Search results

1 – 10 of over 17000
Article
Publication date: 1 February 2006

Daniel Schall, Marco Aiello and Schrahram Dustdar

The capabilities of embedded devices such as smartphones are steadily increasing and provide the great flexibility of data access and collaboration while being mobile. From the…

Abstract

The capabilities of embedded devices such as smartphones are steadily increasing and provide the great flexibility of data access and collaboration while being mobile. From the distributed computing point of view, fundamental issues in mobile computing include heterogeneity in terms of varying device capabilities (i.e., operating systems and various hardware platforms), performance characteristics and real‐time behavior, and the ability to discover and interact with peers seamlessly. Web services are a family of XML based protocols to achieve interoperability among loosely coupled networked applications. We propose the use of Web services on embedded devices in order to solve interoperability issues in distributed mobile systems. We discuss various toolkits available for embedded devices and investigate performance characteristics of embedded Web services on smartphones. Our goal is to guide the design of Web services based applications on mobile devices, and provide estimates of performance that can be expected.

Details

International Journal of Web Information Systems, vol. 2 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 1 April 2002

Edward Finch

Information used for performance measurement is very different from the kind of information used for control and monitoring. It tends to make use of aggregate data covering time…

Abstract

Information used for performance measurement is very different from the kind of information used for control and monitoring. It tends to make use of aggregate data covering time intervals of months rather than minutes. Accuracy rather than precision is the overarching concern. Some performance indicators can be derived from building control data. Information such as conversion efficiencies of plant and energy efficiency of buildings can be calculated from monitored data. For the purposes of performance assessment, however, such data tend to be limited in scope. The advent of embedded web servers promises to change this situation radically. Not just data, but transformed information, can be generated by the coexistence of device‐people networks. Effectiveness becomes a measurable concept as web enabled devices create information designed for human interpretation rather than the interpretation of other computers.

Details

Journal of Facilities Management, vol. 1 no. 2
Type: Research Article
ISSN: 1472-5967

Keywords

Article
Publication date: 9 October 2019

Elham Ali Shammar and Ammar Thabit Zahary

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by…

6494

Abstract

Purpose

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by enabling connections between smart objects and humans, and also between smart objects themselves, which leads to anything, anytime, anywhere, and any media communications. IoT allows objects to physically see, hear, think, and perform tasks by making them talk to each other, share information and coordinate decisions. To enable the vision of IoT, it utilizes technologies such as ubiquitous computing, context awareness, RFID, WSN, embedded devices, CPS, communication technologies, and internet protocols. IoT is considered to be the future internet, which is significantly different from the Internet we use today. The purpose of this paper is to provide up-to-date literature on trends of IoT research which is driven by the need for convergence of several interdisciplinary technologies and new applications.

Design/methodology/approach

A comprehensive IoT literature review has been performed in this paper as a survey. The survey starts by providing an overview of IoT concepts, visions and evolutions. IoT architectures are also explored. Then, the most important components of IoT are discussed including a thorough discussion of IoT operating systems such as Tiny OS, Contiki OS, FreeRTOS, and RIOT. A review of IoT applications is also presented in this paper and finally, IoT challenges that can be recently encountered by researchers are introduced.

Findings

Studies of IoT literature and projects show the disproportionate importance of technology in IoT projects, which are often driven by technological interventions rather than innovation in the business model. There are a number of serious concerns about the dangers of IoT growth, particularly in the areas of privacy and security; hence, industry and government began addressing these concerns. At the end, what makes IoT exciting is that we do not yet know the exact use cases which would have the ability to significantly influence our lives.

Originality/value

This survey provides a comprehensive literature review on IoT techniques, operating systems and trends.

Details

Library Hi Tech, vol. 38 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 1 September 1999

Mark A. Frautschi

In the context of the “year‐2000” problem, focuses on the risk involved in real time clocks and their interactions with associated embedded processors and logic arrays, dedicated…

Abstract

In the context of the “year‐2000” problem, focuses on the risk involved in real time clocks and their interactions with associated embedded processors and logic arrays, dedicated electronic control and monitoring logic incorporated into larger systems. These are essential to the operation of a vast portfolio of infrastructures, from medical equipment, to buildings (phone, security, heating, plumbing and lighting), to transportation, to financial networks, to just‐in‐time delivery systems, and so on. According to a recent study, the firmware (permanently loaded instructions) that enables these systems to run is date sensitive and not year‐2000‐compliant in less than 1 percent of the 50 billion microprocessors and microcontrollers used in embedded systems installed worldwide by the end of the twentieth century. This small fraction will fail, causing the systems they control to begin failing around 1 January 2000 and for the first few years of the next century. Presents a pessimistic, illustrative scenario, describing the disruption of essential infrastructure from electric power, to food and fuel distribution, to communications, to financial networks.

Details

Management Decision, vol. 37 no. 7
Type: Research Article
ISSN: 0025-1747

Keywords

Article
Publication date: 26 June 2009

Ryohei Sagara, Yasue Kishino, Tsutomu Terada and Shojiro Nishio

In ubiquitous computing environments, not only programmers but also general users come to develop/customize applications. Therefore, the purpose of this paper is to propose a new…

Abstract

Purpose

In ubiquitous computing environments, not only programmers but also general users come to develop/customize applications. Therefore, the purpose of this paper is to propose a new application development environment for ubiquitous computing environments.

Design/methodology/approach

The paper clarifies the requirements for application development environments of ubiquitous computing environments. It then designs and implements a prototype of a development environment that fulfills these requirements.

Findings

It is found that the requirements for application development in ubiquitous computing environments are: easy programming, detection of current status, programming awareness of network connections between multiple ubiquitous devices, and debugging with cooperation among real/virtual environments.

Research limitations/implications

This prototype of application development environment is designed for event‐driven ubiquitous devices.

Practical implications

A prototype development environment has been implemented to show the effectiveness of this approach, and is presented an example of an application development to show the effectiveness of the approach.

Originality/value

This paper proposes a new style of application development for ubiquitous computing environments

Details

International Journal of Pervasive Computing and Communications, vol. 5 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Content available
Article
Publication date: 16 November 2012

John Ling

219

Abstract

Details

Circuit World, vol. 38 no. 4
Type: Research Article
ISSN: 0305-6120

Content available
Article
Publication date: 14 September 2012

366

Abstract

Details

Soldering & Surface Mount Technology, vol. 24 no. 4
Type: Research Article
ISSN: 0954-0911

Article
Publication date: 16 February 2024

Neil Alperstein

The purpose of this study was to examine consumer data acquired by branded prescription drug websites and the ethics of privacy related to the interconnected web of personal…

Abstract

Purpose

The purpose of this study was to examine consumer data acquired by branded prescription drug websites and the ethics of privacy related to the interconnected web of personal information accessed, packaged and resold by tracker technologies.

Design/methodology/approach

The research used the DMI Tracker Tool to collect data on the top 17 branded prescription drug websites, with a specific interest in the tracker technologies embedded in those websites. That data was analyzed using Gephi, an open-source data visualization tool, to map the network of trackers embedded in those branded prescription drug websites.

Findings

Findings visualize the interconnections between tracker technologies and prescription drug websites that undergird a system of personal data acquisition and programmatic advertising vehicles that serve the interests of prescription drug marketers and Big Tech. Based on the theory of platform ethics, the study demonstrated the presence of a technostructural ecosystem dominated by Big Tech, a system that goes unseen by consumers and serves the interests of advertisers and resellers of consumer data.

Research limitations/implications

The 17 websites used in this study were limited to the top-selling prescription drugs or those with the highest ad expenditures. As such this study is not based on a random sampling of branded prescription drug websites. The popularity of these prescription drugs or the expanse of advertising associated with the drugs makes them appropriate to study the presence of tracking devices that collect data from consumers and serve advertising to them. It is also noted that websites are dynamic spaces, and some trackers within their infrastructures are apt to change over time.

Practical implications

Branded prescription drug information has over the past three decades become part of consumers’ routine search for information regarding what ails them. As drug promotion moved from print to TV and the Web, searching for drug information has become a part of everyday life. The implications of embedded trackers on branded prescription drug websites are the subject of this research.

Social implications

This study has significant social implications as consumers who are searching for information regarding prescription medications may not want drug companies tracking them in a way that many perceive to be an invasion of privacy. Yet, as the Web is dominated by Big Tech, web developers have little choice but to remain a part of this technostructural ecosystem.

Originality/value

This study sheds light on branded prescription drug websites, exploring the imbalance between the websites under study, Big Tech and consumers who lack awareness of the system that operates backstage.

Details

International Journal of Pharmaceutical and Healthcare Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1750-6123

Keywords

Article
Publication date: 1 February 2005

Jianhua Ma, Laurence T. Yang, Bernady O. Apduhan, Runhe Huang, Leonard Barolli and Mokoto Takizawa

A cyber world (CW) is a digitized world created on cyberspaces inside computers interconnected by networks including the Internet. Following ubiquitous computers, sensors, e‐tags…

Abstract

A cyber world (CW) is a digitized world created on cyberspaces inside computers interconnected by networks including the Internet. Following ubiquitous computers, sensors, e‐tags, networks, information, services, etc., is a road towards a smart world (SW) created on both cyberspaces and real spaces. It is mainly characterized by ubiquitous intelligence or computational intelligence pervasion in the physical world filled with smart things. In recent years, many novel and imaginative researches have been conducted to try and experiment a variety of smart things including characteristic smart objects and specific smart spaces or environments as well as smart systems. The next research phase to emerge, we believe, is to coordinate these diverse smart objects and integrate these isolated smart spaces together into a higher level of spaces known as smart hyperspace or hyper‐environments, and eventually create the smart world. In this paper, we discuss the potential trends and related challenges toward the smart world and ubiquitous intelligence from smart things to smart spaces and then to smart hyperspaces. Likewise, we show our efforts in developing a smart hyperspace of ubiquitous care for kids, called UbicKids.

Details

International Journal of Pervasive Computing and Communications, vol. 1 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 6 April 2010

Evi Syukur and Seng Wai Loke

Pervasive computing environments such as a pervasive campus domain, shopping, etc. will become commonplaces in the near future. The key to enhance these system environments with…

Abstract

Purpose

Pervasive computing environments such as a pervasive campus domain, shopping, etc. will become commonplaces in the near future. The key to enhance these system environments with services relies on the ability to effectively model and represent contextual information, as well as spontaneity in downloading and executing the service interface on a mobile device. The system needs to provide an infrastructure that handles the interaction between a client device that requests a service and a server which responds to the client's request via Web service calls. The system should relieve end‐users from low‐level tasks of matching services with locations or other context information. The mobile users do not need to know or have any knowledge of where the service resides, how to call a service, what the service API detail is and how to execute a service once downloaded. All these low‐level tasks can be handled implicitly by a system. The aim of this paper is to investigate the notion of context‐aware regulated services, and how they should be designed, and implemented.

Design/methodology/approach

The paper presents a detailed design, and prototype implementation of the system, called mobile hanging services (MHS), that provides the ability to execute mobile code (service application) on demand and control entities' behaviours in accessing services in pervasive computing environments. Extensive evaluation of this prototype is also provided.

Findings

The framework presented in this paper enables a novel contextual services infrastructure that allows services to be described at a high level of abstraction and to be regulated by contextual policies. This contextual policy governs the visibility and execution of contextual services in the environment. In addition, a range of contextual services is developed to illustrate different types of services used in the framework.

Originality/value

The main contribution of this paper is a high‐level model of a system for context‐aware regulated services, which consists of environments (domains and spaces), contextual software components, entities and computing devices.

Details

International Journal of Pervasive Computing and Communications, vol. 6 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of over 17000