Search results

1 – 10 of 13
Article
Publication date: 13 October 2022

Arka Ghosh, Jemal Abawajy and Morshed Chowdhury

This study aims to provide an excellent overview of current research trends in the construction sector in digital advancements. It provides a roadmap to policymakers for the…

Abstract

Purpose

This study aims to provide an excellent overview of current research trends in the construction sector in digital advancements. It provides a roadmap to policymakers for the effective utilisation of emergent digital technologies and a need for a managerial shift for its smooth adoption.

Design/methodology/approach

A total of 3,046 peer-reviewed journal review articles covering Internet of Things (IoT), blockchain, building information modelling (BIM) and digital technologies within the construction sector were reviewed using scientometric mapping and weighted mind-map analysis techniques.

Findings

Prominent research clusters identified were: practice-factor-strategy, system, sustainability, BIM and construction worker safety. Leading countries, authors, institutions and their collaborative networks were identified with the UK, the USA, China and Australia leading this field of research. A conceptual framework for an IoT-based concrete lifecycle quality control system is provided.

Originality/value

The study traces the origins of the initial application of Industry 4.0 concepts in the construction field and reviews available literature from 1983 to 2021. It raises awareness of the latest developments and potential landscape realignment of the construction industry through digital technologies conceptual framework for an IoT-based concrete lifecycle quality control system is provided.

Details

Construction Innovation , vol. 24 no. 3
Type: Research Article
ISSN: 1471-4175

Keywords

Article
Publication date: 11 May 2020

Arka Ghosh, David John Edwards, M. Reza Hosseini, Riyadh Al-Ameri, Jemal Abawajy and Wellington Didibhuku Thwala

This research paper adopts the fundamental tenets of advanced technologies in industry 4.0 to monitor the structural health of concrete beam members using cost-effective…

Abstract

Purpose

This research paper adopts the fundamental tenets of advanced technologies in industry 4.0 to monitor the structural health of concrete beam members using cost-effective non-destructive technologies. In so doing, the work illustrates how a coalescence of low-cost digital technologies can seamlessly integrate to solve practical construction problems.

Design/methodology/approach

A mixed philosophies epistemological design is adopted to implement the empirical quantitative analysis of “real-time” data collected via sensor-based technologies streamed through a Raspberry Pi and uploaded onto a cloud-based system. Data was analysed using a hybrid approach that combined both vibration-characteristic-based method and linear variable differential transducers (LVDT).

Findings

The research utilises a novel digital research approach for accurately detecting and recording the localisation of structural cracks in concrete beams. This non-destructive low-cost approach was shown to perform with a high degree of accuracy and precision, as verified by the LVDT measurements. This research is testament to the fact that as technological advancements progress at an exponential rate, the cost of implementation continues to reduce to produce higher-accuracy “mass-market” solutions for industry practitioners.

Originality/value

Accurate structural health monitoring of concrete structures necessitates expensive equipment, complex signal processing and skilled operator. The concrete industry is in dire need of a simple but reliable technique that can reduce the testing time, cost and complexity of maintenance of structures. This was the first experiment of its kind that seeks to develop an unconventional approach to solve the maintenance problem associated with concrete structures. This study merges industry 4.0 digital technologies with a novel low-cost and automated hybrid analysis for real-time structural health monitoring of concrete beams by fusing several multidisciplinary approaches into one integral technological configuration.

Details

International Journal of Building Pathology and Adaptation, vol. 39 no. 2
Type: Research Article
ISSN: 2398-4708

Keywords

Content available
Article
Publication date: 21 November 2008

Jean-Marc Pierson, Ching-Hsien Hsu and Jemal H. Abawajy

436

Abstract

Details

International Journal of Pervasive Computing and Communications, vol. 4 no. 4
Type: Research Article
ISSN: 1742-7371

Article
Publication date: 10 November 2014

Ammar Alazab, Michael Hobbs, Jemal Abawajy, Ansam Khraisat and Mamoun Alazab

The purpose of this paper is to mitigate vulnerabilities in web applications, security detection and prevention are the most important mechanisms for security. However, most…

1313

Abstract

Purpose

The purpose of this paper is to mitigate vulnerabilities in web applications, security detection and prevention are the most important mechanisms for security. However, most existing research focuses on how to prevent an attack at the web application layer, with less work dedicated to setting up a response action if a possible attack happened.

Design/methodology/approach

A combination of a Signature-based Intrusion Detection System (SIDS) and an Anomaly-based Intrusion Detection System (AIDS), namely, the Intelligent Intrusion Detection and Prevention System (IIDPS).

Findings

After evaluating the new system, a better result was generated in line with detection efficiency and the false alarm rate. This demonstrates the value of direct response action in an intrusion detection system.

Research limitations/implications

Data limitation.

Originality/value

The contributions of this paper are to first address the problem of web application vulnerabilities. Second, to propose a combination of an SIDS and an AIDS, namely, the IIDPS. Third, this paper presents a novel approach by connecting the IIDPS with a response action using fuzzy logic. Fourth, use the risk assessment to determine an appropriate response action against each attack event. Combining the system provides a better performance for the Intrusion Detection System, and makes the detection and prevention more effective.

Details

Information Management & Computer Security, vol. 22 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 21 November 2008

Antônio Tadeu A. Gomes, Artur Ziviani, Bruno F. Bastos and Luciana S. Lima

Although wireless grids have been originally thought of as isolated processing clusters, the possibility of their approaching – and connecting to – a fixed network allows for a…

Abstract

Purpose

Although wireless grids have been originally thought of as isolated processing clusters, the possibility of their approaching – and connecting to – a fixed network allows for a huge expansion of their processing power, due to the resources available in wired grids potentially accessible through such a network. The interoperation of mobile ad hoc grids and resources available in wired grids is, however, a problem still to be tackled in the literature. The purpose of this paper is to tackle this problem.

Design/methodology/approach

A prototype is developed to demonstrate the feasibility of the interoperation between wireless and wired grids, thus providing a basis for the development of novel applications that can build on this interoperation.

Findings

The outcome of the paper comprises the analysis of the necessary requirements for the interoperation between wireless and wired grids, the proposal of two different interoperation approaches, and the provision of a qualitative assessment of the implications of these approaches.

Research limitations/implications

There are many points that the authors intend to address as future work. First, they are aware of the need for performing some quantitative analyses of their proxy implementations. Second, they intend to investigate the possibility of mobile ad hoc grids to process tasks coming from wired grids. Third, they are interested in allowing the submission of tasks that present interdependencies (workflows) from mobile devices in the mobile ad hoc grid.

Practical implications

The paper investigates the interoperation of wireless and wired grids. Such an interoperation may open new perspectives of practical use of wireless devices in scenarios such as emergency response networks and field research systems, to name a few.

Originality/value

The paper provides a first step into the interoperation of wireless and wired grids, thus yielding a basis for the development of novel applications that can build upon this interoperation. This is believed to be of interest to both the grid and mobile computing communities.

Details

International Journal of Pervasive Computing and Communications, vol. 4 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 21 November 2008

Ichiro Satoh

The purpose of this paper is to present a component framework for building visual interfaces for pervasive computing systems.

Abstract

Purpose

The purpose of this paper is to present a component framework for building visual interfaces for pervasive computing systems.

Design/methodology/approach

The proposed framework enables end‐users to build visual interfaces for their systems by using document‐editing manner.

Findings

The building and operating visual interfaces are useful for managing pervasive computing systems.

Research limitations/implications

The framework is designed based on Java but programming language‐independent version is needed.

Practical implications

A component framework was implemented for building visual interfaces for pervasive computing.

Originality/value

A framework for visual interfaces for pervasive computing is unique.

Details

International Journal of Pervasive Computing and Communications, vol. 4 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 21 November 2008

Rabab Hayek, Guillaume Raschia, Patrick Valduriez and Noureddine Mouaddib

The goal of this paper is to contribute to the development of both data localization and description techniques in P2P systems.

Abstract

Purpose

The goal of this paper is to contribute to the development of both data localization and description techniques in P2P systems.

Design/methodology/approach

The approach consists of introducing a novel indexing technique that relies on linguistic data summarization into the context of P2P systems.

Findings

The cost model of the approach, as well as the simulation results have shown that the approach allows the efficient maintenance of data summaries, without incurring high traffic overhead. In addition, the cost of query routing is significantly reduced in the context of summaries.

Research limitations/implications

The paper has considered a summary service defined on the APPA's architecture. Future works have to study the extension of this work in order to be generally applicable to any P2P data management system.

Practical implications

This paper has mainly studied the quantitative gain that could be obtained in query processing from exploiting data summaries. Future works aim to implement this technique on real data (not synthetic) in order to study the qualitative gain that can be obtained from approximately answering a query.

Originality/value

The novelty of the approach shown in the paper relies on the double exploitation of the summaries in P2P systems: data summaries allow for a semantic‐based query routing, and also for an approximate query answering, using their intentional descriptions.

Details

International Journal of Pervasive Computing and Communications, vol. 4 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 21 November 2008

Luiz Angelo Steffenel, Maxime Martinasso and Denis Trystram

The purpose of this paper is to explain one of the most important collective communication patterns used in scientific applications which is the complete exchange, also called…

Abstract

Purpose

The purpose of this paper is to explain one of the most important collective communication patterns used in scientific applications which is the complete exchange, also called All‐to‐All. Although efficient algorithms have been studied for specific networks, general solutions like those available in well‐known MPI distributions (e.g. the MPI_Alltoall operation) are strongly influenced by the congestion of network resources.

Design/methodology/approach

In this paper we present an integrated approach to model the performance of the All‐to‐All collective operation, which consists in identifying a contention signature that characterizes a given network environment, using it to augment a contention‐free communication model.

Findings

This approach, assessed by experimental results, allows an accurate prediction of the performance of the All‐to‐All operation over different network architectures with a small overhead.

Practical implications

The paper discusses the problem of network contention in a grid environment, studying some strategies to minimize the impact of contention on the performance of an All‐to‐All operation.

Originality/value

The approach used, assessed by experimental results, allows an accurate prediction of the performance of the All‐to‐All operation over different network architectures with a small overhead. Also discussed is the problem of network contention in a grid environment and some strategies to minimize the impact of contention on the performance of an All‐to‐All operation.

Details

International Journal of Pervasive Computing and Communications, vol. 4 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 21 November 2008

Ren‐Song Ko, Chih‐Chung Lai, Chia‐Kuan Yen and Matt W. Mutka

The problems with poor performance and quality of ubiquitous applications due to limited computing resources are addressed.

Abstract

Purpose

The problems with poor performance and quality of ubiquitous applications due to limited computing resources are addressed.

Design/methodology/approach

The concept of ad hoc systems is introduced based on the idea that a resource‐limited device may cooperate with computers around to complete a complex task. Subsequently, the adaptive software framework, FRAME, may be improved to realize ad hoc systems.

Findings

It is possible to apply the adaptive software framework to the challenges of ad hoc systems, including a lot of user intervention and unstable computing environments.

Research limitations/implications

The present study provides a starting‐point for further research in exploring and utilizing ubiquitous resources to achieve a better user experience.

Practical implications

The component‐based architecture provides a flexible development approach of ubiquitous applications from the software engineering perspective.

Originality/value

Our analysis and experimental results show that the concept of ad hoc systems is practical and can be realized by the adaptive software framework.

Details

International Journal of Pervasive Computing and Communications, vol. 4 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 21 November 2008

D. Villa, F.J. Villanueva, F. Moya, F. Rincón, J. Barba and J.C. López

The purpose of this paper is to present a new service discovery protocol (SDP) suitable for wireless sensor networks (WSN). The constraints imposed by ultra low‐cost sensor and…

Abstract

Purpose

The purpose of this paper is to present a new service discovery protocol (SDP) suitable for wireless sensor networks (WSN). The constraints imposed by ultra low‐cost sensor and actuators devices (basic components of a WSN) are taken into account to minimize the overall footprint.

Design/methodology/approach

It is based on the lightweight WSN communication model used by picoObjects, a tiny implementation of the distributed object concept and the same design criteria are followed, aiming at minimal overhead for devices and communication protocols. In spite of its simplicity it is powerful enough to deploy a valuable set of services.

Findings

This approach provides a remote interface that client applications can use without knowing where the service is implemented (platform and location independence).

Research limitations/implications

The future work is mainly focused on integrating third party services using different SDPs, making possible the real deployment of large heterogeneous pervasive environments.

Practical implications

Designers may change the underlying SDP model (e.g. centralized versus distributed) without affecting applications by just tweaking configuration settings.

Originality/value

Embedded devices can participate in the service discovering procedure providing their own services by means of standard distributed objects. Also, the protocol is suitable for any kind of dynamic networked system.

Details

International Journal of Pervasive Computing and Communications, vol. 4 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of 13