stacks Spanning Shared Multi-Level Buffer Caches

    Science.gov (United States)

    Patrick, Christina M.

    2011-01-01

    This thesis presents an end-to-end interference minimizing uniquely designed high performance I/O stack that spans multi-level shared buffer cache hierarchies accessing shared I/O servers to deliver a seamless high performance I/O stack. In this thesis, I show that I can build a superior I/O stack which minimizes the inter-application interference…

  5. Discovery of gaseous S2 in Io's Pele plume.

    Science.gov (United States)

    Spencer, J R; Jessup, K L; McGrath, M A; Ballester, G E; Yelle, R

    2000-05-19

    Spectroscopy of Io's Pele plume against Jupiter by the Hubble Space Telescope in October 1999 revealed absorption due to S2 gas, with a column density of 1.0 +/- 0.2 x 10(16) per square centimeter, and probably also SO(2) gas with a column density of 7 +/- 3 x 10(16) per square centimeter. This SO2/S2 ratio (3 to 12) is expected from equilibration with silicate magmas near the quartz-fayalite-magnetite or wüstite-magnetite buffers. Condensed S3 and S4, probable coloring agents in Pele's red plume deposits, may form by polymerization of the S2, which is unstable to ultraviolet photolysis. Diffuse red deposits near other Io volcanoes suggest that venting and polymerization of S2 gas is a widespread feature of Io volcanism.

  6. Astronauts and IoT: Toward True Human-Autonomy Teaming

    Science.gov (United States)

    Vera, Alonso

    2016-01-01

    Advances in the area of Internet of Things (IoT) or Cyber-Physical Systems will have a significant impact on many areas of human activity and commercial/technological development. One application of importance to NASA is the need to make crews on deep space missions more independent from earth in both their routine activities and handling of unexpected events. IoT will allow increasingly intelligent systems to be aware of what humans are doing, what tools/resources they are using, and what help they might need in terms of procedure execution in tasks such as assembly, maintenance, repair, and perhaps even in more complex activities like medical interventions. This talk focuses on the convergence of research and technologies that will be needed to effect such intelligent systems based on IoT.

  7. AN INTERACTIVE WEB-BASED ANALYSIS FRAMEWORK FOR REMOTE SENSING CLOUD COMPUTING

    Directory of Open Access Journals (Sweden)

    X. Z. Wang

    2015-07-01

    Full Text Available Spatiotemporal data, especially remote sensing data, are widely used in ecological, geographical, agriculture, and military research and applications. With the development of remote sensing technology, more and more remote sensing data are accumulated and stored in the cloud. An effective way for cloud users to access and analyse these massive spatiotemporal data in the web clients becomes an urgent issue. In this paper, we proposed a new scalable, interactive and web-based cloud computing solution for massive remote sensing data analysis. We build a spatiotemporal analysis platform to provide the end-user with a safe and convenient way to access massive remote sensing data stored in the cloud. The lightweight cloud storage system used to store public data and users’ private data is constructed based on open source distributed file system. In it, massive remote sensing data are stored as public data, while the intermediate and input data are stored as private data. The elastic, scalable, and flexible cloud computing environment is built using Docker, which is a technology of open-source lightweight cloud computing container in the Linux operating system. In the Docker container, open-source software such as IPython, NumPy, GDAL, and Grass GIS etc., are deployed. Users can write scripts in the IPython Notebook web page through the web browser to process data, and the scripts will be submitted to IPython kernel to be executed. By comparing the performance of remote sensing data analysis tasks executed in Docker container, KVM virtual machines and physical machines respectively, we can conclude that the cloud computing environment built by Docker makes the greatest use of the host system resources, and can handle more concurrent spatial-temporal computing tasks. Docker technology provides resource isolation mechanism in aspects of IO, CPU, and memory etc., which offers security guarantee when processing remote sensing data in the IPython Notebook

  8. An Interactive Web-Based Analysis Framework for Remote Sensing Cloud Computing

    Science.gov (United States)

    Wang, X. Z.; Zhang, H. M.; Zhao, J. H.; Lin, Q. H.; Zhou, Y. C.; Li, J. H.

    2015-07-01

    Spatiotemporal data, especially remote sensing data, are widely used in ecological, geographical, agriculture, and military research and applications. With the development of remote sensing technology, more and more remote sensing data are accumulated and stored in the cloud. An effective way for cloud users to access and analyse these massive spatiotemporal data in the web clients becomes an urgent issue. In this paper, we proposed a new scalable, interactive and web-based cloud computing solution for massive remote sensing data analysis. We build a spatiotemporal analysis platform to provide the end-user with a safe and convenient way to access massive remote sensing data stored in the cloud. The lightweight cloud storage system used to store public data and users' private data is constructed based on open source distributed file system. In it, massive remote sensing data are stored as public data, while the intermediate and input data are stored as private data. The elastic, scalable, and flexible cloud computing environment is built using Docker, which is a technology of open-source lightweight cloud computing container in the Linux operating system. In the Docker container, open-source software such as IPython, NumPy, GDAL, and Grass GIS etc., are deployed. Users can write scripts in the IPython Notebook web page through the web browser to process data, and the scripts will be submitted to IPython kernel to be executed. By comparing the performance of remote sensing data analysis tasks executed in Docker container, KVM virtual machines and physical machines respectively, we can conclude that the cloud computing environment built by Docker makes the greatest use of the host system resources, and can handle more concurrent spatial-temporal computing tasks. Docker technology provides resource isolation mechanism in aspects of IO, CPU, and memory etc., which offers security guarantee when processing remote sensing data in the IPython Notebook. Users can write

  9. DMIA: A MALWARE DETECTION SYSTEM ON IOS PLATFORM

    OpenAIRE

    Hongliang Liang; Yilun Xie; Yan Song

    2016-01-01

    iOS is a popular operating system on Apple’s smartphones, and recent security events have shown the possibility of stealing the users' privacy in iOS without being detected, such as XcodeGhost. So, we present the design and implementation of a malware vetting system, called DMIA. DMIA first collects runtime information of an app and then distinguish between malicious and normal apps by a novel machine learning model. We evaluated DMIA with 1000 apps from the official App Store. The results of...

  10. Two Word CAMAC I/O module

    International Nuclear Information System (INIS)

    Barker, L.L.

    1981-05-01

    This note describes the 2 Word I/O subsystem and details its operating characteristics. SLAC drawings in the 926-306 series support this device and should be referenced for construction and connection details

  11. Perception Management: A Core IO Capability

    National Research Council Canada - National Science Library

    Zaman, Khyber

    2007-01-01

    This thesis postulates that in today's media environment, with adversaries skillfully using propaganda to skirt nations' resolve, Perception Management is key to military success and should be an Information Operations (IO) Core Capability...

  12. Experience in using commercial clouds in CMS

    Energy Technology Data Exchange (ETDEWEB)

    Bauerdick, L. [Fermilab; Bockelman, B. [Nebraska U.; Dykstra, D. [Fermilab; Fuess, S. [Fermilab; Garzoglio, G. [Fermilab; Girone, M. [CERN; Gutsche, O. [Fermilab; Holzman, B. [Fermilab; Hugnagel, D. [Fermilab; Kim, H. [Fermilab; Kennedy, R. [Fermilab; Mason, D. [Fermilab; Spentzouris, P. [Fermilab; Timm, S. [Fermilab; Tiradani, A. [Fermilab; Vaandering, E. [Fermilab

    2017-10-03

    Historically high energy physics computing has been performed on large purposebuilt computing systems. In the beginning there were single site computing facilities, which evolved into the Worldwide LHC Computing Grid (WLCG) used today. The vast majority of the WLCG resources are used for LHC computing and the resources are scheduled to be continuously used throughout the year. In the last several years there has been an explosion in capacity and capability of commercial and academic computing clouds. Cloud resources are highly virtualized and intended to be able to be flexibly deployed for a variety of computing tasks. There is a growing interest amongst the cloud providers to demonstrate the capability to perform large scale scientific computing. In this presentation we will discuss results from the CMS experiment using the Fermilab HEPCloud Facility, which utilized both local Fermilab resources and Amazon Web Services (AWS). The goal was to work with AWS through a matching grant to demonstrate a sustained scale approximately equal to half of the worldwide processing resources available to CMS. We will discuss the planning and technical challenges involved in organizing the most IO intensive CMS workflows on a large-scale set of virtualized resource provisioned by the Fermilab HEPCloud. We will describe the data handling and data management challenges. Also, we will discuss the economic issues and cost and operational efficiency comparison to our dedicated resources. At the end we will consider the changes in the working model of HEP computing in a domain with the availability of large scale resources scheduled at peak times.

  13. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

    Directory of Open Access Journals (Sweden)

    Bako Ali

    2018-03-01

    Full Text Available The Internet of Things (IoT is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.

  14. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

    Science.gov (United States)

    2018-01-01

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes. PMID:29518023

  15. High-Throughput and Low-Latency Network Communication with NetIO

    Science.gov (United States)

    Schumacher, Jörn; Plessl, Christian; Vandelli, Wainer

    2017-10-01

    HPC network technologies like Infiniband, TrueScale or OmniPath provide low- latency and high-throughput communication between hosts, which makes them attractive options for data-acquisition systems in large-scale high-energy physics experiments. Like HPC networks, DAQ networks are local and include a well specified number of systems. Unfortunately traditional network communication APIs for HPC clusters like MPI or PGAS exclusively target the HPC community and are not suited well for DAQ applications. It is possible to build distributed DAQ applications using low-level system APIs like Infiniband Verbs, but it requires a non-negligible effort and expert knowledge. At the same time, message services like ZeroMQ have gained popularity in the HEP community. They make it possible to build distributed applications with a high-level approach and provide good performance. Unfortunately, their usage usually limits developers to TCP/IP- based networks. While it is possible to operate a TCP/IP stack on top of Infiniband and OmniPath, this approach may not be very efficient compared to a direct use of native APIs. NetIO is a simple, novel asynchronous message service that can operate on Ethernet, Infiniband and similar network fabrics. In this paper the design and implementation of NetIO is presented and described, and its use is evaluated in comparison to other approaches. NetIO supports different high-level programming models and typical workloads of HEP applications. The ATLAS FELIX project [1] successfully uses NetIO as its central communication platform. The architecture of NetIO is described in this paper, including the user-level API and the internal data-flow design. The paper includes a performance evaluation of NetIO including throughput and latency measurements. The performance is compared against the state-of-the- art ZeroMQ message service. Performance measurements are performed in a lab environment with Ethernet and FDR Infiniband networks.

  16. Service and multimedia data transmission in IoT networks using hybrid communication devices

    Directory of Open Access Journals (Sweden)

    Saveliev Anton

    2017-01-01

    Full Text Available Employment of various protocols and technologies in IoT networks leads to the lack of module unification and increase in incompatible technical solutions. Modern IoT networks are not designed for streaming audio/video data, so their application field is limited. Also, modern IoT networks should have connection areas for devices transferring data to the Internet, and consider hardware and software specific characteristics of these devices. We offer one-size-fits-all solution for organization of IoT network, using hybrid modules. These devices provide flexibility, scalability, energy efficiency and multi-use of network for the transfer of various types of data. This approach takes into account software and hardware features of the devices used for data transmission in IoT networks, which helps to automate connecting the modules chosen by user.

  17. Surface changes on Io during the Galileo mission

    Science.gov (United States)

    Geissler, P.; McEwen, A.; Phillips, C.; Keszthelyi, L.; Spencer, J.

    2004-01-01

    A careful survey of Galileo SSI global monitoring images revealed more than 80 apparent surface changes that took place on Io during the 5 year period of observation, ranging from giant plume deposits to subtle changes in the color or albedo of Patera surfaces. Explosive volcanic activity was discovered at four previously unrecognized centers: an unnamed patera to the south of Karei that produced a Pele-sized red ring, a patera to the west of Zal that produced a small circular bright deposit, a large orange ring detected near the north pole of Io, and a small bright ring near Io's south pole. Only a handful of Io's many active volcanoes produced large scale explosive eruptions, and several of these erupted repeatedly, leaving at least 83% of Io's surface unaltered throughout the Galileo mission. Most of the hot spots detected from SSI, NIMS and ground-based thermal observations caused no noticeable surface changes greater than 10 km in extent over the five year period. Surface changes were found at every location where active plumes were identified, including Acala which was never seen in sunlight and was only detected through auroral emissions during eclipse. Two types of plumes are distinguished on the basis of the size and color of their deposits, confirming post-Voyager suggestions by McEwen and Soderblom [Icarus 55 (1983) 191]. Smaller plumes produce near-circular rings typically 150-200 km in radius that are white or yellow in color unless contaminated with silicates, and frequently coat their surroundings with frosts of fine-grained SO2. The larger plumes are much less numerous, limited to a half dozen examples, and produce oval, orange or red, sulfur-rich rings with maximum radii in the north-south direction that are typically in the range from 500 to 550 km. Both types of plumes can be either episodic or quasi-continuous over a five year period. Repeated eruptions of the smaller SO2-rich plumes likely contribute significantly to Io's resurfacing rate

  18. Volcanic eruptions on Io: Heat flow, resurfacing, and lava composition

    Science.gov (United States)

    Blaney, Diana L.; Johnson, Torrence V.; Matson, Dennis L.; Veeder, Glenn J.

    1995-01-01

    We model an infrared outburst on Io as being due to a large, erupting lava flow which increased its area at a rate of 1.5 x 10(exp 5)/sq m and cooled from 1225 to 555 K over the 2.583-hr period of observation. The inferred effusion rate of 3 x 10(exp 5) cu m/sec for this eruption is very high, but is not unprece- dented on the Earth and is similar to the high eruption rates suggested for early lunar volcanism. Eruptions occur approxi- mately 6% of the time on Io. These eruptions provide ample resurfacing to explain Io's lack of impact craters. We suggest that the large total radiometric heat flow, 10(exp 14) W, and the size and temperature distribution of the thermal anomalies (McEwen et al. 1992; Veeder et al. 1994) can be accounted for by a series of silicate lava flows in various stages of cooling. We propose that the whole suite of Io's currently observed thermal anomalies was produced by multiple, high-eruptive-rate silicate flows within the past century.

  19. Exploiting Efficient Transpacking for One-Sided Communication and MPI-IO

    Science.gov (United States)

    Mir, Faisal Ghias; Träff, Jesper Larsson

    Based on a construction of socalled input-output datatypes that define a mapping between non-consecutive input and output buffers, we outline an efficient method for copying of structured data. We term this operation transpacking, and show how transpacking can be applied for the MPI implementation of one-sided communication and MPI-IO. For one-sided communication via shared-memory, we demonstrate the expected performance improvements by up to a factor of two. For individual MPI-IO, the time to read or write from file dominates the overall time, but even here efficient transpacking can in some scenarios reduce file I/O time considerably. The reported results have been achieved on a single NEC SX-8 vector node.

  20. Galileo SSI Observations of Io During Orbits C30 I33

    Science.gov (United States)

    Keszthelyi, L.; Turtle, E.; McEwen, A.; Simonelli, D.; Geissler, P.; Williams, D.; Milazzo, M.; Radebaugh, J.; Jaeger, W.; Klaasen, K. P.

    2002-01-01

    New Galileo SSI imaging of Io from orbits C30 I33 will be presented. The aging Galileo spacecraft continues to produce spectacular new results, including the tallest volcanic plume yet found on Io. Additional information is contained in the original extended abstract.

  1. A Resource Service Model in the Industrial IoT System Based on Transparent Computing.

    Science.gov (United States)

    Li, Weimin; Wang, Bin; Sheng, Jinfang; Dong, Ke; Li, Zitong; Hu, Yixiang

    2018-03-26

    The Internet of Things (IoT) has received a lot of attention, especially in industrial scenarios. One of the typical applications is the intelligent mine, which actually constructs the Six-Hedge underground systems with IoT platforms. Based on a case study of the Six Systems in the underground metal mine, this paper summarizes the main challenges of industrial IoT from the aspects of heterogeneity in devices and resources, security, reliability, deployment and maintenance costs. Then, a novel resource service model for the industrial IoT applications based on Transparent Computing (TC) is presented, which supports centralized management of all resources including operating system (OS), programs and data on the server-side for the IoT devices, thus offering an effective, reliable, secure and cross-OS IoT service and reducing the costs of IoT system deployment and maintenance. The model has five layers: sensing layer, aggregation layer, network layer, service and storage layer and interface and management layer. We also present a detailed analysis on the system architecture and key technologies of the model. Finally, the efficiency of the model is shown by an experiment prototype system.

  2. The Role of Physical Layer Security in IoT: A Novel Perspective

    Directory of Open Access Journals (Sweden)

    Tommaso Pecorella

    2016-08-01

    Full Text Available This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem. In a smart environment, each IoT device has limited resources and is often battery operated with limited capabilities (e.g., no keyboard. As a consequence, network security must be carefully analyzed in order to prevent security and privacy issues. In this paper, we will analyze the IoT threats, we will propose a security framework for the device initialization and we will show how physical layer security can effectively boost the security of IoT systems.

  3. Mobile Digital Recording: Adequacy of the iRig and iOS Device for Acoustic and Perceptual Analysis of Normal Voice.

    Science.gov (United States)

    Oliveira, Gisele; Fava, Gaetano; Baglione, Melody; Pimpinella, Michael

    2017-03-01

    To determine whether the iRig and iOS device recording system is comparable with a standard computer recording system for digital voice recording. Thirty-seven vocally healthy adults, between ages 20 and 62, with a mean age of 33.9 years, 13 males and 24 females, were recruited. Recordings were simultaneously digitalized in an iPad and iPhone using a unidirectional condenser microphone for smartphones/tablets (iRig Mic, IK Multimedia) and in a computer laptop (Dell-Inspiron) using a unidirectional condenser microphone (Samson-CL5) connected to a preamplifier with phantom power. Both microphones were lined up at an equal fixed distance from the subject's mouth. Speech tasks consisted of a sustained vowel "ah" at comfortable pitch/loudness, counting from 1 to 10, and a glissando "ah" from a low to a high note. The samples captured on the iOS devices were transferred via SoundCloud in WAV format, and analyzed using the Praat software. The acoustic parameters measured were mean, min, and max F0, SD F0, jitter local, jitter rap, jitter ppq5, jitter ddp, shimmer local, shimmer local-dB, shimmer apq3, shimmer apq5, shimmer apq11, shimmer dda, NHR, and HNR. There were no statistically significant differences for any parameter and speech task analyzed for both iOS devices as compared with the gold standard computer/preamp system (all P values > 0.050). In addition, there were no statistical differences in the perceptual identification of the recordings among devices (P device may provide reliable digital recording of normal voices. Copyright © 2017 The Voice Foundation. Published by Elsevier Inc. All rights reserved.

  4. Long Term Monitoring of the Io Plasma Torus During the Galileo Encounter

    Science.gov (United States)

    Brown, Michael E.

    2002-01-01

    In the fall of 1999, the Galileo spacecraft made four passes into the Io plasma torus, obtaining the best in situ measurements ever of the particle and field environment in this densest region of the Jovian magnetosphere. Supporting observations from the ground are vital for understanding the global and temporal context of the in situ observations. We conducted a three-month-long Io plasma torus monitoring campaign centered on the time of the Galileo plasma torus passes to support this aspect of the Galileo mission. The almost-daily plasma density and temperature measurements obtained from our campaign allow the much more sparse but also much more detailed Galileo data to be used to address the issues of the structure of the Io plasma torus, the stability mechanism of the Jovian magnetosphere, the transport of material from the source region near Io, and the nature and source of persistent longitudinal variations. Combining the ground-based monitoring data with the detailed in situ data offers the only possibility for answering some of the most fundamental questions about the nature of the Io plasma torus.

  5. Active Storage with Analytics Capabilities and I/O Runtime System for Petascale Systems

    Energy Technology Data Exchange (ETDEWEB)

    Choudhary, Alok [Northwestern Univ., Evanston, IL (United States)

    2015-03-18

    Computational scientists must understand results from experimental, observational and computational simulation generated data to gain insights and perform knowledge discovery. As systems approach the petascale range, problems that were unimaginable a few years ago are within reach. With the increasing volume and complexity of data produced by ultra-scale simulations and high-throughput experiments, understanding the science is largely hampered by the lack of comprehensive I/O, storage, acceleration of data manipulation, analysis, and mining tools. Scientists require techniques, tools and infrastructure to facilitate better understanding of their data, in particular the ability to effectively perform complex data analysis, statistical analysis and knowledge discovery. The goal of this work is to enable more effective analysis of scientific datasets through the integration of enhancements in the I/O stack, from active storage support at the file system layer to MPI-IO and high-level I/O library layers. We propose to provide software components to accelerate data analytics, mining, I/O, and knowledge discovery for large-scale scientific applications, thereby increasing productivity of both scientists and the systems. Our approaches include 1) design the interfaces in high-level I/O libraries, such as parallel netCDF, for applications to activate data mining operations at the lower I/O layers; 2) Enhance MPI-IO runtime systems to incorporate the functionality developed as a part of the runtime system design; 3) Develop parallel data mining programs as part of runtime library for server-side file system in PVFS file system; and 4) Prototype an active storage cluster, which will utilize multicore CPUs, GPUs, and FPGAs to carry out the data mining workload.

  6. Landform Degradation and Slope Processes on Io: The Galileo View

    Science.gov (United States)

    Moore, Jeffrey M.; Sullivan, Robert J.; Chuang, Frank C.; Head, James W., III; McEwen, Alfred S.; Milazzo, Moses P.; Nixon, Brian E.; Pappalardo, Robert T.; Schenk, Paul M.; Turtle, Elizabeth P.; hide

    2001-01-01

    The Galileo mission has revealed remarkable evidence of mass movement and landform degradation on Io. We recognize four major slope types observed on a number of intermediate resolution (250 m/pixel) images and several additional textures on very high resolution (10 m/pixel) images. Slopes and scarps on Io often show evidence of erosion, seen in the simplest form as alcove-carving slumps and slides at all scales. Many of the mass movement deposits on Io are probably mostly the consequence of block release and brittle slope failure. Sputtering plays no significant role. Sapping as envisioned by McCauley et al. remains viable. We speculate that alcove-lined canyons seen in one observation and lobed deposits seen along the bases of scarps in several locations may reflect the plastic deformation and 'glacial' flow of interstitial volatiles (e.g., SO2) heated by locally high geothermal energy to mobilize the volatile. The appearance of some slopes and near-slope surface textures seen in very high resolution images is consistent with erosion from sublimation-degradation. However, a suitable volatile (e.g., H2S) that can sublimate fast enough to alter Io's youthful surface has not been identified. Disaggregation from chemical decomposition of solid S2O and other polysulfur oxides may conceivably operate on Io. This mechanism could degrade landforms in a manner that resembles degradation from sublimation, and at a rate that can compete with resurfacing.

  7. Benefits of Parallel I/O in Ab Initio Nuclear Physics Calculations

    International Nuclear Information System (INIS)

    Laghave, Nikhil; Sosonkina, Masha; Maris, Pieter; Vary, James P.

    2009-01-01

    Many modern scientific applications rely on highly parallel calculations, which scale to 10's of thousands processors. However, most applications do not concentrate on parallelizing input/output operations. In particular, sequential I/O has been identified as a bottleneck for the highly scalable MFDn (Many Fermion Dynamics for nuclear structure) code performing ab initio nuclear structure calculations. In this paper, we develop interfaces and parallel I/O procedures to use a well-known parallel I/O library in MFDn. As a result, we gain efficient input/output of large datasets along with their portability and ease of use in the downstream processing.

  8. Io After Galileo A New View of Jupiter’s Volcanic Moon

    CERN Document Server

    Lopes, Rosaly M. C

    2007-01-01

    Jupiter’s moon Io is the Solar System’s most exotic satellite. Active volcanism on Io was discovered from observations by the Voyager 1 spacecraft in 1979, confirming a possibility suggested from theoretical studies of Io’s orbit. Our knowledge of Io’s volcanism, composition, and space environment were significantly increased as a result of observations by the Galileo spacecraft from 1996 through 2001. The end of the Galileo mission in 2003 makes this an ideal time to summarize the new results in a book as no book has ever been written about Jupiter’s volcanic moon, Io.

  9. The PMIPv6-Based Group Binding Update for IoT Devices

    Directory of Open Access Journals (Sweden)

    Jianfeng Guan

    2016-01-01

    Full Text Available Internet of Things (IoT has been booming with rapid increase of the various wearable devices, vehicle embedded devices, and so on, and providing the effective mobility management for these IoT devices becomes a challenge due to the different application scenarios as well as the limited energy and bandwidth. Recently, lots of researchers have focused on this topic and proposed several solutions based on the combination of IoT features and traditional mobility management protocols, in which most of these schemes take the IoT devices as mobile networks and adopt the NEtwork MObility (NEMO and its variants to provide the mobility support. However, these solutions are in face of the heavy signaling cost problem. Since IoT devices are generally combined to realize the complex functions, these devices may have similar movement behaviors. Clearly analyzing these characters and using them in the mobility management will reduce the signaling cost and improve the scalability. Motivated by this, we propose a PMIPv6-based group binding update method. In particular, we describe its group creation procedure, analyze its impact on the mobility management, and derive its reduction ratio in terms of signaling cost. The final results show that the introduction of group binding update can remarkably reduce the signaling cost.

  10. Design for an IO block array in a tile-based FPGA

    International Nuclear Information System (INIS)

    Ding Guangxin; Chen Lingdou; Liu Zhongli

    2009-01-01

    A design for an IO block array in a tile-based FPGA is presented. Corresponding with the characteristics of the FPGA, each IO cell is composed of a signal path, local routing pool and configurable input/output buffers. Shared programmable registers in the signal path can be configured for the function of JTAG, without specific boundary scan registers/latches, saving layout area. The local routing pool increases the flexibility of routing and the routability of the whole FPGA. An auxiliary power supply is adopted to increase the performance of the IO buffers at different configured IO standards. The organization of the IO block array is described in an architecture description file, from which the array layout can be accomplished through use of an automated layout assembly tool. This design strategy facilitates the design of FPGAs with different capacities or architectures in an FPGA family series. The bond-out schemes of the same FPGA chip in different packages are also considered. The layout is based on SMIC 0.13 μm logic 1P8M salicide 1.2/2.5 V CMOS technology. Our performance is comparable with commercial SRAM-based FPGAs which use a similar process. (semiconductor integrated circuits)

  11. A Model of Socially Connected Web Objects for IoT Applications

    Directory of Open Access Journals (Sweden)

    Sajjad Ali

    2018-01-01

    Full Text Available The Internet of Things (IoT is evolving with the connected objects at an unprecedented rate, bringing about enormous opportunities for the future IoT applications as well as challenges. One of the major challenges is to handle the complexity generated by the interconnection of billions of objects. However, Social Internet of Things (SIoT, emerging from the conglomeration of IoT and social networks, has realized an efficient way to facilitate the development of complex future IoT applications. Nevertheless, to fully utilize the benefits of SIoT, a platform that can provide efficient services using social relations among heterogeneous objects is highly required. The web objects enabled IoT environment promotes SIoT features by enabling virtualization using virtual objects and supporting the modularity with microservices. To realize SIoT services, this article proposes an architecture that provides a foundation for the development of lightweight microservices based on socially connected web objects. To efficiently discover web objects and reduce the complexity of service provisioning processes, a social relationship model is presented. To realize the interoperable service operations, a semantic ontology model has been developed. Finally, to evaluate the proposed design, a prototype has been implemented based on a use case scenario.

  12. Small-World and Scale-Free Network Models for IoT Systems

    Directory of Open Access Journals (Sweden)

    Insoo Sohn

    2017-01-01

    Full Text Available It is expected that Internet of Things (IoT revolution will enable new solutions and business for consumers and entrepreneurs by connecting billions of physical world devices with varying capabilities. However, for successful realization of IoT, challenges such as heterogeneous connectivity, ubiquitous coverage, reduced network and device complexity, enhanced power savings, and enhanced resource management have to be solved. All these challenges are heavily impacted by the IoT network topology supported by massive number of connected devices. Small-world networks and scale-free networks are important complex network models with massive number of nodes and have been actively used to study the network topology of brain networks, social networks, and wireless networks. These models, also, have been applied to IoT networks to enhance synchronization, error tolerance, and more. However, due to interdisciplinary nature of the network science, with heavy emphasis on graph theory, it is not easy to study the various tools provided by complex network models. Therefore, in this paper, we attempt to introduce basic concepts of graph theory, including small-world networks and scale-free networks, and provide system models that can be easily implemented to be used as a powerful tool in solving various research problems related to IoT.

  13. Designing the IoT sandbox

    NARCIS (Netherlands)

    Frens, Joep; Funk, Mathias; van Hout, Bastiaan; Le Blanc, Joep

    2018-01-01

    This pictorial describes the design and design process of the IoT Sandbox: a (scale model of a) smart home equipped with actuators and a modular interface that controls the interactive aspects of the smart home. This modular interface can 'grow" together with the house it controls whereby it offers

  14. Human centric security and privacy for the IoT using formal techniques

    OpenAIRE

    Kammueller, Florian

    2018-01-01

    In this paper, we summarize a new approach to make security and privacy issues in the Internet of Things (IoT) more transparent for vulnerable users. As a pilot project, we investigate monitoring of Alzheimer’s patients for a low-cost early warning system based on bio-markers supported with smart technologies. To provide trustworthy and secure IoT infrastructures, we employ formal methods and techniques that allow specification of IoT scenarios with human actors, refinement and analysis of at...

  15. Distributed service-based approach for sensor data fusion in IoT environments.

    Science.gov (United States)

    Rodríguez-Valenzuela, Sandra; Holgado-Terriza, Juan A; Gutiérrez-Guerrero, José M; Muros-Cobos, Jesús L

    2014-10-15

    The Internet of Things (IoT) enables the communication among smart objects promoting the pervasive presence around us of a variety of things or objects that are able to interact and cooperate jointly to reach common goals. IoT objects can obtain data from their context, such as the home, office, industry or body. These data can be combined to obtain new and more complex information applying data fusion processes. However, to apply data fusion algorithms in IoT environments, the full system must deal with distributed nodes, decentralized communication and support scalability and nodes dynamicity, among others restrictions. In this paper, a novel method to manage data acquisition and fusion based on a distributed service composition model is presented, improving the data treatment in IoT pervasive environments.

  16. AdiosStMan: Parallelizing Casacore Table Data System using Adaptive IO System

    Science.gov (United States)

    Wang, R.; Harris, C.; Wicenec, A.

    2016-07-01

    In this paper, we investigate the Casacore Table Data System (CTDS) used in the casacore and CASA libraries, and methods to parallelize it. CTDS provides a storage manager plugin mechanism for third-party developers to design and implement their own CTDS storage managers. Having this in mind, we looked into various storage backend techniques that can possibly enable parallel I/O for CTDS by implementing new storage managers. After carrying on benchmarks showing the excellent parallel I/O throughput of the Adaptive IO System (ADIOS), we implemented an ADIOS based parallel CTDS storage manager. We then applied the CASA MSTransform frequency split task to verify the ADIOS Storage Manager. We also ran a series of performance tests to examine the I/O throughput in a massively parallel scenario.

  17. Application of IoT concept on predictive maintenance of industrial equipment

    Directory of Open Access Journals (Sweden)

    Parpala Radu Constantin

    2017-01-01

    Full Text Available The Internet of Things (IoT concept describes an intelligent connectivity of smart devices using the internet network. Nowadays, companies try different approaches for predictive maintenance as a solution to reduce costs and the frequency of maintenance activities. The IoT platforms provide a good support for predictive maintenance as it can integrate information from different machines and manufacturing systems. The main drawback in integrating production system with IoT dedicated platforms is the communication framework, knowing that the main industrial communication protocols are incompatible with modern communication protocols implemented on IoT platforms. In this context, the present paper proposes a new and simple method for on-line monitoring and predictive maintenance of industrial equipment. This method has two features of connected manufacturing. One of these is process monitoring for constant quality assurance, the other one is condition monitoring in order to prevent unplanned downtimes. A case study is presented to demonstrate the feasibility of the proposed method.

  18. Public Auditing with Privacy Protection in a Multi-User Model of Cloud-Assisted Body Sensor Networks

    Science.gov (United States)

    Li, Song; Cui, Jie; Zhong, Hong; Liu, Lu

    2017-01-01

    Wireless Body Sensor Networks (WBSNs) are gaining importance in the era of the Internet of Things (IoT). The modern medical system is a particular area where the WBSN techniques are being increasingly adopted for various fundamental operations. Despite such increasing deployments of WBSNs, issues such as the infancy in the size, capabilities and limited data processing capacities of the sensor devices restrain their adoption in resource-demanding applications. Though providing computing and storage supplements from cloud servers can potentially enrich the capabilities of the WBSNs devices, data security is one of the prevailing issues that affects the reliability of cloud-assisted services. Sensitive applications such as modern medical systems demand assurance of the privacy of the users’ medical records stored in distant cloud servers. Since it is economically impossible to set up private cloud servers for every client, auditing data security managed in the remote servers has necessarily become an integral requirement of WBSNs’ applications relying on public cloud servers. To this end, this paper proposes a novel certificateless public auditing scheme with integrated privacy protection. The multi-user model in our scheme supports groups of users to store and share data, thus exhibiting the potential for WBSNs’ deployments within community environments. Furthermore, our scheme enriches user experiences by offering public verifiability, forward security mechanisms and revocation of illegal group members. Experimental evaluations demonstrate the security effectiveness of our proposed scheme under the Random Oracle Model (ROM) by outperforming existing cloud-assisted WBSN models. PMID:28475110

  19. Public Auditing with Privacy Protection in a Multi-User Model of Cloud-Assisted Body Sensor Networks.

    Science.gov (United States)

    Li, Song; Cui, Jie; Zhong, Hong; Liu, Lu

    2017-05-05

    Wireless Body Sensor Networks (WBSNs) are gaining importance in the era of the Internet of Things (IoT). The modern medical system is a particular area where the WBSN techniques are being increasingly adopted for various fundamental operations. Despite such increasing deployments of WBSNs, issues such as the infancy in the size, capabilities and limited data processing capacities of the sensor devices restrain their adoption in resource-demanding applications. Though providing computing and storage supplements from cloud servers can potentially enrich the capabilities of the WBSNs devices, data security is one of the prevailing issues that affects the reliability of cloud-assisted services. Sensitive applications such as modern medical systems demand assurance of the privacy of the users' medical records stored in distant cloud servers. Since it is economically impossible to set up private cloud servers for every client, auditing data security managed in the remote servers has necessarily become an integral requirement of WBSNs' applications relying on public cloud servers. To this end, this paper proposes a novel certificateless public auditing scheme with integrated privacy protection. The multi-user model in our scheme supports groups of users to store and share data, thus exhibiting the potential for WBSNs' deployments within community environments. Furthermore, our scheme enriches user experiences by offering public verifiability, forward security mechanisms and revocation of illegal group members. Experimental evaluations demonstrate the security effectiveness of our proposed scheme under the Random Oracle Model (ROM) by outperforming existing cloud-assisted WBSN models.

  20. Optimized Energy Harvesting, Cluster-Head Selection and Channel Allocation for IoTs in Smart Cities

    Science.gov (United States)

    Aslam, Saleem; Hasan, Najam Ul; Jang, Ju Wook; Lee, Kyung-Geun

    2016-01-01

    This paper highlights three critical aspects of the internet of things (IoTs), namely (1) energy efficiency, (2) energy balancing and (3) quality of service (QoS) and presents three novel schemes for addressing these aspects. For energy efficiency, a novel radio frequency (RF) energy-harvesting scheme is presented in which each IoT device is associated with the best possible RF source in order to maximize the overall energy that the IoT devices harvest. For energy balancing, the IoT devices in close proximity are clustered together and then an IoT device with the highest residual energy is selected as a cluster head (CH) on a rotational basis. Once the CH is selected, it assigns channels to the IoT devices to report their data using a novel integer linear program (ILP)-based channel allocation scheme by satisfying their desired QoS. To evaluate the presented schemes, exhaustive simulations are carried out by varying different parameters, including the number of IoT devices, the number of harvesting sources, the distance between RF sources and IoT devices and the primary user (PU) activity of different channels. The simulation results demonstrate that our proposed schemes perform better than the existing ones. PMID:27918424

  1. Optimized Energy Harvesting, Cluster-Head Selection and Channel Allocation for IoTs in Smart Cities.

    Science.gov (United States)

    Aslam, Saleem; Hasan, Najam Ul; Jang, Ju Wook; Lee, Kyung-Geun

    2016-12-02

    This paper highlights three critical aspects of the internet of things (IoTs), namely (1) energy efficiency, (2) energy balancing and (3) quality of service (QoS) and presents three novel schemes for addressing these aspects. For energy efficiency, a novel radio frequency (RF) energy-harvesting scheme is presented in which each IoT device is associated with the best possible RF source in order to maximize the overall energy that the IoT devices harvest. For energy balancing, the IoT devices in close proximity are clustered together and then an IoT device with the highest residual energy is selected as a cluster head (CH) on a rotational basis. Once the CH is selected, it assigns channels to the IoT devices to report their data using a novel integer linear program (ILP)-based channel allocation scheme by satisfying their desired QoS. To evaluate the presented schemes, exhaustive simulations are carried out by varying different parameters, including the number of IoT devices, the number of harvesting sources, the distance between RF sources and IoT devices and the primary user (PU) activity of different channels. The simulation results demonstrate that our proposed schemes perform better than the existing ones.

  2. Optimized Energy Harvesting, Cluster-Head Selection and Channel Allocation for IoTs in Smart Cities

    Directory of Open Access Journals (Sweden)

    Saleem Aslam

    2016-12-01

    Full Text Available This paper highlights three critical aspects of the internet of things (IoTs, namely (1 energy efficiency, (2 energy balancing and (3 quality of service (QoS and presents three novel schemes for addressing these aspects. For energy efficiency, a novel radio frequency (RF energy-harvesting scheme is presented in which each IoT device is associated with the best possible RF source in order to maximize the overall energy that the IoT devices harvest. For energy balancing, the IoT devices in close proximity are clustered together and then an IoT device with the highest residual energy is selected as a cluster head (CH on a rotational basis. Once the CH is selected, it assigns channels to the IoT devices to report their data using a novel integer linear program (ILP-based channel allocation scheme by satisfying their desired QoS. To evaluate the presented schemes, exhaustive simulations are carried out by varying different parameters, including the number of IoT devices, the number of harvesting sources, the distance between RF sources and IoT devices and the primary user (PU activity of different channels. The simulation results demonstrate that our proposed schemes perform better than the existing ones.

  3. Out of core, out of mind: Practical parallel I/O

    Energy Technology Data Exchange (ETDEWEB)

    Womble, D.E.; Greenberg, D.S.; Riesen, R.E.; Wheat, S.R.

    1993-11-01

    Parallel computers are becoming more powerful and more complex in response to the demand for computing power by scientists and engineers. Inevitably, new and more complex I/O systems will be developed for these systems. In particular we believe that the I/O system must provide the programmer with the ability to explcitly manage storage (despite the trend toward complex parallel file systems and caching schemes). One method of doing so is to have a partitioned secondary storage in which each processor owns a logical disk. Along with operating system enhancements which allow overheads such as buffer copying to be avoided and libraries to support optimal remapping of data, this sort of I/O system meets the needs of high performance computing.

  4. 5G IoT Industry Verticals and Network Requirements

    OpenAIRE

    Condoluci, Massimo; Lema Rosas, Maria Angel; Mahmoodi, Toktam; Dohler, Michael

    2017-01-01

    The effective provisioning of industry verticals over the next-to-come 5G systems opens novel business opportunities for telco operators especially when considering the integration of Internet of Things (IoT) devices as enablers of business cases based on remote sensing and control. This chapter highlights the main features of IoT verticals with particular attention on healthcare, smart cities, industry automation and entertainment business cases. The aim of this Chapter is to derive the requ...

  5. Security Framework for the Web of IoT Platforms

    OpenAIRE

    Atarah, Ivan Akoribila

    2017-01-01

    Connected devices of IoT platforms are known to produce, process and exchange vast amounts of data, most of it sensitive or personal, that need to be protected. However, achieving minimal data protection requirements such as confidentiality, integrity, availability and non-repudiation in IoT platforms is a non-trivial issue. For one reason, the trillions of interacting devices provide larger attack surfaces. Secondly, high levels of personal and private data sharing in this ubiquitous and het...

  6. Research and implementation on improving I/O performance of streaming media storage system

    Science.gov (United States)

    Lu, Zheng-wu; Wang, Yu-de; Jiang, Guo-song

    2008-12-01

    In this paper, we study the special requirements of a special storage system: streaming media server, and propose a solution to improve I/O performance of RAID storage system. The solution is suitable for streaming media applications. A streaming media storage subsystem includes the I/O interfaces, RAID arrays, I/O scheduling and device drivers. The solution is implemented on the top of the storage subsystem I/O Interface. Storage subsystem is the performance bottlenecks of a streaming media system, and I/O interface directly affect the performance of the storage subsystem. According to theoretical analysis, 64 KB block-size is most appropriate for streaming media applications. We carry out experiment in detail, and verified that the proper block-size really is 64KB. It is in accordance with our analysis. The experiment results also show that by using DMA controller, efficient memory management technology and mailbox interface design mechanism, streaming media storage system achieves a high-speed data throughput.

  7. Investigation of Storage Options for Scientific Computing on Grid and Cloud Facilities

    International Nuclear Information System (INIS)

    Garzoglio, Gabriele

    2012-01-01

    In recent years, several new storage technologies, such as Lustre, Hadoop, OrangeFS, and BlueArc, have emerged. While several groups have run benchmarks to characterize them under a variety of configurations, more work is needed to evaluate these technologies for the use cases of scientific computing on Grid clusters and Cloud facilities. This paper discusses our evaluation of the technologies as deployed on a test bed at FermiCloud, one of the Fermilab infrastructure-as-a-service Cloud facilities. The test bed consists of 4 server-class nodes with 40 TB of disk space and up to 50 virtual machine clients, some running on the storage server nodes themselves. With this configuration, the evaluation compares the performance of some of these technologies when deployed on virtual machines and on “bare metal” nodes. In addition to running standard benchmarks such as IOZone to check the sanity of our installation, we have run I/O intensive tests using physics-analysis applications. This paper presents how the storage solutions perform in a variety of realistic use cases of scientific computing. One interesting difference among the storage systems tested is found in a decrease in total read throughput with increasing number of client processes, which occurs in some implementations but not others.

  8. iOS Game Development using SpriteKit Framework with Swift Programming Language

    OpenAIRE

    Gurung, Lal

    2016-01-01

    iOS is a mobile operating system for Apple manufactured phones and tablets. Mobile Gaming Industries are growing very fast, and compatibility with iOS is becoming very popular among game developers. The aim of this Bachelor’s thesis was to find the best available game development tools for iOS platform. The 2D game named Lapland was developed using Apple’s own native framework, SpriteKit. The game was written with the SpriteKit programming language. The combination of SpriteKit and Swift...

  9. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

    OpenAIRE

    Bako Ali; Ali Ismail Awad

    2018-01-01

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in te...

  10. Towards an MDD Based Framework for Self Adaptive IoT Applications Development

    OpenAIRE

    Abuseta, Yousef

    2018-01-01

    As technology and communication advances, more devices (and things) are able to connect to the Internet and talk to each other to achieve a common goal which results in the emergence of the Internet of Things (IoT) era. It is believed that IoT will bring up a limitless number of applications and business opportunities that will affect almost every aspect of our life. Research has already been conducted to investigate the challenges that obstruct the realization of IoT along with the promising...

  11. Io Pele plume

    Science.gov (United States)

    2000-01-01

    Voyager 1 took this narrow-angle camera image on 5 March 1979 from a distance of 450,000 kilometers. At this geometry, the camera looks straight down through a volcanic plume at one of Io's most active volcanos, Pele. The large heart-shaped feature is the region where Pele's plume falls to the surface. At the center of the 'heart' is the small dark fissure that is the source of the eruption. The Voyager Project is managed by the Jet Propulsion Laboratory for NASA's Office of Space Science.

  12. Book Review: iPhone and iOS Forensic: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

    OpenAIRE

    Garfinkel, Simson

    2013-01-01

    Hoog, A., & Strzempka, K. (2011). iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Waltham, MA: Syngress. 336 pages, ISBN: 978-1-59749-659-9, US$69.95.Reviewed by Christopher Schulte, EnCE & ACE, LuciData Inc., Minneapolis, Minnesota ()These are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers) continue to bring ne...

  13. Book Review: iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

    OpenAIRE

    Schulte Christopher

    2011-01-01

    Hoog, A., & Strzempka, K. (2011). iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Waltham, MA: Syngress. 336 pages, ISBN: 978-1-59749-659-9, US$69.95.Reviewed by Christopher Schulte, EnCE & ACE, LuciData Inc., Minneapolis, Minnesota ()These are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers) continue to bring ne...

  14. IO-Link Wireless enhanced factory automation communication for Industry 4.0 applications

    Directory of Open Access Journals (Sweden)

    R. Heynicke

    2018-03-01

    Full Text Available In the context of the Industry 4.0 initiative, Cyber-Physical Production Systems (CPPS or Cyber Manufacturing Systems (CMS can be characterized as advanced networked mechatronic production systems gaining their added value by interaction with the ambient Industrial Internet of Things (IIoT. In this context appropriate communication technologies and standards play a vital role to realize the manifold potential improvements in the production process. One of these standards is IO-Link. In 2016 more than 5 million IO-Link nodes have been produced and delivered, still gaining increasing acceptance for the communication between sensors, actuators and the control level. The steadily increasing demand for more flexibility in automation solutions can be fulfilled using wireless technologies. With the wireless extension for the IO-Link standard, which will be presented in this article, maximum cycle times of 5 ms can be achieved with a probability that this limit will be exceeded to be at maximum one part per billion. Also roaming capabilities, wireless coexistence mechanisms and the possibility to include battery-powered or energy-harvesting sensors with very limited energy resources in the realtime network were defined. For system planning, setup, operation and maintenance, the standard engineering tools of IO-Link can be employed so that the backward compatibility with wired IO-Link solutions can be guaranteed. Interoperability between manufacturers is a key requirement for any communication standard, thus a procedure for IO-Link Wireless testing is also suggested.

  15. Mountains on Io: High-resolution Galileo observations, initial interpretations, and formation models

    Science.gov (United States)

    Turtle, E.P.; Jaeger, W.L.; Keszthelyi, L.P.; McEwen, A.S.; Milazzo, M.; Moore, J.; Phillips, C.B.; Radebaugh, J.; Simonelli, D.; Chuang, F.; Schuster, P.; Alexander, D.D.A.; Capraro, K.; Chang, S.-H.; Chen, A.C.; Clark, J.; Conner, D.L.; Culver, A.; Handley, T.H.; Jensen, D.N.; Knight, D.D.; LaVoie, S.K.; McAuley, M.; Mego, V.; Montoya, O.; Mortensen, H.B.; Noland, S.J.; Patel, R.R.; Pauro, T.M.; Stanley, C.L.; Steinwand, D.J.; Thaller, T.F.; Woncik, P.J.; Yagi, G.M.; Yoshimizu, J.R.; Alvarez Del Castillo, E.M.; Beyer, R.; Branston, D.; Fishburn, M.B.; Muller, Birgit; Ragan, R.; Samarasinha, N.; Anger, C.D.; Cunningham, C.; Little, B.; Arriola, S.; Carr, M.H.; Asphaug, E.; Morrison, D.; Rages, K.; Banfield, D.; Bell, M.; Burns, J.A.; Carcich, B.; Clark, B.; Currier, N.; Dauber, I.; Gierasch, P.J.; Helfenstein, P.; Mann, M.; Othman, O.; Rossier, L.; Solomon, N.; Sullivan, R.; Thomas, P.C.; Veverka, J.; Becker, T.; Edwards, K.; Gaddis, L.; Kirk, R.; Lee, E.; Rosanova, T.; Sucharski, R.M.; Beebe, R.F.; Simon, A.; Belton, M.J.S.; Bender, K.; Fagents, S.; Figueredo, P.; Greeley, R.; Homan, K.; Kadel, S.; Kerr, J.; Klemaszewski, J.; Lo, E.; Schwarz, W.; Williams, D.; Williams, K.; Bierhaus, B.; Brooks, S.; Chapman, C.R.; Merline, B.; Keller, J.; Tamblyn, P.; Bouchez, A.; Dyundian, U.; Ingersoll, A.P.; Showman, A.; Spitale, J.; Stewart, S.; Vasavada, A.; Breneman, H.H.; Cunningham, W.F.; Johnson, T.V.; Jones, T.J.; Kaufman, J.M.; Klaasen, K.P.; Levanas, G.; Magee, K.P.; Meredith, M.K.; Orton, G.S.; Senske, D.A.; West, A.; Winther, D.; Collins, G.; Fripp, W.J.; Head, J. W.; Pappalardo, R.; Pratt, S.; Prockter, L.; Spaun, N.; Colvin, T.; Davies, M.; DeJong, E.M.; Hall, J.; Suzuki, S.; Gorjian, Z.; Denk, T.; Giese, B.; Koehler, U.; Neukum, G.; Oberst, J.; Roatsch, T.; Tost, W.; Wagner, R.; Dieter, N.; Durda, D.; Geissler, P.; Greenberg, R.J.; Hoppa, G.; Plassman, J.; Tufts, R.; Fanale, F.P.; Granahan, J.C.

    2001-01-01

    During three close flybys in late 1999 and early 2000 the Galileo spacecraft ac-quired new observations of the mountains that tower above Io's surface. These images have revealed surprising variety in the mountains' morphologies. They range from jagged peaks several kilometers high to lower, rounded structures. Some are very smooth, others are covered by numerous parallel ridges. Many mountains have margins that are collapsing outward in large landslides or series of slump blocks, but a few have steep, scalloped scarps. From these observations we can gain insight into the structure and material properties of Io's crust as well as into the erosional processes acting on Io. We have also investigated formation mechanisms proposed for these structures using finite-element analysis. Mountain formation might be initiated by global compression due to the high rate of global subsidence associated with Io's high resurfacing rate; however, our models demonstrate that this hypothesis lacks a mechanism for isolating the mountains. The large fraction (???40%) of mountains that are associated with paterae suggests that in some cases these features are tectonically related. Therefore we have also simulated the stresses induced in Io's crust by a combination of a thermal upwelling in the mantle with global lithospheric compression and have shown that this can focus compressional stresses. If this mechanism is responsible for some of Io's mountains, it could also explain the common association of mountains with paterae. Copyright 2001 by the American Geophysical Union.

  16. Power Consumption and Calculation Requirement Analysis of AES for WSN IoT.

    Science.gov (United States)

    Hung, Chung-Wen; Hsu, Wen-Ting

    2018-05-23

    Because of the ubiquity of Internet of Things (IoT) devices, the power consumption and security of IoT systems have become very important issues. Advanced Encryption Standard (AES) is a block cipher algorithm is commonly used in IoT devices. In this paper, the power consumption and cryptographic calculation requirement for different payload lengths and AES encryption types are analyzed. These types include software-based AES-CB, hardware-based AES-ECB (Electronic Codebook Mode), and hardware-based AES-CCM (Counter with CBC-MAC Mode). The calculation requirement and power consumption for these AES encryption types are measured on the Texas Instruments LAUNCHXL-CC1310 platform. The experimental results show that the hardware-based AES performs better than the software-based AES in terms of power consumption and calculation cycle requirements. In addition, in terms of AES mode selection, the AES-CCM-MIC64 mode may be a better choice if the IoT device is considering security, encryption calculation requirement, and low power consumption at the same time. However, if the IoT device is pursuing lower power and the payload length is generally less than 16 bytes, then AES-ECB could be considered.

  17. Teaching Management System with Applications of RFID and IoT Technology

    Directory of Open Access Journals (Sweden)

    Ping Tan

    2018-02-01

    Full Text Available Currently, Internet of Things (IoT technologies are used in many areas, such as intelligent transportation, smart city, hospital, games, education. Earlier interactive response system uses infrared or radio frequency (RF wireless communication technologies to transmit the students’ answer to teachers’ managerment system, where there exists high cost, inconvenient usage, difficult deployment. How to use IoT to improve the quality of higher education becomes a very important topic in the researh area of teaching. Radio Frequency Identification (RFID is one of key technologies to implement IoT applications, and most of universities use the High Frequency (HF RFID card as the students’ identification devices in China. In this paper, a kind of WiFi supported RFID reader (WiRF is implemented using open source hardware platforms, such as Node MCU and RFID-RC522. Then the proposed WiRF system is used to assist teacher to perform automatic attendance record and students’ behavior record. In addition, Quick Response (QR code is another technology to enable IoT. In this paper, QR code is designed to quickly access course video and perform real-time interactive response in the classroom, which will provide multidimensional learning and strengthen the motivation of students’ learning. This IoT system can improve the attendance of students, and give a positive impact on students’ learning process for higher education.

  18. An iOS implementation of the Shannon switching game

    OpenAIRE

    Macík, Miroslav

    2013-01-01

    Shannon switching game is a logical graph game for two players. The game was created by American mathematician Claude Shannon. iOS is an operating system designed for iPhone cellular phone, iPod music player and iPad tablet. The thesis describes existing implementations of the game and also specific implementation for iOS operating system created as a part of this work. This implementation allows you to play against virtual opponent and also supports multiplayer game consisting of two players...

  19. Identification of radio emission from the Io flux tube

    International Nuclear Information System (INIS)

    Riddle, A.C.

    1983-01-01

    Many theories and observations suggest that Jovian decametric radio emission is generated in flux tubes that pass close to Io's orbit. However, comparison of theory and observation is hindered by lack of knowledge as to which specific flux tube is responsible for a particular emission. In this note, emission from the instantaneous Io flux tube is identified. This makes possible a mapping of emissions onto the causative flux tubes for a significant range of Jovian longitudes (240 0 --360 0 )

  20. Evaluation of secure capability-based access control in the M2M local cloud platform

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Prasad, Neeli R.; Prasad, Ramjee

    2016-01-01

    delegation. Recently, the capability based access control has been considered as method to manage access in the Internet of Things (IoT) or M2M domain. In this paper, the implementation and evaluation of a proposed secure capability based access control in the M2M local cloud platform is presented......Managing access to and protecting resources is one of the important aspect in managing security, especially in a distributed computing system such as Machine-to-Machine (M2M). One such platform known as the M2M local cloud platform, referring to BETaaS architecture [1], which conceptually consists...... of multiple distributed M2M gateways, creating new challenges in the access control. Some existing access control systems lack in scalability and flexibility to manage access from users or entity that belong to different authorization domains, or fails to provide fine grained and flexible access right...

  1. Thermal Remote Sensing of Lava Lakes on Io and Earth (Invited)

    Science.gov (United States)

    Davies, A. G.; Keszthelyi, L. P.; McEwen, A. S.

    2013-12-01

    Volcanology has been transformed by remote sensing. For decades, Earth's volcanoes have been studied in the infrared by a wide variety of instruments on spacecraft at widely varying spectral, spatial and temporal resolutions, for which techniques have been developed to interpret and understand ongoing volcanic eruptions. The study of volcanism on Io, the only Solar System body besides Earth known to have ongoing, high temperature, silicate-based effusive and explosive volcanic eruptions, requires new remote sensing techniques. The extraordinary volcanism allows us to examine Io's interior and composition from the material erupted onto the surface. For Io, the biggest question in the wake of NASA's Galileo mission concerns the eruption temperature of Io's dominant silicate lavas [1,2]. Constraining eruption temperature constrains magma composition, in turn a reflection of the composition, physical state and tidal heating within Io. However, the extraction of lava eruption temperature from remote sensing data is difficult. Detector saturation is likely except when the hot material fills a tiny fraction of a resolution element, unless instruments are designed for this objective. High temperature lava surfaces cool rapidly, so remote observations can miss the peak temperature. Observations at different wavelengths must be acquired nearly simultaneously to derive accurate temperatures of very hot and dynamic sources [3]. Uncertainties regarding hot lava emissivity [4] also reduce the confidence in derived temperatures. From studying thermal emission data from different styles of volcanic activity on Earth by remote sensing in conjunction with contemporaneous observations on the ground, it is found that only certain styles of volcanic activity are suitable for deriving liquid lava temperatures [3]. Active lava lakes are particularly useful, especially during a phase of lava fountaining. Examination and analysis of FLIR data obtained at the Erta'Ale (Ethiopia) basaltic

  2. Investment Opportunity Set (IOS Berbasis Pertumbuhan Perusahaan dan Kaitannya Dengan Upaya Peningkatan Nilai Perusahaan

    Directory of Open Access Journals (Sweden)

    Eka Handriani

    2016-06-01

    Full Text Available This research aims to develop theoretical approach to complete the conceptual controversy regarding the research results on the investment policy and firm value. This research employs firm value, investment opportunity set (IOS, funding and dividend as variables. Dividends in the research proxied by dividend pay out ratio (DPR, funding proxied by DER and firm value indicated by Tobin’s q, which are mediated by IOS. The sample are taken from 154 manufacturing company financial statements during 2010 to 2012. The data were tested using path analysis. The research found that dividend and funding policy positively influence IOS. Investment opportunity (IOS positively influences the firm value. IOS was able to mediate the effect of dividends to the firm value, and also the influence of funding decisions to firm value.

  3. TTEO (Things Talk to Each Other): Programming Smart Spaces Based on IoT Systems.

    Science.gov (United States)

    Yun, Jaeseok; Ahn, Il-Yeup; Choi, Sung-Chan; Kim, Jaeho

    2016-04-01

    The Internet of Things allows things in the world to be connected to each other and enables them to automate daily tasks without human intervention, eventually building smart spaces. This article demonstrates a prototype service based on the Internet of Things, TTEO (Things Talk to Each Other). We present the full details on the system architecture and the software platforms for IoT servers and devices, called Mobius and &Cube, respectively, complying with the globally-applicable IoT standards, oneM2M, a unique identification scheme for a huge number of IoT devices, and service scenarios with an intuitive smartphone app. We hope that our approach will help developers and lead users for IoT devices and application services to establish an emerging IoT ecosystem, just like the ecosystem for smartphones and mobile applications.

  4. TTEO (Things Talk to Each Other: Programming Smart Spaces Based on IoT Systems

    Directory of Open Access Journals (Sweden)

    Jaeseok Yun

    2016-04-01

    Full Text Available The Internet of Things allows things in the world to be connected to each other and enables them to automate daily tasks without human intervention, eventually building smart spaces. This article demonstrates a prototype service based on the Internet of Things, TTEO (Things Talk to Each Other. We present the full details on the system architecture and the software platforms for IoT servers and devices, called Mobius and &Cube, respectively, complying with the globally-applicable IoT standards, oneM2M, a unique identification scheme for a huge number of IoT devices, and service scenarios with an intuitive smartphone app. We hope that our approach will help developers and lead users for IoT devices and application services to establish an emerging IoT ecosystem, just like the ecosystem for smartphones and mobile applications.

  5. Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and Future Challenges.

    Science.gov (United States)

    Sajid, Anam; Abbas, Haider

    2016-06-01

    The widespread deployment and utility of Wireless Body Area Networks (WBAN's) in healthcare systems required new technologies like Internet of Things (IoT) and cloud computing, that are able to deal with the storage and processing limitations of WBAN's. This amalgamation of WBAN-based healthcare systems to cloud-based healthcare systems gave rise to serious privacy concerns to the sensitive healthcare data. Hence, there is a need for the proactive identification and effective mitigation mechanisms for these patient's data privacy concerns that pose continuous threats to the integrity and stability of the healthcare environment. For this purpose, a systematic literature review has been conducted that presents a clear picture of the privacy concerns of patient's data in cloud-assisted healthcare systems and analyzed the mechanisms that are recently proposed by the research community. The methodology used for conducting the review was based on Kitchenham guidelines. Results from the review show that most of the patient's data privacy techniques do not fully address the privacy concerns and therefore require more efforts. The summary presented in this paper would help in setting research directions for the techniques and mechanisms that are needed to address the patient's data privacy concerns in a balanced and light-weight manner by considering all the aspects and limitations of the cloud-assisted healthcare systems.

  6. IoT real time data acquisition using MQTT protocol

    Science.gov (United States)

    Atmoko, R. A.; Riantini, R.; Hasin, M. K.

    2017-05-01

    The Internet of Things (IoT) provides ease to monitor and to gain sensor data through the Internet [1]. The need of high quality data is increasing to the extent that data monitoring and acquisition system in real time is required, such as smart city or telediagnostic in medical areas [2]. Therefore, an appropriate communication protocol is required to resolve these problems. Lately, researchers have developed a lot of communication protocols for IoT, of which each has advantages and disadvantages. This study proposes the utilization of MQTT as a communication protocol, which is one of data communication protocols for IoT. This study used temperature and humidity sensors because the physical parameters are often needed as parameters of environment condition [3]. Data acquisition was done in real-time and stored in MySQL database. This study is also completed by interface web-based and mobile for online monitoring. This result of this study is the enhancement of data quality and reliability using MQTT protocol.

  7. I/O Performance Characterization of Lustre and NASA Applications on Pleiades

    Science.gov (United States)

    Saini, Subhash; Rappleye, Jason; Chang, Johnny; Barker, David Peter; Biswas, Rupak; Mehrotra, Piyush

    2012-01-01

    In this paper we study the performance of the Lustre file system using five scientific and engineering applications representative of NASA workload on large-scale supercomputing systems such as NASA s Pleiades. In order to facilitate the collection of Lustre performance metrics, we have developed a software tool that exports a wide variety of client and server-side metrics using SGI's Performance Co-Pilot (PCP), and generates a human readable report on key metrics at the end of a batch job. These performance metrics are (a) amount of data read and written, (b) number of files opened and closed, and (c) remote procedure call (RPC) size distribution (4 KB to 1024 KB, in powers of 2) for I/O operations. RPC size distribution measures the efficiency of the Lustre client and can pinpoint problems such as small write sizes, disk fragmentation, etc. These extracted statistics are useful in determining the I/O pattern of the application and can assist in identifying possible improvements for users applications. Information on the number of file operations enables a scientist to optimize the I/O performance of their applications. Amount of I/O data helps users choose the optimal stripe size and stripe count to enhance I/O performance. In this paper, we demonstrate the usefulness of this tool on Pleiades for five production quality NASA scientific and engineering applications. We compare the latency of read and write operations under Lustre to that with NFS by tracing system calls and signals. We also investigate the read and write policies and study the effect of page cache size on I/O operations. We examine the performance impact of Lustre stripe size and stripe count along with performance evaluation of file per process and single shared file accessed by all the processes for NASA workload using parameterized IOR benchmark.

  8. Towards A New Opportunistic IoT Network Architecture for Wildlife Monitoring System

    NARCIS (Netherlands)

    Ayele, Eyuel Debebe; Meratnia, Nirvana; Havinga, Paul J.M.

    In this paper we introduce an opportunistic dual radio IoT network architecture for wildlife monitoring systems (WMS). Since data processing consumes less energy than transmitting the raw data, the proposed architecture leverages opportunistic mobile networks in a fixed LPWAN IoT network

  9. On the Users’ Acceptance of IoT Systems: A Theoretical Approach

    Directory of Open Access Journals (Sweden)

    Rino Falcone

    2018-03-01

    Full Text Available In the next future the IoT system will introduce extraordinary changes in our daily life. We will communicate with our domestic appliances to inform them about our preferences and goals and they will develop initiative and autonomy to be put at our service. But are we sure that we can afford all the automation they could offer? Are we able to manage it? Is it compatible with our cognitive attitudes and our actual and real goals? In this paper, we face the question of the IoT from the point of view of the user. We start analyzing which reasons undermine the acceptance of IoT systems and then we propose a possible solution. The first contribution of this work is the level characterization of the autonomy a user can grant to an IoT device. The second contribution is a theoretical model to deal with users and to stimulate users’ acceptance. By the means of simulation, we show how the model works and we prove that it leads the system to an optimal solution.

  10. Performance Analysis of Video PHY Controller Using Unidirection and Bi-directional IO Standard via 7 Series FPGA

    DEFF Research Database (Denmark)

    Das, Bhagwan; Abdullah, M F L; Hussain, Dil muhammed Akbar

    2017-01-01

    graphics consumes more power, this creates a need of designing the low power design for Video PHY controller. In this paper, the performance of Video PHY controller is analyzed by comparing the power consumption of unidirectional and bi-directional IO Standard over 7 series FPGA. It is determined...... that total on-chip power is reduced for unidirectional IO Standard based Video PHY controller compared to bidirectional IO Standard based Video PHY controller. The most significant achievement of this work is that it is concluded that unidirectional IO Standard based Video PHY controller consume least...... standby power compared to bidirectional IO Standard based Video PHY controller. It is defined that for 6 GHz operated frequency Video PHY controller, the 32% total on-chip power is reduced using unidirectional IO Standard based Video PHY controller is less compared to bidirectional IO Standard based Video...

  11. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  12. Hotspots on Io During the Ganymede 2 Encounter

    Science.gov (United States)

    1996-01-01

    The Near Infrared Mapping Spectrometer (NIMS) on the Galileo spacecraft imaged Io at high spectral resolution at a range of 439,000 km (275,000 miles) during the G2 encounter on 6 September 1996. This image shows, on the right, Io as seen by NIMS, centered on 150 W longitude. The image on the left shows the same view point from Voyager data (from the encounters in 1979 and 1980). The NIMS image can be compared to the NIMS hotspot image from the G1 orbit (June 1996) to monitor changes on Io. The most dramatic feature of the G2 image is the hotspot at Malik Patera. Preliminary analysis of the data yields a temperature of at least 1000 K (727 C) for this hotspot, an increase of more than 300 K from the G1 encounter. In the overlap area of the G1 and G2 images all the hotspots seen during the G1 encounter are also seen in the G2 image. Other hotspots were seen, including one at the Pele plume origin site. This image is at the 4 micron band to best view the Malik hotspot. Most of the other hotspots are best seen at longer wavelengths. NIMS is continuing to observe Io to monitor volcanic activity throughout the Galileo mission.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA's Office of Space Science, Washington, DC.This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov.

  13. Application-Tailored I/O with Streamline

    NARCIS (Netherlands)

    de Bruijn, W.J.; Bos, H.J.; Bal, H.E.

    2011-01-01

    Streamline is a stream-based OS communication subsystem that spans from peripheral hardware to userspace processes. It improves performance of I/O-bound applications (such as webservers and streaming media applications) by constructing tailor-made I/O paths through the operating system for each

  14. Cloud Infrastructure & Applications - CloudIA

    Science.gov (United States)

    Sulistio, Anthony; Reich, Christoph; Doelitzscher, Frank

    The idea behind Cloud Computing is to deliver Infrastructure-as-a-Services and Software-as-a-Service over the Internet on an easy pay-per-use business model. To harness the potentials of Cloud Computing for e-Learning and research purposes, and to small- and medium-sized enterprises, the Hochschule Furtwangen University establishes a new project, called Cloud Infrastructure & Applications (CloudIA). The CloudIA project is a market-oriented cloud infrastructure that leverages different virtualization technologies, by supporting Service-Level Agreements for various service offerings. This paper describes the CloudIA project in details and mentions our early experiences in building a private cloud using an existing infrastructure.

  15. Synthesis, crystal structure and optical properties of two new layered cadmium iodates: Cd(IO3)X (X=Cl, OH)

    International Nuclear Information System (INIS)

    Yang, Bing-Ping; Mao, Jiang-Gao

    2014-01-01

    Systematic explorations of new compounds in the cadmium iodate system by hydrothermal reactions led to two layered iodates, namely, Cd(IO 3 )X (X=Cl, OH). Cd(IO 3 )Cl crystallizes in the orthorhombic space group Cmca (No. 64) whereas Cd(IO 3 )(OH) crystallizes in the orthorhombic space group Pnma (No. 62). Cd(IO 3 )Cl displays a unique double layered structure composed of 1 ∞ [Cd−O 3 Cl] n chains. Cadmium octahedrons form a 1D chain along the a-axis through edge sharing, and such chains are further interconnected via IO 3 groups to form a special double layer on (020) plane. Cd(IO 3 )(OH) also exhibits a layered structure that is composed of cadmium cations, IO 3 groups and hydroxyl ions. Within a layer, chains of CdO 6 edge-shared octahedra are observed along the b-axis. And these chains are connected by IO 3 groups into a layer parallel to the bc plane. Spectroscopic characterizations, elemental analysis, and thermogravimetric analysis for the reported two compounds are also presented. - Graphical abstract: Two new layered cadmium iodates Cd(IO 3 )X (X=Cl, OH) are reported. Cd(IO 3 )Cl features a unique double layered structure whereas Cd(IO 3 )(OH) displays an ordinary layered structure. - Highlights: • Two new layered cadmium iodates Cd(IO 3 )X (X=Cl, OH) are reported. • Cd(IO 3 )Cl features a unique double layered structure. • Cd(IO 3 )(OH) displays an ordinary layered structure. • The spectroscopic and thermal properties have been studied in detail

  16. Building IoT Applications with Raspberry Pi and Low Power IQRF Communication Modules

    Directory of Open Access Journals (Sweden)

    Isidro Calvo

    2016-09-01

    Full Text Available Typical Internet of Things (IoT applications involve collecting information automatically from diverse geographically-distributed smart sensors and concentrating the information into more powerful computers. The Raspberry Pi platform has become a very interesting choice for IoT applications for several reasons: (1 good computing power/cost ratio; (2 high availability; it has become a de facto hardware standard; and (3 ease of use; it is based on operating systems with a big community of users. In IoT applications, data are frequently carried by means of wireless sensor networks in which energy consumption is a key issue. Energy consumption is especially relevant for smart sensors that are scattered over wide geographical areas and may need to work unattended on batteries for long intervals of time. In this scenario, it is convenient to ease the construction of IoT applications while keeping energy consumption to a minimum at the sensors. This work proposes a possible gateway implementation with specific technologies. It solves the following research question: how to build gateways for IoT applications with Raspberry Pi and low power IQRF communication modules. The following contributions are presented: (1 one architecture for IoT gateways that integrates data from sensor nodes into a higher level application based on low-cost/low-energy technologies; (2 bindings in Java and C that ease the construction of IoT applications; (3 an empirical model that describes the consumption of the communications at the nodes (smart sensors and allows scaling their batteries; and (4 validation of the proposed energy model at the battery-operated nodes.

  17. Organic Aerosols as Cloud Condensation Nuclei

    Science.gov (United States)

    Hudson, J. G.

    2002-05-01

    The large organic component of the atmospheric aerosol contributes to both natural and anthropogenic cloud condensation nuclei (CCN). Moreover, some organic substances may reduce droplet surface tension (Facchini et al. 1999), while others may be partially soluble (Laaksonen et al. 1998), and others may inhibit water condensation. The interaction of organics with water need to be understood in order to better understand the indirect aerosol effect. Therefore, laboratory CCN spectral measurements of organic aerosols are presented. These are measurements of the critical supersaturation (Sc), the supersaturation needed to produce an activated cloud droplet, as a function of the size of the organic particles. Substances include sodium lauryl (dodecyl) sulfate, oxalic, adipic, pinonic, hexadecanedioic, glutaric, stearic, succinic, phthalic, and benzoic acids. These size-Sc relationships are compared with theoretical and measured size-Sc relationships of common inorganic compounds (e.g., NaCl, KI, ammonium and calcium sulfate). Unlike most inorganics some organics display variations in solubility per unit mass as a function of particle size. Those showing relatively greater solubility at smaller sizes may be attributable to surface tension reduction, which is greater for less water dilution, as is the case for smaller particles, which are less diluted at the critical sizes. This was the case for sodium dodecyl sulfate, which does reduce surface tension. Relatively greater solubility for larger particles may be caused by greater dissolution at the higher dilutions that occur with larger particles; this is partial solubility. Measurements are also presented of internal mixtures of various organic and inorganic substances. These measurements were done with two CCN spectrometers (Hudson 1989) operating simultaneously. These two instruments usually displayed similar results in spite of the fact that they have different flow rates and supersaturation profiles. The degree of

  18. Nanosatellites constellation as an IoT communication platform for near equatorial countries

    Science.gov (United States)

    Narayanasamy, A.; Ahmad, Y. A.; Othman, M.

    2017-11-01

    Anytime, anywhere access for real-time intelligence by Internet of Things (IoT) is changing the way that the whole world will operate as it moves toward data driven technologies. Over the next five years, IoT related devices going to have a dramatic breakthrough in current and new applications, not just on increased efficiency and cost reduction on current system, but it also will make trillion-dollar revenue generation and improve customer satisfaction. IoT communications is the networking of intelligent devices which enables data collection from remote assets. It covers a broad range of technologies and applications which connect to the physical world while allowing key information to be transferred automatically. The current terrestrial wireless communications technologies used to enable this connectivity include GSM, GPRS, 3G, LTE, WIFI, WiMAX and LoRa. These connections occur short to medium range distance however, none of them can cover a whole country or continent and the networks are getting congested with the multiplication of IoT devices. In this study, we discuss a conceptual design of a nanosatellite constellation those can provide a space-based communication platform for IoT devices for near Equatorial countries. The constellation design i.e. the orbital plane and number of satellites and launch deployment concepts are presented.

  19. BSNCare+: A Robust IoT-Oriented Healthcare System with Non-Repudiation Transactions

    Directory of Open Access Journals (Sweden)

    Kuo-Hui Yeh

    2016-12-01

    Full Text Available Recently, the rapid advancement in technologies of modern intelligent objects has led to a new network paradigm, called the Internet of Things (IoT, in which every networked and automated object has been connected in a pervasive manner. New types of IoT-based application services are thus presented. In a healthcare oriented environment, the usage of IoT has brought opportunities for assisting physicians (or nurses to provide on-demand and real-time body-care services to patients with higher accuracy and better efficiency. However, while IoT-oriented techniques deliver such advantages, they may encounter system security vulnerabilities and patient privacy threats not seen in the past. In this paper, we propose a robust IoT-based healthcare system, called BSNCare+, in which body sensor networks (BSNs are adopted as the underlying communication architecture. In the proposed healthcare system, we exploit lightweight crypto-primitives to construct a secure communication mechanism that does achieve data confidentiality and entity authentication among intelligent body sensors, the mobile gateway and the backend BSN-Care server. In addition, we evaluate the performance of the proposed healthcare system using the Raspberry PI series platform. The results show the practicability and feasibility of BSNCare+.

  20. Java I/O

    CERN Document Server

    Harold, Elliotte Rusty

    2006-01-01

    All of Java's Input/Output (I/O) facilities are based on streams, which provide simple ways to read and write data of different types. Java provides many different kinds of streams, each with its own application. The universe of streams is divided into four largecategories: input streams and output streams, for reading and writing binary data; and readers and writers, for reading and writing textual (character) data. You're almost certainly familiar with the basic kinds of streams--but did you know that there's a CipherInputStream for reading encrypted data? And a ZipOutputStream for automati

  1. Clear as MUD: Generating, Validating and Applying IoT Behaviorial Profiles (Technical Report)

    OpenAIRE

    Hamza, Ayyoob; Ranathunga, Dinesha; Gharakheili, H. Habibi; Roughan, Matthew; Sivaraman, Vijay

    2018-01-01

    IoT devices are increasingly being implicated in cyber-attacks, driving community concern about the risks they pose to critical infrastructure, corporations, and citizens. In order to reduce this risk, the IETF is pushing IoT vendors to develop formal specifications of the intended purpose of their IoT devices, in the form of a Manufacturer Usage Description (MUD), so that their network behavior in any operating environment can be locked down and verified rigorously. This paper aims to assist...

  2. Galileo observations of volcanic plumes on Io

    Science.gov (United States)

    Geissler, P.E.; McMillan, M.T.

    2008-01-01

    Io's volcanic plumes erupt in a dazzling variety of sizes, shapes, colors and opacities. In general, the plumes fall into two classes, representing distinct source gas temperatures. Most of the Galileo imaging observations were of the smaller, more numerous Prometheus-type plumes that are produced when hot flows of silicate lava impinge on volatile surface ices of SO2. Few detections were made of the giant, Pele-type plumes that vent high temperature, sulfur-rich gases from the interior of Io; this was partly because of the insensitivity of Galileo's camera to ultraviolet wavelengths. Both gas and dust spout from plumes of each class. Favorably located gas plumes were detected during eclipse, when Io was in Jupiter's shadow. Dense dust columns were imaged in daylight above several Prometheus-type eruptions, reaching heights typically less than 100 km. Comparisons between eclipse observations, sunlit images, and the record of surface changes show that these optically thick dust columns are much smaller in stature than the corresponding gas plumes but are adequate to produce the observed surface deposits. Mie scattering calculations suggest that these conspicuous dust plumes are made up of coarse grained “ash” particles with radii on the order of 100 nm, and total masses on the order of 106 kg per plume. Long exposure images of Thor in sunlight show a faint outer envelope apparently populated by particles small enough to be carried along with the gas flow, perhaps formed by condensation of sulfurous “snowflakes” as suggested by the plasma instrumentation aboard Galileo as it flew through Thor's plume [Frank, L.A., Paterson, W.R., 2002. J. Geophys. Res. (Space Phys.) 107, doi:10.1029/2002JA009240. 31-1]. If so, the total mass of these fine, nearly invisible particles may be comparable to the mass of the gas, and could account for much of Io's rapid resurfacing.

  3. Extreme Worlds of the Outer Solar System: Dynamic Processes on Uranus & Io

    Science.gov (United States)

    Kleer, Katherine Rebecca de

    A central goal of planetary science is the creation of a framework within which the properties of each solar system body can be understood as the product of initial conditions acted on by fundamental physical processes. The solar system's extreme worlds -- those objects that lie at the far ends of the spectrum in terms of planetary environment -- bring to light our misconceptions and present us with opportunities to expand and generalize this framework. Unraveling the processes at work in diverse planetary environments contextualizes our understanding of Earth, and provides a basis for interpreting specific signatures from planets beyond our own solar system. Uranus and Io, with their unusual planetary environments, present two examples of such worlds in the outer solar system. Uranus, one of the outer solar system's ice giants, produces an anomalously low heat flow and orbits the sun on its side. Its relative lack of bright storm features and its bizarre multi-decadal seasons provide insight into the relative effects of internal heat flow and time- varying solar insolation on atmospheric dynamics, while its narrow rings composed of dark, macroscopic particles encode the history of bombardment and satellite disruption within the system. Jupiter's moon Io hosts the most extreme volcanic activity anywhere in the solar system. Its tidally-powered geological activity provides a window into this satellite's interior, permitting rare and valuable investigations into the exchange of heat and materials between interiors and surfaces. In particular, Io provides a laboratory for studying the process of tidal heating, which shapes planets and satellites in our solar system and beyond. A comparison between Earth and Io contextualizes the volcanism at work on our home planet, revealing the effects of planetary size, atmospheric density, and plate tectonics on the style and mechanisms of geological activity. This dissertation investigates the processes at work on these solar

  4. Lemon : An MPI parallel I/O library for data encapsulation using LIME

    NARCIS (Netherlands)

    Deuzeman, Albert; Reker, Siebren; Urbach, Carsten

    We introduce Lemon, an MPI parallel I/O library that provides efficient parallel I/O of both binary and metadata on massively parallel architectures. Motivated by the demands of the lattice Quantum Chromodynamics community, the data is stored in the SciDAC Lattice QCD Interchange Message

  5. Aplikasi Rekomendasi Pola Makan Berbasis iOS

    Directory of Open Access Journals (Sweden)

    Afan Galih Salman

    2012-12-01

    Full Text Available The goal for implementing this system is to help users manage and track history about their eat pattern, choose proper food for body’s need, and pick restaurants. Methodology used for this research contains three parts, which is analysis, design, and literature study. In requirement analysis, we do some interview withnutritionist and food provider, analysis iOS user, compare with same kind of application, and identify components that we need. In design method, we use Unified Modelling Language approach, ERD design, and user interface design. The result is a food planning mobile application with iOS platform. This application canhelp user manage and track their eat pattern, help user choose balanced food that suitable for their body, and inform user where they can get food they plan to eat.

  6. Classification of Volcanic Eruptions on Io and Earth Using Low-Resolution Remote Sensing Data

    Science.gov (United States)

    Davies, A. G.; Keszthelyi, L. P.

    2005-01-01

    Two bodies in the Solar System exhibit high-temperature active volcanism: Earth and Io. While there are important differences in the eruptions on Earth and Io, in low-spatial-resolution data (corresponding to the bulk of available and foreseeable data of Io), similar styles of effusive and explosive volcanism yield similar thermal flux densities. For example, a square metre of an active pahoehoe flow on Io looks very similar to a square metre of an active pahoehoe flow on Earth. If, from observed thermal emission as a function of wavelength and change in thermal emission with time, the eruption style of an ionian volcano can be constrained, estimates of volumetric fluxes can be made and compared with terrestrial volcanoes using techniques derived for analysing terrestrial remotely-sensed data. In this way we find that ionian volcanoes fundamentally differ from their terrestrial counterparts only in areal extent, with Io volcanoes covering larger areas, with higher volumetric flux. Io outbursts eruptions have enormous implied volumetric fluxes, and may scale with terrestrial flood basalt eruptions. Even with the low-spatial resolution data available it is possible to sometimes constrain and classify eruption style both on Io and Earth from the integrated thermal emission spectrum. Plotting 2 and 5 m fluxes reveals the evolution of individual eruptions of different styles, as well as the relative intensity of eruptions, allowing comparison to be made from individual eruptions on both planets. Analyses like this can be used for interpretation of low-resolution data until the next mission to the jovian system. For a number of Io volcanoes (including Pele, Prometheus, Amirani, Zamama, Culann, Tohil and Tvashtar) we do have high/moderate resolution imagery to aid determination of eruption mode from analyses based only on low spatial-resolution data.

  7. Give me a hint: An ID-free small data transmission protocol for dense IoT devices

    OpenAIRE

    Ren, Yi; Wu, Ren-Jie; Huang, Teng-Wei; Tseng, Yu-Chee

    2017-01-01

    IoT (Internet of Things) has attracted a lot of attention recently. IoT devices need to report their data or status to base stations at various frequencies. The IoT communications observed by a base station normally exhibit the following characteristics: (1) massively connected, (2) lightly loaded per packet, and (3) periodical or at least mostly predictable. The current design principals of communication networks, when applied to IoT scenarios, however, do not fit well to these requirements....

  8. Formation of Massive Molecular Cloud Cores by Cloud-cloud Collision

    OpenAIRE

    Inoue, Tsuyoshi; Fukui, Yasuo

    2013-01-01

    Recent observations of molecular clouds around rich massive star clusters including NGC3603, Westerlund 2, and M20 revealed that the formation of massive stars could be triggered by a cloud-cloud collision. By using three-dimensional, isothermal, magnetohydrodynamics simulations with the effect of self-gravity, we demonstrate that massive, gravitationally unstable, molecular cloud cores are formed behind the strong shock waves induced by the cloud-cloud collision. We find that the massive mol...

  9. Theoretical modelling of the movement of sodium fire fumes in a building

    International Nuclear Information System (INIS)

    Vaughan, G.J.; Simpson, C.P.; Smith, A.G.

    1989-01-01

    The important effect that the thermal hydraulic behaviour in a containment can have on the burning rate of a sodium fire is discussed. To explore the nature of the convective motion induced y the fire and how these might be affected by the containment morphology, calculations with a thermal hydraulic code, PHOENICS, were carried out. This code has also been used to investigate the movement of the smoke cloud produced by a fire to support a study of the use of a venting system. Both studies are reported and some conclusions on the role of thermal hydraulic phenomena on sodium fire investigations are made. (author)

  10. Reproducibility and Variability of I/O Performance on BG/Q: Lessons Learned from a Data Aggregation Algorithm

    Energy Technology Data Exchange (ETDEWEB)

    Tessier, Francois [Argonne National Lab. (ANL), Argonne, IL (United States); Vishwanath, Venkatram [Argonne National Lab. (ANL), Argonne, IL (United States)

    2017-11-28

    Reading and writing data efficiently from different tiers of storage is necessary for most scientific simulations to achieve good performance at scale. Many software solutions have been developed to decrease the I/O bottleneck. One wellknown strategy, in the context of collective I/O operations, is the two-phase I/O scheme. This strategy consists of selecting a subset of processes to aggregate contiguous pieces of data before performing reads/writes. In our previous work, we implemented the two-phase I/O scheme with a MPI-based topology-aware algorithm. Our algorithm showed very good performance at scale compared to the standard I/O libraries such as POSIX I/O and MPI I/O. However, the algorithm had several limitations hindering a satisfying reproducibility of our experiments. In this paper, we extend our work by 1) identifying the obstacles we face to reproduce our experiments and 2) discovering solutions that reduce the unpredictability of our results.

  11. The final Galileo SSI observations of Io: Orbits G28-I33

    Science.gov (United States)

    Turtle, E.P.; Keszthelyi, L.P.; McEwen, A.S.; Radebaugh, J.; Milazzo, M.; Simonelli, D.P.; Geissler, P.; Williams, D.A.; Perry, J.; Jaeger, W.L.; Klaasen, K.P.; Breneman, H.H.; Denk, T.; Phillips, C.B.

    2004-01-01

    We present the observations of Io acquired by the Solid State Imaging (SSI) experiment during the Galileo Millennium Mission (GMM) and the strategy we used to plan the exploration of Io. Despite Galileo's tight restrictions on data volume and downlink capability and several spacecraft and camera anomalies due to the intense radiation close to Jupiter, there were many successful SSI observations during GMM. Four giant, high-latitude plumes, including the largest plume ever observed on Io, were documented over a period of eight months; only faint evidence of such plumes had been seen since the Voyager 2 encounter, despite monitoring by Galileo during the previous five years. Moreover, the source of one of the plumes was Tvashtar Catena, demonstrating that a single site can exhibit remarkably diverse eruption styles - from a curtain of lava fountains, to extensive surface flows, and finally a ??? 400 km high plume - over a relatively short period of time (??? 13 months between orbits 125 and G29). Despite this substantial activity, no evidence of any truly new volcanic center was seen during the six years of Galileo observations. The recent observations also revealed details of mass wasting processes acting on Io. Slumping and landsliding dominate and occur in close proximity to each other, demonstrating spatial variation in material properties over distances of several kilometers. However, despite the ubiquitous evidence for mass wasting, the rate of volcanic resurfacing seems to dominate; the floors of paterae in proximity to mountains are generally free of debris. Finally, the highest resolution observations obtained during Galileo's final encounters with Io provided further evidence for a wide diversity of surface processes at work on Io. ?? 2003 Elsevier Inc. All rights reserved.

  12. IoT-based user-driven service modeling environment for a smart space management system.

    Science.gov (United States)

    Choi, Hoan-Suk; Rhee, Woo-Seop

    2014-11-20

    The existing Internet environment has been extended to the Internet of Things (IoT) as an emerging new paradigm. The IoT connects various physical entities. These entities have communication capability and deploy the observed information to various service areas such as building management, energy-saving systems, surveillance services, and smart homes. These services are designed and developed by professional service providers. Moreover, users' needs have become more complicated and personalized with the spread of user-participation services such as social media and blogging. Therefore, some active users want to create their own services to satisfy their needs, but the existing IoT service-creation environment is difficult for the non-technical user because it requires a programming capability to create a service. To solve this problem, we propose the IoT-based user-driven service modeling environment to provide an easy way to create IoT services. Also, the proposed environment deploys the defined service to another user. Through the personalization and customization of the defined service, the value and dissemination of the service is increased. This environment also provides the ontology-based context-information processing that produces and describes the context information for the IoT-based user-driven service.

  13. SSTL I/O Standard Based Arithmetic Circuits Design on FPGA

    DEFF Research Database (Denmark)

    Goswami, Kavita; Pandey, Bishwajeet; Hussain, Dil muhammed Akbar

    2016-01-01

    -Tiryagbhyam”. SSTL135_R is minimum I/O power consumer. SSTL135_DCI is maximum power consumer. When we use SSTL135_R in place of SSTL12, SSTL12_DCI, SSTL15, and SSTL135_DCI, there is 42.5%, 82.7%, 28.12%, and 72.9% reduction in I/O power at 21oC, 40oC, 53.5oC and 56.7oC. This design is implemented on Artix-7 FPGA...

  14. Case Study: IoT Data Integration for Higher Education Institution

    Directory of Open Access Journals (Sweden)

    Pinka Krišjānis

    2016-12-01

    Full Text Available Nowadays the Internet of Things (IoT is one of the most trending technologies. It is expected that by year 2020 there will be 50 billion of Internet-connected devices. Fields like smart cities and smart homes largely rely on IoT phenomena by using a wide variety of sensors for data collection, analysis and corresponding actions. The paper describes how this trending and relatively new technology is applied at Riga Technical University for educational purposes.

  15. A Dynamic Processing System for Sensor Data in IoT

    OpenAIRE

    Li, Minbo; Liu, Yanling; Cai, Yuanfeng

    2015-01-01

    With the development of the Internet of Things (IoT for short), innumerable Wireless Sensor Networks (WSNs) are deployed to capture the information of environmental status in the surrounding physical environment. The data from WSNs, called sensor data, are generated in high frequency. Similar to data of other open-loop applications, for example, network monitoring data, sensor data are heterogeneous, redundant, real-time, massive, and streaming. Hence, sensor data cannot be treated as the IoT...

  16. EVIO - A lightweight object-oriented I/O package

    International Nuclear Information System (INIS)

    Wolin, E.; Abbott, D.; Gurjyan, V.; Heyes, G.; Jastrzembski, E.; Lawrence, D.; Timmer, C.

    2008-01-01

    The EVIO package implements I/O between disk and an in-memory hierarchical object tree. Tree nodes are either container nodes, holding other nodes, or leaf nodes, containing any amount of data of a single type (int64 t ,..., int8 t , float, double, and string). Trees can easily be constructed using factory methods and stream operators; queried using STL-like algorithms, function object, etc; or modified using tree or node methods. The tree logically maps to XML, and utilities exist to transform between binary and ASCII XML formats. The binary representation is compact, I/O is simple and efficient, and endian conversions are handled automatically. EVIO will be used by the next generation of experiments at Jefferson Lab.

  17. mIoT Slice for 5G Systems: Design and Performance Evaluation.

    Science.gov (United States)

    Trivisonno, Riccardo; Condoluci, Massimo; An, Xueli; Mahmoodi, Toktam

    2018-02-21

    Network slicing is a key feature of the upcoming 5G networks allowing the design and deployment of customized communication systems to integrate services provided by vertical industries. In this context, massive Internet of Things (mIoT) is regarded as a compelling use case, both for its relevance from business perspective, and for the technical challenges it poses to network design. With their envisaged massive deployment of devices requiring sporadic connectivity and small data transmission, yet Quality of Service (QoS) constrained, mIoT services will need an ad-hoc end-to-end (E2E) slice, i.e., both access and core network with enhanced Control and User planes (CP/UP). After revising the key requirements of mIoT and identifying major shortcomings of previous generation networks, this paper presents and evaluates an E2E mIoT network slicing solution, featuring a new connectivity model overcoming the load limitations of legacy systems. Unique in its kind, this paper addresses mIoT requirements from an end-to-end perspective highlighting and solving, unlike most prior related work, the connectivity challenges posed to the core network. Results demonstrate that the proposed solution, reducing CP signaling and optimizing UP resource utilization, is a suitable candidate for next generation network standards to efficiently handle massive device deployment.

  18. Microservices in Web Objects Enabled IoT Environment for Enhancing Reusability.

    Science.gov (United States)

    Jarwar, Muhammad Aslam; Kibria, Muhammad Golam; Ali, Sajjad; Chong, Ilyoung

    2018-01-26

    In the ubiquitous Internet of Things (IoT) environment, reusing objects instead of creating new one has become important in academics and industries. The situation becomes complex due to the availability of a huge number of connected IoT objects, and each individual service creates a new object instead of reusing the existing one to fulfill a requirement. A well-standard mechanism not only improves the reusability of objects but also improves service modularity and extensibility, and reduces cost. Web Objects enabled IoT environment applies the principle of reusability of objects in multiple IoT application domains through central objects repository and microservices. To reuse objects with microservices and to maintain a relationship with them, this study presents an architecture of Web of Objects platform. In the case of a similar request for an object, the already instantiated object that exists in the same or from other domain can be reused. Reuse of objects through microservices avoids duplications, and reduces time to search and instantiate them from their registries. Further, this article presents an algorithm for microservices and related objects discovery that considers the reusability of objects through the central objects repository. To support the reusability of objects, the necessary algorithm for objects matching is also presented. To realize the reusability of objects in Web Objects enabled IoT environment, a prototype has been designed and implemented based on a use case scenario. Finally, the results of the prototype have been analyzed and discussed to validate the proposed approach.

  19. Microservices in Web Objects Enabled IoT Environment for Enhancing Reusability

    Directory of Open Access Journals (Sweden)

    Muhammad Aslam Jarwar

    2018-01-01

    Full Text Available In the ubiquitous Internet of Things (IoT environment, reusing objects instead of creating new one has become important in academics and industries. The situation becomes complex due to the availability of a huge number of connected IoT objects, and each individual service creates a new object instead of reusing the existing one to fulfill a requirement. A well-standard mechanism not only improves the reusability of objects but also improves service modularity and extensibility, and reduces cost. Web Objects enabled IoT environment applies the principle of reusability of objects in multiple IoT application domains through central objects repository and microservices. To reuse objects with microservices and to maintain a relationship with them, this study presents an architecture of Web of Objects platform. In the case of a similar request for an object, the already instantiated object that exists in the same or from other domain can be reused. Reuse of objects through microservices avoids duplications, and reduces time to search and instantiate them from their registries. Further, this article presents an algorithm for microservices and related objects discovery that considers the reusability of objects through the central objects repository. To support the reusability of objects, the necessary algorithm for objects matching is also presented. To realize the reusability of objects in Web Objects enabled IoT environment, a prototype has been designed and implemented based on a use case scenario. Finally, the results of the prototype have been analyzed and discussed to validate the proposed approach.

  20. Book Review: iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

    Directory of Open Access Journals (Sweden)

    Schulte Christopher

    2011-12-01

    Full Text Available Hoog, A., & Strzempka, K. (2011. iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Waltham, MA: Syngress. 336 pages, ISBN: 978-1-59749-659-9, US$69.95.Reviewed by Christopher Schulte, EnCE & ACE, LuciData Inc., Minneapolis, Minnesota (cschulte@lucidatainc.comThese are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers continue to bring new and sometimes hair-pulling challenges into our labs and on-site engagements, research and understanding of these tiny computers is increasing at what seems an exponential rate. This is especially true in the iOS (Apple Computer’s mobile operating system that powers the iPhone, iPad, iPod Touch and Apple TV space. The diligent work of talented computer scientists in this field allows examiners everywhere to reap the benefits of easier, faster and more effective examinations that yield more accurate and defendable results.(see PDF for full review

  1. Instructor/Operator Station (IOS) Design Guide.

    Science.gov (United States)

    1988-02-01

    INSTRUTOR /OPERATOR STATION (IOS) AI O...The three functional categories also define three different users in terms of jobs and qualifications (if the functions have been allocated to manual ...function manually (e.g., collect the data S required from schedules, printed course outlines and telephone calls to training and facility managers).

  2. Two Decades (almost) of Keck Observations of Io

    Science.gov (United States)

    De Pater, I.; Davies, A. G.; de Kleer, K.

    2015-12-01

    We have regularly observed Io with the 10-m Keck Telescope since 1998, initially using the speckle imaging technique, and switching to Adaptive Optics techniques when this became available in 2001. In this talk we will discuss several eruptions that we witnessed, and present 20-30 year timelines of thermal emission from Pele, Pillan, Janus Patera, Kanehekili Fluctus, and Loki Patera, updating timelines in recent publications [1, 2] with additional Keck adaptive optics data obtained between 2002 and 2015. These new timelines are the most comprehensive plots ever produced of the volcanic thermal emission variability for these or any other locations on Io, utilizing data from multiple ground- and space-based assets. Our continuing multi-decadal observing program forms the basis for charting the variability of Io's volcanic activity, of great importance for understanding the evolution of the Galilean satellite system, and with the expectation of new missions to the jovian system in the next decade. Acknowledgements: This research is in part supported by NSF grant AST-1313485 to UC Berkeley. AGD is supported by a grant from the NASA OPR Program. References: [1] Davies et al. (2012) Icarus, 221, 466-470. [2] Rathbun and Spencer (2010) Icarus, 209, 625-630.

  3. A self-supporting wireless IoT node that uses kinetic energy harvesting

    DEFF Research Database (Denmark)

    Lynggaard, Per

    2017-01-01

    The Internet-of-Things (IoT) is expected to be the next revolution of the internet where trillions of IoT nodes will be deployed on a global scale. It is foreseen that a considerable part of these will be deployed in smart buildings and smart homes where they will provide innovative solutions...

  4. Relationship between cloud radiative forcing, cloud fraction and cloud albedo, and new surface-based approach for determining cloud albedo

    OpenAIRE

    Y. Liu; W. Wu; M. P. Jensen; T. Toto

    2011-01-01

    This paper focuses on three interconnected topics: (1) quantitative relationship between surface shortwave cloud radiative forcing, cloud fraction, and cloud albedo; (2) surfaced-based approach for measuring cloud albedo; (3) multiscale (diurnal, annual and inter-annual) variations and covariations of surface shortwave cloud radiative forcing, cloud fraction, and cloud albedo. An analytical expression is first derived to quantify the relationship between cloud radiative forcing, cloud fractio...

  5. Linear SVM-Based Android Malware Detection for Reliable IoT Services

    Directory of Open Access Journals (Sweden)

    Hyo-Sik Ham

    2014-01-01

    Full Text Available Current many Internet of Things (IoT services are monitored and controlled through smartphone applications. By combining IoT with smartphones, many convenient IoT services have been provided to users. However, there are adverse underlying effects in such services including invasion of privacy and information leakage. In most cases, mobile devices have become cluttered with important personal user information as various services and contents are provided through them. Accordingly, attackers are expanding the scope of their attacks beyond the existing PC and Internet environment into mobile devices. In this paper, we apply a linear support vector machine (SVM to detect Android malware and compare the malware detection performance of SVM with that of other machine learning classifiers. Through experimental validation, we show that the SVM outperforms other machine learning classifiers.

  6. IoT-Based Library Automation and Monitoring system: Developing an Implementation framework of Implementation

    OpenAIRE

    Bayani, Majid; Segura, Alberto; Alvarado, Marjorie; Loaiza, Mayra

    2018-01-01

    Currently, the Information and Communication Technology (ICT) and related topics such as Internet of Things (IoT) have an essential influence on all elements of human life. IoT as a prevalent phenomenon is transforming daily life by the usage of the smart features of Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) technologies. As IoT progresses, it has extended in size and dimension, improving many contexts of the society; such as, the traditional library system. This...

  7. The Holistic Targeting (HOT) methodology as the means to improve Information Operations (IO) target development and prioritization

    OpenAIRE

    Ieva, Christopher S.

    2008-01-01

    Prioritization. In response to this challenge, this study proposes five recommendations to enhance IO integration into the Joint Targeting Cycle: the use of interim IO Joint Munitions Effectiveness Manual (JMEM) techniques to better forecast cognitive effects, the adoption of the Measure of Worth (MOW) model to assess IO effects, the HOT methodology to develop and prioritize IO targets, the use of compendium software facilitate targeting problem understanding and the network analysis to...

  8. A Software Product Line Process to Develop Agents for the IoT

    Directory of Open Access Journals (Sweden)

    Inmaculada Ayala

    2015-07-01

    Full Text Available One of the most important challenges of this decade is the Internet of Things (IoT, which aims to enable things to be connected anytime, anyplace, with anything and anyone, ideally using any path/network and any service. IoT systems are usually composed of heterogeneous and interconnected lightweight devices that support applications that are subject to change in their external environment and in the functioning of these devices. The management of the variability of these changes, autonomously, is a challenge in the development of these systems. Agents are a good option for developing self-managed IoT systems due to their distributed nature, context-awareness and self-adaptation. Our goal is to enhance the development of IoT applications using agents and software product lines (SPL. Specifically, we propose to use Self-StarMASMAS, multi-agent system agents and to define an SPL process using the Common Variability Language. In this contribution, we propose an SPL process for Self-StarMAS, paying particular attention to agents embedded in sensor motes.

  9. A Software Product Line Process to Develop Agents for the IoT.

    Science.gov (United States)

    Ayala, Inmaculada; Amor, Mercedes; Fuentes, Lidia; Troya, José M

    2015-07-01

    One of the most important challenges of this decade is the Internet of Things (IoT), which aims to enable things to be connected anytime, anyplace, with anything and anyone, ideally using any path/network and any service. IoT systems are usually composed of heterogeneous and interconnected lightweight devices that support applications that are subject to change in their external environment and in the functioning of these devices. The management of the variability of these changes, autonomously, is a challenge in the development of these systems. Agents are a good option for developing self-managed IoT systems due to their distributed nature, context-awareness and self-adaptation. Our goal is to enhance the development of IoT applications using agents and software product lines (SPL). Specifically, we propose to use Self-StarMASMAS, multi-agent system) agents and to define an SPL process using the Common Variability Language. In this contribution, we propose an SPL process for Self-StarMAS, paying particular attention to agents embedded in sensor motes.

  10. Learn Objective-C on the Mac for OS X and iOS

    CERN Document Server

    Knaster, Scott; Malik, Waqar

    2012-01-01

    Learn to write apps for some of today's hottest technologies, including the iPhone and iPad (using iOS), as well as the Mac (using OS X). It starts with Objective-C, the base language on which the native iOS software development kit (SDK) and the OS X are based. Learn Objective-C on the Mac: For OS X and iOS, Second Edition updates a best selling book and is an extensive, newly updated guide to Objective-C. Objective-C is a powerful, object-oriented extension of C, making this update the perfect follow-up to Dave Mark's bestselling Learn C on the Mac. Whether you're an experienced C programmer

  11. Enabling interoperability-as-a-service for connected IoT infrastructures and Smart Objects

    DEFF Research Database (Denmark)

    Hovstø, Asbjørn; Guan, Yajuan; Quintero, Juan Carlos Vasquez

    2018-01-01

    Lack of interoperability is considered as the most important barrier to achieve the global integration of Internet-of-Things (IoT) ecosystems across borders of different disciplines, vendors and standards. Indeed, the current IoT landscape consists of a large set of non-interoperable infrastructu...

  12. Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems

    Directory of Open Access Journals (Sweden)

    Yao Pan

    2017-03-01

    Full Text Available The Internet of Things (IoT has transformed many aspects of modern manufacturing, from design to production to quality control. In particular, IoT and digital manufacturing technologies have substantially accelerated product development- cycles and manufacturers can now create products of a complexity and precision not heretofore possible. New threats to supply chain security have arisen from connecting machines to the Internet and introducing complex IoT-based systems controlling manufacturing processes. By attacking these IoT-based manufacturing systems and tampering with digital files, attackers can manipulate physical characteristics of parts and change the dimensions, shapes, or mechanical properties of the parts, which can result in parts that fail in the field. These defects increase manufacturing costs and allow silent problems to occur only under certain loads that can threaten safety and/or lives. To understand potential dangers and protect manufacturing system safety, this paper presents two taxonomies: one for classifying cyber-physical attacks against manufacturing processes and another for quality control measures for counteracting these attacks. We systematically identify and classify possible cyber-physical attacks and connect the attacks with variations in manufacturing processes and quality control measures. Our taxonomies also provide a scheme for linking emerging IoT-based manufacturing system vulnerabilities to possible attacks and quality control measures.

  13. Enhancing Coverage in Narrow Band-IoT Using Machine Learning

    OpenAIRE

    Chafii , Marwa; Bader , Faouzi; Palicot , Jacques

    2018-01-01

    International audience; —Narrow Band-Internet of Thing (NB-IoT) is a recently proposed technology by 3GPP in Release-13. It provides low energy consumption and wide coverage in order to meet the requirements of its diverse applications that span social, industrial and environmental aspects. Increasing the number of repetitions of the transmission has been selected as a promising approach to enhance the coverage in NB-IoT up to 164 dB in terms of maximum coupling loss for uplink transmissions,...

  14. Towards Understanding of IoT Ecosystems in the Healthcare Sector

    OpenAIRE

    Pesonen, Ari; Sulin, Jussi

    2016-01-01

    This study aimed to outline an ecosystem to IoT based health/elderly care solutions and to the needs of both single actors and the whole ecosystem. Moreover, the aim was to understand the relations and dynamics between different actors in this ecosystem. The research questions for this study were: 1. How do industry professionals perceive the current state of health care? 2. How do the digitalization and IoT affect the health sector, and what advancements are needed to speed up the proces...

  15. An ARM-Compliant Architecture for User Privacy in Smart Cities: SMARTIE—Quality by Design in the IoT

    Directory of Open Access Journals (Sweden)

    V. Beltran

    2017-01-01

    Full Text Available Much has been said about the benefits that the Internet of Things (IoT will bring to citizens’ life. Countless smart objects will be soon offering autonomous behavior in smart environments by sensing the physical world around us, collecting information about us, and taking proactive actions (many times without our consent with the ultimate goal of improving our wellness. Without a strong guarantee on user privacy, the IoT may sound scary for many citizens. Indeed, the IoT-Architecture Reference Model (IoT-ARM is a European effort for promoting IoT quality aspects such as security and privacy. This paper paves the way to the adoption of reference architectures by describing the application of the IoT-ARM within a European-funded project, SMARTIE. The SMARTIE architecture has been designed to empower citizens to take control of their IoT devices and privacy, while guaranteeing scalability for large deployments in smart cities.

  16. Modeling IoT-Based Solutions Using Human-Centric Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Álvaro Monares

    2014-08-01

    Full Text Available The Internet of Things (IoT has inspired solutions that are already available for addressing problems in various application scenarios, such as healthcare, security, emergency support and tourism. However, there is no clear approach to modeling these systems and envisioning their capabilities at the design time. Therefore, the process of designing these systems is ad hoc and its real impact is evaluated once the solution is already implemented, which is risky and expensive. This paper proposes a modeling approach that uses human-centric wireless sensor networks to specify and evaluate models of IoT-based systems at the time of design, avoiding the need to spend time and effort on early implementations of immature designs. It allows designers to focus on the system design, leaving the implementation decisions for a next phase. The article illustrates the usefulness of this proposal through a running example, showing the design of an IoT-based solution to support the first responses during medium-sized or large urban incidents. The case study used in the proposal evaluation is based on a real train crash. The proposed modeling approach can be used to design IoT-based systems for other application scenarios, e.g., to support security operatives or monitor chronic patients in their homes.

  17. Modeling IoT-based solutions using human-centric wireless sensor networks.

    Science.gov (United States)

    Monares, Álvaro; Ochoa, Sergio F; Santos, Rodrigo; Orozco, Javier; Meseguer, Roc

    2014-08-25

    The Internet of Things (IoT) has inspired solutions that are already available for addressing problems in various application scenarios, such as healthcare, security, emergency support and tourism. However, there is no clear approach to modeling these systems and envisioning their capabilities at the design time. Therefore, the process of designing these systems is ad hoc and its real impact is evaluated once the solution is already implemented, which is risky and expensive. This paper proposes a modeling approach that uses human-centric wireless sensor networks to specify and evaluate models of IoT-based systems at the time of design, avoiding the need to spend time and effort on early implementations of immature designs. It allows designers to focus on the system design, leaving the implementation decisions for a next phase. The article illustrates the usefulness of this proposal through a running example, showing the design of an IoT-based solution to support the first responses during medium-sized or large urban incidents. The case study used in the proposal evaluation is based on a real train crash. The proposed modeling approach can be used to design IoT-based systems for other application scenarios, e.g., to support security operatives or monitor chronic patients in their homes.

  18. Active Volcanism on Io as Seen by Galileo SSI

    Science.gov (United States)

    McEwen, A.S.; Keszthelyi, L.; Geissler, P.; Simonelli, D.P.; Carr, M.H.; Johnson, T.V.; Klaasen, K.P.; Breneman, H.H.; Jones, T.J.; Kaufman, J.M.; Magee, K.P.; Senske, D.A.; Belton, M.J.S.; Schubert, G.

    1998-01-01

    Active volcanism on Io has been monitored during the nominal Galileo satellite tour from mid 1996 through late 1997. The Solid State Imaging (SSI) experiment was able to observe many manifestations of this active volcanism, including (1) changes in the color and albedo of the surface, (2) active airborne plumes, and (3) glowing vents seen in eclipse. About 30 large-scale (tens of kilometers) surface changes are obvious from comparison of the SSI images to those acquired by Voyager in 1979. These include new pyroclastic deposits of several colors, bright and dark flows, and caldera-floor materials. There have also been significant surface changes on Io during the Galileo mission itself, such as a new 400-km-diameter dark pyroclastic deposit around Pillan Patera. While these surface changes are impressive, the number of large-scale changes observed in the four months between the Voyager 1 and Voyager 2 flybys in 1979 suggested that over 17 years the cumulative changes would have been much more impressive. There are two reasons why this was not actually the case. First, it appears that the most widespread plume deposits are ephemeral and seem to disappear within a few years. Second, it appears that a large fraction of the volcanic activity is confined to repeated resurfacing of dark calderas and flow fields that cover only a few percent of Io's surface. The plume monitoring has revealed 10 active plumes, comparable to the 9 plumes observed by Voyager. One of these plumes was visible only in the first orbit and three became active in the later orbits. Only the Prometheus plume has been consistently active and easy to detect. Observations of the Pele plume have been particularly intriguing since it was detected only once by SSI, despite repeated attempts, but has been detected several times by the Hubble Space Telescope at 255 nm. Pele's plume is much taller (460 km) than during Voyager 1 (300 km) and much fainter at visible wavelengths. Prometheus-type plumes (50

  19. Adopting the Essence Framework to Derive a Practice Library for the Development of IoT Systems

    NARCIS (Netherlands)

    Giray, Görkem; Tekinerdogan, B.; Tüzün, E.

    2018-01-01

    The Internet of Things (IoT) is a global network of smart devices which enables these objects to collect and exchange data. Research in the IoT is still progressing, and it is now being applied in various domains. One of the key observations is that the development of IoT systems is not trivial and

  20. The Role of Internet of Things (IoT in Smart Cities: Technology Roadmap-oriented Approaches

    Directory of Open Access Journals (Sweden)

    Eunil Park

    2018-05-01

    Full Text Available Since the concept of a smart city was introduced, IoT (Internet of Things has beenconsidered the key infrastructure in a smart city. However, there are currently no detailed explanations of the technical contributions of IoT in terms of the management, development, and improvements of smart cities. Therefore, the current study describes the importance of IoT technologies on the technology roadmap (TRM of a smart city. Moreover, the survey with about 200 experts was conducted to investigate both the importance and essentiality of detail components of IoT technologies for a smart city. Based on the survey results, the focal points and essential elements for the successful developments of a smart city are presented.

  1. Optimizing mission critical data dissemination in massive IoT networks

    KAUST Repository

    Farooq, Muhammad Junaid

    2017-06-29

    Mission critical data dissemination in massive Internet of things (IoT) networks imposes constraints on the message transfer delay between devices. Due to low power and communication range of IoT devices, data is foreseen to be relayed over multiple device-to-device (D2D) links before reaching the destination. The coexistence of a massive number of IoT devices poses a challenge in maximizing the successful transmission capacity of the overall network alongside reducing the multi-hop transmission delay in order to support mission critical applications. There is a delicate interplay between the carrier sensing threshold of the contention based medium access protocol and the choice of packet forwarding strategy selected at each hop by the devices. The fundamental problem in optimizing the performance of such networks is to balance the tradeoff between conflicting performance objectives such as the spatial frequency reuse, transmission quality, and packet progress towards the destination. In this paper, we use a stochastic geometry approach to quantify the performance of multi-hop massive IoT networks in terms of the spatial frequency reuse and the transmission quality under different packet forwarding schemes. We also develop a comprehensive performance metric that can be used to optimize the system to achieve the best performance. The results can be used to select the best forwarding scheme and tune the carrier sensing threshold to optimize the performance of the network according to the delay constraints and transmission quality requirements.

  2. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    OpenAIRE

    Luis Cruz-Piris; Diego Rivera; Ivan Marsa-Maestre; Enrique de la Hoz; Juan R. Velasco

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to o...

  3. Security and Privacy Issues for an IoT based Smart Home

    OpenAIRE

    GENEIATAKIS DIMITRIOS; KOUNELIS IOANNIS; NEISSE RICARDO; NAI FOVINO IGOR; STERI GARY; BALDINI GIANMARCO

    2017-01-01

    Internet of Things (IoT) can support numerous applications and services in various domains, such as smart cities and smart homes. IoT smart objects interact with other components e.g., proxies, mobile devices, and data collectors, for management, data sharing and other activities in the context of the provided service. Though such components contribute to address various societal challenges and provide new advanced services for users, their limited processing capabilities make them vulnerable...

  4. Izrada 2D video igre za iOS platformu

    OpenAIRE

    Kampuš, Dominik

    2016-01-01

    Tema ovog završnog rada temelji se na izradi 2D video igre za iOS mobilni uređaj te njezinoj demonstraciji na istom. Kroz rad su opisane sve bitne funkcije GameSalad Creator-a koje su potrebne kod izrade igre bazirane na 2 dimenzije. Također se prolazi kroz iOS operativni sustav, što je on i kako se razvijao. Spominje se i tema koja govori općenito o igrama na mobilnim uređajima. U završnom dijelu rada prikazan je postupak izrade, koje funkcije programa se točno koriste i kako se igra može te...

  5. Solubilities of sodium nitrate, sodium nitrite, and sodium aluminate in simulated nuclear waste

    International Nuclear Information System (INIS)

    Reynolds, D.A.; Herting, D.L.

    1984-09-01

    Solubilities were determined for sodium nitrate, sodium nitrite, and sodium aluminate in synthetic nuclear waste liquor. Solubilities were determined as a function of temperature and solution composition (concentrations of sodium hydroxide, sodium nitrate, sodium nitrite, and sodium aluminate). Temperature had the greatest effect on the solubilities of sodium nitrate and sodium nitrite and a somewhat lesser effect on sodium aluminate solubility. Hydroxide had a great effect on the solubilities of all three salts. Other solution components had minor effects. 2 references, 8 figures, 11 tables

  6. An IoT virtualization Framework for Fast and Lossless Communication

    DEFF Research Database (Denmark)

    Patil, Sulakshana; Mihovska, Albena D.; Prasad, Ramjee

    2014-01-01

    enough and lossless. The virtualization of the network allows for low computational complexity and improved processing efficiency. The various contributions have been made in the applications that were found by IoT. The proposed global framework controls data transmission delay, reduces the data loss......An internet of things (IoT) scenario is characterized by heterogeneity found in the types of participating nodes, networks and type of data exchange. This creates a complicated scenario in relation to decision making, management and reliability. The proposed paper focuses on the design...

  7. Getting priorities straight: improving Linux support for database I/O

    DEFF Research Database (Denmark)

    Hall, Christoffer; Bonnet, Philippe

    2005-01-01

    The Linux 2.6 kernel supports asynchronous I/O as a result of propositions from the database industry. This is a positive evolution but is it a panacea? In the context of the Badger project, a collaboration between MySQL AB and University of Copenhagen, ......The Linux 2.6 kernel supports asynchronous I/O as a result of propositions from the database industry. This is a positive evolution but is it a panacea? In the context of the Badger project, a collaboration between MySQL AB and University of Copenhagen, ...

  8. Cloud-Top Entrainment in Stratocumulus Clouds

    Science.gov (United States)

    Mellado, Juan Pedro

    2017-01-01

    Cloud entrainment, the mixing between cloudy and clear air at the boundary of clouds, constitutes one paradigm for the relevance of small scales in the Earth system: By regulating cloud lifetimes, meter- and submeter-scale processes at cloud boundaries can influence planetary-scale properties. Understanding cloud entrainment is difficult given the complexity and diversity of the associated phenomena, which include turbulence entrainment within a stratified medium, convective instabilities driven by radiative and evaporative cooling, shear instabilities, and cloud microphysics. Obtaining accurate data at the required small scales is also challenging, for both simulations and measurements. During the past few decades, however, high-resolution simulations and measurements have greatly advanced our understanding of the main mechanisms controlling cloud entrainment. This article reviews some of these advances, focusing on stratocumulus clouds, and indicates remaining challenges.

  9. Cloud type comparisons of AIRS, CloudSat, and CALIPSO cloud height and amount

    Directory of Open Access Journals (Sweden)

    B. H. Kahn

    2008-03-01

    Full Text Available The precision of the two-layer cloud height fields derived from the Atmospheric Infrared Sounder (AIRS is explored and quantified for a five-day set of observations. Coincident profiles of vertical cloud structure by CloudSat, a 94 GHz profiling radar, and the Cloud-Aerosol Lidar and Infrared Pathfinder Satellite Observation (CALIPSO, are compared to AIRS for a wide range of cloud types. Bias and variability in cloud height differences are shown to have dependence on cloud type, height, and amount, as well as whether CloudSat or CALIPSO is used as the comparison standard. The CloudSat-AIRS biases and variability range from −4.3 to 0.5±1.2–3.6 km for all cloud types. Likewise, the CALIPSO-AIRS biases range from 0.6–3.0±1.2–3.6 km (−5.8 to −0.2±0.5–2.7 km for clouds ≥7 km (<7 km. The upper layer of AIRS has the greatest sensitivity to Altocumulus, Altostratus, Cirrus, Cumulonimbus, and Nimbostratus, whereas the lower layer has the greatest sensitivity to Cumulus and Stratocumulus. Although the bias and variability generally decrease with increasing cloud amount, the ability of AIRS to constrain cloud occurrence, height, and amount is demonstrated across all cloud types for many geophysical conditions. In particular, skill is demonstrated for thin Cirrus, as well as some Cumulus and Stratocumulus, cloud types infrared sounders typically struggle to quantify. Furthermore, some improvements in the AIRS Version 5 operational retrieval algorithm are demonstrated. However, limitations in AIRS cloud retrievals are also revealed, including the existence of spurious Cirrus near the tropopause and low cloud layers within Cumulonimbus and Nimbostratus clouds. Likely causes of spurious clouds are identified and the potential for further improvement is discussed.

  10. A comparison of shock-cloud and wind-cloud interactions: effect of increased cloud density contrast on cloud evolution

    Science.gov (United States)

    Goldsmith, K. J. A.; Pittard, J. M.

    2018-05-01

    The similarities, or otherwise, of a shock or wind interacting with a cloud of density contrast χ = 10 were explored in a previous paper. Here, we investigate such interactions with clouds of higher density contrast. We compare the adiabatic hydrodynamic interaction of a Mach 10 shock with a spherical cloud of χ = 103 with that of a cloud embedded in a wind with identical parameters to the post-shock flow. We find that initially there are only minor morphological differences between the shock-cloud and wind-cloud interactions, compared to when χ = 10. However, once the transmitted shock exits the cloud, the development of a turbulent wake and fragmentation of the cloud differs between the two simulations. On increasing the wind Mach number, we note the development of a thin, smooth tail of cloud material, which is then disrupted by the fragmentation of the cloud core and subsequent `mass-loading' of the flow. We find that the normalized cloud mixing time (tmix) is shorter at higher χ. However, a strong Mach number dependence on tmix and the normalized cloud drag time, t_{drag}^' }, is not observed. Mach-number-dependent values of tmix and t_{drag}^' } from comparable shock-cloud interactions converge towards the Mach-number-independent time-scales of the wind-cloud simulations. We find that high χ clouds can be accelerated up to 80-90 per cent of the wind velocity and travel large distances before being significantly mixed. However, complete mixing is not achieved in our simulations and at late times the flow remains perturbed.

  11. Coverage and Capacity Analysis of Sigfox, LoRa, GPRS, and NB-IoT

    DEFF Research Database (Denmark)

    Vejlgaard, Benny; Lauridsen, Mads; Nguyen, Huan Cong

    2017-01-01

    is challenged for indoor coverage. Furthermore, the study analyzes the capacity of the four technologies assuming a traffic growth from 1 to 10 IoT device per user. The conclusion is that the 95 %-tile uplink failure rate for outdoor users is below 5 % for all technologies. For indoor users only NB-IoT provides......In this paper the coverage and capacity of SigFox, LoRa, GPRS, and NB-IoT is compared using a real site deployment covering 8000 km2 in Northern Denmark. Using the existing Telenor cellular site grid it is shown that the four technologies have more than 99 % outdoor coverage, while GPRS...

  12. Cloud Computing, Tieto Cloud Server Model

    OpenAIRE

    Suikkanen, Saara

    2013-01-01

    The purpose of this study is to find out what is cloud computing. To be able to make wise decisions when moving to cloud or considering it, companies need to understand what cloud is consists of. Which model suits best to they company, what should be taken into account before moving to cloud, what is the cloud broker role and also SWOT analysis of cloud? To be able to answer customer requirements and business demands, IT companies should develop and produce new service models. IT house T...

  13. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  14. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Science.gov (United States)

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  15. Geologic mapping of the Amirani-Gish Bar region of Io: Implications for the global geologic mapping of Io

    Science.gov (United States)

    Williams, D.A.; Keszthelyi, L.P.; Crown, D.A.; Jaeger, W.L.; Schenk, P.M.

    2007-01-01

    We produced the first geologic map of the Amirani-Gish Bar region of Io, the last of four regional maps generated from Galileo mission data. The Amirani-Gish Bar region has five primary types of geologic materials: plains, mountains, patera floors, flows, and diffuse deposits. The flows and patera floors are thought to be compositionally similar, but are subdivided based on interpretations regarding their emplacement environments and mechanisms. Our mapping shows that volcanic activity in the Amirani-Gish Bar region is dominated by the Amirani Eruptive Center (AEC), now recognized to be part of an extensive, combined Amirani-Maui flow field. A mappable flow connects Amirani and Maui, suggesting that Maui is fed from Amirani, such that the post-Voyager designation "Maui Eruptive Center" should be revised. Amirani contains at least four hot spots detected by Galileo, and is the source of widespread bright (sulfur?) flows and active dark (silicate?) flows being emplaced in the Promethean style (slowly emplaced, compound flow fields). The floor of Gish Bar Patera has been partially resurfaced by dark lava flows, although other parts of its floor are bright and appeared unchanged during the Galileo mission. This suggests that the floor did not undergo complete resurfacing as a lava lake as proposed for other ionian paterae. There are several other hot spots in the region that are the sources of both active dark flows (confined within paterae), and SO2- and S2-rich diffuse deposits. Mapped diffuse deposits around fractures on mountains and in the plains appear to serve as the source for gas venting without the release of magma, an association previously unrecognized in this region. The six mountains mapped in this region exhibit various states of degradation. In addition to gaining insight into this region of Io, all four maps are studied to assess the best methodology to use to produce a new global geologic map of Io based on the newly released, combined Galileo

  16. Theoretical investigations of the IO,{sup q+} (q = 2, 3, 4) multi-charged ions: Metastability, characterization and spectroscopy

    Energy Technology Data Exchange (ETDEWEB)

    Hammami, H. [Université Paris-Est, Laboratoire Modélisation et Simulation Multi Echelle, MSME UMR 8208 CNRS, 5 bd Descartes, 77454 Marne-la-Vallée (France); EMIR, Institut Préparatoire aux Etudes d’Ingénieurs, Monastir (Tunisia); Yazidi, O. [Laboratoire de Spectroscopie Atomique Moléculaire et Applications, Département de Physique, Faculté des Sciences de Tunis, Université de Tunis-El Manar, Le Belvédère, 1060 Tunis (Tunisia); Ben El Hadj Rhouma, M. [EMIR, Institut Préparatoire aux Etudes d’Ingénieurs, Monastir (Tunisia); Al Mogren, M. M. [Chemistry Department, Faculty of Science, King Saud University, PO Box 2455, Riyadh 11451 (Saudi Arabia); Hochlaf, M., E-mail: hochlaf@univ-mlv.fr [Université Paris-Est, Laboratoire Modélisation et Simulation Multi Echelle, MSME UMR 8208 CNRS, 5 bd Descartes, 77454 Marne-la-Vallée (France)

    2014-07-07

    Using ab initio methodology, we studied the IO{sup q+} (q = 2, 3, 4) multi-charged ions. Benchmark computations on the IO(X{sup 2}Π) neutral species allow validate the current procedure. For IO{sup 2+}, several potential wells were found on the ground and the electronic excited states potentials with potential barriers with respect to dissociation, where this dication can exist in the gas phase as long-lived metastable molecules. We confirm hence the recent observation of the dication by mass spectrometry. Moreover, we predict the existence of the metastable IO{sup 3+} trication, where a shallow potential well along the IO internuclear distance is computed. This potential well supports more than 10 vibrational levels. The IO{sup 3+} excited states are repulsive in nature, as well as the computed potentials for the IO{sup 4+} tetracation. For the bound states, we give a set of spectroscopic parameters including excitation transition energies, equilibrium distances, harmonic and anharmonic vibrational terms, and rotational constants. At the MRCI + Q/aug-cc-pV5Z(-PP) level, the adiabatic double and triple ionization energies of IO are computed to be ∼28.1 eV and ∼55.0 eV, respectively.

  17. Role of Non-Volatile Memories in Automotive and IoT Markets

    Science.gov (United States)

    2017-03-01

    Standard Manufacturing Supply Long Term Short to Medium Term Density Up to 16MB Up to 2MB IO Configuration Up to x128 Up to x32 Design for Test...Role of Non-Volatile Memories in Automotive and IoT Markets Vipin Tiwari Director, Business Development and Product Marketing SST – A Wholly Own...microcontrollers (MCU) and certainly one of the most challenging elements to master. This paper addresses the role of non-volatile memories for

  18. TRESCIMO M2M-IoT testbed: smart cities solutions in Europe and Africa

    CSIR Research Space (South Africa)

    Barros, M

    2016-06-01

    Full Text Available component federation are required. TRESCIMO is a project that created facilities to experiment with services distributed over continents for two IoT domain trials and developed a general solution for scaling the IoT infrastructure in a Proof...

  19. The Role of Internet of Things (IoT) in Smart Cities: Technology Roadmap-oriented Approaches

    OpenAIRE

    Eunil Park; Angel P. del Pobil; Sang Jib Kwon

    2018-01-01

    Since the concept of a smart city was introduced, IoT (Internet of Things) has beenconsidered the key infrastructure in a smart city. However, there are currently no detailed explanations of the technical contributions of IoT in terms of the management, development, and improvements of smart cities. Therefore, the current study describes the importance of IoT technologies on the technology roadmap (TRM) of a smart city. Moreover, the survey with about 200 experts was conducted to investigate ...

  20. Io with Loki Plume on Bright Limb

    Science.gov (United States)

    1990-01-01

    Voyager 1 image of Io showing active plume of Loki on limb. Heart-shaped feature southeast of Loki consists of fallout deposits from active plume Pele. The images that make up this mosaic were taken from an average distance of approximately 490,000 kilometers (340,000 miles).

  1. On possible life on Jupiter's satellite Io

    Science.gov (United States)

    Vidmachenko, A. P.

    2018-05-01

    Some of the satellites of Jupiter may well be suitable both for mastering, and for finding possible traces of life there. Among them such satellite like Io - nearest Galilean satellite of Jupiter, and one of the most volcanically active bodies in the solar system. Warming of the mantle is caused by a powerful tidal force from the side of Jupiter. This leads to the heating of some parts of the mantle to a temperature above 1800 K, with an average surface temperature of about 140 K. But under its surface can be safe and even comfortable shelters, where life could once have come from the outside (even in a very primitive form), and could survive to this day. Moreover, according to some model's assumptions, Io could sometime be formed in another part of the Solar system, where the water could exist. Note that on neighboring Galilean satellites now exist significant amounts of water .

  2. Global Distribution of Active Volcanism on Io as Known at the End of the Galileo Mission

    Science.gov (United States)

    Lopes, Rosaly M. C.; Kamp. Lucas W.; Smythe, W. D.; Radebaugh, J.; Turtle, E.; Perry, J.; Bruno, B.

    2004-01-01

    Hot spots are manifestations of Io s mechanism of internal heating and heat transfer. Therefore, the global distribution of hot spots and their power output has important implications for how Io is losing heat. The end of the Galileo mission is an opportune time to revisit studies of the distribution of hot spots on Io, and to investigate the distribution of their power output.

  3. Active Volcanic Eruptions on Io

    Science.gov (United States)

    1996-01-01

    Six views of the volcanic plume named Prometheus, as seen against Io's disk and near the bright limb (edge) of the satellite by the SSI camera on the Galileo spacecraft during its second (G2) orbit of Jupiter. North is to the top of each frame. To the south-southeast of Prometheus is another bright spot that appears to be an active plume erupting from a feature named Culann Patera. Prometheus was active 17 years ago during both Voyager flybys, but no activity was detected by Voyager at Culann. Both of these plumes were seen to glow in the dark in an eclipse image acquired by the imaging camera during Galileo's first (G1) orbit, and hot spots at these locations were detected by Galileo's Near-Infrared Mapping Spectrometer.The plumes are thought to be driven by heating sulfur dioxide in Io's subsurface into an expanding fluid or 'geyser'. The long-lived nature of these eruptions requires that a substantial supply of sulfur dioxide must be available in Io's subsurface, similar to groundwater. Sulfur dioxide gas condenses into small particles of 'snow' in the expanding plume, and the small particles scatter light and appear bright at short wavelengths. The images shown here were acquired through the shortest-wavelength filter (violet) of the Galileo camera. Prometheus is about 300 km wide and 75 km high and Culann is about 150 km wide and less than 50 km high. The images were acquired on September 4, 1996 at a range of 2,000,000 km (20 km/pixel resolution). Prometheus is named after the Greek fire god and Culann is named after the Celtic smith god.The Jet Propulsion Laboratory, Pasadena, CA manages the Galileo mission for NASA's Office of Space Science, Washington, DC. JPL is an operating division of California Institute of Technology (Caltech).This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov. Background information and educational context for the images can

  4. A PhD abstract presentation on Cluster Framework for Internet of People, Things and Services (IoPTS)

    DEFF Research Database (Denmark)

    Shinde, Gitanjali; Olesen, Henning

    2014-01-01

    The Internet of Things (IoT) is a revolutionary technology, where devices around us are capable of sensing, reacting, responding and working autonomously to provide services to the users /people, e.g. smart homes, enterprise, utilities and e-Health. In the IoT paradigm, every device will be conne......The Internet of Things (IoT) is a revolutionary technology, where devices around us are capable of sensing, reacting, responding and working autonomously to provide services to the users /people, e.g. smart homes, enterprise, utilities and e-Health. In the IoT paradigm, every device...... will be connected to the Internet to provide services to the user. Bringing this together makes it relevant to talk about the "Internet of People, Things and Services (IoPTS)."However, managing such a huge number of devices is a major challenge for IoPTS. In any given context, a number of devices will work together...... announce their services to those who need them. Users can access these services with the help of widely interconnected devices. To access the services user has to provide some personal data. In IoPTS services are large in numbers, and to protect the user data there is a need to ensure that these services...

  5. Galileo's Last Fly-Bys of Io: NIMS Observations of Loki, Tupan, and Emakong Calderas

    Science.gov (United States)

    Lopes, Rosaly M. C.; Kamp, L. W.; Davies, A. G.; Smythe, W. D.; Carlson, R. W.; Doute, S.; McEwen, A.; Turtle, E. P.; Leader, F.; Mehlman, R.

    2002-01-01

    NIMS results from the 2001 Galileo fly-bys of Io will be presented, focusing on three calderas that may contain lava lakes. Preliminary results from the January 2002 Io fly-by will be presented. Additional information is contained in the original extended abstract.

  6. Interactive Level Design for iOS Assignment Delivery: A Case Study

    Directory of Open Access Journals (Sweden)

    Anson Brown

    2014-02-01

    Full Text Available This paper presents an application of an iOS-based online gaming assignment in a real classroom. The core concept of the project is a gameplay environment involving two players that have full control over creation and modification of levels. This level design mechanism was implemented in an iOS-based game in the area of genetics and based on an existing written assignment. The game includes support for both instructors, who have the ability to create and post assignments and students, who can take the assignments. Two trials of the iOS application consisted of in-class testing of twenty- one students. Students first took the original paper assignment, followed by the iOS version. Start times, end times, and grades were recorded for both versions. A comprehensive study of the grades and times for the iOS version of the assignment versus the paper version was conducted and is presented in this paper. Our Study showed that the iOS version was completed much faster in nearly every case while a strong delivery mechanism is needed to ensure student grades and completion of the assignment will not be affected. These results are not unexpected due to some major difference between the two formats. Future updates and additions will address any currently existing issues.

  7. +Cloud: An Agent-Based Cloud Computing Platform

    OpenAIRE

    González, Roberto; Hernández de la Iglesia, Daniel; de la Prieta Pintado, Fernando; Gil González, Ana Belén

    2017-01-01

    Cloud computing is revolutionizing the services provided through the Internet, and is continually adapting itself in order to maintain the quality of its services. This study presents the platform +Cloud, which proposes a cloud environment for storing information and files by following the cloud paradigm. This study also presents Warehouse 3.0, a cloud-based application that has been developed to validate the services provided by +Cloud.

  8. Impact of impurities on the α-LiIO{sub 3} crystal growth: Technique for measuring the “dead zone”

    Energy Technology Data Exchange (ETDEWEB)

    Noskova, A. N., E-mail: anna-13.08@mail.ru; Rubakha, V. I.; Prokhorov, A. P. [Russian Academy of Sciences, Institute of Applied Physics (Russian Federation)

    2017-01-15

    Lithium iodate (α-LiIO{sub 3}) single crystal is a promising nonlinear optical material, which used for efficient laser radiation conversion in the visible and near-IR regions. A technique for measuring the “dead zone” (ΔТ{sub dz}) of LiIO{sub 3} solutions has been developed; data on the impact of Fe(IO{sub 3}){sub 2}, AgIO{sub 3}, CsOH, H{sub 3}PO{sub 4}, and methyl methacrylate on the growth of the (100) face of α-LiIO{sub 3} crystals have been presented; and the dependences of the nucleation and motion of single steps on the degree of supersaturation have been measured. It is shown that the ΔТ{sub dz} value makes it possible to estimate the validity of solutions for growing α-LiIO{sub 3} crystals. The results of measuring the face growth rates and step velocities for KDP and α-LiIO{sub 3} crystals are compared.

  9. Seeking opportunities in the Internet of Things (IoT): : A Study of IT values co-creation in the IoT ecosystem while considering the potential impacts of the EU General Data Protection Regulations (GDPR).

    OpenAIRE

    Ford, David Thomas; Qamar, Sreman

    2017-01-01

    In this thesis, we have studied the phenomena of value co-creation in IoT ecosystem, while considering the potential impacts of GDPR on IT value co-creation in the IoT ecosystem. IT firms’ ability to create value is an important aspect of their existence and growth in which case they pursuit different and several means to accomplish this task. IT firms that operate within the IoT ecosystem are categorised as Enablers, Engagers, and Enhancers who interact, work together to provide the technolo...

  10. IoT E-business applications

    OpenAIRE

    Radu BUCEA-MANEA-TONIS; Rocsana B. Manea Tonis

    2017-01-01

    “Internet of things” (IoT) will develop soon an ecosystem of internet-connected things, that facilitate the mobile commerce experiences and the client need to be informed all the time. It will be associated with a feeling of freedom and capacity of doing very easy what was considered difficult in the past. Nevertheless, these opportunities will not be capitalized upon without overcoming a series of obstacles, including addressing consumer privacy concerns, the long replacement cycles of du...

  11. Design and Implementation of an IoT Access Point for Smart Home

    Directory of Open Access Journals (Sweden)

    Chih-Yung Chang

    2015-12-01

    Full Text Available Network communication and micro-electro-mechanical embedded technologies have attracted much attention in recent years. Through these technologies, the capabilities of sensing, identification, and communication can be embedded in various smart devices. These smart devices can automatically connect to the Internet and form an intelligent network called Internet of Things (IoT. However, these devices are embedded with different wireless communication interfaces such as Wi-Fi and ZigBee. This paper presents the design and implementation of an IoT access point that supports functionalities of coordination of various wireless transmission protocols. Based on the existing Wi-Fi access point, we have embedded a ZigBee module and implemented ZigBee and UPnP protocols into the designed IoT access point, which supports ZigBee communication capabilities over the Internet.

  12. The hint protocol: Using a broadcast method to enable ID-free data transmission for dense IoT devices

    OpenAIRE

    Ren, Yi; Wu, Ren-Jie; Tseng, Yu-Chee

    2017-01-01

    IoT (Internet of Things) has attracted a lot of attention recently. IoT devices need to report their data or status to base stations at various frequencies. The IoT communications observed by a base station normally exhibit the following characteristics: (1) massively connected, (2) lightly loaded per packet, and (3) periodical or at least mostly predictable. The current design principals of communication networks, when applied to IoT scenarios, however, do not fit well to these requirements....

  13. Beginning iPhone 4 Development Exploring the IOS SDK

    CERN Document Server

    Nutting, Jack; LaMarche, Jeff

    2011-01-01

    The authors of the bestselling Beginning iPhone 3 Development are back, with the same excellent material completely updated for iOS 4 and written from the ground up using the latest version of Apple's Xcode 3. All source code has been updated to use the latest Xcode templates and current APIs, and all-new screenshots show Xcode 3 in action. Beginning iPhone 4 Development is a complete course in iOS development. You'll master techniques that work on iPhone, iPad, and iPod touch. We start with the basics, showing you how to download and install the tools you'll need, and how to create your first

  14. Pro Core Data for iOS Data Access and Persistence Engine for iPhone, iPad, and iPod Touch

    CERN Document Server

    Privat, M

    2011-01-01

    The power of Core Data allows iOS developers to efficiently store and retrieve application data using familiar object-oriented paradigms. Pro Core Data for iOS explains both how and why to use Core Data for data storage, from simple to advanced techniques. Covering common and advanced persistence patterns, this book prepares any iOS developer to store and retrieve data accurately and proficiently. Lots of iOS development books touch on Core Data, taking you through a few mainstream use cases for storing and retrieving data in your iOS applications. In Pro Core Data for iOS, however, we take yo

  15. An IoT Knowledge Reengineering Framework for Semantic Knowledge Analytics for BI-Services

    Directory of Open Access Journals (Sweden)

    Nilamadhab Mishra

    2015-01-01

    Full Text Available In a progressive business intelligence (BI environment, IoT knowledge analytics are becoming an increasingly challenging problem because of rapid changes of knowledge context scenarios along with increasing data production scales with business requirements that ultimately transform a working knowledge base into a superseded state. Such a superseded knowledge base lacks adequate knowledge context scenarios, and the semantics, rules, frames, and ontology contents may not meet the latest requirements of contemporary BI-services. Thus, reengineering a superseded knowledge base into a renovated knowledge base system can yield greater business value and is more cost effective and feasible than standardising a new system for the same purpose. Thus, in this work, we propose an IoT knowledge reengineering framework (IKR framework for implementation in a neurofuzzy system to build, organise, and reuse knowledge to provide BI-services to the things (man, machines, places, and processes involved in business through the network of IoT objects. The analysis and discussion show that the IKR framework can be well suited to creating improved anticipation in IoT-driven BI-applications.

  16. A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications

    OpenAIRE

    Sikder, Amit Kumar; Petracca, Giuseppe; Aksu, Hidayet; Jaeger, Trent; Uluagac, A. Selcuk

    2018-01-01

    The concept of Internet of Things (IoT) has become more popular in the modern era of technology than ever before. From small household devices to large industrial machines, the vision of IoT has made it possible to connect the devices with the physical world around them. This increasing popularity has also made the IoT devices and applications in the center of attention among attackers. Already, several types of malicious activities exist that attempt to compromise the security and privacy of...

  17. A Cloud-Based Internet of Things Platform for Ambient Assisted Living

    Science.gov (United States)

    Cubo, Javier; Nieto, Adrián; Pimentel, Ernesto

    2014-01-01

    A common feature of ambient intelligence is that many objects are inter-connected and act in unison, which is also a challenge in the Internet of Things. There has been a shift in research towards integrating both concepts, considering the Internet of Things as representing the future of computing and communications. However, the efficient combination and management of heterogeneous things or devices in the ambient intelligence domain is still a tedious task, and it presents crucial challenges. Therefore, to appropriately manage the inter-connection of diverse devices in these systems requires: (1) specifying and efficiently implementing the devices (e.g., as services); (2) handling and verifying their heterogeneity and composition; and (3) standardizing and managing their data, so as to tackle large numbers of systems together, avoiding standalone applications on local servers. To overcome these challenges, this paper proposes a platform to manage the integration and behavior-aware orchestration of heterogeneous devices as services, stored and accessed via the cloud, with the following contributions: (i) we describe a lightweight model to specify the behavior of devices, to determine the order of the sequence of exchanged messages during the composition of devices; (ii) we define a common architecture using a service-oriented standard environment, to integrate heterogeneous devices by means of their interfaces, via a gateway, and to orchestrate them according to their behavior; (iii) we design a framework based on cloud computing technology, connecting the gateway in charge of acquiring the data from the devices with a cloud platform, to remotely access and monitor the data at run-time and react to emergency situations; and (iv) we implement and generate a novel cloud-based IoT platform of behavior-aware devices as services for ambient intelligence systems, validating the whole approach in real scenarios related to a specific ambient assisted living application

  18. A cloud-based Internet of Things platform for ambient assisted living.

    Science.gov (United States)

    Cubo, Javier; Nieto, Adrián; Pimentel, Ernesto

    2014-08-04

    A common feature of ambient intelligence is that many objects are inter-connected and act in unison, which is also a challenge in the Internet of Things. There has been a shift in research towards integrating both concepts, considering the Internet of Things as representing the future of computing and communications. However, the efficient combination and management of heterogeneous things or devices in the ambient intelligence domain is still a tedious task, and it presents crucial challenges. Therefore, to appropriately manage the inter-connection of diverse devices in these systems requires: (1) specifying and efficiently implementing the devices (e.g., as services); (2) handling and verifying their heterogeneity and composition; and (3) standardizing and managing their data, so as to tackle large numbers of systems together, avoiding standalone applications on local servers. To overcome these challenges, this paper proposes a platform to manage the integration and behavior-aware orchestration of heterogeneous devices as services, stored and accessed via the cloud, with the following contributions: (i) we describe a lightweight model to specify the behavior of devices, to determine the order of the sequence of exchanged messages during the composition of devices; (ii) we define a common architecture using a service-oriented standard environment, to integrate heterogeneous devices by means of their interfaces, via a gateway, and to orchestrate them according to their behavior; (iii) we design a framework based on cloud computing technology, connecting the gateway in charge of acquiring the data from the devices with a cloud platform, to remotely access and monitor the data at run-time and react to emergency situations; and (iv) we implement and generate a novel cloud-based IoT platform of behavior-aware devices as services for ambient intelligence systems, validating the whole approach in real scenarios related to a specific ambient assisted living application.

  19. Stealth low-level manipulation of programmable logic controllers I/O by pin control exploitation

    NARCIS (Netherlands)

    Abbasi, A.; Hashemi, M.; Zambon, E.; Etalle, S.; Havarneanu, G.; Setola, R.; Nassopoulos, H.; Wolthusen, S.

    2016-01-01

    Input/OutputisthemechanismthroughwhichProgrammable Logic Controllers (PLCs) interact with and control the outside world. Particularly when employed in critical infrastructures, the I/O of PLCs has to be both reliable and secure. PLCs I/O like other embedded devices are controlled by a pin based

  20. The relevance of technological autonomy in the acceptance of IoT services in retail

    NARCIS (Netherlands)

    Constantinides, Efthymios; Kahlert, Marius; de Vries, Sjoerd A.

    2017-01-01

    The Internet of Things (IoT) represents a shift towards a digitally enriched environment connecting smart objects and users that promises to provide retailers with innovative ways to approach their customers. IoT technologies differ from previous innovations as they are ubiquitous, intelligent and