To see the other types of publications on this topic, follow the link: ICT Integration and Data Security and Privacy.

Journal articles on the topic 'ICT Integration and Data Security and Privacy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'ICT Integration and Data Security and Privacy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

UHIRIWE, ALICE, and Dushimimana Jean de Dieu DR. "EFFECT OF INFORMATION COMMUNICATION TECHNOLOGY (ICT) ON PROJECT PERFORMANCE. A CASE OF BUILDING RESILIENCE IN LEADING TEACHING AND LEARNING TOGETHER PROJECT (BRLTLT) IN KICUKIRO DISTRICT, RWANDA." International Journal of Social Science and Humanities Research 13, no. 2 (2025): 175–87. https://doi.org/10.5281/zenodo.15295160.

Full text
Abstract:
<strong>Abstract:</strong> This study dug into the interaction of Information Communication Technology (ICT) and project performance, specifically within the context of the "Building-Resilience in Leading Teaching and Learning Together Project" (BRLTLT) in Kicukiro district. The overarching objective was to assess the forthcoming impact of ICT on project performance in the Rwandan educational landscape. Specific objectives included the examination of the effect of ICT infrastructure, ICT integration, and data security and privacy on the project performance of BRLTLT in Kicukiro district. The major population of the study, which actively participate in the research, consists of instructors participating in the BRLTLT project in Kicukiro district, with a special focus on the 1,056 teachers in Kicukiro district. The study population was the BRLTLT project's 1,056 teachers in Kicukiro district was the focus and sample size, which was be 91 teachers, was calculated using Slovin's sample size calculation with a 10% margin of error. The researcher intended to use random selection to obtain multiple viewpoints, assuring representation from various backgrounds, teaching levels, and areas. Data was gathered through questionnaires designed to elicit in-depth responses from teachers who participated in the BRLTLT project, a documentary study involving relevant literature, and structured interviews to gain insights into trained teachers' creative practices and challenges. In anticipation of the data analysis to come, the researcher used inferential statistics, such a regression model, in conjunction with descriptive statistics, like frequencies, percentages, means, and standard deviations, to identify meaningful associations. Key Findings in Table 8: ICT Infrastructure and Project Performance show the results highlight a strong consensus on the importance of ICT infrastructure in project execution. Hardware reliability (mean = 4.9670) and networking infrastructure (mean = 4.9780) were rated highest, emphasizing their role in efficient data sharing and reduced downtime. The low standard deviations indicate consistent agreement, reinforcing that ICT infrastructure significantly enhances communication and project efficiency, Table 9: ICT Integration and Project Performance show ICT integration was perceived as comprehensive and effective (mean = 4.9780, SD = 0.20966), supporting workflow management, decision-making, and communication. However, integration across all project stages showed slight variations (SD = 0.69798), suggesting differences in experiences. Overall, results affirm ICT&rsquo;s critical role in efficiency and collaboration and Table 10: Data Security and Privacy in Project Performance indicates data security measures were highly valued, with mean scores above 4.86. Regular security audits (mean = 4.9011) and data encryption (mean = 4.9231) were seen as essential for safeguarding project information. The low standard deviations confirm a strong agreement on the importance of data protection in project efficiency. The study recommends that the BRLTLT project should invest in robust ICT infrastructure, enhance ICT integration, and strengthen data security to improve project performance. Regular monitoring and evaluation of ICT systems are essential. The Government of Rwanda should increase ICT investments in educational projects, ensuring equitable access to modern technology, especially in rural areas. <strong>Keywords:</strong><em> </em>Information Communication Technology (ICT), Project performance, ICT Infrastructure, ICT Integration and Data Security and Privacy. <strong>Title:</strong> EFFECT OF INFORMATION COMMUNICATION TECHNOLOGY (ICT) ON PROJECT PERFORMANCE. A CASE OF BUILDING RESILIENCE IN LEADING TEACHING AND LEARNING TOGETHER PROJECT (BRLTLT) IN KICUKIRO DISTRICT, RWANDA <strong>Author:</strong> UHIRIWE ALICE, DR. Dushimimana Jean de Dieu <strong>International Journal of Social Science and Humanities Research&nbsp; </strong> <strong>ISSN 2348-3156 (Print), ISSN 2348-3164 (online)</strong> <strong>Vol. 13, Issue 2, April 2025 - June 2025</strong> <strong>Page No: 175-187</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 28-</strong><strong>April-2025</strong> <strong>DOI: https://doi.org/10.5281/zenodo.15295160</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/effect-of-information-communication-technology-ict-on-project-performance-a-case-of-building-resilience-in-leading-teaching-and-learning-together-project-brltlt-in-kicukiro-district-rwanda</strong>
APA, Harvard, Vancouver, ISO, and other styles
2

Researcher. "BALANCING FUNCTIONALITY AND SECURITY: A FRAMEWORK FOR IOT SOFTWARE INTEGRATION WITH THIRD-PARTY SERVICES IN CRITICAL SECTORS." International Journal of Research In Computer Applications and Information Technology (IJRCAIT) 7, no. 2 (2024): 263–79. https://doi.org/10.5281/zenodo.13970070.

Full text
Abstract:
The rapid growth of the Internet of Things (IoT) ecosystem has led to an increased need for seamless integration between IoT software applications and third-party solutions across various industries. While offering significant benefits in terms of enhanced functionality and efficiency, this integration presents substantial challenges in maintaining robust security measures.&nbsp;This article explores the complexities of integrating IoT platforms with third-party services in smart cities, healthcare, and automotive sectors, focusing on ensuring secure authentication, authorization, and communications. We analyze the critical aspects of data privacy and security throughout the entire data lifecycle, from collection to deletion, in the context of IoT-third party integrations. The article addresses key challenges, such as scalability issues and potential security vulnerabilities introduced by these integrations. By examining case studies and current best practices, we propose a comprehensive framework for secure IoT integration that balances functionality with stringent security requirements. Our findings highlight the importance of robust API (Application Programming Interface) security, encryption protocols, and access control mechanisms in creating resilient IoT ecosystems. This article contributes to the growing body of knowledge on IoT security. It provides practical guidelines for organizations seeking to leverage third-party integrations while maintaining the integrity and confidentiality of their IoT platforms.
APA, Harvard, Vancouver, ISO, and other styles
3

Abdussalam, Ali Ahmed, Belrzaeg Mohamed, Nassar Yasser, J. El-Khozondar Hala, Khaleel Mohamed, and Alsharif Abdulgader. "A comprehensive review towards smart homes and cities considering sustainability developments, concepts, and future trends." World Journal of Advanced Research and Reviews 19, no. 1 (2023): 1482–89. https://doi.org/10.5281/zenodo.10335712.

Full text
Abstract:
The adoption of Smart Homes (SHs) and Smart Cities (SCs) brings numerous benefits to the society and environment by exploiting the Information communication technologies (ICTs). These include increased efficiency, reduced energy waste, lower utility bills, improved safety and security, enhanced mobility options, and a more sustainable and liveable urban environment using Vehicle-to-Grid (V2G) technology. Moreover, the integration of technology such Internet of Things (IoT) and data-driven solutions can lead to better decision-making, more responsive public services, and increased citizen engagement. However, there are challenges that need to be addressed for the full realization of smart homes and smart cities. These include concerns related to privacy, data security, interoperability of devices and systems, infrastructure investment, and ensuring equitable access to these technologies. Overcoming these challenges will require collaboration between policymakers, technology providers, urban planners, and citizens to create a framework that balances innovation, privacy, and sustainability. Despite the challenges, the potential benefits of smart homes and smart cities make them compelling solutions for the future. By leveraging technology to create more efficient, sustainable, and liveable spaces, smart homes and smart cities have the potential to significantly improve our everyday lives and contribute to a more prosperous and environmentally friendly future.
APA, Harvard, Vancouver, ISO, and other styles
4

Kumbo, Lazaro Inon, Deogratias Tasilo Mahuwi, Bernad Joseph Hayuma, Victor Simon Nkwera, Christopher Denis Ntyangiri, and Martin Ludovick Mushi. "Review of Blockchain Technology on Data Security and Privacy: Recommendations for Advancing Tanzania's ICT Sector." ABUAD Journal of Engineering Research and Development (AJERD) 7, no. 2 (2024): 475–83. http://dx.doi.org/10.53982/ajerd.2024.0702.45-j.

Full text
Abstract:
The rapid growth of the ICT sector has led to increased global data exchange and innovation opportunities. The increased use of technology has brought about concerns regarding data security and privacy which triggered a rising interest in blockchain technology as a potential solution to security challenges. This research endeavours to comprehensively examine the influence of blockchain on data security and privacy inside and outside Tanzanian, filling the gap that exists. The blended approach was used to analyse blockchain's effects while focusing on ethical considerations. The review emphasizes the benefits of blockchain in enhancing data security, trust, and transparency, along with its various applications. The research highlights blockchain technology's potential to offer robust data protection and improve transparency while identifying the challenges that must be addressed for successful implementation. The study investigates the role of blockchain in securing information systems in global and Tanzanian settings, focusing on sectors such as healthcare, banking, education, and land registration. The study emphasises the significant potential of blockchain technology to impact various industries in Tanzania profoundly. It offers valuable insights for professionals, policymakers, and researchers, highlighting the need to investigate how blockchain can be applied explicitly within different sectors. Additionally, it suggests practical strategies for seamlessly integrating this technology, considering the unique challenges the Tanzanian ICT sector encounters.
APA, Harvard, Vancouver, ISO, and other styles
5

Martin, Parmar, and Shah Parth. "Internet of things-blockchain integration: a robust data security approach for end-to-end communication." Internet of things-blockchain integration: a robust data security approach for end-to-end communication 32, no. 2 (2023): 1050–57. https://doi.org/10.11591/ijeecs.v32.i2.pp1050-1057.

Full text
Abstract:
The integration of internet of things (IoT) and blockchain technology has been proposed as a promising solution to address the challenges related to security, scalability, and privacy. This &nbsp;integration enables the creation&nbsp;of secure and decentralized systems &nbsp;that allow devices to interact with each otherand exchange data in a transparent &nbsp;and trustworthy manner. The&nbsp;significant research work has been carried out by researcher on IoT&nbsp;and blockchain integration to utilize their combine potential in smart applications. However, due to limitation and scope ofemerging technologies, it is essential to develop robust security frameworks that address the challenges and ensure the secure data communication from IoT node to blockchain network. IoT devices come up with constrained nature and limited security mechanisms along with weak access control policy. Our work includes heterogeneous IoT and blockchain ecosystem that senses and store data intelligently after proper validation with verification into decentralized distributed blockchain network. Our proposed work includes a robust approach to convey potential data security issue to protect &nbsp;end to end information with suitable&nbsp;authorization, access control policy, device to device data protection and data integrity specially when data moving from IoT devices to blockchain network.
APA, Harvard, Vancouver, ISO, and other styles
6

Agbesanya, Dr Felicia Olufunke, Dr James Oladiipo Folorunso, and Dr Adedayo Adeniran Odunlami. "Adoption and Management of ICT in Schools: Strategies for the Administrators in Nigerian Tertiary Institution." International Journal of Research and Innovation in Social Science VIII, no. VII (2024): 2838–46. http://dx.doi.org/10.47772/ijriss.2024.807220.

Full text
Abstract:
It is no longer contestable that the emergence of Information Communication Technology (ICT) over the years has revolutionized all spheres of life. In the realm of education, appropriate utilization of ICTs has gradually altered the traditional teaching methods in most climes, thereby making teaching-learning more interesting and administrative work less complex. Nevertheless, the level of adoption of ICT in tertiary institution in Nigeria appear abysmally low resulting from factors resident in personnel and the education system. This paper therefore explores the spheres of ICT application in tertiary institutions of learning to include learning and teaching, research and collaboration, administrative efficiency, professional development among others. Constraints and considerations in adopting ICT were equally exposed to encompass data security and privacy concerns, technical challenges, poor implementation.Strategies for optimum adoption and integration of ICT by administrators of tertiary institutions in Nigeria. It was recommended among others that management should address the perennial problem of irregular power among others.
APA, Harvard, Vancouver, ISO, and other styles
7

Ibrahim, Umar. "The Role of Cloud Computing in Transforming ICT Infrastructure in Educational Institutions." International Journal of Applied and Scientific Research 2, no. 2 (2024): 213–26. http://dx.doi.org/10.59890/ijasr.v2i2.1333.

Full text
Abstract:
The integration of cloud computing into the Information and Communication Technology (ICT) infrastructure of educational institutions is a transformative paradigm that holds significant implications for the efficiency and efficacy of academic processes. This paper explores the role of cloud computing in reshaping ICT infrastructure within educational settings. A comprehensive literature review establishes the current landscape of ICT in education, identifying challenges and limitations. The study delves into the theoretical foundations of cloud computing and investigates its potential benefits, including improved accessibility, scalability, and cost-effectiveness. Empirical evidence and case studies are presented to illustrate the transformative impact of cloud computing on educational ICT infrastructure. The discussion encompasses challenges and considerations, including data security and privacy concerns, and offers insights into the future directions of cloud computing in education. This research contributes to the ongoing dialogue surrounding technology in education and provides practical recommendations for harnessing the full potential of cloud computing.
APA, Harvard, Vancouver, ISO, and other styles
8

Ibrahim, Umar. "The Role of Cloud Computing in Transforming ICT Infrastructure in Educational Institutions." Role of Cloud Computing in Transforming ICT Infrastructure in Educational Institutions 2, Vol. 2 No. 2 (2024): February 2024 (2024): 14. https://doi.org/10.59890/ijasr.v2i2.1333.

Full text
Abstract:
The integration of cloud computing into the Information and Communication Technology (ICT) infrastructure of educational institutions is a transformative paradigm that holds significant implications for the efficiency and efficacy of academic processes. This paper explores the role of cloud computing in reshaping ICT infrastructure within educational settings. A comprehensive literature review establishes the current landscape of ICT in education, identifying challenges and limitations. The study delves into the theoretical foundations of cloud computing and investigates its potential benefits, including improved accessibility, scalability, and cost-effectiveness. Empirical evidence and case studies are presented to illustrate the transformative impact of cloud computing on educational ICT infrastructure. The discussion encompasses challenges and considerations, including data security and privacy concerns, and offers insights into the future directions of cloud computing in education. This research contributes to the ongoing dialogue surrounding technology in education and provides practical recommendations for harnessing the full potential of cloud computing.
APA, Harvard, Vancouver, ISO, and other styles
9

S, Sanjith, Ranjit Jeba Thangaiah P, Macklin Abraham Navamani J, and Venkataramana Attada. "Integration of Blockchain Technology for Security and Privacy Enhancement in Wireless Body Area Network Systems." Indian Journal of Science and Technology 16, no. 41 (2023): 3583–90. https://doi.org/10.17485/IJST/v16i41.1610.

Full text
Abstract:
Abstract <strong>Objectives</strong>: Blockchain technology can improve the security and privacy of Wireless Body Area Network (WBAN) systems in healthcare. The primary goal of this research is to address the privacy and security concerns in technology-loaded devices and gadgets by proposing a novel approach that integrates blockchain and advanced cryptographic techniques with WBAN.&nbsp;<strong>Methods:</strong>&nbsp;Simulated physiological data collected from multiple body sensors in a WBAN environment, along with network traffic data, were gathered. A modified algorithm is developed for signature encryption in WBAN systems using a hyperelliptic curve secure channel. This approach incorporates blockchain technology to strengthen security and privacy measures for efficient and safe data transfer and storage. To achieve this, a hyperelliptic curve-based technique is used along with an authenticated certificate-less signature key encryption model, which helps overcome various attacks, such as man-in-the-middle attacks, basic impersonation attacks, and key offset attacks.&nbsp;<strong>Findings:</strong>&nbsp;The proposed methodology is compared to traditional approaches to assess its effectiveness. This methodology is evaluated using parameters such as Hardware Security Model (HSM) operations and time taken, which demonstrate its superiority. It is observed that the proposed methodology records 3 hsm operations within 2.03 ms with Signcryption and 3 hsm within 2.35 ms with Unsigncryption, proving to be better than other traditional approaches.&nbsp;<strong>Novelty:&nbsp;</strong>The integrity, security, and privacy features of blockchain, make it difficult for malicious actors to crack or hack the system. The security measures are further enhanced by using a hyperelliptic curve-based technique and an authenticated certificate-less signature key encryption model. This approach also addresses multiple attacks providing a comprehensive solution for secure data transmission. <strong>Keywords:&nbsp;</strong>Blockchain, WBAN, Secured IoT, Attack mitigation, Multi&shy;Factor Authentication
APA, Harvard, Vancouver, ISO, and other styles
10

S, Sanjith, Ranjit Jeba Thangaiah P, Macklin Abraham Navamani J, and Venkataramana Attada. "Integration of Blockchain Technology for Security and Privacy Enhancement in Wireless Body Area Network Systems." Indian Journal of Science and Technology 16, no. 41 (2023): 3583–90. https://doi.org/10.17485/IJST/v16i41.1610.

Full text
Abstract:
Abstract <strong>Objectives</strong>: Blockchain technology can improve the security and privacy of Wireless Body Area Network (WBAN) systems in healthcare. The primary goal of this research is to address the privacy and security concerns in technology-loaded devices and gadgets by proposing a novel approach that integrates blockchain and advanced cryptographic techniques with WBAN.&nbsp;<strong>Methods:</strong>&nbsp;Simulated physiological data collected from multiple body sensors in a WBAN environment, along with network traffic data, were gathered. A modified algorithm is developed for signature encryption in WBAN systems using a hyperelliptic curve secure channel. This approach incorporates blockchain technology to strengthen security and privacy measures for efficient and safe data transfer and storage. To achieve this, a hyperelliptic curve-based technique is used along with an authenticated certificate-less signature key encryption model, which helps overcome various attacks, such as man-in-the-middle attacks, basic impersonation attacks, and key offset attacks.&nbsp;<strong>Findings:</strong>&nbsp;The proposed methodology is compared to traditional approaches to assess its effectiveness. This methodology is evaluated using parameters such as Hardware Security Model (HSM) operations and time taken, which demonstrate its superiority. It is observed that the proposed methodology records 3 hsm operations within 2.03 ms with Signcryption and 3 hsm within 2.35 ms with Unsigncryption, proving to be better than other traditional approaches.&nbsp;<strong>Novelty:&nbsp;</strong>The integrity, security, and privacy features of blockchain, make it difficult for malicious actors to crack or hack the system. The security measures are further enhanced by using a hyperelliptic curve-based technique and an authenticated certificate-less signature key encryption model. This approach also addresses multiple attacks providing a comprehensive solution for secure data transmission. <strong>Keywords:&nbsp;</strong>Blockchain, WBAN, Secured IoT, Attack mitigation, Multi&shy;Factor Authentication
APA, Harvard, Vancouver, ISO, and other styles
11

S, Sanjith, Ranjit Jeba Thangaiah P, Macklin Abraham Navamani J, and Venkataramana Attada. "Integration of Blockchain Technology for Security and Privacy Enhancement in Wireless Body Area Network Systems." Indian Journal of Science and Technology 16, no. 41 (2023): 3583–90. https://doi.org/10.17485/IJST/v16i41.1610.

Full text
Abstract:
Abstract <strong>Objectives</strong>: Blockchain technology can improve the security and privacy of Wireless Body Area Network (WBAN) systems in healthcare. The primary goal of this research is to address the privacy and security concerns in technology-loaded devices and gadgets by proposing a novel approach that integrates blockchain and advanced cryptographic techniques with WBAN.&nbsp;<strong>Methods:</strong>&nbsp;Simulated physiological data collected from multiple body sensors in a WBAN environment, along with network traffic data, were gathered. A modified algorithm is developed for signature encryption in WBAN systems using a hyperelliptic curve secure channel. This approach incorporates blockchain technology to strengthen security and privacy measures for efficient and safe data transfer and storage. To achieve this, a hyperelliptic curve-based technique is used along with an authenticated certificate-less signature key encryption model, which helps overcome various attacks, such as man-in-the-middle attacks, basic impersonation attacks, and key offset attacks.&nbsp;<strong>Findings:</strong>&nbsp;The proposed methodology is compared to traditional approaches to assess its effectiveness. This methodology is evaluated using parameters such as Hardware Security Model (HSM) operations and time taken, which demonstrate its superiority. It is observed that the proposed methodology records 3 hsm operations within 2.03 ms with Signcryption and 3 hsm within 2.35 ms with Unsigncryption, proving to be better than other traditional approaches.&nbsp;<strong>Novelty:&nbsp;</strong>The integrity, security, and privacy features of blockchain, make it difficult for malicious actors to crack or hack the system. The security measures are further enhanced by using a hyperelliptic curve-based technique and an authenticated certificate-less signature key encryption model. This approach also addresses multiple attacks providing a comprehensive solution for secure data transmission. <strong>Keywords:&nbsp;</strong>Blockchain, WBAN, Secured IoT, Attack mitigation, Multi&shy;Factor Authentication
APA, Harvard, Vancouver, ISO, and other styles
12

S, Sanjith, Ranjit Jeba Thangaiah P, Macklin Abraham Navamani J, and Venkataramana Attada. "Integration of Blockchain Technology for Security and Privacy Enhancement in Wireless Body Area Network Systems." Indian Journal of Science and Technology 16, no. 41 (2023): 3583–90. https://doi.org/10.17485/IJST/v16i41.1610.

Full text
Abstract:
Abstract <strong>Objectives</strong>: Blockchain technology can improve the security and privacy of Wireless Body Area Network (WBAN) systems in healthcare. The primary goal of this research is to address the privacy and security concerns in technology-loaded devices and gadgets by proposing a novel approach that integrates blockchain and advanced cryptographic techniques with WBAN.&nbsp;<strong>Methods:</strong>&nbsp;Simulated physiological data collected from multiple body sensors in a WBAN environment, along with network traffic data, were gathered. A modified algorithm is developed for signature encryption in WBAN systems using a hyperelliptic curve secure channel. This approach incorporates blockchain technology to strengthen security and privacy measures for efficient and safe data transfer and storage. To achieve this, a hyperelliptic curve-based technique is used along with an authenticated certificate-less signature key encryption model, which helps overcome various attacks, such as man-in-the-middle attacks, basic impersonation attacks, and key offset attacks.&nbsp;<strong>Findings:</strong>&nbsp;The proposed methodology is compared to traditional approaches to assess its effectiveness. This methodology is evaluated using parameters such as Hardware Security Model (HSM) operations and time taken, which demonstrate its superiority. It is observed that the proposed methodology records 3 hsm operations within 2.03 ms with Signcryption and 3 hsm within 2.35 ms with Unsigncryption, proving to be better than other traditional approaches.&nbsp;<strong>Novelty:&nbsp;</strong>The integrity, security, and privacy features of blockchain, make it difficult for malicious actors to crack or hack the system. The security measures are further enhanced by using a hyperelliptic curve-based technique and an authenticated certificate-less signature key encryption model. This approach also addresses multiple attacks providing a comprehensive solution for secure data transmission. <strong>Keywords:&nbsp;</strong>Blockchain, WBAN, Secured IoT, Attack mitigation, Multi&shy;Factor Authentication
APA, Harvard, Vancouver, ISO, and other styles
13

Pérez, Salvador, José Luis Hernández-Ramos, Sara Nieves Matheu-García, et al. "A Lightweight and Flexible Encryption Scheme to Protect Sensitive Data in Smart Building Scenarios." IEEE Access 6 (February 2, 2018): 11738–50. https://doi.org/10.1109/ACCESS.2018.2801383.

Full text
Abstract:
Smart buildings represent key environments to encourage the growth of more sustainable and efficient cities. With the strong development of the Internet of Things (IoT), the integration of heterogeneous physical devices fosters the emergence of data-driven services to make more effective decisions accordingly. However, the need for sharing large amounts of data could help to infer users&#39; sensitive information, such as their daily habits, thus harming their privacy. Under these premises, this paper introduces an encryption scheme based on the lightness of the symmetric cryptography, and the expressiveness of attribute-based encryption. Our proposal aims to ensure only authorised services will be able to access specific pieces of data, so that users&#39; privacy is not compromised, while scalability and efficiency are provided. The resulting scheme has been deployed on a real smart building scenario, and validation results demonstrate its suitability to protect large amounts of sensitive data on IoT-enabled buildings.
APA, Harvard, Vancouver, ISO, and other styles
14

Marwa, KHOUYA. "E-Governance: Origin, challenges, and prospects in the era of ICTs and artificial intelligence." African Scientific Journal Vol 3, N° 18 (2023): 884. https://doi.org/10.5281/zenodo.8319464.

Full text
Abstract:
<strong>Abstract </strong> Nowadays, information and communication technologies are revolutionizing all aspects of our daily lives. Public governance has grown up to take advantage of them. The integration of ICTs has generated the e-Governance concept, which has significantly improved the delivery of public services to all citizens, and consequently the overall objective of improving the performance of governance systems at all levels, as well as strengthening the public governance framework of the whole society. By exploring the origin and evolution of e-governance over time and space, this research highlights theoretical and empirical findings about the potential implications of ICT integration in public governance systems. Additionally, opportunities for effective integration of ICT into local governance systems were identified and discussed, based on concrete examples of effective implementation. Afterwards, this paper provides several challenges currently facing e-governance, including Internet access, security and privacy, ethical regulation, professional skills and environmental issues. Finally, it discusses the perspectives raised by artificial intelligence (AI) as it evolves to improve data-driven decision-making, automate repetitive tasks and enable personalized services. &nbsp; <strong>Keywords: </strong>E-governance, public governance, information and communication technologies, artificial intelligence.
APA, Harvard, Vancouver, ISO, and other styles
15

Ghaderi, Yasaman, and Mohammad Reza Ghaderi. "Integration of IoT, fog, and cloud in a blockchain network for future smart cities." Metaverse 6, no. 2 (2025): 3367. https://doi.org/10.54517/m3367.

Full text
Abstract:
&lt;p&gt;In recent times, the concept of smart cities has gained traction as a means to enhance the utilization of urban resources, delivering sustainable services across sectors like energy, transportation, healthcare, and education. Applications for smart cities leverage information and communication technologies (ICT), particularly the Internet of Things (IoT), cloud computing, and fog computing. By merging these technologies with platforms like the metaverse, cities can improve service delivery and create more engaging experiences for residents. The metaverse, in this context, serves as a virtual space for interactions between citizens and city authorities, contributing positively to urban planning and management. Nonetheless, data security and privacy remain significant challenges for smart cities implementing these technologies. To address this, blockchain-based security solutions can be effective in supporting sustainable smart city applications. By integrating IoT, fog computing, and cloud services into a blockchain framework, it’s possible to establish a secure and advanced platform for the creation and deployment of applications aimed at sustainable urban development. This paper proposes a conceptual model that combines IoT, fog, and cloud technologies within a blockchain structure, enabling smart city applications to harness the strengths of each technology, thereby optimizing operations, improving service quality, and ensuring robust security.&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt;
APA, Harvard, Vancouver, ISO, and other styles
16

Hiba, Ansari. "A Strategy to Mitigate Prevalent IoT Vulnerabilities Against Cyber Threats and Data Breaches Through Blockchain Techniques." International Journal of Emerging Science and Engineering (IJESE) 13, no. 4 (2025): 42–46. https://doi.org/10.35940/ijese.B2591.13040325.

Full text
Abstract:
<strong>Abstract:</strong> The Internet of Things (IoT) is rapidly evolving into a revolutionary technology, connecting millions of devices and enabling a wide range of applications across industries. However, the tremendous growth of connected devices has raised concerns about the security and privacy of IoT networks. The deployment and distribution of IoT systems make them particularly vulnerable to cyberattacks, unauthorized data access and control, further emphasizing the need for security measures. Traditional security measures often fall short of solving these problems due to the scale, diversity, and resource limitations of IoT devices. With its key features such as decentralization, immutability, transparency, and cryptographic security, Blockchain technology holds promise for addressing these vulnerabilities in IoT. Using blockchain data distribution, data transmitted in IoT networks can be authenticated and secured, ensuring the integrity and confidentiality of users' sensitive information. Blockchain's consensus enables secure communication between IoT devices without the need for a central authority, reducing the points of failure and risk associated with middle management. Blockchain also provides strong identity and capacity management, ensuring that only authorized entities can interact with IoT devices and systems, thus strengthening privacy and preventing unauthorized access. Integration of blockchain technology with IoT environment to enhance their security and privacy. We investigate how blockchain can be used to protect data transmission, device authentication, and access control in the Internet of Things. We also examine the role of smart contracts in operating and maintaining security in IoT systems, such as ensuring that only authorized devices can access or update important information. Although the combination of blockchain and IoT has many advantages, it also brings some challenges that can affect the performance of IoT systems, such as scalability, scalability, and power consumption. This article also discusses these issues and presents solutions, including the use of lightweight algorithms and hybrid blockchain architectures. Performance and privacy benefits and improvements of using blockchain. Overall, research suggests that blockchain can increase the security and privacy of IoT networks, providing a solution and protection against the growing threats of IoT systems. The findings Highlight the potential of blockchain to revolutionize IoT security, enabling a safer, more efficient, and more reliable future for IoT applications across a wide range of industries.
APA, Harvard, Vancouver, ISO, and other styles
17

Madhuri, Sharma, Arvind Mahindru Dr., and Pardeep Arora Dr. "Blockchain Based Secure Data Management for IoT Devices." International Journal of Innovative Science and Research Technology (IJISRT) 10, no. 2 (2025): 1728–33. https://doi.org/10.5281/zenodo.14979317.

Full text
Abstract:
Two of the most ground breaking technologies, blockchain and the Internet of Things (IoT), are already beginning to drastically alter The network configuration as it appears now and reshape details digital world during the future. IoT integration has given the things around us life and made them "smart" and able to communicate with one another. This has allowed them to continuously record the physical world and gather massive amounts of data, which can then have analyzed and used to inform intelligent actions. It has changed the fundamental way we perceive the physical world and enabled our ideal of a smooth transition between the digital and physical realms. Still, the problem with existing Connectivity of The circumstances solutions is that they require a centralized entity, such as a cloud server, for interacting with one another over the Internet, whose conveys an important concern to the private nature and safety of the large amount of private facts being produced, Despite the original architectural plan called for for an autonomous one, such as a distributed or peer-to-peer (P2P) system, blockchain enters the picture, offering a reliable and secure method of information sharing through a distributed/P2P model, to achieve transparency, security, privacy, auditability, resilience, access authentication, data immutability, etc. In this paper, we will examine how to combine both technologies to get around their drawbacks and maximize their advantages. We have provided a thorough overview of the fundamentals of both technologies, as well as the blockchain-based Internet of Things (BIoT) architecture, protocols, and operation, as well as a few instances of BIoT applications that can be while the original architecture design requires constructed on top of it, for connecting and interacting via the Internet, which presents a serious risk to the security and privacy of the huge quantity of sensitive data being generated, and comparing.
APA, Harvard, Vancouver, ISO, and other styles
18

Aman, Kaushik, and Narwa Rohit. "Integration of Quantum Computing with IoT." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 4 (2020): 1307–11. https://doi.org/10.35940/ijeat.D7931.049420.

Full text
Abstract:
The Internet of Things (IoT) is one of the emerging fields which has been developing day by day since 1990 but still having issues like security, privacy, data theft and server requirements to deal with big data. Quantum computing solves most of the problems in IoT but it is still under research stage and can take about a decade or two to get publically available for public use. In this paper, we begin with general introduction on IoT and Quantum Computing and continue on with problems that can be faced during integration of IoT and Quantum Computing. After that, we will also point out the solution to encounter these integration issues in context of efficiency and cost. Finally, we point out the benefits of integration of both fields to existing IoT network architecture.
APA, Harvard, Vancouver, ISO, and other styles
19

Researcher. "ENHANCING IOT SYSTEMS WITH SCALABLE CLOUD ARCHITECTURES FOR REAL-TIME DATA PROCESSING." International Journal of Computer Engineering and Technology (IJCET) 15, no. 6 (2024): 774–86. https://doi.org/10.5281/zenodo.14229605.

Full text
Abstract:
The development and application of Internet of Things (IoT) systems coupled with scalable cloud architectures for real-time data processing are examined in detail in this extensive essay. From data ingestion to security concerns, the paper explores the basic difficulties enterprises face while overseeing extensive IoT deployments. It explores the elements of cloud-based architecture, highlighting the crucial roles played by processing frameworks, storage options, and data intake levels. The essay discusses edge analytics integration and emphasizes how it can improve privacy, optimize bandwidth, and reduce latency. Important scalability issues in both horizontal and vertical dimensions are also covered in the article, along with implementation best practices, including microservices architecture and thorough monitoring techniques. Additionally, it looks at the security environment of IoT cloud infrastructures, including compliance frameworks, data protection strategies, and device security.
APA, Harvard, Vancouver, ISO, and other styles
20

Bhumichai, Dhanasak, Christos Smiliotopoulos, Ryan Benton, Georgios Kambourakis, and Dimitrios Damopoulos. "The Convergence of Artificial Intelligence and Blockchain: The State of Play and the Road Ahead." Information 15, no. 5 (2024): 268. http://dx.doi.org/10.3390/info15050268.

Full text
Abstract:
Artificial intelligence (AI) and blockchain technology have emerged as increasingly prevalent and influential elements shaping global trends in Information and Communications Technology (ICT). Namely, the synergistic combination of blockchain and AI introduces beneficial, unique features with the potential to enhance the performance and efficiency of existing ICT systems. However, presently, the confluence of these two disruptive technologies remains in a rather nascent stage, undergoing continuous exploration and study. In this context, the work at hand offers insight regarding the most significant features of the AI and blockchain intersection. Sixteen outstanding, recent articles exploring the combination of AI and blockchain technology have been systematically selected and thoroughly investigated. From them, fourteen key features have been extracted, including data security and privacy, data encryption, data sharing, decentralized intelligent systems, efficiency, automated decision systems, collective decision making, scalability, system security, transparency, sustainability, device cooperation, and mining hardware design. Moreover, drawing upon the related literature stemming from major digital databases, we constructed a timeline of this technological convergence comprising three eras: emerging, convergence, and application. For the convergence era, we categorized the pertinent features into three primary groups: data manipulation, potential applicability to legacy systems, and hardware issues. For the application era, we elaborate on the impact of this technology fusion from the perspective of five distinct focus areas, from Internet of Things applications and cybersecurity, to finance, energy, and smart cities. This multifaceted, but succinct analysis is instrumental in delineating the timeline of AI and blockchain convergence and pinpointing the unique characteristics inherent in their integration. The paper culminates by highlighting the prevailing challenges and unresolved questions in blockchain and AI-based systems, thereby charting potential avenues for future scholarly inquiry.
APA, Harvard, Vancouver, ISO, and other styles
21

Vera Maria, Regi Regi, and Hayanti Hayanti. "Implementasi Teknologi Informasi dan Komunikasi (TIK) Dalam Meningkatkan Daya Saing Umkm." Neptunus: Jurnal Ilmu Komputer Dan Teknologi Informasi 2, no. 2 (2024): 77–91. http://dx.doi.org/10.61132/neptunus.v2i2.104.

Full text
Abstract:
Information and Communication Technology (ICT) has emerged as a crucial determinant in business transformation, particularly for Micro, Small, and Medium Enterprises (MSMEs). This research aims to delve deeply into how the implementation of ICT in MSMEs contributes to enhancing their competitiveness. The research method employed is descriptive analysis with a qualitative approach, where data were collected through interviews with MSME owners who have implemented information technology in their operations.The results indicate that the integration of ICT has provided significant positive impacts on MSMEs. One of the key benefits is the enhancement of operational efficiency, where the use of information systems has expedited business processes and reduced operational costs. Additionally, MSMEs that adopt information technology also have broader market access through online platforms and social media, thereby enhancing sales potential and business growth. However, the implementation of ICT in MSMEs also faces several challenges, such as high implementation costs, limited access to infrastructure, and concerns about data security. Therefore, strong support from the government, non-governmental organizations, and the private sector is needed to provide training, technical assistance, and necessary infrastructure for MSMEs to harness the full potential of ICT.
APA, Harvard, Vancouver, ISO, and other styles
22

Said Mohammad, Ahmed, Mohammed Makame Haji, and Khalfan Salim Suleiman. "ICT's Impact on SMEs in Zanzibar: A 360-Degree Appraisal." International Journal for Global Academic & Scientific Research 2, no. 3 (2023): 10–30. http://dx.doi.org/10.55938/ijgasr.v2i3.58.

Full text
Abstract:
The integral role of Information and Communications Technology (ICT) in global socio-economic growth is universally acknowledged. Zanzibar, too, recognizes ICT's potential to foster enterprise development. This study conducts a focused analysis of the symbiotic relationship between ICT and small and medium enterprises (SMEs) in Zanzibar, encompassing ICT's significance, adoption challenges, and its impact on SMEs' growth. Employing a descriptive research design, data collection involved a structured questionnaire distributed to a random sample of 100 respondents. Analysis was conducted using the Statistical Package for Social Science (SPSS), yielding insights communicated through percentages, tables, and graphs. The findings underscore ICT's pivotal role in SME development, with a substantial proportion deriving benefits from its integration. Key variables—ICT's importance, implementation, and influence—are identified as catalysts for improved SME performance. However, challenges persist, including limited expertise, slow internet, setup costs, and security concerns, underscoring the need for refined ICT strategies. Recommendations echo the importance of continuous ICT enhancement, advocating for advanced tools to secure competitive advantages. Moreover, policy interventions by governmental bodies and private entities like the Chamber of Commerce are deemed necessary to facilitate SME education, training, and advisory services. This collective effort promises not only individual business growth but also national economic advancement.In summation, while ICT is a linchpin, factors like technology, customer care, and trust are equally vital. Governmental support for SMEs' effective ICT integration emerges as a core necessity, propelling Zanzibar's SMEs towards amplified growth within an increasingly digital landscape.
APA, Harvard, Vancouver, ISO, and other styles
23

Keshava, Gowtham NS, V. Ingale Deepak, N. Harshitha, S. Adithya, Rao H. D. Nithish, and Venkatesh V. "Personal AI Companion Voice Assistant." International Journal of Engineering and Management Research 14, no. 2 (2024): 21–26. https://doi.org/10.5281/zenodo.10909307.

Full text
Abstract:
This paper presents the design and implementation of a personal AI companion voice assistant leveraging the ESP32 microcontroller platform. The system incorporates advanced AI algorithms for natural language processing and voice recognition, enabling intuitive user interaction. Through seamless integration with smart devices, the assistant enhances user experience while prioritizing data privacy and security. The project contributes to the evolution of IoT technologies by offering a personalized and intelligent voice assistant solution.
APA, Harvard, Vancouver, ISO, and other styles
24

Chen, Yu-Che, and Tsui-Chuan Hsieh. "Big Data for Digital Government." International Journal of Public Administration in the Digital Age 1, no. 1 (2014): 1–14. http://dx.doi.org/10.4018/ijpada.2014010101.

Full text
Abstract:
“Big data” is one of the emerging and critical issues facing government in the digital age. This study first delineates the defining features of big data (volume, velocity, and variety) and proposes a big data typology that is suitable for the public sector. This study then examines the opportunities of big data in generating business analytics to promote better utilization of information and communication technology (ICT) resources and improved personalization of e-government services. Moreover, it discusses the big data management challenges in building appropriate governance structure, integrating diverse data sources, managing digital privacy and security risks, and acquiring big data talent and tools. An effective big data management strategy to address these challenges should develop a stakeholder-focused and performance-oriented governance structure and build capacity for data management and business analytics as well as leverage and prioritize big data assets for performance. In addition, this study illustrates the opportunities, challenges, and strategy for big service data in government with the E-housekeeper program in Taiwan. This brief case study offers insight into the implementation of big data for improving government information and services. This article concludes with the main findings and topics of future research in big data for public administration.
APA, Harvard, Vancouver, ISO, and other styles
25

ANDRONICEANU, Armenia, Oana-Matilda SABIE, Irina GEORGESCU, and Andreea-Ligia DRUGĂU-CONSTANTIN. "Main factors and causes that are influencing the digital competences of human resources." Administratie si Management Public 41 (November 28, 2023): 26–53. http://dx.doi.org/10.24818/amp/2023.41-02.

Full text
Abstract:
The integration of digital technologies in public administration is influenced by the digital competences of human resources. The objectives of this research are to identify the main factors and causes that influence human resources’ level of digital competences and to find out the correlations between factors, causes, and digital competences. The survey was conducted within the National Agency of Civil Servants (NACS) responsible for the management of civil servants from the Romanian public administration. 25 variables were selected and grouped in three categories. The main research instruments used were: SPSS and Principal Component Analysis. According to the research results, the main factors influencing digital competences are social factors, extrinsic motivation factors, and administrative and managerial factors. The main causes with a relevant impact on digital competence development are data security and privacy risks, the dynamic of technologies, lack of continuity in ICT integration in organization activities, and excessive bureaucracy. All variables in the model have positive correlations. The results of the research are useful and interesting both for scholars and governmental institutions. The causes, factors, and correlations between them are discussed for the first time in the specialized literature and are raising up the key elements of digital competences that should be taken into account for an efficient digital transformation of public administration.
APA, Harvard, Vancouver, ISO, and other styles
26

Goutham, Sabbani. "Open Challenges to MIST Computing: An Overview." European Journal of Advances in Engineering and Technology 9, no. 10 (2022): 44–49. https://doi.org/10.5281/zenodo.12789608.

Full text
Abstract:
MIST computing has given up to a 50% reduction in latency and a 40% decrease in bandwidth utilization, drastically changing the edge computing environment. A recent example is the application of MIST computing in era cities like New York, where it has developed its real-time traffic management systems, helping them cut responses by 30% [5]. MIST computing offers enhanced security and expedited decision-making by optimizing data processing at the source. To realize its full potential, a few obstacles must be overcome. In applications like data storage in autonomous car networks, handling the heterogeneous nature of devices like different IoT sensors in manufacturing, and standardizing communication protocols among smart home gadgets, these have offered strong security and privacy. It's also crucial to manage scaling issues, such as building MIST capabilities in expansive healthcare systems. This review delves into these issues and possible fixes in the developing field of MIST computing.
APA, Harvard, Vancouver, ISO, and other styles
27

Vinod, Veeramachaneni. "Edge Computing: Architecture, Applications, and Future Challenges in a Decentralized Era." Recent Trends in Computer Graphics and Multimedia Technology 7, no. 1 (2024): 8–23. https://doi.org/10.5281/zenodo.14166793.

Full text
Abstract:
<em>This paper presents a detailed examination of edge computing advancements, emphasizing its role in reducing latency and enhancing real-time data processing by positioning computational resources closer to data sources. Using a robust methodological framework, this study evaluates decentralized edge architectures, edge nodes, and gateways to demonstrate their effectiveness in various Industry 5.0 applications, including smart cities, autonomous systems, and healthcare. The proposed model achieves a substantial 40% reduction in latency and 35% improvement in resource efficiency, underscoring its suitability for environments requiring immediate, localized data processing. Moreover, with a 95% data privacy index via encryption protocols, the model ensures secure data management, a crucial feature for privacy-centric applications. Our analysis includes case studies illustrating edge computing's integration with IoT and 5G, which not only reduces data transmission latency but also supports scalability for high-demand applications. The study identifies significant challenges related to security, interoperability, and adaptive resource management in decentralized settings. Addressing these challenges, we explore advanced machine learning models for real-time adaptability and propose future directions aimed at enhancing interoperability and security standards. These results underscore edge computing's foundational role in enabling the real-time, secure, and responsive systems central to Industry 5.0, laying a path for continued advancements in adaptive, decentralized processing frameworks.</em>
APA, Harvard, Vancouver, ISO, and other styles
28

Ahmed, Zanyar Ali, Ako Abubakar Jaafar, and Mazen Ismaeel Ghareb. "The Ability of implementing Cloud Computing in Higher Education - KRG." Kurdistan Journal of Applied Research 2, no. 1 (2017): 39–44. http://dx.doi.org/10.24017/science.2017.1.10.

Full text
Abstract:
Cloud computing is a new technology. CC is an online service can store and retrieve information, without the requirement for physical access to the files on hard drives. The information is available on a system, server where it can be accessed by clients when it’s needed. Lack of the ICT infrastructure of universities of the Kurdistan Regional Government (KRG) can use this new technology, because of economical advantages, enhanced data managements, better maintenance, high performance, improve availability and accessibility therefore achieving an easy maintenance of organizational institutes. The aim of this research is to find the ability and possibility to implement the cloud computing in higher education of the KRG. This research will help the universities to start establishing a cloud computing in their services. A survey has been conducted to evaluate the CC services that have been applied to KRG universities have by using cloud computing services. The results showed that the most of KRG universities are using SaaS. MHE-KRG universities and institutions are confronting many challenges and concerns in term of security, user privacy, lack of integration with current systems, and data and documents ownership.
APA, Harvard, Vancouver, ISO, and other styles
29

Researcher. "DATA MANAGEMENT FRAMEWORKS IN INTERNET OF THINGS (IOT): A COMPREHENSIVE ANALYSIS OF COLLECTION, STORAGE, AND PROCESSING MECHANISMS." International Journal of Computer Engineering and Technology (IJCET) 1, no. 6 (2024): 663–71. https://doi.org/10.5281/zenodo.14219490.

Full text
Abstract:
This comprehensive article examines the intricate dynamics of data management within Internet of Things (IoT) ecosystems, focusing on the critical aspects of data collection, storage, processing, and emerging challenges. The article analyzes the evolution of IoT architectures from traditional centralized systems to modern hybrid frameworks that leverage both edge and cloud computing capabilities.&nbsp;Through detailed examination of sensor networks, mobile device integration, and actuator-based systems, the study reveals complex interactions between data collection mechanisms and storage infrastructures. The investigation encompasses advanced processing methodologies, including real-time stream processing and machine learning applications, while addressing crucial aspects of security, privacy, and resource optimization. The analysis identifies significant challenges in integration complexity, latency management, and resource constraints, while highlighting promising solutions through emerging technologies and architectural approaches. Key findings demonstrate the importance of balancing distributed processing capabilities with centralized management systems, emphasizing the need for standardized protocols and improved interoperability. The article concludes by outlining future research directions in autonomous system management, advanced analytics integration, and sustainable computing practices, providing valuable insights for researchers and practitioners in the field of IoT data management.
APA, Harvard, Vancouver, ISO, and other styles
30

Journal, of Global Research in Mathematical Archives(JGRMA). "Enhancing Threat Intelligence and Cyber Defense through Big Data Analytics: A Review Study." Journal of Global Research in Mathematical Archives (JGRMA) 12, no. 04 (2025): 01–06. https://doi.org/10.5281/zenodo.15223174.

Full text
Abstract:
In a number of industries, including cybersecurity, healthcare, banking, and power distribution, big data analysis has emerged as a game-changing technique. The proliferation of massive and heterogeneous information gathered from platforms, including social media, IoT devices, electronic conducted online, and network logs, necessitates advanced analytical techniques and robust technologies for effective processing and insight generation. This research investigates how statistical analysis of big data may be integrated into cybersecurity, emphasizing its role in anomaly detection, behavioral analysis, threat intelligence integration, and event correlation to enhance threat detection, response, and prediction. Despite its transformative potential, issues including security, confidentiality, effectiveness, and knowledge storage remain significant barriers to its adoption. In order to overcome these obstacles and progress in the sector, emerging technologies like blockchain integration, sophisticated data visualization, and IoT convergence provide encouraging answers. By leveraging these innovations, organizations can improve their ability to anticipate, mitigate, and respond to sophisticated cyber threats, ensuring robust protection for sensitive data and systems.
APA, Harvard, Vancouver, ISO, and other styles
31

Ronoh, Hillan K. "The Status of Technology Use in Supply Chain Management in the Tea Sector in Kenya." Journal of Science, Innovation and Creativity 4, no. 1 (2025): 52–62. https://doi.org/10.58721/jsic.v4i1.1067.

Full text
Abstract:
The tea industry in Kenya is a critical component of the national economy, yet traditional supply chain management faces significant challenges, including inefficiencies, lack of transparency, and limited stakeholder trust. These issues lead to problems such as fraud, counterfeiting, and payment delays, adversely affecting the efficiency and profitability of the tea supply chain. This study investigates the potential of blockchain-based smart contract technology to enhance transparency, data management, and security within the Kenyan tea supply chain. The research aimed to develop and validate a blockchain-based smart contract model tailored for the tea sector. The objectives included: (1) assessing the current state of supply chain management in the tea industry, (2) exploring blockchain's unique features that can improve supply chain management, and (3) identifying key factors influencing the adoption of blockchain technology in this context. Employing a pragmatist research philosophy and a cross-sectional survey design, the study focused on both multinational and KTDA-owned tea companies. A mixed-method approach was used, collecting data from 754 employees, with a sample size of 156. Quantitative data were analysed using descriptive and inferential statistics, while qualitative data were examined through thematic analysis. Findings indicated significant relationships between various constructs and blockchain smart contracts: ICT infrastructure (β = .488, p = .040), data integration and automation (β = .970, p = .047), collaboration (β = .843, p = .036), and security/privacy (β = .105, p = .022). The developed blockchain smart contract model serves as a foundation for implementing this technology in Kenya's tea supply chain, guiding future research on blockchain adoption across different industries.
APA, Harvard, Vancouver, ISO, and other styles
32

Jinyoung, Hwang. "The use of big data analytics in enhancing operational efficiency in manufacturing." World Journal of Advanced Research and Reviews 23, no. 2 (2024): 2800–2810. https://doi.org/10.5281/zenodo.14908875.

Full text
Abstract:
This study seeks to offer significant insights into the actual implementation of Big Data Analytics into manufacturing organizations by conducting a comprehensive analysis of existing literature, case studies, and data-driven research. A mixed-methods methodology was used, integrating quantitative and qualitative research methodologies to facilitate a holistic comprehension of the multidimensional effects of Big Data Analytics on operational efficiency within the industrial sector. Findings suggest that the use of Big Data Analytics has a favorable impact on operational efficiency. This highlights the capacity of industrial organizations to leverage data analytics in order to attain operational excellence. Additionally, some of the factors that need to be considered in this context are concerns related to data privacy and security, the resistance to cultural change, the complexity of data, the costs associated with investment, and the obstacles associated with data integration. Furthermore, exemplary methodologies and instances of triumph from manufacturing enterprises that have successfully included Big Data Analytics into their operational frameworks have been identified in this study. In addition, the usage of Big Data Analytics in these areas can yield substantial improvements, resulting in heightened levels of operational efficiency.
APA, Harvard, Vancouver, ISO, and other styles
33

Paras, Garg, and Kumar Mahinder. "Internet of Things (IOT): Architecture Applications and Future Prospects." Journal of Advances Research in IOT Security 1, no. 2 (2025): 1–7. https://doi.org/10.5281/zenodo.15321615.

Full text
Abstract:
<em>The Internet of Things (IoT) is transforming the digital landscape by enabling everyday objects to collect, exchange, and act on data. This paper explores the architecture, protocols, and security challenges of IoT systems, highlighting their application in domains such as smart homes, healthcare, industrial automation, and urban infrastructure. Emphasis is placed on recent advancements in edge computing, low-power networks, and AI-driven analytics that enhance IoT performance and scalability. Furthermore, the paper addresses key concerns around data privacy, interoperability, and the integration of heterogeneous devices. The findings suggest that while IoT offers immense potential for innovation and efficiency, its widespread adoption hinges on robust frameworks for security, standardization, and ethical data use. The subsequent segment represent fundamental of IOT. It hands out several covering pre-owned in IOT and varied fundamental denominations connected. It is primarily enlargement of helping-hand using Internet. When the household devices are connected with the help of internet, this can help to automate homes, offices or other units using IOT. IOT is being used during COVID-19 pandemic for contact tracing.</em>
APA, Harvard, Vancouver, ISO, and other styles
34

Sanjay Agal, Nikunj Bhavsar, Kishori Shekokar, and Shiv Shakti Shrivastava. "A unified framework for smart and secure digital transformation: Leveraging block chain, AI, and ICT across Healthcare, Education, E-Commerce, and Industrial Systems." International Journal of Science and Research Archive 15, no. 1 (2025): 927–43. https://doi.org/10.30574/ijsra.2025.15.1.1084.

Full text
Abstract:
This paper presents a unified framework that integrates block chain, artificial intelligence (AI), and information and communication technology (ICT) to enhance the security and efficiency of digital transformation across healthcare, education, e-commerce, and industrial systems. Addressing the critical issue of the absence of a cohesive strategy for the implementation of these technologies, this research emphasizes the need for interoperability, data privacy, and user trust. By utilizing qualitative and quantitative methodologies, including case studies, user feedback, and performance metrics from current digital transformation efforts, the study reveals that a structured approach significantly improves the effectiveness of cross-sector integrations. Key findings indicate that organizations employing this proposed framework experience enhanced data security, reduced operational inefficiencies, and increased stakeholder confidence, particularly within the healthcare sector, where the safeguarding of sensitive patient information is paramount. Moreover, the research illustrates that the adoption of this framework not only contributes to improved patient outcomes through more reliable health data management but also fosters innovation in healthcare delivery mechanisms. The broader implications of this study extend beyond specific sectors, suggesting that implementing a unified framework can serve as a catalyst for accelerating digital transformation initiatives globally, thereby addressing systemic disparities in technology adoption and paving the way for more robust, secure, and efficient systems in diverse fields.
APA, Harvard, Vancouver, ISO, and other styles
35

Chen, Qiang, Daoming Li, and Lun Wang. "Network Security in the Internet of Things (IoT) Era." Journal of Industrial Engineering and Applied Science 2, no. 4 (2024): 36–41. https://doi.org/10.5281/zenodo.12789562.

Full text
Abstract:
The Internet of Things (IoT) represents a significant transformation in how devices communicate and interact, offering unprecedented convenience and efficiency. However, this interconnected environment also introduces substantial security challenges. Traditional network security measures are often inadequate for IoT environments due to their unique characteristics, such as resource constraints and diverse device types. This paper explores the current state of network security in the IoT era, examines the specific challenges posed by IoT environments, and presents innovative solutions and best practices for securing IoT networks. Through comprehensive analysis and experimental data, we demonstrate the effectiveness of these solutions in mitigating security risks associated with IoT.Specifically, we investigate the implementation of lightweight cryptography for resource-constrained devices, the use of blockchain technology for secure and decentralized authentication, the application of machine learning algorithms for anomaly detection, and the integration of fog computing to enhance real-time security services. Experimental results indicate significant improvements in security posture and performance, validating the proposed methodologies as viable solutions for IoT security challenges.
APA, Harvard, Vancouver, ISO, and other styles
36

R, Ravinder Naik, Ujwala B, and Raja Sekhar Reddy P. "The Need for Integration of Cloud with IoT." European Journal of Advances in Engineering and Technology 5, no. 5 (2018): 317–21. https://doi.org/10.5281/zenodo.10707991.

Full text
Abstract:
<strong>ABSTRACT </strong> Internet of Things is generally considered by real world small things, widely distributed, with limited capacity in terms of storage e and processing, which involve concerns regarding reliability, performance, security, and privacy. On the other hand, Cloud computing has unlimited capabilities in terms of storage and processing power,&nbsp; Thus, a novel IT paradigm in which Cloud and IoT are two complementary technologies merged together is expected to disrupt both current and Future Internet. We call this new paradigm CloudIoT. Therefore, the integration of cloud and Internet of Things to providing the best service to users and have the highest level of customer satisfaction should always provide quality of service can be guaranteed. With the trend going on in ubiquitous computing, everything is going to be connected to the Internet and its data will be used for various progressive purposes, creating not only information from it, but also, knowledge and even wisdom. Internet of Things (IoT) becoming so pervasive that it is becoming important to integrate it with cloud computing because of the amount of data IoT&rsquo;s could generate and their requirement to have the privilege of virtual resources utilization and storage capacity, but also, to make it possible to create more usefulness from the data generated by IoT&rsquo;s and develop smart applications for the users. This IoT and cloud computing integration is referred to as Cloud of Things
APA, Harvard, Vancouver, ISO, and other styles
37

Md, Suzon Islam. "AI and IoT in Automation and Security: A Vision for Next-Generation Applications." IJEEE 17, no. 4 (2024): 7–32. https://doi.org/10.5281/zenodo.14332198.

Full text
Abstract:
This paper explores the implications of marrying Internet of Things (IoT) with artificial intelligence (AI) in the realms of automation and security and what it entails. It presents an innovative application description arising from this technology convergence and its future-generation applications. It is found that Al brings strong cyber security, predictive maintenance and decision-making capabilities to the table due to its advanced algorithms and machine learning (ML) models. IoT has the potential to allow businesses to extract and generate big data, automate processes and monitor in real-time thousands and even millions of devices at once. It is believed that smart city, standalone systems and user experience are quite consumer-friendly. Importantly, the study also assesses facets such as data protection and system interoperability. The results include achieving significant 95.8% accuracy in anomaly detection and 93.4% accuracy in predictive maintenance, showcasing the efficacy of AI models in enhancing system reliability and operational efficiency. Vigorous eneryption protocol performance ensures data security, thus addressing issues of privacy. The findings underscore the transformative potential of Al-IoT integration in next-generation automation and security applications.
APA, Harvard, Vancouver, ISO, and other styles
38

Ikhalea, Nura, Ernest Chinonso Chianumba, Ashiata Yetunde Mustapha, and Adelaide Yeboah Forkuo. "Developing a Knowledge Graph for Integrating Health Data from Multiple Sources." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 1 (2023): 1102–19. https://doi.org/10.54660/.ijmrge.2023.4.1.1102-1119.

Full text
Abstract:
The increasing volume, variety, and velocity of health-related data generated from diverse sources—such as electronic health records (EHRs), wearable devices, public health databases, and clinical trials—has created an urgent need for effective integration and interpretation frameworks. Traditional data integration approaches often struggle to reconcile heterogeneous structures, semantics, and formats, resulting in fragmented insights and suboptimal healthcare outcomes. To address this challenge, this study presents the development of a comprehensive Knowledge Graph (KG) designed to unify and semantically enrich health data from multiple sources. The proposed Knowledge Graph leverages ontologies and semantic web technologies to create a scalable and interoperable framework for integrating structured and unstructured health data. Through entity extraction, relationship mapping, and schema alignment, the KG captures complex interconnections among patient data, medical concepts, treatments, diagnoses, and outcomes. We utilize natural language processing (NLP) techniques to transform unstructured text from clinical notes and research articles into structured knowledge, while standardized vocabularies such as SNOMED CT, ICD-10, and LOINC are employed to ensure semantic consistency. The architecture of the Knowledge Graph incorporates a hybrid model that combines rule-based reasoning with machine learning algorithms for knowledge inference and data validation. Real-world case studies demonstrate how the system enables advanced querying, patient stratification, and disease progression modeling, offering clinicians and researchers a unified view of patient histories and public health trends. Furthermore, the integration of temporal and geospatial dimensions enhances the capacity to monitor epidemics, identify risk factors, and support precision medicine. This research highlights the importance of semantic interoperability, data provenance, and real-time updating mechanisms in the design of robust health data infrastructures. By fostering a holistic understanding of multi-source health data, the Knowledge Graph not only streamlines clinical decision-making but also opens new avenues for population health management, biomedical discovery, and policy formulation. Future work will explore the integration of privacy-preserving technologies and federated learning to ensure data security and ethical compliance.
APA, Harvard, Vancouver, ISO, and other styles
39

Kiran, Kumar Voruganti. "Edge-AI and IoT DevOps: Managing Deployment Pipelines for Real-Time Analytics." Journal of Scientific and Engineering Research 9, no. 6 (2022): 84–94. https://doi.org/10.5281/zenodo.12666911.

Full text
Abstract:
The integration of Edge-AI and IoT within DevOps practices is revolutionizing data processing and real-time analytics, enabling immediate insights and decision-making across various industries. This paper explores the deployment of Edge-AI and IoT in DevOps environments, focusing on system architecture, automation, AI model training, real-time data processing, and security mechanisms. By examining the roles of edge computing nodes, AI model deployment, and real-time analytics, the study highlights the benefits of reduced latency, enhanced data privacy, and efficient resource utilization. Through detailed case studies in smart manufacturing and healthcare monitoring systems, this research demonstrates the practical applications and effectiveness of the proposed framework. The findings provide valuable insights for developing robust, scalable, and secure Edge-AI and IoT systems, addressing challenges such as data volume, latency, and security. This study contributes to the evolving field of IoT DevOps, offering a comprehensive framework and best practices for enhancing real-time analytics capabilities in cloud computing environments.
APA, Harvard, Vancouver, ISO, and other styles
40

Praveen, Borra. "Impact and Innovations of Azure IoT: Current Applications, Services, and Future Directions." International Journal of Recent Technology and Engineering (IJRTE) 13, no. 2 (2024): 21–26. https://doi.org/10.35940/ijrte.B8111.13020724.

Full text
Abstract:
<strong>Abstract:</strong> Azure IoT, developed by Microsoft, is a leading platform in the realm of Internet of Things (IoT), revolutionizing industries through enhanced connectivity, robust data management, and advanced analytics. This paper provides an in-depth exploration of Azure IoT's foundational technologies such as Azure IoT Hub and Azure Sphere, pivotal for ensuring secure device communication and comprehensive IoT security. Azure IoT Hub facilitates secure bidirectional communication between IoT devices and the cloud, supporting scalability to millions of devices across diverse sectors. In manufacturing, it empowers predictive maintenance by analyzing real-time sensor data to proactively identify equipment failures, thereby optimizing operational efficiency and reducing costs. Similarly, in healthcare, Azure IoT enhances patient care through remote monitoring, enabling timely interventions based on continuous health data collection. Azure Sphere complements Azure IoT Hub by offering a secure hardware, operating system, and cloud service ecosystem, essential for protecting IoT deployments against cyber threats. This integrated security approach ensures data integrity and privacy in interconnected IoT environments. The integration of Azure IoT with Azure's AI and machine learning services enriches IoT solutions with advanced analytics and automation capabilities. Organizations leverage AI to derive actionable insights from IoT data, automate decision-making processes, and enhance operational efficiency across various applications. Looking ahead, Azure IoT is advancing edge computing capabilities to reduce latency and improve real-time analytics and decision-making. Additionally, Azure continues to prioritize cybersecurity enhancements to safeguard IoT ecosystems from emerging threats, ensuring secure and reliable IoT deployments. In conclusion, Azure IoT stands as a cornerstone of Microsoft's IoT strategy, empowering organizations to innovate and streamline processes through scalable, secure, and AI-enhanced IoT solutions.
APA, Harvard, Vancouver, ISO, and other styles
41

Sofiritari, Ibikoroma Amgbara, Akwiwu-Uzoma Chukwuebuka, and David Ola. "Exploring lightweight machine learning models for personal internet of things (IOT) device security." World Journal of Advanced Research and Reviews 24, no. 2 (2024): 1116–38. https://doi.org/10.5281/zenodo.15093951.

Full text
Abstract:
The proliferation of Internet of Things (IoT) devices in personal and household environments has led to a significant increase in security vulnerabilities. These devices, due to their limited computational resources, often struggle to support conventional security solutions, making them prime targets for cyberattacks. This paper explores the potential of lightweight machine learning (ML) models to enhance the security of personal IoT devices. By leveraging the power of AI, lightweight models can offer real-time threat detection and anomaly identification without compromising the device's performance or requiring extensive computational resources. The paper investigates various ML techniques that are well-suited for IoT environments, such as decision trees, k-nearest neighbours (KNN), and support vector machines (SVM), focusing on their ability to detect intrusions, unauthorized access, and other malicious activities while maintaining efficiency. Additionally, the study highlights the trade-offs between model complexity, accuracy, and resource consumption, offering practical insights for deploying ML solutions in resource-constrained IoT systems. Key challenges, including data privacy, model generalization, and the adaptability of models to diverse IoT ecosystems, are addressed. Finally, the paper discusses future directions for the integration of more advanced lightweight models, such as federated learning and edge computing, which could further enhance security capabilities while ensuring minimal impact on IoT device performance. Through this review, the paper advocates for the adoption of lightweight ML models as a feasible and scalable solution to securing personal IoT devices in an increasingly connected world. &nbsp;
APA, Harvard, Vancouver, ISO, and other styles
42

Mushtaq, Muhammad Umer, Jiang Hong, Muhammad Owais, and A. Danso Samuel. "Enhancing Security and Energy Efficiency in Wireless Sensor Network Routing with IOT Challenges: A Thorough Review." LC International Journal of STEM 4, no. 3 (2023): 1–24. https://doi.org/10.5281/zenodo.10184917.

Full text
Abstract:
Wireless sensor networks (WSNs) have emerged as a crucial component in the field of networking due to their cost-effectiveness, efficiency, and compact size, making them invaluable for various applications. However, as the reliance on WSN-dependent applications continues to grow, these networks grapple with inherent limitations such as memory and computational constraints. Therefore, effective solutions require immediate attention, especially in the age of the Internet of Things (IoT), which largely relies on the effectiveness of WSNs. This study undertakes a comprehensive review of research conducted between 2018 and 2020, categorizing it into six main domains: 1) Providing an overview of WSN applications, management, and security considerations. 2) Focusing on routing and energy-saving techniques. 3) Reviewing the development of methods for information gathering, emphasizing data integrity and privacy. 4) Emphasizing connectivity and positioning techniques. 5) Examining studies that explore the integration of IoT technology into WSNs, with an eye on secure data transmission. 6) Highlighting research efforts aimed with a strong emphasis on energy efficiency. The study addresses the motivation behind employing WSN applications in IoT technologies, as well as the challenges, obstructions, and solutions related to their application and development. It underscores that energy consumption remains a paramount issue in WSNs, with untapped potential for improving energy efficiency while ensuring robust security. Furthermore, it identifies existing approaches' weaknesses, rendering them inadequate for achieving energy-efficient routing in secure WSNs. This review sheds light on the critical challenges and opportunities in the field, contributing to a deeper understanding of WSNs and their role in secure IoT applications.
APA, Harvard, Vancouver, ISO, and other styles
43

Srinivas, Kasulla, J. Malik S, Prakash Baxla Sanjay, and Zafar Salman. "The Role of IoT in Waste Management and Sustainability." Partners Universal International Research Journal (PUIRJ) 03, no. 02 (2024): 76–88. https://doi.org/10.5281/zenodo.11854522.

Full text
Abstract:
This research investigates the integration of Internet of Things (IoT) technologies in waste management and sustainability practices in major Indian cities, addressing the critical gap in empirical data on IoT's effectiveness in this sector. The study focuses on five municipalities: Delhi, Mumbai, Chennai, Kolkata, and Bangalore. Utilizing a mixed-methods approach, the research combines quantitative data on waste generation and recycling rates with qualitative insights from stakeholder interviews. Key findings reveal significant discrepancies in waste generation rates, with cities like Delhi and Mumbai exhibiting the highest figures. Recycling rates varied, with Chennai achieving the highest at 35% and Kolkata the lowest at 15%, highlighting the need for localized strategies. Operational efficiency metrics indicated that Chennai benefits the most from IoT integration, showcasing shorter waste collection times and higher fleet utilization. However, challenges such as infrastructure inadequacies, data privacy concerns, and cost constraints were prevalent, particularly in Kolkata. Stakeholder perspectives were mixed, reflecting optimism about IoT's potential and concerns about its implementation complexities. The study concludes that while IoT can significantly enhance waste management efficiency and sustainability, overcoming infrastructural and resource barriers, ensuring data security, and fostering stakeholder confidence are crucial for successful adoption. These findings provide valuable insights for policymakers and practitioners aiming to leverage IoT for sustainable urban waste management.
APA, Harvard, Vancouver, ISO, and other styles
44

Researcher. "GEOFENCING IN IOT: ENHANCING LOCATION-BASED SERVICES." International Journal of Computer Engineering and Technology (IJCET) 15, no. 6 (2024): 687–700. https://doi.org/10.5281/zenodo.14222399.

Full text
Abstract:
Geofencing technology has emerged as a transformative force in the Internet of Things ecosystem, revolutionizing how organizations leverage location-based services across multiple sectors. This comprehensive article explores the technical foundations, key applications, implementation considerations, best practices, and future trends in geofencing technology. The article examines the integration of various positioning technologies, including GPS, RFID, and indoor positioning systems, alongside the crucial role of artificial intelligence and machine learning in enhancing system performance. The article delves into diverse applications across fleet management, retail, smart cities, agriculture, and security sectors, highlighting the technology's versatility and impact. Through a detailed examination of implementation strategies, the article addresses critical aspects of accuracy requirements, battery optimization, data privacy, and network infrastructure needs, providing insights into successful deployment approaches and emerging technological advances.
APA, Harvard, Vancouver, ISO, and other styles
45

Praveen, Kumar Myakala, Naayini Prudhvi, and Kamatala Srikanth. "A Survey on Federated Learning for TinyML: Challenges, Techniques, and Future Directions." Partners Universal International Innovation Journal (PUIIJ) 03, no. 02 (2025): 97–114. https://doi.org/10.5281/zenodo.15240508.

Full text
Abstract:
The convergence of Federated Learning (FL) and Tiny Machine Learning (TinyML) represents a transformative step toward enabling intelligent and privacy-preserving applications on resource-constrained edge devices. TinyML focuses on deploying lightweight machine learning models on microcontrollers and other low-power devices, whereas FL facilitates decentralized learning across distributed datasets without compromising user privacy. This survey provides a comprehensive review of the current state of research at the intersection of FL and TinyML, exploring model optimization techniques such as quantization, pruning, and knowledge distillation as well as communication efficient algorithms such as federated averaging and gradient sparsification. Key challenges, including ensuring energy efficiency, scalability, and security in FL-TinyML systems, are highlighted. Real-world applications, such as revolutionizing personalized healthcare, enabling smarter IoT devices, and advancing industrial&nbsp; automation, demonstrating the transformative potential of FL-TinyML to drive innovations in edge intelligence. This survey provides a timely and essential guide to the emerging field of FL-TinyML, paving the way for future research and development. Finally, this study identify open research questions and propose future directions, including hybrid optimization approaches, standardized evaluation frameworks, and the integration of blockchain for decentralized trust management.
APA, Harvard, Vancouver, ISO, and other styles
46

Dhonju, Ganesh Ram, and Subarna Shakya. "Analyzing Challenges for the Implementation of E-Government in Municipalities within Kathmandu Valley." Journal of Science and Engineering 7 (December 22, 2019): 70–78. http://dx.doi.org/10.3126/jsce.v7i0.26795.

Full text
Abstract:
Over the past decade, rapid progress in ICT has encouraged governments to incorporate new technology into their national development strategies. With the growing demands of citizens and changing global rules and regulations, governments are under pressure to deliver quality services at right time. E-government has recently emerged in Nepal that‟s why so many issues remain problematic for initiation e-services in local government. The current stages of municipalities within Kathmandu Valley were investigated by using four stage e-government maturity model (information, interaction, transaction, integration). An understanding of the current status of e-government in local government can help policy makers in the country pursue development of the public sector organizations on the one hand, and would be of importance for Nepal's economic future success on the other. Identifying the precise problem is important in order to overcome the inherent challenges. Valuable primary data is collected from questionnaire survey and content analysis. Different challenges regarding initiation of e-based services in municipalities are categories into Financial, Human, Organizational, Technical and Legal &amp; other challenges. The current status of e-based services delivery initiatives in Municipalities and problematic challenges in implementation of e-based services initiatives were being investigated. Lack of strategic plans, change management, budget constraint, weak infrastructure, literacy, lack of construction knowledge, lacks of leadership supports, security and privacy are found to be the most problematic challenges regarding implementation of e-service in municipalities.
APA, Harvard, Vancouver, ISO, and other styles
47

Prof, Nwobodo-Nzeribe Nnenna Harmony, and Charles N. Nwabueze. "Design and Development of an IoT Based Wearable Vital Signs Measuring Smart Device for Diagnosing and Managing Various Health Conditions." Engineering and Technology Journal 10, no. 01 (2025): 3466–74. https://doi.org/10.5281/zenodo.14598921.

Full text
Abstract:
The increasing demand for continuous health monitoring and early detection of medical conditions has led to the development of innovative wearable technologies. This paper presents the design and development of an IoT-based wearable smart device capable of measuring vital signs to aid in the diagnosis and management of various health conditions. The device integrates multiple sensors to monitor key physiological parameters, including heart rate, body temperature, and blood oxygen levels (SpO2). These sensors are connected to a microcontroller, which processes the data and transmits it to a cloud-based platform via wireless communication protocols. The system architecture leverages IoT technology to enable real-time data collection, storage, and analysis, making it possible for healthcare providers to remotely monitor patients and make informed decisions. The device is designed to be lightweight, energy-efficient, and comfortable for continuous wear, ensuring usability across different patient demographics. Additionally, the smart device includes features for alerting users and healthcare providers to abnormal readings, thereby facilitating timely interventions. This paper discusses the technical challenges encountered during the development process, such as sensor integration, power management, and ensuring data security and privacy. It also highlights the potential applications of the device in managing chronic diseases, post-operative care, and remote patient monitoring. The prototype&rsquo;s performance is evaluated through a series of tests, demonstrating its reliability and accuracy in measuring vital signs. The study concludes that this IoT-based wearable device has significant potential to enhance healthcare delivery by providing a convenient, efficient, and scalable solution for continuous health monitoring.
APA, Harvard, Vancouver, ISO, and other styles
48

Yosra, Ali Hassan, and Maseeh Yasin Hajar. "Technologies and Challenges of IoT in Smart Cities: A Systematic Survey: A Review." Engineering and Technology Journal 10, no. 05 (2025): 5255–63. https://doi.org/10.5281/zenodo.15550701.

Full text
Abstract:
The Internet of Things (IoT) in smart cities is a network connecting various devices and technologies, reducing the need for human intervention. This framework is crucial in developing smarter cities worldwide, enhancing sustainable living and urban efficiency. The paper delves into the core elements of IoT in smart cities, including architectural frameworks, networking technologies, and AI algorithms. It also explores practical implementations in different urban sectors and discusses the challenges and solutions in deploying IoT infrastructure in these environments. The Internet of Things (IoT) is a transformative technology that has revolutionized the development and operation of smart cities. This survey provides an overview of the integration of IoT technologies within urban environments, focusing on the core technologies, practices, and challenges involved. The paper discusses the various IoT-based solutions that contribute to efficient city management, including smart traffic systems, energy management, waste management, and healthcare. Additionally, it explores the technological components such as sensors, communication protocols, cloud computing, and data analytics that enable these applications. Despite the promising potential, the adoption of IoT in smart cities faces numerous challenges, including security and privacy concerns, interoperability issues, and scalability limitations. Furthermore, this paper highlights the need for policy frameworks and collaboration between stakeholders to overcome these barriers. Finally, the paper offers insights into future trends and opportunities for the continued evolution of IoT in smart cities.
APA, Harvard, Vancouver, ISO, and other styles
49

Pu, Yucui, and Long Liu. "Wearable device data-driven athlete injury detection and rehabilitation monitoring algorithm." Molecular & Cellular Biomechanics 21, no. 2 (2024): 361. http://dx.doi.org/10.62617/mcb.v21i2.361.

Full text
Abstract:
In recent years, sports wearable technology has completely changed the way athletes prepare, compete, and recover. Wearable technology has a lot to offer in the rehabilitation process, which is essential to an athlete’s return to their best performance. Wearable devices for athlete injury detection pose potential challenges like data quality, security, and privacy, impacting accuracy, reliability, and effectiveness. To solve these problems, an innovative injury detection and rehabilitation monitoring (IDRM) system was proposed for athletes. By employing an adjustable recurrent neural network (ARNN) to detect anomalies in injury risks such as abnormal joint movements in athletes. In this study, biomechanics data was collected from sports athletes through wearable devices, and the wearable system provided feedback to the user. A redefined convolutional neural network (RCNN) was utilized to monitor the rehabilitation process. This system tracks athlete’s rehabilitation progress and ensures that progress monitors were performed correctly, and the system, feasibility was evaluated on 10 healthy subjects performing 4 different rehabilitation exercises. Each exercise was performed four times monitoring and validation. The data was preprocessed using a Gaussian filter to remove noise from the obtained data. Then the features are extracted using independent component analysis (ICA) for dimensionality reduction from preprocessed data. The proposed method is implemented using Python software. In comparative analysis, the performance of ARNN showed high performance, with an F1-measure of 91.6%, accuracy of 93.5%, recall of 92.8%, and precision of 91.4%. With a 95% accuracy rate, 98% F1 measure, 94% precision, and 93% recall, the RCNN model functioned effectively. The result showed the proposed method achieved better performance in athlete injury detection and accurately recognizing all rehabilitation monitoring. This study provides a complete approach to athlete health management by highlighting the integration of rehabilitation monitoring and injury detection into an overall structure.
APA, Harvard, Vancouver, ISO, and other styles
50

Hiroshi, Tanaka. "Advances in 5G and Emerging 6G Wireless Communication Technologies: Enhancing IoT Connectivity and Applications." Journal of Emerging Trends in Scientific Research 2, no. 2 (2024): 1–10. https://doi.org/10.5281/zenodo.15192877.

Full text
Abstract:
The rapid evolution of wireless communication technologies, particularly the development of 5G and the emerging6G networks, is revolutionizing the Internet of Things (IoT) ecosystem. 5G technology offers unprecedented speed,low latency, and massive connectivity, enabling a wide range of IoT applications across industries such ashealthcare, smart cities, agriculture, and autonomous vehicles. These advances facilitate real-time data exchangeand high-throughput communication among billions of IoT devices. While 5G represents a significant leap, thefuture 6G networks are expected to push the boundaries further by incorporating features like terahertzfrequencies, artificial intelligence (AI)-driven network management, and ultra-reliable low-latency communication(URLLC). This convergence of 6G and IoT will unlock groundbreaking applications such as fully autonomoussystems, real-time virtual environments, and enhanced human-machine interaction through tactile internet.Moreover, 6G will prioritize sustainability by incorporating energy-efficient designs and green communications.This paper reviews the key advancements in 5G and emerging 6G technologies, explores their role in the IoTlandscape, and examines the transformative applications made possible by the intersection of these technologies.Additionally, it addresses the technical challenges, such as security, privacy, and spectrum management, whichneed to be resolved for the seamless integration of IoT with next-generation wireless networks.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!