scholarly journals Modularity and Configuration Applied to Product Integrating the IoT Technology

Author(s):  
Egon Ostrosi ◽  
Sylvain Sagot

The growth of the IoT (Internet of Things) offers a large number of opportunities for new product development. The adoption of IoT technologies improves the operational efficiency of products and their interaction with humans. The variety of sensors and communication protocols, the increased number of cloud infrastructures and services, not forgetting security challenges induced by the IoT technologies lead the designers to make complex choices in the configuration of an optimal IoT solution. Modularity and design for configuration represent an efficient solution for the design of products adopting the IoT technologies. This paper applies the model of configurable product design, conceptualized as multi-layer fuzzy models, to the product integrating the IoT technology. The layer models are the fuzzy product specification layer, the fuzzy functional network layer, the fuzzy physical layer, and the fuzzy constraint layer. The model discerns the consensual elementary solutions that create common ground for moving toward a global solution. The case study shows the configuration of a connected houseplant sensor.

Author(s):  
Juan Boubeta-Puig ◽  
Guadalupe Ortiz ◽  
Inmaculada Medina-Bulo

The Internet of Things (IoT) provides a large amount of data, which can be shared or consumed by thousands of individuals and organizations around the world. These organizations can be connected using Service-Oriented Architectures (SOAs), which have emerged as an efficient solution for modular system implementation allowing easy communications among third-party applications; however, SOAs do not provide an efficient solution to consume IoT data for those systems requiring on-demand detection of significant or exceptional situations. In this regard, Complex Event Processing (CEP) technology continuously processes and correlates huge amounts of events to detect and respond to changing business processes. In this chapter, the authors propose the use of CEP to facilitate the demand-driven detection of relevant situations. This is achieved by aggregating simple events generated by an IoT platform in an event-driven SOA, which makes use of an enterprise service bus for the integration of IoT, CEP, and SOA. The authors illustrate this approach through the implementation of a case study. Results confirm that CEP provides a suitable solution for the case study problem statement.


2016 ◽  
Vol 13 (1) ◽  
pp. 131-143
Author(s):  
Julie Boyles

An ethnographic case study approach to understanding women’s actions and reactions to husbands’ emigration—or potential emigration—offers a distinct set of challenges to a U.S.-based researcher.  International migration research in a foreign context likely offers challenges in language, culture, lifestyle, as well as potential gender norm impediments. A mixed methods approach contributed to successfully overcoming barriers through an array of research methods, strategies, and tactics, as well as practicing flexibility in data gathering methods. Even this researcher’s influence on the research was minimized and alleviated, to a degree, through ascertaining common ground with many of the women. Research with the women of San Juan Guelavía, Oaxaca, Mexico offered numerous and constant challenges, each overcome with ensuing rewards.


2019 ◽  
Vol 7 (2) ◽  
pp. 209-232
Author(s):  
Nicole Jenne ◽  
Jun Yan Chang

AbstractThe conflict between the Thai state and the Malay-Muslim insurgency in the country's Deep South is one of Southeast Asia's most persistent internal security challenges. The start of the current period of violence dates back to the early 2000s, and since then, a significant number of studies exploring the renewed escalation have been published. In this study, we argue that existing scholarship has not adequately accounted for the external environment in which political decisions were taken on how to deal with the southern insurgency. We seek to show how the internationally dominant, hegemonic security agenda of so-called non-traditional security (NTS) influenced the Thai government's approach to the conflict. Building upon the Copenhagen School's securitisation theory, we show how the insurgency became securitised under the dominant NTS narrative, leading to the adoption of harsh measures and alienating discourses that triggered the escalation of violence that continues today. The specific NTS frameworks that ‘distorted’ the Thai state's approach of one that had been informed solely by local facts and conditions were those of anti-narcotics and Islamist terrorism, albeit in different ways. Based on the findings from the case study, the article concludes with a reflection on the role of the hegemonic NTS agenda and its implications for Southeast Asian politics and scholarship.


Electronics ◽  
2021 ◽  
Vol 10 (14) ◽  
pp. 1615
Author(s):  
Zeeshan Ali Khan ◽  
Ubaid Abbasi ◽  
Sung Won Kim

Low power wide area networks (LPWAN) are comprised of small devices having restricted processing resources and limited energy budget. These devices are connected with each other using communication protocols. Considering their available resources, these devices can be used in a number of different Internet of Things (IoT) applications. Another interesting paradigm is machine learning, which can also be integrated with LPWAN technology to embed intelligence into these IoT applications. These machine learning-based applications combine intelligence with LPWAN and prove to be a useful tool. One such IoT application is in the medical field, where they can be used to provide multiple services. In the scenario of the COVID-19 pandemic, the importance of LPWAN-based medical services has gained particular attention. This article describes various COVID-19-related healthcare services, using the the applications of machine learning and LPWAN in improving the medical domain during the current COVID-19 pandemic. We validate our idea with the help of a case study that describes a way to reduce the spread of any pandemic using LPWAN technology and machine learning. The case study compares k-Nearest Neighbors (KNN) and trust-based algorithms for mitigating the flow of virus spread. The simulation results show the effectiveness of KNN for curtailing the COVID-19 spread.


2021 ◽  
Vol 11 (4) ◽  
pp. 1438
Author(s):  
Sebastián Risco ◽  
Germán Moltó

Serverless computing has introduced scalable event-driven processing in Cloud infrastructures. However, it is not trivial for multimedia processing to benefit from the elastic capabilities featured by serverless applications. To this aim, this paper introduces the evolution of a framework to support the execution of customized runtime environments in AWS Lambda in order to accommodate workloads that do not satisfy its strict computational requirements: increased execution times and the ability to use GPU-based resources. This has been achieved through the integration of AWS Batch, a managed service to deploy virtual elastic clusters for the execution of containerized jobs. In addition, a Functions Definition Language (FDL) is introduced for the description of data-driven workflows of functions. These workflows can simultaneously leverage both AWS Lambda for the highly-scalable execution of short jobs and AWS Batch, for the execution of compute-intensive jobs that can profit from GPU-based computing. To assess the developed open-source framework, we executed a case study for efficient serverless video processing. The workflow automatically generates subtitles based on the audio and applies GPU-based object recognition to the video frames, thus simultaneously harnessing different computing services. This allows for the creation of cost-effective highly-parallel scale-to-zero serverless workflows in AWS.


Author(s):  
J Poolton ◽  
I Barclay

There are few studies that have found an adequate means of assessing firms based on their specific needs for a concurrent engineering (CE) approach. Managers interested in introducing CE have little choice but to rely on their past experiences of introducing change. Using data gleaned from a nine month case study, a British-wide survey and a series of in-depth interviews, this paper summarizes the findings of a research study that examines how firms orientate themselves towards change and how they go about introducing CE to their operations. The data show that there are many benefits to introducing CE and that firms differ with respect to their needs for the CE approach. A tentative means to assess CE ‘needs’ is proposed which is based on the level of complexity of goods produced by firms. The method is currently being developed and extended to provide an applications-based framework to assist firms to improve their new product development performance.


Sign in / Sign up

Export Citation Format

Share Document