WorldWideScience

Sample records for uclp received io

  1. A Low-Power WLAN Communication Scheme for IoT WLAN Devices Using Wake-Up Receivers

    Directory of Open Access Journals (Sweden)

    Hanseul Hong

    2018-01-01

    Full Text Available In this paper, we propose a delay- and power-efficient, multi-user, low-power wireless local area network (WLAN communication scheme for Internet of Things (IoT WLAN devices. Extremely low-power operation is one of the key requirements of emerging IoT devices. However, the current duty-cycle-based power saving approach may incur large access delay times owing to the trade-offs between the power consumption and the access delay. In order to reduce this delay and enhance the power-saving performance, wake-up receiver-based schemes have been proposed. However, because wake-up receiver-based schemes do not consider multiuser operation in dense communication environments, large delays are inevitable in the case of multiuser operation. In order to provide extremely low-power operation and under 1-mW standby power with reduced delay, we employed the optimized multiuser transmission scheduling of IEEE 802.11ax in the proposed scheme and proper enhanced distributed channel access (EDCA parameter settings. This is with the aim to reduce the delay caused by long wake-up times, and to avoid collisions caused by simultaneous transmission in uplink multiuser scenario. By using the proposed scheme, simultaneous IoT communication with multiple mobile IoT devices is possible while providing low-power operation. Simulation results verified the outstanding delay performance of the proposed scheme.

  2. THE SCANDCLEFT RANDOMISED CONTROLLED TRIALS: SPEECH OUTCOMES IN 5-YEAR-OLDS WITH UCLP – consonant proficiency and errors

    DEFF Research Database (Denmark)

    Willadsen, Elisabeth; Persson, Christina; Lohmander, Anette

    2017-01-01

    Background and aim: Normal articulation before school start is a main objective in cleft palate treatment. The aim was to investigate if differences exist in consonant proficiency at age 5 years between children with unilateral cleft lip and palate (UCLP) randomised to different surgical protocol...... in terms of secondary pharyngeal surgeries, number of fistulae, and speech therapy visits differed. Trial registration: ISRCTN29932826. Keywords: Primary palatal repair, unilateral cleft lip and palate, consonant proficiency, cleft speech characteristics, randomised clinical trial...

  3. Postnatal treatment factors affecting craniofacial morphology of unilateral cleft lip and palate (UCLP) patients in a Japanese population.

    Science.gov (United States)

    Alam, M K; Iida, J; Sato, Y; Kajii, Takashi S

    2013-12-01

    We have evaluated the craniofacial morphology of Japanese patients with unilateral cleft lip and palate (UCLP) and assessed the various postnatal factors that affect it. Lateral cephalograms of 140 subjects (mean (SD) aged 7 (2) years) with UCLP were taken before orthodontic treatment. Surgeons from Hokkaido University Hospital had done the primary operations. The craniofacial morphology was assessed by angular and linear cephalometric measurements. Cheiloplasty, palatoplasty, and preoperative orthopaedic treatment were chosen as postnatal factors. To compare the assessments of the postnatal factors, we made angular and linear cephalometric measurements for each subject and converted them into Z scores in relation to the mean (SD) of the two variables. Subjects treated by the modified Millard cheiloplasty had larger sella-nasion-point A (SNA) and nasion-point A-pogonion (NA-POG) measurements than subjects treated by the modified Millard with a vomer flap cheiloplasty. Two-stage palatoplasty showed consistently better craniofacial morphology than the other palatoplasty. Subjects who had preoperative orthopaedic treatment with a Hotz plate had significantly larger upper incisor/sella-nasion (U1-SN) measurements than who had no preoperative orthopaedic treatment or an active plate. We conclude that in subjects treated by a modified Millard type of cheiloplasty, a two-stage palatoplasty, and a Hotz plate there were fewer adverse effects on craniofacial morphology. Copyright © 2012 The British Association of Oral and Maxillofacial Surgeons. Published by Elsevier Ltd. All rights reserved.

  4. Io

    International Nuclear Information System (INIS)

    Nash, D.B.; Yoder, C.F.; Carr, M.H.; Gradie, J.; Hunten, D.M.

    1986-01-01

    The present work reviews the history of Io studies and describes the current level of understanding of Io's physics, chemistry, geology, orbital dynamics, and geophysics. Consideration is given to the satellite's internal, superficial, atmospheric, plasma, and magnetospheric properties and how they interrelate. A pictorial map of Io's surface based on Voyager 1 and 2 images is presented. It is found that Io's surface color and spectra are dominated by sulfur compounds which may include various sulfur allotropes. Volcanic processes yielding three kinds of surface features (vent regions, plains, and mountains) dominate Io's surface geology. The Io plasma torus corotates with Jupiter's magnetic field in the plane of Jupiter's centrifugal equator centered at Io's orbital radius

  5. SCANDCLEFT RANDOMIZED TRIALS: SPEECH OUTCOMES IN 5-YEAR-OLDS WITH UCLP - velopharyngeal competency and hypernasality

    DEFF Research Database (Denmark)

    Lohmander, Anette; Persson, Christina; Willadsen, Elisabeth

    2017-01-01

    Background and aim: Adequate velopharyngeal function and speech are main goals in the treatment of cleft palate. The objective was to investigate if there were differences in velopharyngeal competency (VPC) and hypernasality at age 5 years in children with unilateral cleft lip and palate (UCLP...... (136 girls, 255 boys) were available and perceptually analysed. The main outcome measures were VPC and hypernasality from blinded assessments. Results: There were no statistically significant differences between the prevalences in the arms in any of the trials. VPC: Trial 1, A: 58%, B: 61%; Trial 2, A......: 57%, C: 54%; Trial 3, A: 35%, D: 51%. No hypernasality: Trial 1, A: 54%, B: 44%; Trial 2, A: 47%, C: 51%; Trial 3, A: 34%, D: 49%. Conclusions: No differences were found regarding VPC and hypernasality at age 5 years after different methods for primary palatal repair. The burden of care in terms...

  6. Programming iOS 6

    CERN Document Server

    Neuburg, Matt

    2013-01-01

    Get a solid grounding in all the fundamentals of Cocoa Touch, and avoid problems during iPhone and iPad app development. With this revised and expanded edition, you'll dig into Cocoa and learn how to work effectively with Objective-C and Xcode. This book covers iOS 6 in a rigorous, orderly fashion-ideal whether you're approaching iOS for the first time or need a reference to bolster existing skills. Learn about features introduced with iOS 6, including Objective-C language advances, autosynthesis, autolayout, new view controller rotation rules, unwind segues, state restoration, styled text, and collection views. * Learn Objective-C language details and object-oriented programming concepts * Understand the anatomy of an Xcode project and all the stages of its lifecycle * Grasp key Cocoa concepts such as relationships between classes, receiving events, and model-view-controller architecture * Learn how views and layers are managed, drawn, composited, and animated * Become familiar with view controllers and thei...

  7. Turning Internet of Things(IoT) into Internet of Vulnerabilities (IoV) : IoT Botnets

    OpenAIRE

    Angrishi, Kishore

    2017-01-01

    Internet of Things (IoT) is the next big evolutionary step in the world of internet. The main intention behind the IoT is to enable safer living and risk mitigation on different levels of life. With the advent of IoT botnets, the view towards IoT devices has changed from enabler of enhanced living into Internet of vulnerabilities for cyber criminals. IoT botnets has exposed two different glaring issues, 1) A large number of IoT devices are accessible over public Internet. 2) Security (if cons...

  8. NIMS Observation of Hotspots on Io

    Science.gov (United States)

    1996-01-01

    Io has been imaged by the Near Infrared Mapping Spectrometer (NIMS) on Galileo. The image on the right shows for the first time the distribution of volcanic hotspots on the surface of Io, as seen by NIMS. Three of these hotspots are new discoveries, only detectable with the NIMS instrument. This image was taken during the G1 encounter on June 29 1996. The image on the left shows the same view of Io as seen by the Voyager spacecraft in 1979. At least one dozen hotspots have been identified from this NIMS image. Most of the hotspot locations can be matched with volcanic features on the surface of Io, including the vent area of the active Prometheus plume.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA's Office of Space Science, Washington, DC.This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov.

  9. Volcanism on Io

    Science.gov (United States)

    Davies, Ashley Gerard

    2014-03-01

    Preface; Introduction; Part I. Io, 1610 to 1995: Galileo to Galileo: 1. Io, 1610-1979; 2. Between Voyager and Galileo: 1979-95; 3. Galileo at Io; Part II. Planetary Volcanism: Evolution and Composition: 4. Io and Earth: formation, evolution, and interior structure; 5. Magmas and volatiles; Part III. Observing and Modeling Volcanic Activity: 6. Observations: thermal remote sensing of volcanic activity; 7. Models of effusive eruption processes; 8. Thermal evolution of volcanic eruptions; Part IV. Galileo at Io: the Volcanic Bestiary: 9. The view from Galileo; 10. The lava lake at Pele; 11. Pillan and Tvashtar: lava fountains and flows; 12. Prometheus and Amirani: Effusive activity and insulated flows; 13. Loki Patera: Io's powerhouse; 14. Other volcanoes and eruptions; Part V. Volcanism on Io: The Global View: 15. Geomorphology: paterae, shields, flows and mountains; 16. Volcanic plumes; 17. Hot spots; Part VI. Io after Galileo: 18. Volcanism on Io: a post-Galileo view; 19. The future of Io observations; Appendix 1; Appendix 2; References; Index.

  10. Io's Pele Hemisphere

    Science.gov (United States)

    1996-01-01

    Jupiter's moon Io with Pele prominently in view. The inset images are from the Voyager 1 (top) and 2 (bottom) spacecraft using the violet, blue, and orange filters. The large image is from Galileo, using the violet, green, and red filters. The colors in the Galileo image are closer to what the human eye would see. With the filters used in the Solid State Imaging system on Galileo, it is clear now that some of the recent volcanic deposits on Io are indeed very red, a point not resolved by Voyager. Scientists speculate that the red deposits are a form of Sulfur produced in volcanic eruptions on Io. Note the rapid changes seen in the shape of the distal (far from the vent) plume deposits from Pele between Voyagers 1 (April, 1979) and 2 (July, 1979). The Galileo image was obtained by the imaging system on board the spacecraft in June, 1996. North is to the top.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA'is Office of Space Science, Washington, DC.This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov. Background information and educational context for the images can be found at URL http://www.jpl.nasa.gov/galileo/sepo

  11. Io after Galileo

    International Nuclear Information System (INIS)

    Lopes, Rosaly M C; Williams, David A

    2005-01-01

    Io, the volcanically active innermost large moon of Jupiter, was a target of intense study during the recently completed NASA Galileo mission to Jupiter (1989-2003). Galileo's suite of instruments obtained unprecedented observations of Io, including high spatial resolution imaging in the visible and infrared. This paper reviews the insights gained about Io's surface, atmosphere and space environment during the Galileo mission. Io is thought to have a large Fe-FeS core, whose radius is slightly less than half the radius of Io and whose mass is 20% of the moon. The lack of an intrinsic magnetic field implies that the core is either completely solid or completely liquid. The mantle of Io appears to undergo a high degree of partial melting (20-50% molten) that produces ultramafic lavas dominated by Mg-rich orthopyroxene in an apparent 'mushy magma ocean', suggesting an undifferentiated mantle. The crust of Io is thought to be rigid, 20-30 km thick, cold away from volcanic heat sources and composed of mafic to ultramafic silicates. Tidal flexing due to Io's orbital resonance produces ∼100 m tides at the surface, generating heat that powers Io's volcanism. Silicate volcanism appears to be dominant at most hot spots, although secondary sulfur volcanism may be important in some areas. The key discoveries of the Galileo era at Io were: (1) the detection of high-temperature volcanism (ultramafic, superheated mafic or 'ceramic'); (2) the detection of both S 2 and SO 2 gas in Ionian plumes; (3) the distinction between eruption styles, including between Pelean plumes (originating from central vents) and Promethean plumes (originating from silicate lava flow fronts); (4) the relationship between mountains and paterae, which indicates that many paterae are formed as magma preferentially ascends along tectonic faults associated with mountain building; (5) the lack of detection of an intrinsic magnetic field; (6) a new estimate of global heat flow; and (7) increased understanding

  12. Enhancing Privacy in Wearable IoT through a Provenance Architecture

    Directory of Open Access Journals (Sweden)

    Richard K. Lomotey

    2018-04-01

    Full Text Available The Internet of Things (IoT is inspired by network interconnectedness of humans, objects, and cloud services to facilitate new use cases and new business models across multiple enterprise domains including healthcare. This creates the need for continuous data streaming in IoT architectures which are mainly designed following the broadcast model. The model facilitates IoT devices to sense and deliver information to other nodes (e.g., cloud, physical objects, etc. that are interested in the information. However, this is a recipe for privacy breaches since sensitive data, such as personal vitals from wearables, can be delivered to undesired sniffing nodes. In order to protect users’ privacy and manufacturers’ IP, as well as detecting and blocking malicious activity, this research paper proposes privacy-oriented IoT architecture following the provenance technique. This ensures that the IoT data will only be delivered to the nodes that subscribe to receive the information. Using the provenance technique to ensure high transparency, the work is able to provide trace routes for digital audit trail. Several empirical evaluations are conducted in a real-world wearable IoT ecosystem to prove the superiority of the proposed work.

  13. IoT Architectural Framework: Connection and Integration Framework for IoT Systems

    OpenAIRE

    Uviase, Onoriode; Kotonya, Gerald

    2018-01-01

    The proliferation of the Internet of Things (IoT) has since seen a growing interest in architectural design and adaptive frameworks to promote the connection between heterogeneous IoT devices and IoT systems. The most widely favoured software architecture in IoT is the Service Oriented Architecture (SOA), which aims to provide a loosely coupled systems to leverage the use and reuse of IoT services at the middle-ware layer, to minimise system integration problems. However, despite the flexibil...

  14. IoT gateway architecture

    OpenAIRE

    Leleika, Paulius

    2017-01-01

    This paper provides an overview of HTTP, CoAP, AMQP, DDS, MQTT, XMPP communication protocols. The main IoT problem is that IoT devices uses many different communication protocols and devices cannot communicate with each other directly. IoT gateway helps to solve that problem. This paper also identifies requirements for IoT gateway software. Provides solution for communication between devices which are using different messaging architectures. Presents security aspects and ways to secure IoT ga...

  15. EDGE TECHNOLOGIES IN IoT AND APPLICATION SCENARIO OF RFID BASED IoT

    OpenAIRE

    Dharam Gami *, Asst. Prof. Dhaval Nimavat, Asst. Prof. Shubham Sharma

    2016-01-01

    Internet of Things possesses the power to change the era. IoT will offer an advance connectivity between objects which will change the face of machine-to-machine communication. IoT will connect autonomous systems, devices and heterogeneous machines and make them communicate without human interactions. Many technologies will play significant role in IoT implementation. In this paper, we aim to describe the candidate of edge technologies in IoT and demonstrate how RFID based IoT system will loo...

  16. NIMS: hotspots on Io during G2 (continued)

    Science.gov (United States)

    1997-01-01

    This is another Near Infrared Mapping Spectrometer (NIMS) image of Io, taken during the G2 encounter in September 1996. This is a dayside image of Io (on the right) against the clouds of Jupiter (the blue background). On the left is a Voyager mosaic of Io with the same viewing geometry for comparison purposes. This NIMS data set has been processed to highlight the positions of hot spots on the surface of Io. At least 11 can be seen. Two of the hotspots are newly discovered by the NIMS instrument. Others correspond to sites of plume eruptions and volcanic calderas and volcanic flows. This image can be compared with the SSI image P-47971 released on October 23, 1996, which was taken almost exactly the same position.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA's Office of Space Science, Washington, DC.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA's Office of Space Science, Washington, DC.This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov.

  17. Predicting need for orthognathic surgery in early permanent dentition patients with unilateral cleft lip and palate using receiver operating characteristic analysis.

    Science.gov (United States)

    Yun-Chia Ku, Michelle; Lo, Lun-Jou; Chen, Min-Chi; Wen-Ching Ko, Ellen

    2018-03-01

    The purpose of this study was to predict the need for orthognathic surgery in patients with unilateral cleft lip and palate (UCLP) in the early permanent dentition. In this retrospective cohort study, we included 61 patients with complete UCLP (36 male, 25 female; mean age, 18.47 years; range, 16.92-26.17 years). The subjects were grouped into an orthognathic surgery group and a nonsurgery group at the time of growth completion. Lateral cephalograms obtained at the age of 11 years were analyzed to compare the 2 groups. The receiver operating characteristic analysis was applied to predict the probability of the need for orthognathic surgery in early adulthood by using the measurements obtained at the age of 11 years. SNB, ANB, SN, overbite, overjet, maxillary length, mandibular body length, and L1-MP were found to be significantly different between the 2 groups. For a person with a score of 2 in the 3-variable-based criteria, the sensitivity and specificity for determining the need for surgical treatment were 90.0% and 83.9%, respectively (ANB, ≤-0.45°; overjet, ≤-2.00 mm; maxillary length, ≤47.25 mm). Three cephalometric variables, the minimum number of discriminators required to obtain the optimum discriminant effectiveness, predicted the future need for orthognathic surgery with an accuracy of 86.9% in patients with UCLP. Copyright © 2017 American Association of Orthodontists. Published by Elsevier Inc. All rights reserved.

  18. AntibIoTic: Protecting IoT Devices Against DDoS Attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2018-01-01

    The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack. This character, along with the increasing...... availability of connected and insecure IoT devices, makes DDoS and IoT the perfect pair for the malware industry. In this paper we present the main idea behind AntibIoTic, a palliative solution to prevent DDoS attacks perpetrated through IoT devices....

  19. Using Formal Grammars to Predict I/O Behaviors in HPC: The Omnisc'IO Approach

    Energy Technology Data Exchange (ETDEWEB)

    Dorier, Matthieu; Ibrahim, Shadi; Antoniu, Gabriel; Ross, Rob

    2016-08-01

    The increasing gap between the computation performance of post-petascale machines and the performance of their I/O subsystem has motivated many I/O optimizations including prefetching, caching, and scheduling. In order to further improve these techniques, modeling and predicting spatial and temporal I/O patterns of HPC applications as they run has become crucial. In this paper we present Omnisc'IO, an approach that builds a grammar-based model of the I/O behavior of HPC applications and uses it to predict when future I/O operations will occur, and where and how much data will be accessed. To infer grammars, Omnisc'IO is based on StarSequitur, a novel algorithm extending Nevill-Manning's Sequitur algorithm. Omnisc'IO is transparently integrated into the POSIX and MPI I/O stacks and does not require any modification in applications or higher-level I/O libraries. It works without any prior knowledge of the application and converges to accurate predictions of any N future I/O operations within a couple of iterations. Its implementation is efficient in both computation time and memory footprint.

  20. There is no I/O like no I/O

    International Nuclear Information System (INIS)

    Johnston, T.Y.

    1985-01-01

    On most computer systems the most common cause of performance degradation is I/O contention. This paper will examine some efforts that can be taken in a VM environment to reduce I/O or its effect at both the global and local levels

  1. The Impact of Early Infant Jaw-Orthopaedics on Early Speech Production in Toddlers with Unilateral Cleft Lip and Palate

    Science.gov (United States)

    Lohmander, Anette; Lillvik, Malin; Friede, Hans

    2004-01-01

    The purpose of study was to investigate the impact of pre-surgical Infant Orthopaedics (IO) on consonant production at 18 months of age in children with Unilateral Cleft Lip and Palate (UCLP) and to compare the consonant production to that of age-matched children without clefts. The first ten children in a consecutive series of 20 with UCLP…

  2. AP-IO: asynchronous pipeline I/O for hiding periodic output cost in CFD simulation.

    Science.gov (United States)

    Xiaoguang, Ren; Xinhai, Xu

    2014-01-01

    Computational fluid dynamics (CFD) simulation often needs to periodically output intermediate results to files in the form of snapshots for visualization or restart, which seriously impacts the performance. In this paper, we present asynchronous pipeline I/O (AP-IO) optimization scheme for the periodically snapshot output on the basis of asynchronous I/O and CFD application characteristics. In AP-IO, dedicated background I/O processes or threads are in charge of handling the file write in pipeline mode, therefore the write overhead can be hidden with more calculation than classic asynchronous I/O. We design the framework of AP-IO and implement it in OpenFOAM, providing CFD users with a user-friendly interface. Experimental results on the Tianhe-2 supercomputer demonstrate that AP-IO can achieve a good optimization effect for the periodical snapshot output in CFD application, and the effect is especially better for massively parallel CFD simulations, which can reduce the total execution time up to about 40%.

  3. AP-IO: Asynchronous Pipeline I/O for Hiding Periodic Output Cost in CFD Simulation

    Directory of Open Access Journals (Sweden)

    Ren Xiaoguang

    2014-01-01

    Full Text Available Computational fluid dynamics (CFD simulation often needs to periodically output intermediate results to files in the form of snapshots for visualization or restart, which seriously impacts the performance. In this paper, we present asynchronous pipeline I/O (AP-IO optimization scheme for the periodically snapshot output on the basis of asynchronous I/O and CFD application characteristics. In AP-IO, dedicated background I/O processes or threads are in charge of handling the file write in pipeline mode, therefore the write overhead can be hidden with more calculation than classic asynchronous I/O. We design the framework of AP-IO and implement it in OpenFOAM, providing CFD users with a user-friendly interface. Experimental results on the Tianhe-2 supercomputer demonstrate that AP-IO can achieve a good optimization effect for the periodical snapshot output in CFD application, and the effect is especially better for massively parallel CFD simulations, which can reduce the total execution time up to about 40%.

  4. Pruning-Based, Energy-Optimal, Deterministic I/O Device Scheduling for Hard Real-Time Systems

    Science.gov (United States)

    2005-02-01

    However, DPM via I/O device scheduling for hard real - time systems has received relatively little attention. In this paper,we present an offline I/O...polynomial time. We present experimental results to show that EDS and MDO reduce the energy consumption of I/O devices significantly for hard real - time systems .

  5. High performance parallel I/O

    CERN Document Server

    Prabhat

    2014-01-01

    Gain Critical Insight into the Parallel I/O EcosystemParallel I/O is an integral component of modern high performance computing (HPC), especially in storing and processing very large datasets to facilitate scientific discovery. Revealing the state of the art in this field, High Performance Parallel I/O draws on insights from leading practitioners, researchers, software architects, developers, and scientists who shed light on the parallel I/O ecosystem.The first part of the book explains how large-scale HPC facilities scope, configure, and operate systems, with an emphasis on choices of I/O har

  6. IoTFLiP: IoT-based flipped learning platform for medical education

    Directory of Open Access Journals (Sweden)

    Maqbool Ali

    2017-08-01

    Full Text Available Case-Based Learning (CBL has become an effective pedagogy for student-centered learning in medical education, which is founded on persistent patient cases. Flippped learning and Internet of Things (IoTs concepts have gained significant attention in recent years. Using these concepts in conjunction with CBL can improve learning ability by providing real evolutionary medical cases. It also enables students to build confidence in their decision making, and efficiently enhances teamwork in the learing environment. We propose an IoT-based Flip Learning Platform, called IoTFLiP, where an IoT infrastructure is exploited to support flipped case-based learning in a cloud environment with state of the art security and privacy measures for personalized medical data. It also provides support for application delivery in private, public, and hybrid approaches. The proposed platform is an extension of our Interactive Case-Based Flipped Learning Tool (ICBFLT, which has been developed based on current CBL practices. ICBFLT formulates summaries of CBL cases through synergy between students' and medical expert knowledge. The low cost and reduced size of sensor device, support of IoTs, and recent flipped learning advancements can enhance medical students' academic and practical experiences. In order to demonstrate a working scenario for the proposed IoTFLiP platform, real-time data from IoTs gadgets is collected to generate a real-world case for a medical student using ICBFLT.

  7. NIMS: hotspots on Io during G2

    Science.gov (United States)

    1996-01-01

    The Near Infrared Mapping Spectrometer (NIMS) on the Galileo spacecraft imaged Io at high spectral resolution at a range of 439,000 km (275,000 miles) during the G2 encounter on 7 September 1996. This image shows (on the right) Io as seen in the infrared by NIMS. The image on the left shows the same view from Voyager in 1979. This NIMS image can be compared to the NIMS images from the G1 orbit (June 1996) to monitor changes on Io. The NIMS image is at 4.9 microns, showing thermal emissions from the hotspots. The brightness of the pixels is a function of size and temperature.At least 10 hotspots have been identified and can be matched with surface features. An accurate determination of the position of the hotspot in the vicinity of Shamash Patera is pending. Hotspots are seen in the vicinity of Prometheus, Volund and Marduk, all sites of volcanic plume activity during the Galileo encounters, and also of active plumes in 1979. Temperatures and areas have been calculated for the hotspots shown. Temperatures range from 828 K (1031 F) to 210 K (- 81.4 F). The lowest temperature is significantly higher than the Io background (non-hotspot) surface temperature of about 100 K (-279 F). Hotspot areas range from 6.5 square km (2.5 sq miles) to 40,000 sq km (15,400 sq miles). The hottest hotspots have smallest areas, and the cooler hotspots have the largest areas. NIMS is continuing to observe Io to monitor volcanic activity throughout the Galileo mission.The Galileo mission is managed by the Jet Propulsion Laboratory for NASA's Office of Space Science, Washington, D.C.This image and other images and data received from Galileo are posted on the Galileo mission home page on the World Wide Web at http://galileo.jpl.nasa.gov.

  8. A Resource Service Model in the Industrial IoT System Based on Transparent Computing.

    Science.gov (United States)

    Li, Weimin; Wang, Bin; Sheng, Jinfang; Dong, Ke; Li, Zitong; Hu, Yixiang

    2018-03-26

    The Internet of Things (IoT) has received a lot of attention, especially in industrial scenarios. One of the typical applications is the intelligent mine, which actually constructs the Six-Hedge underground systems with IoT platforms. Based on a case study of the Six Systems in the underground metal mine, this paper summarizes the main challenges of industrial IoT from the aspects of heterogeneity in devices and resources, security, reliability, deployment and maintenance costs. Then, a novel resource service model for the industrial IoT applications based on Transparent Computing (TC) is presented, which supports centralized management of all resources including operating system (OS), programs and data on the server-side for the IoT devices, thus offering an effective, reliable, secure and cross-OS IoT service and reducing the costs of IoT system deployment and maintenance. The model has five layers: sensing layer, aggregation layer, network layer, service and storage layer and interface and management layer. We also present a detailed analysis on the system architecture and key technologies of the model. Finally, the efficiency of the model is shown by an experiment prototype system.

  9. Road to Io

    International Nuclear Information System (INIS)

    Chang, T.

    1989-01-01

    The potential study of Io by the Galileo mission is discussed. The mission, which is scheduled for launch from the Space Shuttle in 1989, is expected to fly 20 to 100 times closer to the Galilean moons of Jupiter than the Voyager missions. Topics which the mission hopes to address include volcanism, tidal forces and continental drift on Io, and the torus of charged particles that accompanies Io on its orbit of Jupiter. The Venus-earth-earth gravity assist route of the mission and the NIR mapping spectrometer aboard Galileo are considered

  10. Dangoraižio projektavimo ypatumai

    Directory of Open Access Journals (Sweden)

    Robertas Volvačiovas

    2011-06-01

    Full Text Available Santrauka. Straipsnyje išskiriami pagrindiniai dangoraižio įgyvendinimo ir gyvavimo etapai, aptariamas dangoraižio projektavimo etapas, dangoraižio techninio projekto (TP ir darbo projekto (DP sudėtis, išskiriamos pagrindinės dangoraižių problemos, iškylančios projektavimo etape, ir pateikiami sprendimo būdai.Straipsnis lietuvių kalba

  11. On I/O Virtualization Management

    Science.gov (United States)

    Danciu, Vitalian A.; Metzker, Martin G.

    The quick adoption of virtualization technology in general and the advent of the Cloud business model entail new requirements on the structure and the configuration of back-end I/O systems. Several approaches to virtualization of I/O links are being introduced, which aim at implementing a more flexible I/O channel configuration without compromising performance. While previously the management of I/O devices could be limited to basic technical requirments (e.g. the establishment and termination of fixed-point links), the additional flexibility carries in its wake additional management requirements on the representation and control of I/O sub-systems.

  12. IOs as Social Sites

    DEFF Research Database (Denmark)

    Park, Susan M.; Vetterlein, Antje

    Norms research has made significant inroads into examining their emergence and influence in international relations, while recognizing international organizations (IOs) as key social sites for norms to be created and/or disseminated. This paper interrogates how IOs as “organizational platforms......” (Finnemore 1996) influence the norm building process. Going beyond state-centric approaches to norm construction, it argues that the process of taking up a norm by an IO does affect the norm’s power. A norm’s strength is determined by the extent to which it is uncontested and taken for granted as appropriate...... the norm building process in this way provides insight into the effect of IOs as social sites in strengthening a norm....

  13. Enabling Large-Scale IoT-Based Services through Elastic Publish/Subscribe.

    Science.gov (United States)

    Vavassori, Sergio; Soriano, Javier; Fernández, Rafael

    2017-09-19

    In this paper, we report an algorithm that is designed to leverage the cloud as infrastructure to support Internet of Things (IoT) by elastically scaling in/out so that IoT-based service users never stop receiving sensors' data. This algorithm is able to provide an uninterrupted service to end users even during the scaling operation since its internal state repartitioning is transparent for publishers or subscribers; its scaling operation is time-bounded and depends only on the dimension of the state partitions to be transmitted to the different nodes. We describe its implementation in E-SilboPS, an elastic content-based publish/subscribe (CBPS) system specifically designed to support context-aware sensing and communication in IoT-based services. E-SilboPS is a key internal asset of the FIWARE IoT services enablement platform, which offers an architecture of components specifically designed to capture data from, or act upon, IoT devices as easily as reading/changing the value of attributes linked to context entities. In addition, we discuss the quantitative measurements used to evaluate the scale-out process, as well as the results of this evaluation. This new feature rounds out the context-aware content-based features of E-SilboPS by providing, for example, the necessary middleware for constructing dashboards and monitoring panels that are capable of dynamically changing queries and continuously handling data in IoT-based services.

  14. K2 Au(IO3)5 and β-KAu(IO3)4: Polar Materials with Strong SHG Responses Originating from Synergistic Effect of AuO4 and IO3 Units.

    Science.gov (United States)

    Xu, Xiang; Hu, Chun-Li; Li, Bing-Xuan; Mao, Jiang-Gao

    2016-01-26

    Two new polar potassium gold iodates, namely, K2 Au(IO3)5 (Cmc21) and β-KAu(IO3)4 (C2), have been synthesized and structurally characterized. Both compounds feature zero-dimensional polar [Au(IO3)4](-) units composed of an AuO4 square-planar unit coordinated by four IO3(-) ions in a monodentate fashion. In β-KAu(IO3)4, isolated [Au(IO3)4](-) ions are separated by K(+) ions, whereas in K2 Au(IO3)5, isolated [Au(IO3)4](-) ions and non-coordinated IO3(-) units are separated by K(+) ions. Both compounds are thermally stable up to 400 °C and exhibit high transmittance in the NIR region (λ=800-2500 nm) with measured optical band gaps of 2.65 eV for K2 Au(IO3 )5 and 2.75 eV for β-KAu(IO3)4. Powder second-harmonic generation measurements by using λ=2.05 μm laser radiation indicate that K2 Au(IO3)5 and β-KAu(IO3)4 are both phase-matchable materials with strong SHG responses of approximately 1.0 and 1.3 times that of KTiOPO4, respectively. Theoretical calculations based on DFT methods confirm that such strong SHG responses originate from a synergistic effect of the AuO4 and IO3 units. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  15. High-performance file I/O in Java : existing approaches and bulk I/O extensions.

    Energy Technology Data Exchange (ETDEWEB)

    Bonachea, D.; Dickens, P.; Thakur, R.; Mathematics and Computer Science; Univ. of California at Berkeley; Illinois Institute of Technology

    2001-07-01

    There is a growing interest in using Java as the language for developing high-performance computing applications. To be successful in the high-performance computing domain, however, Java must not only be able to provide high computational performance, but also high-performance I/O. In this paper, we first examine several approaches that attempt to provide high-performance I/O in Java - many of which are not obvious at first glance - and evaluate their performance on two parallel machines, the IBM SP and the SGI Origin2000. We then propose extensions to the Java I/O library that address the deficiencies in the Java I/O API and improve performance dramatically. The extensions add bulk (array) I/O operations to Java, thereby removing much of the overhead currently associated with array I/O in Java. We have implemented the extensions in two ways: in a standard JVM using the Java Native Interface (JNI) and in a high-performance parallel dialect of Java called Titanium. We describe the two implementations and present performance results that demonstrate the benefits of the proposed extensions.

  16. Klasifikace v oblasti IoT

    OpenAIRE

    Flégl, Jaroslav

    2017-01-01

    This bachelor thesis is focused on classification of IoT. The aim of this thesis is classifying and categorizing IoT using systematic literature review. Several steps are needed to fulfill this aim. First part of this thesis focuses on defining IoT. Top ten companies, which invest the most to IoT are introduced with their view on IoT. Then follows characterization of classification and categorization including differences between them. Second part focuses on describing SLR. First of all the p...

  17. An Efficient SDN Multicast Architecture for Dynamic Industrial IoT Environments

    Directory of Open Access Journals (Sweden)

    Hyeong-Su Kim

    2018-01-01

    Full Text Available Large-scale industrial IoT services appear in smart factory domains such as factory clouds which integrate distributed small factories into a large virtual factory with dynamic combination based on orders of consumers. A smart factory has so many industrial elements including various sensors/actuators, gateways, controllers, application servers, and IoT clouds. Since there are complex connections and relations, it is hard to handle them in point-to-point manner. In addition, many duplicated traffics are exchanged between them through the Internet. Multicast is believed as an effective many-to-many communication mechanism by establishing multicast trees between sources and receivers. There are, however, some issues for adopting multicast to large-scale industrial IoT services in terms of QoS. In this paper, we propose a novel software-defined network multicast based on group shared tree which includes near-receiver rendezvous point selection algorithm and group shared tree switching mechanism. As a result, the proposed multicast mechanism can reduce the packet loss by 90% compared to the legacy methods under severe congestion condition. GST switching method obtains to decreased packet delay effect, respectively, 2%, 20% better than the previously studied multicast and the legacy SDN multicast.

  18. Modular HPC I/O characterization with Darshan

    Energy Technology Data Exchange (ETDEWEB)

    Snyder, Shane; Carns, Philip; Harms, Kevin; Ross, Robert; Lockwood, Glenn K.; Wright, Nicholas J.

    2016-11-13

    Contemporary high-performance computing (HPC) applications encompass a broad range of distinct I/O strategies and are often executed on a number of different compute platforms in their lifetime. These large-scale HPC platforms employ increasingly complex I/O subsystems to provide a suitable level of I/O performance to applications. Tuning I/O workloads for such a system is nontrivial, and the results generally are not portable to other HPC systems. I/O profiling tools can help to address this challenge, but most existing tools only instrument specific components within the I/O subsystem that provide a limited perspective on I/O performance. The increasing diversity of scientific applications and computing platforms calls for greater flexibililty and scope in I/O characterization.

  19. Variable use of standards-based IOS enabling technologies in Australian SMEs : an examination of deliberate and emergent decision making processes

    NARCIS (Netherlands)

    Power, Damien; Gruner, Richard L.

    Use of inter-organizational systems (IOS) is widely recognized as pivotal to organizational success. However, the nature of decision making processes regarding the adoption and use of IOS-enabling technologies has received little research attention. The authors explore approaches to decisionmaking

  20. Hubble Captures Volcanic Eruption Plume From Io

    Science.gov (United States)

    1997-01-01

    The Hubble Space Telescope has snapped a picture of a 400-km-high (250-mile-high) plume of gas and dust from a volcanic eruption on Io, Jupiter's large innermost moon.Io was passing in front of Jupiter when this image was taken by the Wide Field and Planetary Camera 2 in July 1996. The plume appears as an orange patch just off the edge of Io in the eight o'clock position, against the blue background of Jupiter's clouds. Io's volcanic eruptions blasts material hundreds of kilometers into space in giant plumes of gas and dust. In this image, material must have been blown out of the volcano at more than 2,000 mph to form a plume of this size, which is the largest yet seen on Io.Until now, these plumes have only been seen by spacecraft near Jupiter, and their detection from the Earth-orbiting Hubble Space Telescope opens up new opportunities for long-term studies of these remarkable phenomena.The plume seen here is from Pele, one of Io's most powerful volcanos. Pele's eruptions have been seen before. In March 1979, the Voyager 1 spacecraft recorded a 300-km-high eruption cloud from Pele. But the volcano was inactive when the Voyager 2 spacecraft flew by Jupiter in July 1979. This Hubble observation is the first glimpse of a Pele eruption plume since the Voyager expeditions.Io's volcanic plumes are much taller than those produced by terrestrial volcanos because of a combination of factors. The moon's thin atmosphere offers no resistance to the expanding volcanic gases; its weak gravity (one-sixth that of Earth) allows material to climb higher before falling; and its biggest volcanos are more powerful than most of Earth's volcanos.This image is a contrast-enhanced composite of an ultraviolet image (2600 Angstrom wavelength), shown in blue, and a violet image (4100 Angstrom wavelength), shown in orange. The orange color probably occurs because of the absorption and/or scattering of ultraviolet light in the plume. This light from Jupiter passes through the plume and is

  1. Erosional scarps on Io

    International Nuclear Information System (INIS)

    McCauley, J.F.; Soderblom, L.A.; Smith, B.A.

    1979-01-01

    Irregular or fretted scarps on Io as revealed during the voyager 1 mission are similar to those found on Earth and Mars. A sapping mechanism involving liquid SO 2 is proposed to explain these complexly eroded terrains on Io. (author)

  2. iOS app development for dummies

    CERN Document Server

    Feiler, Jesse

    2014-01-01

    If you've got incredible iOS ideas, get this book and bring them to life! iOS 7 represents the most significant update to Apple's mobile operating system since the first iPhone was released, and even the most seasoned app developers are looking for information on how to take advantage of the latest iOS 7 features in their app designs. That's where iOS App Development For Dummies comes in! Whether you're a programming hobbyist wanting to build an app for fun or a professional developer looking to expand into the iOS market, this book will walk you through the fundamentals of building a univer

  3. Flujo de control en iOS Flow control in iOS

    Directory of Open Access Journals (Sweden)

    Franklin Hernández Castro

    2012-11-01

    Full Text Available El objetivo de este artículo es explicar los flujos de control que se usan en la programación de las aplicaciones en iOS, con el fin de resumir los aspectos más relevantes que se deben tomar en cuenta para programar una tarea a ser realizada por un dispositivo móvil del tipo iPhone o iPad. Debido a que el ambiente iOS es estrictamente orientado a objetos (OOP, los flujos de control no son obvios; además, los estándares de la firma Apple® definen patrones de diseño en el sistema que son altamente recomendados en este tipo de diseño. En este artículo se introducen algunos de ellos.This paper explain the control flows that are used by programming applications in iOS, trying to summarize the most important aspects to be considered by programming mobile devices like iPhone and iPad. Because iOS environment, is strictly a object-oriented one(OOP, control flows are not obvious, besides Apple® use design patterns highly recommended in this type of programming. Here we introduces some of them.

  4. Zabezpečení platformy iOS

    OpenAIRE

    Nidl, Michal

    2014-01-01

    This bachelor's thesis is focused on security of operating system iOS from Apple. The thesis is divided into six chapters. The first chapter describes iOS and Apple company. The second chapter deals with iOS security architecture in terms of security model and security mechanisms. The third chapter deals with the security of iOS applications and options of their testing. The fourth chapter describes software attacks against iOS in the form of malware and exploitation. The fifth chapter descri...

  5. Volcanic features of Io

    International Nuclear Information System (INIS)

    Carr, M.H.; Masursky, H.; Strom, R.G.; Terrile, R.J.

    1979-01-01

    The volcanic features of Io as detected during the Voyager mission are discussed. The volcanic activity is apparently higher than on any other body in the Solar System. Its volcanic landforms are compared with features on Earth to indicate the type of volcanism present on Io. (U.K.)

  6. iOS 6 foundations

    CERN Document Server

    Feiler, Jesse

    2013-01-01

    A practical introduction for using iOS 6 to create universal apps If you have prior experience programming in an object-oriented language and are eager to start building universal apps for iPad and iPhone (including the iPod touch), then this is the book for you! Using the latest version of iOS (iOS 6) along with the latest version of Xcode (Xcode 4.5), this book is a practical introduction rather than just a catalog of components. Full-color and packed with groundbreaking, innovative designs, this book teaches you how to create eye-catching, unique apps. Teaches you the va

  7. Volcanic eruption plumes on Io

    International Nuclear Information System (INIS)

    Strom, R.G.; Terrile, R.J.; Masursky, H.; Hansen, C.

    1979-01-01

    The detection of an umbrella-shaped plume extending about 280 km above the bright limb of Io was one of the most important discoveries made during the Voyager 1 encounter with the jovian system. This discovery proves that Io is volcanically active at present, and the number and magnitude of these eruptions indicate that Io is the most volcanically active body so far discovered in the Solar System. Preliminary analyses of these eruptive plumes are presented. (U.K.)

  8. Ranking System for IoT Industry Platform

    OpenAIRE

    Mukherjee, Somshree

    2016-01-01

    The Internet of Things (IoT) has seen a huge growth spurt in the last few years which has resulted in the need for more standardised IoT technology. Because of this, numerous IoT platforms have sprung up that offer a variety of features and use different technologies which may not necessarily be compliant with each other or with other technologies. Companies that wish to enter theIoT market are in constant need to find the most suitable IoT platform for their business and have a certain set o...

  9. Hotspots on Io During the Ganymede 2 Encounter

    Science.gov (United States)

    1996-01-01

    The Near Infrared Mapping Spectrometer (NIMS) on the Galileo spacecraft imaged Io at high spectral resolution at a range of 439,000 km (275,000 miles) during the G2 encounter on 6 September 1996. This image shows, on the right, Io as seen by NIMS, centered on 150 W longitude. The image on the left shows the same view point from Voyager data (from the encounters in 1979 and 1980). The NIMS image can be compared to the NIMS hotspot image from the G1 orbit (June 1996) to monitor changes on Io. The most dramatic feature of the G2 image is the hotspot at Malik Patera. Preliminary analysis of the data yields a temperature of at least 1000 K (727 C) for this hotspot, an increase of more than 300 K from the G1 encounter. In the overlap area of the G1 and G2 images all the hotspots seen during the G1 encounter are also seen in the G2 image. Other hotspots were seen, including one at the Pele plume origin site. This image is at the 4 micron band to best view the Malik hotspot. Most of the other hotspots are best seen at longer wavelengths. NIMS is continuing to observe Io to monitor volcanic activity throughout the Galileo mission.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA's Office of Space Science, Washington, DC.This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov.

  10. uFlip: Understanding Flash IO Patterns

    DEFF Research Database (Denmark)

    Bouganim, Luc; Jonsson, Bjørn; Bonnet, Philippe

    2009-01-01

    want to establish what kind of IOs should be favored (or avoided) when designing algorithms and architectures for flash-based systems. In this paper, we focus on flash IO patterns, that capture relevant distribution of IOs in time and space, and our goal is to quantify their performance. We define uFLIP...

  11. IoT Platforms: Analysis for Building Projects

    Directory of Open Access Journals (Sweden)

    Rusu Liviu DUMITRU

    2017-01-01

    Full Text Available This paper presents a general survey of IoT platforms in terms of features for IoT project de-velopers. I will briefly summarize the state of knowledge in terms of technology regarding “In-ternet of Things” first steps in developing this technology, history, trends, sensors and micro-controllers used. I have evaluated a number of 5 IoT platforms in terms of the features needed to develop a IoT project. I have listed those components that are most appreciated by IoT pro-ject developers and the results have been highlighted in a comparative analysis of these plat-forms from the point of view of IoT project developers and which are strictly necessary as a de-velopment environment for an IoT project based. I’ve also considered the users' views of such platforms in terms of functionality, advantages, disadvantages and dangers presented by this technology.

  12. I/O in the ATLAS multithreaded framework

    CERN Document Server

    Cranshaw, Jack; The ATLAS collaboration; Nowak, Marcin

    2018-01-01

    Scalable multithreading poses challenges to I/O, and the performance of a thread-safe I/O strategy may depend upon many factors, including I/O latencies, whether tasks are CPU- or I/O-intensive, and thread count. In a multithreaded framework, an I/O infrastructure must efficiently supply event data to and collect it from many threads processing multiple events in flight. In particular, on-demand reading from multiple threads may challenge caching strategies that were developed for serial processing and may need to be enhanced. This I/O infrastructure must also address how to read, make available, and propagate in-file metadata and other non-event data needed as context for event processing. We describe the design and scheduling of I/O components in the ATLAS multithreaded control framework, AthenaMT, for both event and non-event I/O. We discuss issues associated with exploiting the multithreading capabilities of our underlying persistence technology, ROOT, in a manner harmonious with the ATLAS framework’s o...

  13. A survey of IoT cloud platforms

    Directory of Open Access Journals (Sweden)

    Partha Pratim Ray

    2016-12-01

    Full Text Available Internet of Things (IoT envisages overall merging of several “things” while utilizing internet as the backbone of the communication system to establish a smart interaction between people and surrounding objects. Cloud, being the crucial component of IoT, provides valuable application specific services in many application domains. A number of IoT cloud providers are currently emerging into the market to leverage suitable and specific IoT based services. In spite of huge possible involvement of these IoT clouds, no standard cum comparative analytical study has been found across the literature databases. This article surveys popular IoT cloud platforms in light of solving several service domains such as application development, device management, system management, heterogeneity management, data management, tools for analysis, deployment, monitoring, visualization, and research. A comparison is presented for overall dissemination of IoT clouds according to their applicability. Further, few challenges are also described that the researchers should take on in near future. Ultimately, the goal of this article is to provide detailed knowledge about the existing IoT cloud service providers and their pros and cons in concrete form.

  14. From BPM to IoT

    OpenAIRE

    Cherrier , Sylvain; Deshpande , Varun

    2017-01-01

    International audience; IoT’s presence is increasingly felt. There are already more connected devices to the internet than total human population and sales are starting to rise. As there is extensive research ongoing in order to propose a global architecture to build IoT applications, the domain will rise as soon as a common solution will be widespread. Further, we would need to integrate IoT applications into the legacy data processing solutions. Business Process Model, for example, is a com...

  15. VisIO: enabling interactive visualization of ultra-scale, time-series data via high-bandwidth distributed I/O systems

    Energy Technology Data Exchange (ETDEWEB)

    Mitchell, Christopher J [Los Alamos National Laboratory; Ahrens, James P [Los Alamos National Laboratory; Wang, Jun [UCF

    2010-10-15

    Petascale simulations compute at resolutions ranging into billions of cells and write terabytes of data for visualization and analysis. Interactive visuaUzation of this time series is a desired step before starting a new run. The I/O subsystem and associated network often are a significant impediment to interactive visualization of time-varying data; as they are not configured or provisioned to provide necessary I/O read rates. In this paper, we propose a new I/O library for visualization applications: VisIO. Visualization applications commonly use N-to-N reads within their parallel enabled readers which provides an incentive for a shared-nothing approach to I/O, similar to other data-intensive approaches such as Hadoop. However, unlike other data-intensive applications, visualization requires: (1) interactive performance for large data volumes, (2) compatibility with MPI and POSIX file system semantics for compatibility with existing infrastructure, and (3) use of existing file formats and their stipulated data partitioning rules. VisIO, provides a mechanism for using a non-POSIX distributed file system to provide linear scaling of 110 bandwidth. In addition, we introduce a novel scheduling algorithm that helps to co-locate visualization processes on nodes with the requested data. Testing using VisIO integrated into Para View was conducted using the Hadoop Distributed File System (HDFS) on TACC's Longhorn cluster. A representative dataset, VPIC, across 128 nodes showed a 64.4% read performance improvement compared to the provided Lustre installation. Also tested, was a dataset representing a global ocean salinity simulation that showed a 51.4% improvement in read performance over Lustre when using our VisIO system. VisIO, provides powerful high-performance I/O services to visualization applications, allowing for interactive performance with ultra-scale, time-series data.

  16. Interaction between users and IoT clusters

    DEFF Research Database (Denmark)

    Shinde, Gitanjali; Olesen, Henning

    2015-01-01

    The Internet of Things (IoT) is paving the way for a vast number of objects in our environment to react, respond and work autonomously as and when required and as per their capability, role and position. They will be able to announce and offer their services to the users, and together this will e......The Internet of Things (IoT) is paving the way for a vast number of objects in our environment to react, respond and work autonomously as and when required and as per their capability, role and position. They will be able to announce and offer their services to the users, and together...... this will enable the vision of an "Internet of People, Things and Services" (IoPTS). Application areas for IoT include smart cities, smart homes, environmental control, security & emergency, retail, logistics, industrial control, smart farming, and e-Health. All the IoT objects are organized in clusters, which...... framework that is needed to realize IoPTS. In particular, we focus on the interaction between the users and the IoT clusters, where the user profile (role, privileges, and preferences) should be matched with the services offered by the IoT cluster, including the initial set-up, access control...

  17. RapidIO as a multi-purpose interconnect

    Science.gov (United States)

    Baymani, Simaolhoda; Alexopoulos, Konstantinos; Valat, Sébastien

    2017-10-01

    RapidIO (http://rapidio.org/) technology is a packet-switched high-performance fabric, which has been under active development since 1997. Originally meant to be a front side bus, it developed into a system level interconnect which is today used in all 4G/LTE base stations world wide. RapidIO is often used in embedded systems that require high reliability, low latency and scalability in a heterogeneous environment - features that are highly interesting for several use cases, such as data analytics and data acquisition (DAQ) networks. We will present the results of evaluating RapidIO in a data analytics environment, from setup to benchmark. Specifically, we will share the experience of running ROOT and Hadoop on top of RapidIO. To demonstrate the multi-purpose characteristics of RapidIO, we will also present the results of investigating RapidIO as a technology for high-speed DAQ networks using a generic multi-protocol event-building emulation tool. In addition we will present lessons learned from implementing native ports of CERN applications to RapidIO.

  18. Gateway-Assisted Retransmission for Lightweight and Reliable IoT Communications.

    Science.gov (United States)

    Chang, Hui-Ling; Wang, Cheng-Gang; Wu, Mong-Ting; Tsai, Meng-Hsun; Lin, Chia-Ying

    2016-09-22

    Message Queuing Telemetry Transport for Sensor Networks (MQTT-SN) and Constrained Application Protocol (CoAP) are two protocols supporting publish/subscribe models for IoT devices to publish messages to interested subscribers. Retransmission mechanisms are introduced to compensate for the lack of data reliability. If the device does not receive the acknowledgement (ACK) before retransmission timeout (RTO) expires, the device will retransmit data. Setting an appropriate RTO is important because the delay may be large or retransmission may be too frequent when the RTO is inappropriate. We propose a Gateway-assisted CoAP (GaCoAP) to dynamically compute RTO for devices. Simulation models are proposed to investigate the performance of GaCoAP compared with four other methods. The experiment results show that GaCoAP is more suitable for IoT devices.

  19. Students versus IoT Security

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    What happens when you introduce students to IoT security for the first time? In this talk I will tell you about my first experience with IoT Security and the thought process behind the decisions I made.

  20. Understanding IoT systems: a life cycle approach

    NARCIS (Netherlands)

    Rahman, Leila Fatmasari; Ozcelebi, Tanir; Lukkien, Johan

    2018-01-01

    Internet of Things (IoT) systems and the corresponding network architectures are complex due to distributed services on many IoT devices collaboratively fulfilling common goals of IoT applications. System requirements for different types of IoT application domains are still not well-established. The

  1. Towards multi-layer interoperability of heterogeneous IoT platforms : the INTER-IoT approach

    NARCIS (Netherlands)

    Fortino, Giancarlo; Savaglio, Claudio; Palau, Carlos E.; de Puga, Jara Suarez; Ghanza, Maria; Paprzycki, Marcin; Montesinos, Miguel; Liotta, Antonio; Llop, Miguel; Gravina, R.; Palau, C.E.; Manso, M.; Liotta, A.; Fortino, G.

    2018-01-01

    Open interoperability delivers on the promise of enabling vendors and developers to interact and interoperate, without interfering with anyone’s ability to compete by delivering a superior product and experience. In the absence of global IoT standards, the INTER-IoT voluntary approach will support

  2. Juno-UVS observation of the Io footprint: Influence of Io's local environment and passage into eclipse on the strength of the interaction

    Science.gov (United States)

    Hue, V.; Gladstone, R.; Greathouse, T. K.; Versteeg, M.; Bonfond, B.; Saur, J.; Davis, M. W.; Roth, L.; Grodent, D. C.; Gerard, J. C. M. C.; Kammer, J.; Bolton, S. J.; Levin, S.; Connerney, J. E. P.

    2017-12-01

    The Juno mission offers an unprecedented opportunity to study Jupiter, from its internal structure to its magnetospheric environment. Juno-UVS is a UV spectrograph with a bandpass of 70vantage point above the poles. In particular, UVS has observed the instantaneous Io footprint and extended tail as Io enters into eclipse. This observation may better constrain whether the atmosphere of Io is sustained via volcanic activity or sublimation. Among other processes, the modulation of Io's footprint brightness correlates to the strength of the interaction between the Io plasma torus and its ionosphere, which, in turn, is likely to be affected by the atmospheric collapse. UVS observed the Io footprint during two eclipses that occurred on PJ1 and PJ3, and one additional eclipse observation is planned during PJ9 (24 Oct. 2017). We present how the electrodynamic coupling between Io and Jupiter is influenced by changes in Io's local environment, e.g. Io's passage in and out of eclipse and Io's traverse of the magnetodisc plasma sheet.

  3. IoT interoperability : a hub-based approach

    OpenAIRE

    Blackstock, Michael; Lea, Rodger

    2014-01-01

    Interoperability in the Internet of Things is critical for emerging services and applications. In this paper we advocate the use of IoT ‘hubs’ to aggregate things using web protocols, and suggest a staged approach to interoperability. In the context of a UK government funded project involving 8 IoT projects to address cross-domain IoT interoperability, we introduce the HyperCat IoT catalogue specification. We then describe the tools and techniques we developed to adapt an existing data portal...

  4. Human‐Centric IoT Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena Dimitrova; Prasad, Ramjee; Pejanovic, Milica

    2017-01-01

    The current Internet of things (IoT) concept is characterized with billions and billions of devices interworking through a myriad of technologies for the delivery of smart personalized services and applications. At the center of these is the human user who drives his/her own interconnected cluster....... This concept has also been introduced elsewhere as “human center sensing (HCS).” The vision pushed by the authors of this chapter for the IoT beyond 2050 is one of the large‐scale and dense HCS connectivities, the complexity of which can be used to extract new IoT value proposition....

  5. Gateway-Assisted Retransmission for Lightweight and Reliable IoT Communications

    Directory of Open Access Journals (Sweden)

    Hui-Ling Chang

    2016-09-01

    Full Text Available Message Queuing Telemetry Transport for Sensor Networks (MQTT-SN and Constrained Application Protocol (CoAP are two protocols supporting publish/subscribe models for IoT devices to publish messages to interested subscribers. Retransmission mechanisms are introduced to compensate for the lack of data reliability. If the device does not receive the acknowledgement (ACK before retransmission timeout (RTO expires, the device will retransmit data. Setting an appropriate RTO is important because the delay may be large or retransmission may be too frequent when the RTO is inappropriate. We propose a Gateway-assisted CoAP (GaCoAP to dynamically compute RTO for devices. Simulation models are proposed to investigate the performance of GaCoAP compared with four other methods. The experiment results show that GaCoAP is more suitable for IoT devices.

  6. Securing IoT Devices at CERN

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    CERN has more than 1000 Internet of Things (IoT) devices, which are connected to the office network. We have been doing the research to find all vulnerable IoT devices in CERN and mitigated them. We are currently working on detecting IoT devices automatically and, moreover, identifying the manufacturer, model and the running firmware version. This will help the CERN Computer Security Team to spot vulnerable devices and to show the security risks associated with them.

  7. Does Io's ionosphere influence Jupiter's radio bursts.

    Science.gov (United States)

    Webster, D. L.; Alksne, A. Y.; Whitten, R. C.

    1972-01-01

    Goldreich and Lynden-Bell's theory of Jupiter's Io-correlated decametric radiation sets a lower limit to Io's conductivity, high enough to carry the current associated with the radiated power. Dermott's analysis of conductivities of rocks and ice shows no such conductivity at Io's temperature. However, we show that if Io has even a small atmosphere, say of methane as suggested by Binder and Cruikshank, or of argon or nitrogen, it will have an ionosphere with adequate conductivity to meet the above criterion. A requirement for higher conductivity was found by Goldreich and Lynden-Bell on the basis of motion of magnetic lines past Io. This requirement appears to us unnecessary in view of experiments which prove that motion of the lines is not the source of the electromotance.

  8. The atmosphere and ionosphere of Io

    International Nuclear Information System (INIS)

    McElroy, M.B.; Yung, Y.L.

    1975-01-01

    A variety of models for Io's atmosphere, ionosphere, surface, and environment are developed and discussed in the context of recent observational data. The sodium emission detected by Brown appears to require a collisional excitation process in Io's atmosphere, and the extended sodium emission measured by Trafton et al. may require scattering of the planetary radiation by an extended sodium cloud. The sodium is presumably present initially in bound form on Io's surface and may be released by the sputtering mechanism suggested by Matson et al. The ionosphere detected by the radio occultation experiment on Pioneer 10 could be attributed to photoionization of atmospheric sodium if Io's atmosphere could sustain significant vertical motions, of order 1 s/sup -1/ directed up during the day, down at night. Vertical motions of this magnitude could be driven by condensation of atmospheric NH 3 . The total density of gas at Io's surface appears to lie in the range 10 10 -10 12 molecules cm/sup -3/. Corpuscular ionization could play an additional role for the ionosphere. In this case the sateSe should exhibit an exceedingly bright, approx.10 kR, airglow at Lα. The incomplete hydrogen torus observed by Judge and Carlson in the vicinity of Io requires a large supply of hydrogen from the satellite's atmosphere. The escape flux should be of order 10 11 cm/sup -2/ s/sup -1/ and could be maintained by photolysis of atmospheric NH 3 . The observed geometry of the hydrogen torus appears to require a surprisingly short lifetime, approx.10 5 s, for neutral hydrogen near Io's orbit, and may indicate the presence of a large flux, approx.10 9 cm/sup -2/ s/sup -1/, of low-energy protons in Jupiter's magnetosphere. Implications of the hydrogen torus for the energy and mass balance of Jupiter's magnetosphere are discussed briefly, and observational programs are identified which might illuminate present uncertainties in our understanding of Io

  9. Future of IoT Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Suk Kyu Lee

    2017-10-01

    Full Text Available The introduction of mobile devices has changed our daily lives. They enable users to obtain information even in a nomadic environment and provide information without limitations. A decade after the introduction of this technology, we are now facing the next innovation that will change our daily lives. With the introduction of the Internet of Things (IoT, our communication ability will not be restricted to only mobile devices. Rather, it will expand to all things with which we coexist. Many studies have discussed IoT-related services and platforms. However, there are only limited discussions about the IoT network. In this paper, we will thoroughly analyze the technical details about the IoT network. Based on our survey of papers, we will provide insight about the future IoT network and the crucial components that will enable it.

  10. Dynamic I/O Power Management for Hard Real-Time Systems

    Science.gov (United States)

    2005-01-01

    recently emerged as an attractive alternative to inflexible hardware solutions. DPM for hard real - time systems has received relatively little attention...In particular, energy-driven I/O device scheduling for real - time systems has not been considered before. We present the first online DPM algorithm...which we call Low Energy Device Scheduler (LEDES), for hard real - time systems . LEDES takes as inputs a predetermined task schedule and a device-usage

  11. Heat flow from Io /JI/

    Science.gov (United States)

    Matson, D. L.; Ransford, G. A.; Johnson, T. V.

    1981-01-01

    The existing ground-based measurements of Io's thermal emission at infrared wavelengths of 8.4, 10.6, and 21 microns have been reexamined. Present in these data is the signature of hot spots, presumably similar to the hot spots seen by the IRIS experiment on Voyager. It is possible to extract from these data the total amount of power radiated. Since the hot spots are believed to be a result of deep-seated activity in Io and since the remainder of Io's surface is an extraordinarily poor thermal conductor, the power radiated by the hot spots is essentially the total heat flow. The analysis yields a heat flow of 2 + or - 1 W/sq m. This value is tremendously large in comparison to the average heat flow of the earth (0.06 W/sq m) and the moon (0.02 W/sq m), but is characteristic of active geothermal areas on the earth. A heat flow this large requires that the interior of Io be at least partially molten on a global scale.

  12. iOS Sensor Apps with Arduino Wiring the iPhone and iPad into the Internet of Things

    CERN Document Server

    Allan, Alasdair

    2011-01-01

    Turn your iPhone or iPad into the hub of a distributed sensor network with the help of an Arduino microcontroller. With this concise guide, you'll learn how to connect an external sensor to an iOS device and have them talk to each other through Arduino. You'll also build an iOS application that will parse the sensor values it receives and plot the resulting measurements, all in real-time. iOS processes data from its own onboard sensors, and now you can extend its reach with this simple, low-cost project. If you're an Objective-C programmer who likes to experiment, this book explains the basi

  13. Performance Analysis of Dual-Polarized Massive MIMO System with Human-Care IoT Devices for Cellular Networks

    Directory of Open Access Journals (Sweden)

    Jun-Ki Hong

    2018-01-01

    Full Text Available The performance analysis of the dual-polarized massive multiple-input multiple-output (MIMO system with Internet of things (IoT devices is studied when outdoor human-care IoT devices are connected to a cellular network via a dual-polarized massive MIMO system. The research background of the performance analysis of dual-polarized massive MIMO system with IoT devices is that recently the data usage of outdoor human-care IoT devices has increased. Therefore, the outdoor human-care IoT devices are necessary to connect with 5G cellular networks which can expect 1000 times higher performance compared with 4G cellular networks. Moreover, in order to guarantee the safety of the patient for emergency cases, a human-care Iot device must be connected to cellular networks which offer more stable communication for outdoors compared to short-range communication technologies such as Wi-Fi, Zigbee, and Bluetooth. To analyze the performance of the dual-polarized massive MIMO system for human-care IoT devices, a dual-polarized MIMO spatial channel model (SCM is proposed which considers depolarization effect between the dual-polarized transmit-antennas and the receive-antennas. The simulation results show that the performance of the dual-polarized massive MIMO system is improved about 16% to 92% for 20 to 150 IoT devices compared to conventional single-polarized massive MIMO system for identical size of the transmit array.

  14. TRIO: Burst Buffer Based I/O Orchestration

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Teng [Auburn University; Oral, H Sarp [ORNL; Pritchard, Michael [Auburn University; Wang, Bin [Auburn University; Yu, Weikuan [Auburn University

    2015-01-01

    The growing computing power on leadership HPC systems is often accompanied by ever-escalating failure rates. Checkpointing is a common defensive mechanism used by scientific applications for failure recovery. However, directly writing the large and bursty checkpointing dataset to parallel filesystem can incur significant I/O contention on storage servers. Such contention in turn degrades the raw bandwidth utilization of storage servers and prolongs the average job I/O time of concurrent applications. Recently burst buffer has been proposed as an intermediate layer to absorb the bursty I/O traffic from compute nodes to storage backend. But an I/O orchestration mechanism is still desired to efficiently move checkpointing data from bursty buffers to storage backend. In this paper, we propose a burst buffer based I/O orchestration framework, named TRIO, to intercept and reshape the bursty writes for better sequential write traffic to storage severs. Meanwhile, TRIO coordinates the flushing orders among concurrent burst buffers to alleviate the contention on storage server bandwidth. Our experimental results reveal that TRIO can deliver 30.5% higher bandwidth and reduce the average job I/O time by 37% on average for data-intensive applications in various checkpointing scenarios.

  15. IoT Contextual Factors on Healthcare.

    Science.gov (United States)

    Michalakis, Konstantinos; Caridakis, George

    2017-01-01

    With the emergence of the Internet of Things, new services in healthcare will be available and existing systems will be integrated in the IoT framework, providing automated medical supervision and efficient medical treatment. Context awareness plays a critical role in realizing the vision of the IoT, providing rich contextual information that can help the system act more efficiently. Since context in healthcare has its unique characteristics, it is necessary to define an appropriate context aware framework for healthcare IoT applications. We identify this context as perceived in healthcare applications and describe the context aware procedures. We also present an architecture that connects the sensors that measure biometric data with the sensory networks of the environment and the various IoT middleware that reside in the geographical area. Finally, we discuss the challenges for the realization of this vision.

  16. Rutes amb iOS

    OpenAIRE

    Nofuentes Azcárate, Pedro

    2011-01-01

    Projecte de l'implementació d'una aplicació per registrar i gestionar recorreguts basada al sistema operatiu iOS amb la possibilitat de sincronitzar amb un servei web sobre la plataforma Google App Engine. Proyecto de implementación de una aplicación para registrar y gestionar recorridos basada en el sistema operativo iOS con la posibilidad de sincronizar con un servicio web sobre la plataforma Google App Engine. Implementation project for an application to record and manage routes, bas...

  17. Performance analysis of routing protocols for IoT

    Science.gov (United States)

    Manda, Sridhar; Nalini, N.

    2018-04-01

    Internet of Things (IoT) is an arrangement of advancements that are between disciplinary. It is utilized to have compelling combination of both physical and computerized things. With IoT physical things can have personal virtual identities and participate in distributed computing. Realization of IoT needs the usage of sensors based on the sector for which IoT is integrated. For instance, in healthcare domain, IoT needs to have integration with wearable sensors used by patients. As sensor devices produce huge amount of data, often called big data, there should be efficient routing protocols in place. To the extent remote systems is worried there are some current protocols, for example, OLSR, DSR and AODV. It additionally tosses light into Trust based routing protocol for low-power and lossy systems (TRPL) for IoT. These are broadly utilized remote directing protocols. As IoT is developing round the corner, it is basic to investigate routing protocols that and evaluate their execution regarding throughput, end to end delay, and directing overhead. The execution experiences can help in settling on very much educated choices while incorporating remote systems with IoT. In this paper, we analyzed different routing protocols and their performance is compared. It is found that AODV showed better performance than other routing protocols aforementioned.

  18. Understanding Information Hiding in iOS

    OpenAIRE

    Caviglione, Luca; Mazurczyk, Wojciech

    2014-01-01

    The Apple operating system (iOS) has so far proved resistant to information-hiding techniques, which help attackers covertly communicate. However, Siri - a native iOS service that controls iPhones and iPads via voice commands - could change this trend.

  19. FIRE - Flyby of Io with Repeat Encounters: A conceptual design for a New Frontiers mission to Io

    Science.gov (United States)

    Suer, Terry-Ann; Padovan, Sebastiano; Whitten, Jennifer L.; Potter, Ross W. K.; Shkolyar, Svetlana; Cable, Morgan; Walker, Catherine; Szalay, Jamey; Parker, Charles; Cumbers, John; Gentry, Diana; Harrison, Tanya; Naidu, Shantanu; Trammell, Harold J.; Reimuller, Jason; Budney, Charles J.; Lowes, Leslie L.

    2017-09-01

    A conceptual design is presented for a low complexity, heritage-based flyby mission to Io, Jupiter's innermost Galilean satellite and the most volcanically active body in the Solar System. The design addresses the 2011 Decadal Survey's recommendation for a New Frontiers class mission to Io and is based upon the result of the June 2012 NASA-JPL Planetary Science Summer School. A science payload is proposed to investigate the link between the structure of Io's interior, its volcanic activity, its surface composition, and its tectonics. A study of Io's atmospheric processes and Io's role in the Jovian magnetosphere is also planned. The instrument suite includes a visible/near-IR imager, a magnetic field and plasma suite, a dust analyzer, and a gimbaled high gain antenna to perform radio science. Payload activity and spacecraft operations would be powered by three Advanced Stirling Radioisotope Generators (ASRG). The primary mission includes 10 flybys with close-encounter altitudes as low as 100 km. The mission risks are mitigated by ensuring that relevant components are radiation tolerant and by using redundancy and flight-proven parts in the design. The spacecraft would be launched on an Atlas V rocket with a delta-v of 1.3 km/s. Three gravity assists (Venus, Earth, Earth) would be used to reach the Jupiter system in a 6-year cruise. The resulting concept demonstrates the rich scientific return of a flyby mission to Io.

  20. iOS 5 Essentials

    CERN Document Server

    Daniel, Steven F

    2012-01-01

    Each chapter will take you through a new major feature of iOS 5. You will learn how to integrate each feature into your applications. If you ever wanted to learn about the latest features of iOS 5 and learn how to incorporate Twitter, iCloud and Core Image framework effects functionality into your applications, then this book is for you. You should have a good knowledge of programming experience with Objective-C, and have used Xcode 4. iPhone programming experience is not required.

  1. HUBBLE CLICKS IMAGES OF IO SWEEPING ACROSS JUPITER

    Science.gov (United States)

    2002-01-01

    While hunting for volcanic plumes on Io, NASA's Hubble Space Telescope captured these images of the volatile moon sweeping across the giant face of Jupiter. Only a few weeks before these dramatic images were taken, the orbiting telescope snapped a portrait of one of Io's volcanoes spewing sulfur dioxide 'snow.' These stunning images of the planetary duo are being released to commemorate the ninth anniversary of the Hubble telescope's launch on April 24, 1990. All of these images were taken with the Wide Field and Planetary Camera 2. The three overlapping snapshots show in crisp detail Io passing above Jupiter's turbulent clouds. The close-up picture of Io (bottom right) reveal a 120-mile-high (200-kilometer) plume of sulfur dioxide 'snow' emanating from Pillan, one of the moon's active volcanoes. 'Other observations have inferred sulfur dioxide 'snow' in Io's plumes, but this image offers direct observational evidence for sulfur dioxide 'snow' in an Io plume,' explains John R. Spencer of Lowell Observatory in Flagstaff, Ariz. A Trip Around Jupiter The three snapshots of the volcanic moon rounding Jupiter were taken over a 1.8-hour time span. Io is roughly the size of Earth's moon but 2,000 times farther away. In two of the images, Io appears to be skimming Jupiter's cloud tops, but it's actually 310,000 miles (500,000 kilometers) away. Io zips around Jupiter in 1.8 days, whereas the moon circles Earth every 28 days. The conspicuous black spot on Jupiter is Io's shadow and is about the size of the moon itself (2,262 miles or 3,640 kilometers across). This shadow sails across the face of Jupiter at 38,000 mph (17 kilometers per second). The smallest details visible on Io and Jupiter measure 93 miles (150 kilometers) across, or about the size of Connecticut. These images were further sharpened through image reconstruction techniques. The view is so crisp that one would have to stand on Io to see this much detail on Jupiter with the naked eye. The bright patches on Io

  2. An Application-Driven Modular IoT Architecture

    Directory of Open Access Journals (Sweden)

    Kumar Yelamarthi

    2017-01-01

    Full Text Available Building upon the advancements in the recent years, a new paradigm in technology has emerged in Internet of Things (IoT. IoT has allowed for communication with the surrounding environment through a multitude of sensors and actuators, yet operating on limited energy. Several researchers have presented IoT architectures for respective applications, often challenged by requiring major updates for adoption to a different application. Further, this comes with several uncertainties such as type of computational device required at the edge, mode of wireless connectivity required, methods to obtain power efficiency, and not ensuring rapid deployment. This paper starts with providing a horizontal overview of each layer in IoT architecture and options for different applications. Then it presents a broad application-driven modular architecture, which can be easily customized for rapid deployment. This paper presents the diverse hardware used in several IoT layers such as sensors, embedded processors, wireless transceivers, internet gateway, and application management cloud server. Later, this paper presents implementation results for diverse applications including healthcare, structural health monitoring, agriculture, and indoor tour guide systems. It is hoped that this research will assist the potential user to easily choose IoT hardware and software as it pertains to their respective needs.

  3. Choosing your IoT programming framework : architectural aspects

    NARCIS (Netherlands)

    Rahman, L.F.; Ozcelebi, T.; Lukkien, J.J.

    2016-01-01

    The Internet of Things (IoT) is turning into practice. To drive innovations, it is crucial that programmers have means to develop IoT applications in the form of IoT programming frameworks. These are toolkits to develop applications according to a certain style or method and that let developers

  4. Synthesizing Knowledge on Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Liu, Fei; Tan, Chee-Wee; Lim, Eric T. K.

    2016-01-01

    Research on Internet of Things (IoT) has been booming for past couple of years due to technological advances and its potential for application. Nonetheless, the rapid growth of IoT articles as well as the heterogeneous nature of IoT pose challenges in synthesizing prior research on the phenomenon...

  5. Remote I/O : fast access to distant storage.

    Energy Technology Data Exchange (ETDEWEB)

    Foster, I.; Kohr, D., Jr.; Krishnaiyer, R.; Mogill, J.

    1997-12-17

    As high-speed networks make it easier to use distributed resources, it becomes increasingly common that applications and their data are not colocated. Users have traditionally addressed this problem by manually staging data to and from remote computers. We argue instead for a new remote I/O paradigm in which programs use familiar parallel I/O interfaces to access remote file systems. In addition to simplifying remote execution, remote I/O can improve performance relative to staging by overlapping computation and data transfer or by reducing communication requirements. However, remote I/O also introduces new technical challenges in the areas of portability, performance, and integration with distributed computing systems. We propose techniques designed to address these challenges and describe a remote I/O library called RIO that we have developed to evaluate the effectiveness of these techniques. RIO addresses issues of portability by adopting the quasi-standard MPI-IO interface and by defining a RIO device and RIO server within the ADIO abstract I/O device architecture. It addresses performance issues by providing traditional I/O optimizations such as asynchronous operations and through implementation techniques such as buffering and message forwarding to off load communication overheads. RIO uses the Nexus communication library to obtain access to configuration and security mechanisms provided by the Globus wide area computing tool kit. Microbenchmarks and application experiments demonstrate that our techniques achieve acceptable performance in most situations and can improve turnaround time relative to staging.

  6. iOS 7 programming pushing the limits

    CERN Document Server

    Napier, Rob

    2014-01-01

    Get ready to create killer apps for iPad and iPhone on the new iOS 7! With Apple's introduction of iOS 7, demand for developers who know the new iOS will be high. You need in-depth information about the new characteristics and capabilities of iOS 7, and that's what you'll find in this book. If you have experience with C or C++, this guide will show you how to create amazing apps for iPhone, iPad, and iPod touch. You'll also learn to maximize your programs for mobile devices using iPhone SDK 7.0. Advanced topics such as security services, running on multiple iPlatforms, and local networking w

  7. Volcanogenic Sulfur on Earth and Io: Composition and Spectroscopy

    Science.gov (United States)

    Kargel, J.S.; Delmelle, P.; Nash, D.B.

    1999-01-01

    The causes of Io's variegated surface, especially the roles of sulfur, and the geochemical history of sulfur compounds on Io are not well understood. Suspecting that minor impurities in sulfur might be important, we have investigated the major and trace element chemistry and spectroscopic reflectance of natural sulfur from a variety of terrestrial volcanic-hydrothermal environments. Evidence suggests that Io may be substantially coated with impure sulfur. On Earth, a few tenths of a percent to a few percent of chalcophile trace elements (e.g., As and Se) comonly occur in sulfur and appear to stabilize material of yellow, brown, orange, and red hues, which may persist even at low temperatures. Percentage levels of chalcophile impurities are reasonably expected to occur on Io in vapor sublimate deposits and flows derived from such deposits. Such impurities join a host of other mechanisms that might explain Io's reds and yellows. Two-tenths to two percent opaque crystalline impurities, particularly pyrite (FeS2), commonly produces green, gray, and black volcanic sulfur on Earth and might explain areas of Io having deposits of these colors. Pyrite produces a broad absorption near 1 ??m that gradually diminishes out to 1.6 ??m - similar but not identical to the spectrum of Io seen in Galileo NIMS data. Percentage amounts of carbonaceous impurities and tens of percent SiO2 (as silicates) also strongly affect the spectral properties of Earth's sulfur. Io's broad absorption between 0.52 and 0.64 ??m remains unexplained by these data but could be due to sodium sulfides, as suggested previously by others, or to As, Se, or other impurities. These impurities and others, such as P and Cl (which could exist on Io's surface in amounts over 1% that of sulfur), greatly alter the molecular structure of molten and solid sulfur. Minor impurities could impact Io's geology, such as the morphology of sulfur lava flows and the ability of sulfur to sustain high relief. We have not found

  8. An Eruption on Io

    Science.gov (United States)

    2007-01-01

    The first images returned to Earth by New Horizons during its close encounter with Jupiter feature the Galilean moon Io, snapped with the Long Range Reconnaissance Imager (LORRI) at 0840 UTC on February 26, while the moon was 2.5 million miles (4 million kilometers) from the spacecraft. Io is intensely heated by its tidal interaction with Jupiter and is thus extremely volcanically active. That activity is evident in these images, which reveal an enormous dust plume, more than 150 miles high, erupting from the volcano Tvashtar. The plume appears as an umbrella-shaped feature of the edge of Io's disk in the 11 o'clock position in the right image, which is a long-exposure (20-millisecond) frame designed specifically to look for plumes like this. The bright spots at 2 o'clock are high mountains catching the setting sun; beyond them the night side of Io can be seen, faintly illuminated by light reflected from Jupiter itself. The left image is a shorter exposure -- 3 milliseconds -- designed to look at surface features. In this frame, the Tvashtar volcano shows as a dark spot, also at 11 o'clock, surrounded by a large dark ring, where an area larger than Texas has been covered by fallout from the giant eruption. This is the clearest view yet of a plume from Tvashtar, one of Io's most active volcanoes. Ground-based telescopes and the Galileo Jupiter orbiter first spotted volcanic heat radiation from Tvashtar in November 1999, and the Cassini spacecraft saw a large plume when it flew past Jupiter in December 2000. The Keck telescope in Hawaii picked up renewed heat radiation from Tvashtar in spring 2006, and just two weeks ago the Hubble Space Telescope saw the Tvashtar plume in ultraviolet images designed to support the New Horizons flyby. Most of those images will be stored onboard the spacecraft for downlink to Earth in March and April.

  9. Sensitive Information Tracking in Commodity IoT

    OpenAIRE

    Celik, Z. Berkay; Babun, Leonardo; Sikder, Amit K.; Aksu, Hidayet; Tan, Gang; McDaniel, Patrick; Uluagac, A. Selcuk

    2018-01-01

    Broadly defined as the Internet of Things (IoT), the growth of commodity devices that integrate physical processes with digital connectivity has had profound effects on society--smart homes, personal monitoring devices, enhanced manufacturing and other IoT apps have changed the way we live, play, and work. Yet extant IoT platforms provide few means of evaluating the use (and potential avenues for misuse) of sensitive information. Thus, consumers and organizations have little information to as...

  10. Xamarin mobile application development for iOS

    CERN Document Server

    Johnson, Paul F

    2013-01-01

    This book is a standard tutorial aimed at teaching you everything you need to know about iOS app development using Xamarin.This book is written for those who are new to iOS app development as well as more experienced developers who just need a quick reference book. It is assumed that you are already comfortable using C#. Those teaching iOS to new students will also find this book invaluable as a form of reference material.

  11. Internet of things and bariatric surgery follow-up: Comparative study of standard and IoT follow-up.

    Science.gov (United States)

    Vilallonga, Ramon; Lecube, Albert; Fort, José Manuel; Boleko, Maria Angeles; Hidalgo, Marta; Armengol, Manel

    2013-09-01

    Follow-up of obese patient is difficult. There is no literature related to patient follow-up that incorporates the concept of Internet of Things (IoT), use of WiFi, Internet, or portable devices for this purpose. This prospective observational study commenced in June 2011. Patients were prospectively offered to participate in the IoT study group, in which they received a WiFi scale (Withing®, Paris) that provides instant WiFi data to the patient and surgeon. Other patients were admitted to the standard follow-up group at the outpatient clinic. A total of 33 patients were included in our study (ten in the IoT group). Twelve patients did not have WiFi at home, ten lacked of computer knowledge, and seven preferred standard for follow-up. All patients underwent different surgical procedures. There were no complications. Excess weight loss (EWL) was similar in both groups. More than 90% of patients were satisfied. In the IoT group, patients considered it valuable in saving time, and considered seeing their evolution graphics extremely motivating. IoT technology can monitor medical parameters remotely and collect data. A WiFi scale can facilitate preoperative and follow-up. Standard follow-up in a classical outpatient clinic setting with the surgeon was preferred globally.

  12. Active Volcanic Eruptions on Io

    Science.gov (United States)

    1996-01-01

    Six views of the volcanic plume named Prometheus, as seen against Io's disk and near the bright limb (edge) of the satellite by the SSI camera on the Galileo spacecraft during its second (G2) orbit of Jupiter. North is to the top of each frame. To the south-southeast of Prometheus is another bright spot that appears to be an active plume erupting from a feature named Culann Patera. Prometheus was active 17 years ago during both Voyager flybys, but no activity was detected by Voyager at Culann. Both of these plumes were seen to glow in the dark in an eclipse image acquired by the imaging camera during Galileo's first (G1) orbit, and hot spots at these locations were detected by Galileo's Near-Infrared Mapping Spectrometer.The plumes are thought to be driven by heating sulfur dioxide in Io's subsurface into an expanding fluid or 'geyser'. The long-lived nature of these eruptions requires that a substantial supply of sulfur dioxide must be available in Io's subsurface, similar to groundwater. Sulfur dioxide gas condenses into small particles of 'snow' in the expanding plume, and the small particles scatter light and appear bright at short wavelengths. The images shown here were acquired through the shortest-wavelength filter (violet) of the Galileo camera. Prometheus is about 300 km wide and 75 km high and Culann is about 150 km wide and less than 50 km high. The images were acquired on September 4, 1996 at a range of 2,000,000 km (20 km/pixel resolution). Prometheus is named after the Greek fire god and Culann is named after the Celtic smith god.The Jet Propulsion Laboratory, Pasadena, CA manages the Galileo mission for NASA's Office of Space Science, Washington, DC. JPL is an operating division of California Institute of Technology (Caltech).This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov. Background information and educational context for the images can

  13. iOS app development portable genius

    CERN Document Server

    Wentk, Richard

    2012-01-01

    The essential skills and technologies needed for iOS development in one handy guide! The unprecedented popularity of iOS devices, such as the iPhone, iPad, and iPod touch, has led to a development boom. If you’re eager to become part of the action, then this is the book for you! Packed with must-have information on iOS development, this handy guide covers Objective-C, Xcode, Frameworks, and sound design principles and explains how to upload an app to the app store and integrate apps with the latest advances that Apple offers developers. The featured tips and tricks will get you up and ru

  14. RubyMotion iOS develoment essentials

    CERN Document Server

    Nalwaya, Abhishek

    2013-01-01

    This is a step-by-step book that builds on your knowledge by adding to an example app over the course of each chapter. Each topic uses example code that can be compiled and tested to show how things work practically instead of just telling you the theory. Complicated tasks are broken down into easy to follow steps with clear explanations of what each line of code is doing.Whether you are a novice to iOS development or looking for a simpler alternative to Objective-C; with RubyMotion iOS Development Essentials, you will become a pro at writing great iOS apps

  15. IoT-B&B: Edge-Based NFV for IoT Devices with CPE Crowdsourcing

    Directory of Open Access Journals (Sweden)

    He Zhu

    2018-01-01

    Full Text Available For embracing the ubiquitous Internet-of-Things (IoT devices, edge computing and Network Function Virtualization (NFV have been enabled in branch offices and homes in the form of virtual Customer-Premises Equipment (vCPE. A Service Provider (SP deploys vCPE instances as Virtual Network Functions (VNFs on top of generic physical Customer-Premises Equipment (pCPE to ease administration. Upon a usage surge of IoT devices at a certain part of the network, vCPU, memory, and other resource limitations of a single pCPE node make it difficult to add new services handling the high demand. In this paper, we present IoT-B&B, a novel architecture featuring resource sharing of pCPE nodes. When a pCPE node has sharable resources available, the SP will utilize its free resources as a “bed-and-breakfast” place to deploy vCPE instances in need. A placement algorithm is also presented to assign vCPE instances to a cost-efficient pCPE node. By keeping vCPE instances at the network edge, their costs of hosting are reduced. Meanwhile, the transmission latencies are maintained at acceptable levels for processing real-time data burst from IoT devices. The traffic load to the remote, centralized cloud can be substantially reduced.

  16. Sabatilles : Adaptació a iOS

    OpenAIRE

    Cots Sanfeliu, Jordi

    2015-01-01

    Adaptació del conte en format paper Sabatilles a aplicació en iOS per a dispositius mòbils d'Apple. Adaptación del cuento en formato papel Sabatilles a aplicación en iOS para dispositivos móviles de Apple. Bachelor thesis for the Computer Science program.

  17. FabIO

    DEFF Research Database (Denmark)

    Bergbäck Knudsen, Erik; Sørensen, Henning O.; Wright, Jonathan P.

    2013-01-01

    FabIO is a Python module written for easy and transparent reading of raw two-dimensional data from various X-ray detectors. The module provides a function for reading any image and returning a fabioimage object which contains both metadata (header information) and the raw data. All fabioimage...

  18. Internet of Things (IoT) Applicability in a Metropolitan City

    OpenAIRE

    Dr. D Mohammed

    2015-01-01

    Internet of Things (IoT)is defined here as a network of interconnected objects. These objects can include several technological systems. This paper examines the wireless communication systems and IoT sensors. IoT is technically feasible today, allowing people and things to be connected anytime, anyplace, with anything and anyone. IoT privacy is a concern but security solutions exist today to solve these issues. A proposal is made to use secure IoT solutions in supporting the metropolitan need...

  19. Internet of Tangible Things (IoTT: Challenges and Opportunities for Tangible Interaction with IoT

    Directory of Open Access Journals (Sweden)

    Leonardo Angelini

    2018-01-01

    Full Text Available In the Internet of Things era, an increasing number of everyday objects are able to offer innovative services to the user. However, most of these devices provide only smartphone or web user interfaces. As a result, the interaction is disconnected from the physical world, decreasing the user experience and increasing the risk of user alienation from the physical world. We argue that tangible interaction can counteract this trend and this article discusses the potential benefits and the still open challenges of tangible interaction applied to the Internet of Things. After an analysis of open challenges for Human-Computer Interaction in IoT, we summarize current trends in tangible interaction and extrapolate eight tangible interaction properties that could be exploited for designing novel interactions with IoT objects. Through a systematic review of tangible interaction applied to IoT, we show what has been already explored in the systems that pioneered the field and the future explorations that still have to be conducted. In order to guide future work in this field, we propose a design card set for supporting the generation of tangible interfaces for IoT objects. The card set has been evaluated during a workshop with 21 people and the results are discussed.

  20. On the road to secure and privacy-preserving IoT ecosystems

    OpenAIRE

    Hernández Serrano, Juan; Muñoz Tapia, José Luis; Bröring, Arne; Esparza Martín, Óscar; Mikkelsen, Lars; Schwarzott, Wolfgang; León Abarca, Olga; Zibuschka, Jan

    2017-01-01

    The Internet of Things (IoT) is on the rise. Today, various IoT platforms are already available, giving access to myriads of things. Initiatives such as BIG IoT are bringing those IoT platforms together in order to form ecosystems. BIG IoT aims to facilitate cross-platform and cross-domain application developments and establish centralized marketplaces to allow resource monetization. This combination of multi-platform applications, heterogeneity of the IoT, as well as enabling marketing and a...

  1. An Optimizing Compiler for Petascale I/O on Leadership Class Architectures

    Energy Technology Data Exchange (ETDEWEB)

    Choudhary, Alok [Northwestern Univ., Evanston, IL (United States); Kandemir, Mahmut [Pennsylvania State Univ., State College, PA (United States)

    2015-03-18

    In high-performance computing systems, parallel I/O architectures usually have very complex hierarchies with multiple layers that collectively constitute an I/O stack, including high-level I/O libraries such as PnetCDF and HDF5, I/O middleware such as MPI-IO, and parallel file systems such as PVFS and Lustre. Our project explored automated instrumentation and compiler support for I/O intensive applications. Our project made significant progress towards understanding the complex I/O hierarchies of high-performance storage systems (including storage caches, HDDs, and SSDs), and designing and implementing state-of-the-art compiler/runtime system technology that targets I/O intensive HPC applications that target leadership class machine. This final report summarizes the major achievements of the project and also points out promising future directions.

  2. Network Security Issues in The Internet of Things (IoT)

    OpenAIRE

    Millar, Stuart

    2016-01-01

    This paper surveys a broad range of other research works in order to discuss network security issues in the Internet of Things (IoT). We begin with setting the scene generally with an outline of IoT, followed by a discussion of IoT layer models and topologies. After this, IoT standardization efforts and protocols are analysed, before we discuss in depth vulnerabilities, attacks and mitigations with regard IoT. It is concluded that ample research and narrative exists for protocols and vulnerab...

  3. A Step Towards Checking Security in IoT

    Directory of Open Access Journals (Sweden)

    Chiara Bodei

    2016-08-01

    Full Text Available The Internet of Things (IoT is smartifying our everyday life. Our starting point is IoT-LySa, a calculus for describing IoT systems, and its static analysis, which will be presented at Coordination 2016. We extend the mentioned proposal in order to begin an investigation about security issues, in particular for the static verification of secrecy and some other security properties.

  4. A Step Towards Checking Security in IoT

    OpenAIRE

    Bodei, Chiara; Degano, Pierpaolo; Ferrari, Gian-Luigi; Galletta, Letterio

    2016-01-01

    The Internet of Things (IoT) is smartifying our everyday life. Our starting point is IoT-LySa, a calculus for describing IoT systems, and its static analysis, which will be presented at Coordination 2016. We extend the mentioned proposal in order to begin an investigation about security issues, in particular for the static verification of secrecy and some other security properties.

  5. Io's Active Eruption Plumes: Insights from HST

    Science.gov (United States)

    Jessup, K. L.; Spencer, J. R.

    2011-10-01

    Taking advantage of the available data, we recently [10] completed a detailed analysis of the spectral signature of Io's Pele-type Tvashtar plume as imaged by the HST Wide Field and Planetary Camera 2 (HST/WFPC2) via absorption during Jupiter transit and via reflected sunlight in 2007, as well as HST/WFPC2 observations of the 1997 eruption of Io's Prometheus-type Pillan plume (Fig. 1). These observations were obtained in the 0.24-0.42 μm range, where the plumes gas absorption and aerosol scattering properties are most conspicuous. By completing a detailed analysis of these observations, several key aspects of the reflectance and the absorption properties of the two plumes have been revealed. Additionally, by considering the analysis of the HST imaging data in light of previously published spectral analysis of Io's Prometheus and Pele-type plumes several trends in the plume properties have been determined, allowing us to define the relative significance of each plume on the rate of re-surfacing occurring on Io and providing the measurements needed to better assess the role the volcanoes play in the stability of Io's tenuous atmosphere.

  6. Clustering Approaches for Pragmatic Two-Layer IoT Architecture

    Directory of Open Access Journals (Sweden)

    J. Sathish Kumar

    2018-01-01

    Full Text Available Connecting all devices through Internet is now practical due to Internet of Things. IoT assures numerous applications in everyday life of common people, government bodies, business, and society as a whole. Collaboration among the devices in IoT to bring various applications in the real world is a challenging task. In this context, we introduce an application-based two-layer architectural framework for IoT which consists of sensing layer and IoT layer. For any real-time application, sensing devices play an important role. Both these layers are required for accomplishing IoT-based applications. The success of any IoT-based application relies on efficient communication and utilization of the devices and data acquired by the devices at both layers. The grouping of these devices helps to achieve the same, which leads to formation of cluster of devices at various levels. The clustering helps not only in collaboration but also in prolonging overall network lifetime. In this paper, we propose two clustering algorithms based on heuristic and graph, respectively. The proposed clustering approaches are evaluated on IoT platform using standard parameters and compared with different approaches reported in literature.

  7. Building IoT Services for Aging in Place Using Standard-Based IoT Platforms and Heterogeneous IoT Products

    Directory of Open Access Journals (Sweden)

    Sheik Mohammad Mostakim Fattah

    2017-10-01

    Full Text Available An aging population and human longevity is a global trend. Many developed countries are struggling with the yearly increasing healthcare cost that dominantly affects their economy. At the same time, people living with old adults suffering from a progressive brain disorder such as Alzheimer’s disease are enduring even more stress and depression than those patients while caring for them. Accordingly, seniors’ ability to live independently and comfortably in their current home for as long as possible has been crucial to reduce the societal cost for caregiving and thus give family members peace of mind, called ‘aging in place’ (AIP. In this paper we present a way of building AIP services using standard-based IoT platforms and heterogeneous IoT products. An AIP service platform is designed and created by combining previous standard-based IoT platforms in a collaborative way. A service composition tool is also created that allows people to create AIP services in an efficient way. To show practical usability of our proposed system, we choose a service scenario for medication compliance and implement a prototype service which could give old adults medication reminder appropriately at the right time (i.e., when it is time to need to take pills through light and speaker at home but also wrist band and smartphone even outside the home.

  8. Building IoT Services for Aging in Place Using Standard-Based IoT Platforms and Heterogeneous IoT Products.

    Science.gov (United States)

    Fattah, Sheik Mohammad Mostakim; Sung, Nak-Myoung; Ahn, Il-Yeup; Ryu, Minwoo; Yun, Jaeseok

    2017-10-11

    An aging population and human longevity is a global trend. Many developed countries are struggling with the yearly increasing healthcare cost that dominantly affects their economy. At the same time, people living with old adults suffering from a progressive brain disorder such as Alzheimer's disease are enduring even more stress and depression than those patients while caring for them. Accordingly, seniors' ability to live independently and comfortably in their current home for as long as possible has been crucial to reduce the societal cost for caregiving and thus give family members peace of mind, called 'aging in place' (AIP). In this paper we present a way of building AIP services using standard-based IoT platforms and heterogeneous IoT products. An AIP service platform is designed and created by combining previous standard-based IoT platforms in a collaborative way. A service composition tool is also created that allows people to create AIP services in an efficient way. To show practical usability of our proposed system, we choose a service scenario for medication compliance and implement a prototype service which could give old adults medication reminder appropriately at the right time (i.e., when it is time to need to take pills) through light and speaker at home but also wrist band and smartphone even outside the home.

  9. IOS SAFETY APPLICATION FOR UITM

    Directory of Open Access Journals (Sweden)

    MOHAMAD FAHMI HUSSIN

    2016-04-01

    Full Text Available This paper presents an iOS application, which is developed, to ensure that every task related to safety and health such as inspection, deviation analysis and accident reporting becomes more simple and easier. Normally, these three (3 tasks are done separately and the data are saved in different ways. These situations make the tasks become complicated and consume a lot of time. Therefore, this application is developed to overcome all the problems that occurred. The main objective of this application is to allow the user to handle inspection checklist, deviation analysis and accident reporting efficiently by using iOS devices such as iPhone and iPad. Hence, using iOS device, instead of using a lot of paper, can do all the tasks. Using Xcode SDK, which is the software that is used to develop iOS application, developed this application. Xcode use Objective-C as the programming language, which is quite similar with other programming languages such as C and C++. The final result of this project is that this application can handle all the three (3 tasks and the form or the findings can be emailed to the Safety and Health Officer (SHO. This application will reduce time consume to conduct safety inspection, deviation and reporting tasks as well as avoid delay that might happen while using the traditional method.

  10. Getting Priorities Straight: Improving Linux Support for Database I/O

    DEFF Research Database (Denmark)

    Hall, Christoffer; Bonnet, Philippe

    2005-01-01

    advantage of Linux asynchronous I/O and how Linux can help MySQL/InnoDB best take advantage of the underlying I/O bandwidth. This is a crucial problem for the increasing number of MySQL servers deployed for very large database applications. In this paper, we rst show that the conservative I/O submission......The Linux 2.6 kernel supports asynchronous I/O as a result of propositions from the database industry. This is a positive evolution but is it a panacea? In the context of the Badger project, a collaboration between MySQL AB and University of Copenhagen, we evaluate how MySQL/InnoDB can best take...... policy used by InnoDB (as well as Oracle 9.2) leads to an under-utilization of the available I/O bandwidth. We then show that introducing prioritized asynchronous I/O in Linux will allow MySQL/InnoDB and the other Linux databases to fully utilize the available I/O bandwith using a more aggressive I...

  11. iOS application security analysis

    OpenAIRE

    Βλάχος, Κωνσταντίνος Γ.; Vlachos, Konstantinos G.

    2017-01-01

    The purpose of this research is to explain the nature of the Apple iOS applications and provide all the available Open Source tools for analyzing them, starting from decrypting any application’s binary downloaded from the AppStore to reverse engineering it and even altering the flow of its running process on the actual device. We start introducing the basic theory of the iOS operating system and its applications including the security mechanisms incorporated by Apple that are a...

  12. Strong tidal dissipation in Io and Jupiter from astrometric observations.

    Science.gov (United States)

    Lainey, Valéry; Arlot, Jean-Eudes; Karatekin, Ozgür; Van Hoolst, Tim

    2009-06-18

    Io is the volcanically most active body in the Solar System and has a large surface heat flux. The geological activity is thought to be the result of tides raised by Jupiter, but it is not known whether the current tidal heat production is sufficiently high to generate the observed surface heat flow. Io's tidal heat comes from the orbital energy of the Io-Jupiter system (resulting in orbital acceleration), whereas dissipation of energy in Jupiter causes Io's orbital motion to decelerate. Here we report a determination of the tidal dissipation in Io and Jupiter through its effect on the orbital motions of the Galilean moons. Our results show that the rate of internal energy dissipation in Io (k(2)/Q = 0.015 +/- 0.003, where k(2) is the Love number and Q is the quality factor) is in good agreement with the observed surface heat flow, and suggest that Io is close to thermal equilibrium. Dissipation in Jupiter (k(2)/Q = (1.102 +/- 0.203) x 10(-5)) is close to the upper bound of its average value expected from the long-term evolution of the system, and dissipation in extrasolar planets may be higher than presently assumed. The measured secular accelerations indicate that Io is evolving inwards, towards Jupiter, and that the three innermost Galilean moons (Io, Europa and Ganymede) are evolving out of the exact Laplace resonance.

  13. An Optimizing Compiler for Petascale I/O on Leadership-Class Architectures

    Energy Technology Data Exchange (ETDEWEB)

    Kandemir, Mahmut Taylan [PSU; Choudary, Alok [Northwestern; Thakur, Rajeev [ANL

    2014-03-01

    In high-performance computing (HPC), parallel I/O architectures usually have very complex hierarchies with multiple layers that collectively constitute an I/O stack, including high-level I/O libraries such as PnetCDF and HDF5, I/O middleware such as MPI-IO, and parallel file systems such as PVFS and Lustre. Our DOE project explored automated instrumentation and compiler support for I/O intensive applications. Our project made significant progress towards understanding the complex I/O hierarchies of high-performance storage systems (including storage caches, HDDs, and SSDs), and designing and implementing state-of-the-art compiler/runtime system technology that targets I/O intensive HPC applications that target leadership class machine. This final report summarizes the major achievements of the project and also points out promising future directions Two new sections in this report compared to the previous report are IOGenie and SSD/NVM-specific optimizations.

  14. Application development with Parse using iOS SDK

    CERN Document Server

    Birani, Bhanu

    2013-01-01

    A practical guide, featuring step-by-step instructions showing you how to use Parse iOS, and handle your data on cloud.If you are a developer who wants to build your applications instantly using Parse iOS as a back end application development, this book is ideal for you. This book will help you to understand Parse, featuring examples to help you get familiar with the concepts of Parse iOS.

  15. OS X and iOS Kernel Programming

    CERN Document Server

    Halvorsen, Ole Henry

    2011-01-01

    OS X and iOS Kernel Programming combines essential operating system and kernel architecture knowledge with a highly practical approach that will help you write effective kernel-level code. You'll learn fundamental concepts such as memory management and thread synchronization, as well as the I/O Kit framework. You'll also learn how to write your own kernel-level extensions, such as device drivers for USB and Thunderbolt devices, including networking, storage and audio drivers. OS X and iOS Kernel Programming provides an incisive and complete introduction to the XNU kernel, which runs iPhones, i

  16. IoT Security Techniques Based on Machine Learning

    OpenAIRE

    Xiao, Liang; Wan, Xiaoyue; Lu, Xiaozhen; Zhang, Yanyong; Wu, Di

    2018-01-01

    Internet of things (IoT) that integrate a variety of devices into networks to provide advanced and intelligent services have to protect user privacy and address attacks such as spoofing attacks, denial of service attacks, jamming and eavesdropping. In this article, we investigate the attack model for IoT systems, and review the IoT security solutions based on machine learning techniques including supervised learning, unsupervised learning and reinforcement learning. We focus on the machine le...

  17. Challenges when bringing IoT into Industrial Automation

    OpenAIRE

    Lennvall, Tomas; Gidlund, Mikael; Åkerberg, Johan

    2017-01-01

    The Internet of Things (IoT) is captivating the society because of its potential to rapidly transform businesses and people’s lives. It is widely believed that IoT will also transform the industrial automation business in terms of improved productivity, less cost, flexibility, and increased revenues. Hence, there are some challenges that needs to be addressed when IoT is introduced to the industrial automation domain. This paperaims to present realistic requirements and highlights identified ...

  18. UbiCompass: An IoT Interaction Concept

    Directory of Open Access Journals (Sweden)

    Günter Alce

    2018-01-01

    Full Text Available Lately, different wearable form factors have reached the consumer domain. Wearables enable at-a-glance access to information and can continually sense the surrounding environment. Internet of Things (IoT researchers have focused on the main enabling factors: the integration of several technologies and communication solutions. Less effort has been devoted to exploring how not-so-tech-savvy end users can discover and directly interact with the numerous connected things predicted by the IoT vision. This paper presents a novel IoT interaction concept called UbiCompass. A functional, smartwatch face prototype of the UbiCompass was developed and integrated with an existing smart home system, in which five different connected devices could be controlled using simple interaction. It was then compared to a traditional smartphone mobile application in a controlled experiment. The results show statistically significant differences in favor of the proposed concept. This highlights the potential the UbiCompass has as an IoT interaction concept.

  19. Topographic evidence for shield volcanism on Io

    International Nuclear Information System (INIS)

    Moore, J.M.; Mcewen, A.S.; Albin, E.F.; Greeley, R.

    1986-01-01

    Similarities between terrestrial shield volcanoes and a volcano on Io observed in Voyager I imagery of the satellite at 30 0 S, 246 0 W are delineated. A photoclinometry model was used to numerically estimate the slope based on the Minnaert photometric function. The slope values are accurate to within 10 deg on the sun-facing slope and 1 deg on the shadow side. As found with shield volcanoes, the feature has a central edifice, 40-50 km in diameter, and a broad, elliptical base, 77 x 90 km across. The summit of the Io volcano is 2.2-2.8 km above the surrounding plane and contains a caldera about 5 km in diameter. The similarity in shape between basaltic terrestrial shield volcanoes and the Io volcano indicates that the Io feature may also be composed of basalt. The composition could be sulfur if the heat flow was under 0.05 W/sq m, as it might have been in later stages of formation. 9 references

  20. Practical comparison of distributed ledger technologies for IoT

    Science.gov (United States)

    Red, Val A.

    2017-05-01

    Existing distributed ledger implementations - specifically, several blockchain implementations - embody a cacophony of divergent capabilities augmenting innovations of cryptographic hashes, consensus mechanisms, and asymmetric cryptography in a wide variety of applications. Whether specifically designed for cryptocurrency or otherwise, several distributed ledgers rely upon modular mechanisms such as consensus or smart contracts. These components, however, can vary substantially among implementations; differences involving proof-of-work, practical byzantine fault tolerance, and other consensus approaches exemplify distinct distributed ledger variations. Such divergence results in unique combinations of modules, performance, latency, and fault tolerance. As implementations continue to develop rapidly due to the emerging nature of blockchain technologies, this paper encapsulates a snapshot of sensor and internet of things (IoT) specific implementations of blockchain as of the end of 2016. Several technical risks and divergent approaches preclude standardization of a blockchain for sensors and IoT in the foreseeable future; such issues will be assessed alongside the practicality of IoT applications among Hyperledger, Iota, and Ethereum distributed ledger implementations suggested for IoT. This paper contributes a comparison of existing distributed ledger implementations intended for practical sensor and IoT utilization. A baseline for characterizing distributed ledger implementations in the context of IoT and sensors is proposed. Technical approaches and performance are compared considering IoT size, weight, and power limitations. Consensus and smart contracts, if applied, are also analyzed for the respective implementations' practicality and security. Overall, the maturity of distributed ledgers with respect to sensor and IoT applicability will be analyzed for enterprise interoperability.

  1. IoT European Large-Scale Pilots – Integration, Experimentation and Testing

    OpenAIRE

    Guillén, Sergio Gustavo; Sala, Pilar; Fico, Giuseppe; Arredondo, Maria Teresa; Cano, Alicia; Posada, Jorge; Gutierrez, Germán; Palau, Carlos; Votis, Konstantinos; Verdouw, Cor N.; Wolfert, Sjaak; Beers, George; Sundmaeker, Harald; Chatzikostas, Grigoris; Ziegler, Sébastien

    2017-01-01

    The IoT European Large-Scale Pilots Programme includes the innovation consortia that are collaborating to foster the deployment of IoT solutions in Europe through the integration of advanced IoT technologies across the value chain, demonstration of multiple IoT applications at scale and in a usage context, and as close as possible to operational conditions. The programme projects are targeted, goal-driven initiatives that propose IoT approaches to specific real-life industrial/societal challe...

  2. A case study in application I/O on Linux clusters

    International Nuclear Information System (INIS)

    Ross, R.; Nurmi, D.; Cheng, A.; Zingale, M.

    2001-01-01

    A critical but often ignored component of system performance is the I/O system. Today's applications expect a great deal from underlying storage systems and software, and both high performance distributed storage and high level interfaces have been developed to fill these needs. In this paper they discuss the I/O performance of a parallel scientific application on a Linux cluster, the FLASH astrophysics code. This application relies on three I/O software components to provide high performance parallel I/O on Linux clusters: the Parallel Virtual File System (PVFS), the ROMIO MPI-IO implementation, and the Hierarchical Data Format (HDF5) library. First they discuss the roles played by each of these components in providing an I/O solution. Next they discuss the FLASH I/O benchmark and point out its relevance. Following this they examine the performance of the benchmark, and through instrumentation of both the application and underlying system software code they discover the location of major software bottlenecks. They work around the most inhibiting of these bottlenecks, showing substantial performance improvement. Finally they point out similarities between the inefficiencies found here and those found in message passing systems, indicating that research in the message passing field could be leveraged to solve similar problems in high-level I/O interfaces

  3. IoTA: IoT Automated SIP-based Emergency Call Triggering System for general eHealth purposes

    OpenAIRE

    Andriopoulou, F; Orphanoudakis, T; Dagiuklas, A

    2017-01-01

    The expansion of Internet of Things (IoT) and the evolution in communication technologies have enabled homes, cars even whole cities to be network connected. However, during an emergency incident, IoT devices have not been used to trigger emergency calls directly to healthcare providers mainly due to their constrained capabilities and lack of support session-oriented communications. Moreover, emergency services are currently offered by public safety stakeholders that do not support call trigg...

  4. The Structure and Composition of Io's Atmosphere

    Science.gov (United States)

    Smyth, W. H.; Marconi, M. L.

    2011-12-01

    Io's atmosphere is thought to be generated principally by sublimation on the dayside and by multiple volcanoes scattered throughout its surface and more concentrated near the equator. While SO2 seems to be the principle product of these sources, many other chemical species are placed into the atmosphere by these sources, including substantial amounts of SO and S2 as well as smaller but observationally significant amounts of Na bearing molecules. These species in turn interact strongly with the torus plasma generating additional species such as O2, S, O, and Na. The strong interaction of the torus plasma with the neutral atmosphere not only exerts a profound effect on the composition of Io's atmosphere but also strongly affects the dynamics and thermodynamics of Io's atmosphere, particularly at higher altitudes. In addition, as Io orbits Jupiter, the change in location of the sublimation region and the eclipse of Io as it passes through Jupiter's shadow result in substantial variation in the atmosphere. A complex time-dependent three-dimensional atmosphere with strong spatial compositional variation is created. Here we extend the two-dimensional multispecies Navier-Stokes model of Smyth and Wong (2004) to three-dimensions, include two volcanic sources similar to Pele and Loki, and include the effect of Io's movement around Jupiter on sublimation. The effects of the torus plasma are also included as in Smyth and Wong. We will present the overall composition and structure of the atmosphere, O to S ratios in the upper atmosphere, and discuss a potential issue with the O2 abundance. Smyth, W.H. and M.C. Wong, Icarus 171, 171-182, 2004.

  5. Grabens on Io: Evidence for Extensional Tectonics

    Science.gov (United States)

    Hoogenboom, T.; Schenk, P.

    2012-12-01

    Io may well be the most geologically active body in the solar system. A variety of volcanic features have been identified, including a few fissure eruptions, but tectonism is generally assumed to be limited to compression driven mountain formation (Schenk et al., 2001). A wide range of structural features can also be identified including scarps, lineaments, faults, and circular depressions (pits and patera rims). Narrow curvilinear graben (elongated, relatively depressed crustal unit or block that is bounded by faults on its sides) are also scattered across Io's volcanic plains. These features are dwarfed by the more prominent neighboring volcanoes and mountains, and have been largely ignored in the literature. Although they are likely to be extensional in origin, their relationship to local or global stress fields is unknown. We have mapped the locations, length and width of graben on Io using all available Voyager and Galileo images with a resolution better than 5 km. We compare the locations of graben with existing volcanic centers, paterae and mountain data to determine the degree of correlation between these geologic features and major topographic variations (basins/swells) in our global topographic map of Io (White et al., 2011). Graben are best observed in > 1-2 km low-sun angle images. Approximately 300 images were converted from ISIS to ArcMap format to allow easy comparison with the geological map of Io (Williams et al., 2012) along with previous higher resolution structural mapping of local areas (e.g. Crown et al., 1992). We have located >45 graben to date. Typically 1-3 kilometers across, some of these features can stretch for over 500 kilometers in length. Their formation may be related to global tidal stresses or local deformation. Io's orbit is eccentric and its solid surface experiences daily tides of up to ˜0.1 km, leading to repetitive surface strains of 10-4 or greater. These tides flex and stress the lithosphere and can cause it to fracture

  6. IoSiS: a radar system for imaging of satellites in space

    Science.gov (United States)

    Jirousek, M.; Anger, S.; Dill, S.; Schreiber, E.; Peichl, M.

    2017-05-01

    Space debris nowadays is one of the main threats for satellite systems especially in low earth orbit (LEO). More than 700,000 debris objects with potential to destroy or damage a satellite are estimated. The effects of an impact often are not identifiable directly from ground. High-resolution radar images are helpful in analyzing a possible damage. Therefor DLR is currently developing a radar system called IoSiS (Imaging of Satellites in Space), being based on an existing steering antenna structure and our multi-purpose high-performance radar system GigaRad for experimental investigations. GigaRad is a multi-channel system operating at X band and using a bandwidth of up to 4.4 GHz in the IoSiS configuration, providing fully separated transmit (TX) and receive (RX) channels, and separated antennas. For the observation of small satellites or space debris a highpower traveling-wave-tube amplifier (TWTA) is mounted close to the TX antenna feed. For the experimental phase IoSiS uses a 9 m TX and a 1 m RX antenna mounted on a common steerable positioner. High-resolution radar images are obtained by using Inverse Synthetic Aperture Radar (ISAR) techniques. The guided tracking of known objects during overpass allows here wide azimuth observation angles. Thus high azimuth resolution comparable to the range resolution can be achieved. This paper outlines technical main characteristics of the IoSiS radar system including the basic setup of the antenna, the radar instrument with the RF error correction, and the measurement strategy. Also a short description about a simulation tool for the whole instrument and expected images is shown.

  7. Multiscale periodic structure in the Io wake

    Energy Technology Data Exchange (ETDEWEB)

    Smith, P R; Wright, A N

    1989-06-08

    The decametric radio emissions from Jupiter are known to be influenced by the Galilean satellite Io. It is believed that the structure in these emissions is associated with the Alfven-wave wake downstream of Io. However, recent studies have shown that the structure of the wake cannot be as simple as originally thought. Here we present preliminary results from an eigenmode synthesis of the Alfven waves launched by Io, and find that several important periodicities emerge. Observations of the decametric emissions reveal fine, medium-and large-scale structure. The simulation we present here can provide structure on each of these scales, unlike earlier models. (author).

  8. Beginning Swift games development for iOS

    CERN Document Server

    Goodwill, James

    2015-01-01

    Game apps are one of the most popular categories in the Apple iTunes App Store. Well, the introduction of the new Swift programming language will make game development even more appealing and easier to existing and future iOS app developers. In response, James Goodwill, Wesley Matlock and Apress introduce you to this book, Beginning Swift Games Development for iOS. In this book, you'll learn the fundamental elements of the new Swift language as applied to game development for iOS. In part 1, you'll start with a basic 2D game idea and build the game throughout the book introducing each Sprit

  9. APLIKACIJA ZA PRIKAZ SLEDENJA VOZIL NA OPERACIJSKEM SISTEMU iOS

    OpenAIRE

    Mlinar, Tilen

    2011-01-01

    V diplomski nalogi prikazujemo razvoj aplikacije za operacijski sistem iOS. Razvili smo aplikacijo za sledenje vozil. V teoretičnem delu se najprej seznanimo z operacijskim sistemom iOS ter njegovo arhitekturo, nato predstavimo arhitekturo aplikacij iOS. Sledi opis kompleta razvojnih orodij v iOS SDK. V nadaljevanju se seznanimo še s programskim jezikom Objective-C, lokacijsko odvisnimi storitvam, podsistemom MapKit in delovanjem aplikacije v ozadju operacijskega sistema. V praktičnem delu op...

  10. Conflict Detection Algorithm to Minimize Locking for MPI-IO Atomicity

    Science.gov (United States)

    Sehrish, Saba; Wang, Jun; Thakur, Rajeev

    Many scientific applications require high-performance concurrent I/O accesses to a file by multiple processes. Those applications rely indirectly on atomic I/O capabilities in order to perform updates to structured datasets, such as those stored in HDF5 format files. Current support for atomicity in MPI-IO is provided by locking around the operations, imposing lock overhead in all situations, even though in many cases these operations are non-overlapping in the file. We propose to isolate non-overlapping accesses from overlapping ones in independent I/O cases, allowing the non-overlapping ones to proceed without imposing lock overhead. To enable this, we have implemented an efficient conflict detection algorithm in MPI-IO using MPI file views and datatypes. We show that our conflict detection scheme incurs minimal overhead on I/O operations, making it an effective mechanism for avoiding locks when they are not needed.

  11. Economics of Internet of Things (IoT): An Information Market Approach

    OpenAIRE

    Niyato, D.; Lu, X.; Wang, P.; Kim, D. I.; Han, Z.

    2015-01-01

    Internet of things (IoT) has been proposed to be a new paradigm of connecting devices and providing services to various applications, e.g., transportation, energy, smart city, and healthcare. In this paper, we focus on an important issue, i.e., economics of IoT, that can have a great impact to the success of IoT applications. In particular, we adopt and present the information economics approach with its applications in IoT. We first review existing economic models developed for IoT services....

  12. The Haskell Programmer's Guide to the IO Monad : Don't Panic

    NARCIS (Netherlands)

    Klinger, S.

    2005-01-01

    Now, that you have started with Haskell, have you written a program doing IO yet, like reading a file or writing on the terminal? Then you have used the IO monad—but do you understand how it works? The standard explanation is, that the IO monad hides the non-functional IO actions —which do have side

  13. Semantic Interoperability in Heterogeneous IoT Infrastructure for Healthcare

    Directory of Open Access Journals (Sweden)

    Sohail Jabbar

    2017-01-01

    Full Text Available Interoperability remains a significant burden to the developers of Internet of Things’ Systems. This is due to the fact that the IoT devices are highly heterogeneous in terms of underlying communication protocols, data formats, and technologies. Secondly due to lack of worldwide acceptable standards, interoperability tools remain limited. In this paper, we proposed an IoT based Semantic Interoperability Model (IoT-SIM to provide Semantic Interoperability among heterogeneous IoT devices in healthcare domain. Physicians communicate their patients with heterogeneous IoT devices to monitor their current health status. Information between physician and patient is semantically annotated and communicated in a meaningful way. A lightweight model for semantic annotation of data using heterogeneous devices in IoT is proposed to provide annotations for data. Resource Description Framework (RDF is a semantic web framework that is used to relate things using triples to make it semantically meaningful. RDF annotated patients’ data has made it semantically interoperable. SPARQL query is used to extract records from RDF graph. For simulation of system, we used Tableau, Gruff-6.2.0, and Mysql tools.

  14. Sesame IO Library User Manual Version 8

    Energy Technology Data Exchange (ETDEWEB)

    Abhold, Hilary [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Young, Ginger Ann [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-05-15

    This document is a user manual for SES_IO, a low-level library for reading and writing sesame files. The purpose of the SES_IO library is to provide a simple user interface for accessing and creating sesame files that does not change across sesame format type (such as binary, ascii, and xml).

  15. Knowledge driven discovery for opportunistic IoT networking.

    OpenAIRE

    Pozza, Riccardo

    2015-01-01

    So far, the Internet of Things (IoT) has been concerned with the objective of connecting every-thing, or any object to the Internet world. By collaborating towards the creation of new services, the IoT has introduced the opportunity to add smartness to our cities, homes, buildings and healthcare systems, as well as businesses and products. In many scenarios, objects or IoT devices are not always statically deployed, but they may be free to move around being carried by people or vehicles, whil...

  16. Fog Computing: An Overview of Big IoT Data Analytics

    Directory of Open Access Journals (Sweden)

    Muhammad Rizwan Anawar

    2018-01-01

    Full Text Available A huge amount of data, generated by Internet of Things (IoT, is growing up exponentially based on nonstop operational states. Those IoT devices are generating an avalanche of information that is disruptive for predictable data processing and analytics functionality, which is perfectly handled by the cloud before explosion growth of IoT. Fog computing structure confronts those disruptions, with powerful complement functionality of cloud framework, based on deployment of micro clouds (fog nodes at proximity edge of data sources. Particularly big IoT data analytics by fog computing structure is on emerging phase and requires extensive research to produce more proficient knowledge and smart decisions. This survey summarizes the fog challenges and opportunities in the context of big IoT data analytics on fog networking. In addition, it emphasizes that the key characteristics in some proposed research works make the fog computing a suitable platform for new proliferating IoT devices, services, and applications. Most significant fog applications (e.g., health care monitoring, smart cities, connected vehicles, and smart grid will be discussed here to create a well-organized green computing paradigm to support the next generation of IoT applications.

  17. Multiple Independent File Parallel I/O with HDF5

    Energy Technology Data Exchange (ETDEWEB)

    Miller, M. C.

    2016-07-13

    The HDF5 library has supported the I/O requirements of HPC codes at Lawrence Livermore National Labs (LLNL) since the late 90’s. In particular, HDF5 used in the Multiple Independent File (MIF) parallel I/O paradigm has supported LLNL code’s scalable I/O requirements and has recently been gainfully used at scales as large as O(106) parallel tasks.

  18. Pele Plume Deposit on Io

    Science.gov (United States)

    1997-01-01

    The varied effects of Ionian volcanism can be seen in this false color infrared composite image of Io's trailing hemisphere. Low resolution color data from Galileo's first orbit (June, 1996) have been combined with a higher resolution clear filter picture taken on the third orbit (November, 1996) of the spacecraft around Jupiter.A diffuse ring of bright red material encircles Pele, the site of an ongoing, high velocity volcanic eruption. Pele's plume is nearly invisible, except in back-lit photographs, but its deposits indicate energetic ejection of sulfurous materials out to distances more than 600 kilometers from the central vent. Another bright red deposit lies adjacent to Marduk, also a currently active ediface. High temperature hot spots have been detected at both these locations, due to the eruption of molten material in lava flows or lava lakes. Bright red deposits on Io darken and disappear within years or decades of deposition, so the presence of bright red materials marks the sites of recent volcanism.This composite was created from data obtained by the Solid State Imaging (CCD) system aboard NASA's Galileo spacecraft. The region imaged is centered on 15 degrees South, 224 degrees West, and is almost 2400 kilometers across. The finest details that can be discerned in this picture are about 3 kilometers across. North is towards the top of the picture and the sun illuminates the surface from the west.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA's Office of Space Science, Washington, DC.This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov. Background information and educational context for the images can be found at URL http://www.jpl.nasa.gov/galileo/sepo

  19. Internet of robotic things : converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT Platforms

    OpenAIRE

    Vermesan, Ovidiu; Bröring, Arne; Tragos, Elias; Serrano, Martin; Bacciu, Davide; Chessa, Stefano; Gallicchio, Claudio; Micheli, Alessio; Dragone, Mauro; Saffiotti, Alessandro; Simoens, Pieter; Cavallo, Filippo; Bahr, Roy

    2017-01-01

    The Internet of Things (IoT) concept is evolving rapidly and influencing newdevelopments in various application domains, such as the Internet of MobileThings (IoMT), Autonomous Internet of Things (A-IoT), Autonomous Systemof Things (ASoT), Internet of Autonomous Things (IoAT), Internetof Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc.that are progressing/advancing by using IoT technology. The IoT influencerepresents new development and deployment challenges in different a...

  20. Instant OpenCV for iOS

    CERN Document Server

    Kornyakov, Kirill

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This book uses a very practical approach, with each recipe and their associated sample projects or examples focusing on a particular aspect of the technology.This book is intended for OpenCV developers who are interested in porting their applications to the iOS platform. Basic experience with OpenCV, computer vision, Objective C, and other iOS tools is encouraged.

  1. On Energy Efficiency of Prioritized IoT Systems

    KAUST Repository

    Alabbasi, Abdulrahman; Shihada, Basem; Cavdar, Cicek

    2018-01-01

    The inevitable deployment of 5G and the Internet of Things (IoT) sheds the light on the importance of the energy efficiency (EE) performance of Device-to- Device (DD) communication systems. In this work, we address a potential IoT application, where

  2. New upper limits for atmospheric constituents on Io

    Science.gov (United States)

    Fink, U.; Larson, H. P.; Gautier, T. N., III

    1976-01-01

    A spectrum of Io from 0.86 to 2.7 microns with a resolution of 3.36 per cm and a signal to rms noise ratio of 120 is presented. No absorptions due to any atmospheric constituents on Io could be found in the spectrum. Upper limits of 0.12 cm-atm for NH3, 0.12 cm-atm for CH4, 0.4 cm-atm for N2O, and 24 cm-atm for H2S were determined. Laboratory spectra of ammonia frosts as a function of temperature were compared with the spectrum of Io and showed this frost not to be present at the surface of Io. A search for possible resonance lines of carbon, silicon, and sulfur, as well as the 1.08-micron line of helium, proved negative. Upper emission limits of 60, 18, 27, and 60 kilorayleighs, respectively, were established for these lines.

  3. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    OpenAIRE

    Ana Nieto; Ruben Rios; Javier Lopez

    2018-01-01

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntar...

  4. On Novel Access and Scheduling Schemes for IoT Communications

    Directory of Open Access Journals (Sweden)

    Zheng Jiang

    2016-01-01

    Full Text Available The Internet of Things (IoT is expected to foster the development of 5G wireless networks and requires the efficient support for a large number of simultaneous short message communications. To address these challenges, some existing works utilize new waveform and multiuser superposition transmission schemes to improve the capacity of IoT communication. In this paper, we will investigate the spatial degree of freedom of IoT devices based on their distribution, then extend the multiuser shared access (MUSA which is one of the typical MUST schemes to spatial domain, and propose two novel schemes, that is, the preconfigured access scheme and the joint spatial and code domain scheduling scheme, to enhance IoT communication. The results indicate that the proposed schemes can reduce the collision rate dramatically during the IoT random access procedure and improve the performance of IoT communication obviously. Based on the simulation results, it is also shown that the proposed scheduling scheme can achieve the similar performance to the corresponding brute-force scheduling but with lower complexity.

  5. Cross-Layer Energy Optimization for IoT Environments: Technical Advances and Opportunities

    Directory of Open Access Journals (Sweden)

    Kirshna Kumar

    2017-12-01

    Full Text Available Energy efficiency is a significant characteristic of battery-run devices such as sensors, RFID and mobile phones. In the present scenario, this is the most prominent requirement that must be served while introducing a communication protocol for an IoT environment. IoT network success and performance enhancement depend heavily on optimization of energy consumption that enhance the lifetime of IoT nodes and the network. In this context, this paper presents a comprehensive review on energy efficiency techniques used in IoT environments. The techniques proposed by researchers have been categorized based on five different layers of the energy architecture of IoT. These five layers are named as sensing, local processing and storage, network/communication, cloud processing and storage, and application. Specifically, the significance of energy efficiency in IoT environments is highlighted. A taxonomy is presented for the classification of related literature on energy efficient techniques in IoT environments. Following the taxonomy, a critical review of literature is performed focusing on major functional models, strengths and weaknesses. Open research challenges related to energy efficiency in IoT are identified as future research directions in the area. The survey should benefit IoT industry practitioners and researchers, in terms of augmenting the understanding of energy efficiency and its IoT-related trends and issues.

  6. Smart Rash Driver System via Internet of Things (IoT

    Directory of Open Access Journals (Sweden)

    Sheau Tong Kong

    2017-01-01

    Full Text Available Nearly half a million accidents on Malaysians road occur in 2015. The aim of this research is to detect car speed, capture the photo of the speeding car and then transfer the data like car speed, date and time, location and lane number to an online database. A distance sensor is used to measure the distance range between two points on the road. The ESP8266 NodeMCU will be the control unit to process the data and calculate the speed with the formula of speed equal to distance over time. The ESP8266 NodeMCU is also a Wi-Fi module to help in transferring data via IoT to an online database. The Google spreadsheet acted as an online database and will receive all the data if detected a speeding car. In conclusion, the Smart Rash Driver System is successfully invented and able to detect vehicle speed, capture the photo of over speed vehicle and save it to the SD card and lastly transfer all data via IoT to the Google Spreadsheet. This invention will be able to help to decrease the road accident rate efficiently.

  7. BRC/IoP standard importance in packaging quality assurance

    Directory of Open Access Journals (Sweden)

    Agnieszka Kawecka

    2014-10-01

    Full Text Available BRC/IoP (British Retail Consortium / Institute of Packaging is the only industry standard dedicated entrepreneurs operating in the packaging industry, primarily intended for contact with food. The requirements of the BRC / IoP guarantee the safety of packaging and fulfillment of all legal and hygienic requirements. The article presents the main features of the standard, the basic requirements contained in the document and the results of research on the implementation of quality management systems, including standard BRC / IoP and the actions that are required checklists. It is noticeable that there is little interest in certification BRC / IoP, due to low awareness of the standard, despite the fulfillment of some of the basic requirements of the surveyed companies.

  8. User Requirements for Internet Of Things (IoT) Applications : An Observational study

    OpenAIRE

    Namirimu, Victoria

    2015-01-01

    Context. Internet of Things (IoT) is a new trending phase of technology. IoT refers to communication and connectivity between things such as technological devices, actuators, sensors, and people or processes with unique identifiers. The importance of IoT is to improve the daily living standards of an average user. IoT is made for the people and used by the people for many reasons such as improved health, business innovations, and personal health trackers. Examples of IoT applications and serv...

  9. Benchmarking Distributed Stream Processing Platforms for IoT Applications

    OpenAIRE

    Shukla, Anshu; Simmhan, Yogesh

    2016-01-01

    Internet of Things (IoT) is a technology paradigm where millions of sensors monitor, and help inform or manage, physical, envi- ronmental and human systems in real-time. The inherent closed-loop re- sponsiveness and decision making of IoT applications makes them ideal candidates for using low latency and scalable stream processing plat- forms. Distributed Stream Processing Systems (DSPS) are becoming es- sential components of any IoT stack, but the efficacy and performance of contemporary DSP...

  10. Stability of sulfur slopes on Io

    Science.gov (United States)

    Clow, G. D.; Carr, M. H.

    1980-01-01

    The mechanical properties of elemental sulfur are such that the upper crust of Io cannot be primarily sulfur. For heat flows in the range 100-1000 ergs/sq cm sec sulfur becomes ductile within several hundred meters of the surface and would prevent the formation of calderas with depths greater than this. However, the one caldera for which precise depth data are available is 2 km deep, and this value may be typical. A study of the mechanical equilibrium of simple slopes shows that the depth to the zone of rapid ductile flow strongly controls the maximum heights for sulfur slopes. Sulfur scarps with heights greater than 1 km will fail for all heat flows greater than 180 ergs/sq cm sec and slope angles greater than 22.5 deg. The observed relief on Io is inconsistent with that anticipated for a predominantly sulfur crust. However, a silicate crust with several percent sulfur included satisfies both the mechanical constraints and the observed presence of sulfur on Io.

  11. Advanced I/O for large-scale scientific applications

    International Nuclear Information System (INIS)

    Klasky, Scott; Schwan, Karsten; Oldfield, Ron A.; Lofstead, Gerald F. II

    2010-01-01

    As scientific simulations scale to use petascale machines and beyond, the data volumes generated pose a dual problem. First, with increasing machine sizes, the careful tuning of IO routines becomes more and more important to keep the time spent in IO acceptable. It is not uncommon, for instance, to have 20% of an application's runtime spent performing IO in a 'tuned' system. Careful management of the IO routines can move that to 5% or even less in some cases. Second, the data volumes are so large, on the order of 10s to 100s of TB, that trying to discover the scientifically valid contributions requires assistance at runtime to both organize and annotate the data. Waiting for offline processing is not feasible due both to the impact on the IO system and the time required. To reduce this load and improve the ability of scientists to use the large amounts of data being produced, new techniques for data management are required. First, there is a need for techniques for efficient movement of data from the compute space to storage. These techniques should understand the underlying system infrastructure and adapt to changing system conditions. Technologies include aggregation networks, data staging nodes for a closer parity to the IO subsystem, and autonomic IO routines that can detect system bottlenecks and choose different approaches, such as splitting the output into multiple targets, staggering output processes. Such methods must be end-to-end, meaning that even with properly managed asynchronous techniques, it is still essential to properly manage the later synchronous interaction with the storage system to maintain acceptable performance. Second, for the data being generated, annotations and other metadata must be incorporated to help the scientist understand output data for the simulation run as a whole, to select data and data features without concern for what files or other storage technologies were employed. All of these features should be attained while

  12. Potenciál IoT v Smart city

    OpenAIRE

    Pavlíček, Tomáš

    2016-01-01

    The aim of this masters thesis is to identify, in which phase of adoption of Internet of Things (IoT) application areas of concept Smart City are nowadays Czech regional cities, what is their outlook to 2025 and also identify in which dimensions of concept Smart city, supported by IoT technologies, perceive Czech regional cities the greatest potential. Based on information obtained from the studied materials, the concept of Internet of Things (IoT) is described, along with a detailed descript...

  13. Intrusion Detection System In IoT

    OpenAIRE

    Nygaard, Frederik

    2017-01-01

    Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing for Low-Power and Lossy Networks (RPL) is the standard routing protocol. In IoT, devices commonly have low energy, storage and memory, which is why the implemented intrusion algorithm in this thesis will try to minimize the usage of these resources. IDS for RPL-networks have been implemented before, but the use of resources or the number of packets sent was too high to be successful when findi...

  14. A Model of Socially Connected Web Objects for IoT Applications

    OpenAIRE

    Ali, Sajjad; Kibria, Muhammad Golam; Jarwar, Muhammad Aslam; Lee, Hoon Ki; Chong, Ilyoung

    2018-01-01

    The Internet of Things (IoT) is evolving with the connected objects at an unprecedented rate, bringing about enormous opportunities for the future IoT applications as well as challenges. One of the major challenges is to handle the complexity generated by the interconnection of billions of objects. However, Social Internet of Things (SIoT), emerging from the conglomeration of IoT and social networks, has realized an efficient way to facilitate the development of complex future IoT application...

  15. TMACS I/O termination point listing. Revision 1

    International Nuclear Information System (INIS)

    Scaief, C.C. III.

    1994-01-01

    This document provides a listing of all analog and discrete input/output (I/O) points connected to the Tank Monitor and Control System (TMACS). The list also provides other information such as the point tag name, termination location, description, drawing references and other parameters. The purpose is to define each point's unique tag name and to cross reference the point with other associated information that may be necessary for activities such as maintenance, calibration, diagnostics, or design changes. It provides a list in one document of all I/O points that would otherwise only be available by referring to all I/O termination drawings

  16. TMACS I/O termination point listing. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Scaief, C.C. III

    1994-09-13

    This document provides a listing of all analog and discrete input/output (I/O) points connected to the Tank Monitor and Control System (TMACS). The list also provides other information such as the point tag name, termination location, description, drawing references and other parameters. The purpose is to define each point`s unique tag name and to cross reference the point with other associated information that may be necessary for activities such as maintenance, calibration, diagnostics, or design changes. It provides a list in one document of all I/O points that would otherwise only be available by referring to all I/O termination drawings.

  17. Radial and azimuthal distribution of Io's oxygen neutral cloud observed by Hisaki/EXCEED

    Science.gov (United States)

    Koga, R.; Tsuchiya, F.; Kagitani, M.; Sakanoi, T.; Yoneda, M.; Yoshikawa, I.; Yoshioka, K.; Murakami, G.; Yamazaki, A.; Kimura, T.; Smith, H. T.

    2017-12-01

    We report the spatial distributions of oxygen neural cloud surrounding Jupiter's moon Io and along Io's orbit observed by the HISAKI satellite. Atomic oxygen and sulfur in Io's atmosphere escape from the exobase and move to corona ( 5.8 Io radii) mainly due to atmospheric sputtering. Io plasma torus is formed by ionization of these atoms by electron impact and charge exchange processes. It is essential to examine the dominant source of Io plasma torus, particularly in the vicinity of Io (5.8 Io radii; extended neutral clouds). The spatial distribution of oxygen and sulfur neutral clouds is important to understand the source. The extreme ultraviolet spectrometer called EXCEED (Extreme Ultraviolet Spectroscope for Exospheric Dynamics) installed on the Hisaki satellite observed Io plasma torus continuously in 2014-2015, and we carried out the monitoring of the distribution of atomic oxygen emission at 130.4 nm. The emission averaged over the distance range of 4.5-6.5 Jovian radii on the dawn and dusk sides strongly depends on the Io phase angle (IPA), and has a emission peak between IPA of 60-90 degrees on the dawn side, and between 240-270 degrees on the dusk side, respectively. It also shows the asymmetry with respect to Io's position: the intensity averaged for IPA 60-90 degrees (13.3 Rayleighs (R)) is 1.2 times greater than that for IPA 90-120 degrees (11.1 R) on the dawn side. The similar tendency is found on the dusk side. Weak atomic oxygen emission (4 R) uniformly distributes in every IPA. We also examined the radial distribution of the oxygen neutral cloud during the same period and found the emission peak near Io's orbit with decreasing the intensity toward 8.0 Jupiter radii. The results show the high density component of the oxygen neutral cloud is concentrated around Io and extends mainly toward leading side of Io. In addition, the low density neutrals uniformly exist along Io's orbit. Both components extend radially outward up to 8 Jovian radii with

  18. Studi atas Pemanfaatan Blockchain bagi Internet of Things (IoT

    Directory of Open Access Journals (Sweden)

    Lathifah Arief

    2017-08-01

    Full Text Available Ekosistem Internet of Things (IoT berkembang dengan sangat cepat dan diperkirakan akan menghubungkan 5-20 miliar perangkat pada tahun 2020. Data yang dihimpun dari perangkat ini akan mencapai jumlah yang sangat besar. Saat ini, ekosistem IoT pada umumnya menggunakan model sistem terpusat. Model tersebut memiliki beberapa kelemahan, seperti biaya pemeliharaan yang relatif tinggi, Sistem terdistribusi dapat menjadi alternatif solusi. Blockchain, teknologi ledger terditribusi, memungkinkan transaksi peer-to-peer tanpa perlu adanya perantara pihak ketiga yang terpercaya. Paper ini bertujuan untuk mengeksplorasi potensi pengintegrasian Blockchain ke dalam ekosistem IoT. Hasil penelitian berupa model dan use-case pemanfaatan Blockchain dalam IoT.

  19. IoT-based Asset Management System for Healthcare-related Industries

    Directory of Open Access Journals (Sweden)

    Lee Carman Ka Man

    2015-11-01

    Full Text Available The healthcare industry has been focusing efforts on optimizing inventory management procedures through the incorporation of Information and Communication Technology, in the form of tracking devices and data mining, to establish ideal inventory models. In this paper, a roadmap is developed towards a technological assessment of the Internet of Things (IoT in the healthcare industry, 2010–2020. According to the roadmap, an IoT-based healthcare asset management system (IoT-HAMS is proposed and developed based on Artificial Neural Network (ANN and Fuzzy Logic (FL, incorporating IoT technologies for asset management to optimize the supply of resources.

  20. Internet of Robotic Things – Converging Sensing/Actuating, Hyperconnectivity, Artificial Intelligence and IoT Platforms

    OpenAIRE

    Vermesan, Ovidiu; Bröring, Arne; Tragos, Elias Z.; Serrano, Martin; Bacciu, Davide; Chessa, Stefano; Gallicchio, Claudio; Micheli, Alessio; Dragone, Mauro; Saffiotti, Alessandro; Simoens, Pieter; Cavallo, Filippo; Bahr, Roy

    2017-01-01

    The Internet of Things (IoT) concept is evolving rapidly and influencing new developments in various application domains, such as the Internet of Mobile Things (IoMT), Autonomous Internet of Things (A-IoT), Autonomous System of Things (ASoT), Internet of Autonomous Things (IoAT), Internet of Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc. that are progressing/advancing by using IoT technology. The IoT influence represents new development and deployment challenges in diffe...

  1. Data-Filtering System to Avoid Total Data Distortion in IoT Networking

    Directory of Open Access Journals (Sweden)

    Dae-Young Kim

    2017-01-01

    Full Text Available In the Internet of Things (IoT networking, numerous objects are connected to a network. They sense events and deliver the sensed information to the cloud. A lot of data is generated in the IoT network, and servers in the cloud gather the sensed data from the objects. Then, the servers analyze the collected data and provide proper intelligent services to users through the results of the analysis. When the server analyzes the collected data, if there exists malfunctioning data, distortional results of the analysis will be generated. The distortional results lead to misdirection of the intelligent services, leading to poor user experience. In the analysis for intelligent services in IoT, malfunctioning data should be avoided because integrity of the collected data is crucial. Therefore, this paper proposes a data-filtering system for the server in the cloud. The proposed data-filtering system is placed in front of the server and firstly receives the sensed data from the objects. It employs the naïve Bayesian classifier and, by learning, classifies the malfunctioning data from among the collected data. Data with integrity is delivered to the server for analysis. Because the proposed system filters the malfunctioning data, the server can obtain accurate analysis results and reduce computing load. The performance of the proposed data-filtering system is evaluated through computer simulation. Through the simulation results, the efficiency of the proposed data-filtering system is shown.

  2. UMAMI: A Recipe for Generating Meaningful Metrics through Holistic I/O Performance Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Lockwood, Glenn K. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Yoo, Wucherl [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Byna, Suren [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Wright, Nicholas J. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Snyder, Shane [Argonne National Lab. (ANL), Argonne, IL (United States); Harms, Kevin [Argonne National Lab. (ANL), Argonne, IL (United States); Nault, Zachary [Argonne National Lab. (ANL), Argonne, IL (United States); Carns, Philip [Argonne National Lab. (ANL), Argonne, IL (United States)

    2017-11-12

    I/O efficiency is essential to productivity in scientific computing, especially as many scientific domains become more data-intensive. Many characterization tools have been used to elucidate specific aspects of parallel I/O performance, but analyzing components of complex I/O subsystems in isolation fails to provide insight into critical questions: how do the I/O components interact, what are reasonable expectations for application performance, and what are the underlying causes of I/O performance problems? To address these questions while capitalizing on existing component-level characterization tools, we propose an approach that combines on-demand, modular synthesis of I/O characterization data into a unified monitoring and metrics interface (UMAMI) to provide a normalized, holistic view of I/O behavior. We evaluate the feasibility of this approach by applying it to a month-long benchmarking study on two distinct largescale computing platforms. We present three case studies that highlight the importance of analyzing application I/O performance in context with both contemporaneous and historical component metrics, and we provide new insights into the factors affecting I/O performance. By demonstrating the generality of our approach, we lay the groundwork for a production-grade framework for holistic I/O analysis.

  3. An intelligent CAMAC I/O module based on the Signetics 8X300 microcontroller

    Science.gov (United States)

    Turner, G. W.; Hendricks, R. W.

    1980-03-01

    An intelligent CAMAC I/O module based on the Signetics 8X300 microcontroller has been developed. Sixteen 8-bit I/O ports have been utilized; eight are dedicated to data transfer with external devices and/or processes and eight are dedicated to communication with the CAMAC dataway. Separate status and data registers are provided. The input status port (SIN) can receive up to seven individual signals from external devices or the host computer while the output status port (SOUT) can be used to provide up to seven internally graded LAMs and one bit can be used to generate a Q-response for termination of block transfers. Diagnostic software has been developed to operate on the host computer which fully tests all implemented instructions. In our application the device is used in a high-speed memory mapping scheme for data acquisition with a two-dimensional position-sensitive detector system.

  4. An intelligent CAMAC I/O module based on the signetics 8X300 microcontroller

    International Nuclear Information System (INIS)

    Turner, G.W.; Hendricks, R.W.; Oak Ridge National Lab., TN

    1980-01-01

    An intelligent CAMAC I/O module based on the Signetics 8X300 microcontroller has been developed. Sixteen 8-bit I/O ports have been utilized; eight are dedicated to data transfers with external devices and/or processes and eight are dedicated to communication with the CAMAC dataway. Separate status and data registers are provided. The input status port (SIN) can receive up to seven individual signals from external devices or the host computer while the output status port (SOUT) can be used to provide up to seven internally graded LAMs and one bit can be used to generate a Q-response for termination of block transfers. Diagnostic software has been developed to operate on the host computer which fully tests all implemented instructions. In our application the device is used in a high-speed memory mapping scheme for data acquisition with a two-dimensional position-sensitive detector system. (orig.)

  5. Towards Blockchain-based Auditable Storage and Sharing of IoT Data

    OpenAIRE

    Shafagh, Hossein; Burkhalter, Lukas; Hithnawi, Anwar; Duquennoy, Simon

    2017-01-01

    Today the cloud plays a central role in storing, processing, and distributing data. Despite contributing to the rapid development of IoT applications, the current IoT cloud-centric architecture has led into a myriad of isolated data silos that hinders the full potential of holistic data-driven analytics within the IoT. In this paper, we present a blockchain-based design for the IoT that brings a distributed access control and data management. We depart from the current trust model that delega...

  6. Professional iOS database application programming

    CERN Document Server

    Alessi, Patrick

    2013-01-01

    Updated and revised coverage that includes the latest versions of iOS and Xcode Whether you're a novice or experienced developer, you will want to dive into this updated resource on database application programming for the iPhone and iPad. Packed with more than 50 percent new and revised material - including completely rebuilt code, screenshots, and full coverage of new features pertaining to database programming and enterprise integration in iOS 6 - this must-have book intends to continue the precedent set by the previous edition by helping thousands of developers master database

  7. Layout-Aware I/O Scheduling for Terabits Data Movement

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Youngjae [ORNL; Atchley, Scott [ORNL; Vallee, Geoffroy R [ORNL; Shipman, Galen M [ORNL

    2013-01-01

    Many science facilities, such as the Department of Energy s Leadership Computing Facilities and experimental facilities including the Spallation Neutron Source, Stanford Linear Accelerator Center, and Advanced Photon Source, produce massive amounts of experimental and simulation data. These data are often shared among the facilities and with collaborating institutions. Moving large datasets over the wide- area network (WAN) is a major problem inhibiting collaboration. Next- generation, terabit-networks will help alleviate the problem, however, the parallel storage systems on the end-system hosts at these institutions can become a bottleneck for terabit data movement. The parallel storage system (PFS) is shared by simulation systems, experimental systems, analysis and visualization clusters, in addition to wide-area data movers. These competing uses often induce temporary, but significant, I/O load imbalances on the storage system, which impact the performance of all the users. The problem is a serious concern because some resources are more expensive (e.g. super computers) or have time-critical deadlines (e.g. experimental data from a light source), but parallel file systems handle all requests fairly even if some storage servers are under heavy load. This paper investigates the problem of competing workloads accessing the parallel file system and how the performance of wide-area data movement can be improved in these environments. First, we study the I/O load imbalance problems using actual I/O performance data collected from the Spider storage system at the Oak Ridge Leadership Computing Facility. Second, we present I/O optimization solutions with layout-awareness on end-system hosts for bulk data movement. With our evaluation, we show that our I/O optimization techniques can avoid the I/O congested disk groups, improving storage I/O times on parallel storage systems for terabit data movement.

  8. Using a 2D Model of the Io Plasma Torus to Investigate the Effects of Density Variations on the Morphology and Intensity of the Io Footprint

    Science.gov (United States)

    Payan, A. P.; Rajendar, A.; Paty, C. S.; Bonfond, B.; Crary, F.

    2012-12-01

    Io is the primary source of plasma in the Jovian magnetosphere, continuously releasing approximately 1 ton/s of SO2 from volcanic eruptions. The interaction of Io with Jupiter's magnetosphere is strongly influenced by the density structure of the resulting plasma torus and the position of Io relative to the center of the torus [Bonfond et al. 2008]. This unusual interaction produces a complex auroral feature on Jupiter's ionosphere known as the Io footprint. Hubble Space Telescope (HST) observations of Jupiter's far-UV aurora during spring 2007 showed an increased number of isolated auroral blobs along with a continuous expansion of Jupiter's main auroral oval over a few months. These blobs were associated with several large injections of hot plasma between 9 and 27 Jovian radii. These events coincided with a large volcanic eruption of the Tvashtar Paterae on Io, as observed by the New Horizons spacecraft [Spencer et al., 2007]. This, in turn, may have resulted in a significant increase in the plasma torus density. Besides, on June 7th, 2007, the Io footprint momentarily became so faint that it disappeared under a diffuse patch of emission remaining from an injection blob [Bonfond et al., 2012]. The goal of the present study is to examine the relationship between the increased density of the plasma torus and the dimming of the Io footprint. We implement a 2D model of the Io plasma torus that treats the variable-density torus as being composed of discrete layers of uniform density. As the co-rotating plasma in the plasma torus impinges on Io, Alfvén waves are launched at a pushback angle obtained from Gurnett and Goertz [1981]. The waves propagate inside the plasma torus through reflection and refraction at density discontinuities where they lose some of their initial energy. Using the above model, we can track the Alfvén wave fronts in the plasma torus and determine the longitude at which they exit the torus along with the corresponding remaining energy. Since

  9. Learning iOS forensics

    CERN Document Server

    Epifani, Mattia

    2015-01-01

    If you are a digital forensics examiner daily involved in the acquisition and analysis of mobile devices and want to have a complete overview of how to perform your work on iOS devices, this book is definitely for you.

  10. Proceedings First Workshop on Architectures, Languages and Paradigms for IoT

    OpenAIRE

    Pianini, Danilo; Salvaneschi, Guido

    2018-01-01

    The 1st workshop on Architectures, Languages and Paradigms for IoT (ALP4IoT 2017), was held in Turin on September 19th, 2017. ALP4IoT was a satellite event of the 13th International Conference on integrated Formal Methods (iFM 2017). The workshop aimed at critically reviewing the state-of-the-art and the state-of-the-practice of formal techniques and software methods for the IoT, presenting open problems and challenges and triggering a discussion among the participants with different views an...

  11. The Integration of DCS I/O to an Existing PLC

    Science.gov (United States)

    Sadhukhan, Debashis; Mihevic, John

    2013-01-01

    At the NASA Glenn Research Center (GRC), Existing Programmable Logic Controller (PLC) I/O was replaced with Distributed Control System (DCS) I/O, while keeping the existing PLC sequence Logic. The reason for integration of the PLC logic and DCS I/O, along with the evaluation of the resulting system is the subject of this paper. The pros and cons of the old system and new upgrade are described, including operator workstation screen update times. Detail of the physical layout and the communication between the PLC, the DCS I/O and the operator workstations are illustrated. The complex characteristics of a central process control system and the plan to remove the PLC processors in future upgrades is also discussed.

  12. A Federated Capability-based Access Control Mechanism for Internet of Things (IoTs)

    OpenAIRE

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-01-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, l...

  13. A post-Galileo view of Io's interior

    Science.gov (United States)

    Keszthelyi, L.; Jaeger, W.L.; Turtle, E.P.; Milazzo, M.; Radebaugh, J.

    2004-01-01

    We present a self-consistent model for the interior of Io, taking the recent Galileo data into account. In this model, Io has a completely molten core, substantially molten mantle, and a very cold lithosphere. Heat from magmatic activity can mobilize volatile compounds such as SO2 in the lithosphere, and the movement of such cryogenic fluids may be important in the formation of surface features including sapping scarps and paterae. ?? Published by Elsevier Inc.

  14. SMART-ITEM: IoT-Enabled Smart Living

    OpenAIRE

    Kor, A; Pattinson, C; Yanovsky, M; Kharchenko, V

    2017-01-01

    The main goal of this proposed project is to harness the emerging IoT technology to empower elderly population to self-manage their own health, stay active, healthy, and independent as long as possible within a smart and secured living environment. An integrated open-sourced IoT ecosystem will be developed. It will encompass the entire data lifecycle which involves the following processes: data acquisition, data transportation; data integration, processing, manipulation and computation; visua...

  15. Analysis of DDoS-capable IoT malwares

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2017-01-01

    to the top Distributed Denial of Service (DDoS) attacks, making them more powerful and easier to achieve than ever. This paper aims at provide an up-to-date picture of DDoS attacks in the specific subject of the IoT, studying how these attacks work and considering the most common families in the IoT context...

  16. Green IoT: An Investigation on Energy Saving Practices for 2020 and Beyond

    OpenAIRE

    Arshad, R.; Zahoor, S.; Shah, M.A.; Wahid, A.; Yu, Hongnian

    2017-01-01

    Internet of Things (IoT) is an emerging concept which aims to connect billions of devices with each other. The IoT devices sense, collect and transmit important information from their surroundings. This exchange of very large amount of information amongst billions of devices creates a massive energy need. Green IoT envisions the concept of reducing the energy consumption of IoT devices and making the environment safe. Inspired by achieving a sustainable environment for IoT, we first give the ...

  17. Understanding the I/O Performance Gap Between Cori KNL and Haswell

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Jialin [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Koziol, Quincey [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Tang, Houjun [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Tessier, Francois [Argonne National Lab. (ANL), Argonne, IL (United States); Bhimji, Wahid [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Cook, Brandon [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Austin, Brian [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Byna, Suren [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thakur, Bhupender [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Lockwood, Glenn [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Deslippe, Jack [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC); Prabhat, None [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). National Energy Research Scientific Computing Center (NERSC)

    2017-05-01

    The Cori system at NERSC has two compute partitions with different CPU architectures: a 2,004 node Haswell partition and a 9,688 node KNL partition, which ranked as the 5th most powerful and fastest supercomputer on the November 2016 Top 500 list. The compute partitions share a common storage configuration, and understanding the IO performance gap between them is important, impacting not only to NERSC/LBNL users and other national labs, but also to the relevant hardware vendors and software developers. In this paper, we have analyzed performance of single core and single node IO comprehensively on the Haswell and KNL partitions, and have discovered the major bottlenecks, which include CPU frequencies and memory copy performance. We have also extended our performance tests to multi-node IO and revealed the IO cost difference caused by network latency, buffer size, and communication cost. Overall, we have developed a strong understanding of the IO gap between Haswell and KNL nodes and the lessons learned from this exploration will guide us in designing optimal IO solutions in many-core era.

  18. IO and OI. II

    DEFF Research Database (Denmark)

    Engelfriet, Joost; Schmidt, Erik Meineche

    1978-01-01

    In Part 1 of this paper (J. Comput. System Sci. 15, Number 3 (1977)) we presented a fixed point characterization of the (IO and OI) context-free tree languages. We showed that a context-free tree grammar can be viewed as a system of regular equations over a tree language substitution algebra. In ....... In this part we shall use these results to obtain a theory of systems of context-free equations over arbitrary continuous algebras. We refer to the Introduction of Part 1 for a description of the contents of this part.......In Part 1 of this paper (J. Comput. System Sci. 15, Number 3 (1977)) we presented a fixed point characterization of the (IO and OI) context-free tree languages. We showed that a context-free tree grammar can be viewed as a system of regular equations over a tree language substitution algebra...

  19. ATLAS I/O Performance Optimization in As-Deployed Environments

    CERN Document Server

    Maier, Thomas; The ATLAS collaboration; Bhimji, Wahid; Elmsheuser, Johannes; van Gemmeren, Peter; Malon, David; Krumnack, Nils

    2015-01-01

    I/O is a fundamental determinant in the overall performance of physics analysis and other data-intensive scientific computing. It is, further, crucial to effective resource delivery by the facilities and infrastructure that support data-intensive science. To understand I/O performance, clean measurements in controlled environments are essential, but effective optimization requires as well an understanding of the complicated realities of as-deployed environments. These include a spectrum of local and wide-area data delivery and resilience models, heterogeneous storage systems, matches and mismatches between data organization and access patterns, multi-user considerations that may help or hinder individual job performance, and more. The ATLAS experiment has organized an interdisciplinary working group of I/O, persistence, analysis framework, distributed infrastructure, site deployment, and external experts to understand and improve I/O performance in preparation for Run 2 of the Large Hadron Collider. The adopt...

  20. Volcanism on Io: The Galileo NIMS Io Thermal Emission Database (NITED)

    Science.gov (United States)

    Davies, A. G.; Veeder, G. J.; Matson, D. L.; Johnson, T. V.

    2011-12-01

    In order to determine the magnitude of thermal emission from Io's volcanoes and variability with time at local, regional and global scales, we have calculated the 4.7 or 5 μm radiant flux for every hot spot in every Galileo Near Infrared Mapping Spectrometer (NIMS) observation obtained during the Galileo mission between June 1996 and October 2001. The resulting database contains over 1000 measurements of radiant flux, corrected for emission angle, range to target, and, where necessary, incident sunlight. Io's volcanoes produce the most voluminous and most powerful eruptions in the Solar System [1] and NIMS was the ideal instrument for measuring thermal emission from these volcanoes (see [1, 2]). NIMS covered the infrared from 0.7 to 5.2 μm, so measurement of hot spot thermal emission at ~5 μm was possible even in daytime observations. As part of a campaign to quantify magnitude and variability of volcanic thermal emission [1, 3-5] we examined the entire NIMS dataset (196 observations). The resulting NIMS Io Thermal Emission Database (NITED) allows the charting of 5-μm thermal emission at individual volcanoes, identifying individual eruption episodes, and enabling the comparison of activity at different hot spots [e.g., 6] and different regions of Io. Some ionian hot spots were detected only once or twice by NIMS (e.g., Ah Peku Patera, seen during I32), but most were detected many times (e.g., Culann, Tupan and Zamama, [6]). For example, the database contains over 40 observations of Loki Patera (some at high emission angle, and two partial observations). There are 55 observations of Pele. The 27 nighttime observations of Pele show a remarkably steady 5-μm radiant flux of 35 ± 12 GW/μm. There are 34 observations of Pillan, which erupted violently in 1997. Although in many observations low spatial resolution makes it difficult to separate hot spot pairs such as Susanoo Patera and Mulungu Patera; Tawhaki Patera and Hi'iaka Patera; and Janus Patera and Kanehekili

  1. Proof of Concept of Home IoT Connected Vehicles

    Science.gov (United States)

    Kim, Younsun; Oh, Hyunggoy; Kang, Sungho

    2017-01-01

    The way in which we interact with our cars is changing, driven by the increased use of mobile devices, cloud-based services, and advanced automotive technology. In particular, the requirements and market demand for the Internet of Things (IoT) device-connected vehicles will continuously increase. In addition, the advances in cloud computing and IoT have provided a promising opportunity for developing vehicular software and services in the automotive domain. In this paper, we introduce the concept of a home IoT connected vehicle with a voice-based virtual personal assistant comprised of a vehicle agent and a home agent. The proposed concept is evaluated by implementing a smartphone linked with home IoT devices that are connected to an infotainment system for the vehicle, a smartphone-based natural language interface input device, and cloud-based home IoT devices for the home. The home-to-vehicle connected service scenarios that aim to reduce the inconvenience due to simple and repetitive tasks by improving the urban mobility efficiency in IoT environments are substantiated by analyzing real vehicle testing and lifestyle research. Remarkable benefits are derived by making repetitive routine tasks one task that is executed by a command and by executing essential tasks automatically, without any request. However, it should be used with authorized permission, applied without any error at the right time, and applied under limited conditions to sense the habitants’ intention correctly and to gain the required trust regarding the remote execution of tasks. PMID:28587246

  2. Proof of Concept of Home IoT Connected Vehicles.

    Science.gov (United States)

    Kim, Younsun; Oh, Hyunggoy; Kang, Sungho

    2017-06-05

    The way in which we interact with our cars is changing, driven by the increased use of mobile devices, cloud-based services, and advanced automotive technology. In particular, the requirements and market demand for the Internet of Things (IoT) device-connected vehicles will continuously increase. In addition, the advances in cloud computing and IoT have provided a promising opportunity for developing vehicular software and services in the automotive domain. In this paper, we introduce the concept of a home IoT connected vehicle with a voice-based virtual personal assistant comprised of a vehicle agent and a home agent. The proposed concept is evaluated by implementing a smartphone linked with home IoT devices that are connected to an infotainment system for the vehicle, a smartphone-based natural language interface input device, and cloud-based home IoT devices for the home. The home-to-vehicle connected service scenarios that aim to reduce the inconvenience due to simple and repetitive tasks by improving the urban mobility efficiency in IoT environments are substantiated by analyzing real vehicle testing and lifestyle research. Remarkable benefits are derived by making repetitive routine tasks one task that is executed by a command and by executing essential tasks automatically, without any request. However, it should be used with authorized permission, applied without any error at the right time, and applied under limited conditions to sense the habitants' intention correctly and to gain the required trust regarding the remote execution of tasks.

  3. The Method of System Test using I/O Stimulator

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jang Yeol; Lee, Dong Young; Kim, Chang Hoi [KAERI, Daejeon (Korea, Republic of)

    2016-05-15

    In general, the software development life cycle consists of the requirement phase, design phase, implementation phase, testing phase, integration phase (software-software integration, software-hardware integration), installation phase, and operation and maintenance phase. The fundamental parts to the testing phase are component test, software integration test, software hardware integration test, and system test. Among these tests, we focused in particular on system test using I/O stimulator. The system test operates the functionality, performance, and interface because system testing falls within the scope of black box testing, which should not require knowledge of the inner design of the code or logic. The purpose of developing a system test using a I/O stimulator is to save time and effort from the functionality and performance tests. We developed an I/O stimulator for the burning system test based on the operational scenario. The hardware, software, and manmachine- interface (MMI) are fundamental parts to the I/O stimulator. Signal sources from the I/O stimulator contain analog input, analog output, digital input, digital output, a Programmable Power Supply, an RS232C Serial interface and a dual port Ethernet interface. While automation cannot reproduce everything that a software engineer can do, it can be extremely useful for the system test. However, it does require the test criteria and a well-developed test suite of the testing scripts in order to be useful. In this study, we developed a multipurpose and cost-efficient I/O stimulator using LabVIEW program instead of the testing scripts.

  4. The Method of System Test using I/O Stimulator

    International Nuclear Information System (INIS)

    Kim, Jang Yeol; Lee, Dong Young; Kim, Chang Hoi

    2016-01-01

    In general, the software development life cycle consists of the requirement phase, design phase, implementation phase, testing phase, integration phase (software-software integration, software-hardware integration), installation phase, and operation and maintenance phase. The fundamental parts to the testing phase are component test, software integration test, software hardware integration test, and system test. Among these tests, we focused in particular on system test using I/O stimulator. The system test operates the functionality, performance, and interface because system testing falls within the scope of black box testing, which should not require knowledge of the inner design of the code or logic. The purpose of developing a system test using a I/O stimulator is to save time and effort from the functionality and performance tests. We developed an I/O stimulator for the burning system test based on the operational scenario. The hardware, software, and manmachine- interface (MMI) are fundamental parts to the I/O stimulator. Signal sources from the I/O stimulator contain analog input, analog output, digital input, digital output, a Programmable Power Supply, an RS232C Serial interface and a dual port Ethernet interface. While automation cannot reproduce everything that a software engineer can do, it can be extremely useful for the system test. However, it does require the test criteria and a well-developed test suite of the testing scripts in order to be useful. In this study, we developed a multipurpose and cost-efficient I/O stimulator using LabVIEW program instead of the testing scripts

  5. Enabling IoT ecosystems through platform interoperability

    OpenAIRE

    Bröring, Arne; Schmid, Stefan; Schindhelm, Corina-Kim; Khelil, Abdelmajid; Kabisch, Sebastian; Kramer, Denis; Le Phuoc, Danh; Mitic, Jelena; Anicic, Darko; Teniente López, Ernest

    2017-01-01

    Today, the Internet of Things (IoT) comprises vertically oriented platforms for things. Developers who want to use them need to negotiate access individually and adapt to the platform-specific API and information models. Having to perform these actions for each platform often outweighs the possible gains from adapting applications to multiple platforms. This fragmentation of the IoT and the missing interoperability result in high entry barriers for developers and prevent the emergence of broa...

  6. Service framework for Internet of People, Things and Services (IoPTS)

    DEFF Research Database (Denmark)

    Shinde, Gitanjali; Olesen, Henning

    2016-01-01

    Internet of Things (IoT) is a revolutionary technology, where devices around us will be capable of sensing, reacting, responding and working autonomously to provide services to the users e.g. within smart homes, enterprises, utilities and e-Health. In the IoT paradigm, every device...... will be connected to the Internet to provide services to the user. Bringing this together makes it relevant to talk about the "Internet of People, Things and Services (IoPTS)". However, providing the appropriate services to the users depending on their requirements is a major challenge for IoPTS. After reviewing...

  7. Ultra-low power analog-digital converters for IoT

    NARCIS (Netherlands)

    Harpe, P.J.A.; Alioto, Massimo

    2017-01-01

    This chapter addresses ADCs for IoT nodes, which are needed to digitize sensor information before processing, storage or wireless transmission. ADCs are also required for the radio communication channel. This chapter focusses on successive approximation (SAR) ADCs, a popular architecture for IoT

  8. Attack tree analysis for insider threats on the IoT using isabelle

    DEFF Research Database (Denmark)

    Kammüller, Florian; Nurse, Jason R. C.; Probst, Christian W.

    2016-01-01

    The Internet-of-Things (IoT) aims at integrating small devices around humans. The threat from human insiders in "regular" organisations is real; in a fully-connected world of the IoT, organisations face a substantially more severe security challenge due to unexpected access possibilities and info....... On the classified IoT attack examples, we show how this logical approach can be used to make the models more precise and to analyse the previously identified Insider IoT attacks using Isabelle attack trees....

  9. Internet of Things : a gateway centric solution for providing IoT connectivity

    OpenAIRE

    Karhula, Pekka

    2016-01-01

    The Internet of Things (IoT) is revolutionising the traditional Internet by extending it with smart everyday objects. Wearables, smart grids and home automation systems are just a few examples of the IoT. A noteworthy point is that the amount of devices connected to the Internet will rapidly grow with the IoT. The IoT typically involves devices that are constrained in terms of energy, memory and processing resources. Therefore, they also limit applying the existing Internet pro...

  10. Energy-Neutral Data Collection Rate Control for IoT Animal Behavior Monitors

    Directory of Open Access Journals (Sweden)

    Jay Wilhelm

    2017-11-01

    Full Text Available Energy-neutral operation (ENO is a major concern for Internet of things (IoT sensor systems. Animals can be tagged with IoT sensors to monitor their movement and behavior. These sensors wirelessly upload collected data and can receive parameters to change their operation. Typically, the behavior monitors are powered by a battery where the system relies upon harvesting solar radiation for sustainable operation. Solar panels typically are used as the harvesting mechanism and can have a level of uncertainty regarding consistent energy delivery due to factors such as adverse weather, foliage, time of day, and individual animal behavior. The variability of available energy inevitably creates a trade-off in the rate at which data can be collected with respect to incoming and stored energy. The objective of this research was to investigate and simulate methods and parameters that can control the data collection rate of an IoT behavior monitor to achieve sustained operation with unknown and random energy harvesting. Analysis and development of a control system were performed by creating a software model of energy consumption and then simulating using different initial conditions and random energy harvesting rates for evaluation. The contribution of this effort was the exploration into the usage of a discrete-time gain scheduled Proportional–Integral–Derivative (PID that was tuned to a specific device configuration, using battery state of charge as an input, and found to maintain a battery level set-point, reject small solar harvesting energy disturbances, and maintain a consistent data collection rate throughout the day.

  11. A Multi-Hop Clustering Mechanism for Scalable IoT Networks.

    Science.gov (United States)

    Sung, Yoonyoung; Lee, Sookyoung; Lee, Meejeong

    2018-03-23

    It is expected that up to 26 billion Internet of Things (IoT) equipped with sensors and wireless communication capabilities will be connected to the Internet by 2020 for various purposes. With a large scale IoT network, having each node connected to the Internet with an individual connection may face serious scalability issues. The scalability problem of the IoT network may be alleviated by grouping the nodes of the IoT network into clusters and having a representative node in each cluster connect to the Internet on behalf of the other nodes in the cluster instead of having a per-node Internet connection and communication. In this paper, we propose a multi-hop clustering mechanism for IoT networks to minimize the number of required Internet connections. Specifically, the objective of proposed mechanism is to select the minimum number of coordinators, which take the role of a representative node for the cluster, i.e., having the Internet connection on behalf of the rest of the nodes in the cluster and to map a partition of the IoT nodes onto the selected set of coordinators to minimize the total distance between the nodes and their respective coordinator under a certain constraint in terms of maximum hop count between the IoT nodes and their respective coordinator. Since this problem can be mapped into a set cover problem which is known as NP-hard, we pursue a heuristic approach to solve the problem and analyze the complexity of the proposed solution. Through a set of experiments with varying parameters, the proposed scheme shows 63-87.3% reduction of the Internet connections depending on the number of the IoT nodes while that of the optimal solution is 65.6-89.9% in a small scale network. Moreover, it is shown that the performance characteristics of the proposed mechanism coincide with expected performance characteristics of the optimal solution in a large-scale network.

  12. Sensor-Based Optimization Model for Air Quality Improvement in Home IoT.

    Science.gov (United States)

    Kim, Jonghyuk; Hwangbo, Hyunwoo

    2018-03-23

    We introduce current home Internet of Things (IoT) technology and present research on its various forms and applications in real life. In addition, we describe IoT marketing strategies as well as specific modeling techniques for improving air quality, a key home IoT service. To this end, we summarize the latest research on sensor-based home IoT, studies on indoor air quality, and technical studies on random data generation. In addition, we develop an air quality improvement model that can be readily applied to the market by acquiring initial analytical data and building infrastructures using spectrum/density analysis and the natural cubic spline method. Accordingly, we generate related data based on user behavioral values. We integrate the logic into the existing home IoT system to enable users to easily access the system through the Web or mobile applications. We expect that the present introduction of a practical marketing application method will contribute to enhancing the expansion of the home IoT market.

  13. A survey on LPWA technology: LoRa and NB-IoT

    Directory of Open Access Journals (Sweden)

    Rashmi Sharan Sinha

    2017-03-01

    Full Text Available By 2020, more than twenty five billion devices would be connected through wireless communications. In accordance with the rapid growth of the internet of things (IoT market, low power wide area (LPWA technologies have become popular. In various LPWA technologies, narrowband (NB-IoT and long range (LoRa are two leading technologies. In this paper, we provide a comprehensive survey on NB-IoT and LoRa as efficient solutions connecting the devices. It is shown that unlicensed LoRa has advantages in terms of battery lifetime, capacity, and cost. Meanwhile, licensed NB-IoT offers benefits in terms of QoS, latency, reliability, and range.

  14. Volcanism on Jupiter's moon Io and its relation to interior processes

    Science.gov (United States)

    Hamilton, Christopher

    2013-04-01

    Jupiter's moon Io is the most volcanically active body in the Solar System and offers insight into processes of tidal heating, melt generation, and magma ascent. Investigating these processes contributes to a better understanding of Io's geologic history, internal structure, and tidal dissipation mechanisms, as well as to understanding similar processes operating on other tidally-heated worlds (e.g., Europa, Enceladus, and some exoplanets). Four recent developments provide new observational constraints that prompt re-examination of the relationships between Io's surficial geology and interior structure. These developments include: (1) completion of the first 1:15,000,000 scale geologic map of Io based on a synthesis of Voyager and Galileo data; (2) re-interpretation of Galileo magnetometer data, which suggests that Io has a globally continuous subsurface magma ocean; (3) new global surveys of the power output from volcanic centers on Io; and (4) identification of an offset between volcano concentrations and surface heat flux maxima predicted by solid body tidal heating models. In this study, the spatial distributions of volcanic hotspots and paterae on Io are characterized using distance-based clustering techniques and nearest neighbor statistics. Distance-based clustering results support a dominant role for asthenospheric heating within Io, but show a 30-60° eastward offset in volcano concentrations relative to locations of predicted surface heat flux maxima. The observed asymmetry in volcano concentrations, with respect to the tidal axis, cannot be explained by existing solid body tidal heating models. However, identification of a global magma ocean within Io raises the intriguing possibility that a fluid tidal response—analogous to the heating of icy satellites by fluid tidal dissipation in their liquid oceans—may modify Io's thermal budget and locations of enhanced volcanism. The population density of volcanoes is greatest near the equator, which also

  15. Tractable policy management framework for IoT

    Science.gov (United States)

    Goynugur, Emre; de Mel, Geeth; Sensoy, Murat; Calo, Seraphin

    2017-05-01

    Due to the advancement in the technology, hype of connected devices (hence forth referred to as IoT) in support of automating the functionality of many domains, be it intelligent manufacturing or smart homes, have become a reality. However, with the proliferation of such connected and interconnected devices, efficiently and effectively managing networks manually becomes an impractical, if not an impossible task. This is because devices have their own obligations and prohibitions in context, and humans are not equip to maintain a bird's-eye-view of the state. Traditionally, policies are used to address the issue, but in the IoT arena, one requires a policy framework in which the language can provide sufficient amount of expressiveness along with efficient reasoning procedures to automate the management. In this work we present our initial work into creating a scalable knowledge-based policy framework for IoT and demonstrate its applicability through a smart home application.

  16. Integrating Facebook iOS SDK with your application

    CERN Document Server

    Macrì, Giuseppe

    2013-01-01

    A tutorial-based guide with chapters focusing on learning and embedding crucial Facebook features.If you are a developer who wishes to develop and monetize your apps on the App store, then this is the book for you. This book assumes you have basic knowledge of iOS programming using Objective-C and XCode, however, prior knowledge of Facebook iOS SDK is not required.

  17. Instant Passbook app development for iOS how-to

    CERN Document Server

    Moon, Keith D

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. A step-by-step guide, focusing on simple projects to help you create a Passbook app for iOS 6.Instant Passbook App Development for iOS 6 How-to is for registered Apple iOS developers, experienced in building an app using Objective-C and Xcode, looking to add Passbook functionality to their app. You will need to have an understanding of the JSON format, REST APIs, and a server-side language like Ruby. Familiarity with executing commands via the Terminal app is expected for the exerci

  18. Latitudinal oscillations of plasma within the Io torus

    Science.gov (United States)

    Cummings, W. D.; Dessler, A. J.; Hill, T. W.

    1980-01-01

    The equilibrium latitude and the period of oscillations about this equilibrium latitude are calculated for a plasma in a centrifugally dominated tilted dipole magnetic field representing Jupiter's inner magnetosphere. It is found that for a hot plasma the equilibrium latitude in the magnetic equator, for a cold plasma it is the centrifugal equator, and for a warm plasma it is somewhere in between. An illustrative model is adopted in which atoms are sputtered from the Jupiter-facing hemisphere of Io and escape Io's gravity to be subsequently ionized some distance from Io. Finally, it is shown that ionization generally does not occur at the equilibrium altitude, and that the resulting latitudinal oscillations provide an explanation for the irregularities in electron concentration within the torus, as reported by the radioastronomy experiment aboard Voyager I.

  19. iOS cloud development dor dummies

    CERN Document Server

    Goldstein, Neal

    2012-01-01

    Want to create robust, data-driven, iOS cloud apps? This book makes it easier! Apple's mobile operating system (iOS) supports iPhones, iPads, iPods and other Apple devices, and while even beginners can now develop apps to run just on these devices themselves, sometimes you want to create an app with more heft. Applications such as live weather reports or multi-player games require a lot of data to be pulled from outside—often from cloud-based Web Services, such as Google or Amazon. This book, written by application development experts Sujee Maniyam and Neal Goldstein, shows you how to we

  20. IoT-Based Car's Parking Monitoring System

    OpenAIRE

    Dwiputra Albertus Ega; Khoswanto Handry; Sutjiadi Raymond; Lim Resmana

    2018-01-01

    Internet-of-things-based technologies have advanced so much and helped public necessities. The use of IoT at a parking lot will help vehicle users to know the availability of a parking location through smartphones. This IoT-based parking system is created by using controllers, sensors, servers and cloud. Controllers and sensors will be placed on the ceiling of each parking slots to detect the presence of a car. Server collect the results of the sensors and store them in Cloud. System test is ...

  1. I/O load balancing for big data HPC applications

    Energy Technology Data Exchange (ETDEWEB)

    Paul, Arnab K. [Virginia Polytechnic Institute and State University; Goyal, Arpit [Virginia Polytechnic Institute and State University; Wang, Feiyi [ORNL; Oral, H Sarp [ORNL; Butt, Ali R. [Virginia Tech, Blacksburg, VA; Brim, Michael J. [ORNL; Srinivasa, Sangeetha B. [Virginia Polytechnic Institute and State University

    2018-01-01

    High Performance Computing (HPC) big data problems require efficient distributed storage systems. However, at scale, such storage systems often experience load imbalance and resource contention due to two factors: the bursty nature of scientific application I/O; and the complex I/O path that is without centralized arbitration and control. For example, the extant Lustre parallel file system-that supports many HPC centers-comprises numerous components connected via custom network topologies, and serves varying demands of a large number of users and applications. Consequently, some storage servers can be more loaded than others, which creates bottlenecks and reduces overall application I/O performance. Existing solutions typically focus on per application load balancing, and thus are not as effective given their lack of a global view of the system. In this paper, we propose a data-driven approach to load balance the I/O servers at scale, targeted at Lustre deployments. To this end, we design a global mapper on Lustre Metadata Server, which gathers runtime statistics from key storage components on the I/O path, and applies Markov chain modeling and a minimum-cost maximum-flow algorithm to decide where data should be placed. Evaluation using a realistic system simulator and a real setup shows that our approach yields better load balancing, which in turn can improve end-to-end performance.

  2. Scalable I/O Systems via Node-Local Storage: Approaching 1 TB/sec File I/O

    Energy Technology Data Exchange (ETDEWEB)

    Bronevetsky, G; Moody, A

    2009-08-18

    In the race to PetaFLOP-speed supercomputing systems, the increase in computational capability has been accompanied by corresponding increases in CPU count, total RAM, and storage capacity. However, a proportional increase in storage bandwidth has lagged behind. In order to improve system reliability and to reduce maintenance effort for modern large-scale systems, system designers have opted to remove node-local storage from the compute nodes. Today's multi-TeraFLOP supercomputers are typically attached to parallel file systems that provide only tens of GBs/s of I/O bandwidth. As a result, such machines have access to much less than 1GB/s of I/O bandwidth per TeraFLOP of compute power, which is below the generally accepted limit required for a well-balanced system. In a many ways, the current I/O bottleneck limits the capabilities of modern supercomputers, specifically in terms of limiting their working sets and restricting fault tolerance techniques, which become critical on systems consisting of tens of thousands of components. This paper resolves the dilemma between high performance and high reliability by presenting an alternative system design which makes use of node-local storage to improve aggregate system I/O bandwidth. In this work, we focus on the checkpointing use-case and present an experimental evaluation of the Scalable Checkpoint/Restart (SCR) library, a new adaptive checkpointing library that uses node-local storage to significantly improve the checkpointing performance of large-scale supercomputers. Experiments show that SCR achieves unprecedented write speeds, reaching a measured 700GB/s of aggregate bandwidth on 8,752 processors and an estimated 1TB/s for a similarly structured machine of 12,500 processors. This corresponds to a speedup of over 70x compared to the bandwidth provided by the 10GB/s parallel file system the cluster uses. Further, SCR can adapt to an environment in which there is wide variation in performance or capacity among

  3. Prediction-Based Energy Saving Mechanism in 3GPP NB-IoT Networks.

    Science.gov (United States)

    Lee, Jinseong; Lee, Jaiyong

    2017-09-01

    The current expansion of the Internet of things (IoT) demands improved communication platforms that support a wide area with low energy consumption. The 3rd Generation Partnership Project introduced narrowband IoT (NB-IoT) as IoT communication solutions. NB-IoT devices should be available for over 10 years without requiring a battery replacement. Thus, a low energy consumption is essential for the successful deployment of this technology. Given that a high amount of energy is consumed for radio transmission by the power amplifier, reducing the uplink transmission time is key to ensure a long lifespan of an IoT device. In this paper, we propose a prediction-based energy saving mechanism (PBESM) that is focused on enhanced uplink transmission. The mechanism consists of two parts: first, the network architecture that predicts the uplink packet occurrence through a deep packet inspection; second, an algorithm that predicts the processing delay and pre-assigns radio resources to enhance the scheduling request procedure. In this way, our mechanism reduces the number of random accesses and the energy consumed by radio transmission. Simulation results showed that the energy consumption using the proposed PBESM is reduced by up to 34% in comparison with that in the conventional NB-IoT method.

  4. Internet of things (IoT) in 5G mobile technologies

    CERN Document Server

    Mastorakis, George; Batalla, Jordi

    2016-01-01

    This book reports on the latest advances in the modeling, analysis and efficient management of information in Internet of Things (IoT) applications in the context of 5G access technologies. It presents cutting-edge applications made possible by the implementation of femtocell networks and millimeter wave communications solutions, examining them from the perspective of the universally and constantly connected IoT. Moreover, it describes novel architectural approaches to the IoT and presents the new framework possibilities offered by 5G mobile networks, including middleware requirements, node-centrality and the location of extensive functionalities at the edge. By providing researchers and professionals with a timely snapshot of emerging mobile communication systems, and highlighting the main pitfalls and potential solutions, the book fills an important gap in the literature and will foster the further developments of 5G hosting IoT devices.

  5. A Proof-of-Concept for Semantically Interoperable Federation of IoT Experimentation Facilities

    Directory of Open Access Journals (Sweden)

    Jorge Lanza

    2016-06-01

    Full Text Available The Internet-of-Things (IoT is unanimously identified as one of the main pillars of future smart scenarios. The potential of IoT technologies and deployments has been already demonstrated in a number of different application areas, including transport, energy, safety and healthcare. However, despite the growing number of IoT deployments, the majority of IoT applications tend to be self-contained, thereby forming application silos. A lightweight data centric integration and combination of these silos presents several challenges that still need to be addressed. Indeed, the ability to combine and synthesize data streams and services from diverse IoT platforms and testbeds, holds the promise to increase the potentiality of smart applications in terms of size, scope and targeted business context. In this article, a proof-of-concept implementation that federates two different IoT experimentation facilities by means of semantic-based technologies will be described. The specification and design of the implemented system and information models will be described together with the practical details of the developments carried out and its integration with the existing IoT platforms supporting the aforementioned testbeds. Overall, the system described in this paper demonstrates that it is possible to open new horizons in the development of IoT applications and experiments at a global scale, that transcend the (silo boundaries of individual deployments, based on the semantic interconnection and interoperability of diverse IoT platforms and testbeds.

  6. A Proof-of-Concept for Semantically Interoperable Federation of IoT Experimentation Facilities.

    Science.gov (United States)

    Lanza, Jorge; Sanchez, Luis; Gomez, David; Elsaleh, Tarek; Steinke, Ronald; Cirillo, Flavio

    2016-06-29

    The Internet-of-Things (IoT) is unanimously identified as one of the main pillars of future smart scenarios. The potential of IoT technologies and deployments has been already demonstrated in a number of different application areas, including transport, energy, safety and healthcare. However, despite the growing number of IoT deployments, the majority of IoT applications tend to be self-contained, thereby forming application silos. A lightweight data centric integration and combination of these silos presents several challenges that still need to be addressed. Indeed, the ability to combine and synthesize data streams and services from diverse IoT platforms and testbeds, holds the promise to increase the potentiality of smart applications in terms of size, scope and targeted business context. In this article, a proof-of-concept implementation that federates two different IoT experimentation facilities by means of semantic-based technologies will be described. The specification and design of the implemented system and information models will be described together with the practical details of the developments carried out and its integration with the existing IoT platforms supporting the aforementioned testbeds. Overall, the system described in this paper demonstrates that it is possible to open new horizons in the development of IoT applications and experiments at a global scale, that transcend the (silo) boundaries of individual deployments, based on the semantic interconnection and interoperability of diverse IoT platforms and testbeds.

  7. IoT for Smart Living

    Indian Academy of Sciences (India)

    Professor. Robert Bosch Centre for Cyber-Physical Systems, ... Develop Information models/Knowledge structures to capture “Cities” to enable Intelligent apps. IoT Technology is now easily accessible for anyone to experiment with. Build very ...

  8. Spatiotemporal Stochastic Modeling of IoT Enabled Cellular Networks: Scalability and Stability Analysis

    KAUST Repository

    Gharbieh, Mohammad; Elsawy, Hesham; Bader, Ahmed; Alouini, Mohamed-Slim

    2017-01-01

    The Internet of Things (IoT) is large-scale by nature, which is manifested by the massive number of connected devices as well as their vast spatial existence. Cellular networks, which provide ubiquitous, reliable, and efficient wireless access, will play fundamental rule in delivering the first-mile access for the data tsunami to be generated by the IoT. However, cellular networks may have scalability problems to provide uplink connectivity to massive numbers of connected things. To characterize the scalability of cellular uplink in the context of IoT networks, this paper develops a traffic-aware spatiotemporal mathematical model for IoT devices supported by cellular uplink connectivity. The developed model is based on stochastic geometry and queueing theory to account for the traffic requirement per IoT device, the different transmission strategies, and the mutual interference between the IoT devices. To this end, the developed model is utilized to characterize the extent to which cellular networks can accommodate IoT traffic as well as to assess and compare three different transmission strategies that incorporate a combination of transmission persistency, backoff, and power-ramping. The analysis and the results clearly illustrate the scalability problem imposed by IoT on cellular network and offer insights into effective scenarios for each transmission strategy.

  9. Spatiotemporal Stochastic Modeling of IoT Enabled Cellular Networks: Scalability and Stability Analysis

    KAUST Repository

    Gharbieh, Mohammad

    2017-05-02

    The Internet of Things (IoT) is large-scale by nature, which is manifested by the massive number of connected devices as well as their vast spatial existence. Cellular networks, which provide ubiquitous, reliable, and efficient wireless access, will play fundamental rule in delivering the first-mile access for the data tsunami to be generated by the IoT. However, cellular networks may have scalability problems to provide uplink connectivity to massive numbers of connected things. To characterize the scalability of cellular uplink in the context of IoT networks, this paper develops a traffic-aware spatiotemporal mathematical model for IoT devices supported by cellular uplink connectivity. The developed model is based on stochastic geometry and queueing theory to account for the traffic requirement per IoT device, the different transmission strategies, and the mutual interference between the IoT devices. To this end, the developed model is utilized to characterize the extent to which cellular networks can accommodate IoT traffic as well as to assess and compare three different transmission strategies that incorporate a combination of transmission persistency, backoff, and power-ramping. The analysis and the results clearly illustrate the scalability problem imposed by IoT on cellular network and offer insights into effective scenarios for each transmission strategy.

  10. Tractable Stochastic Geometry Model for IoT Access in LTE Networks

    KAUST Repository

    Gharbieh, Mohammad; Elsawy, Hesham; Bader, Ahmed; Alouini, Mohamed-Slim

    2017-01-01

    The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request represents a major bottleneck to support IoT via LTE cellular networks. Accordingly, this paper develops a mathematical framework to model and study the random access channel (RACH) scalability to accommodate IoT traffic. The developed model is based on stochastic geometry and discrete time Markov chains (DTMC) to account for different access strategies and possible sources of inter-cell and intra-cell interferences. To this end, the developed model is utilized to assess and compare three different access strategies, which incorporate a combination of transmission persistency, back-off, and power ramping. The analysis and the results showcased herewith clearly illustrate the vulnerability of the random access procedure as the IoT intensity grows. Finally, the paper offers insights into effective scenarios for each transmission strategy in terms of IoT intensity and RACH detection thresholds.

  11. IoT’s Tiny Steps towards 5G: Telco’s Perspective

    Directory of Open Access Journals (Sweden)

    Enida Cero

    2017-10-01

    Full Text Available The numerous and diverse applications of the Internet of Things (IoT have the potential to change all areas of daily life of individuals, businesses, and society as a whole. The vision of a pervasive IoT spans a wide range of application domains and addresses the enabling technologies needed to meet the performance requirements of various IoT applications. In order to accomplish this vision, this paper aims to provide an analysis of literature in order to propose a new classification of IoT applications, specify and prioritize performance requirements of such IoT application classes, and give an insight into state-of-the-art technologies used to meet these requirements, all from telco’s perspective. A deep and comprehensive understanding of the scope and classification of IoT applications is an essential precondition for determining their performance requirements with the overall goal of defining the enabling technologies towards fifth generation (5G networks, while avoiding over-specification and high costs. Given the fact that this paper presents an overview of current research for the given topic, it also targets the research community and other stakeholders interested in this contemporary and attractive field for the purpose of recognizing research gaps and recommending new research directions.

  12. Tractable Stochastic Geometry Model for IoT Access in LTE Networks

    KAUST Repository

    Gharbieh, Mohammad

    2017-02-07

    The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request represents a major bottleneck to support IoT via LTE cellular networks. Accordingly, this paper develops a mathematical framework to model and study the random access channel (RACH) scalability to accommodate IoT traffic. The developed model is based on stochastic geometry and discrete time Markov chains (DTMC) to account for different access strategies and possible sources of inter-cell and intra-cell interferences. To this end, the developed model is utilized to assess and compare three different access strategies, which incorporate a combination of transmission persistency, back-off, and power ramping. The analysis and the results showcased herewith clearly illustrate the vulnerability of the random access procedure as the IoT intensity grows. Finally, the paper offers insights into effective scenarios for each transmission strategy in terms of IoT intensity and RACH detection thresholds.

  13. Research on offense and defense technology for iOS kernel security mechanism

    Science.gov (United States)

    Chu, Sijun; Wu, Hao

    2018-04-01

    iOS is a strong and widely used mobile device system. It's annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.

  14. The Io Volcano Observer (IVO) for NASA Discovery 2015

    Science.gov (United States)

    McEwen, Alfred S.; Turtle, Elizabeth P.; Thomas, Nicolas

    2015-04-01

    IVO was first proposed as a NASA Discovery mission in 2010, powered by the Advanced Sterling Radioisotope Generators (ASRGs) to provide a compact spacecraft that points and settles quickly. The 2015 IVO uses advanced lightweight solar arrays and a 1-dimensional pivot to achieve similar observing flexibility during a set of fast (~18 km/s) flybys of Io. The John Hopkins University Applied Physics Lab (APL) leads mission implementation, with heritage from MESSENGER, New Horizons, and the Van Allen Probes. All science objectives from the Io Observer New Frontiers concept recommended in the 2011 Decadal Survey are addressed by IVO. There are 5 instruments plus gravity science: Narrow- and wide-angle cameras (NAC and WAC), Dual fluxgate magnetometers (DMAG), a thermal mapper (TMAP, from DLR), and particle environment package for Io (PEPI) consisting of an ion and neutral mass spectrometer (INMS, from UBE) and a plasma ion analyzer (PIA, from IRF). A student collaboration hotspot mapper (HOTMAP) is an option. The NAC and TMAP are on a ± 90° pivot for off-nadir targeting during encounters and for distant monitoring. The DMAG sensors are on the end and middle of 3.8-m boom and collect data continuously. WAC and HOTMAP are mounted on the S/C nadir deck, and observe during ±20 minutes of each Io closest approach, except orbits I0 and I2. PEPI is mounted on the S/C structure with the INMS field of view in the ram direction when the S/C nadir deck points at Io, and the PIA and has a large (hemispheric) field of view that will often include the upstream direction. Gravity science requires pointing the high-gain antenna at Earth during the I0 and I2 encounters. IVO launches in 2021 and arrives at Jupiter in early 2026. A close Io flyby (I0) ~1.5 hrs. after Jupiter orbit insertion lowers the orbit period, followed by 8 additional encounters achieving the suite of science objectives. The highly elliptical orbit with perijove near Io is inclined >40° to Jupiter's orbital plane

  15. Sensor-Based Optimization Model for Air Quality Improvement in Home IoT

    Directory of Open Access Journals (Sweden)

    Jonghyuk Kim

    2018-03-01

    Full Text Available We introduce current home Internet of Things (IoT technology and present research on its various forms and applications in real life. In addition, we describe IoT marketing strategies as well as specific modeling techniques for improving air quality, a key home IoT service. To this end, we summarize the latest research on sensor-based home IoT, studies on indoor air quality, and technical studies on random data generation. In addition, we develop an air quality improvement model that can be readily applied to the market by acquiring initial analytical data and building infrastructures using spectrum/density analysis and the natural cubic spline method. Accordingly, we generate related data based on user behavioral values. We integrate the logic into the existing home IoT system to enable users to easily access the system through the Web or mobile applications. We expect that the present introduction of a practical marketing application method will contribute to enhancing the expansion of the home IoT market.

  16. Optimizing mission critical data dissemination in massive IoT networks

    KAUST Repository

    Farooq, Muhammad Junaid; Elsawy, Hesham; Zhu, Quanyan; Alouini, Mohamed-Slim

    2017-01-01

    Mission critical data dissemination in massive Internet of things (IoT) networks imposes constraints on the message transfer delay between devices. Due to low power and communication range of IoT devices, data is foreseen to be relayed over multiple

  17. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations.

    Science.gov (United States)

    Nieto, Ana; Rios, Ruben; Lopez, Javier

    2018-02-07

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases.

  18. Cassini-VIMS at Jupiter: Solar occultation measurements using Io

    Science.gov (United States)

    Formisano, V.; D'Aversa, E.; Bellucci, G.; Baines, K.H.; Bibring, J.-P.; Brown, R.H.; Buratti, B.J.; Capaccioni, F.; Cerroni, P.; Clark, R.N.; Coradini, A.; Cruikshank, D.P.; Drossart, P.; Jaumann, R.; Langevin, Y.; Matson, D.L.; McCord, T.B.; Mennella, V.; Nelson, R.M.; Nicholson, P.D.; Sicardy, B.; Sotin, Christophe; Chamberlain, M.C.; Hansen, G.; Hibbits, K.; Showalter, M.; Filacchione, G.

    2003-01-01

    We report unusual and somewhat unexpected observations of the jovian satellite Io, showing strong methane absorption bands. These observations were made by the Cassini VIMS experiment during the Jupiter flyby of December/January 2000/2001. The explanation is straightforward: Entering or exiting from Jupiter's shadow during an eclipse, Io is illuminated by solar light which has transited the atmosphere of Jupiter. This light, therefore becomes imprinted with the spectral signature of Jupiter's upper atmosphere, which includes strong atmospheric methane absorption bands. Intercepting solar light refracted by the jovian atmosphere, Io essentially becomes a "miffor" for solar occultation events of Jupiter. The thickness of the layer where refracted solar light is observed is so large (more than 3000 km at Io's orbit), that we can foresee a nearly continuous multi-year period of similar events at Saturn, utilizing the large and bright ring system. During Cassini's 4-year nominal mission, this probing tecnique should reveal information of Saturn's atmosphere over a large range of southern latitudes and times. ?? 2003 Elsevier Inc. All rights reserved.

  19. A Network Coverage Information-Based Sensor Registry System for IoT Environments.

    Science.gov (United States)

    Jung, Hyunjun; Jeong, Dongwon; Lee, Sukhoon; On, Byung-Won; Baik, Doo-Kwon

    2016-07-25

    The Internet of Things (IoT) is expected to provide better services through the interaction of physical objects via the Internet. However, its limitations cause an interoperability problem when the sensed data are exchanged between the sensor nodes in wireless sensor networks (WSNs), which constitute the core infrastructure of the IoT. To address this problem, a Sensor Registry System (SRS) is used. By using a SRS, the information of the heterogeneous sensed data remains pure. If users move along a road, their mobile devices predict their next positions and obtain the sensed data for that position from the SRS. If the WSNs in the location in which the users move are unstable, the sensed data will be lost. Consider a situation where the user passes through dangerous areas. If the user's mobile device cannot receive information, they cannot be warned about the dangerous situation. To avoid this, two novel SRSs that use network coverage information have been proposed: one uses OpenSignal and the other uses the probabilistic distribution of the users accessing SRS. The empirical study showed that the proposed method can seamlessly provide services related to sensing data under any abnormal circumstance.

  20. Evidence of a global magma ocean in Io's interior.

    Science.gov (United States)

    Khurana, Krishan K; Jia, Xianzhe; Kivelson, Margaret G; Nimmo, Francis; Schubert, Gerald; Russell, Christopher T

    2011-06-03

    Extensive volcanism and high-temperature lavas hint at a global magma reservoir in Io, but no direct evidence has been available. We exploited Jupiter's rotating magnetic field as a sounding signal and show that the magnetometer data collected by the Galileo spacecraft near Io provide evidence of electromagnetic induction from a global conducting layer. We demonstrate that a completely solid mantle provides insufficient response to explain the magnetometer observations, but a global subsurface magma layer with a thickness of over 50 kilometers and a rock melt fraction of 20% or more is fully consistent with the observations. We also place a stronger upper limit of about 110 nanoteslas (surface equatorial field) on the dynamo dipolar field generated inside Io.

  1. BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs

    OpenAIRE

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-01-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide smart services with or without human intervention. While leveraging the large scale IoT based applications like Smart Gird or Smart Cities, IoTs also incur more concerns on privacy and security. Among the top security challenges that IoTs face, access authorization is critical in resource sharing and information protection. One of the weaknesses in today's access control (AC) is ...

  2. Io's UV-V Eclipse Emission: Implications for Pele-type Plumes

    Science.gov (United States)

    Moore, C. H.; Goldstein, D. B.; Varghese, P. L.; Trafton, L. M.

    2010-03-01

    Simulations of Io's NUV-V emission in eclipse show that S2-rich giant plumes' S2 concentrations and activity levels effect the absolute brightness and the east/west intensity ratio across Io allowing for plume activity to be determined from observed spectra.

  3. Towards Blockchain-based Auditable Storage and Sharing of IoT Data

    OpenAIRE

    Shafagh , Hossein; Hithnawi , Anwar; Duquennoy , Simon

    2017-01-01

    International audience; Today the cloud plays a central role in storing, processing , and distributing data. Despite contributing to the rapid development of various applications, including the IoT, the current centralized storage architecture has led into a myriad of isolated data silos and is preventing the full potential of holistic data-driven analytics for IoT data. In this abstract, we advocate a data-centric design for IoT with focus on resilience, sharing, and auditable protection of ...

  4. Proposed Embedded Security Framework for Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Babar, Sachin D.; Stango, Antonietta; Prasad, Neeli R.

    2011-01-01

    IoT is going to be an established part of life by extending the communication and networking anytime, anywhere. Security requirements for IoT will certainly underline the importance of properly formulated, implemented, and enforced security policies throughout their life-cycle. This paper gives...

  5. IoT-Based Smart Garbage System for Efficient Food Waste Management

    Directory of Open Access Journals (Sweden)

    Insung Hong

    2014-01-01

    Full Text Available Owing to a paradigm shift toward Internet of Things (IoT, researches into IoT services have been conducted in a wide range of fields. As a major application field of IoT, waste management has become one such issue. The absence of efficient waste management has caused serious environmental problems and cost issues. Therefore, in this paper, an IoT-based smart garbage system (SGS is proposed to reduce the amount of food waste. In an SGS, battery-based smart garbage bins (SGBs exchange information with each other using wireless mesh networks, and a router and server collect and analyze the information for service provisioning. Furthermore, the SGS includes various IoT techniques considering user convenience and increases the battery lifetime through two types of energy-efficient operations of the SGBs: stand-alone operation and cooperation-based operation. The proposed SGS had been operated as a pilot project in Gangnam district, Seoul, Republic of Korea, for a one-year period. The experiment showed that the average amount of food waste could be reduced by 33%.

  6. IoT-based smart garbage system for efficient food waste management.

    Science.gov (United States)

    Hong, Insung; Park, Sunghoi; Lee, Beomseok; Lee, Jaekeun; Jeong, Daebeom; Park, Sehyun

    2014-01-01

    Owing to a paradigm shift toward Internet of Things (IoT), researches into IoT services have been conducted in a wide range of fields. As a major application field of IoT, waste management has become one such issue. The absence of efficient waste management has caused serious environmental problems and cost issues. Therefore, in this paper, an IoT-based smart garbage system (SGS) is proposed to reduce the amount of food waste. In an SGS, battery-based smart garbage bins (SGBs) exchange information with each other using wireless mesh networks, and a router and server collect and analyze the information for service provisioning. Furthermore, the SGS includes various IoT techniques considering user convenience and increases the battery lifetime through two types of energy-efficient operations of the SGBs: stand-alone operation and cooperation-based operation. The proposed SGS had been operated as a pilot project in Gangnam district, Seoul, Republic of Korea, for a one-year period. The experiment showed that the average amount of food waste could be reduced by 33%.

  7. Understanding I/O workload characteristics of a Peta-scale storage system

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Youngjae [ORNL; Gunasekaran, Raghul [ORNL

    2015-01-01

    Understanding workload characteristics is critical for optimizing and improving the performance of current systems and software, and architecting new storage systems based on observed workload patterns. In this paper, we characterize the I/O workloads of scientific applications of one of the world s fastest high performance computing (HPC) storage cluster, Spider, at the Oak Ridge Leadership Computing Facility (OLCF). OLCF flagship petascale simulation platform, Titan, and other large HPC clusters, in total over 250 thousands compute cores, depend on Spider for their I/O needs. We characterize the system utilization, the demands of reads and writes, idle time, storage space utilization, and the distribution of read requests to write requests for the Peta-scale Storage Systems. From this study, we develop synthesized workloads, and we show that the read and write I/O bandwidth usage as well as the inter-arrival time of requests can be modeled as a Pareto distribution. We also study the I/O load imbalance problems using I/O performance data collected from the Spider storage system.

  8. IoT-Based Smart Garbage System for Efficient Food Waste Management

    Science.gov (United States)

    Lee, Jaekeun

    2014-01-01

    Owing to a paradigm shift toward Internet of Things (IoT), researches into IoT services have been conducted in a wide range of fields. As a major application field of IoT, waste management has become one such issue. The absence of efficient waste management has caused serious environmental problems and cost issues. Therefore, in this paper, an IoT-based smart garbage system (SGS) is proposed to reduce the amount of food waste. In an SGS, battery-based smart garbage bins (SGBs) exchange information with each other using wireless mesh networks, and a router and server collect and analyze the information for service provisioning. Furthermore, the SGS includes various IoT techniques considering user convenience and increases the battery lifetime through two types of energy-efficient operations of the SGBs: stand-alone operation and cooperation-based operation. The proposed SGS had been operated as a pilot project in Gangnam district, Seoul, Republic of Korea, for a one-year period. The experiment showed that the average amount of food waste could be reduced by 33%. PMID:25258730

  9. Towards IoT platforms’ integration : Semantic Translations between W3C SSN and ETSI SAREF

    NARCIS (Netherlands)

    Moreira, João Luiz; Daniele, L.M.; Ferreira Pires, Luis; van Sinderen, Marten J.; Wasielewska, Katarzyna; Szmeja, Pawel; Pawlowski, Wieslaw; Ganzha, Maria; Paprzycki, Marcin

    2017-01-01

    Several IoT ontologies have been developed lately to improve the semantic interoperability of IoT solutions. The most popular of these ontologies, the W3C Semantic Sensor Network (SSN), is considered an ontological foundation for diverse IoT initiatives, particularly OpenIoT. With characteristics

  10. Realizing IoT service's policy privacy over publish/subscribe-based middleware.

    Science.gov (United States)

    Duan, Li; Zhang, Yang; Chen, Shiping; Wang, Shiyao; Cheng, Bo; Chen, Junliang

    2016-01-01

    The publish/subscribe paradigm makes IoT service collaborations more scalable and flexible, due to the space, time and control decoupling of event producers and consumers. Thus, the paradigm can be used to establish large-scale IoT service communication infrastructures such as Supervisory Control and Data Acquisition systems. However, preserving IoT service's policy privacy is difficult in this paradigm, because a classical publisher has little control of its own event after being published; and a subscriber has to accept all the events from the subscribed event type with no choice. Few existing publish/subscribe middleware have built-in mechanisms to address the above issues. In this paper, we present a novel access control framework, which is capable of preserving IoT service's policy privacy. In particular, we adopt the publish/subscribe paradigm as the IoT service communication infrastructure to facilitate the protection of IoT services policy privacy. The key idea in our policy-privacy solution is using a two-layer cooperating method to match bi-directional privacy control requirements: (a) data layer for protecting IoT events; and (b) application layer for preserving the privacy of service policy. Furthermore, the anonymous-set-based principle is adopted to realize the functionalities of the framework, including policy embedding and policy encoding as well as policy matching. Our security analysis shows that the policy privacy framework is Chosen-Plaintext Attack secure. We extend the open source Apache ActiveMQ broker by building into a policy-based authorization mechanism to enforce the privacy policy. The performance evaluation results indicate that our approach is scalable with reasonable overheads.

  11. A Selective Group Authentication Scheme for IoT-Based Medical Information System.

    Science.gov (United States)

    Park, YoHan; Park, YoungHo

    2017-04-01

    The technology of IoT combined with medical systems is expected to support advanced medical services. However, unsolved security problems, such as misuse of medical devices, illegal access to the medical server and so on, make IoT-based medical systems not be applied widely. In addition, users have a high burden of computation to access Things for the explosive growth of IoT devices. Because medical information is critical and important, but users have a restricted computing power, IoT-based medical systems are required to provide secure and efficient authentication for users. In this paper, we propose a selective group authentication scheme using Shamir's threshold technique. The property of selectivity gives the right of choice to users to form a group which consists of things users select and access. And users can get an access authority for those Things at a time. Thus, our scheme provides an efficient user authentication for multiple Things and conditional access authority for safe IoT-based medical information system. To the best of our knowledge, our proposed scheme is the first in which selectivity is combined with group authentication in IoT environments.

  12. Development of eStudent iOS mobile application

    Directory of Open Access Journals (Sweden)

    Mladjan Antic

    2013-01-01

    Full Text Available Abstract— iOS is the Apple mobile operating system, for Apple mobile devices. Initially developed for iPhone, and later for iPod Touch, iPad, AppleTV. The Metropolitan University has a Web application titled eStudent, which enables students by Web to get information about their marks for all subjects, their financies, exam scheduling, professors and assistents, and send exam registration and feedback about teaching, etc. This paper explains the development of the mobile application eStudent on the iOS platform. This application enables students whenever they want, by using their iPhone mobile phone, to get access to the information from the eStudent Web application, and to present it on their iPhone User Interface (UI. This paper explains in details software requirements analysis, system architecture, system modelling, and UI of the eStudent iOS mobile application.

  13. An IoT-enabled supply chain integration framework : empirical case studies

    OpenAIRE

    Wakenshaw, Susan Y. L.; Maple, Carsten; Chen, Daqiang; Micillo, Rosario

    2017-01-01

    Supply chain integration is crucial for supply chain performance, particularly in industry 4.0. With the proliferation of Internet of Things (IoT) and the use of cyber-physical systems, supply chain integration needs to be greatly enhanced. In this paper, we explore supply integration (process and application) in the supply chain network enabled by IoT. Using the case study method, we investigate technical and business applications of IoT in supply chains and how it can interface with the pro...

  14. A neural network and IoT-based scheme for performance assessment in Internet of Robotic Things

    OpenAIRE

    Razafimandimby , Cristanel; Loscri , Valeria; Vegni , Anna Maria

    2016-01-01

    International audience; Internet of Robotic Things (IoRT) is a new concept introduced for the first time by ABI Research. Unlike the Internet of Things (IoT), IoRT provides an active sensorization and is considered as the new evolution of IoT. This new concept will bring new opportunities and challenges, while providing new business ideas for IoT and robotics’ entrepreneurs. In this paper, we will focus particularly on two issues: (i) connectivity maintenance among multiple IoRT robots, and (...

  15. Uncovering the Images and Meanings of International Organizations (IOs) in Higher Education Research

    Science.gov (United States)

    Shahjahan, Riyad A.; Madden, Meggan

    2015-01-01

    Employing Stuart Hall's concept of representation, we examine how international organizations (IOs) are presented in the higher education literature. This paper examines how IOs, such as the World Bank, OECD, and UNESCO, are conceptualized and represented by higher education researchers. We focus on three main representations of IOs in the higher…

  16. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    Directory of Open Access Journals (Sweden)

    Ana Nieto

    2018-02-01

    Full Text Available IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases.

  17. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    Science.gov (United States)

    Lopez, Javier

    2018-01-01

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases. PMID:29414864

  18. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.

    Science.gov (United States)

    Ali, Bako; Awad, Ali Ismail

    2018-03-08

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.

  19. In-Network Data Processing in Software-Defined IoT with a Programmable Data Plane

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2018-01-01

    Full Text Available Making an SDN data plane flexible enough to satisfy the various requirements of heterogeneous IoT applications is very desirable in terms of software-defined IoT (SD-IoT networking. Network devices with a programmable data plane provide an ability to dynamically add new packet- and data-processing procedures to IoT applications. The previously proposed solutions for the addition of the programmability feature to the SDN data plane provide extensibility for the packet-forwarding operations of new protocols, but IoT applications need a more flexible programmability for in-network data-processing operations (e.g., the sensing-data aggregation from thousands of sensor nodes. Moreover, some IoT models such as OMG DDS, oneM2M, and Eclipse SCADA use the publish-subscribe model that is difficult to represent using the operations of the existing message-centric data-plane models. We introduce a new in-network data-processing scheme for the SD-IoT data plane that defines an event-driven data-processing model that can express a variety of in-network data-processing cases in the SD-IoT environment. Also, the proposed model comprises a language for the programming of the data-processing procedures, while a flexible data-plane structure that can install and execute the programs at runtime is additionally presented. We demonstrate the flexibility of the proposed scheme by using sample programs in a number of example SD-IoT cases.

  20. IEEE 802.11ah: A Technology to Face the IoT Challenge.

    Science.gov (United States)

    Baños-Gonzalez, Victor; Afaqui, M Shahwaiz; Lopez-Aguilera, Elena; Garcia-Villegas, Eduard

    2016-11-22

    Since the conception of the Internet of things (IoT), a large number of promising applications and technologies have been developed, which will change different aspects in our daily life. This paper explores the key characteristics of the forthcoming IEEE 802.11ah specification. This future IEEE 802.11 standard aims to amend the IEEE 802.11 legacy specification to support IoT requirements. We present a thorough evaluation of the foregoing amendment in comparison to the most notable IEEE 802.11 standards. In addition, we expose the capabilities of future IEEE 802.11ah in supporting different IoT applications. Also, we provide a brief overview of the technology contenders that are competing to cover the IoT communications framework. Numerical results are presented showing how the future IEEE 802.11ah specification offers the features required by IoT communications, thus putting forward IEEE 802.11ah as a technology to cater the needs of the Internet of Things paradigm.

  1. IoT: Tecnologías, usos, tendencias y desarrollo futuro

    OpenAIRE

    Bliznakoff del Valle, David J.

    2015-01-01

    Trabajo de investigación sobre el estado del IoT en el año 2014, previsiones de crecimiento y tecnologías futuras. Treball de recerca sobre l'estat del IoT l'any 2014, previsions de creixement i tecnologies futures. Master thesis for the Telecommunication Technologies program.

  2. Proposals For The Secure Use Of IoT Technology In The Car Industry - Proposals on how to use IoT technology in the car industry but avoid its negative security consequences

    OpenAIRE

    Ramquist, Robin

    2016-01-01

    The Internet Of Things (IoT) is a hotter topic than ever. As devices and our daily life get connected to the IoT, we also put ourselves at risk. IoT security issues get reported on a regular basis, and experts are concerned that we will lose control of the situation. In this thesis, the IoT usage in the car industry is investigated and analyzed, and proposals for security issue mitigations are presented based on existing research. To do this work, existing research is being looked at and inte...

  3. IoT Service Clustering for Dynamic Service Matchmaking.

    Science.gov (United States)

    Zhao, Shuai; Yu, Le; Cheng, Bo; Chen, Junliang

    2017-07-27

    As the adoption of service-oriented paradigms in the IoT (Internet of Things) environment, real-world devices will open their capabilities through service interfaces, which enable other functional entities to interact with them. In an IoT application, it is indispensable to find suitable services for satisfying users' requirements or replacing the unavailable services. However, from the perspective of performance, it is inappropriate to find desired services from the service repository online directly. Instead, clustering services offline according to their similarity and matchmaking or discovering service online in limited clusters is necessary. This paper proposes a multidimensional model-based approach to measure the similarity between IoT services. Then, density-peaks-based clustering is employed to gather similar services together according to the result of similarity measurement. Based on the service clustering, the algorithms of dynamic service matchmaking, discovery, and replacement will be performed efficiently. Evaluating experiments are conducted to validate the performance of proposed approaches, and the results are promising.

  4. Collaborative Working Architecture for IoT-Based Applications.

    Science.gov (United States)

    Mora, Higinio; Signes-Pont, María Teresa; Gil, David; Johnsson, Magnus

    2018-05-23

    The new sensing applications need enhanced computing capabilities to handle the requirements of complex and huge data processing. The Internet of Things (IoT) concept brings processing and communication features to devices. In addition, the Cloud Computing paradigm provides resources and infrastructures for performing the computations and outsourcing the work from the IoT devices. This scenario opens new opportunities for designing advanced IoT-based applications, however, there is still much research to be done to properly gear all the systems for working together. This work proposes a collaborative model and an architecture to take advantage of the available computing resources. The resulting architecture involves a novel network design with different levels which combines sensing and processing capabilities based on the Mobile Cloud Computing (MCC) paradigm. An experiment is included to demonstrate that this approach can be used in diverse real applications. The results show the flexibility of the architecture to perform complex computational tasks of advanced applications.

  5. First Mile Challenges for Large-Scale IoT

    KAUST Repository

    Bader, Ahmed

    2017-03-16

    The Internet of Things is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the sheer scale of spatial traffic intensity that must be accommodated, primarily in the uplink direction. To that end, cellular networks are indeed a strong first mile candidate to accommodate the data tsunami to be generated by the IoT. However, IoT devices are required in the cellular paradigm to undergo random access procedures as a precursor to resource allocation. Such procedures impose a major bottleneck that hinders cellular networks\\' ability to support large-scale IoT. In this article, we shed light on the random access dilemma and present a case study based on experimental data as well as system-level simulations. Accordingly, a case is built for the latent need to revisit random access procedures. A call for action is motivated by listing a few potential remedies and recommendations.

  6. I/O routing in a multidimensional torus network

    Science.gov (United States)

    Chen, Dong; Eisley, Noel A.; Heidelberger, Philip

    2018-04-24

    A method, system and computer program product are disclosed for routing data packet in a computing system comprising a multidimensional torus compute node network including a multitude of compute nodes, and an I/O node network including a plurality of I/O nodes. In one embodiment, the method comprises assigning to each of the data packets a destination address identifying one of the compute nodes; providing each of the data packets with a toio value; routing the data packets through the compute node network to the destination addresses of the data packets; and when each of the data packets reaches the destination address assigned to said each data packet, routing said each data packet to one of the I/O nodes if the toio value of said each data packet is a specified value. In one embodiment, each of the data packets is also provided with an ioreturn value used to route the data packets through the compute node network.

  7. A federated capability-based access control mechanism for internet of things (IoTs)

    Science.gov (United States)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  8. Minimizing End-to-End Interference in I/O Stacks Spanning Shared Multi-Level Buffer Caches

    Science.gov (United States)

    Patrick, Christina M.

    2011-01-01

    This thesis presents an end-to-end interference minimizing uniquely designed high performance I/O stack that spans multi-level shared buffer cache hierarchies accessing shared I/O servers to deliver a seamless high performance I/O stack. In this thesis, I show that I can build a superior I/O stack which minimizes the inter-application interference…

  9. Discovery of gaseous S2 in Io's Pele plume.

    Science.gov (United States)

    Spencer, J R; Jessup, K L; McGrath, M A; Ballester, G E; Yelle, R

    2000-05-19

    Spectroscopy of Io's Pele plume against Jupiter by the Hubble Space Telescope in October 1999 revealed absorption due to S2 gas, with a column density of 1.0 +/- 0.2 x 10(16) per square centimeter, and probably also SO(2) gas with a column density of 7 +/- 3 x 10(16) per square centimeter. This SO2/S2 ratio (3 to 12) is expected from equilibration with silicate magmas near the quartz-fayalite-magnetite or wüstite-magnetite buffers. Condensed S3 and S4, probable coloring agents in Pele's red plume deposits, may form by polymerization of the S2, which is unstable to ultraviolet photolysis. Diffuse red deposits near other Io volcanoes suggest that venting and polymerization of S2 gas is a widespread feature of Io volcanism.

  10. Astronauts and IoT: Toward True Human-Autonomy Teaming

    Science.gov (United States)

    Vera, Alonso

    2016-01-01

    Advances in the area of Internet of Things (IoT) or Cyber-Physical Systems will have a significant impact on many areas of human activity and commercial/technological development. One application of importance to NASA is the need to make crews on deep space missions more independent from earth in both their routine activities and handling of unexpected events. IoT will allow increasingly intelligent systems to be aware of what humans are doing, what tools/resources they are using, and what help they might need in terms of procedure execution in tasks such as assembly, maintenance, repair, and perhaps even in more complex activities like medical interventions. This talk focuses on the convergence of research and technologies that will be needed to effect such intelligent systems based on IoT.

  11. DMIA: A MALWARE DETECTION SYSTEM ON IOS PLATFORM

    OpenAIRE

    Hongliang Liang; Yilun Xie; Yan Song

    2016-01-01

    iOS is a popular operating system on Apple’s smartphones, and recent security events have shown the possibility of stealing the users' privacy in iOS without being detected, such as XcodeGhost. So, we present the design and implementation of a malware vetting system, called DMIA. DMIA first collects runtime information of an app and then distinguish between malicious and normal apps by a novel machine learning model. We evaluated DMIA with 1000 apps from the official App Store. The results of...

  12. Two Word CAMAC I/O module

    International Nuclear Information System (INIS)

    Barker, L.L.

    1981-05-01

    This note describes the 2 Word I/O subsystem and details its operating characteristics. SLAC drawings in the 926-306 series support this device and should be referenced for construction and connection details

  13. Perception Management: A Core IO Capability

    National Research Council Canada - National Science Library

    Zaman, Khyber

    2007-01-01

    This thesis postulates that in today's media environment, with adversaries skillfully using propaganda to skirt nations' resolve, Perception Management is key to military success and should be an Information Operations (IO) Core Capability...

  14. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

    Directory of Open Access Journals (Sweden)

    Bako Ali

    2018-03-01

    Full Text Available The Internet of Things (IoT is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.

  15. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

    Science.gov (United States)

    2018-01-01

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes. PMID:29518023

  16. High-Throughput and Low-Latency Network Communication with NetIO

    Science.gov (United States)

    Schumacher, Jörn; Plessl, Christian; Vandelli, Wainer

    2017-10-01

    HPC network technologies like Infiniband, TrueScale or OmniPath provide low- latency and high-throughput communication between hosts, which makes them attractive options for data-acquisition systems in large-scale high-energy physics experiments. Like HPC networks, DAQ networks are local and include a well specified number of systems. Unfortunately traditional network communication APIs for HPC clusters like MPI or PGAS exclusively target the HPC community and are not suited well for DAQ applications. It is possible to build distributed DAQ applications using low-level system APIs like Infiniband Verbs, but it requires a non-negligible effort and expert knowledge. At the same time, message services like ZeroMQ have gained popularity in the HEP community. They make it possible to build distributed applications with a high-level approach and provide good performance. Unfortunately, their usage usually limits developers to TCP/IP- based networks. While it is possible to operate a TCP/IP stack on top of Infiniband and OmniPath, this approach may not be very efficient compared to a direct use of native APIs. NetIO is a simple, novel asynchronous message service that can operate on Ethernet, Infiniband and similar network fabrics. In this paper the design and implementation of NetIO is presented and described, and its use is evaluated in comparison to other approaches. NetIO supports different high-level programming models and typical workloads of HEP applications. The ATLAS FELIX project [1] successfully uses NetIO as its central communication platform. The architecture of NetIO is described in this paper, including the user-level API and the internal data-flow design. The paper includes a performance evaluation of NetIO including throughput and latency measurements. The performance is compared against the state-of-the- art ZeroMQ message service. Performance measurements are performed in a lab environment with Ethernet and FDR Infiniband networks.

  17. Service and multimedia data transmission in IoT networks using hybrid communication devices

    Directory of Open Access Journals (Sweden)

    Saveliev Anton

    2017-01-01

    Full Text Available Employment of various protocols and technologies in IoT networks leads to the lack of module unification and increase in incompatible technical solutions. Modern IoT networks are not designed for streaming audio/video data, so their application field is limited. Also, modern IoT networks should have connection areas for devices transferring data to the Internet, and consider hardware and software specific characteristics of these devices. We offer one-size-fits-all solution for organization of IoT network, using hybrid modules. These devices provide flexibility, scalability, energy efficiency and multi-use of network for the transfer of various types of data. This approach takes into account software and hardware features of the devices used for data transmission in IoT networks, which helps to automate connecting the modules chosen by user.

  18. Surface changes on Io during the Galileo mission

    Science.gov (United States)

    Geissler, P.; McEwen, A.; Phillips, C.; Keszthelyi, L.; Spencer, J.

    2004-01-01

    A careful survey of Galileo SSI global monitoring images revealed more than 80 apparent surface changes that took place on Io during the 5 year period of observation, ranging from giant plume deposits to subtle changes in the color or albedo of Patera surfaces. Explosive volcanic activity was discovered at four previously unrecognized centers: an unnamed patera to the south of Karei that produced a Pele-sized red ring, a patera to the west of Zal that produced a small circular bright deposit, a large orange ring detected near the north pole of Io, and a small bright ring near Io's south pole. Only a handful of Io's many active volcanoes produced large scale explosive eruptions, and several of these erupted repeatedly, leaving at least 83% of Io's surface unaltered throughout the Galileo mission. Most of the hot spots detected from SSI, NIMS and ground-based thermal observations caused no noticeable surface changes greater than 10 km in extent over the five year period. Surface changes were found at every location where active plumes were identified, including Acala which was never seen in sunlight and was only detected through auroral emissions during eclipse. Two types of plumes are distinguished on the basis of the size and color of their deposits, confirming post-Voyager suggestions by McEwen and Soderblom [Icarus 55 (1983) 191]. Smaller plumes produce near-circular rings typically 150-200 km in radius that are white or yellow in color unless contaminated with silicates, and frequently coat their surroundings with frosts of fine-grained SO2. The larger plumes are much less numerous, limited to a half dozen examples, and produce oval, orange or red, sulfur-rich rings with maximum radii in the north-south direction that are typically in the range from 500 to 550 km. Both types of plumes can be either episodic or quasi-continuous over a five year period. Repeated eruptions of the smaller SO2-rich plumes likely contribute significantly to Io's resurfacing rate

  19. Volcanic eruptions on Io: Heat flow, resurfacing, and lava composition

    Science.gov (United States)

    Blaney, Diana L.; Johnson, Torrence V.; Matson, Dennis L.; Veeder, Glenn J.

    1995-01-01

    We model an infrared outburst on Io as being due to a large, erupting lava flow which increased its area at a rate of 1.5 x 10(exp 5)/sq m and cooled from 1225 to 555 K over the 2.583-hr period of observation. The inferred effusion rate of 3 x 10(exp 5) cu m/sec for this eruption is very high, but is not unprece- dented on the Earth and is similar to the high eruption rates suggested for early lunar volcanism. Eruptions occur approxi- mately 6% of the time on Io. These eruptions provide ample resurfacing to explain Io's lack of impact craters. We suggest that the large total radiometric heat flow, 10(exp 14) W, and the size and temperature distribution of the thermal anomalies (McEwen et al. 1992; Veeder et al. 1994) can be accounted for by a series of silicate lava flows in various stages of cooling. We propose that the whole suite of Io's currently observed thermal anomalies was produced by multiple, high-eruptive-rate silicate flows within the past century.

  20. Exploiting Efficient Transpacking for One-Sided Communication and MPI-IO

    Science.gov (United States)

    Mir, Faisal Ghias; Träff, Jesper Larsson

    Based on a construction of socalled input-output datatypes that define a mapping between non-consecutive input and output buffers, we outline an efficient method for copying of structured data. We term this operation transpacking, and show how transpacking can be applied for the MPI implementation of one-sided communication and MPI-IO. For one-sided communication via shared-memory, we demonstrate the expected performance improvements by up to a factor of two. For individual MPI-IO, the time to read or write from file dominates the overall time, but even here efficient transpacking can in some scenarios reduce file I/O time considerably. The reported results have been achieved on a single NEC SX-8 vector node.

  1. Galileo SSI Observations of Io During Orbits C30 I33

    Science.gov (United States)

    Keszthelyi, L.; Turtle, E.; McEwen, A.; Simonelli, D.; Geissler, P.; Williams, D.; Milazzo, M.; Radebaugh, J.; Jaeger, W.; Klaasen, K. P.

    2002-01-01

    New Galileo SSI imaging of Io from orbits C30 I33 will be presented. The aging Galileo spacecraft continues to produce spectacular new results, including the tallest volcanic plume yet found on Io. Additional information is contained in the original extended abstract.

  2. The Role of Physical Layer Security in IoT: A Novel Perspective

    Directory of Open Access Journals (Sweden)

    Tommaso Pecorella

    2016-08-01

    Full Text Available This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem. In a smart environment, each IoT device has limited resources and is often battery operated with limited capabilities (e.g., no keyboard. As a consequence, network security must be carefully analyzed in order to prevent security and privacy issues. In this paper, we will analyze the IoT threats, we will propose a security framework for the device initialization and we will show how physical layer security can effectively boost the security of IoT systems.

  3. Long Term Monitoring of the Io Plasma Torus During the Galileo Encounter

    Science.gov (United States)

    Brown, Michael E.

    2002-01-01

    In the fall of 1999, the Galileo spacecraft made four passes into the Io plasma torus, obtaining the best in situ measurements ever of the particle and field environment in this densest region of the Jovian magnetosphere. Supporting observations from the ground are vital for understanding the global and temporal context of the in situ observations. We conducted a three-month-long Io plasma torus monitoring campaign centered on the time of the Galileo plasma torus passes to support this aspect of the Galileo mission. The almost-daily plasma density and temperature measurements obtained from our campaign allow the much more sparse but also much more detailed Galileo data to be used to address the issues of the structure of the Io plasma torus, the stability mechanism of the Jovian magnetosphere, the transport of material from the source region near Io, and the nature and source of persistent longitudinal variations. Combining the ground-based monitoring data with the detailed in situ data offers the only possibility for answering some of the most fundamental questions about the nature of the Io plasma torus.

  4. Active Storage with Analytics Capabilities and I/O Runtime System for Petascale Systems

    Energy Technology Data Exchange (ETDEWEB)

    Choudhary, Alok [Northwestern Univ., Evanston, IL (United States)

    2015-03-18

    Computational scientists must understand results from experimental, observational and computational simulation generated data to gain insights and perform knowledge discovery. As systems approach the petascale range, problems that were unimaginable a few years ago are within reach. With the increasing volume and complexity of data produced by ultra-scale simulations and high-throughput experiments, understanding the science is largely hampered by the lack of comprehensive I/O, storage, acceleration of data manipulation, analysis, and mining tools. Scientists require techniques, tools and infrastructure to facilitate better understanding of their data, in particular the ability to effectively perform complex data analysis, statistical analysis and knowledge discovery. The goal of this work is to enable more effective analysis of scientific datasets through the integration of enhancements in the I/O stack, from active storage support at the file system layer to MPI-IO and high-level I/O library layers. We propose to provide software components to accelerate data analytics, mining, I/O, and knowledge discovery for large-scale scientific applications, thereby increasing productivity of both scientists and the systems. Our approaches include 1) design the interfaces in high-level I/O libraries, such as parallel netCDF, for applications to activate data mining operations at the lower I/O layers; 2) Enhance MPI-IO runtime systems to incorporate the functionality developed as a part of the runtime system design; 3) Develop parallel data mining programs as part of runtime library for server-side file system in PVFS file system; and 4) Prototype an active storage cluster, which will utilize multicore CPUs, GPUs, and FPGAs to carry out the data mining workload.

  5. Landform Degradation and Slope Processes on Io: The Galileo View

    Science.gov (United States)

    Moore, Jeffrey M.; Sullivan, Robert J.; Chuang, Frank C.; Head, James W., III; McEwen, Alfred S.; Milazzo, Moses P.; Nixon, Brian E.; Pappalardo, Robert T.; Schenk, Paul M.; Turtle, Elizabeth P.; hide

    2001-01-01

    The Galileo mission has revealed remarkable evidence of mass movement and landform degradation on Io. We recognize four major slope types observed on a number of intermediate resolution (250 m/pixel) images and several additional textures on very high resolution (10 m/pixel) images. Slopes and scarps on Io often show evidence of erosion, seen in the simplest form as alcove-carving slumps and slides at all scales. Many of the mass movement deposits on Io are probably mostly the consequence of block release and brittle slope failure. Sputtering plays no significant role. Sapping as envisioned by McCauley et al. remains viable. We speculate that alcove-lined canyons seen in one observation and lobed deposits seen along the bases of scarps in several locations may reflect the plastic deformation and 'glacial' flow of interstitial volatiles (e.g., SO2) heated by locally high geothermal energy to mobilize the volatile. The appearance of some slopes and near-slope surface textures seen in very high resolution images is consistent with erosion from sublimation-degradation. However, a suitable volatile (e.g., H2S) that can sublimate fast enough to alter Io's youthful surface has not been identified. Disaggregation from chemical decomposition of solid S2O and other polysulfur oxides may conceivably operate on Io. This mechanism could degrade landforms in a manner that resembles degradation from sublimation, and at a rate that can compete with resurfacing.

  6. Benefits of Parallel I/O in Ab Initio Nuclear Physics Calculations

    International Nuclear Information System (INIS)

    Laghave, Nikhil; Sosonkina, Masha; Maris, Pieter; Vary, James P.

    2009-01-01

    Many modern scientific applications rely on highly parallel calculations, which scale to 10's of thousands processors. However, most applications do not concentrate on parallelizing input/output operations. In particular, sequential I/O has been identified as a bottleneck for the highly scalable MFDn (Many Fermion Dynamics for nuclear structure) code performing ab initio nuclear structure calculations. In this paper, we develop interfaces and parallel I/O procedures to use a well-known parallel I/O library in MFDn. As a result, we gain efficient input/output of large datasets along with their portability and ease of use in the downstream processing.

  7. Io After Galileo A New View of Jupiter’s Volcanic Moon

    CERN Document Server

    Lopes, Rosaly M. C

    2007-01-01

    Jupiter’s moon Io is the Solar System’s most exotic satellite. Active volcanism on Io was discovered from observations by the Voyager 1 spacecraft in 1979, confirming a possibility suggested from theoretical studies of Io’s orbit. Our knowledge of Io’s volcanism, composition, and space environment were significantly increased as a result of observations by the Galileo spacecraft from 1996 through 2001. The end of the Galileo mission in 2003 makes this an ideal time to summarize the new results in a book as no book has ever been written about Jupiter’s volcanic moon, Io.

  8. The PMIPv6-Based Group Binding Update for IoT Devices

    Directory of Open Access Journals (Sweden)

    Jianfeng Guan

    2016-01-01

    Full Text Available Internet of Things (IoT has been booming with rapid increase of the various wearable devices, vehicle embedded devices, and so on, and providing the effective mobility management for these IoT devices becomes a challenge due to the different application scenarios as well as the limited energy and bandwidth. Recently, lots of researchers have focused on this topic and proposed several solutions based on the combination of IoT features and traditional mobility management protocols, in which most of these schemes take the IoT devices as mobile networks and adopt the NEtwork MObility (NEMO and its variants to provide the mobility support. However, these solutions are in face of the heavy signaling cost problem. Since IoT devices are generally combined to realize the complex functions, these devices may have similar movement behaviors. Clearly analyzing these characters and using them in the mobility management will reduce the signaling cost and improve the scalability. Motivated by this, we propose a PMIPv6-based group binding update method. In particular, we describe its group creation procedure, analyze its impact on the mobility management, and derive its reduction ratio in terms of signaling cost. The final results show that the introduction of group binding update can remarkably reduce the signaling cost.

  9. Design for an IO block array in a tile-based FPGA

    International Nuclear Information System (INIS)

    Ding Guangxin; Chen Lingdou; Liu Zhongli

    2009-01-01

    A design for an IO block array in a tile-based FPGA is presented. Corresponding with the characteristics of the FPGA, each IO cell is composed of a signal path, local routing pool and configurable input/output buffers. Shared programmable registers in the signal path can be configured for the function of JTAG, without specific boundary scan registers/latches, saving layout area. The local routing pool increases the flexibility of routing and the routability of the whole FPGA. An auxiliary power supply is adopted to increase the performance of the IO buffers at different configured IO standards. The organization of the IO block array is described in an architecture description file, from which the array layout can be accomplished through use of an automated layout assembly tool. This design strategy facilitates the design of FPGAs with different capacities or architectures in an FPGA family series. The bond-out schemes of the same FPGA chip in different packages are also considered. The layout is based on SMIC 0.13 μm logic 1P8M salicide 1.2/2.5 V CMOS technology. Our performance is comparable with commercial SRAM-based FPGAs which use a similar process. (semiconductor integrated circuits)

  10. A Model of Socially Connected Web Objects for IoT Applications

    Directory of Open Access Journals (Sweden)

    Sajjad Ali

    2018-01-01

    Full Text Available The Internet of Things (IoT is evolving with the connected objects at an unprecedented rate, bringing about enormous opportunities for the future IoT applications as well as challenges. One of the major challenges is to handle the complexity generated by the interconnection of billions of objects. However, Social Internet of Things (SIoT, emerging from the conglomeration of IoT and social networks, has realized an efficient way to facilitate the development of complex future IoT applications. Nevertheless, to fully utilize the benefits of SIoT, a platform that can provide efficient services using social relations among heterogeneous objects is highly required. The web objects enabled IoT environment promotes SIoT features by enabling virtualization using virtual objects and supporting the modularity with microservices. To realize SIoT services, this article proposes an architecture that provides a foundation for the development of lightweight microservices based on socially connected web objects. To efficiently discover web objects and reduce the complexity of service provisioning processes, a social relationship model is presented. To realize the interoperable service operations, a semantic ontology model has been developed. Finally, to evaluate the proposed design, a prototype has been implemented based on a use case scenario.

  11. Small-World and Scale-Free Network Models for IoT Systems

    Directory of Open Access Journals (Sweden)

    Insoo Sohn

    2017-01-01

    Full Text Available It is expected that Internet of Things (IoT revolution will enable new solutions and business for consumers and entrepreneurs by connecting billions of physical world devices with varying capabilities. However, for successful realization of IoT, challenges such as heterogeneous connectivity, ubiquitous coverage, reduced network and device complexity, enhanced power savings, and enhanced resource management have to be solved. All these challenges are heavily impacted by the IoT network topology supported by massive number of connected devices. Small-world networks and scale-free networks are important complex network models with massive number of nodes and have been actively used to study the network topology of brain networks, social networks, and wireless networks. These models, also, have been applied to IoT networks to enhance synchronization, error tolerance, and more. However, due to interdisciplinary nature of the network science, with heavy emphasis on graph theory, it is not easy to study the various tools provided by complex network models. Therefore, in this paper, we attempt to introduce basic concepts of graph theory, including small-world networks and scale-free networks, and provide system models that can be easily implemented to be used as a powerful tool in solving various research problems related to IoT.

  12. Analysis of the frontier technology of agricultural IoT and its predication research

    Science.gov (United States)

    Han, Shuqing; Zhang, Jianhua; Zhu, Mengshuai; Wu, Jianzhai; Shen, Chen; Kong, Fantao

    2017-09-01

    Agricultural IoT (Internet of Things) develops rapidly. Nanotechnology, biotechnology and optoelectronic technology are successfully integrated into the agricultural sensor technology. Big data, cloud computing and artificial intelligence technology have also been successfully used in IoT. This paper carries out the research on integration of agricultural sensor technology, nanotechnology, biotechnology and optoelectronic technology and the application of big data, cloud computing and artificial intelligence technology in agricultural IoT. The advantages and development of the integration of nanotechnology, biotechnology and optoelectronic technology with agricultural sensor technology were discussed. The application of big data, cloud computing and artificial intelligence technology in IoT and their development trend were analysed.

  13. Designing the IoT sandbox

    NARCIS (Netherlands)

    Frens, Joep; Funk, Mathias; van Hout, Bastiaan; Le Blanc, Joep

    2018-01-01

    This pictorial describes the design and design process of the IoT Sandbox: a (scale model of a) smart home equipped with actuators and a modular interface that controls the interactive aspects of the smart home. This modular interface can 'grow" together with the house it controls whereby it offers

  14. Human centric security and privacy for the IoT using formal techniques

    OpenAIRE

    Kammueller, Florian

    2018-01-01

    In this paper, we summarize a new approach to make security and privacy issues in the Internet of Things (IoT) more transparent for vulnerable users. As a pilot project, we investigate monitoring of Alzheimer’s patients for a low-cost early warning system based on bio-markers supported with smart technologies. To provide trustworthy and secure IoT infrastructures, we employ formal methods and techniques that allow specification of IoT scenarios with human actors, refinement and analysis of at...

  15. Distributed service-based approach for sensor data fusion in IoT environments.

    Science.gov (United States)

    Rodríguez-Valenzuela, Sandra; Holgado-Terriza, Juan A; Gutiérrez-Guerrero, José M; Muros-Cobos, Jesús L

    2014-10-15

    The Internet of Things (IoT) enables the communication among smart objects promoting the pervasive presence around us of a variety of things or objects that are able to interact and cooperate jointly to reach common goals. IoT objects can obtain data from their context, such as the home, office, industry or body. These data can be combined to obtain new and more complex information applying data fusion processes. However, to apply data fusion algorithms in IoT environments, the full system must deal with distributed nodes, decentralized communication and support scalability and nodes dynamicity, among others restrictions. In this paper, a novel method to manage data acquisition and fusion based on a distributed service composition model is presented, improving the data treatment in IoT pervasive environments.

  16. AdiosStMan: Parallelizing Casacore Table Data System using Adaptive IO System

    Science.gov (United States)

    Wang, R.; Harris, C.; Wicenec, A.

    2016-07-01

    In this paper, we investigate the Casacore Table Data System (CTDS) used in the casacore and CASA libraries, and methods to parallelize it. CTDS provides a storage manager plugin mechanism for third-party developers to design and implement their own CTDS storage managers. Having this in mind, we looked into various storage backend techniques that can possibly enable parallel I/O for CTDS by implementing new storage managers. After carrying on benchmarks showing the excellent parallel I/O throughput of the Adaptive IO System (ADIOS), we implemented an ADIOS based parallel CTDS storage manager. We then applied the CASA MSTransform frequency split task to verify the ADIOS Storage Manager. We also ran a series of performance tests to examine the I/O throughput in a massively parallel scenario.

  17. Application of IoT concept on predictive maintenance of industrial equipment

    Directory of Open Access Journals (Sweden)

    Parpala Radu Constantin

    2017-01-01

    Full Text Available The Internet of Things (IoT concept describes an intelligent connectivity of smart devices using the internet network. Nowadays, companies try different approaches for predictive maintenance as a solution to reduce costs and the frequency of maintenance activities. The IoT platforms provide a good support for predictive maintenance as it can integrate information from different machines and manufacturing systems. The main drawback in integrating production system with IoT dedicated platforms is the communication framework, knowing that the main industrial communication protocols are incompatible with modern communication protocols implemented on IoT platforms. In this context, the present paper proposes a new and simple method for on-line monitoring and predictive maintenance of industrial equipment. This method has two features of connected manufacturing. One of these is process monitoring for constant quality assurance, the other one is condition monitoring in order to prevent unplanned downtimes. A case study is presented to demonstrate the feasibility of the proposed method.

  18. Optimized Energy Harvesting, Cluster-Head Selection and Channel Allocation for IoTs in Smart Cities

    Science.gov (United States)

    Aslam, Saleem; Hasan, Najam Ul; Jang, Ju Wook; Lee, Kyung-Geun

    2016-01-01

    This paper highlights three critical aspects of the internet of things (IoTs), namely (1) energy efficiency, (2) energy balancing and (3) quality of service (QoS) and presents three novel schemes for addressing these aspects. For energy efficiency, a novel radio frequency (RF) energy-harvesting scheme is presented in which each IoT device is associated with the best possible RF source in order to maximize the overall energy that the IoT devices harvest. For energy balancing, the IoT devices in close proximity are clustered together and then an IoT device with the highest residual energy is selected as a cluster head (CH) on a rotational basis. Once the CH is selected, it assigns channels to the IoT devices to report their data using a novel integer linear program (ILP)-based channel allocation scheme by satisfying their desired QoS. To evaluate the presented schemes, exhaustive simulations are carried out by varying different parameters, including the number of IoT devices, the number of harvesting sources, the distance between RF sources and IoT devices and the primary user (PU) activity of different channels. The simulation results demonstrate that our proposed schemes perform better than the existing ones. PMID:27918424

  19. Optimized Energy Harvesting, Cluster-Head Selection and Channel Allocation for IoTs in Smart Cities.

    Science.gov (United States)

    Aslam, Saleem; Hasan, Najam Ul; Jang, Ju Wook; Lee, Kyung-Geun

    2016-12-02

    This paper highlights three critical aspects of the internet of things (IoTs), namely (1) energy efficiency, (2) energy balancing and (3) quality of service (QoS) and presents three novel schemes for addressing these aspects. For energy efficiency, a novel radio frequency (RF) energy-harvesting scheme is presented in which each IoT device is associated with the best possible RF source in order to maximize the overall energy that the IoT devices harvest. For energy balancing, the IoT devices in close proximity are clustered together and then an IoT device with the highest residual energy is selected as a cluster head (CH) on a rotational basis. Once the CH is selected, it assigns channels to the IoT devices to report their data using a novel integer linear program (ILP)-based channel allocation scheme by satisfying their desired QoS. To evaluate the presented schemes, exhaustive simulations are carried out by varying different parameters, including the number of IoT devices, the number of harvesting sources, the distance between RF sources and IoT devices and the primary user (PU) activity of different channels. The simulation results demonstrate that our proposed schemes perform better than the existing ones.

  20. Optimized Energy Harvesting, Cluster-Head Selection and Channel Allocation for IoTs in Smart Cities

    Directory of Open Access Journals (Sweden)

    Saleem Aslam

    2016-12-01

    Full Text Available This paper highlights three critical aspects of the internet of things (IoTs, namely (1 energy efficiency, (2 energy balancing and (3 quality of service (QoS and presents three novel schemes for addressing these aspects. For energy efficiency, a novel radio frequency (RF energy-harvesting scheme is presented in which each IoT device is associated with the best possible RF source in order to maximize the overall energy that the IoT devices harvest. For energy balancing, the IoT devices in close proximity are clustered together and then an IoT device with the highest residual energy is selected as a cluster head (CH on a rotational basis. Once the CH is selected, it assigns channels to the IoT devices to report their data using a novel integer linear program (ILP-based channel allocation scheme by satisfying their desired QoS. To evaluate the presented schemes, exhaustive simulations are carried out by varying different parameters, including the number of IoT devices, the number of harvesting sources, the distance between RF sources and IoT devices and the primary user (PU activity of different channels. The simulation results demonstrate that our proposed schemes perform better than the existing ones.

  1. Comparing the Atmospheric Losses at Io and Europa

    Science.gov (United States)

    Dols, V. J.; Bagenal, F.; Crary, F. J.; Cassidy, T.

    2017-12-01

    At Io and Europa, the interaction of the Jovian plasma with the moon atmosphere leads to a significant loss of atomic/molecular neutrals and ions to space. The processes that lead to atmospheric escape are diverse: atmospheric sputtering, molecular dissociation, molecular ion recombination, Jeans escape etc. Each process leads to neutrals escaping at different velocities (i.e. electron impact dissociation leads to very slow atomic neutrals, sputtering might eject faster molecular neutrals). Some neutrals will be ejected out of the Jovian system; others will form extended neutral clouds along the orbit of the moons. These atomic/molecular extended neutral clouds are probably the main source of plasma for the Jovian magnetosphere. They are difficult to observe directly thus their composition and density are still poorly constrained. A future modeling of the formation of these extended clouds requires an estimate of their atmospheric sources. We estimate the atmospheric losses at Io and Europa for each loss process with a multi-species chemistry model, using a prescribed atmospheric distribution consistent with the observations. We compare the neutral losses at Io and Europa.

  2. Out of core, out of mind: Practical parallel I/O

    Energy Technology Data Exchange (ETDEWEB)

    Womble, D.E.; Greenberg, D.S.; Riesen, R.E.; Wheat, S.R.

    1993-11-01

    Parallel computers are becoming more powerful and more complex in response to the demand for computing power by scientists and engineers. Inevitably, new and more complex I/O systems will be developed for these systems. In particular we believe that the I/O system must provide the programmer with the ability to explcitly manage storage (despite the trend toward complex parallel file systems and caching schemes). One method of doing so is to have a partitioned secondary storage in which each processor owns a logical disk. Along with operating system enhancements which allow overheads such as buffer copying to be avoided and libraries to support optimal remapping of data, this sort of I/O system meets the needs of high performance computing.

  3. Proof of Concept of Home IoT Connected Vehicles

    OpenAIRE

    Kim, Younsun; Oh, Hyunggoy; Kang, Sungho

    2017-01-01

    The way in which we interact with our cars is changing, driven by the increased use of mobile devices, cloud-based services, and advanced automotive technology. In particular, the requirements and market demand for the Internet of Things (IoT) device-connected vehicles will continuously increase. In addition, the advances in cloud computing and IoT have provided a promising opportunity for developing vehicular software and services in the automotive domain. In this paper, we introduce the con...

  4. 5G IoT Industry Verticals and Network Requirements

    OpenAIRE

    Condoluci, Massimo; Lema Rosas, Maria Angel; Mahmoodi, Toktam; Dohler, Michael

    2017-01-01

    The effective provisioning of industry verticals over the next-to-come 5G systems opens novel business opportunities for telco operators especially when considering the integration of Internet of Things (IoT) devices as enablers of business cases based on remote sensing and control. This chapter highlights the main features of IoT verticals with particular attention on healthcare, smart cities, industry automation and entertainment business cases. The aim of this Chapter is to derive the requ...

  5. Security Framework for the Web of IoT Platforms

    OpenAIRE

    Atarah, Ivan Akoribila

    2017-01-01

    Connected devices of IoT platforms are known to produce, process and exchange vast amounts of data, most of it sensitive or personal, that need to be protected. However, achieving minimal data protection requirements such as confidentiality, integrity, availability and non-repudiation in IoT platforms is a non-trivial issue. For one reason, the trillions of interacting devices provide larger attack surfaces. Secondly, high levels of personal and private data sharing in this ubiquitous and het...

  6. Research and implementation on improving I/O performance of streaming media storage system

    Science.gov (United States)

    Lu, Zheng-wu; Wang, Yu-de; Jiang, Guo-song

    2008-12-01

    In this paper, we study the special requirements of a special storage system: streaming media server, and propose a solution to improve I/O performance of RAID storage system. The solution is suitable for streaming media applications. A streaming media storage subsystem includes the I/O interfaces, RAID arrays, I/O scheduling and device drivers. The solution is implemented on the top of the storage subsystem I/O Interface. Storage subsystem is the performance bottlenecks of a streaming media system, and I/O interface directly affect the performance of the storage subsystem. According to theoretical analysis, 64 KB block-size is most appropriate for streaming media applications. We carry out experiment in detail, and verified that the proper block-size really is 64KB. It is in accordance with our analysis. The experiment results also show that by using DMA controller, efficient memory management technology and mailbox interface design mechanism, streaming media storage system achieves a high-speed data throughput.

  7. iOS Game Development using SpriteKit Framework with Swift Programming Language

    OpenAIRE

    Gurung, Lal

    2016-01-01

    iOS is a mobile operating system for Apple manufactured phones and tablets. Mobile Gaming Industries are growing very fast, and compatibility with iOS is becoming very popular among game developers. The aim of this Bachelor’s thesis was to find the best available game development tools for iOS platform. The 2D game named Lapland was developed using Apple’s own native framework, SpriteKit. The game was written with the SpriteKit programming language. The combination of SpriteKit and Swift...

  8. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

    OpenAIRE

    Bako Ali; Ali Ismail Awad

    2018-01-01

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in te...

  9. Towards an MDD Based Framework for Self Adaptive IoT Applications Development

    OpenAIRE

    Abuseta, Yousef

    2018-01-01

    As technology and communication advances, more devices (and things) are able to connect to the Internet and talk to each other to achieve a common goal which results in the emergence of the Internet of Things (IoT) era. It is believed that IoT will bring up a limitless number of applications and business opportunities that will affect almost every aspect of our life. Research has already been conducted to investigate the challenges that obstruct the realization of IoT along with the promising...

  10. Io Pele plume

    Science.gov (United States)

    2000-01-01

    Voyager 1 took this narrow-angle camera image on 5 March 1979 from a distance of 450,000 kilometers. At this geometry, the camera looks straight down through a volcanic plume at one of Io's most active volcanos, Pele. The large heart-shaped feature is the region where Pele's plume falls to the surface. At the center of the 'heart' is the small dark fissure that is the source of the eruption. The Voyager Project is managed by the Jet Propulsion Laboratory for NASA's Office of Space Science.

  11. Book Review: iPhone and iOS Forensic: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

    OpenAIRE

    Garfinkel, Simson

    2013-01-01

    Hoog, A., & Strzempka, K. (2011). iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Waltham, MA: Syngress. 336 pages, ISBN: 978-1-59749-659-9, US$69.95.Reviewed by Christopher Schulte, EnCE & ACE, LuciData Inc., Minneapolis, Minnesota ()These are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers) continue to bring ne...

  12. Book Review: iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

    OpenAIRE

    Schulte Christopher

    2011-01-01

    Hoog, A., & Strzempka, K. (2011). iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Waltham, MA: Syngress. 336 pages, ISBN: 978-1-59749-659-9, US$69.95.Reviewed by Christopher Schulte, EnCE & ACE, LuciData Inc., Minneapolis, Minnesota ()These are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers) continue to bring ne...

  13. IO-Link Wireless enhanced factory automation communication for Industry 4.0 applications

    Directory of Open Access Journals (Sweden)

    R. Heynicke

    2018-03-01

    Full Text Available In the context of the Industry 4.0 initiative, Cyber-Physical Production Systems (CPPS or Cyber Manufacturing Systems (CMS can be characterized as advanced networked mechatronic production systems gaining their added value by interaction with the ambient Industrial Internet of Things (IIoT. In this context appropriate communication technologies and standards play a vital role to realize the manifold potential improvements in the production process. One of these standards is IO-Link. In 2016 more than 5 million IO-Link nodes have been produced and delivered, still gaining increasing acceptance for the communication between sensors, actuators and the control level. The steadily increasing demand for more flexibility in automation solutions can be fulfilled using wireless technologies. With the wireless extension for the IO-Link standard, which will be presented in this article, maximum cycle times of 5 ms can be achieved with a probability that this limit will be exceeded to be at maximum one part per billion. Also roaming capabilities, wireless coexistence mechanisms and the possibility to include battery-powered or energy-harvesting sensors with very limited energy resources in the realtime network were defined. For system planning, setup, operation and maintenance, the standard engineering tools of IO-Link can be employed so that the backward compatibility with wired IO-Link solutions can be guaranteed. Interoperability between manufacturers is a key requirement for any communication standard, thus a procedure for IO-Link Wireless testing is also suggested.

  14. Mountains on Io: High-resolution Galileo observations, initial interpretations, and formation models

    Science.gov (United States)

    Turtle, E.P.; Jaeger, W.L.; Keszthelyi, L.P.; McEwen, A.S.; Milazzo, M.; Moore, J.; Phillips, C.B.; Radebaugh, J.; Simonelli, D.; Chuang, F.; Schuster, P.; Alexander, D.D.A.; Capraro, K.; Chang, S.-H.; Chen, A.C.; Clark, J.; Conner, D.L.; Culver, A.; Handley, T.H.; Jensen, D.N.; Knight, D.D.; LaVoie, S.K.; McAuley, M.; Mego, V.; Montoya, O.; Mortensen, H.B.; Noland, S.J.; Patel, R.R.; Pauro, T.M.; Stanley, C.L.; Steinwand, D.J.; Thaller, T.F.; Woncik, P.J.; Yagi, G.M.; Yoshimizu, J.R.; Alvarez Del Castillo, E.M.; Beyer, R.; Branston, D.; Fishburn, M.B.; Muller, Birgit; Ragan, R.; Samarasinha, N.; Anger, C.D.; Cunningham, C.; Little, B.; Arriola, S.; Carr, M.H.; Asphaug, E.; Morrison, D.; Rages, K.; Banfield, D.; Bell, M.; Burns, J.A.; Carcich, B.; Clark, B.; Currier, N.; Dauber, I.; Gierasch, P.J.; Helfenstein, P.; Mann, M.; Othman, O.; Rossier, L.; Solomon, N.; Sullivan, R.; Thomas, P.C.; Veverka, J.; Becker, T.; Edwards, K.; Gaddis, L.; Kirk, R.; Lee, E.; Rosanova, T.; Sucharski, R.M.; Beebe, R.F.; Simon, A.; Belton, M.J.S.; Bender, K.; Fagents, S.; Figueredo, P.; Greeley, R.; Homan, K.; Kadel, S.; Kerr, J.; Klemaszewski, J.; Lo, E.; Schwarz, W.; Williams, D.; Williams, K.; Bierhaus, B.; Brooks, S.; Chapman, C.R.; Merline, B.; Keller, J.; Tamblyn, P.; Bouchez, A.; Dyundian, U.; Ingersoll, A.P.; Showman, A.; Spitale, J.; Stewart, S.; Vasavada, A.; Breneman, H.H.; Cunningham, W.F.; Johnson, T.V.; Jones, T.J.; Kaufman, J.M.; Klaasen, K.P.; Levanas, G.; Magee, K.P.; Meredith, M.K.; Orton, G.S.; Senske, D.A.; West, A.; Winther, D.; Collins, G.; Fripp, W.J.; Head, J. W.; Pappalardo, R.; Pratt, S.; Prockter, L.; Spaun, N.; Colvin, T.; Davies, M.; DeJong, E.M.; Hall, J.; Suzuki, S.; Gorjian, Z.; Denk, T.; Giese, B.; Koehler, U.; Neukum, G.; Oberst, J.; Roatsch, T.; Tost, W.; Wagner, R.; Dieter, N.; Durda, D.; Geissler, P.; Greenberg, R.J.; Hoppa, G.; Plassman, J.; Tufts, R.; Fanale, F.P.; Granahan, J.C.

    2001-01-01

    During three close flybys in late 1999 and early 2000 the Galileo spacecraft ac-quired new observations of the mountains that tower above Io's surface. These images have revealed surprising variety in the mountains' morphologies. They range from jagged peaks several kilometers high to lower, rounded structures. Some are very smooth, others are covered by numerous parallel ridges. Many mountains have margins that are collapsing outward in large landslides or series of slump blocks, but a few have steep, scalloped scarps. From these observations we can gain insight into the structure and material properties of Io's crust as well as into the erosional processes acting on Io. We have also investigated formation mechanisms proposed for these structures using finite-element analysis. Mountain formation might be initiated by global compression due to the high rate of global subsidence associated with Io's high resurfacing rate; however, our models demonstrate that this hypothesis lacks a mechanism for isolating the mountains. The large fraction (???40%) of mountains that are associated with paterae suggests that in some cases these features are tectonically related. Therefore we have also simulated the stresses induced in Io's crust by a combination of a thermal upwelling in the mantle with global lithospheric compression and have shown that this can focus compressional stresses. If this mechanism is responsible for some of Io's mountains, it could also explain the common association of mountains with paterae. Copyright 2001 by the American Geophysical Union.

  15. Power Consumption and Calculation Requirement Analysis of AES for WSN IoT.

    Science.gov (United States)

    Hung, Chung-Wen; Hsu, Wen-Ting

    2018-05-23

    Because of the ubiquity of Internet of Things (IoT) devices, the power consumption and security of IoT systems have become very important issues. Advanced Encryption Standard (AES) is a block cipher algorithm is commonly used in IoT devices. In this paper, the power consumption and cryptographic calculation requirement for different payload lengths and AES encryption types are analyzed. These types include software-based AES-CB, hardware-based AES-ECB (Electronic Codebook Mode), and hardware-based AES-CCM (Counter with CBC-MAC Mode). The calculation requirement and power consumption for these AES encryption types are measured on the Texas Instruments LAUNCHXL-CC1310 platform. The experimental results show that the hardware-based AES performs better than the software-based AES in terms of power consumption and calculation cycle requirements. In addition, in terms of AES mode selection, the AES-CCM-MIC64 mode may be a better choice if the IoT device is considering security, encryption calculation requirement, and low power consumption at the same time. However, if the IoT device is pursuing lower power and the payload length is generally less than 16 bytes, then AES-ECB could be considered.

  16. 3-D shape analysis of palatal surface in patients with unilateral complete cleft lip and palate.

    Science.gov (United States)

    Rusková, Hana; Bejdová, Sárka; Peterka, Miroslav; Krajíček, Václav; Velemínská, Jana

    2014-07-01

    Facial development of patients with unilateral complete cleft lip and palate (UCLP) is associated with many problems including deformity of the palate. The aim of this study was to evaluate palatal morphology and variability in patients with UCLP compared with Czech norms using methods of geometric morphometrics. The study was based on virtual dental cast analysis of 29 UCLP patients and 29 control individuals at the age of 15 years. The variability of palatal shape in UCLP patients was greater than that in nonclefted palates. Only 24% of clefted palates fell within the variability of controls. The palatal form of UCLP patients (range from 11.8 to 17.2 years) was not correlated with age. Compared with control palates, palates of UCLP patients were narrower, more anteriorly than posteriorly. Apart from the praemaxilla region, they were also shallower, and the difference increased posteriorly. The UCLP palate was characterised by the asymmetry of its vault. The maximum height of the palatal vault was anterior on the clefted side, whereas it was posterior on the nonclefted side. The slope of the UCLP palate was more inclined compared with the control group. The praemaxilla was therefore situated more inferiorly. Copyright © 2013 European Association for Cranio-Maxillo-Facial Surgery. Published by Elsevier Ltd. All rights reserved.

  17. Teaching Management System with Applications of RFID and IoT Technology

    Directory of Open Access Journals (Sweden)

    Ping Tan

    2018-02-01

    Full Text Available Currently, Internet of Things (IoT technologies are used in many areas, such as intelligent transportation, smart city, hospital, games, education. Earlier interactive response system uses infrared or radio frequency (RF wireless communication technologies to transmit the students’ answer to teachers’ managerment system, where there exists high cost, inconvenient usage, difficult deployment. How to use IoT to improve the quality of higher education becomes a very important topic in the researh area of teaching. Radio Frequency Identification (RFID is one of key technologies to implement IoT applications, and most of universities use the High Frequency (HF RFID card as the students’ identification devices in China. In this paper, a kind of WiFi supported RFID reader (WiRF is implemented using open source hardware platforms, such as Node MCU and RFID-RC522. Then the proposed WiRF system is used to assist teacher to perform automatic attendance record and students’ behavior record. In addition, Quick Response (QR code is another technology to enable IoT. In this paper, QR code is designed to quickly access course video and perform real-time interactive response in the classroom, which will provide multidimensional learning and strengthen the motivation of students’ learning. This IoT system can improve the attendance of students, and give a positive impact on students’ learning process for higher education.

  18. An iOS implementation of the Shannon switching game

    OpenAIRE

    Macík, Miroslav

    2013-01-01

    Shannon switching game is a logical graph game for two players. The game was created by American mathematician Claude Shannon. iOS is an operating system designed for iPhone cellular phone, iPod music player and iPad tablet. The thesis describes existing implementations of the game and also specific implementation for iOS operating system created as a part of this work. This implementation allows you to play against virtual opponent and also supports multiplayer game consisting of two players...

  19. Identification of radio emission from the Io flux tube

    International Nuclear Information System (INIS)

    Riddle, A.C.

    1983-01-01

    Many theories and observations suggest that Jovian decametric radio emission is generated in flux tubes that pass close to Io's orbit. However, comparison of theory and observation is hindered by lack of knowledge as to which specific flux tube is responsible for a particular emission. In this note, emission from the instantaneous Io flux tube is identified. This makes possible a mapping of emissions onto the causative flux tubes for a significant range of Jovian longitudes (240 0 --360 0 )

  20. Thermal Remote Sensing of Lava Lakes on Io and Earth (Invited)

    Science.gov (United States)

    Davies, A. G.; Keszthelyi, L. P.; McEwen, A. S.

    2013-12-01

    Volcanology has been transformed by remote sensing. For decades, Earth's volcanoes have been studied in the infrared by a wide variety of instruments on spacecraft at widely varying spectral, spatial and temporal resolutions, for which techniques have been developed to interpret and understand ongoing volcanic eruptions. The study of volcanism on Io, the only Solar System body besides Earth known to have ongoing, high temperature, silicate-based effusive and explosive volcanic eruptions, requires new remote sensing techniques. The extraordinary volcanism allows us to examine Io's interior and composition from the material erupted onto the surface. For Io, the biggest question in the wake of NASA's Galileo mission concerns the eruption temperature of Io's dominant silicate lavas [1,2]. Constraining eruption temperature constrains magma composition, in turn a reflection of the composition, physical state and tidal heating within Io. However, the extraction of lava eruption temperature from remote sensing data is difficult. Detector saturation is likely except when the hot material fills a tiny fraction of a resolution element, unless instruments are designed for this objective. High temperature lava surfaces cool rapidly, so remote observations can miss the peak temperature. Observations at different wavelengths must be acquired nearly simultaneously to derive accurate temperatures of very hot and dynamic sources [3]. Uncertainties regarding hot lava emissivity [4] also reduce the confidence in derived temperatures. From studying thermal emission data from different styles of volcanic activity on Earth by remote sensing in conjunction with contemporaneous observations on the ground, it is found that only certain styles of volcanic activity are suitable for deriving liquid lava temperatures [3]. Active lava lakes are particularly useful, especially during a phase of lava fountaining. Examination and analysis of FLIR data obtained at the Erta'Ale (Ethiopia) basaltic

  1. Investment Opportunity Set (IOS Berbasis Pertumbuhan Perusahaan dan Kaitannya Dengan Upaya Peningkatan Nilai Perusahaan

    Directory of Open Access Journals (Sweden)

    Eka Handriani

    2016-06-01

    Full Text Available This research aims to develop theoretical approach to complete the conceptual controversy regarding the research results on the investment policy and firm value. This research employs firm value, investment opportunity set (IOS, funding and dividend as variables. Dividends in the research proxied by dividend pay out ratio (DPR, funding proxied by DER and firm value indicated by Tobin’s q, which are mediated by IOS. The sample are taken from 154 manufacturing company financial statements during 2010 to 2012. The data were tested using path analysis. The research found that dividend and funding policy positively influence IOS. Investment opportunity (IOS positively influences the firm value. IOS was able to mediate the effect of dividends to the firm value, and also the influence of funding decisions to firm value.

  2. TTEO (Things Talk to Each Other): Programming Smart Spaces Based on IoT Systems.

    Science.gov (United States)

    Yun, Jaeseok; Ahn, Il-Yeup; Choi, Sung-Chan; Kim, Jaeho

    2016-04-01

    The Internet of Things allows things in the world to be connected to each other and enables them to automate daily tasks without human intervention, eventually building smart spaces. This article demonstrates a prototype service based on the Internet of Things, TTEO (Things Talk to Each Other). We present the full details on the system architecture and the software platforms for IoT servers and devices, called Mobius and &Cube, respectively, complying with the globally-applicable IoT standards, oneM2M, a unique identification scheme for a huge number of IoT devices, and service scenarios with an intuitive smartphone app. We hope that our approach will help developers and lead users for IoT devices and application services to establish an emerging IoT ecosystem, just like the ecosystem for smartphones and mobile applications.

  3. TTEO (Things Talk to Each Other: Programming Smart Spaces Based on IoT Systems

    Directory of Open Access Journals (Sweden)

    Jaeseok Yun

    2016-04-01

    Full Text Available The Internet of Things allows things in the world to be connected to each other and enables them to automate daily tasks without human intervention, eventually building smart spaces. This article demonstrates a prototype service based on the Internet of Things, TTEO (Things Talk to Each Other. We present the full details on the system architecture and the software platforms for IoT servers and devices, called Mobius and &Cube, respectively, complying with the globally-applicable IoT standards, oneM2M, a unique identification scheme for a huge number of IoT devices, and service scenarios with an intuitive smartphone app. We hope that our approach will help developers and lead users for IoT devices and application services to establish an emerging IoT ecosystem, just like the ecosystem for smartphones and mobile applications.

  4. Graphene integrated circuits: new prospects towards receiver realisation.

    Science.gov (United States)

    Saeed, Mohamed; Hamed, Ahmed; Wang, Zhenxing; Shaygan, Mehrdad; Neumaier, Daniel; Negra, Renato

    2017-12-21

    This work demonstrates a design approach which enables the fabrication of fully integrated radio frequency (RF) and millimetre-wave frequency direct-conversion graphene receivers by adapting the frontend architecture to exploit the state-of-the-art performance of the recently reported wafer-scale CVD metal-insulator-graphene (MIG) diodes. As a proof-of-concept, we built a fully integrated microwave receiver in the frequency range 2.1-2.7 GHz employing the strong nonlinearity and the high responsivity of MIG diodes to successfully receive and demodulate complex, digitally modulated communication signals at 2.45 GHz. In addition, the fabricated receiver uses zero-biased MIG diodes and consumes zero dc power. With the flexibility to be fabricated on different substrates, the prototype receiver frontend is fabricated on a low-cost, glass substrate utilising a custom-developed MMIC process backend which enables the high performance of passive components. The measured performance of the prototype makes it suitable for Internet-of-Things (IoT) and Radio Frequency Identification (RFID) systems for medical and communication applications.

  5. IoT real time data acquisition using MQTT protocol

    Science.gov (United States)

    Atmoko, R. A.; Riantini, R.; Hasin, M. K.

    2017-05-01

    The Internet of Things (IoT) provides ease to monitor and to gain sensor data through the Internet [1]. The need of high quality data is increasing to the extent that data monitoring and acquisition system in real time is required, such as smart city or telediagnostic in medical areas [2]. Therefore, an appropriate communication protocol is required to resolve these problems. Lately, researchers have developed a lot of communication protocols for IoT, of which each has advantages and disadvantages. This study proposes the utilization of MQTT as a communication protocol, which is one of data communication protocols for IoT. This study used temperature and humidity sensors because the physical parameters are often needed as parameters of environment condition [3]. Data acquisition was done in real-time and stored in MySQL database. This study is also completed by interface web-based and mobile for online monitoring. This result of this study is the enhancement of data quality and reliability using MQTT protocol.

  6. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications.

    Science.gov (United States)

    Suárez-Albela, Manuel; Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Castedo, Luis

    2017-08-29

    Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up to

  7. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications

    Science.gov (United States)

    Castedo, Luis

    2017-01-01

    Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up

  8. I/O Performance Characterization of Lustre and NASA Applications on Pleiades

    Science.gov (United States)

    Saini, Subhash; Rappleye, Jason; Chang, Johnny; Barker, David Peter; Biswas, Rupak; Mehrotra, Piyush

    2012-01-01

    In this paper we study the performance of the Lustre file system using five scientific and engineering applications representative of NASA workload on large-scale supercomputing systems such as NASA s Pleiades. In order to facilitate the collection of Lustre performance metrics, we have developed a software tool that exports a wide variety of client and server-side metrics using SGI's Performance Co-Pilot (PCP), and generates a human readable report on key metrics at the end of a batch job. These performance metrics are (a) amount of data read and written, (b) number of files opened and closed, and (c) remote procedure call (RPC) size distribution (4 KB to 1024 KB, in powers of 2) for I/O operations. RPC size distribution measures the efficiency of the Lustre client and can pinpoint problems such as small write sizes, disk fragmentation, etc. These extracted statistics are useful in determining the I/O pattern of the application and can assist in identifying possible improvements for users applications. Information on the number of file operations enables a scientist to optimize the I/O performance of their applications. Amount of I/O data helps users choose the optimal stripe size and stripe count to enhance I/O performance. In this paper, we demonstrate the usefulness of this tool on Pleiades for five production quality NASA scientific and engineering applications. We compare the latency of read and write operations under Lustre to that with NFS by tracing system calls and signals. We also investigate the read and write policies and study the effect of page cache size on I/O operations. We examine the performance impact of Lustre stripe size and stripe count along with performance evaluation of file per process and single shared file accessed by all the processes for NASA workload using parameterized IOR benchmark.

  9. Towards A New Opportunistic IoT Network Architecture for Wildlife Monitoring System

    NARCIS (Netherlands)

    Ayele, Eyuel Debebe; Meratnia, Nirvana; Havinga, Paul J.M.

    In this paper we introduce an opportunistic dual radio IoT network architecture for wildlife monitoring systems (WMS). Since data processing consumes less energy than transmitting the raw data, the proposed architecture leverages opportunistic mobile networks in a fixed LPWAN IoT network

  10. On the Users’ Acceptance of IoT Systems: A Theoretical Approach

    Directory of Open Access Journals (Sweden)

    Rino Falcone

    2018-03-01

    Full Text Available In the next future the IoT system will introduce extraordinary changes in our daily life. We will communicate with our domestic appliances to inform them about our preferences and goals and they will develop initiative and autonomy to be put at our service. But are we sure that we can afford all the automation they could offer? Are we able to manage it? Is it compatible with our cognitive attitudes and our actual and real goals? In this paper, we face the question of the IoT from the point of view of the user. We start analyzing which reasons undermine the acceptance of IoT systems and then we propose a possible solution. The first contribution of this work is the level characterization of the autonomy a user can grant to an IoT device. The second contribution is a theoretical model to deal with users and to stimulate users’ acceptance. By the means of simulation, we show how the model works and we prove that it leads the system to an optimal solution.

  11. Performance Analysis of Video PHY Controller Using Unidirection and Bi-directional IO Standard via 7 Series FPGA

    DEFF Research Database (Denmark)

    Das, Bhagwan; Abdullah, M F L; Hussain, Dil muhammed Akbar

    2017-01-01

    graphics consumes more power, this creates a need of designing the low power design for Video PHY controller. In this paper, the performance of Video PHY controller is analyzed by comparing the power consumption of unidirectional and bi-directional IO Standard over 7 series FPGA. It is determined...... that total on-chip power is reduced for unidirectional IO Standard based Video PHY controller compared to bidirectional IO Standard based Video PHY controller. The most significant achievement of this work is that it is concluded that unidirectional IO Standard based Video PHY controller consume least...... standby power compared to bidirectional IO Standard based Video PHY controller. It is defined that for 6 GHz operated frequency Video PHY controller, the 32% total on-chip power is reduced using unidirectional IO Standard based Video PHY controller is less compared to bidirectional IO Standard based Video...

  12. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  13. Application-Tailored I/O with Streamline

    NARCIS (Netherlands)

    de Bruijn, W.J.; Bos, H.J.; Bal, H.E.

    2011-01-01

    Streamline is a stream-based OS communication subsystem that spans from peripheral hardware to userspace processes. It improves performance of I/O-bound applications (such as webservers and streaming media applications) by constructing tailor-made I/O paths through the operating system for each

  14. SDTCP: Towards Datacenter TCP Congestion Control with SDN for IoT Applications.

    Science.gov (United States)

    Lu, Yifei; Ling, Zhen; Zhu, Shuhong; Tang, Ling

    2017-01-08

    The Internet of Things (IoT) has gained popularity in recent years. Today's IoT applications are now increasingly deployed in cloud platforms to perform Big Data analytics. In cloud data center networks (DCN), TCP incast usually happens when multiple senders simultaneously communicate with a single receiver. However, when TCP incast happens, DCN may suffer from both throughput collapse for TCP burst flows and temporary starvation for TCP background flows. In this paper, we propose a software defined network (SDN)-based TCP congestion control mechanism, referred to as SDTCP, to leverage the features, e.g., centralized control methods and the global view of the network, in order to solve the TCP incast problems. When we detect network congestion on an OpenFlow switch, our controller can select the background flows and reduce their bandwidth by adjusting the advertised window of TCP ACK packets of the corresponding background flows so as to reserve more bandwidth for burst flows. SDTCP is transparent to the end systems and can accurately decelerate the rate of background flows by leveraging the global view of the network gained via SDN. The experiments demonstrate that our SDTCP can provide high tolerance for burst flows and achieve better flow completion time for short flows. Therefore, SDTCP is an effective and scalable solution for the TCP incast problem.

  15. SDTCP: Towards Datacenter TCP Congestion Control with SDN for IoT Applications

    Directory of Open Access Journals (Sweden)

    Yifei Lu

    2017-01-01

    Full Text Available The Internet of Things (IoT has gained popularity in recent years. Today’s IoT applications are now increasingly deployed in cloud platforms to perform Big Data analytics. In cloud data center networks (DCN, TCP incast usually happens when multiple senders simultaneously communicate with a single receiver. However, when TCP incast happens, DCN may suffer from both throughput collapse for TCP burst flows and temporary starvation for TCP background flows. In this paper, we propose a software defined network (SDN-based TCP congestion control mechanism, referred to as SDTCP, to leverage the features, e.g., centralized control methods and the global view of the network, in order to solve the TCP incast problems. When we detect network congestion on an OpenFlow switch, our controller can select the background flows and reduce their bandwidth by adjusting the advertised window of TCP ACK packets of the corresponding background flows so as to reserve more bandwidth for burst flows. SDTCP is transparent to the end systems and can accurately decelerate the rate of background flows by leveraging the global view of the network gained via SDN. The experiments demonstrate that our SDTCP can provide high tolerance for burst flows and achieve better flow completion time for short flows. Therefore, SDTCP is an effective and scalable solution for the TCP incast problem.

  16. Synthesis, crystal structure and optical properties of two new layered cadmium iodates: Cd(IO3)X (X=Cl, OH)

    International Nuclear Information System (INIS)

    Yang, Bing-Ping; Mao, Jiang-Gao

    2014-01-01

    Systematic explorations of new compounds in the cadmium iodate system by hydrothermal reactions led to two layered iodates, namely, Cd(IO 3 )X (X=Cl, OH). Cd(IO 3 )Cl crystallizes in the orthorhombic space group Cmca (No. 64) whereas Cd(IO 3 )(OH) crystallizes in the orthorhombic space group Pnma (No. 62). Cd(IO 3 )Cl displays a unique double layered structure composed of 1 ∞ [Cd−O 3 Cl] n chains. Cadmium octahedrons form a 1D chain along the a-axis through edge sharing, and such chains are further interconnected via IO 3 groups to form a special double layer on (020) plane. Cd(IO 3 )(OH) also exhibits a layered structure that is composed of cadmium cations, IO 3 groups and hydroxyl ions. Within a layer, chains of CdO 6 edge-shared octahedra are observed along the b-axis. And these chains are connected by IO 3 groups into a layer parallel to the bc plane. Spectroscopic characterizations, elemental analysis, and thermogravimetric analysis for the reported two compounds are also presented. - Graphical abstract: Two new layered cadmium iodates Cd(IO 3 )X (X=Cl, OH) are reported. Cd(IO 3 )Cl features a unique double layered structure whereas Cd(IO 3 )(OH) displays an ordinary layered structure. - Highlights: • Two new layered cadmium iodates Cd(IO 3 )X (X=Cl, OH) are reported. • Cd(IO 3 )Cl features a unique double layered structure. • Cd(IO 3 )(OH) displays an ordinary layered structure. • The spectroscopic and thermal properties have been studied in detail

  17. Building IoT Applications with Raspberry Pi and Low Power IQRF Communication Modules

    Directory of Open Access Journals (Sweden)

    Isidro Calvo

    2016-09-01

    Full Text Available Typical Internet of Things (IoT applications involve collecting information automatically from diverse geographically-distributed smart sensors and concentrating the information into more powerful computers. The Raspberry Pi platform has become a very interesting choice for IoT applications for several reasons: (1 good computing power/cost ratio; (2 high availability; it has become a de facto hardware standard; and (3 ease of use; it is based on operating systems with a big community of users. In IoT applications, data are frequently carried by means of wireless sensor networks in which energy consumption is a key issue. Energy consumption is especially relevant for smart sensors that are scattered over wide geographical areas and may need to work unattended on batteries for long intervals of time. In this scenario, it is convenient to ease the construction of IoT applications while keeping energy consumption to a minimum at the sensors. This work proposes a possible gateway implementation with specific technologies. It solves the following research question: how to build gateways for IoT applications with Raspberry Pi and low power IQRF communication modules. The following contributions are presented: (1 one architecture for IoT gateways that integrates data from sensor nodes into a higher level application based on low-cost/low-energy technologies; (2 bindings in Java and C that ease the construction of IoT applications; (3 an empirical model that describes the consumption of the communications at the nodes (smart sensors and allows scaling their batteries; and (4 validation of the proposed energy model at the battery-operated nodes.

  18. Nanosatellites constellation as an IoT communication platform for near equatorial countries

    Science.gov (United States)

    Narayanasamy, A.; Ahmad, Y. A.; Othman, M.

    2017-11-01

    Anytime, anywhere access for real-time intelligence by Internet of Things (IoT) is changing the way that the whole world will operate as it moves toward data driven technologies. Over the next five years, IoT related devices going to have a dramatic breakthrough in current and new applications, not just on increased efficiency and cost reduction on current system, but it also will make trillion-dollar revenue generation and improve customer satisfaction. IoT communications is the networking of intelligent devices which enables data collection from remote assets. It covers a broad range of technologies and applications which connect to the physical world while allowing key information to be transferred automatically. The current terrestrial wireless communications technologies used to enable this connectivity include GSM, GPRS, 3G, LTE, WIFI, WiMAX and LoRa. These connections occur short to medium range distance however, none of them can cover a whole country or continent and the networks are getting congested with the multiplication of IoT devices. In this study, we discuss a conceptual design of a nanosatellite constellation those can provide a space-based communication platform for IoT devices for near Equatorial countries. The constellation design i.e. the orbital plane and number of satellites and launch deployment concepts are presented.

  19. BSNCare+: A Robust IoT-Oriented Healthcare System with Non-Repudiation Transactions

    Directory of Open Access Journals (Sweden)

    Kuo-Hui Yeh

    2016-12-01

    Full Text Available Recently, the rapid advancement in technologies of modern intelligent objects has led to a new network paradigm, called the Internet of Things (IoT, in which every networked and automated object has been connected in a pervasive manner. New types of IoT-based application services are thus presented. In a healthcare oriented environment, the usage of IoT has brought opportunities for assisting physicians (or nurses to provide on-demand and real-time body-care services to patients with higher accuracy and better efficiency. However, while IoT-oriented techniques deliver such advantages, they may encounter system security vulnerabilities and patient privacy threats not seen in the past. In this paper, we propose a robust IoT-based healthcare system, called BSNCare+, in which body sensor networks (BSNs are adopted as the underlying communication architecture. In the proposed healthcare system, we exploit lightweight crypto-primitives to construct a secure communication mechanism that does achieve data confidentiality and entity authentication among intelligent body sensors, the mobile gateway and the backend BSN-Care server. In addition, we evaluate the performance of the proposed healthcare system using the Raspberry PI series platform. The results show the practicability and feasibility of BSNCare+.

  20. Java I/O

    CERN Document Server

    Harold, Elliotte Rusty

    2006-01-01

    All of Java's Input/Output (I/O) facilities are based on streams, which provide simple ways to read and write data of different types. Java provides many different kinds of streams, each with its own application. The universe of streams is divided into four largecategories: input streams and output streams, for reading and writing binary data; and readers and writers, for reading and writing textual (character) data. You're almost certainly familiar with the basic kinds of streams--but did you know that there's a CipherInputStream for reading encrypted data? And a ZipOutputStream for automati

  1. Clear as MUD: Generating, Validating and Applying IoT Behaviorial Profiles (Technical Report)

    OpenAIRE

    Hamza, Ayyoob; Ranathunga, Dinesha; Gharakheili, H. Habibi; Roughan, Matthew; Sivaraman, Vijay

    2018-01-01

    IoT devices are increasingly being implicated in cyber-attacks, driving community concern about the risks they pose to critical infrastructure, corporations, and citizens. In order to reduce this risk, the IETF is pushing IoT vendors to develop formal specifications of the intended purpose of their IoT devices, in the form of a Manufacturer Usage Description (MUD), so that their network behavior in any operating environment can be locked down and verified rigorously. This paper aims to assist...

  2. Galileo observations of volcanic plumes on Io

    Science.gov (United States)

    Geissler, P.E.; McMillan, M.T.

    2008-01-01

    Io's volcanic plumes erupt in a dazzling variety of sizes, shapes, colors and opacities. In general, the plumes fall into two classes, representing distinct source gas temperatures. Most of the Galileo imaging observations were of the smaller, more numerous Prometheus-type plumes that are produced when hot flows of silicate lava impinge on volatile surface ices of SO2. Few detections were made of the giant, Pele-type plumes that vent high temperature, sulfur-rich gases from the interior of Io; this was partly because of the insensitivity of Galileo's camera to ultraviolet wavelengths. Both gas and dust spout from plumes of each class. Favorably located gas plumes were detected during eclipse, when Io was in Jupiter's shadow. Dense dust columns were imaged in daylight above several Prometheus-type eruptions, reaching heights typically less than 100 km. Comparisons between eclipse observations, sunlit images, and the record of surface changes show that these optically thick dust columns are much smaller in stature than the corresponding gas plumes but are adequate to produce the observed surface deposits. Mie scattering calculations suggest that these conspicuous dust plumes are made up of coarse grained “ash” particles with radii on the order of 100 nm, and total masses on the order of 106 kg per plume. Long exposure images of Thor in sunlight show a faint outer envelope apparently populated by particles small enough to be carried along with the gas flow, perhaps formed by condensation of sulfurous “snowflakes” as suggested by the plasma instrumentation aboard Galileo as it flew through Thor's plume [Frank, L.A., Paterson, W.R., 2002. J. Geophys. Res. (Space Phys.) 107, doi:10.1029/2002JA009240. 31-1]. If so, the total mass of these fine, nearly invisible particles may be comparable to the mass of the gas, and could account for much of Io's rapid resurfacing.

  3. Extreme Worlds of the Outer Solar System: Dynamic Processes on Uranus & Io

    Science.gov (United States)

    Kleer, Katherine Rebecca de

    A central goal of planetary science is the creation of a framework within which the properties of each solar system body can be understood as the product of initial conditions acted on by fundamental physical processes. The solar system's extreme worlds -- those objects that lie at the far ends of the spectrum in terms of planetary environment -- bring to light our misconceptions and present us with opportunities to expand and generalize this framework. Unraveling the processes at work in diverse planetary environments contextualizes our understanding of Earth, and provides a basis for interpreting specific signatures from planets beyond our own solar system. Uranus and Io, with their unusual planetary environments, present two examples of such worlds in the outer solar system. Uranus, one of the outer solar system's ice giants, produces an anomalously low heat flow and orbits the sun on its side. Its relative lack of bright storm features and its bizarre multi-decadal seasons provide insight into the relative effects of internal heat flow and time- varying solar insolation on atmospheric dynamics, while its narrow rings composed of dark, macroscopic particles encode the history of bombardment and satellite disruption within the system. Jupiter's moon Io hosts the most extreme volcanic activity anywhere in the solar system. Its tidally-powered geological activity provides a window into this satellite's interior, permitting rare and valuable investigations into the exchange of heat and materials between interiors and surfaces. In particular, Io provides a laboratory for studying the process of tidal heating, which shapes planets and satellites in our solar system and beyond. A comparison between Earth and Io contextualizes the volcanism at work on our home planet, revealing the effects of planetary size, atmospheric density, and plate tectonics on the style and mechanisms of geological activity. This dissertation investigates the processes at work on these solar

  4. Lemon : An MPI parallel I/O library for data encapsulation using LIME

    NARCIS (Netherlands)

    Deuzeman, Albert; Reker, Siebren; Urbach, Carsten

    We introduce Lemon, an MPI parallel I/O library that provides efficient parallel I/O of both binary and metadata on massively parallel architectures. Motivated by the demands of the lattice Quantum Chromodynamics community, the data is stored in the SciDAC Lattice QCD Interchange Message

  5. Aplikasi Rekomendasi Pola Makan Berbasis iOS

    Directory of Open Access Journals (Sweden)

    Afan Galih Salman

    2012-12-01

    Full Text Available The goal for implementing this system is to help users manage and track history about their eat pattern, choose proper food for body’s need, and pick restaurants. Methodology used for this research contains three parts, which is analysis, design, and literature study. In requirement analysis, we do some interview withnutritionist and food provider, analysis iOS user, compare with same kind of application, and identify components that we need. In design method, we use Unified Modelling Language approach, ERD design, and user interface design. The result is a food planning mobile application with iOS platform. This application canhelp user manage and track their eat pattern, help user choose balanced food that suitable for their body, and inform user where they can get food they plan to eat.

  6. Classification of Volcanic Eruptions on Io and Earth Using Low-Resolution Remote Sensing Data

    Science.gov (United States)

    Davies, A. G.; Keszthelyi, L. P.

    2005-01-01

    Two bodies in the Solar System exhibit high-temperature active volcanism: Earth and Io. While there are important differences in the eruptions on Earth and Io, in low-spatial-resolution data (corresponding to the bulk of available and foreseeable data of Io), similar styles of effusive and explosive volcanism yield similar thermal flux densities. For example, a square metre of an active pahoehoe flow on Io looks very similar to a square metre of an active pahoehoe flow on Earth. If, from observed thermal emission as a function of wavelength and change in thermal emission with time, the eruption style of an ionian volcano can be constrained, estimates of volumetric fluxes can be made and compared with terrestrial volcanoes using techniques derived for analysing terrestrial remotely-sensed data. In this way we find that ionian volcanoes fundamentally differ from their terrestrial counterparts only in areal extent, with Io volcanoes covering larger areas, with higher volumetric flux. Io outbursts eruptions have enormous implied volumetric fluxes, and may scale with terrestrial flood basalt eruptions. Even with the low-spatial resolution data available it is possible to sometimes constrain and classify eruption style both on Io and Earth from the integrated thermal emission spectrum. Plotting 2 and 5 m fluxes reveals the evolution of individual eruptions of different styles, as well as the relative intensity of eruptions, allowing comparison to be made from individual eruptions on both planets. Analyses like this can be used for interpretation of low-resolution data until the next mission to the jovian system. For a number of Io volcanoes (including Pele, Prometheus, Amirani, Zamama, Culann, Tohil and Tvashtar) we do have high/moderate resolution imagery to aid determination of eruption mode from analyses based only on low spatial-resolution data.

  7. Give me a hint: An ID-free small data transmission protocol for dense IoT devices

    OpenAIRE

    Ren, Yi; Wu, Ren-Jie; Huang, Teng-Wei; Tseng, Yu-Chee

    2017-01-01

    IoT (Internet of Things) has attracted a lot of attention recently. IoT devices need to report their data or status to base stations at various frequencies. The IoT communications observed by a base station normally exhibit the following characteristics: (1) massively connected, (2) lightly loaded per packet, and (3) periodical or at least mostly predictable. The current design principals of communication networks, when applied to IoT scenarios, however, do not fit well to these requirements....

  8. Reproducibility and Variability of I/O Performance on BG/Q: Lessons Learned from a Data Aggregation Algorithm

    Energy Technology Data Exchange (ETDEWEB)

    Tessier, Francois [Argonne National Lab. (ANL), Argonne, IL (United States); Vishwanath, Venkatram [Argonne National Lab. (ANL), Argonne, IL (United States)

    2017-11-28

    Reading and writing data efficiently from different tiers of storage is necessary for most scientific simulations to achieve good performance at scale. Many software solutions have been developed to decrease the I/O bottleneck. One wellknown strategy, in the context of collective I/O operations, is the two-phase I/O scheme. This strategy consists of selecting a subset of processes to aggregate contiguous pieces of data before performing reads/writes. In our previous work, we implemented the two-phase I/O scheme with a MPI-based topology-aware algorithm. Our algorithm showed very good performance at scale compared to the standard I/O libraries such as POSIX I/O and MPI I/O. However, the algorithm had several limitations hindering a satisfying reproducibility of our experiments. In this paper, we extend our work by 1) identifying the obstacles we face to reproduce our experiments and 2) discovering solutions that reduce the unpredictability of our results.

  9. The final Galileo SSI observations of Io: Orbits G28-I33

    Science.gov (United States)

    Turtle, E.P.; Keszthelyi, L.P.; McEwen, A.S.; Radebaugh, J.; Milazzo, M.; Simonelli, D.P.; Geissler, P.; Williams, D.A.; Perry, J.; Jaeger, W.L.; Klaasen, K.P.; Breneman, H.H.; Denk, T.; Phillips, C.B.

    2004-01-01

    We present the observations of Io acquired by the Solid State Imaging (SSI) experiment during the Galileo Millennium Mission (GMM) and the strategy we used to plan the exploration of Io. Despite Galileo's tight restrictions on data volume and downlink capability and several spacecraft and camera anomalies due to the intense radiation close to Jupiter, there were many successful SSI observations during GMM. Four giant, high-latitude plumes, including the largest plume ever observed on Io, were documented over a period of eight months; only faint evidence of such plumes had been seen since the Voyager 2 encounter, despite monitoring by Galileo during the previous five years. Moreover, the source of one of the plumes was Tvashtar Catena, demonstrating that a single site can exhibit remarkably diverse eruption styles - from a curtain of lava fountains, to extensive surface flows, and finally a ??? 400 km high plume - over a relatively short period of time (??? 13 months between orbits 125 and G29). Despite this substantial activity, no evidence of any truly new volcanic center was seen during the six years of Galileo observations. The recent observations also revealed details of mass wasting processes acting on Io. Slumping and landsliding dominate and occur in close proximity to each other, demonstrating spatial variation in material properties over distances of several kilometers. However, despite the ubiquitous evidence for mass wasting, the rate of volcanic resurfacing seems to dominate; the floors of paterae in proximity to mountains are generally free of debris. Finally, the highest resolution observations obtained during Galileo's final encounters with Io provided further evidence for a wide diversity of surface processes at work on Io. ?? 2003 Elsevier Inc. All rights reserved.

  10. IoT-based user-driven service modeling environment for a smart space management system.

    Science.gov (United States)

    Choi, Hoan-Suk; Rhee, Woo-Seop

    2014-11-20

    The existing Internet environment has been extended to the Internet of Things (IoT) as an emerging new paradigm. The IoT connects various physical entities. These entities have communication capability and deploy the observed information to various service areas such as building management, energy-saving systems, surveillance services, and smart homes. These services are designed and developed by professional service providers. Moreover, users' needs have become more complicated and personalized with the spread of user-participation services such as social media and blogging. Therefore, some active users want to create their own services to satisfy their needs, but the existing IoT service-creation environment is difficult for the non-technical user because it requires a programming capability to create a service. To solve this problem, we propose the IoT-based user-driven service modeling environment to provide an easy way to create IoT services. Also, the proposed environment deploys the defined service to another user. Through the personalization and customization of the defined service, the value and dissemination of the service is increased. This environment also provides the ontology-based context-information processing that produces and describes the context information for the IoT-based user-driven service.

  11. Energy-Aware Computation Offloading of IoT Sensors in Cloudlet-Based Mobile Edge Computing.

    Science.gov (United States)

    Ma, Xiao; Lin, Chuang; Zhang, Han; Liu, Jianwei

    2018-06-15

    Mobile edge computing is proposed as a promising computing paradigm to relieve the excessive burden of data centers and mobile networks, which is induced by the rapid growth of Internet of Things (IoT). This work introduces the cloud-assisted multi-cloudlet framework to provision scalable services in cloudlet-based mobile edge computing. Due to the constrained computation resources of cloudlets and limited communication resources of wireless access points (APs), IoT sensors with identical computation offloading decisions interact with each other. To optimize the processing delay and energy consumption of computation tasks, theoretic analysis of the computation offloading decision problem of IoT sensors is presented in this paper. In more detail, the computation offloading decision problem of IoT sensors is formulated as a computation offloading game and the condition of Nash equilibrium is derived by introducing the tool of a potential game. By exploiting the finite improvement property of the game, the Computation Offloading Decision (COD) algorithm is designed to provide decentralized computation offloading strategies for IoT sensors. Simulation results demonstrate that the COD algorithm can significantly reduce the system cost compared with the random-selection algorithm and the cloud-first algorithm. Furthermore, the COD algorithm can scale well with increasing IoT sensors.

  12. The Difference in Cervical Vertebral Skeletal Maturation between Cleft Lip/Palate and Non-Cleft Lip/Palate Orthodontic Patients.

    Science.gov (United States)

    Batwa, Waeil; Almoammar, Khalid; Aljohar, Aziza; Alhussein, Abdullah; Almujel, Saad; Zawawi, Khalid H

    2018-01-01

    The aim was to evaluate differences in the cervical vertebral skeletal maturity of unilateral cleft lip and palate (UCLP) and non-cleft lip/palate (non-CLP) Saudi male orthodontic patients. This cross-sectional multicenter study took place at the dental school, King Saud University and King Faisal Specialist Hospital and Research Center, Riyadh, Saudi Arabia, between October 2014 and September 2015. The records of Saudi male orthodontic patients with UCLP ( n = 69) were collected. Cervical vertebral maturation was assessed using their cephalometric radiographs. The records of 138 age-matched non-CLP Saudi male orthodontic patients served as controls. There was a significant difference in skeletal maturity between the UCLP and non-CLP groups, as evident in the delayed skeletal development among the UCLP participants. Moreover, pubertal growth spurt onset was significantly earlier in the non-cleft participants in comparison with the UCLP participants ( p = 0.009). There is delayed skeletal maturity among the UCLP Saudi male population in comparison with their non-CLP age-matched peers.

  13. SSTL I/O Standard Based Arithmetic Circuits Design on FPGA

    DEFF Research Database (Denmark)

    Goswami, Kavita; Pandey, Bishwajeet; Hussain, Dil muhammed Akbar

    2016-01-01

    -Tiryagbhyam”. SSTL135_R is minimum I/O power consumer. SSTL135_DCI is maximum power consumer. When we use SSTL135_R in place of SSTL12, SSTL12_DCI, SSTL15, and SSTL135_DCI, there is 42.5%, 82.7%, 28.12%, and 72.9% reduction in I/O power at 21oC, 40oC, 53.5oC and 56.7oC. This design is implemented on Artix-7 FPGA...

  14. Case Study: IoT Data Integration for Higher Education Institution

    Directory of Open Access Journals (Sweden)

    Pinka Krišjānis

    2016-12-01

    Full Text Available Nowadays the Internet of Things (IoT is one of the most trending technologies. It is expected that by year 2020 there will be 50 billion of Internet-connected devices. Fields like smart cities and smart homes largely rely on IoT phenomena by using a wide variety of sensors for data collection, analysis and corresponding actions. The paper describes how this trending and relatively new technology is applied at Riga Technical University for educational purposes.

  15. A Dynamic Processing System for Sensor Data in IoT

    OpenAIRE

    Li, Minbo; Liu, Yanling; Cai, Yuanfeng

    2015-01-01

    With the development of the Internet of Things (IoT for short), innumerable Wireless Sensor Networks (WSNs) are deployed to capture the information of environmental status in the surrounding physical environment. The data from WSNs, called sensor data, are generated in high frequency. Similar to data of other open-loop applications, for example, network monitoring data, sensor data are heterogeneous, redundant, real-time, massive, and streaming. Hence, sensor data cannot be treated as the IoT...

  16. EVIO - A lightweight object-oriented I/O package

    International Nuclear Information System (INIS)

    Wolin, E.; Abbott, D.; Gurjyan, V.; Heyes, G.; Jastrzembski, E.; Lawrence, D.; Timmer, C.

    2008-01-01

    The EVIO package implements I/O between disk and an in-memory hierarchical object tree. Tree nodes are either container nodes, holding other nodes, or leaf nodes, containing any amount of data of a single type (int64 t ,..., int8 t , float, double, and string). Trees can easily be constructed using factory methods and stream operators; queried using STL-like algorithms, function object, etc; or modified using tree or node methods. The tree logically maps to XML, and utilities exist to transform between binary and ASCII XML formats. The binary representation is compact, I/O is simple and efficient, and endian conversions are handled automatically. EVIO will be used by the next generation of experiments at Jefferson Lab.

  17. mIoT Slice for 5G Systems: Design and Performance Evaluation.

    Science.gov (United States)

    Trivisonno, Riccardo; Condoluci, Massimo; An, Xueli; Mahmoodi, Toktam

    2018-02-21

    Network slicing is a key feature of the upcoming 5G networks allowing the design and deployment of customized communication systems to integrate services provided by vertical industries. In this context, massive Internet of Things (mIoT) is regarded as a compelling use case, both for its relevance from business perspective, and for the technical challenges it poses to network design. With their envisaged massive deployment of devices requiring sporadic connectivity and small data transmission, yet Quality of Service (QoS) constrained, mIoT services will need an ad-hoc end-to-end (E2E) slice, i.e., both access and core network with enhanced Control and User planes (CP/UP). After revising the key requirements of mIoT and identifying major shortcomings of previous generation networks, this paper presents and evaluates an E2E mIoT network slicing solution, featuring a new connectivity model overcoming the load limitations of legacy systems. Unique in its kind, this paper addresses mIoT requirements from an end-to-end perspective highlighting and solving, unlike most prior related work, the connectivity challenges posed to the core network. Results demonstrate that the proposed solution, reducing CP signaling and optimizing UP resource utilization, is a suitable candidate for next generation network standards to efficiently handle massive device deployment.

  18. Microservices in Web Objects Enabled IoT Environment for Enhancing Reusability.

    Science.gov (United States)

    Jarwar, Muhammad Aslam; Kibria, Muhammad Golam; Ali, Sajjad; Chong, Ilyoung

    2018-01-26

    In the ubiquitous Internet of Things (IoT) environment, reusing objects instead of creating new one has become important in academics and industries. The situation becomes complex due to the availability of a huge number of connected IoT objects, and each individual service creates a new object instead of reusing the existing one to fulfill a requirement. A well-standard mechanism not only improves the reusability of objects but also improves service modularity and extensibility, and reduces cost. Web Objects enabled IoT environment applies the principle of reusability of objects in multiple IoT application domains through central objects repository and microservices. To reuse objects with microservices and to maintain a relationship with them, this study presents an architecture of Web of Objects platform. In the case of a similar request for an object, the already instantiated object that exists in the same or from other domain can be reused. Reuse of objects through microservices avoids duplications, and reduces time to search and instantiate them from their registries. Further, this article presents an algorithm for microservices and related objects discovery that considers the reusability of objects through the central objects repository. To support the reusability of objects, the necessary algorithm for objects matching is also presented. To realize the reusability of objects in Web Objects enabled IoT environment, a prototype has been designed and implemented based on a use case scenario. Finally, the results of the prototype have been analyzed and discussed to validate the proposed approach.

  19. Microservices in Web Objects Enabled IoT Environment for Enhancing Reusability

    Directory of Open Access Journals (Sweden)

    Muhammad Aslam Jarwar

    2018-01-01

    Full Text Available In the ubiquitous Internet of Things (IoT environment, reusing objects instead of creating new one has become important in academics and industries. The situation becomes complex due to the availability of a huge number of connected IoT objects, and each individual service creates a new object instead of reusing the existing one to fulfill a requirement. A well-standard mechanism not only improves the reusability of objects but also improves service modularity and extensibility, and reduces cost. Web Objects enabled IoT environment applies the principle of reusability of objects in multiple IoT application domains through central objects repository and microservices. To reuse objects with microservices and to maintain a relationship with them, this study presents an architecture of Web of Objects platform. In the case of a similar request for an object, the already instantiated object that exists in the same or from other domain can be reused. Reuse of objects through microservices avoids duplications, and reduces time to search and instantiate them from their registries. Further, this article presents an algorithm for microservices and related objects discovery that considers the reusability of objects through the central objects repository. To support the reusability of objects, the necessary algorithm for objects matching is also presented. To realize the reusability of objects in Web Objects enabled IoT environment, a prototype has been designed and implemented based on a use case scenario. Finally, the results of the prototype have been analyzed and discussed to validate the proposed approach.

  20. Book Review: iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

    Directory of Open Access Journals (Sweden)

    Schulte Christopher

    2011-12-01

    Full Text Available Hoog, A., & Strzempka, K. (2011. iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Waltham, MA: Syngress. 336 pages, ISBN: 978-1-59749-659-9, US$69.95.Reviewed by Christopher Schulte, EnCE & ACE, LuciData Inc., Minneapolis, Minnesota (cschulte@lucidatainc.comThese are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers continue to bring new and sometimes hair-pulling challenges into our labs and on-site engagements, research and understanding of these tiny computers is increasing at what seems an exponential rate. This is especially true in the iOS (Apple Computer’s mobile operating system that powers the iPhone, iPad, iPod Touch and Apple TV space. The diligent work of talented computer scientists in this field allows examiners everywhere to reap the benefits of easier, faster and more effective examinations that yield more accurate and defendable results.(see PDF for full review

  1. Instructor/Operator Station (IOS) Design Guide.

    Science.gov (United States)

    1988-02-01

    INSTRUTOR /OPERATOR STATION (IOS) AI O...The three functional categories also define three different users in terms of jobs and qualifications (if the functions have been allocated to manual ...function manually (e.g., collect the data S required from schedules, printed course outlines and telephone calls to training and facility managers).

  2. Two Decades (almost) of Keck Observations of Io

    Science.gov (United States)

    De Pater, I.; Davies, A. G.; de Kleer, K.

    2015-12-01

    We have regularly observed Io with the 10-m Keck Telescope since 1998, initially using the speckle imaging technique, and switching to Adaptive Optics techniques when this became available in 2001. In this talk we will discuss several eruptions that we witnessed, and present 20-30 year timelines of thermal emission from Pele, Pillan, Janus Patera, Kanehekili Fluctus, and Loki Patera, updating timelines in recent publications [1, 2] with additional Keck adaptive optics data obtained between 2002 and 2015. These new timelines are the most comprehensive plots ever produced of the volcanic thermal emission variability for these or any other locations on Io, utilizing data from multiple ground- and space-based assets. Our continuing multi-decadal observing program forms the basis for charting the variability of Io's volcanic activity, of great importance for understanding the evolution of the Galilean satellite system, and with the expectation of new missions to the jovian system in the next decade. Acknowledgements: This research is in part supported by NSF grant AST-1313485 to UC Berkeley. AGD is supported by a grant from the NASA OPR Program. References: [1] Davies et al. (2012) Icarus, 221, 466-470. [2] Rathbun and Spencer (2010) Icarus, 209, 625-630.

  3. A self-supporting wireless IoT node that uses kinetic energy harvesting

    DEFF Research Database (Denmark)

    Lynggaard, Per

    2017-01-01

    The Internet-of-Things (IoT) is expected to be the next revolution of the internet where trillions of IoT nodes will be deployed on a global scale. It is foreseen that a considerable part of these will be deployed in smart buildings and smart homes where they will provide innovative solutions...

  4. Linear SVM-Based Android Malware Detection for Reliable IoT Services

    Directory of Open Access Journals (Sweden)

    Hyo-Sik Ham

    2014-01-01

    Full Text Available Current many Internet of Things (IoT services are monitored and controlled through smartphone applications. By combining IoT with smartphones, many convenient IoT services have been provided to users. However, there are adverse underlying effects in such services including invasion of privacy and information leakage. In most cases, mobile devices have become cluttered with important personal user information as various services and contents are provided through them. Accordingly, attackers are expanding the scope of their attacks beyond the existing PC and Internet environment into mobile devices. In this paper, we apply a linear support vector machine (SVM to detect Android malware and compare the malware detection performance of SVM with that of other machine learning classifiers. Through experimental validation, we show that the SVM outperforms other machine learning classifiers.

  5. IoT-Based Library Automation and Monitoring system: Developing an Implementation framework of Implementation

    OpenAIRE

    Bayani, Majid; Segura, Alberto; Alvarado, Marjorie; Loaiza, Mayra

    2018-01-01

    Currently, the Information and Communication Technology (ICT) and related topics such as Internet of Things (IoT) have an essential influence on all elements of human life. IoT as a prevalent phenomenon is transforming daily life by the usage of the smart features of Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) technologies. As IoT progresses, it has extended in size and dimension, improving many contexts of the society; such as, the traditional library system. This...

  6. Access Control in IoT/M2M - Cloud Platform

    DEFF Research Database (Denmark)

    Anggorojati, Bayu

    Billions of devices are connected to the Internet nowadays, and the number will continue to grow in the future thanks to the advances in the electronics and telecommunication technology developments. Its application in broad aspects of human’s life brings a lot of benefits by improving productivity...... and quality of life. This paradigm, which is often called Internet of Things (IoT) or Machine-to-Machine (M2M), will provide an unprecedented opportunity to create applications and services that go far beyond the mere purpose of each participant. Many studies on the both technical and social aspects of Io......T have shown that the concern about the security and privacy play a huge role for the mass adoption of the IoT/M2M as cloud services. Among the important topics within the security and privacy, the access control is an important mechanism, which essentially manages how the important assets or resource...

  7. The Holistic Targeting (HOT) methodology as the means to improve Information Operations (IO) target development and prioritization

    OpenAIRE

    Ieva, Christopher S.

    2008-01-01

    Prioritization. In response to this challenge, this study proposes five recommendations to enhance IO integration into the Joint Targeting Cycle: the use of interim IO Joint Munitions Effectiveness Manual (JMEM) techniques to better forecast cognitive effects, the adoption of the Measure of Worth (MOW) model to assess IO effects, the HOT methodology to develop and prioritize IO targets, the use of compendium software facilitate targeting problem understanding and the network analysis to...

  8. A Software Product Line Process to Develop Agents for the IoT

    Directory of Open Access Journals (Sweden)

    Inmaculada Ayala

    2015-07-01

    Full Text Available One of the most important challenges of this decade is the Internet of Things (IoT, which aims to enable things to be connected anytime, anyplace, with anything and anyone, ideally using any path/network and any service. IoT systems are usually composed of heterogeneous and interconnected lightweight devices that support applications that are subject to change in their external environment and in the functioning of these devices. The management of the variability of these changes, autonomously, is a challenge in the development of these systems. Agents are a good option for developing self-managed IoT systems due to their distributed nature, context-awareness and self-adaptation. Our goal is to enhance the development of IoT applications using agents and software product lines (SPL. Specifically, we propose to use Self-StarMASMAS, multi-agent system agents and to define an SPL process using the Common Variability Language. In this contribution, we propose an SPL process for Self-StarMAS, paying particular attention to agents embedded in sensor motes.

  9. A Software Product Line Process to Develop Agents for the IoT.

    Science.gov (United States)

    Ayala, Inmaculada; Amor, Mercedes; Fuentes, Lidia; Troya, José M

    2015-07-01

    One of the most important challenges of this decade is the Internet of Things (IoT), which aims to enable things to be connected anytime, anyplace, with anything and anyone, ideally using any path/network and any service. IoT systems are usually composed of heterogeneous and interconnected lightweight devices that support applications that are subject to change in their external environment and in the functioning of these devices. The management of the variability of these changes, autonomously, is a challenge in the development of these systems. Agents are a good option for developing self-managed IoT systems due to their distributed nature, context-awareness and self-adaptation. Our goal is to enhance the development of IoT applications using agents and software product lines (SPL). Specifically, we propose to use Self-StarMASMAS, multi-agent system) agents and to define an SPL process using the Common Variability Language. In this contribution, we propose an SPL process for Self-StarMAS, paying particular attention to agents embedded in sensor motes.

  10. Learn Objective-C on the Mac for OS X and iOS

    CERN Document Server

    Knaster, Scott; Malik, Waqar

    2012-01-01

    Learn to write apps for some of today's hottest technologies, including the iPhone and iPad (using iOS), as well as the Mac (using OS X). It starts with Objective-C, the base language on which the native iOS software development kit (SDK) and the OS X are based. Learn Objective-C on the Mac: For OS X and iOS, Second Edition updates a best selling book and is an extensive, newly updated guide to Objective-C. Objective-C is a powerful, object-oriented extension of C, making this update the perfect follow-up to Dave Mark's bestselling Learn C on the Mac. Whether you're an experienced C programmer

  11. Enabling interoperability-as-a-service for connected IoT infrastructures and Smart Objects

    DEFF Research Database (Denmark)

    Hovstø, Asbjørn; Guan, Yajuan; Quintero, Juan Carlos Vasquez

    2018-01-01

    Lack of interoperability is considered as the most important barrier to achieve the global integration of Internet-of-Things (IoT) ecosystems across borders of different disciplines, vendors and standards. Indeed, the current IoT landscape consists of a large set of non-interoperable infrastructu...

  12. Leveraging Fog Computing for Scalable IoT Datacenter Using Spine-Leaf Network Topology

    Directory of Open Access Journals (Sweden)

    K. C. Okafor

    2017-01-01

    Full Text Available With the Internet of Everything (IoE paradigm that gathers almost every object online, huge traffic workload, bandwidth, security, and latency issues remain a concern for IoT users in today’s world. Besides, the scalability requirements found in the current IoT data processing (in the cloud can hardly be used for applications such as assisted living systems, Big Data analytic solutions, and smart embedded applications. This paper proposes an extended cloud IoT model that optimizes bandwidth while allowing edge devices (Internet-connected objects/devices to smartly process data without relying on a cloud network. Its integration with a massively scaled spine-leaf (SL network topology is highlighted. This is contrasted with a legacy multitier layered architecture housing network services and routing policies. The perspective offered in this paper explains how low-latency and bandwidth intensive applications can transfer data to the cloud (and then back to the edge application without impacting QoS performance. Consequently, a spine-leaf Fog computing network (SL-FCN is presented for reducing latency and network congestion issues in a highly distributed and multilayer virtualized IoT datacenter environment. This approach is cost-effective as it maximizes bandwidth while maintaining redundancy and resiliency against failures in mission critical applications.

  13. Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems

    Directory of Open Access Journals (Sweden)

    Yao Pan

    2017-03-01

    Full Text Available The Internet of Things (IoT has transformed many aspects of modern manufacturing, from design to production to quality control. In particular, IoT and digital manufacturing technologies have substantially accelerated product development- cycles and manufacturers can now create products of a complexity and precision not heretofore possible. New threats to supply chain security have arisen from connecting machines to the Internet and introducing complex IoT-based systems controlling manufacturing processes. By attacking these IoT-based manufacturing systems and tampering with digital files, attackers can manipulate physical characteristics of parts and change the dimensions, shapes, or mechanical properties of the parts, which can result in parts that fail in the field. These defects increase manufacturing costs and allow silent problems to occur only under certain loads that can threaten safety and/or lives. To understand potential dangers and protect manufacturing system safety, this paper presents two taxonomies: one for classifying cyber-physical attacks against manufacturing processes and another for quality control measures for counteracting these attacks. We systematically identify and classify possible cyber-physical attacks and connect the attacks with variations in manufacturing processes and quality control measures. Our taxonomies also provide a scheme for linking emerging IoT-based manufacturing system vulnerabilities to possible attacks and quality control measures.

  14. Enhancing Coverage in Narrow Band-IoT Using Machine Learning

    OpenAIRE

    Chafii , Marwa; Bader , Faouzi; Palicot , Jacques

    2018-01-01

    International audience; —Narrow Band-Internet of Thing (NB-IoT) is a recently proposed technology by 3GPP in Release-13. It provides low energy consumption and wide coverage in order to meet the requirements of its diverse applications that span social, industrial and environmental aspects. Increasing the number of repetitions of the transmission has been selected as a promising approach to enhance the coverage in NB-IoT up to 164 dB in terms of maximum coupling loss for uplink transmissions,...

  15. Towards Understanding of IoT Ecosystems in the Healthcare Sector

    OpenAIRE

    Pesonen, Ari; Sulin, Jussi

    2016-01-01

    This study aimed to outline an ecosystem to IoT based health/elderly care solutions and to the needs of both single actors and the whole ecosystem. Moreover, the aim was to understand the relations and dynamics between different actors in this ecosystem. The research questions for this study were: 1. How do industry professionals perceive the current state of health care? 2. How do the digitalization and IoT affect the health sector, and what advancements are needed to speed up the proces...

  16. An ARM-Compliant Architecture for User Privacy in Smart Cities: SMARTIE—Quality by Design in the IoT

    Directory of Open Access Journals (Sweden)

    V. Beltran

    2017-01-01

    Full Text Available Much has been said about the benefits that the Internet of Things (IoT will bring to citizens’ life. Countless smart objects will be soon offering autonomous behavior in smart environments by sensing the physical world around us, collecting information about us, and taking proactive actions (many times without our consent with the ultimate goal of improving our wellness. Without a strong guarantee on user privacy, the IoT may sound scary for many citizens. Indeed, the IoT-Architecture Reference Model (IoT-ARM is a European effort for promoting IoT quality aspects such as security and privacy. This paper paves the way to the adoption of reference architectures by describing the application of the IoT-ARM within a European-funded project, SMARTIE. The SMARTIE architecture has been designed to empower citizens to take control of their IoT devices and privacy, while guaranteeing scalability for large deployments in smart cities.

  17. Modeling IoT-Based Solutions Using Human-Centric Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Álvaro Monares

    2014-08-01

    Full Text Available The Internet of Things (IoT has inspired solutions that are already available for addressing problems in various application scenarios, such as healthcare, security, emergency support and tourism. However, there is no clear approach to modeling these systems and envisioning their capabilities at the design time. Therefore, the process of designing these systems is ad hoc and its real impact is evaluated once the solution is already implemented, which is risky and expensive. This paper proposes a modeling approach that uses human-centric wireless sensor networks to specify and evaluate models of IoT-based systems at the time of design, avoiding the need to spend time and effort on early implementations of immature designs. It allows designers to focus on the system design, leaving the implementation decisions for a next phase. The article illustrates the usefulness of this proposal through a running example, showing the design of an IoT-based solution to support the first responses during medium-sized or large urban incidents. The case study used in the proposal evaluation is based on a real train crash. The proposed modeling approach can be used to design IoT-based systems for other application scenarios, e.g., to support security operatives or monitor chronic patients in their homes.

  18. Modeling IoT-based solutions using human-centric wireless sensor networks.

    Science.gov (United States)

    Monares, Álvaro; Ochoa, Sergio F; Santos, Rodrigo; Orozco, Javier; Meseguer, Roc

    2014-08-25

    The Internet of Things (IoT) has inspired solutions that are already available for addressing problems in various application scenarios, such as healthcare, security, emergency support and tourism. However, there is no clear approach to modeling these systems and envisioning their capabilities at the design time. Therefore, the process of designing these systems is ad hoc and its real impact is evaluated once the solution is already implemented, which is risky and expensive. This paper proposes a modeling approach that uses human-centric wireless sensor networks to specify and evaluate models of IoT-based systems at the time of design, avoiding the need to spend time and effort on early implementations of immature designs. It allows designers to focus on the system design, leaving the implementation decisions for a next phase. The article illustrates the usefulness of this proposal through a running example, showing the design of an IoT-based solution to support the first responses during medium-sized or large urban incidents. The case study used in the proposal evaluation is based on a real train crash. The proposed modeling approach can be used to design IoT-based systems for other application scenarios, e.g., to support security operatives or monitor chronic patients in their homes.

  19. Active Volcanism on Io as Seen by Galileo SSI

    Science.gov (United States)

    McEwen, A.S.; Keszthelyi, L.; Geissler, P.; Simonelli, D.P.; Carr, M.H.; Johnson, T.V.; Klaasen, K.P.; Breneman, H.H.; Jones, T.J.; Kaufman, J.M.; Magee, K.P.; Senske, D.A.; Belton, M.J.S.; Schubert, G.

    1998-01-01

    Active volcanism on Io has been monitored during the nominal Galileo satellite tour from mid 1996 through late 1997. The Solid State Imaging (SSI) experiment was able to observe many manifestations of this active volcanism, including (1) changes in the color and albedo of the surface, (2) active airborne plumes, and (3) glowing vents seen in eclipse. About 30 large-scale (tens of kilometers) surface changes are obvious from comparison of the SSI images to those acquired by Voyager in 1979. These include new pyroclastic deposits of several colors, bright and dark flows, and caldera-floor materials. There have also been significant surface changes on Io during the Galileo mission itself, such as a new 400-km-diameter dark pyroclastic deposit around Pillan Patera. While these surface changes are impressive, the number of large-scale changes observed in the four months between the Voyager 1 and Voyager 2 flybys in 1979 suggested that over 17 years the cumulative changes would have been much more impressive. There are two reasons why this was not actually the case. First, it appears that the most widespread plume deposits are ephemeral and seem to disappear within a few years. Second, it appears that a large fraction of the volcanic activity is confined to repeated resurfacing of dark calderas and flow fields that cover only a few percent of Io's surface. The plume monitoring has revealed 10 active plumes, comparable to the 9 plumes observed by Voyager. One of these plumes was visible only in the first orbit and three became active in the later orbits. Only the Prometheus plume has been consistently active and easy to detect. Observations of the Pele plume have been particularly intriguing since it was detected only once by SSI, despite repeated attempts, but has been detected several times by the Hubble Space Telescope at 255 nm. Pele's plume is much taller (460 km) than during Voyager 1 (300 km) and much fainter at visible wavelengths. Prometheus-type plumes (50

  20. Adopting the Essence Framework to Derive a Practice Library for the Development of IoT Systems

    NARCIS (Netherlands)

    Giray, Görkem; Tekinerdogan, B.; Tüzün, E.

    2018-01-01

    The Internet of Things (IoT) is a global network of smart devices which enables these objects to collect and exchange data. Research in the IoT is still progressing, and it is now being applied in various domains. One of the key observations is that the development of IoT systems is not trivial and

  1. The Role of Internet of Things (IoT in Smart Cities: Technology Roadmap-oriented Approaches

    Directory of Open Access Journals (Sweden)

    Eunil Park

    2018-05-01

    Full Text Available Since the concept of a smart city was introduced, IoT (Internet of Things has beenconsidered the key infrastructure in a smart city. However, there are currently no detailed explanations of the technical contributions of IoT in terms of the management, development, and improvements of smart cities. Therefore, the current study describes the importance of IoT technologies on the technology roadmap (TRM of a smart city. Moreover, the survey with about 200 experts was conducted to investigate both the importance and essentiality of detail components of IoT technologies for a smart city. Based on the survey results, the focal points and essential elements for the successful developments of a smart city are presented.

  2. IoT-based flood embankments monitoring system

    Science.gov (United States)

    Michta, E.; Szulim, R.; Sojka-Piotrowska, A.; Piotrowski, K.

    2017-08-01

    In the paper a concept of flood embankments monitoring system based on using Internet of Things approach and Cloud Computing technologies will be presented. The proposed system consists of sensors, IoT nodes, Gateways and Cloud based services. Nodes communicates with the sensors measuring certain physical parameters describing the state of the embankments and communicates with the Gateways. Gateways are specialized active devices responsible for direct communication with the nodes, collecting sensor data, preprocess the data, applying local rules and communicate with the Cloud Services using communication API delivered by cloud services providers. Architecture of all of the system components will be proposed consisting IoT devices functionalities description, their communication model, software modules and services bases on using a public cloud computing platform like Microsoft Azure will be proposed. The most important aspects of maintaining the communication in a secure way will be shown.

  3. Optimizing mission critical data dissemination in massive IoT networks

    KAUST Repository

    Farooq, Muhammad Junaid

    2017-06-29

    Mission critical data dissemination in massive Internet of things (IoT) networks imposes constraints on the message transfer delay between devices. Due to low power and communication range of IoT devices, data is foreseen to be relayed over multiple device-to-device (D2D) links before reaching the destination. The coexistence of a massive number of IoT devices poses a challenge in maximizing the successful transmission capacity of the overall network alongside reducing the multi-hop transmission delay in order to support mission critical applications. There is a delicate interplay between the carrier sensing threshold of the contention based medium access protocol and the choice of packet forwarding strategy selected at each hop by the devices. The fundamental problem in optimizing the performance of such networks is to balance the tradeoff between conflicting performance objectives such as the spatial frequency reuse, transmission quality, and packet progress towards the destination. In this paper, we use a stochastic geometry approach to quantify the performance of multi-hop massive IoT networks in terms of the spatial frequency reuse and the transmission quality under different packet forwarding schemes. We also develop a comprehensive performance metric that can be used to optimize the system to achieve the best performance. The results can be used to select the best forwarding scheme and tune the carrier sensing threshold to optimize the performance of the network according to the delay constraints and transmission quality requirements.

  4. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    OpenAIRE

    Luis Cruz-Piris; Diego Rivera; Ivan Marsa-Maestre; Enrique de la Hoz; Juan R. Velasco

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to o...

  5. Security and Privacy Issues for an IoT based Smart Home

    OpenAIRE

    GENEIATAKIS DIMITRIOS; KOUNELIS IOANNIS; NEISSE RICARDO; NAI FOVINO IGOR; STERI GARY; BALDINI GIANMARCO

    2017-01-01

    Internet of Things (IoT) can support numerous applications and services in various domains, such as smart cities and smart homes. IoT smart objects interact with other components e.g., proxies, mobile devices, and data collectors, for management, data sharing and other activities in the context of the provided service. Though such components contribute to address various societal challenges and provide new advanced services for users, their limited processing capabilities make them vulnerable...

  6. Izrada 2D video igre za iOS platformu

    OpenAIRE

    Kampuš, Dominik

    2016-01-01

    Tema ovog završnog rada temelji se na izradi 2D video igre za iOS mobilni uređaj te njezinoj demonstraciji na istom. Kroz rad su opisane sve bitne funkcije GameSalad Creator-a koje su potrebne kod izrade igre bazirane na 2 dimenzije. Također se prolazi kroz iOS operativni sustav, što je on i kako se razvijao. Spominje se i tema koja govori općenito o igrama na mobilnim uređajima. U završnom dijelu rada prikazan je postupak izrade, koje funkcije programa se točno koriste i kako se igra može te...

  7. The Difference in Cervical Vertebral Skeletal Maturation between Cleft Lip/Palate and Non-Cleft Lip/Palate Orthodontic Patients

    Directory of Open Access Journals (Sweden)

    Waeil Batwa

    2018-01-01

    Full Text Available Objective. The aim was to evaluate differences in the cervical vertebral skeletal maturity of unilateral cleft lip and palate (UCLP and non-cleft lip/palate (non-CLP Saudi male orthodontic patients. Method. This cross-sectional multicenter study took place at the dental school, King Saud University and King Faisal Specialist Hospital and Research Center, Riyadh, Saudi Arabia, between October 2014 and September 2015. The records of Saudi male orthodontic patients with UCLP n=69 were collected. Cervical vertebral maturation was assessed using their cephalometric radiographs. The records of 138 age-matched non-CLP Saudi male orthodontic patients served as controls. Results. There was a significant difference in skeletal maturity between the UCLP and non-CLP groups, as evident in the delayed skeletal development among the UCLP participants. Moreover, pubertal growth spurt onset was significantly earlier in the non-cleft participants in comparison with the UCLP participants p=0.009. Conclusions. There is delayed skeletal maturity among the UCLP Saudi male population in comparison with their non-CLP age-matched peers.

  8. An IoT virtualization Framework for Fast and Lossless Communication

    DEFF Research Database (Denmark)

    Patil, Sulakshana; Mihovska, Albena D.; Prasad, Ramjee

    2014-01-01

    enough and lossless. The virtualization of the network allows for low computational complexity and improved processing efficiency. The various contributions have been made in the applications that were found by IoT. The proposed global framework controls data transmission delay, reduces the data loss......An internet of things (IoT) scenario is characterized by heterogeneity found in the types of participating nodes, networks and type of data exchange. This creates a complicated scenario in relation to decision making, management and reliability. The proposed paper focuses on the design...

  9. Getting priorities straight: improving Linux support for database I/O

    DEFF Research Database (Denmark)

    Hall, Christoffer; Bonnet, Philippe

    2005-01-01

    The Linux 2.6 kernel supports asynchronous I/O as a result of propositions from the database industry. This is a positive evolution but is it a panacea? In the context of the Badger project, a collaboration between MySQL AB and University of Copenhagen, ......The Linux 2.6 kernel supports asynchronous I/O as a result of propositions from the database industry. This is a positive evolution but is it a panacea? In the context of the Badger project, a collaboration between MySQL AB and University of Copenhagen, ...

  10. Coverage and Capacity Analysis of Sigfox, LoRa, GPRS, and NB-IoT

    DEFF Research Database (Denmark)

    Vejlgaard, Benny; Lauridsen, Mads; Nguyen, Huan Cong

    2017-01-01

    is challenged for indoor coverage. Furthermore, the study analyzes the capacity of the four technologies assuming a traffic growth from 1 to 10 IoT device per user. The conclusion is that the 95 %-tile uplink failure rate for outdoor users is below 5 % for all technologies. For indoor users only NB-IoT provides......In this paper the coverage and capacity of SigFox, LoRa, GPRS, and NB-IoT is compared using a real site deployment covering 8000 km2 in Northern Denmark. Using the existing Telenor cellular site grid it is shown that the four technologies have more than 99 % outdoor coverage, while GPRS...

  11. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  12. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Science.gov (United States)

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  13. Geologic mapping of the Amirani-Gish Bar region of Io: Implications for the global geologic mapping of Io

    Science.gov (United States)

    Williams, D.A.; Keszthelyi, L.P.; Crown, D.A.; Jaeger, W.L.; Schenk, P.M.

    2007-01-01

    We produced the first geologic map of the Amirani-Gish Bar region of Io, the last of four regional maps generated from Galileo mission data. The Amirani-Gish Bar region has five primary types of geologic materials: plains, mountains, patera floors, flows, and diffuse deposits. The flows and patera floors are thought to be compositionally similar, but are subdivided based on interpretations regarding their emplacement environments and mechanisms. Our mapping shows that volcanic activity in the Amirani-Gish Bar region is dominated by the Amirani Eruptive Center (AEC), now recognized to be part of an extensive, combined Amirani-Maui flow field. A mappable flow connects Amirani and Maui, suggesting that Maui is fed from Amirani, such that the post-Voyager designation "Maui Eruptive Center" should be revised. Amirani contains at least four hot spots detected by Galileo, and is the source of widespread bright (sulfur?) flows and active dark (silicate?) flows being emplaced in the Promethean style (slowly emplaced, compound flow fields). The floor of Gish Bar Patera has been partially resurfaced by dark lava flows, although other parts of its floor are bright and appeared unchanged during the Galileo mission. This suggests that the floor did not undergo complete resurfacing as a lava lake as proposed for other ionian paterae. There are several other hot spots in the region that are the sources of both active dark flows (confined within paterae), and SO2- and S2-rich diffuse deposits. Mapped diffuse deposits around fractures on mountains and in the plains appear to serve as the source for gas venting without the release of magma, an association previously unrecognized in this region. The six mountains mapped in this region exhibit various states of degradation. In addition to gaining insight into this region of Io, all four maps are studied to assess the best methodology to use to produce a new global geologic map of Io based on the newly released, combined Galileo

  14. Theoretical investigations of the IO,{sup q+} (q = 2, 3, 4) multi-charged ions: Metastability, characterization and spectroscopy

    Energy Technology Data Exchange (ETDEWEB)

    Hammami, H. [Université Paris-Est, Laboratoire Modélisation et Simulation Multi Echelle, MSME UMR 8208 CNRS, 5 bd Descartes, 77454 Marne-la-Vallée (France); EMIR, Institut Préparatoire aux Etudes d’Ingénieurs, Monastir (Tunisia); Yazidi, O. [Laboratoire de Spectroscopie Atomique Moléculaire et Applications, Département de Physique, Faculté des Sciences de Tunis, Université de Tunis-El Manar, Le Belvédère, 1060 Tunis (Tunisia); Ben El Hadj Rhouma, M. [EMIR, Institut Préparatoire aux Etudes d’Ingénieurs, Monastir (Tunisia); Al Mogren, M. M. [Chemistry Department, Faculty of Science, King Saud University, PO Box 2455, Riyadh 11451 (Saudi Arabia); Hochlaf, M., E-mail: hochlaf@univ-mlv.fr [Université Paris-Est, Laboratoire Modélisation et Simulation Multi Echelle, MSME UMR 8208 CNRS, 5 bd Descartes, 77454 Marne-la-Vallée (France)

    2014-07-07

    Using ab initio methodology, we studied the IO{sup q+} (q = 2, 3, 4) multi-charged ions. Benchmark computations on the IO(X{sup 2}Π) neutral species allow validate the current procedure. For IO{sup 2+}, several potential wells were found on the ground and the electronic excited states potentials with potential barriers with respect to dissociation, where this dication can exist in the gas phase as long-lived metastable molecules. We confirm hence the recent observation of the dication by mass spectrometry. Moreover, we predict the existence of the metastable IO{sup 3+} trication, where a shallow potential well along the IO internuclear distance is computed. This potential well supports more than 10 vibrational levels. The IO{sup 3+} excited states are repulsive in nature, as well as the computed potentials for the IO{sup 4+} tetracation. For the bound states, we give a set of spectroscopic parameters including excitation transition energies, equilibrium distances, harmonic and anharmonic vibrational terms, and rotational constants. At the MRCI + Q/aug-cc-pV5Z(-PP) level, the adiabatic double and triple ionization energies of IO are computed to be ∼28.1 eV and ∼55.0 eV, respectively.

  15. Role of Non-Volatile Memories in Automotive and IoT Markets

    Science.gov (United States)

    2017-03-01

    Standard Manufacturing Supply Long Term Short to Medium Term Density Up to 16MB Up to 2MB IO Configuration Up to x128 Up to x32 Design for Test...Role of Non-Volatile Memories in Automotive and IoT Markets Vipin Tiwari Director, Business Development and Product Marketing SST – A Wholly Own...microcontrollers (MCU) and certainly one of the most challenging elements to master. This paper addresses the role of non-volatile memories for

  16. TRESCIMO M2M-IoT testbed: smart cities solutions in Europe and Africa

    CSIR Research Space (South Africa)

    Barros, M

    2016-06-01

    Full Text Available component federation are required. TRESCIMO is a project that created facilities to experiment with services distributed over continents for two IoT domain trials and developed a general solution for scaling the IoT infrastructure in a Proof...

  17. The Role of Internet of Things (IoT) in Smart Cities: Technology Roadmap-oriented Approaches

    OpenAIRE

    Eunil Park; Angel P. del Pobil; Sang Jib Kwon

    2018-01-01

    Since the concept of a smart city was introduced, IoT (Internet of Things) has beenconsidered the key infrastructure in a smart city. However, there are currently no detailed explanations of the technical contributions of IoT in terms of the management, development, and improvements of smart cities. Therefore, the current study describes the importance of IoT technologies on the technology roadmap (TRM) of a smart city. Moreover, the survey with about 200 experts was conducted to investigate ...

  18. Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT

    Directory of Open Access Journals (Sweden)

    Hongyang Yan

    2018-06-01

    Full Text Available In recent years, the Internet of Things (IoT has found wide application and attracted much attention. Since most of the end-terminals in IoT have limited capabilities for storage and computing, it has become a trend to outsource the data from local to cloud computing. To further reduce the communication bandwidth and storage space, data deduplication has been widely adopted to eliminate the redundant data. However, since data collected in IoT are sensitive and closely related to users’ personal information, the privacy protection of users’ information becomes a challenge. As the channels, like the wireless channels between the terminals and the cloud servers in IoT, are public and the cloud servers are not fully trusted, data have to be encrypted before being uploaded to the cloud. However, encryption makes the performance of deduplication by the cloud server difficult because the ciphertext will be different even if the underlying plaintext is identical. In this paper, we build a centralized privacy-preserving duplicate removal storage system, which supports both file-level and block-level deduplication. In order to avoid the leakage of statistical information of data, Intel Software Guard Extensions (SGX technology is utilized to protect the deduplication process on the cloud server. The results of the experimental analysis demonstrate that the new scheme can significantly improve the deduplication efficiency and enhance the security. It is envisioned that the duplicated removal system with privacy preservation will be of great use in the centralized storage environment of IoT.

  19. Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT.

    Science.gov (United States)

    Yan, Hongyang; Li, Xuan; Wang, Yu; Jia, Chunfu

    2018-06-04

    In recent years, the Internet of Things (IoT) has found wide application and attracted much attention. Since most of the end-terminals in IoT have limited capabilities for storage and computing, it has become a trend to outsource the data from local to cloud computing. To further reduce the communication bandwidth and storage space, data deduplication has been widely adopted to eliminate the redundant data. However, since data collected in IoT are sensitive and closely related to users' personal information, the privacy protection of users' information becomes a challenge. As the channels, like the wireless channels between the terminals and the cloud servers in IoT, are public and the cloud servers are not fully trusted, data have to be encrypted before being uploaded to the cloud. However, encryption makes the performance of deduplication by the cloud server difficult because the ciphertext will be different even if the underlying plaintext is identical. In this paper, we build a centralized privacy-preserving duplicate removal storage system, which supports both file-level and block-level deduplication. In order to avoid the leakage of statistical information of data, Intel Software Guard Extensions (SGX) technology is utilized to protect the deduplication process on the cloud server. The results of the experimental analysis demonstrate that the new scheme can significantly improve the deduplication efficiency and enhance the security. It is envisioned that the duplicated removal system with privacy preservation will be of great use in the centralized storage environment of IoT.

  20. Io with Loki Plume on Bright Limb

    Science.gov (United States)

    1990-01-01

    Voyager 1 image of Io showing active plume of Loki on limb. Heart-shaped feature southeast of Loki consists of fallout deposits from active plume Pele. The images that make up this mosaic were taken from an average distance of approximately 490,000 kilometers (340,000 miles).

  1. On possible life on Jupiter's satellite Io

    Science.gov (United States)

    Vidmachenko, A. P.

    2018-05-01

    Some of the satellites of Jupiter may well be suitable both for mastering, and for finding possible traces of life there. Among them such satellite like Io - nearest Galilean satellite of Jupiter, and one of the most volcanically active bodies in the solar system. Warming of the mantle is caused by a powerful tidal force from the side of Jupiter. This leads to the heating of some parts of the mantle to a temperature above 1800 K, with an average surface temperature of about 140 K. But under its surface can be safe and even comfortable shelters, where life could once have come from the outside (even in a very primitive form), and could survive to this day. Moreover, according to some model's assumptions, Io could sometime be formed in another part of the Solar system, where the water could exist. Note that on neighboring Galilean satellites now exist significant amounts of water .

  2. Global Distribution of Active Volcanism on Io as Known at the End of the Galileo Mission

    Science.gov (United States)

    Lopes, Rosaly M. C.; Kamp. Lucas W.; Smythe, W. D.; Radebaugh, J.; Turtle, E.; Perry, J.; Bruno, B.

    2004-01-01

    Hot spots are manifestations of Io s mechanism of internal heating and heat transfer. Therefore, the global distribution of hot spots and their power output has important implications for how Io is losing heat. The end of the Galileo mission is an opportune time to revisit studies of the distribution of hot spots on Io, and to investigate the distribution of their power output.

  3. A PhD abstract presentation on Cluster Framework for Internet of People, Things and Services (IoPTS)

    DEFF Research Database (Denmark)

    Shinde, Gitanjali; Olesen, Henning

    2014-01-01

    The Internet of Things (IoT) is a revolutionary technology, where devices around us are capable of sensing, reacting, responding and working autonomously to provide services to the users /people, e.g. smart homes, enterprise, utilities and e-Health. In the IoT paradigm, every device will be conne......The Internet of Things (IoT) is a revolutionary technology, where devices around us are capable of sensing, reacting, responding and working autonomously to provide services to the users /people, e.g. smart homes, enterprise, utilities and e-Health. In the IoT paradigm, every device...... will be connected to the Internet to provide services to the user. Bringing this together makes it relevant to talk about the "Internet of People, Things and Services (IoPTS)."However, managing such a huge number of devices is a major challenge for IoPTS. In any given context, a number of devices will work together...... announce their services to those who need them. Users can access these services with the help of widely interconnected devices. To access the services user has to provide some personal data. In IoPTS services are large in numbers, and to protect the user data there is a need to ensure that these services...

  4. Galileo's Last Fly-Bys of Io: NIMS Observations of Loki, Tupan, and Emakong Calderas

    Science.gov (United States)

    Lopes, Rosaly M. C.; Kamp, L. W.; Davies, A. G.; Smythe, W. D.; Carlson, R. W.; Doute, S.; McEwen, A.; Turtle, E. P.; Leader, F.; Mehlman, R.

    2002-01-01

    NIMS results from the 2001 Galileo fly-bys of Io will be presented, focusing on three calderas that may contain lava lakes. Preliminary results from the January 2002 Io fly-by will be presented. Additional information is contained in the original extended abstract.

  5. Interactive Level Design for iOS Assignment Delivery: A Case Study

    Directory of Open Access Journals (Sweden)

    Anson Brown

    2014-02-01

    Full Text Available This paper presents an application of an iOS-based online gaming assignment in a real classroom. The core concept of the project is a gameplay environment involving two players that have full control over creation and modification of levels. This level design mechanism was implemented in an iOS-based game in the area of genetics and based on an existing written assignment. The game includes support for both instructors, who have the ability to create and post assignments and students, who can take the assignments. Two trials of the iOS application consisted of in-class testing of twenty- one students. Students first took the original paper assignment, followed by the iOS version. Start times, end times, and grades were recorded for both versions. A comprehensive study of the grades and times for the iOS version of the assignment versus the paper version was conducted and is presented in this paper. Our Study showed that the iOS version was completed much faster in nearly every case while a strong delivery mechanism is needed to ensure student grades and completion of the assignment will not be affected. These results are not unexpected due to some major difference between the two formats. Future updates and additions will address any currently existing issues.

  6. Impact of impurities on the α-LiIO{sub 3} crystal growth: Technique for measuring the “dead zone”

    Energy Technology Data Exchange (ETDEWEB)

    Noskova, A. N., E-mail: anna-13.08@mail.ru; Rubakha, V. I.; Prokhorov, A. P. [Russian Academy of Sciences, Institute of Applied Physics (Russian Federation)

    2017-01-15

    Lithium iodate (α-LiIO{sub 3}) single crystal is a promising nonlinear optical material, which used for efficient laser radiation conversion in the visible and near-IR regions. A technique for measuring the “dead zone” (ΔТ{sub dz}) of LiIO{sub 3} solutions has been developed; data on the impact of Fe(IO{sub 3}){sub 2}, AgIO{sub 3}, CsOH, H{sub 3}PO{sub 4}, and methyl methacrylate on the growth of the (100) face of α-LiIO{sub 3} crystals have been presented; and the dependences of the nucleation and motion of single steps on the degree of supersaturation have been measured. It is shown that the ΔТ{sub dz} value makes it possible to estimate the validity of solutions for growing α-LiIO{sub 3} crystals. The results of measuring the face growth rates and step velocities for KDP and α-LiIO{sub 3} crystals are compared.

  7. Seeking opportunities in the Internet of Things (IoT): : A Study of IT values co-creation in the IoT ecosystem while considering the potential impacts of the EU General Data Protection Regulations (GDPR).

    OpenAIRE

    Ford, David Thomas; Qamar, Sreman

    2017-01-01

    In this thesis, we have studied the phenomena of value co-creation in IoT ecosystem, while considering the potential impacts of GDPR on IT value co-creation in the IoT ecosystem. IT firms’ ability to create value is an important aspect of their existence and growth in which case they pursuit different and several means to accomplish this task. IT firms that operate within the IoT ecosystem are categorised as Enablers, Engagers, and Enhancers who interact, work together to provide the technolo...

  8. IoT E-business applications

    OpenAIRE

    Radu BUCEA-MANEA-TONIS; Rocsana B. Manea Tonis

    2017-01-01

    “Internet of things” (IoT) will develop soon an ecosystem of internet-connected things, that facilitate the mobile commerce experiences and the client need to be informed all the time. It will be associated with a feeling of freedom and capacity of doing very easy what was considered difficult in the past. Nevertheless, these opportunities will not be capitalized upon without overcoming a series of obstacles, including addressing consumer privacy concerns, the long replacement cycles of du...

  9. Design and Implementation of an IoT Access Point for Smart Home

    Directory of Open Access Journals (Sweden)

    Chih-Yung Chang

    2015-12-01

    Full Text Available Network communication and micro-electro-mechanical embedded technologies have attracted much attention in recent years. Through these technologies, the capabilities of sensing, identification, and communication can be embedded in various smart devices. These smart devices can automatically connect to the Internet and form an intelligent network called Internet of Things (IoT. However, these devices are embedded with different wireless communication interfaces such as Wi-Fi and ZigBee. This paper presents the design and implementation of an IoT access point that supports functionalities of coordination of various wireless transmission protocols. Based on the existing Wi-Fi access point, we have embedded a ZigBee module and implemented ZigBee and UPnP protocols into the designed IoT access point, which supports ZigBee communication capabilities over the Internet.

  10. Top-Down Delivery of IoT-based Applications for Seniors Behavior Change Capturing Exploiting a Model-Driven Approach

    OpenAIRE

    Fiore, Alessandro; Caione, Adriana; Mainetti, Luca; Manco, Luigi; Vergallo, Roberto

    2018-01-01

    Developing Internet of Things (IoT) requires expertise and considerable skills in different fields in order to cover all the involved heterogeneous technologies, communication formats and protocols. Developers and experts ask for new solutions that speed up the prototyping of IoT applications. One of these solutions is Web of Topics (WoX) middleware, a model-driven Cloud platform that aims to ease IoT applications developing, introducing a strong semantic abstraction of the IoT concepts. In W...

  11. The hint protocol: Using a broadcast method to enable ID-free data transmission for dense IoT devices

    OpenAIRE

    Ren, Yi; Wu, Ren-Jie; Tseng, Yu-Chee

    2017-01-01

    IoT (Internet of Things) has attracted a lot of attention recently. IoT devices need to report their data or status to base stations at various frequencies. The IoT communications observed by a base station normally exhibit the following characteristics: (1) massively connected, (2) lightly loaded per packet, and (3) periodical or at least mostly predictable. The current design principals of communication networks, when applied to IoT scenarios, however, do not fit well to these requirements....

  12. Design and Implementation of Cloud-Centric Configuration Repository for DIY IoT Applications.

    Science.gov (United States)

    Ahmad, Shabir; Hang, Lei; Kim, Do Hyeun

    2018-02-06

    The Do-It-Yourself (DIY) vision for the design of a smart and customizable IoT application demands the involvement of the general public in its development process. The general public lacks the technical knowledge for programming state-of-the-art prototyping and development kits. The latest IoT kits, for example, Raspberry Pi, are revolutionizing the DIY paradigm for IoT, and more than ever, a DIY intuitive programming interface is required to enable the masses to interact with and customize the behavior of remote IoT devices on the Internet. However, in most cases, these DIY toolkits store the resultant configuration data in local storage and, thus, cannot be accessed remotely. This paper presents the novel implementation of such a system, which not only enables the general public to customize the behavior of remote IoT devices through a visual interface, but also makes the configuration available everywhere and anytime by leveraging the power of cloud-based platforms. The interface enables the visualization of the resources exposed by remote embedded resources in the form of graphical virtual objects (VOs). These VOs are used to create the service design through simple operations like drag-and-drop and the setting of properties. The configuration created as a result is maintained as an XML document, which is ingested by the cloud platform, thus making it available to be used anywhere. We use the HTTP approach for the communication between the cloud and IoT toolbox and the cloud and real devices, but for communication between the toolbox and actual resources, CoAP is used. Finally, a smart home case study has been implemented and presented in order to assess the effectiveness of the proposed work.

  13. Design and Implementation of Cloud-Centric Configuration Repository for DIY IoT Applications

    Directory of Open Access Journals (Sweden)

    Shabir Ahmad

    2018-02-01

    Full Text Available The Do-It-Yourself (DIY vision for the design of a smart and customizable IoT application demands the involvement of the general public in its development process. The general public lacks the technical knowledge for programming state-of-the-art prototyping and development kits. The latest IoT kits, for example, Raspberry Pi, are revolutionizing the DIY paradigm for IoT, and more than ever, a DIY intuitive programming interface is required to enable the masses to interact with and customize the behavior of remote IoT devices on the Internet. However, in most cases, these DIY toolkits store the resultant configuration data in local storage and, thus, cannot be accessed remotely. This paper presents the novel implementation of such a system, which not only enables the general public to customize the behavior of remote IoT devices through a visual interface, but also makes the configuration available everywhere and anytime by leveraging the power of cloud-based platforms. The interface enables the visualization of the resources exposed by remote embedded resources in the form of graphical virtual objects (VOs. These VOs are used to create the service design through simple operations like drag-and-drop and the setting of properties. The configuration created as a result is maintained as an XML document, which is ingested by the cloud platform, thus making it available to be used anywhere. We use the HTTP approach for the communication between the cloud and IoT toolbox and the cloud and real devices, but for communication between the toolbox and actual resources, CoAP is used. Finally, a smart home case study has been implemented and presented in order to assess the effectiveness of the proposed work.

  14. Beginning iPhone 4 Development Exploring the IOS SDK

    CERN Document Server

    Nutting, Jack; LaMarche, Jeff

    2011-01-01

    The authors of the bestselling Beginning iPhone 3 Development are back, with the same excellent material completely updated for iOS 4 and written from the ground up using the latest version of Apple's Xcode 3. All source code has been updated to use the latest Xcode templates and current APIs, and all-new screenshots show Xcode 3 in action. Beginning iPhone 4 Development is a complete course in iOS development. You'll master techniques that work on iPhone, iPad, and iPod touch. We start with the basics, showing you how to download and install the tools you'll need, and how to create your first

  15. Pro Core Data for iOS Data Access and Persistence Engine for iPhone, iPad, and iPod Touch

    CERN Document Server

    Privat, M

    2011-01-01

    The power of Core Data allows iOS developers to efficiently store and retrieve application data using familiar object-oriented paradigms. Pro Core Data for iOS explains both how and why to use Core Data for data storage, from simple to advanced techniques. Covering common and advanced persistence patterns, this book prepares any iOS developer to store and retrieve data accurately and proficiently. Lots of iOS development books touch on Core Data, taking you through a few mainstream use cases for storing and retrieving data in your iOS applications. In Pro Core Data for iOS, however, we take yo

  16. An IoT Knowledge Reengineering Framework for Semantic Knowledge Analytics for BI-Services

    Directory of Open Access Journals (Sweden)

    Nilamadhab Mishra

    2015-01-01

    Full Text Available In a progressive business intelligence (BI environment, IoT knowledge analytics are becoming an increasingly challenging problem because of rapid changes of knowledge context scenarios along with increasing data production scales with business requirements that ultimately transform a working knowledge base into a superseded state. Such a superseded knowledge base lacks adequate knowledge context scenarios, and the semantics, rules, frames, and ontology contents may not meet the latest requirements of contemporary BI-services. Thus, reengineering a superseded knowledge base into a renovated knowledge base system can yield greater business value and is more cost effective and feasible than standardising a new system for the same purpose. Thus, in this work, we propose an IoT knowledge reengineering framework (IKR framework for implementation in a neurofuzzy system to build, organise, and reuse knowledge to provide BI-services to the things (man, machines, places, and processes involved in business through the network of IoT objects. The analysis and discussion show that the IKR framework can be well suited to creating improved anticipation in IoT-driven BI-applications.

  17. A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications

    OpenAIRE

    Sikder, Amit Kumar; Petracca, Giuseppe; Aksu, Hidayet; Jaeger, Trent; Uluagac, A. Selcuk

    2018-01-01

    The concept of Internet of Things (IoT) has become more popular in the modern era of technology than ever before. From small household devices to large industrial machines, the vision of IoT has made it possible to connect the devices with the physical world around them. This increasing popularity has also made the IoT devices and applications in the center of attention among attackers. Already, several types of malicious activities exist that attempt to compromise the security and privacy of...

  18. Stealth low-level manipulation of programmable logic controllers I/O by pin control exploitation

    NARCIS (Netherlands)

    Abbasi, A.; Hashemi, M.; Zambon, E.; Etalle, S.; Havarneanu, G.; Setola, R.; Nassopoulos, H.; Wolthusen, S.

    2016-01-01

    Input/OutputisthemechanismthroughwhichProgrammable Logic Controllers (PLCs) interact with and control the outside world. Particularly when employed in critical infrastructures, the I/O of PLCs has to be both reliable and secure. PLCs I/O like other embedded devices are controlled by a pin based

  19. The relevance of technological autonomy in the acceptance of IoT services in retail

    NARCIS (Netherlands)

    Constantinides, Efthymios; Kahlert, Marius; de Vries, Sjoerd A.

    2017-01-01

    The Internet of Things (IoT) represents a shift towards a digitally enriched environment connecting smart objects and users that promises to provide retailers with innovative ways to approach their customers. IoT technologies differ from previous innovations as they are ubiquitous, intelligent and

  20. An IoT Reader for Wireless Passive Electromagnetic Sensors.

    Science.gov (United States)

    Galindo-Romera, Gabriel; Carnerero-Cano, Javier; Martínez-Martínez, José Juan; Herraiz-Martínez, Francisco Javier

    2017-03-28

    In the last years, many passive electromagnetic sensors have been reported. Some of these sensors are used for measuring harmful substances. Moreover, the response of these sensors is usually obtained with laboratory equipment. This approach highly increases the total cost and complexity of the sensing system. In this work, a novel low-cost and portable Internet-of-Things (IoT) reader for passive wireless electromagnetic sensors is proposed. The reader is used to interrogate the sensors within a short-range wireless link avoiding the direct contact with the substances under test. The IoT functionalities of the reader allows remote sensing from computers and handheld devices. For that purpose, the proposed design is based on four functional layers: the radiating layer, the RF interface, the IoT mini-computer and the power unit. In this paper a demonstrator of the proposed reader is designed and manufactured. The demonstrator shows, through the remote measurement of different substances, that the proposed system can estimate the dielectric permittivity. It has been demonstrated that a linear approximation with a small error can be extracted from the reader measurements. It is remarkable that the proposed reader can be used with other type of electromagnetic sensors, which transduce the magnitude variations in the frequency domain.

  1. DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation

    Directory of Open Access Journals (Sweden)

    Michele De Donno

    2018-01-01

    Full Text Available The Internet of Things (IoT revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable objects. Not surprisingly, this sudden flooding of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware seen so far.

  2. Multiple Input Energy Harvesting Systems for Autonomous IoT End-Nodes

    Directory of Open Access Journals (Sweden)

    Johan J. Estrada-López

    2018-03-01

    Full Text Available The Internet-of-Things (IoT paradigm is under constant development and is being enabled by the latest research work from both industrial and academic communities. Among the many contributions in such diverse areas as sensor manufacturing, network protocols, and wireless communications, energy harvesting techniques stand out as a key enabling technology for the realization of batteryless IoT end-node systems. In this paper, we give an overview of the recent developments in circuit design for ultra-low power management units (PMUs, focusing mainly in the architectures and techniques required for energy harvesting from multiple heterogeneous sources. The paper starts by discussing a general structure for IoT end-nodes and the main characteristics of PMUs for energy harvesting. Then, an overview is given of different published works for multisource power harvesting, observing their main advantages and disadvantages and comparing their performance. Finally, some open areas of research in multisource harvesting are observed and relevant conclusions are given.

  3. QAaaS in a Cloud IoT Ecosystem

    Directory of Open Access Journals (Sweden)

    Bogdan GHILIC-MICU

    2017-01-01

    Full Text Available The current transition state of the global society, both from economic and (mostly technological perspective, goes – again – into overtime. Borrowed from fundamental domains and applied into science and research, the latest technological developments are built on graphene, silicene, phosphorene and stanene. The fourth industrial revolution changes perceptions and redefines the status of the individual, transforming him from con-sumer into pro-sumer of energy. Spintronics stimulates the production of accessories specific to the Internet of Things (IoT, like smart clothes connected to internet and implanted phones. Additionally, technology influences software development methodologies facing us with paradigms that transcend philosophies like green, grid, cloud computing and advance toward a superior manifestation of computer programming: Fog Computing (with the next level being presumably Rainbow Computing. Within this avalanche of transformations, technologies and paradigms, one aspect that has to evolve continuously is the quality assurance (QA. Hidden under various concept or methodology encapsulations, quality assurance in all fields and mostly in technological development and software paradigm play a key role. In an ecosystem defined by the context of Cloud IoT, quality assurance as service becomes a real challenge. In this paper we highlight the ways the ecosystem engages in its development not only things, beings, energies, sensors or objects but also technologies. One such popular technology is cloud computing which, in the context of IoT, sees a spectacular development of its own cluster of services, a potential such service being QAaaS.

  4. Learn Unity 4 for iOS game development

    CERN Document Server

    Chu, Philip

    2013-01-01

    The only book on Unity 4 game development The only up-to-date book on Unity for iOS Philip Chu is the author of a very popular online Unity tutorial, frequently recommended on sites like StackOverflow

  5. Near-surface flow of volcanic gases on Io

    International Nuclear Information System (INIS)

    Lee, S.W.; Thomas, P.C.

    1980-01-01

    Significant near-surface flow of gas several hundred kilometers from Pele (Plume 1) on Io is indicated by a series of bright, elongate albedo markings. Particles produced at small, local vents are apparently carried as much as 70 km farther 'downwind' from Pele. The gas densities and velocities necessary to suspend 0.1 to 10 micron particles at such a distance imply mass flow rates of 10 to the 7th - 10 to the 9th g/sec. Such flow rates are consistent with other estimates of mass transport by the plume. The large flow rates so far from the source allow an estimate of the rate of resurfacing of Io by lava flows and pyroclastics that is independent of estimates based on meteorite flux or on the amount of solids carried within the plumes themselves

  6. Characterization of Io's volcanic activity by infrared polarimetry

    International Nuclear Information System (INIS)

    Goguen, J.D.; Sinton, W.M.

    1985-01-01

    The thermal emission from Io's volcanic hot spots is linearly polarized.Infrared measurements at 4.76 micrometers show disk-integrated polarization as large as 1.6 percent. The degree and position angle of linear polarization vary with Io's rotation in a manner characteristic of emission from a small number of hot spots. A model incorporating three hot spots best fits the data. The largest of these hot spots lies to the northeast of Loki Patera, as mapped from Voyager, and the other spot on the trailing hemisphere is near Ra Patera. The hot spot on the leading hemisphere corresponds to no named feature on the Voyager maps. The value determined for the index of refraction of the emitting surface is a lower bound; it is similar to that of terrestrial basalts and is somewhat less than that of sulfur. 25 references

  7. City Hub : a cloud based IoT platform for Smart Cities

    OpenAIRE

    Lea, Rodger; Blackstock, Michael

    2014-01-01

    Cloud based Smart City hubs are an attractive approach to addressing some of the complex issues faced when deploying PaaS infrastructure for Smart Cities. In this paper we introduce the general notion of IoT hubs and then discusses our work to generalize our IoT hub as a Smart City PaaS. Two key issues are identified, support for hybrid public/private cloud and interoperability. We briefly describe our approach to these issues and discuss our experiences deploying two cloud-based Smart City h...

  8. SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers

    Directory of Open Access Journals (Sweden)

    Vishal Sharma

    2017-01-01

    Full Text Available Internet of things (IoT aims at bringing together large business enterprise solutions and architectures for handling the huge amount of data generated by millions of devices. For this aim, IoT is necessary to connect various devices and provide a common platform for storage and retrieval of information without fail. However, the success of IoT depends on the novelty of network and its capability in sustaining the increasing demand by users. In this paper, a self-aware communication architecture (SACA is proposed for sustainable networking over IoT devices. The proposed approach employs the concept of mobile fog servers which make relay using the train and unmanned aerial vehicle (UAV networks. The problem is presented based on Wald’s maximum model, which is resolved by the application of a distributed node management (DNM system and state dependency formulations. The proposed approach is capable of providing prolonged connectivity by increasing the network reliability and sustainability even in the case of failures. The effectiveness of the proposed approach is demonstrated through numerical and network simulations in terms of significant gains attained with lesser delay and fewer packet losses. The proposed approach is also evaluated against Sybil, wormhole, and DDoS attacks for analyzing its sustainability and probability of connectivity in unfavorable conditions.

  9. Data Compatibility to Enhance Sustainable Capabilities for Autonomous Analytics in IoT

    Directory of Open Access Journals (Sweden)

    Kaleem Razzaq Malik

    2017-05-01

    Full Text Available The collection of raw data is based on sensors embedded in devices or the environment for real-time data extraction. Nowadays, the Internet of Things (IoT environment is used to support autonomous data collection by reducing human involvement. It is hard to analyze such data, especially when working with the sensors in a real-time environment. On using data analytics in IoT with the help of RDF, many issues can be resolved. Resultant data will have a better chance of quality analytics by reforming data into the semantical annotation. Industrial correspondence through data will be improved by the induction of semantics at large due to efficient data capturing, whereas one popular medium of sensors’ data storage is Relational Database (RDB. This study provides a complete automated mechanism to transform from loosely structured data stored in RDB into RDF. These data are obtained from sensors in semantically annotated RDF stores. The given study comprises methodology for improving compatibility by introducing bidirectional transformation between classical DB and RDF data stores to enhance the sustainable capabilities of IoT systems for autonomous analytics. Two case studies, one on weather and another on heart-rate measurement collections through IoT sensors, are used to show the transformation process in operation.

  10. High-level Programming and Symbolic Reasoning on IoT Resource Constrained Devices

    Directory of Open Access Journals (Sweden)

    Sal vatore Gaglio

    2015-05-01

    Full Text Available While the vision of Internet of Things (IoT is rather inspiring, its practical implementation remains challenging. Conventional programming approaches prove unsuitable to provide IoT resource constrained devices with the distributed processing capabilities required to implement intelligent, autonomic, and self-organizing behaviors. In our previous work, we had already proposed an alternative programming methodology for such systems that is characterized by high-level programming and symbolic expressions evaluation, and developed a lightweight middleware to support it. Our approach allows for interactive programming of deployed nodes, and it is based on the simple but e ective paradigm of executable code exchange among nodes. In this paper, we show how our methodology can be used to provide IoT resource constrained devices with reasoning abilities by implementing a Fuzzy Logic symbolic extension on deployed nodes at runtime.

  11. Constructing a multi-sided business model for a smart horizontal IoT service platform

    NARCIS (Netherlands)

    Berkers, F.; Roelands, M.; Bomhof, F.; Bachet, T.; Van Rijn, M.; Koers, W.

    2013-01-01

    In order to realize a viable business ecosystem in the Internet of Things (IoT), we investigated how a smart horizontal IoT service platform can bring value and economies of scale to all required ecosystem stakeholders. By means of an example application domain case, this paper constructs a

  12. Threshold Cryptography-based Group Authentication (TCGA) Scheme for the Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Prasad, Neeli R.; Prasad, Ramjee

    2014-01-01

    Internet of things (IoT) is an emerging paradigm where the devices around us (persistent and non-persistent) are connected to each other to provide seamless communication, and contextual services. In the IoT, each device cannot be authenticated in the short time due to unbounded number of devices...

  13. Proposed on Device Capability based Authentication using AES-GCM for Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Babar, Sachin D.; Mahalle, Parikshit N.; Prasad, Neeli R.

    2011-01-01

    Economics of scale in Internet of Things (IoT) presents new security challenges for ubiquitous devices in terms of authentication, addressing and embedded security. Currently available cryptographic techniques require further analysis to determine applicability to IoT. We introduce...

  14. Optical fiber sensors for IoT and smart devices

    CERN Document Server

    Domingues, Maria de Fátima F

    2017-01-01

    This brief provides a review of the evolution of optical fiber sensing solutions and related applications. Unique production methods are presented and discussed, highlighting their evolution and analyzing their complexity. Under this scope, this brief presents the existing silica optical fiber sensors and polymer optical fiber sensors solutions, comparing its field of action (sensitivity, accuracy), complexity of manufacture and economic cost. Special attention is given to low-cost production methods. This brief evaluates the different existing techniques, assessing the accuracy and suitability of these sensors for possible Internet of Things (IoT) integration in different considered scenarios. Critical analytical techniques, also covered in this brief, are expected to play a key role in the world of IoT and the smart city of tomorrow.

  15. Ideation of IoT services with citizen: coupling GenIoT and AloHa! methods

    OpenAIRE

    Negri , Anne-Laure; Trousse , Brigitte; Senach , Bernard

    2012-01-01

    International audience; This paper introduces a methodology for designing service concepts in the specific paradigm of the Internet of Things (IoT). In the frame of the European project ELLIOT - Experiential Living Lab for Internet Of Things -, the Living Lab ICT Usage Lab aims at co-creating "green" services, i.e. services based on air quality and noise measurement. These services are invented in an open innovation setting, by a set of stakeholders and not a given service provider. In this c...

  16. IoT-Based Library Automation and Monitoring system: Developing an Implementation framework of Implementation

    Directory of Open Access Journals (Sweden)

    Majid Bayani

    2018-01-01

    Full Text Available En la actualidad, las Tecnologías de Información y Comunicación (TIC y asuntos relacionados, tales como el Internet de las Cosas (IoT, por sus siglas en inglés, tiene una influencia decisiva en todos los aspectos de la vida humana. IoT como fenómeno dominante es la transformación de la vida diaria mediante el uso de las funciones inteligentes como la de Identificación por Radio Frecuencia (RFID, por sus siglas en inglés y las Redes de Tecnología de Sensores Inalámbricos (WSN, por sus siglas en inglés. Conforme el IoT avanza, se amplía en tamaño y dimensiones, mejorando muchos de los contextos de la sociedad; tales como, el sistema tradicional de biblioteca. Esta investigación propone un marco de ejecución sobre el empleo del IoT con el fin de renovar la estructura y esquema convencional de las bibliotecas a sistemas inteligentes en línea. El IoT permite la conectividad en tiempo real de un objeto físico (como un libro o cualquier otro tipo de texto mediante el uso de las etiquetas RFID y sensores diminutos. El monitoreo continuo de los libros en tiempo real y la localización de objetos de manera geográfica son algunas de las características que se derivan del uso de las etiquetas de IoT. Estas características de IoT permiten la implementación de una línea de bibliotecas por medio de una cadena de suministros, la integración con diferentes tipos de tecnologías como la base de datos, la recopilación de datos y sistemas en la nube. El Internet de las Cosas también ofrece una panorámica de la vinculación entre el gran número de universidades y bibliotecas en el mundo en tiempo real, todo el tiempo. Se concluye que el implementar el IoT en sistemas de gestión de bibliotecas sería una estructura prometedora que puede jugar un papel vital en la organización de conocimientos del ser humano y en el acceso a informaciones para ayudar a investigadores, diseñadores y administradores en una manera más eficiente e

  17. Io - One of at Least Four Simultaneous Erupting Volcanic Eruptions

    Science.gov (United States)

    1979-01-01

    This photo of an active volcanic eruption on Jupiter's satellite Io was taken 1 hour, 52 minutes after the accompanying picture, late in the evening of March 4, 1979, Pacific time. On the limb of the satellite can be seen one of at least four simultaneous volcanic eruptions -- the first such activity ever observed on another celestial body. Seen against the limb are plume-like structures rising more than 60 miles (100 kilometers) above the surface. Several eruptions have been identified with volcanic structures on the surface of Io, which have also been identified by Voyager 1's infrared instrument as being abnormally hot -- several hundred degrees warmer than surrounding terrain. The fact that several eruptions appear to be occurring at the same time suggests that Io has the most active surface in the solar system and that volcanism is going on there essentially continuously. Another characteristic of the observed volcanism is that it appears to be extremely explosive, with velocities more than 2,000 miles an hour (at least 1 kilometer per second). That is more violent than terrestrial volcanoes like Etna, Vesuvius or Krakatoa.

  18. Extending the POSIX I/O interface: a parallel file system perspective.

    Energy Technology Data Exchange (ETDEWEB)

    Vilayannur, M.; Lang, S.; Ross, R.; Klundt, R.; Ward, L.; Mathematics and Computer Science; VMWare, Inc.; SNL

    2008-12-11

    The POSIX interface does not lend itself well to enabling good performance for high-end applications. Extensions are needed in the POSIX I/O interface so that high-concurrency HPC applications running on top of parallel file systems perform well. This paper presents the rationale, design, and evaluation of a reference implementation of a subset of the POSIX I/O interfaces on a widely used parallel file system (PVFS) on clusters. Experimental results on a set of micro-benchmarks confirm that the extensions to the POSIX interface greatly improve scalability and performance.

  19. Pro iOS Geo building apps with location based services

    CERN Document Server

    Andreucci, Giacomo

    2013-01-01

    Deepen your app development skills with Pro iOS Geo. This book shows you how to use geolocation-based tools to enhance the iOS apps you develop. Author Giacomo Andreucci describes different ways to integrate geo services, depending on the kind of app you're looking to develop: a web app, a hybrid app, or a native app. You'll discover how to use the Google Maps API features to integrate powerful geo capabilities in your apps with a little effort. You'll learn how to: Design geographic features for your apps while respecting usability criteria Design touristic geo apps Use HTML5 and the Google M

  20. Device Centric Throughput and QoS Optimization for IoTsin a Smart Building Using CRN-Techniques

    Directory of Open Access Journals (Sweden)

    Saleem Aslam

    2016-10-01

    Full Text Available The Internet of Things (IoT has gained an incredible importance in the communication and networking industry due to its innovative solutions and advantages in diverse domains. The IoT’ network is a network of smart physical objects: devices, vehicles, buildings, etc. The IoT has a number of applications ranging from smart home, smart surveillance to smart healthcare systems. Since IoT consists of various heterogeneous devices that exhibit different traffic patterns and expect different quality of service (QoS in terms of data rate, bit error rate and the stability index of the channel, therefore, in this paper, we formulated an optimization problem to assign channels to heterogeneous IoT devices within a smart building for the provisioning of their desired QoS. To solve this problem, a novel particle swarm optimization-based algorithm is proposed. Then, exhaustive simulations are carried out to evaluate the performance of the proposed algorithm. Simulation results demonstrate the supremacy of our proposed algorithm over the existing ones in terms of throughput, bit error rate and the stability index of the channel.

  1. Desain dan Aplikasi Internet of Thing (IoT untuk Smart Grid Power Sistem

    Directory of Open Access Journals (Sweden)

    Nur Asyik Hidayatullah

    2017-04-01

    Full Text Available Jaringan listrik cerdas atau yang lebih dikenal dengan istilah Smart Grid merupakan salah satu bentuk transformasi dan reformasi teknologi di industri ketenagalistrikan. Smart Grid adalah jaringan energi listrik modern yang secara cerdas dapat mengintegrasikan jaringan listrik dengan perangkat komunikasi yang mendukung pembangkit dan jaringan transmisi distribusi listrik menjadi lebih atraktif, komunikatif dan berkualitas. Smart Grid juga mampu untuk mencegah dan mengisolasi gangguan dengan cepat serta menyajikan informasi data kelistrikan secara real time. Sedangkan Internet of Thing (IoT adalah sebuah metode yang bertujuan untuk memaksimalkan manfaat dari konektivitas internet untuk melakukan transfer dan pemrosesan data-data atau informasi melalui sebuah jaringan internet secara nirkabel, virtual dan otonom. IoT secara teknis dapat mendorong dalam mengembangkan jaringan smart grid dengan mengintegrasikan insfrastruktur utama power sistem mulai dari sisi pembangkit sampai dengan konsumen akhir melalui wireless sensor network secara otomatis. Dengan pemanfaatan IoT diharapkan dapat meningkatkan keandalan sistem informasi dari jaringan listrik serta meningkatkan efisiensi terhadap insfrastruktur listrik yang sudah tersedia. Artikel ini akan menyajikan konsep teknologi smart grid, internet of thing dan membahas model desain dan aplikasi IoT di jaringan smart grid.

  2. Electron distribution functions in Io plasma torus

    International Nuclear Information System (INIS)

    Boev, A.G.

    2003-01-01

    Electron distribution functions measured by the Voyager 1 in different shares of the Io plasma torus are explained. It is proved that their suprathermal tails are formed by the electrical field induced by the 'Jupiter wind'. The Maxwellian parts of all these spectra characterize thermal equilibrium populations of electrons and the radiation of exited ions

  3. Synthesis and characterization of f-element iodate architectures with variable dimensionality, alpha- and beta-Am(IO3)3.

    Science.gov (United States)

    Runde, Wolfgang; Bean, Amanda C; Brodnax, Lia F; Scott, Brian L

    2006-03-20

    Two americium(III) iodates, beta-Am(IO3)3 (I) and alpha-Am(IO3)3 (II), have been prepared from the aqueous reactions of Am(III) with KIO(4) at 180 degrees C and have been characterized by single-crystal X-ray diffraction, diffuse reflectance, and Raman spectroscopy. The alpha-form is consistent with the known structure type I of anhydrous lanthanide iodates. It consists of a three-dimensional network of pyramidal iodate groups bridging [AmO8] polyhedra where each of the americium ions are coordinated to eight iodate ligands. The beta-form reveals a novel architecture that is unknown within the f-element iodate series. beta-Am(IO3)3 exhibits a two-dimensional layered structure with nine-coordinate Am(III) atoms. Three crystallographically unique pyramidal iodate anions link the Am atoms into corrugated sheets that interact with one another through intermolecular IO3-...IO3- interactions forming dimeric I2O10 units. One of these anions utilizes all three O atoms to simultaneously bridge three Am atoms. The other two iodate ligands bridge only two Am atoms and have one terminal O atom. In contrast to alpha-Am(IO3)3, where the [IO3] ligands are solely corner-sharing with [AmO8] polyhedra, a complex arrangement of corner- and edge-sharing mu2- and mu3-[IO3] pyramids can be found in beta-Am(IO3)3. Crystallographic data: I, monoclinic, space group P2(1)/n, a = 8.871(3) A, b = 5.933(2) A, c = 15.315(4) A, beta = 96.948(4) degrees , V = 800.1(4) A(3), Z = 4; II, monoclinic, space group P2(1)/c, a = 7.243(2) A, b = 8.538(3) A, c = 13.513(5) A, beta = 100.123(6) degrees , V = 822.7(5) A(3), Z = 4.

  4. Developments in ROOT I/O and trees

    International Nuclear Information System (INIS)

    Brun, R; Frank, M; Kreshuk, A; Rademakers, F; Canal, P; Russo, P; Linev, S

    2008-01-01

    For the last several months the main focus of development in the ROOT I/O package has been code consolidation and performance improvements. We introduced a new pre-fetch mechanism to minimize the number of transactions between client and server, hence reducing the effect of latency on the time it takes to read a file both locally and over wide are network. We will review the implementation and how well it works in different conditions (gain of an order of magnitude for remote file access). We will also briefly describe new utilities, including a faster implementation of TTree cloning (gain of an order of magnitude), a generic mechanism for object references, and a new entry list mechanism tuned both for small and large number of selections. In addition to reducing the coupling with the core module and becoming its owns library (libRIO) (as part of the general restructuring of the ROOT libraries), the I/O package has been enhanced in the area of XML and SQL support, thread safety, schema evolution, tree queries, and many other areas

  5. Designing Agent Based Inter-Organizational Systems: Business and IOS alignment in the Port of Rotterdam

    NARCIS (Netherlands)

    Douma, A.M.; Moonen, Hans; van Hillegersberg, Jos; van de Rakt, Bastiaan; Schutten, Johannes M.J.

    2006-01-01

    Inter-organizational systems (IOS) hold high promises for improving the coordination of activities in logistics business networks. Although several successful IOS have been implemented, success is scarce in situations where different parties like to keep a large degree of autonomy, are hardly

  6. A Novel Application of CWMP: An Operator-grade Management Platform for IoT

    Directory of Open Access Journals (Sweden)

    Martin Stusek

    2016-12-01

    Full Text Available The aggressive expansion of emerging smart devices connected to the Internet infrastructure is nowadays considered as one of the most challenging components of the Internet of Things (IoT vision. As a particular segment of IoT, the smart home gateways, also named Machine-Type Communication Gateway (MTCG, become an important direction for industry including telecommunication operators. In most cases, the MTCG acts as a bridge between connected smart objects and the public network (Internet. As a consequence of the IoT domain expansion, the separate configuration of each individual Machine-to-Machine (M2M device is not feasible anymore due to steadily growing numbers of M2M nodes. To perform this task, several novel technologies have recently been introduced. However, legacy protocols and mechanisms for remote network management still retain a certain application potential for IoT. Accordingly, we have investigated the protocol TR-069 with a particular focus on its usability for MTCG. To this end, the software module (bundle based on the TR-069 for remote configuration and management of MTCG, as well as for controlling the end smart devices, has been developed. We believe that our implementation (available as open source on GitHub can serve as an important building block for efficient management of future IoT devices. Therefore, TR-069 protocol constitutes a proven and standardized technology and could be easily deployed by most of the network and service providers today. Authors would like to recall that this paper represents extended version of their previously published work at TSP 2016 conference.

  7. The potential of Internet of m-health Things "m-IoT" for non-invasive glucose level sensing.

    Science.gov (United States)

    Istepanian, R S H; Hu, S; Philip, N Y; Sungoor, A

    2011-01-01

    An amalgamated concept of Internet of m-health Things (m-IoT) has been introduced recently and defined as a new concept that matches the functionalities of m-health and IoT for a new and innovative future (4G health) applications. It is well know that diabetes is a major chronic disease problem worldwide with major economic and social impact. To-date there have not been any studies that address the potential of m-IoT for non-invasive glucose level sensing with advanced opto-physiological assessment technique and diabetes management. In this paper we address the potential benefits of using m-IoT in non-invasive glucose level sensing and the potential m-IoT based architecture for diabetes management. We expect to achieve intelligent identification and management in a heterogeneous connectivity environment from the mobile healthcare perspective. Furthermore this technology will enable new communication connectivity routes between mobile patients and care services through innovative IP based networking architectures.

  8. UCH 3 and 4 plant computer system I/O point summary

    International Nuclear Information System (INIS)

    Sohn, Kwang Young; Lee, Tae Hoon; Lee, Soon Sung; Lee, Byung Chae; Yoon, Jong Keon; Park, Jeong Suk; Baek, Seung Min; Shin, Hyun Kook

    1996-05-01

    This technical report summarizes the UCN 3 and 4 I/O database points and is expected to be an important for many disciplines. There are several kind of plant tests before the commercial operation such as Preoperational Test, Cold Hydro Test (CHT), Hot Functional Test (HFT), and Power Ascension Test (PAT). Those are performed in a manner that the validity of the sensor inputs got to the Plant Computer System (PCS) and operational integrity of plant are determined by monitoring the addressable I/O point identification (PID) on the Plant Computer System operator console. For better performance of activities like Emergency Operating Procedure (EOP) computerization, Safety Parameter Display System (SPDS) development, and organizing integrated database for NSSS, referencing the past plant information about I/O database is highly expected. What's more, it is inevitable material for plant system research and general design document work to be done in future. So we present this report based on UCN database for better understanding of plant computer system. 5 refs. (Author) .new

  9. An IoT System for Remote Monitoring of Patients at Home

    Directory of Open Access Journals (Sweden)

    KeeHyun Park

    2017-03-01

    Full Text Available Application areas that utilize the concept of IoT can be broadened to healthcare or remote monitoring areas. In this paper, a remote monitoring system for patients at home in IoT environments is proposed, constructed, and evaluated through several experiments. To make it operable in IoT environments, a protocol conversion scheme between ISO/IEEE 11073 protocol and oneM2M protocol, and a Multiclass Q-learning scheduling algorithm based on the urgency of biomedical data delivery to medical staff are proposed. In addition, for the sake of patients’ privacy, two security schemes are proposed—the separate storage scheme of data in parts and the Buddy-ACK authorization scheme. The experiment on the constructed system showed that the system worked well and the Multiclass Q-learning scheduling algorithm performs better than the Multiclass Based Dynamic Priority scheduling algorithm. We also found that the throughputs of the Multiclass Q-learning scheduling algorithm increase almost linearly as the measurement time increases, whereas the throughputs of the Multiclass Based Dynamic Priority algorithm increase with decreases in the increasing ratio.

  10. UCH 3 and 4 plant computer system I/O point summary

    Energy Technology Data Exchange (ETDEWEB)

    Sohn, Kwang Young; Lee, Tae Hoon; Lee, Soon Sung; Lee, Byung Chae; Yoon, Jong Keon; Park, Jeong Suk; Baek, Seung Min; Shin, Hyun Kook [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1996-05-01

    This technical report summarizes the UCN 3 and 4 I/O database points and is expected to be an important for many disciplines. There are several kind of plant tests before the commercial operation such as Preoperational Test, Cold Hydro Test (CHT), Hot Functional Test (HFT), and Power Ascension Test (PAT). Those are performed in a manner that the validity of the sensor inputs got to the Plant Computer System (PCS) and operational integrity of plant are determined by monitoring the addressable I/O point identification (PID) on the Plant Computer System operator console. For better performance of activities like Emergency Operating Procedure (EOP) computerization, Safety Parameter Display System (SPDS) development, and organizing integrated database for NSSS, referencing the past plant information about I/O database is highly expected. What`s more, it is inevitable material for plant system research and general design document work to be done in future. So we present this report based on UCN database for better understanding of plant computer system. 5 refs. (Author) .new.

  11. Panel summary of cyber-physical systems (CPS) and Internet of Things (IoT) opportunities with information fusion

    Science.gov (United States)

    Blasch, Erik; Kadar, Ivan; Grewe, Lynne L.; Brooks, Richard; Yu, Wei; Kwasinski, Andres; Thomopoulos, Stelios; Salerno, John; Qi, Hairong

    2017-05-01

    During the 2016 SPIE DSS conference, nine panelists were invited to highlight the trends and opportunities in cyber-physical systems (CPS) and Internet of Things (IoT) with information fusion. The world will be ubiquitously outfitted with many sensors to support our daily living thorough the Internet of Things (IoT), manage infrastructure developments with cyber-physical systems (CPS), as well as provide communication through networked information fusion technology over the internet (NIFTI). This paper summarizes the panel discussions on opportunities of information fusion to the growing trends in CPS and IoT. The summary includes the concepts and areas where information supports these CPS/IoT which includes situation awareness, transportation, and smart grids.

  12. Research of ios operating system security and the abuse of its exploits

    OpenAIRE

    Jucius, Mindaugas

    2017-01-01

    iOS operating system, which is developed by Apple Inc., is claimed to be the most secure product in the market. In the light of worsening human rights conditions, mainly concerning data privacy breaches performed on governmental level, the need to be reassured about the security of software that runs in our pockets is strengthened. This thesis is focused on researching on potential iOS security exploits and their abuse to access private information or perform malicious actions without user’s ...

  13. Human‐Centric IoT Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena Dimitrova; Prasad, Ramjee; Pejanovic, Milica

    2017-01-01

    The current Internet of things (IoT) concept is characterized with billions and billions of devices interworking through a myriad of technologies for the delivery of smart personalized services and applications. At the center of these is the human user who drives his/her own interconnected cluster....... It can be expected in the future that the number of such clusters will grow exponentially, leading to an ultradense environment of interconnected devices belonging to the same or different clusters with the human user as the center point for the information being sensed, gathered, and processed...

  14. MANER : Managed Data Dissemination Scheme for LoRa IoT Enabled Wildlife Monitoring System (WMS)

    NARCIS (Netherlands)

    Ayele, Eyuel Debebe; Meratnia, Nirvana; Havinga, Paul J.M.

    2018-01-01

    In this paper, we introduce dual radio based IoT network architecture for wildlife monitoring system (WMS). This solution will facilitate an IoT devices to be deployed for sustainable wildlife monitoring applications. In addition we present MANER, a managed data dissemination scheme for WMS. In

  15. Io è una storia: autore, narratore, personaggi nella narrazione di sé

    Directory of Open Access Journals (Sweden)

    Giorgio Bert

    2011-04-01

    Full Text Available L’io che si racconta non parla di ciò che avviene ma di ciò che è avvenuto, e anche se sono passati pochi istanti si tratta già di passato. Il presente non si può narrare, il presente è un vortice, un caos; il tentativo di raccontare le cose mentre avvengono si risolve in una comunicazione confusa, spezzettata, balbettante in cui si intrecciano in modo poco coerente e disordinato eventi, fatti, emozioni, interpretazioni. Tra l’io che vive e l’io che racconta esiste un fossato invalicabile. Quando la persona narra e si narra costruisce una storia che –per quanto tenga conto di fatti effettivamente avvenuti- non è (né potrebbe essere una fedele descrizione di quanto è accaduto. La narrazione dà alla sequenza degli eventi un ordine arbitrario, colmando i vuoti, omettendo particolari e spesso, più o meno consapevolmente, inventandone di nuovi. Ciò che ne risulta è in ogni caso fiction.

  16. DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2018-01-01

    of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS) attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline...... the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware...

  17. Prototype of a Laser-Induced Fluorescence Ground-Based Instrument for Measurements of Atmospheric Iodine Monoxide (IO)

    Science.gov (United States)

    Thurlow, M. E.; Co, D. T.; Hanisco, T. F.; Lapson, L. B.; Anderson, J. G.

    2008-12-01

    High abundances of iodine monoxide (IO) are known to exist and to participate in local photochemistry of the marine boundary layer: (1) IO participates in depletion episodes of O3 and in the removal of mercury in the Arctic polar spring by enhancing atomic Br mixing ratios. Recent observations and computer simulations suggest that mercury sequestration is closely tied to halogen photochemistry and that gaseous atomic Hg depletion can be enhanced significantly by the presence of small amounts of iodine-containing compounds. (2) IO and higher- order iodine oxides are involved in the formation of new particles in coastal marine environments. Studies using smog chamber experiments simulating coastal atmospheric conditions have demonstrated that new particles can form from condensable iodine-containing vapors and that their concentrations over the open ocean are sufficient to influence marine particle formation. (3) IO has also been shown to affect the oxidizing capacity of the troposphere by altering the partitioning of NO2/NO and HO2/HO and by activating chlorine and bromine in sea salt aerosols. In the stratosphere, these same processes can lead to enhanced ozone loss rates. Detailed photochemical models that include iodine photochemistry, however, are hampered by the lack of observational data. The distribution of IO in vertical, horizontal, and temporal coordinates is unknown, so the impact of IO on global photochemistry cannot be predicted. The resolution of these important scientific issues requires an in situ IO instrument. A fully functional nanosecond Nd:YAG-pumped Ti:Sapphire laser system and a prototype IO ground-based instrument have been built in our lab. With the current setup, the laser system was situated 10 m from the field station, and the laser light was coupled via an optical fiber. With the use of highly efficient fluorescence detection optics and photon counting techniques, sensitivities of better than 0.1 ppt in 1 s for IO was achieved in the

  18. I/O subnets for the APS control system

    International Nuclear Information System (INIS)

    Arnold, N.D.; Nawrocki, G.J.; Daly, R.T.; Kraimer, M.R.; McDowell, W.P.

    1991-01-01

    Although the Advanced Photon Source Control System allows for microprocessor-based Input/Output Controllers (IOCs) to be distributed throughout the facility, it is not always cost effective to provide such capability at every location where an interface to the Control System is required. I/O subnets implemented via message passing network protocols are used to interface points and/or equipment to a somewhat distant IOC, thereby reducing the number of required IOC's and minimizing the field wiring from the equipment to the Control System. For greatest flexibility, the subnets must support connections to equipment that requires several discrete I/O points, connections to GPIB and RS232 instruments, and a network connection to custom designed intelligent equipment. This paper describes an approach that supports all of these interfaces with one subnet implementation, BITBUS trademark. In addition to accommodating several different interfaces on a single subnet, this approach also circumvents several limitations of GPIB and RS232 which would otherwise restrict their use in a harsh, industrial environment

  19. An IoT Project for Vital Signs Monitoring

    Directory of Open Access Journals (Sweden)

    Felician ALECU

    2017-01-01

    Full Text Available Nowadays, the Internet of Things (IoT projects are very popular and they are developed for numerous fields. In order to detect various medical problems on time, it is required to monitor the subjects either human or non-human. This could be used on regular or specific activities, like sport or work. It is necessary to determine the factors that could lead to medical problems. Another important aspect is to quantify the factors, to monitor them, to collect data and to make the proper interpretation. This could be achieved using dedicated sensors, controlled by an application embedded on a development board. When a dangerous value is reached, the system has to inform the subject (if human or someone else (if non-human. This paper presents an Arduino based IoT project used for monitoring the vital signs for human and non-human and the results based on its usage. The paper details the hardware and software components of this project.

  20. Flood simulation and verification with IoT sensors

    Science.gov (United States)

    Chang, Che-Hao; Hsu, Chih-Tsung; Wu, Shiang-Jen; Huang, Sue-Wei

    2017-04-01

    2D flood dynamic simulation is a vivid tool to demonstrate the possible expose area that sustain impact of high rise of water level. Along with progress in high resolution digital terrain model, the simulation results are quite convinced yet not proved to be close to what is really happened. Due to the dynamic and uncertain essence, the expose area usually could not be well defined during a flood event. Recent development in IoT sensors bring a low power and long distance communication which help us to collect real time flood depths. With these time series of flood depths at different locations, we are capable of verifying the simulation results corresponding to the flood event. 16 flood gauges with IoT specification as well as two flood events in Annan district, Tainan city, Taiwan are examined in this study. During the event in 11, June, 2016, 12 flood gauges works well and 8 of them provide observation match to simulation.

  1. An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable IoT Devices

    Directory of Open Access Journals (Sweden)

    Hwankuk Kim

    2018-05-01

    Full Text Available Since 2016, Mirai and Persirai malware have infected hundreds of thousands of Internet of Things (IoT devices and created a massive IoT botnet, which caused distributed denial of service (DDoS attacks. IoT malware targets vulnerable IoT devices, which are vulnerable to security risks. Techniques are needed to prevent IoT devices from being exploited by attackers. However, unlike high-performance PCs, IoT devices are lightweight, low-power, and low-cost, having performance limitations regarding processing and memory, which makes it difficult to install security and anti-malware programs. Recently, several studies have been attempted to quickly search for vulnerable internet-connected devices to solve this real issue. Issues yet to be studied still exist regarding these types of internet-wide scan technologies, such as filtering by security devices and a shortage of collected operating system (OS information. This paper proposes an intelligent internet-wide scan model that improves IP state scanning with advanced internet protocol (IP randomization, reactive protocol (port scanning, and OS fingerprinting scanning, applying k* algorithm in order to find vulnerable IoT devices. Additionally, we describe the experiment’s results compared to the existing internet-wide scan technologies, such as ZMap and Shodan. As a result, the proposed model experimentally shows improved performance. Although we improved the ZMap, the throughput per minute (TPM performance is similar to ZMap without degrading the IP scan throughput and the performance of generating a single IP address is about 118% better than ZMap. In the protocol scan performance experiments, it is about 129% better than the Censys based ZMap, and the performance of OS fingerprinting is better than ZMap, with about 50% accuracy.

  2. Scandcleft randomised trials of primary surgery for unilateral cleft lip and palate

    DEFF Research Database (Denmark)

    Lohmander, Anette; Persson, Christina; Willadsen, Elisabeth

    2017-01-01

    BACKGROUND AND AIM: Adequate velopharyngeal function and speech are main goals in the treatment of cleft palate. The objective was to investigate if there were differences in velopharyngeal competency (VPC) and hypernasality at age 5 years in children with unilateral cleft lip and palate (UCLP...... cleft teams in five countries: Denmark, Finland, Sweden, Norway, and the UK. METHODS: Three different surgical protocols for primary palatal repair were tested against a common procedure in the total cohort of 448 children born with a non-syndromic UCLP. Speech audio and video recordings of 391 children......) operated on with different surgical methods for primary palatal repair. A secondary aim was to estimate burden of care in terms of received additional secondary surgeries and speech therapy. DESIGN: Three parallel group, randomised clinical trials were undertaken as an international multicentre study by 10...

  3. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    OpenAIRE

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-01-01

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X aut...

  4. Secure Access Control and Authority Delegation Based on Capability and Context Awareness for Federated IoT

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2013-01-01

    Access control is a critical functionality in Internet of Things (IoT), and it is particularly promising to make access control secure, efficient and generic in a distributed environment. Another an important property of access control system in the IoT is flexibility which can be achieved...... by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. This chapter presents...... the Capability-based Context Aware Access Control (CCAAC) model including the authority delegation method, along with specification and protocol evaluation intended for federated Machine-to-Machine (M2M)/IoT. By using the identity and capability-based access control approach together with the contextual...

  5. A Reference Model for Monitoring IoT WSN-Based Applications.

    Science.gov (United States)

    Capella, Juan Vicente; Campelo, José Carlos; Bonastre, Alberto; Ors, Rafael

    2016-10-30

    The Internet of Things (IoT) is, at this moment, one of the most promising technologies that has arisen for decades. Wireless Sensor Networks (WSNs) are one of the main pillars for many IoT applications, insofar as they require to obtain context-awareness information. The bibliography shows many difficulties in their real implementation that have prevented its massive deployment. Additionally, in IoT environments where data producers and data consumers are not directly related, compatibility and certification issues become fundamental. Both problems would profit from accurate knowledge of the internal behavior of WSNs that must be obtained by the utilization of appropriate tools. There are many ad-hoc proposals with no common structure or methodology, and intended to monitor a particular WSN. To overcome this problem, this paper proposes a structured three-layer reference model for WSN Monitoring Platforms (WSN-MP), which offers a standard environment for the design of new monitoring platforms to debug, verify and certify a WSN's behavior and performance, and applicable to every WSN. This model also allows the comparative analysis of the current proposals for monitoring the operation of WSNs. Following this methodology, it is possible to achieve a standardization of WSN-MP, promoting new research areas in order to solve the problems of each layer.

  6. Maxillary dental anomalies in patients with cleft lip and palate: a cone beam computed tomography study.

    Science.gov (United States)

    Celikoglu, M; Buyuk, S K; Sekerci, A E; Cantekin, K; Candirli, C

    2015-01-01

    To compare the frequency of maxillary dental anomalies in patients affected by unilateral (UCLP) and bilateral (BCLP) cleft lip with palate and to determine whether statistical differences were present or not between cleft and normal sides in UCLP group by using cone beam computed tomography (CBCT). In addition, the frequency of those dental anomalies was compared with previous studies presenting the same population without cleft Study Design: Fifty non-syndromic patients affected by UCLP (28 patients) and BCLP (22 patients) were selected for analysis of dental anomalies by means of CBCT. The frequency of maxillary dental anomalies including tooth agenesis, microdontia of lateral incisor, ectopic eruption and impaction of canine and supernumerary tooth were examined. Pearson chi-square and Fisher's exact tests were performed for statistical comparisons. All patients affected by UCLP and BCLP were found to have at least one maxillary dental anomaly. The most frequently observed dental anomaly was tooth agenesis (92.5% and 86.4%, respectively) in UCLP and BCLP groups. Tooth agenesis and canine impaction were observed more commonly in the cleft side (75.0% and 35.7%, respectively) than in the normal side (57.1% and 14.3%, respectively) in UCLP group (p≯0.05). All dental anomalies were found to be higher in both cleft groups than in general populations not affected by cleft. Since patients affected by UCLP and BCLP had at least one dental anomaly and higher dental anomaly frequency as compared to patients without cleft, those patients should be examined carefully prior to orthodontic treatment.

  7. Real-time volume rendering of digital medical images on an iOS device

    Science.gov (United States)

    Noon, Christian; Holub, Joseph; Winer, Eliot

    2013-03-01

    Performing high quality 3D visualizations on mobile devices, while tantalizingly close in many areas, is still a quite difficult task. This is especially true for 3D volume rendering of digital medical images. Allowing this would empower medical personnel a powerful tool to diagnose and treat patients and train the next generation of physicians. This research focuses on performing real time volume rendering of digital medical images on iOS devices using custom developed GPU shaders for orthogonal texture slicing. An interactive volume renderer was designed and developed with several new features including dynamic modification of render resolutions, an incremental render loop, a shader-based clipping algorithm to support OpenGL ES 2.0, and an internal backface culling algorithm for properly sorting rendered geometry with alpha blending. The application was developed using several application programming interfaces (APIs) such as OpenSceneGraph (OSG) as the primary graphics renderer coupled with iOS Cocoa Touch for user interaction, and DCMTK for DICOM I/O. The developed application rendered volume datasets over 450 slices up to 50-60 frames per second, depending on the specific model of the iOS device. All rendering is done locally on the device so no Internet connection is required.

  8. Explosive Volcanism in Io's Lava Lakes - The Key To Constraining Eruption Temperature?

    Science.gov (United States)

    Davies, A. G.; Keszthelyi, L. P.; McEwen, A. S.

    2010-12-01

    Active lava lakes are open volcanic systems, where lava circulates between a magma chamber and the surface. Rare on Earth, lava lakes may be common on Io, the highly volcanic jovian moon (e.g., [1]). Io’s low atmospheric pressure means that activity within Io’s lava lakes may be explosive, exposing lava at near-liquid temperatures (currently poorly constrained for Io). Lava lakes are therefore important targets for future missions to Io [2, 3]. With this in mind, hand-held infrared imagers were used to collect thermal emission data from the phonolite Erebus (Antarctica) lava lake [4] and the basalt lava lake at Erta’Ale (Ethiopia). Temperature-area distributions and the integrated thermal emission spectra for each lava lake were determined from the data. These calculated spectra have been used to test models developed for analysis of remote sensing data of lava lakes and lava flows on both Earth and Io, where no ground-truth exists. The silicate cooling model [5] assumes, for the lava lake model variant, that the existing surface crust has been created at a fixed rate. Model output consists of a synthesized thermal emission spectrum, estimate of surface age range, and a rate of surface crust area formation. The cooling model provides accurate reproductions of actual thermal spectra and the total emitting area to within a few percent of actual emitting area. Model resurfacing rates broadly agree with observed behaviour at both lakes. Despite different composition lavas, the short-wavelength infrared thermal emission spectra from the two terrestrial lava lakes studied are very similar in shape, and, importantly, bear a striking similarity to spectra of Pele, an Io volcano that has been proposed to be a persistent, active lava lake [6] and which is the source of a 300-km high dust and gas plume. Our study of the cooling of the hottest lava exposed at Erta’Ale yields constraints on the ability of multispectral imagers to determine eruption temperature. We find

  9. The business of iOS app development for iPhone, iPad and iPod Touch

    CERN Document Server

    Wooldridge, Dave

    2014-01-01

    Updated and expanded for the new Apple iOS8, The Business of iOS App Development, Third Edition shows you how to incorporate marketing and business savvy into every aspect of the design and development process, giving your app the best possible chance of succeeding in the App Store. This book is written by experienced developers with business backgrounds, taking you step-by-step through cost-effective marketing techniques that have proven successful for professional iOS app creators-perfect for independent developers on shoestring budgets. No prior business knowledge is required. The pheno

  10. Parduotuvių tinklo „Zara“ įvaizdžio stiprinimas Lietuvos rinkoje

    OpenAIRE

    Jasiulevičiūtė, Kristina

    2009-01-01

    Jasiulevičiūtė, K., Parduotuvių tinklo „Zara“ įvaizdžio stiprinimas Lietuvos rinkoje [ Rankraštis]: Bakalauro baigiamasis darbas. Vadyba ir verslo administravimas. Kaunas, ISM Vadybos ir ekonomikos universitetas, 2009. Bakalauro baigiamojo darbo tema: parduotuvių tinklo „Zara“ įvaizdžio stiprinimas Lietuvos rinkoje. Problema: kaip stiprinti „Zara“ parduotuvių tinklo prekės ženklo įvaizdį Lietuvos rinkoje? Darbo tikslas: nustatyti „Zara“ prekės ženklo įvaizdži...

  11. Design and Implementation of Henan Huinong Client System Based on iOS

    Directory of Open Access Journals (Sweden)

    Li Yan-Ling

    2016-01-01

    Full Text Available In order to meet the demands of customers related to agriculture who can obtain some Comprehensive agricultural information service of Henan Province through the intelligent mobile terminal, on the base of the Zhong yuan Rural Information Port integrated platform, employing IOS, Java, Eclipse, XML, SAX technology, we designed and developed Henan Huinong client systems based on ios mobile terminal. This system has achieved the multiple applications, such as agricultural information browsing, network consulting, expert online, crop rermote diagnosis and so on.

  12. Programming iOS 4 Fundamentals of iPhone, iPad, and iPod touch Development

    CERN Document Server

    Neuburg, Matt

    2011-01-01

    Get a solid grounding in all the fundamentals of Cocoa Touch, and avoid problems during iPhone and iPad app development. With Programming iOS 4, you'll dig into Cocoa and learn how to work effectively with Objective-C and Xcode. This book covers iOS 4 in a rigorous, orderly fashion-ideal whether you're approaching iOS for the first time or need a reference to bolster existing skills. Learn Objective-C language details and object-oriented programming conceptsUnderstand the anatomy of an Xcode project and all the stages of its lifecycleGrasp key Cocoa concepts such as relationships between clas

  13. Effectiveness of Intraoperative Parathyroid Monitoring (ioPTH) in predicting a multiglandular or malignant parathyroid disease.

    Science.gov (United States)

    Dobrinja, C; Santandrea, G; Giacca, M; Stenner, Elisabetta; Ruscio, Maurizio; de Manzini, Nicolò

    2017-05-01

    The main goal of our study was to confirm the usefulness of intra-operative parathyroid hormone (PTH) monitoring (ioPTH) when using minimally invasive techniques for treatment of sporadic Primary hyperparathyroidism (pHTP). Furthermore, we aimed to evaluate if ioPTH monitoring may help to predict the etiology of primary hyperparathyroidism, especially in malignant or multiglandular parathyroid disease. A retrospective review of 125 consecutive patients with pHPT who underwent parathyroidectomy between 2001 and 2016 at the Department of General Surgery was performed. For each patient, the specific preoperative work-up consisted of: high-resolution US of the neck by a skilled sonographer, sestamibi parathyroid scan, laryngoscopy, and serum measurement of PTH, serum calcium levels, and serum 25(OH)D levels. The study included 125 consecutive patients who underwent surgery for pHPT. At the histological examination, we registered 113 patients with simple adenomatous pathology (90,4%), 5 atypical adenomas (4%), 3 cases of parathyroid carcinoma (2,4%),, , and 4 histological exams of different nature (3,2%). Overall, 6 cases (4,8%) of multiglandular disease were found. We reported 10 cases (8%) of recurrent/persistent hyperparathyroidism: 1/10 in a patient affected by atypical adenoma, 9/10 in patients with benign pathology. Regarding these 10 cases, in three (30%) patients, ioPTH wasn't dosed (only frozen section (FS) exam was taken), in 5 cases (50%) ioPTH dropped more than 50% compared to basal value (false negative results), and in 2 (20%) cases, ioPTH did not drop >50% from the first samples taken, the extemporary exam had confirmed the presence of adenoma and the probable second hyperfunctioning adenoma was not found. IoPTH determinations ensure operative success of surgical resection in almost all hyperfunctioning tissue; in particular it is very important during minimally invasive parathyroidectomy, as it allows avoiding bilateral neck exploration. The use of io

  14. IoT: Their Conveniences, Security Challenges and Possible Solutions

    Directory of Open Access Journals (Sweden)

    Davar Pishva

    2017-07-01

    Full Text Available The build-in internet-controlled functions of smart devices such as smart phone, smart television, home healthcare gadget, etc., have made them quite attractive to many segments of consumers. In recent years mankind has witnessed an upsurge usage of such devices for numerous purposes. In this paper, the author is going to show how previously forecasted security challenges of these devices are becoming realities in the present day life. The paper initially provides some introductory information about the topic, mostly by means of survey and citations of previous work. It then highlights the devastating effects of October 21, 2016 DDoS attack which mainly utilized IoT devices. It emphasizes the danger of recently revealed Mirai IoT botnet which serves as the basis for the DDoS-for-hire ‘booter’/ ‘stresser’ service. In terms of counter measures, after highlighting IoT security implementation challenges, numerous approaches are presented. As a long-term solution, an architecture wherein security issues are managed through universal home gateway by network operators in a product based fashion is emphasized. The author shows its technical feasibility and demonstrates its partial materialization in proprietary manners. It then explains why and how numerous stake holders are needed to get together for its wide range commercial implementation. Some immediate necessary safeguard actions and intermediate schemes which include soft infrastructures are also presented for the purpose of risk reduction.

  15. IO Com: Is it a Non-secondary Minimum Star?

    Directory of Open Access Journals (Sweden)

    Taş Günay

    2014-03-01

    Full Text Available Four-color photometry of IO Com, a detached eclipsing binary with a long period (~53 d, was accomplished in 2004–2008. The absolute astrophysical and orbital parameters of the system were determined by the analysis of the light and radial velocity curves. No secondary minima in the light curves were detected. It was revealed that IO Com is the system with a highly eccentric orbit consisting of the components of mid-F spectral types. The calculated masses and radii of the primary and secondary components are: 1.32 M⊙ and 1.21 M⊙, and 2.45 R⊙ and 1.51 R⊙, respectively. In the HR diagram, both components of the system are in agreement with the PARSEC isochrones for the ages between 1.5 and 2.2 Gyr and the metallicities Z between 0.01 and 0.02.

  16. Light-Weight and Versatile Monitor for a Self-Adaptive Software Framework for IoT Systems

    Directory of Open Access Journals (Sweden)

    Young-Joo Kim

    2016-01-01

    Full Text Available Today, various Internet of Things (IoT devices and applications are being developed. Such IoT devices have different hardware (HW and software (SW capabilities; therefore, most applications require customization when IoT devices are changed or new applications are created. However, the applications executed on these devices are not optimized for power and performance because IoT device systems do not provide suitable static and dynamic information about fast-changing system resources and applications. Therefore, this paper proposes a light-weight and versatile monitor for a self-adaptive software framework to automatically control system resources according to the system status. The monitor helps running applications guarantee low power consumption and high performance for an optimal environment. The proposed monitor has two components: a monitoring component, which provides real-time static and dynamic information about system resources and applications, and a controlling component, which supports real-time control of system resources. For the experimental verification, we created a video transport system based on IoT devices and measured the CPU utilization by dynamic voltage and frequency scaling (DVFS for the monitor. The results demonstrate that, for up to 50 monitored processes, the monitor shows an average CPU utilization of approximately 4% in the three DVFS modes and demonstrates maximum optimization in the Performance mode of DVFS.

  17. IoT-Based Image Recognition System for Smart Home-Delivered Meal Services

    Directory of Open Access Journals (Sweden)

    Hsiao-Ting Tseng

    2017-07-01

    Full Text Available Population ageing is an important global issue. The Taiwanese government has used various Internet of Things (IoT applications in the “10-year long-term care program 2.0”. It is expected that the efficiency and effectiveness of long-term care services will be improved through IoT support. Home-delivered meal services for the elderly are important for home-based long-term care services. To ensure that the right meals are delivered to the right recipient at the right time, the runners need to take a picture of the meal recipient when the meal is delivered. This study uses the IoT-based image recognition system to design an integrated service to improve the management of image recognition. The core technology of this IoT-based image recognition system is statistical histogram-based k-means clustering for image segmentation. However, this method is time-consuming. Therefore, we proposed using the statistical histogram to obtain a probability density function of pixels of a figure and segmenting these with weighting for the same intensity. This aims to increase the computational performance and achieve the same results as k-means clustering. We combined histogram and k-means clustering in order to overcome the high computational cost for k-means clustering. The results indicate that the proposed method is significantly faster than k-means clustering by more than 10 times.

  18. Kinetics of the Reactions of IO Radicals with NO and NO2

    Science.gov (United States)

    Daykin, E. P.; Wine, P. H.

    1997-01-01

    A laser flash photolysis-long path absorption technique has been employed to study the kinetics of the reactions of IO radicals with NO and NO2 as a function of temperature and pressure. The IO and NO rate coefficient is independent of pressure over the range 40-200 Torr of N2, and its temperature dependence over the range 242-359 K is adequately described by the Arrhenius expression k(sub 1) = (6.9 +/- 1.7) x 10(exp -12) exp[(328 +/- 71)/T] cu cm/(molecule.s) (errors are 2 sigma, precision only). These Arrhenius parameters are similar to those determined previously for the ClO + NO and BrO + NO reactions. The IO and NO2 association reaction is found to be in the falloff regime over the temperature and pressure ranges investigated (254-354 K and 40-750 Torr of N2). Assuming F(sub c) = 0.4 independent of temperature, a physically reasonable set of falloff parameters which adequately describe the data are k(sub 0) = 7.7 x 10(exp -31)(T/300)(exp -5.0) cm(exp 6)/(molecule(exp 2).s) and k(sub infinity) = 1.55 x 10(exp -11)cu cm/(molecule.s) independent of temperature. The IO + NO2 rate coefficients determined in this study are about a factor of 2 faster than those reported in the only previous study of this reaction.

  19. Learning the iOS 4 SDK for JavaScript Programmers Create Native Apps with Objective-C and Xcode

    CERN Document Server

    Goodman, Danny

    2010-01-01

    Is it possible for JavaScript programmers to learn Apple's iOS 4 SDK and live to tell the tale? Technology guru Danny Goodman did, and with this book he leaves a well-marked trail for you to follow. An authority on JavaScript since its inception, Goodman understands the challenges you might face in creating native iOS apps with this SDK, and introduces Xcode, Objective-C, and Cocoa Touch in a context you'll readily understand. Why bother with the SDK when you can simply build web apps for Apple's iOS devices? Web apps can't access an iPhone's music library, camera, or iOS system software for

  20. An IoT architecture for cloud connected electric vehicles

    NARCIS (Netherlands)

    Ramamurthy, P.

    2015-01-01

    This report presents the EV-user scenario as an use-case of a hyper-connected environment. The need for efforts on standardisation in the IoT world is explained with a detailed view of the software architecture to achieve it.

  1. Fast digitization and digital receiver technology

    International Nuclear Information System (INIS)

    Kimball, Ralph C.

    2002-01-01

    The potentially lucrative wireless market has led to technological advances in mixed signal devices such as high speed, high resolution A/D and D/A converters. This same market has also driven the development of high performance multi-channel digital receiver and digital transmitter ICs. Similarly, advances in semiconductor processes, coupled with the need for reduced time-to-market, has led to the development of large, enhanced performance, in-circuit programmable logic devices. A review of the key characteristics of these mixed-signal, signal processing and programmable logic devices is presented. The application of these devices and technologies to the instrumentation of Accelerators and Storage Rings is discussed and presented by way of examples. Issues relating to the requirements associated with real-time processing, I/O throughput, reconfigurability, reliability, maintainability and packaging requirements are also addressed

  2. Dental anomalies associated with unilateral and bilateral cleft lip and palate.

    Science.gov (United States)

    Qureshi, Wafa A; Beiraghi, Soraya; Leon-Salazar, Vladimir

    2012-01-01

    The purpose of this study was to compare the prevalence of dental anomalies in the primary and permanent dentition of patients with unilateral (UCLP) and bilateral (BCLP) cleft lip with or without palate. One hundred two complete clinical records were randomly selected for review from a university-based cleft palate clinic. Only nonsyndromic UCLP and BCLP cases were further selected for analysis of dental anomalies. The prevalence of 9 dental categories, including anomalies in number, crown structure, position, and maxillary-mandibular relationship, was assessed and compared between UCLP and BCLP cases using Fisher's exact test. Of the 102 charts evaluated, there were 67 cases of UCLP and 29 cases of BCLP for a total of 96 cases. There was a high prevalence of dental anomalies in primary and permanent teeth; 93% of UCLP cases and 96% of BCLP cases presented with at least 1 dental anomaly. Significant differences ( P dental anomalies associated with orofacial clefts regardless of whether they are unilateral or bilateral cleft lip with or without palate.

  3. A Lightweight I/O Scheme to Facilitate Spatial and Temporal Queries of Scientific Data Analytics

    Science.gov (United States)

    Tian, Yuan; Liu, Zhuo; Klasky, Scott; Wang, Bin; Abbasi, Hasan; Zhou, Shujia; Podhorszki, Norbert; Clune, Tom; Logan, Jeremy; Yu, Weikuan

    2013-01-01

    In the era of petascale computing, more scientific applications are being deployed on leadership scale computing platforms to enhance the scientific productivity. Many I/O techniques have been designed to address the growing I/O bottleneck on large-scale systems by handling massive scientific data in a holistic manner. While such techniques have been leveraged in a wide range of applications, they have not been shown as adequate for many mission critical applications, particularly in data post-processing stage. One of the examples is that some scientific applications generate datasets composed of a vast amount of small data elements that are organized along many spatial and temporal dimensions but require sophisticated data analytics on one or more dimensions. Including such dimensional knowledge into data organization can be beneficial to the efficiency of data post-processing, which is often missing from exiting I/O techniques. In this study, we propose a novel I/O scheme named STAR (Spatial and Temporal AggRegation) to enable high performance data queries for scientific analytics. STAR is able to dive into the massive data, identify the spatial and temporal relationships among data variables, and accordingly organize them into an optimized multi-dimensional data structure before storing to the storage. This technique not only facilitates the common access patterns of data analytics, but also further reduces the application turnaround time. In particular, STAR is able to enable efficient data queries along the time dimension, a practice common in scientific analytics but not yet supported by existing I/O techniques. In our case study with a critical climate modeling application GEOS-5, the experimental results on Jaguar supercomputer demonstrate an improvement up to 73 times for the read performance compared to the original I/O method.

  4. IoT Big-Data Centred Knowledge Granule Analytic and Cluster Framework for BI Applications: A Case Base Analysis.

    Science.gov (United States)

    Chang, Hsien-Tsung; Mishra, Nilamadhab; Lin, Chung-Chih

    2015-01-01

    The current rapid growth of Internet of Things (IoT) in various commercial and non-commercial sectors has led to the deposition of large-scale IoT data, of which the time-critical analytic and clustering of knowledge granules represent highly thought-provoking application possibilities. The objective of the present work is to inspect the structural analysis and clustering of complex knowledge granules in an IoT big-data environment. In this work, we propose a knowledge granule analytic and clustering (KGAC) framework that explores and assembles knowledge granules from IoT big-data arrays for a business intelligence (BI) application. Our work implements neuro-fuzzy analytic architecture rather than a standard fuzzified approach to discover the complex knowledge granules. Furthermore, we implement an enhanced knowledge granule clustering (e-KGC) mechanism that is more elastic than previous techniques when assembling the tactical and explicit complex knowledge granules from IoT big-data arrays. The analysis and discussion presented here show that the proposed framework and mechanism can be implemented to extract knowledge granules from an IoT big-data array in such a way as to present knowledge of strategic value to executives and enable knowledge users to perform further BI actions.

  5. IoT Big-Data Centred Knowledge Granule Analytic and Cluster Framework for BI Applications: A Case Base Analysis

    Science.gov (United States)

    Chang, Hsien-Tsung; Mishra, Nilamadhab; Lin, Chung-Chih

    2015-01-01

    The current rapid growth of Internet of Things (IoT) in various commercial and non-commercial sectors has led to the deposition of large-scale IoT data, of which the time-critical analytic and clustering of knowledge granules represent highly thought-provoking application possibilities. The objective of the present work is to inspect the structural analysis and clustering of complex knowledge granules in an IoT big-data environment. In this work, we propose a knowledge granule analytic and clustering (KGAC) framework that explores and assembles knowledge granules from IoT big-data arrays for a business intelligence (BI) application. Our work implements neuro-fuzzy analytic architecture rather than a standard fuzzified approach to discover the complex knowledge granules. Furthermore, we implement an enhanced knowledge granule clustering (e-KGC) mechanism that is more elastic than previous techniques when assembling the tactical and explicit complex knowledge granules from IoT big-data arrays. The analysis and discussion presented here show that the proposed framework and mechanism can be implemented to extract knowledge granules from an IoT big-data array in such a way as to present knowledge of strategic value to executives and enable knowledge users to perform further BI actions. PMID:26600156

  6. IoT Big-Data Centred Knowledge Granule Analytic and Cluster Framework for BI Applications: A Case Base Analysis.

    Directory of Open Access Journals (Sweden)

    Hsien-Tsung Chang

    Full Text Available The current rapid growth of Internet of Things (IoT in various commercial and non-commercial sectors has led to the deposition of large-scale IoT data, of which the time-critical analytic and clustering of knowledge granules represent highly thought-provoking application possibilities. The objective of the present work is to inspect the structural analysis and clustering of complex knowledge granules in an IoT big-data environment. In this work, we propose a knowledge granule analytic and clustering (KGAC framework that explores and assembles knowledge granules from IoT big-data arrays for a business intelligence (BI application. Our work implements neuro-fuzzy analytic architecture rather than a standard fuzzified approach to discover the complex knowledge granules. Furthermore, we implement an enhanced knowledge granule clustering (e-KGC mechanism that is more elastic than previous techniques when assembling the tactical and explicit complex knowledge granules from IoT big-data arrays. The analysis and discussion presented here show that the proposed framework and mechanism can be implemented to extract knowledge granules from an IoT big-data array in such a way as to present knowledge of strategic value to executives and enable knowledge users to perform further BI actions.

  7. Towards Interoperable IoT Deployments inSmart Cities - How project VITAL enables smart, secure and cost- effective cities

    OpenAIRE

    Schiele , Gregor; Soldatos , John; Mitton , Nathalie

    2014-01-01

    International audience; IoT-based deployments in smart cities raise several challenges, especially in terms of interoperability. In this paper, we illustrate semantic interoperability solutions for IoT systems. Based on these solutions, we describe how the FP7 VITAL project aims to bridge numerous silo IoT deployments in smart cities through repurposing and reusing sensors and data streams across multiple applications without carelessly compromising citizens’ security and privacy. This approa...

  8. Automatic Integration of IoT Devices

    OpenAIRE

    Pêgo, Pedro Ruben Januário

    2016-01-01

    During the last years a new concept has gained prominence in the technology world. With an increasingly dominant role in our days, Internet of Things (IoT) is a technological revolution that is changing our lives. The imagination is the limit for the new devices that may appear in the market. This phenomenon is derived from both, the technological evolution and the growing acceptance of this type of products in our social life. Faced with a fast growth, an increasing diversity ...

  9. Interoperability for smart appliances in the IoT world

    NARCIS (Netherlands)

    Daniele, L.; Solanki, M.; Hartog, F. den; Roes, J.

    2016-01-01

    Household appliances are set to become highly intelligent, smart and networked devices in the near future. Systematically deployed on the Internet of Things (IoT), they would be able to form complete energy consuming, producing, and managing ecosystems. Smart systems are technically very

  10. ?Healthcare IoT m-GreenCARDIO Remote Cardiac Monitoring System - Concept, Theory of Operation and Implementation

    Directory of Open Access Journals (Sweden)

    ZAGAN, I.

    2017-05-01

    Full Text Available Present day Internet of Things (IoT developers are inspired by the spectacular evolution in the field, and, at the same time, determined to connect an increasingly wider range of 'things', with the lowest power consumption, the wider range of action and interoperability guaranteed with excessive quality. Based on current challenges in the medical and electronic field, the present paper seeks the practical implementation of an efficient, low cost, low-power IoT medical system, yet with a greater memory autonomy. In this context, our main contribution is the implementation of a solution for ECG monitoring based on IoT techniques. This paper presents a qualitative research in the field of healthcare IoT and embedded applications meant to provide an innovative and flexible system meeting the stringent requirements of this area. Without compromising the performance intake and the low power consumption, the designers offer flexible options for connectivity and response time.

  11. A Development of the Calibration Tool Applied on Analog I/O Modules for Safety-related Controller

    International Nuclear Information System (INIS)

    Kim, Jong-Kyun; Yun, Dong-Hwa; Lee, Myeong-Kyun; Yoo, Kwan-Woo

    2016-01-01

    The purpose of this paper is to develop the calibration tool for analog input/output(I/O) modules. Those modules are components in POSAFE-Q which is a programmable logic controller(PLC) that has been developed for the evaluation of safety-related. In this paper, performance improvement of analog I/O modules is presented by developing and applying the calibration tool for each channel in analog I/O modules. With this tool, the input signal to an analog input module and the output signal from an analog output module are able to be satisfied with a reference value of sensor type and an accuracy of all modules. With RS-232 communication, the manual calibration tool is developed for analog I/O modules of an existing and up-to-date version in POSAFE-Q PLC. As a result of applying this tool, the converted value is performant for a type of input sensor and an accuracy of analog I/O modules

  12. Rojas novada tūrisma iOS lietotnes izveide

    OpenAIRE

    Baurovskis, Armands

    2013-01-01

    Kvalifikācijas darbā – „Rojas novada tūrisma iOS lietotnes izveide” ir izstrādāta Rojas novada tūrisma lietotne iOS operētājsistēmai – „Roja Travel Guide”. Izstrāde tika veikta ar spējo programmatūras izstrādes metodi. Lietotne nodrošina informāciju divās valodās – latviešu un angļu – par Rojas novada tūrisma objektiem, kā arī ļauj lasīt jaunākās ziņas, kas ir saistītas ar novadu. Lietotne ir paredzēta tūristiem un vietējiem iedzīvotājiem. Lietotne strādā pilnvērtīgi uz visiem iPhone un iPad ...

  13. Investigation on the bulk growth of α-LiIO 3 single crystals and the ...

    Indian Academy of Sciences (India)

    2017-07-26

    Jul 26, 2017 ... α-LiIO3 is an excellent optical material exhibiting strong nonlinear optical, ... caused by the strong influence of the growth conditions, and, in particular, pH of the solution from which α-LiIO3 crystal ... studies of the crystals grown at pH 10 reveal the higher optical radiation ... of d31 at 1.06 μm = 4.1 pm V. −1.

  14. The Arabidopsis Malectin-Like/LRR-RLK IOS1 Is Critical for BAK1-Dependent and BAK1-Independent Pattern-Triggered Immunity

    Science.gov (United States)

    Kadota, Yasuhiro; Huang, Pin-Yao; Chien, Hsiao-Chiao; Chu, Po-Wei; Zimmerli, Laurent

    2016-01-01

    Plasma membrane-localized pattern recognition receptors (PRRs) such as FLAGELLIN SENSING2 (FLS2), EF-TU RECEPTOR (EFR), and CHITIN ELICITOR RECEPTOR KINASE1 (CERK1) recognize microbe-associated molecular patterns (MAMPs) to activate pattern-triggered immunity (PTI). A reverse genetics approach on genes responsive to the priming agent β-aminobutyric acid (BABA) revealed IMPAIRED OOMYCETE SUSCEPTIBILITY1 (IOS1) as a critical PTI player. Arabidopsis thaliana ios1 mutants were hypersusceptible to Pseudomonas syringae bacteria. Accordingly, ios1 mutants showed defective PTI responses, notably delayed upregulation of the PTI marker gene FLG22-INDUCED RECEPTOR-LIKE KINASE1, reduced callose deposition, and mitogen-activated protein kinase activation upon MAMP treatment. Moreover, Arabidopsis lines overexpressing IOS1 were more resistant to bacteria and showed a primed PTI response. In vitro pull-down, bimolecular fluorescence complementation, coimmunoprecipitation, and mass spectrometry analyses supported the existence of complexes between the membrane-localized IOS1 and BRASSINOSTEROID INSENSITIVE1-ASSOCIATED KINASE1 (BAK1)-dependent PRRs FLS2 and EFR, as well as with the BAK1-independent PRR CERK1. IOS1 also associated with BAK1 in a ligand-independent manner and positively regulated FLS2-BAK1 complex formation upon MAMP treatment. In addition, IOS1 was critical for chitin-mediated PTI. Finally, ios1 mutants were defective in BABA-induced resistance and priming. This work reveals IOS1 as a novel regulatory protein of FLS2-, EFR-, and CERK1-mediated signaling pathways that primes PTI activation. PMID:27317676

  15. In situ solid-state fabrication of hybrid AgCl/AgI/AgIO3 with improved UV-to-visible photocatalytic performance.

    Science.gov (United States)

    Xie, Jing; Cao, Yali; Jia, Dianzeng; Li, Yizhao; Wang, Kun; Xu, Hui

    2017-09-28

    The AgCl/AgI/AgIO 3 composites were synthesized through a one-pot room-temperature in situ solid-state approach with the feature of convenient and eco-friendly. The as-prepared composites exhibit superior photocatalytic performance than pure AgIO 3 for the degradation of methyl orange (MO) under both UV and visible light irradiation. The photodegradation rate toward MO of the AgCl/AgI/AgIO 3 photocatalyst can reach 100% after 12 min irradiation under UV light, or 85.4% after 50 min irradiation under visible light, being significantly higher than AgCl, AgI, AgIO 3 and AgI/AgIO 3 . In addition, the AgCl/AgI/AgIO 3 photocatalyst possesses strong photooxidation ability for the degradation of rhodamine B (RhB), methylene blue (MB), phenol, bisphenol A (BPA) and tetracycline hydrochloride under visible light irradiation. The reactive species capture experiments confirmed that the h + and •O 2- play an essential role during the photocatalytic process under UV light or visible light irradiation. The enhanced effect may be beneficial from the enhanced light adsorption in full spectrum and increased separation efficiency of photogenerated hole-electron pairs, which can be ascribed to the synergistic effect among AgCl, AgI and AgIO 3 nanoplates in AgCl/AgI/AgIO 3 composites.

  16. Metodología y caso práctico de análisis forense en iOS 10

    OpenAIRE

    Rubio Lorente, José Tomás

    2016-01-01

    El objetivo de este Trabajo Final de Master es realizar una metodología para el Análisis Forense Digital adaptada a dispositivos de Apple con Sistema Operativo iOS 10. Se hará un recorrido sobre el estado del arte en las principales herramientas de Análisis Forense de iOS existentes, tanto herramientas open source como propietarias y se validará el correcto funcionamiento en iOS 10 de las herramientas mediante pruebas en diferentes dispositivos y circunstancias. En función de los result...

  17. Organizational-professional conflict of I/O psychologists, job satisfaction and work engagement

    Directory of Open Access Journals (Sweden)

    Mladenović Branko

    2015-01-01

    Full Text Available organizational-professional conflict occurs among employees in situations when organizational expectations and demands are opposed to the professional principles and standards. The results of studies have shown that this conflict negatively affects employees' attitude towards the job and affective-motivational state of fulfilment with work role. The purpose of this research was to examine exposure to organizational-professional conflict among I/O psychologists in Serbia, to find out whether there is a correlation between the exposure to organizational-professional conflict, job satisfaction and work engagement, and to determine the main factors of exposure to organizational-professional conflict. Our sample consisted of 96 I/O psychologists. Results have shown that there was significant high negative correlation between the exposure to organizational-professional conflict and job satisfaction, as well as significant moderate negative correlation between the exposure to organizational-professional conflict and work engagement. The highest correlations were with social dimensions of job satisfaction. The exposure to organizational-professional conflict was lower among I/O psychologists with longer work experience and those at higher positions in organizational hierarchy. The exposure to organizational-professional conflict was higher among I/O psychologists who were working in privately owned companies and among those who were fixed-term employees. There was no significant correlation between the exposure to organizational-professional conflict and the size of the organization or business field. Our study showed that organizational-professional conflict should be considered as an important theoretical and research topic, as well as a relevant professional and career issue.

  18. I/O subnets for the APS control system

    International Nuclear Information System (INIS)

    Arnold, N.D.; Nawrocki, G.J.; Daly, R.T.; Kraimer, M.R.; McDowell, W.P.

    1991-01-01

    Although the Advanced Photon Source Control System allows for microprocessor -- based Input/Output Controllers (IOCs) to be distributed throughout the facility, it is not always cost effective to provide such capability at every location where an interface to the Control System is required. I/O subnets implemented via message passing network protocols are used to interface points and/or equipment to a somewhat distant IOC, thereby reducing the number of required IOC's and minimizing the field wiring from the equipment to the Control System. For greatest flexibility, the subnets must support connections to equipment that requires several discrete I/O points, connections to GPIB and RS232 instruments, and a network connection to custom designed intelligent equipment. This paper describes an approach that supports all of the interfaces with one subnet implementation, BITBUS. In addition to accommodating several different interfaces on a single subnet, this approach also circumvents several limitations of GPIB and RS232 which would otherwise restrict their use in a harsh, industrial environment. 1 ref., 1 fig

  19. Visualization and parallel I/O at extreme scale

    International Nuclear Information System (INIS)

    Ross, R B; Peterka, T; Shen, H-W; Hong, Y; Ma, K-L; Yu, H; Moreland, K

    2008-01-01

    In our efforts to solve ever more challenging problems through computational techniques, the scale of our compute systems continues to grow. As we approach petascale, it becomes increasingly important that all the resources in the system be used as efficiently as possible, not just the floating-point units. Because of hardware, software, and usability challenges, storage resources are often one of the most poorly used and performing components of today's compute systems. This situation can be especially true in the case of the analysis phases of scientific workflows. In this paper we discuss the impact of large-scale data on visual analysis operations and examine a collection of approaches to I/O in the visual analysis process. First we examine the performance of volume rendering on a leadership-computing platform and assess the relative cost of I/O, rendering, and compositing operations. Next we analyze the performance implications of eliminating preprocessing from this example workflow. Then we describe a technique that uses data reorganization to improve access times for data-intensive volume rendering

  20. Virtual Replication of IoT Hubs in the Cloud: A Flexible Approach to Smart Object Management

    Directory of Open Access Journals (Sweden)

    Simone Cirani

    2018-03-01

    Full Text Available In future years, the Internet of Things is expected to interconnect billions of highly heterogeneous devices, denoted as “smart objects”, enabling the development of innovative distributed applications. Smart objects are constrained sensor/actuator-equipped devices, in terms of computational power and available memory. In order to cope with the diverse physical connectivity technologies of smart objects, the Internet Protocol is foreseen as the common “language” for full interoperability and as a unifying factor for integration with the Internet. Large-scale platforms for interconnected devices are required to effectively manage resources provided by smart objects. In this work, we present a novel architecture for the management of large numbers of resources in a scalable, seamless, and secure way. The proposed architecture is based on a network element, denoted as IoT Hub, placed at the border of the constrained network, which implements the following functions: service discovery; border router; HTTP/Constrained Application Protocol (CoAP and CoAP/CoAP proxy; cache; and resource directory. In order to protect smart objects (which cannot, because of their constrained nature, serve a large number of concurrent requests and the IoT Hub (which serves as a gateway to the constrained network, we introduce the concept of virtual IoT Hub replica: a Cloud-based “entity” replicating all the functions of a physical IoT Hub, which external clients will query to access resources. IoT Hub replicas are constantly synchronized with the physical IoT Hub through a low-overhead protocol based on Message Queue Telemetry Transport (MQTT. An experimental evaluation, proving the feasibility and advantages of the proposed architecture, is presented.

  1. A General Cross-Layer Cloud Scheduling Framework for Multiple IoT Computer Tasks.

    Science.gov (United States)

    Wu, Guanlin; Bao, Weidong; Zhu, Xiaomin; Zhang, Xiongtao

    2018-05-23

    The diversity of IoT services and applications brings enormous challenges to improving the performance of multiple computer tasks' scheduling in cross-layer cloud computing systems. Unfortunately, the commonly-employed frameworks fail to adapt to the new patterns on the cross-layer cloud. To solve this issue, we design a new computer task scheduling framework for multiple IoT services in cross-layer cloud computing systems. Specifically, we first analyze the features of the cross-layer cloud and computer tasks. Then, we design the scheduling framework based on the analysis and present detailed models to illustrate the procedures of using the framework. With the proposed framework, the IoT services deployed in cross-layer cloud computing systems can dynamically select suitable algorithms and use resources more effectively to finish computer tasks with different objectives. Finally, the algorithms are given based on the framework, and extensive experiments are also given to validate its effectiveness, as well as its superiority.

  2. Big Data Clustering via Community Detection and Hyperbolic Network Embedding in IoT Applications.

    Science.gov (United States)

    Karyotis, Vasileios; Tsitseklis, Konstantinos; Sotiropoulos, Konstantinos; Papavassiliou, Symeon

    2018-04-15

    In this paper, we present a novel data clustering framework for big sensory data produced by IoT applications. Based on a network representation of the relations among multi-dimensional data, data clustering is mapped to node clustering over the produced data graphs. To address the potential very large scale of such datasets/graphs that test the limits of state-of-the-art approaches, we map the problem of data clustering to a community detection one over the corresponding data graphs. Specifically, we propose a novel computational approach for enhancing the traditional Girvan-Newman (GN) community detection algorithm via hyperbolic network embedding. The data dependency graph is embedded in the hyperbolic space via Rigel embedding, allowing more efficient computation of edge-betweenness centrality needed in the GN algorithm. This allows for more efficient clustering of the nodes of the data graph in terms of modularity, without sacrificing considerable accuracy. In order to study the operation of our approach with respect to enhancing GN community detection, we employ various representative types of artificial complex networks, such as scale-free, small-world and random geometric topologies, and frequently-employed benchmark datasets for demonstrating its efficacy in terms of data clustering via community detection. Furthermore, we provide a proof-of-concept evaluation by applying the proposed framework over multi-dimensional datasets obtained from an operational smart-city/building IoT infrastructure provided by the Federated Interoperable Semantic IoT/cloud Testbeds and Applications (FIESTA-IoT) testbed federation. It is shown that the proposed framework can be indeed used for community detection/data clustering and exploited in various other IoT applications, such as performing more energy-efficient smart-city/building sensing.

  3. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications.

    Science.gov (United States)

    Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-12-24

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  4. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    Directory of Open Access Journals (Sweden)

    Tiago M. Fernández-Caramés

    2016-12-01

    Full Text Available The Internet of Things (IoT is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification, which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3 to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  5. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    Science.gov (United States)

    Fernández-Caramés, Tiago M.; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-01-01

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol. PMID:28029119

  6. MDTM: Optimizing Data Transfer using Multicore-Aware I/O Scheduling

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Liang [Fermilab; Demar, Phil [Fermilab; Wu, Wenji [Fermilab; Kim, Bockjoo [Florida U.

    2017-05-09

    Bulk data transfer is facing significant challenges in the coming era of big data. There are multiple performance bottlenecks along the end-to-end path from the source to destination storage system. The limitations of current generation data transfer tools themselves can have a significant impact on end-to-end data transfer rates. In this paper, we identify the issues that lead to underperformance of these tools, and present a new data transfer tool with an innovative I/O scheduler called MDTM. The MDTM scheduler exploits underlying multicore layouts to optimize throughput by reducing delay and contention for I/O reading and writing operations. With our evaluations, we show how MDTM successfully avoids NUMA-based congestion and significantly improves end-to-end data transfer rates across high-speed wide area networks.

  7. MDTM: Optimizing Data Transfer using Multicore-Aware I/O Scheduling

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Liang [Fermilab; Demar, Phil [Fermilab; Wu, Wenji [Fermilab; Kim, Bockjoo [Florida U.

    2017-01-01

    Bulk data transfer is facing significant challenges in the coming era of big data. There are multiple performance bottlenecks along the end-to-end path from the source to destination storage system. The limitations of current generation data transfer tools themselves can have a significant impact on end-to-end data transfer rates. In this paper, we identify the issues that lead to underperformance of these tools, and present a new data transfer tool with an innovative I/O scheduler called MDTM. The MDTM scheduler exploits underlying multicore layouts to optimize throughput by reducing delay and contention for I/O reading and writing operations. With our evaluations, we show how MDTM successfully avoids NUMA-based congestion and significantly improves end-to-end data transfer rates across high-speed wide area networks.

  8. Design Impedance Mismatch Physical Unclonable Functions for IoT Security

    Directory of Open Access Journals (Sweden)

    Xiaomin Zheng

    2017-01-01

    Full Text Available We propose a new design, Physical Unclonable Function (PUF scheme, for the Internet of Things (IoT, which has been suffering from multiple-level security threats. As more and more objects interconnect on IoT networks, the identity of each thing is very important. To authenticate each object, we design an impedance mismatch PUF, which exploits random physical factors of the transmission line to generate a security unique private key. The characteristic impedance of the transmission line and signal transmission theory of the printed circuit board (PCB are also analyzed in detail. To improve the reliability, current feedback amplifier (CFA method is applied on the PUF. Finally, the proposed scheme is implemented and tested. The measure results show that impedance mismatch PUF provides better unpredictability and randomness.

  9. Delayed biological effects of incorporated sulfur-35 in combination with IOS-4876

    International Nuclear Information System (INIS)

    Rusanova, O.V.

    1990-01-01

    Comparative evaluation of some delayed effects of sulfur-35 single administration to mongree white rats males is carried out; modifying effect of IOS-4876 preparation on biological efficiency of incorporated sulfur-35 is also evaluated. Different radionuclide doses demonstrated identical tumor effect exceeding by 2.2-3 times the level of spontaneous tumors. Sulfur-35 incorporated in quantities of 185 and 925 kBq/g causes proved increase in rats death level during the first two years of observation. IOS-4876 preparation leads to certain decrease in the level of delayed biological effects due to internal irradiation. 11 refs

  10. Reliable IoT Storage: Minimizing Bandwidth Use in Storage Without Newcomer Nodes

    DEFF Research Database (Denmark)

    Zhao, Xiaobo; Lucani Rötter, Daniel Enrique; Shen, Xiaohong

    2018-01-01

    This letter characterizes the optimal policies for bandwidth use and storage for the problem of distributed storage in Internet of Things (IoT) scenarios, where lost nodes cannot be replaced by new nodes as is typically assumed in Data Center and Cloud scenarios. We develop an information flow...... model that captures the overall process of data transmission between IoT devices, from the initial preparation stage (generating redundancy from the original data) to the different repair stages with fewer and fewer devices. Our numerical results show that in a system with 10 nodes, the proposed optimal...

  11. Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT

    Directory of Open Access Journals (Sweden)

    Yunchuan Guo

    2014-01-01

    Full Text Available Access control is a key technology in providing security in the Internet of Things (IoT. The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC. STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM and the election-based update mechanism (EUM. We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  12. Spatiotemporal access model based on reputation for the sensing layer of the IoT.

    Science.gov (United States)

    Guo, Yunchuan; Yin, Lihua; Li, Chao; Qian, Junyan

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  13. Fostering business and software ecosystems for large-scale uptake of IoT in food and farming

    NARCIS (Netherlands)

    Verdouw, C.N.; Wolfert, J.; Beers, G.; Sundmaeker, Harald; Chatzikostas, Grigoris

    2017-01-01

    The Internet of Things (IoT) is expected to be a real game changer that will drastically improve productivity and sustainability in food and farming. However, current IoT applications in this domain are still fragmentary and mainly used by a small group of early adopters. The Internet of Food and

  14. Volcanic eruptions on Io - Implications for surface evolution and mass loss

    Science.gov (United States)

    Johnson, T. V.; Soderblom, L. A.

    1982-01-01

    Active volcanism on Io results in a continual resurfacing of the satellite. Analysis of required burial rates to erase impact craters, the mass production in the observed plumes, and the energy requirements for the volcanic activity suggest resurfacing rates of 0.001 to 10 cm/yr in recent geologic time. If this rate is typical of the last 4.5 Gyr, then extensive recycling of the upper crust and mantle must have occurred. The currently estimated loss rate of S, O, and Na from Io into the magnetosphere corresponds to only a small fraction of the resurfacing rate and should not have resulted in either extensive erosion or total depletion of any of the escaping species.

  15. Lower Bounds for Sorted Geometric Queries in the I/O Model

    DEFF Research Database (Denmark)

    Afshani, Peyman; Zeh, Norbert

    2012-01-01

    . This is highly relevant in an I/O context because storing a massive data set in a superlinear-space data structure is often infeasible. We also prove that answering queries using I/Os requires space, where N is the input size, B is the block size, and M is the size of the main memory. This bound is unlikely...... to be optimal and in fact we can show that, for a particular class of “persistence-based” data structures, the space lower bound can be improved to Ω(N2 / MO(1)). Both these lower bounds are a first step towards understanding the complexity of sorted geometric query problems. All our lower bounds assume...

  16. A BUNCH TO BUCKET PHASE DETECTOR USING DIGITAL RECEIVER TECHNOLOGY

    International Nuclear Information System (INIS)

    DELONG, J.; BRENNAN, J.M.; HAYES, T.; LE, T.N.; SMITH, K.

    2003-01-01

    Transferring high-speed digital signals to a Digital Signal Processor is limited by the IO bandwidth of the DSP. A digital receiver circuit is used to translate high frequency W signals to base-band. The translated output frequency is close to DC and the data rate can be reduced, by decimation, before transfer to the DSP. By translating both the longitudinal beam (bunch) and RF cavity pick-ups (bucket) to DC, a DSP can be used to measure their relative phase angle. The result can be used as an error signal in a beam control servo loop and any phase differences can be compensated

  17. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO.

    Science.gov (United States)

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-02-07

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy.

  18. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO

    Science.gov (United States)

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-01-01

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy. PMID:28178214

  19. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO

    Directory of Open Access Journals (Sweden)

    Antonio Celesti

    2017-02-01

    Full Text Available Nowadays, in the panorama of Internet of Things (IoT, finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy.

  20. A Cognitive Adopted Framework for IoT Big-Data Management and Knowledge Discovery Prospective

    OpenAIRE

    Mishra, Nilamadhab; Lin, Chung-Chih; Chang, Hsien-Tsung

    2015-01-01

    In future IoT big-data management and knowledge discovery for large scale industrial automation application, the importance of industrial internet is increasing day by day. Several diversified technologies such as IoT (Internet of Things), computational intelligence, machine type communication, big-data, and sensor technology can be incorporated together to improve the data management and knowledge discovery efficiency of large scale automation applications. So in this work, we need to propos...