In recent years, the usage model of the Internet has changed, pushing researchers towards the design of the Information-Centric Networking (ICN) paradigm as a possible replacement of the existing ...architecture. Even though both Academia and Industry have investigated the feasibility and effectiveness of ICN, achieving the complete replacement of the Internet Protocol (IP) is a challenging task: (i) the process involves multiple parties, such as Internet Service Providers (ISPs), that need to coordinate among each other; (ii) it requires an indefinite amount of time to update hardware and software of network components; and (iii) it is a high risk goal that might introduce unexpected complications. Thus, the process of replacing the current Internet will inevitably lead towards a period of coexistence between the old and the new architectures. Given the urgency of the problem, this transition phase will happen very soon and people should address it in a smooth way. Some research groups have already addressed the coexistence by designing their own architectures, but none of those is the final solution to move towards the future Internet considering the unaltered state of the networking. To design such architecture, the research community needs now a comprehensive overview of the existing solutions that have so far addressed the coexistence. The purpose of this paper is to reach this goal by providing the first comprehensive survey and classification of the coexistence architectures according to their features (i.e., deployment approach, deployment scenarios, addressed coexistence requirements and additional architecture or technology used) and evaluation parameters (i.e., challenges emerging during the deployment and the runtime behaviour of an architecture). We believe that this paper will finally fill the gap required for moving towards the design of the final coexistence architecture.
The Internet is a medium with great consequences for social and economic life. This book is written to help people discern in what ways it has commanded the public imagination, and the methodological ...issues that arise when one tries to study and understand the social processes occurring within it.
The Internet of Things (IoT) infrastructure with numerous diverse physical devices are growing up rapidly, which need a dynamic services coordination approach that can integrate those heterogeneous ...physical devices into the context-aware IoT infrastructure. This paper proposes a situation-aware dynamic IoT services coordination approach. First, focusing on the definition of formal situation event pattern with event selection and consumption strategy, an automaton-based situational event detection algorithm is proposed. Second, the enhanced event-condition-action is used to coordinate the IoT services effectively, and also the collaboration process decomposing algorithm and the rule mismatch detection algorithms are proposed. Third, the typical scenarios of IoT services coordination for smart surgery process are also illustrated and the measurement and analysis of the platform's performance are reported. Finally, the conclusions and future works are given.
•Sensor-packed manufacturing systems will become ubiquitous.•Cybersecurity aspects are gaining importance within the manufacturing domain.•Manufacturing cyber-physical systems are expected to follow ...the trend set by other domains that benefited from the Internet of Things, Cloud Computing, and Big Data.•Outcomes of the implementation of manufacturing cyber-physical systems could be transformative to the extent that predictive manufacturing systems can become a reality.
The recent advances in sensor and communication technologies can provide the foundations for linking the physical manufacturing facility and machine world to the cyber world of Internet applications. The coupled manufacturing cyber-physical system is envisioned to handle the actual operations in the physical world while simultaneously monitor them in the cyber world with the help of advanced data processing and simulation models at both the manufacturing process and system operational levels. Moreover, a sensor-packed manufacturing system in which each process or piece of equipment makes available event and status information, coupled with market research for true advanced Big Data analytics, seem to be the right ingredients for event response selection and operation virtualization. As a drawback, the resulting manufacturing cyber-physical system will be vulnerable to the inevitable cyber-attacks, unfortunately, so common for the software and Internet-based systems. This reality makes cybersecurity penetration within the manufacturing domain a need that goes uncontested across researchers and practitioners. This work provides a review of the current status of virtualization and cloud-based services for manufacturing systems and of the use of Big Data analytics for planning and control of manufacturing operations. Building on already developed cloud business solutions, cloud manufacturing is expected to offer improved enterprise manufacturing and business decision support. Based on the current state-of-the-art cloud manufacturing solutions and Big Data applications, this work also proposes a framework for the development of predictive manufacturing cyber-physical systems that include capabilities for attaching to the Internet of Things, and capabilities for complex event processing and Big Data algorithmic analytics.
The Internet of Drones (IoD) has become a hot research topic in academia, industry, and management in current years due to its wide potential applications, such as aerial photography, civilian, and ...military. This paper presents a comprehensive survey of IoD and its applications, deployments, and integration. We focused in this review on two main sides; IoD Applications include smart cities surveillance, cloud and fog frameworks, unmanned aerial vehicles, wireless sensor networks, networks, mobile computing, and business paradigms; integration of IoD includes privacy protection, security authentication, neural network, blockchain, and optimization based-method. A discussion highlights the hot research topics and problems to help researchers interested in this area in their future works. The keywords that have been used in this paper are Internet of Drones.
How online affinity networks expand learning and opportunity for young people
Boyband One Direction fanfiction writers, gamers who solve math problems together, Harry Potter fans who knit for a ...cause. Across subcultures and geographies, young fans have found each other and formed community online, learning from one another along the way. From these and other in-depth case studies of online affinity networks, Affinity Online considers how young people have found new opportunities for expanded learning in the digital age. These cases reveal the shared characteristics and unique cultures and practices of different online affinity networks, and how they support “connected learning”—learning that brings together youth interests, social activity, and accomplishment in civic, academic, and career relevant arenas. Although involvement in online communities is an established fixture of growing up in the networked age, participation in these spaces show how young people are actively taking up new media for their own engaged learning and social development.
While providing a wealth of positive examples for how the online world provides new opportunities for learning, the book also examines the ways in which these communities still reproduce inequalities based on gender, race, and socioeconomic status. The book concludes with a set of concrete suggestions for how the positive learning opportunities offered by online communities could be made available to more young people, at school and at home. Affinity Online explores how online practices and networks bridge the divide between in-school and out-of-school learning, finding that online affinity networks are creating new spaces of opportunity for realizing the ideals of connected learning.
Internet Addiction and Other Behavioral Addictions Jorgenson, Alicia Grattan; Hsiao, Ray Chih-Jui; Yen, Cheng-Fang
Child and adolescent psychiatric clinics of North America,
07/2016, Volume:
25, Issue:
3
Journal Article
Peer reviewed
The Internet is increasingly influential in the lives of adolescents. Although there are many positives, there are also risks related to excessive use and addiction. It is important to recognize ...clinical signs and symptoms of Internet addiction (compulsive use, withdrawal, tolerance, and adverse consequences), treat comorbid conditions (other substance use disorders, attention deficit hyperactivity disorder, anxiety, depression, and hostility), and initiate psychosocial interventions. More research on this topic will help to provide consensus on diagnostic criteria and further clarify optimal management.
To examine the relationship between different Internet-use intensities and adolescent mental and somatic health.
Data were drawn from the 2002 Swiss Multicenter Adolescent Survey on Health, a ...nationally representative survey of adolescents aged 16 to 20 years in post-mandatory school. From a self-administered anonymous questionnaire, 3906 adolescent boys and 3305 girls were categorized into 4 groups according to their intensity of Internet use: heavy Internet users (HIUs; >2 hours/day), regular Internet users (RIUs; several days per week and ≤ 2 hours/day), occasional users (≤ 1 hour/week), and non-Internet users (NIUs; no use in the previous month). Health factors examined were perceived health, depression, overweight, headaches and back pain, and insufficient sleep.
In controlled multivariate analysis, using RIUs as a reference, HIUs of both genders were more likely to report higher depressive scores, whereas only male users were found at increased risk of overweight and female users at increased risk of insufficient sleep. Male NIUs and female NIUs and occasional users also were found at increased risk of higher depressive scores. Back-pain complaints were found predominantly among male NIUs.
Our study provides evidence of a U-shaped relationship between intensity of Internet use and poorer mental health of adolescents. In addition, HIUs were confirmed at increased risk for somatic health problems. Thus, health professionals should be on the alert when caring for adolescents who report either heavy Internet use or very little/none. Also, they should consider regular Internet use as a normative behavior without major health consequence.
Fresh from a party, a teen posts a photo on Facebook of a friend drinking a beer. A college student repurposes an article from Wikipedia for a paper. A group of players in a multiplayer online game ...routinely cheat new players by selling them worthless virtual accessories for high prices. InDisconnected, Carrie James examines how young people and the adults in their lives think about these sorts of online dilemmas, describing ethical blind spots and disconnects. Drawing on extensive interviews with young people between the ages of 10 and 25, James describes the nature of their thinking about privacy, property, and participation online. She identifies three ways that young people approach online activities. A teen might practiceself-focused thinking, concerned mostly about consequences for herself;moral thinking, concerned about the consequences for people he knows; orethical thinking, concerned about unknown individuals and larger communities. James finds, among other things, that youth are often blind to moral or ethical concerns about privacy; that attitudes toward property range from "what's theirs is theirs" to "free for all"; that hostile speech can be met with a belief that online content is "just a joke"; and that adults who are consulted about such dilemmas often emphasize personal safety issues over online ethics and citizenship. Considering ways to address the digital ethics gap, James offers a vision ofconscientious connectivity, which involves ethical thinking skills but, perhaps more important, is marked by sensitivity to the dilemmas posed by online life, a motivation to wrestle with them, and a sense of moral agency that supports socially positive online actions.
•A review of COVID-19 guidelines ensures the need of disruptive technologies.•COVID-19 enforces healthcare system to find alternatives for patients' treatment.•The disruptive technologies used to ...analyze and to restrict the spread of COVID-19.•The study aids healthcare team to detect the plan of treatment remotely and safely.•The analysis of COVID-19 patients ensures the importance of intelligent framework.
This paper describes a framework using disruptive technologies for COVID-19 analysis. Disruptive technologies include high-tech and emerging technologies such as AI, industry 4.0, IoT, Internet of Medical Things (IoMT), big data, virtual reality (VR), Drone technology, and Autonomous Robots, 5 G, and blockchain to offer digital transformation, research and development and service delivery. Disruptive technologies are essential for Industry 4.0 development, which can be applied to many disciplines. In this paper, we present a framework that uses disruptive technologies for COVID-19 analysis. The proposed framework restricts the spread of COVID-19 outbreaks, ensures the safety of the healthcare teams and maintains patients' physical and psychological healthcare conditions. The framework is designed to deal with the severe shortage of PPE for the medical team, reduce the massive pressure on hospitals, and track recovered patients to treat COVID-19 patients with plasma. The study provides oversight for governments on how to adopt technologies to reduce the impact of unprecedented outbreaks for COVID-19. Our work illustrates an empirical case study on the analysis of real COVID-19 patients and shows the importance of the proposed intelligent framework to limit the current outbreaks for COVID-19. The aim is to help the healthcare team make rapid decisions to treat COVID-19 patients in hospitals, home quarantine, or identifying and treating patients with typical cold or flu.