IR 4.0 emphasizes the interconnection of machines and systems to achieve optimal performance and productivity gains. IR 5.0 is said to take it a step further by fine-tuning the human-machine ...connection. IR 5.0 is more collaboration between the two: automated technology's ultra-fast accuracy combines with a human's intelligence and creativity. The driving force behind IR 5.0 is customer demand for customization and personalization, necessitating a greater human involvement in the production process. As IR 5.0 evolves, we may expect to see a slew of breakthroughs across various industries. However, just automating jobs or digitizing processes will not be enough; the finest and most successful businesses will be those that can combine the dual powers of technology and human ingenuity. IR 5.0 focuses on the use of modern cutting-edge technologies, namely, AI, IoT, big data, cloud computing, Blockchain, Digital twins, edge computing, collaborative robots, and 6G along with leveraging human creativity and intelligence. Wherever possible, IR 5.0 will change industrial processes worldwide by removing mundane, filthy, and repetitive activities from human workers. Intelligent robotics and systems will have unparalleled access to industrial supply networks and production floors. However, to understand and leverage the benefits of IR 5.0 better, there is a need to understand the role of modern CET in industrial revolution 5.0. To fill this gap, this article will examine IR 5.0 prospective, uses, supporting technologies, opportunities, and issues involved that need to be understood for leveraging the potentials of IR 5.0.
Although the Internet of things (IoT), cloud computing (CC), and Big Data (BGD) are three different approaches that have evolved independently of each other over time; however, with time, they are ...becoming increasingly interconnected. The convergence of IoT, CC, and BGD provides new opportunities in various real-time applications, including telecommunication, healthcare, business, education, science, and engineering. Together, these approaches are facing various challenges during data gathering, processing, and management. The focus of this research paper is to pinpoint the emerging trends in IoT, CC, and BGD. The convergence of these approaches and their impact on various real-time applications, benefits, and challenges associated with all these approaches, current industry trends, and future research directions with especial focus on the healthcare domain. The paper also provides a conceptual framework that integrates IoT, CC, and BGD and provides an IoT centric cloud infrastructure using BGD. Finally, this paper summarizes by providing directions for researchers and practitioners about how to leverage the benefits of combining these approaches.
When it comes to smart cities, one of the biggest issues is energy optimization. This is because these cities employ a large number of interconnected devices to autonomously manage city operations, ...which consumes a lot of energy. This difficulty has been addressed in this paper by using the advantages of contemporary cutting-edge technologies such as the Internet of Things (IoT), 5 G, and cloud computing for energy efficiency in smart cities. With the use of these cutting-edge technologies, we have proposed a model that can be used to optimize energy consumption in smart homes and smart cities alike. Street lighting, building and street billboards, smart homes, and smart parking are among the four essential features of smart cities that would benefit from the proposed model's energy savings. All smart city electric appliances will be equipped with IoT sensors that will detect movements and react to commands. In order to transport data swiftly between communication channels and the cloud, 5 G technology will be deployed, and the cloud technology will be used to store and retrieve data effectively. The suggested model was evaluated using mathematical modeling, and the findings indicate that the proposed model may assist in improving energy usage in smart cities.
Full text
Available for:
DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, UILJ, UKNU, UL, UM, UPUK
Detecting and counting on road vehicles is a key task in intelligent transport management and surveillance systems. The applicability lies both in urban and highway traffic monitoring and control, ...particularly in difficult weather and traffic conditions. In the past, the task has been performed through data acquired from sensors and conventional image processing toolbox. However, with the advent of emerging deep learning based smart computer vision systems the task has become computationally efficient and reliable. The data acquired from road mounted surveillance cameras can be used to train models which can detect and track on road vehicles for smart traffic analysis and handling problems such as traffic congestion particularly in harsh weather conditions where there are poor visibility issues because of low illumination and blurring. Different vehicle detection algorithms focusing the same issue deal only with on or two specific conditions. In this research, we address detecting vehicles in a scene in multiple weather scenarios including haze, dust and sandstorms, snowy and rainy weather both in day and nighttime. The proposed architecture uses CSPDarknet53 as baseline architecture modified with spatial pyramid pooling (SPP-NET) layer and reduced Batch Normalization layers. We also augment the DAWN Dataset with different techniques including Hue, Saturation, Exposure, Brightness, Darkness, Blur and Noise. This not only increases the size of the dataset but also make the detection more challenging. The model obtained mean average precision of 81% during training and detected smallest vehicle present in the image
An emergency can occur at any time. To overcome that emergency efficiently, we require seamless movement on the road to approach the destination within a limited time by using an Emergency Vehicle ...(EV). This paper proposes an emergency vehicle management solution (EVMS) to determine an efficient vehicle-passing sequence that allows the EV to cross a junction without any delay. The proposed system passes the EV and minimally affects the travel times of other vehicles on the junction. In the presence of an EV in the communication range, the proposed system prioritizes the EV by creating space for it in the lane adjacent to the shoulder lane. The shoulder lane is a lane that cyclists and motorcyclists will use in normal situations. However, when an EV enters the communication range, traffic from the adjacent lane will move to the shoulder lane. As the number of vehicles on the road increases rapidly, crossing the EV in the shortest possible time is crucial. The EVMS and algorithms are presented in this study to find the optimal vehicle sequence that gives EVs the highest priority. The proposed solution uses cutting-edge technologies (IoT Sensors, GPS, 5G, and Cloud computing) to collect and pass EVs’ information to the Roadside Units (RSU). The proposed solution was evaluated through mathematical modeling. The results show that the EVMS can reduce the travel times of EVs significantly without causing any performance degradation of normal vehicles.
Internet of things architecture is the integration of real-world objects and places with the internet. This booming in technology is bringing ease in our lifestyle and making formerly impossible ...things possible. Internet of things playing a vital role in bridging this gap easily and rapidly. IoT is changing our lifestyle and the way of working the technologies, by bringing them together at the one page in several application areas of daily life. However, IoT has to face several challenges in the form of cyber scams, one of the major challenges IoT has to face is the likelihood of Ransomware attack. Ransomware is a malicious kind of software that restricts access to vital information in some way and demand payment for getting access to this information. The ransomware attack is becoming widespread daily, and it is bringing disastrous consequences, including loss of sensitive data, loss of productivity, data destruction, and loss of reputation and business downtime. Which further leads to millions of dollar daily losses due to the downtime. This is inevitable for organizations to revise their annual cybersecurity goals and need to implement proper resilience and recovery plan to keep business running. However, before proceeding towards providing a practical solution, there is a need to synthesize the existing data and statistics about this crucial attack to make aware to the researchers and practitioners. To fill this gap, this paper provides a comprehensive survey on evolution, prevention and mitigation of Ransomware in IoT context. This paper differs from existing in various dimensions: firstly, it provides deeper insights about Ransomware evolution in IoT. Secondly; it discusses diverse aspects of Ransomware attacks on IoT which include, various types of Ransomware, Current research in Ransomware, Existing techniques to prevent and mitigate Ransomware attacks in IoT along with the ways to deal with an affected machine, the decision about paying the ransom or not, and future emerging trends of Ransomware propagation in IoT. Thirdly, a summary of current research is also provided to show various directions of research. In sum, this detailed survey is expected to be useful for researchers and practitioners who are involved in developing solutions for IoT security.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
Internet of medical things (IoMT) is getting researchers' attention due to its wide applicability in healthcare. Smart healthcare sensors and IoT enabled medical devices exchange data and collaborate ...with other smart devices without human interaction to securely transmit collected sensitive healthcare data towards the server nodes. Alongside data communications, security and privacy is also quite challenging to securely aggregate and transmit healthcare data towards Fog and cloud servers. We explored the existing surveys to identify a gap in literature that a survey of fog-assisted secure healthcare data collection schemes is yet contributed in literature. This paper presents a survey of different data collection and secure transmission schemes where Fog computing based architectures are considered. A taxonomy is presented to categorize the schemes. Fog assisted smart city, smart vehicle and smart grids are also considered that achieve secure, efficient and reliable data collection with low computational cost and compression ratio. We present a summary of these scheme along with analytical discussion. Finally, a number of open research challenges are identified. Moreover, the schemes are explored to identify the challenges that are addressed in each scheme.
There has been a tremendous increase in research in the area of cyber security to support cyber applications and to avoid key security threats faced by these applications. The goal of this study is ...to identify and analyze the common cyber security vulnerabilities. To achieve this goal, a systematic mapping study was conducted, and in total, 78 primary studies were identified and analyzed. After a detailed analysis of the selected studies, we identified the important security vulnerabilities and their frequency of occurrence. Data were also synthesized and analyzed to present the venue of publication, country of publication, key targeted infrastructures and applications. The results show that the security approaches mentioned so far only target security in general, and the solutions provided in these studies need more empirical validation and real implementation. In addition, our results show that most of the selected studies in this review targeted only a few common security vulnerabilities such as phishing, denial-of-service and malware. However, there is a need, in future research, to identify the key cyber security vulnerabilities, targeted/victimized applications, mitigation techniques and infrastructures, so that researchers and practitioners could get a better insight into it.
Security and performance (SAP) are two critical NFRs that affect the successful completion of software projects. Organizations need to follow the practices that are vital to SAP verification. These ...practices must be incorporated into the software development process to identify SAP-related defects and avoid failures after deployment. This can only be achieved if organizations are fully aware of SAP verification activities and appropriately include them in the software development process. However, there is a lack of awareness of the factors that influence SAP verification, which makes it difficult for businesses to improve their verification efforts and ensure that the released software meets these requirements. To fill this gap, this research study aimed to identify the mediating factors (MFs) influencing SAP verification and the actions to promote them. Ten MFs and their corresponding actions were identified after thoroughly reviewing the existing literature. The mapping of MFs and their corresponding actions were initially evaluated with the help of a pilot study. Mathematical modeling was utilized to model these MFs and examine each MF’s unique effect on software SAP verification. In addition, two case studies with a small- and a medium-sized organization were used to better understand the function these MFs play in the process of SAP verification. The research findings suggested that MFs assist software development organizations in their efforts to integrate SAP verification procedures into their standard software systems. Further investigation is required to support the understanding of these MFs when building modern software systems.
Agent-Based Medical Health Monitoring System Humayun, Mamoona; Jhanjhi, Noor Z; Almotilag, Abdullah ...
Sensors (Basel, Switzerland),
04/2022, Volume:
22, Issue:
8
Journal Article
Peer reviewed
Open access
One of the leading healthcare concerns worldwide is the aging population. Aged patients require more significant healthcare resources because they are more likely to have chronic diseases that result ...in higher healthcare expenses. The design and implementation of e-health solutions, which offer patients mobile services to assist and enhance their treatment based on monitoring specific physiological data, is one of the key achievements in medical information technology. In the last few decades, there have been tremendous advancements in healthcare technology regarding mobility, size, speed, and communication. However, the critical drawback of today's e-Health monitoring systems is that patients are confined to smart rooms and beds with monitoring gadgets. Such tracking is not widespread due to chronic patients' mobility, privacy, and flexibility issues. Further, health monitoring devices that are fastened to a patient's body do not give any analysis or advice. To improve the health monitoring process, a multi-agent-based system for health monitoring is provided in this study, which entails a group of intelligent agents that gather patient data, reason together, and propose actions to patients and medical professionals in a mobile context. A multi-agent-based framework presented in this study is evaluated through a case study. The results show that the proposed system provides an efficient health monitoring system for chronic, aged, and remote patients. Further, the proposed approach outperforms the existing mHealth system, allowing for timely health facilities for remote patients using 5G technology.
Full text
Available for:
IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK