To see the other types of publications on this topic, follow the link: IoT DevOps.

Journal articles on the topic 'IoT DevOps'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'IoT DevOps.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Orlov, M., O. Duda, Yu Zhovnir та O. Hrybovskyi. "Інструменти методології DevOps в інформаційних системах на основі технологій IoT". COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, № 57 (13 лютого 2025): 128–38. https://doi.org/10.36910/6775-2524-0560-2024-57-15.

Full text
Abstract:
В статті розглядається основні інструменти методології DevOps та їх застосування в інформаційних системах, що базуються на технологіях Інтернету речей (IoT). Зростаюча кількість IoT-пристроїв, які постійно генерують великі обсяги даних, вимагає ефективного підходу до управління процесами розробки, тестування та розгортання програмного забезпечення. Методологія DevOps забезпечує автоматизацію та інтеграцію цих процесів, дозволяючи зменшити затримки та підвищити якість сервісів. У роботі акцентується увага на інструментах CI/CD (безперервної інтеграції та доставки) і контейнеризації, які є ключо
APA, Harvard, Vancouver, ISO, and other styles
2

Paprzycki, Marcin, Maria Ganzha, Katarzyna Wasielewska, and Piotr Lewandowski. "DEVSECOPS METHODOLOGY FOR NG-IOT ECOSYSTEM DEVELOPMENT LIFECYCLE – ASSIST-IOT PERSPECTIVE." Journal of Computer Science and Cybernetics 37, no. 3 (2021): 321–37. http://dx.doi.org/10.15625/1813-9663/37/3/16245.

Full text
Abstract:
Current software projects require continuous integration during their whole lifetime. In this context, different approaches regarding introduction of DevOps and DevSecOps strategies have been proposed in the literature. While DevOps proposes an agile methodology for the development and instantiation of software platforms with minimal impact in any kind of operations environment, this contribution proposes the introduction of DevOps methodology for Next Generation IoT deployments. Moreover, novelty of the proposed approach lies in leveraging DevSecOps in different stages and layers of the archi
APA, Harvard, Vancouver, ISO, and other styles
3

Prudhvi Singirikonda. "5g-Enabled DevOps: Revolutionizing Integrated Communication And Networking Technologies For Faster Software Delivery." International Journal for Research Publication and Seminar 15, no. 3 (2024): 491–99. http://dx.doi.org/10.36676/jrps.v15.i3.1540.

Full text
Abstract:
This paper discusses how integrating 5G and IoT technologies can improve the DevOps process regarding communication and networking to foster efficient software delivery. The strengths of 5G are expected to provide interfaces for IoT devices and ensure high-speed, low-latency networks that will bring responses to the existing DevOps challenges, including longer durations of continuous integration and deployment. Exploiting the benefits provided by 5G connectivity and IoT for real-time data processing, one can get more robust, functional, and adaptive DevOps settings. The results suggest that in
APA, Harvard, Vancouver, ISO, and other styles
4

Prudhvi Singirikonda. "5g-Enabled DevOps: Revolutionizing Integrated Communication And Networking Technologies For Faster Software Delivery." International Journal for Research Publication and Seminar 15, no. 1 (2024): 491–99. http://dx.doi.org/10.36676/jrps.v15.i1.1540.

Full text
Abstract:
This paper discusses how integrating 5G and IoT technologies can improve the DevOps process regarding communication and networking to foster efficient software delivery. The strengths of 5G are expected to provide interfaces for IoT devices and ensure high-speed, low-latency networks that will bring responses to the existing DevOps challenges, including longer durations of continuous integration and deployment. Exploiting the benefits provided by 5G connectivity and IoT for real-time data processing, one can get more robust, functional, and adaptive DevOps settings. The results suggest that in
APA, Harvard, Vancouver, ISO, and other styles
5

Judvaitis, Janis, Rihards Balass, and Modris Greitans. "Mobile IoT-Edge-Cloud Continuum Based and DevOps Enabled Software Framework." Journal of Sensor and Actuator Networks 10, no. 4 (2021): 62. http://dx.doi.org/10.3390/jsan10040062.

Full text
Abstract:
This research aims to provide a high-level software framework for IoT-Edge-Cloud computational continuum-based applications with support for mobile IoT and DevOps integration utilizing the Edge computing paradigms. This is achieved by dividing the system in a modular fashion and providing a loosely coupled service and module descriptions for usage in the respective system layers for flexible and yet trustworthy implementation. The article describes the software architecture for a DevOps-enabled Edge computing solution in the IoT-Edge-Cloud computational continuum with the support for flexible
APA, Harvard, Vancouver, ISO, and other styles
6

Kiran, Kumar Voruganti. "Edge-AI and IoT DevOps: Managing Deployment Pipelines for Real-Time Analytics." Journal of Scientific and Engineering Research 9, no. 6 (2022): 84–94. https://doi.org/10.5281/zenodo.12666911.

Full text
Abstract:
The integration of Edge-AI and IoT within DevOps practices is revolutionizing data processing and real-time analytics, enabling immediate insights and decision-making across various industries. This paper explores the deployment of Edge-AI and IoT in DevOps environments, focusing on system architecture, automation, AI model training, real-time data processing, and security mechanisms. By examining the roles of edge computing nodes, AI model deployment, and real-time analytics, the study highlights the benefits of reduced latency, enhanced data privacy, and efficient resource utilization. Throu
APA, Harvard, Vancouver, ISO, and other styles
7

Zhovnir, Yuri, Oleg Hrybovskyi, Mykola Orlov, Oleksiy Duda, and Natalia Kunanets. "Methodology of development and maintenance of information systems based on the technology of the internet of things." Management of Development of Complex Systems, no. 60 (November 29, 2024): 56–70. https://doi.org/10.32347/2412-9933.2024.60.56-70.

Full text
Abstract:
The article is devoted to the study of development and maintenance methodologies for information systems based on the Internet of Things (IoT) technology, with a particular focus on the use of the DevOps methodology. The Internet of Things is rapidly evolving, penetrating various industries, including infrastructure management, security systems, resource management, and water supply and sewage control. Modern IoT systems require a high level of reliability, scalability, and security as they interact with numerous devices and process large volumes of real-time data. Therefore, the relevance of
APA, Harvard, Vancouver, ISO, and other styles
8

NUGRAHA, AZIS WISNU WIDHI, IMRON ROSYADI, and FAHMI KHOERULLATIF. "Penerapan DevOps pada Sistem Tertanam dengan ESP8266 menggunakan Mekanisme Over The Air." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 9, no. 3 (2021): 678. http://dx.doi.org/10.26760/elkomika.v9i3.678.

Full text
Abstract:
ABSTRAKDevOps mendorong percepatan pengembangan sistem. Namun bukti nyata penerapannya pada sistem tertanam belum mencukupi. Salah satu penyebabnya adalah kesulitan proses deployment pada perangkat. Konsep IoT menghubungkan sistem tertanam dengan jaringan yang memungkinkan proses pembaharuan firmware menggunakan mekanisme Over The Air (OTA). Tulisan ini mengusulkan infrastruktur DevOps untuk pengembangan sistem tertanam. Perangkat keras yang digunakan adalah microcontroller ESP8266. Sedangkan lingkungan DevOps menggunakan perangkat lunak PlatformIO, GitHub dan Travis CI. Pengujian dilakukan de
APA, Harvard, Vancouver, ISO, and other styles
9

Truong, Hong-Linh, and Peter Klein. "DevOps Contract for Assuring Execution of IoT Microservices in the Edge." Internet of Things 9 (March 2020): 100150. http://dx.doi.org/10.1016/j.iot.2019.100150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lopez-Pena, Miguel A., Jessica Diaz, Jorge E. Perez, and Hector Humanes. "DevOps for IoT Systems: Fast and Continuous Monitoring Feedback of System Availability." IEEE Internet of Things Journal 7, no. 10 (2020): 10695–707. http://dx.doi.org/10.1109/jiot.2020.3012763.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Orlov, M. V., O. M. Hrybovskyi, Yu I. Zhovnir, and O. M. Duda. "FROM CONCEPT TO REALITY: THE ROLE OF DEVOPS METHODOLOGY IN IOT ECOSYSTEMS." Scientific notes of Taurida National V.I. Vernadsky University. Series: Technical Sciences 2, no. 6 (2024): 157–64. https://doi.org/10.32782/2663-5941/2024.6.2/22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Buttar, Ahmed Mateen, Adeel Khalid, Mamdouh Alenezi, et al. "Optimization of DevOps Transformation for Cloud-Based Applications." Electronics 12, no. 2 (2023): 357. http://dx.doi.org/10.3390/electronics12020357.

Full text
Abstract:
Rapid software development is critical for meeting company objectives and competing more effectively in the competitive IoT infrastructure. DevOps is a growing technique that enables enterprises to provide high-quality software capabilities through automation, to improve team communication, and to increase efficiency across the software product lifecycle. Research problem: Due to the increased demand for new products and technologies, a huge overwork shifted on the organizations for introducing software with pace and to become stable to compete with others. Due to this, the majority of organiz
APA, Harvard, Vancouver, ISO, and other styles
13

Alonso, Juncal, Leire Orue-Echevarria, and Maider Huarte. "CloudOps: Towards the Operationalization of the Cloud Continuum: Concepts, Challenges and a Reference Framework." Applied Sciences 12, no. 9 (2022): 4347. http://dx.doi.org/10.3390/app12094347.

Full text
Abstract:
The current trend of developing highly distributed, context aware, heterogeneous computing intense and data-sensitive applications is changing the boundaries of cloud computing. Encouraged by the growing IoT paradigm and with flexible edge devices available, an ecosystem of a combination of resources, ranging from high density compute and storage to very lightweight embedded computers running on batteries or solar power, is available for DevOps teams from what is known as the Cloud Continuum. In this dynamic context, manageability is key, as well as controlled operations and resources monitori
APA, Harvard, Vancouver, ISO, and other styles
14

Alonso, Juncal, Leire Orue-Echevarria, and Maider Huarte. "CloudOps: Towards the Operationalization of the Cloud Continuum: Concepts, Challenges and a Reference Framework." Applied Sciences 12, no. 9 (2022): 4347. http://dx.doi.org/10.3390/app12094347.

Full text
Abstract:
The current trend of developing highly distributed, context aware, heterogeneous computing intense and data-sensitive applications is changing the boundaries of cloud computing. Encouraged by the growing IoT paradigm and with flexible edge devices available, an ecosystem of a combination of resources, ranging from high density compute and storage to very lightweight embedded computers running on batteries or solar power, is available for DevOps teams from what is known as the Cloud Continuum. In this dynamic context, manageability is key, as well as controlled operations and resources monitori
APA, Harvard, Vancouver, ISO, and other styles
15

Dzhelalov, Kostiantyn, Oleg Smirnov, and Yuriy Kemenyash. "Comprehensive Security System of Data Transmission Networks of Civil Aviation Enterprises." Electronics and Control Systems 1, no. 83 (2025): 71–75. https://doi.org/10.18372/1990-5548.83.19878.

Full text
Abstract:
A comprehensive security system for data transmission networks in civil aviation enterprises is considered, which is aimed at overcoming the growing cybersecurity threats in modern aviation infrastructure. Vulnerabilities such as outdated systems, human errors and integration of IoT devices pose significant risks to data confidentiality, integrity and availability. To mitigate these challenges, the system integrates advanced cryptographic algorithms, DevOps methodologies for automated security updates and real-time monitoring tools such as Grafana and Prometheus. The use of fault tolerance mec
APA, Harvard, Vancouver, ISO, and other styles
16

Petrakis, Kostas, Evangelos Agorogiannis, Grigorios Antonopoulos, et al. "Enhancing DevOps Practices in the IoT–Edge–Cloud Continuum: Architecture, Integration, and Software Orchestration Demonstrated in the COGNIFOG Framework." Software 4, no. 2 (2025): 10. https://doi.org/10.3390/software4020010.

Full text
Abstract:
This paper presents COGNIFOG, an innovative framework under development that is designed to leverage decentralized decision-making, machine learning, and distributed computing to enable autonomous operation, adaptability, and scalability across the IoT–edge–cloud continuum. The work emphasizes Continuous Integration/Continuous Deployment (CI/CD) practices, development, and versatile integration infrastructures. The described methodology ensures efficient, reliable, and seamless integration of the framework, offering valuable insights into integration design, data flow, and the incorporation of
APA, Harvard, Vancouver, ISO, and other styles
17

Hitimana, Eric, Gaurav Bajpai, Richard Musabe, Louis Sibomana, and Kayavizhi Jayavel. "Containerized Architecture Performance Analysis for IoT Framework Based on Enhanced Fire Prevention Case Study: Rwanda." Sensors 22, no. 17 (2022): 6462. http://dx.doi.org/10.3390/s22176462.

Full text
Abstract:
Nowadays, building infrastructures are pushed to become smarter in response to desires for the environmental comforts of living. Enhanced safety upgrades have begun taking advantage of new, evolving technologies. Normally, buildings are configured to respond to the safety concerns of the occupants. However, advanced Internet of Things (IoT) techniques, in combination with edge computing with lightweight virtualization technology, is being used to improve users’ comfort in their homes. It improves resource management and service isolation without affecting the deployment of heterogeneous hardwa
APA, Harvard, Vancouver, ISO, and other styles
18

Researcher. "LEVERAGING CLOUD-NATIVE ARCHITECTURE FOR SCALABLE AND RESILIENT ENTERPRISE APPLICATIONS: A COMPREHENSIVE ANALYSIS." International Journal of Computer Engineering and Technology (IJCET) 15, no. 5 (2024): 583–91. https://doi.org/10.5281/zenodo.13861921.

Full text
Abstract:
This comprehensive article explores the transformative impact of cloud-native architectures on enterprise applications, focusing on their ability to enhance scalability, resilience, and agility in today's rapidly evolving digital landscape. The article begins by elucidating cloud-native design's core principles and key components, including microservices, containers, and dynamic orchestration technologies like Kubernetes. It then delves into the strategies for achieving scalability and resilience in cloud-native systems, supported by real-world case studies from industry leaders. The arti
APA, Harvard, Vancouver, ISO, and other styles
19

Oztoprak, Kasim, Yusuf Kursat Tuncel, and Ismail Butun. "Technological Transformation of Telco Operators towards Seamless IoT Edge-Cloud Continuum." Sensors 23, no. 2 (2023): 1004. http://dx.doi.org/10.3390/s23021004.

Full text
Abstract:
This article investigates and discusses challenges in the telecommunication field from multiple perspectives, both academic and industry sides are catered for, surveying the main points of technological transformation toward edge-cloud continuum from the view of a telco operator to show the complete picture, including the evolution of cloud-native computing, Software-Defined Networking (SDN), and network automation platforms. The cultural shift in software development and management with DevOps enabled the development of significant technologies in the telecommunication world, including networ
APA, Harvard, Vancouver, ISO, and other styles
20

Pérez, Luis Jurado, and Joaquín Salvachúa. "An Approach to Build e-Health IoT Reactive Multi-Services Based on Technologies around Cloud Computing for Elderly Care in Smart City Homes." Applied Sciences 11, no. 11 (2021): 5172. http://dx.doi.org/10.3390/app11115172.

Full text
Abstract:
Although there are e-health systems for the care of elderly people, the reactive characteristics to enhance scalability and extensibility, and the use of this type of system in smart cities, have been little explored. To date, some studies have presented healthcare systems for specific purposes without an explicit approach for the development of health services. Moreover, software engineering is hindered by agile management challenges regarding development and deployment processes of new applications. This paper presents an approach to develop health Internet of Things (IoT) reactive applicati
APA, Harvard, Vancouver, ISO, and other styles
21

Kumar, Manish, and Deepanshu Kaushik. "Current trends in it." Pranjana:The Journal of Management Awareness 27, no. 1and2 (2024): 127–34. https://doi.org/10.5958/0974-0945.2024.00011.3.

Full text
Abstract:
AbstractThanks to developments in artificial intelligence (AI), cloud computing, cyber security, and other game-changing technologies, the information technology (IT) landscape is changing quickly. With an emphasis on artificial intelligence (AI), multi-cloud strategies, cybersecurity resilience, quantum computing, the Internet of Things (IoT), DevOps, blockchain, and Environmental, Social, and Governance (ESG) activities, this article offers a thorough examination of current IT developments influencing companies in 2024. Business operations are being completely transformed by artificial intel
APA, Harvard, Vancouver, ISO, and other styles
22

Novik, Alisa. "Optimization Methods for Scaling Services under High Load Conditions." International Journal of All Research Education and Scientific Methods 13, no. 05 (2025): 758–63. https://doi.org/10.56025/ijaresm.2025.1305250758.

Full text
Abstract:
This article explores methods for optimizing the scaling of cloud services under high-load conditions. The study draws on both traditional approaches to load distribution—vertical and horizontal scaling, load balancing algorithms, caching techniques—and modern technologies, including containerization, serverless computing, edge computing, and hybrid models that combine heuristic algorithms with deep learning methods (CNNLSTM). A comprehensive literature review helps identify key performance metrics: response time, total makespan, number of virtual machine migrations, algorithm runtime, and ene
APA, Harvard, Vancouver, ISO, and other styles
23

Bhande, Aparna S., Nidhi J. Sharma, and Sujata V. Barabde. "Emerging Trends in Database Design: Toward Improved Modeling and Development Practices." EPJ Web of Conferences 328 (2025): 01065. https://doi.org/10.1051/epjconf/202532801065.

Full text
Abstract:
With the explosive development of data-driven applications, cloud-native systems, and diversified data formats, the database design techniques must be radically extended. Classical database models such as those focused on Entity-Relationship (ER) modeling and the relational paradigm, are becoming less and less suitable for managing the complexity, scale and dynamicity of today’s data settings. This article traces the history and state of database design and investigates what could be the future of datastraucture architecture and implementation, considering modern paradigms with NoSQL, NewSQL,
APA, Harvard, Vancouver, ISO, and other styles
24

Demertzis, Konstantinos, Konstantinos Tsiknas, Dimitrios Takezis, Charalabos Skianis, and Lazaros Iliadis. "Darknet Traffic Big-Data Analysis and Network Management for Real-Time Automating of the Malicious Intent Detection Process by a Weight Agnostic Neural Networks Framework." Electronics 10, no. 7 (2021): 781. http://dx.doi.org/10.3390/electronics10070781.

Full text
Abstract:
Attackers are perpetually modifying their tactics to avoid detection and frequently leverage legitimate credentials with trusted tools already deployed in a network environment, making it difficult for organizations to proactively identify critical security risks. Network traffic analysis products have emerged in response to attackers’ relentless innovation, offering organizations a realistic path forward for combatting creative attackers. Additionally, thanks to the widespread adoption of cloud computing, Device Operators (DevOps) processes, and the Internet of Things (IoT), maintaining effec
APA, Harvard, Vancouver, ISO, and other styles
25

Pavlyha, Pavlo. "WAYS OF USING CLOUD SERVICES FOR TRAINING IT BACHELORS." Alfred Nobel University Journal of Pedagogy and Psychology 1, no. 29 (2025): 220–29. https://doi.org/10.32342/3041-2196-2025-1-29-19.

Full text
Abstract:
The rapid evolution of information technologies (IT) necessitates continuous updates to educational programs to equip future specialists with relevant skills. Integrating modern cloud services into the training process for IT bachelors has become crucial for enhancing practical skills and ensuring graduates are com- petitive in the job market. This article explores the multifaceted application of cloud technologies in IT ed- ucation. The purpose of this study is to outline the ways cloud technologies can be applied in the preparation of IT bachelors across various specializations, compile a li
APA, Harvard, Vancouver, ISO, and other styles
26

Vasiuta, Viktoriia, Vasyl Vasiuta, Eleonora Liakhno, and Anastasiia Yehorova. "Development of Ukraines IT sector as a prerequisite of economic digitalization." Galician economic journal 94, no. 3 (2025): 147–52. https://doi.org/10.33108/galicianvisnyk_tntu2025.03.147.

Full text
Abstract:
Digitalization is a key trend in the modern economy, fundamentally transforming all sectors of society by enhancing efficiency, promoting innovation, and creating new forms of employment. In Ukraine, this process is closely linked to global digital transformation and European integration. The IT sector plays a central role in Ukraine’s digital progress, supporting economic growth, competitiveness, and the development of an information society. However, the Ukrainian IT industry faces significant challenges, including war, economic instability, talent shortages, business process disruptions, ta
APA, Harvard, Vancouver, ISO, and other styles
27

Li, Keng, Yu Zhang, Yong Huang, Zhiwei Tian, and Ziqin Sang. "Framework and Capability of Industrial IoT Infrastructure for Smart Manufacturing." Standards 3, no. 1 (2023): 1–18. http://dx.doi.org/10.3390/standards3010001.

Full text
Abstract:
The Internet of Things (IoT) and smart manufacturing (SM) are mutually reinforcing. The establishment of IoT-based common facilities for SM is the premise of building SM system. Industrial IoT (IIoT) infrastructure for SM refers to common facilities based on IoT that support SM in industries or sectors, and plays a dominant role and faces severe challenges in the intelligence of SM. The infrastructure is independent of the products and production process in a specific factory. This paper develops conceptual and capability frameworks of IIoT infrastructure from a unified perspective of IIoT-rel
APA, Harvard, Vancouver, ISO, and other styles
28

Ali, Syed Afraz. "Designing Secure and Robust E-Commerce Plaform for Public Cloud." Asian Bulletin of Big Data Management 3, no. 1 (2023): 164–89. http://dx.doi.org/10.62019/abbdm.v3i1.56.

Full text
Abstract:

 
 
 
 The migration of e-commerce platforms to the public cloud has become a pivotal strategy for businesses seeking enhanced scalability, performance, and cost-efficiency. This paper explores the multifaceted design considerations critical to deploying robust e-commerce systems within the public cloud infrastructure. It delves into scalability, ensuring that platforms can handle varying loads with elasticity and grace. Security is examined as a paramount concern, addressing the need for stringent data protection, compliance with industry standards, and the implementation
APA, Harvard, Vancouver, ISO, and other styles
29

Dzeikalo, Andrei. "Architectural approaches to creating scalable and adaptable software solutions for oil and gas companies." Foreign Affairs 10, no. 2 (2025): 5–20. https://doi.org/10.59214/euch/2.2025.20.

Full text
Abstract:
In the context of the digital transformation of the oil and gas industry, the development of architectural solutions that can ensure the scalability, adaptability and stability of software to changes in the production environment and business processes is of particular importance. The purpose of the study is to substantiate architectural approaches to the creation of scalable, adaptive and technologically sustainable software solutions, taking into account their application in the oil and gas industry, including the tasks of logistics, field management, equipment monitoring and support of geog
APA, Harvard, Vancouver, ISO, and other styles
30

Mohammad, Sikender Mohsienuddin. "DevOps Automation Advances I.T. Sectors with the Strategy of Release Management." International Journal of Computer Trends and Technology 67, no. 12 (2019): 82–88. http://dx.doi.org/10.14445/22312803/ijctt-v67i12p114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Thilagam, K., A. Beno, M. Vanitha Lakshmi, et al. "Secure IoT Healthcare Architecture with Deep Learning-Based Access Control System." Journal of Nanomaterials 2022 (May 19, 2022): 1–8. http://dx.doi.org/10.1155/2022/2638613.

Full text
Abstract:
The existing healthcare system based on traditional management involves the storage and processing of large quantities of medical data. The incorporation of the Internet of Things (IoT) and its gradual maturation has led to the evolution of IoT-enabled healthcare with extraordinary data processing capability and massive data storage. Due to the advancement in the Industrial Internet of Things (IIoT), the resulting system is aimed at building an intelligent healthcare system that can monitor the medical health of the patient by means of a wearable device that is monitored remotely. The data tha
APA, Harvard, Vancouver, ISO, and other styles
32

Harmash, Oleh, Iryna Hubarieva, Tetiana Harmash, and Nataliia Trushkina. "Relationship between the concepts of “Digital transformation” and “Industry 5.0”: bibliometric analysis." Electronic Scientific Journal Intellectualization of Logistics and Supply Chain Management #1 2020, no. 24 (June 2024): 89–106. http://dx.doi.org/10.46783/smart-scm/2024-24-10.

Full text
Abstract:
At the current stage of transformational transformations, the problems of transformation of the national economy are extremely relevant. And these questions are especially relevant in the conditions of rapid development of the digital economy. According to estimates by Forbes experts, 67% of the leaders of companies from the Global 2000 list chose digital transformation as a priority goal of their corporate strategy in 2018. According to a study by analysts International Data Corporation, the total global spending on digital technologies will grow by 16.8% annually and amounted to 2.1 trillion
APA, Harvard, Vancouver, ISO, and other styles
33

Krishnamurthi, Rajalakshmi, Raghav Maheshwari, and Rishabh Gulati. "Colorizing and Captioning Images Using Deep Learning Models and Deploying Them Via IoT Deployment Tools." International Journal of Information Retrieval Research 10, no. 4 (2020): 35–50. http://dx.doi.org/10.4018/ijirr.2020100103.

Full text
Abstract:
Neural networks and IoT are some top fields of research in computer science nowadays. Inspired by this, this article works on using and creating an efficient neural networks model for colorizing images and transports them to remote systems through IoT deployment tools. This article develops two models, Alpha and Beta, for the colorization of the greyscale images. Efficient models are developed to lessen the loss rate to around 0.005. Further, it also develops an efficient model for the captioning of an image. The paper then describes the use of tools like AWS Greengrass and Docker for the depl
APA, Harvard, Vancouver, ISO, and other styles
34

Lakshmanna, Kuruva, R. Kavitha, B. T. Geetha, Ashok Kumar Nanda, Arun Radhakrishnan, and Rachna Kohar. "Deep Learning-Based Privacy-Preserving Data Transmission Scheme for Clustered IIoT Environment." Computational Intelligence and Neuroscience 2022 (June 8, 2022): 1–11. http://dx.doi.org/10.1155/2022/8927830.

Full text
Abstract:
The Industrial Internet of Things (IIoT) has received significant attention from several leading industries like agriculture, mining, transport, energy, and healthcare. IIoT acts as a vital part of Industry 4.0 that mainly employs machine learning (ML) to investigate the interconnection and massive quantity of the IIoT data. As the data are generally saved at the cloud server, security and privacy of the collected data from numerous distributed and heterogeneous devices remain a challenging issue. This article develops a novel multi-agent system (MAS) with deep learning-based privacy preservin
APA, Harvard, Vancouver, ISO, and other styles
35

M.S., Muhammadu Sathik Raja. "IoT Based Colonoscope." International Journal of Innovative Research in Advanced Engineering 10, no. 07 (2023): 622–26. http://dx.doi.org/10.26562/ijirae.2023.v1007.31.

Full text
Abstract:
Gynecological cancers are among the most common cancers in women and hence are an important public health issue. Due to the lack of cancer awareness programs, variable pathology, and dearth of proper screening facilities in developing countries such as India, most women report at advanced stages, adversely affecting the prognosis and clinical outcomes. Ovarian cancer has emerged as one of the most common malignancies affecting women in India. Cervical cancer remains the second most common cancer in women after breast cancer. The causes of cervical cancer are HPV (Human Papilloma Virus), smokin
APA, Harvard, Vancouver, ISO, and other styles
36

Narang, Poonam, and Pooja Mittal. "Hybrid model for software development: an integral comparison of DevOps automation tools." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 1 (2022): 456. http://dx.doi.org/10.11591/ijeecs.v27.i1.pp456-465.

Full text
Abstract:
DevOps is a fine fusion of development and operations teams together to deliver more efficient, reliable and quality software. DevOps make use of alternative set of automation tools for different development stages of software. The research presented in th is paper analyses selective automation tools to provide comprehensive and comparative tabular analysis followed by graphical comparison according to latest Google Trends. Best performer tools out of these alternative tool sets are grouped together into int egrated tool chain (ITC) in order to escalate DevOps performance in future. A hybrid a
APA, Harvard, Vancouver, ISO, and other styles
37

M., R. Shaikh, B. Zambare D., and M. Lodha G. "A Survey on Web of Things (IoT)." Research and Applications of Web Development and Design 3, no. 3 (2021): 1–6. https://doi.org/10.5281/zenodo.4471386.

Full text
Abstract:
<em>This shouldn&rsquo;t be superb once you&rsquo;re intelligent that regarding the suitability and ease that practical home devices offer. Later these IoT strategies are consistent, it develops calmer to succeed some actions. In fact, IoT home strategies to wader abridge in dropping cost and liveliness, to not conversation time also. These days, there is massive vary of devices powered by IoT. These squeeze controls, fridges, security systems and even dryers and pots. With the passage of it slow, loads of devices are definite to be additional and with smarter choices.</em>
APA, Harvard, Vancouver, ISO, and other styles
38

Gautam, Krishan Kant Singh, and Rajendra Kumar. "Security Awareness Model for Artificial Intelligence and Internet of Things." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 12 (2022): 203–10. http://dx.doi.org/10.17762/ijritcc.v10i12.5936.

Full text
Abstract:
With human engagement replacing artificial intelligence in the provision of services, the position of intelligence systems is rapidly changing. The Internet of Things (IOT) plays a prominent role in these variations as it is a cutting-edge and developing technology that connects physical objects to the virtual world, enabling anytime, everywhere connectivity for anything. A technology known as the Internet of Things (IOT) enables the networked connection and data transfer of physical objects, people, gadgets, cars, and other things. IOT eliminates the need for computer-human contact by speakin
APA, Harvard, Vancouver, ISO, and other styles
39

Vaghani Divyeshkumar. "Block-chain based data provenance and integrity verification." International Journal of Science and Research Archive 12, no. 1 (2024): 2516–33. http://dx.doi.org/10.30574/ijsra.2024.12.1.1076.

Full text
Abstract:
Blockchain applications face major scalability challenges, hindering their ability to support services with large-scale and frequent transactions, such as the computational and communication overhead involved in integrity verification for large-scale IoT data. To tackle the problem, we propose a Blockchain and Bilinear mapping-based Data Integrity Scheme (BB-DIS) tailored for large-scale IoT data in cloud storage. The paper introduces a blockchain-based framework for data integrity verification of large-scale IoT data which includes a series of protocols, verification algorithms, and detailed
APA, Harvard, Vancouver, ISO, and other styles
40

Abhishek, Singh, Gupta Gargi, Khan Hera, and Kumar Maurya Arun. "Study of Future Prospects of the Internet of Things." Advancement and Research in Instrumentation Engineering 6, no. 3 (2023): 1–17. https://doi.org/10.5281/zenodo.8113021.

Full text
Abstract:
<em>As the Internet of Things (rapidly develops as the next stage of the Internet&#39;s growth, it is essential to understand the different possible areas for IoT applications as well as the research difficulties that go along with them. IoT is anticipated to permeate almost every part of everyday life, from smart cities to health care, smart agriculture, logistics, and retail, to even smart living and smart ecosystems. A new paradigm known as the Internet of Things (IoT) has transformed the old way of life into a high-tech one. These changes brought about by IoT include the development of sma
APA, Harvard, Vancouver, ISO, and other styles
41

Pratham, Sharma, Kumar Jha Pratyush, Bhar Anirban, and Biswas Tamasree. "Future Direction of Internet of Things (IoT) and it's Challenges in Application Domain." International Journal of Computer Science and Mobile Applications (IJCSMA) 10, no. 9 (2022): 33–40. https://doi.org/10.5281/zenodo.7088950.

Full text
Abstract:
It is essential to understand the many potential domains for IoT applications and the research difficulties that are related to these applications as the Internet of Things (IoT) increasingly develops as the next stage of the Internet&#39;s evolution. IoT is anticipated to permeate practically every facet of daily life, from smart cities to smart surroundings to smart living and smart environments to smart health care, smart agriculture, logistics, and smart retail. Despite recent significant advancements in IoT enabling technologies, there are still a lot of issues that need to be fixed. Nume
APA, Harvard, Vancouver, ISO, and other styles
42

Shashi Kant Gupta, Abhinandan Singh Dandotiya,. "Analysis and Development of Security Framework for IOT Device." Tuijin Jishu/Journal of Propulsion Technology 44, no. 4 (2023): 995–1008. http://dx.doi.org/10.52783/tjjpt.v44.i4.955.

Full text
Abstract:
Internet of Things (IoT) devices are growing rapidly, making security and privacy crucial. This study analyses and develops an IoT-specific security framework. To address the specific security problems of IoT devices and provide effective techniques and measures to safeguard sensitive data, minimize vulnerabilities, and assure IoT system integrity. The analysis phase identifies and evaluates IoT ecosystem security issues such poor authentication, data encryption, susceptible firmware and software, and lack of standardization. The framework examines these difficulties to understand the security
APA, Harvard, Vancouver, ISO, and other styles
43

Devare, Manoj. "AMALGAMATION OF INDIRECT GAMIFICATION INTO DEVELOPMENT AND OPERATIONS (DEVOPS) COURSE TEACHING." Information Technologies and Learning Tools 87, no. 1 (2022): 124–38. http://dx.doi.org/10.33407/itlt.v87i1.4619.

Full text
Abstract:
The work investigates the effect of indirect Gamification in Development and Operations (DevOps) Course teaching. The software development team consisting of multiple contributors coordinates in the collaborative work environment to achieve specific predefined goals in a regulated and controlled fashion. In DevOps Course, the Installation and configuration of the various software tools are useful in the context of application development. To teach DevOps Tools precisely to achieve the learning outcome is a skilled task for a trainer. From the perspective of the learner, the learning environmen
APA, Harvard, Vancouver, ISO, and other styles
44

Ilieva, Galina, and Tania Yankova. "IoT System Selection as a Fuzzy Multi-Criteria Problem." Sensors 22, no. 11 (2022): 4110. http://dx.doi.org/10.3390/s22114110.

Full text
Abstract:
This research aims to analyse the applications of IoT in agriculture and to compare the most widely used IoT platforms. The problem of determining the most appropriate IoT system depends on many factors, often expressed by incomplete and uncertain estimates. In order to find a feasible decision, this study develops a multi-criteria framework for IoT solution selection in a fuzzy environment. In the proposed framework, a new modification of the Multi-Attribute Border approximation Area Comparison (MABAC) method with a specific distance measure via intuitionistic fuzzy values has been presented
APA, Harvard, Vancouver, ISO, and other styles
45

Bhushan Jadhav. "Revolutionizing Educational IT: A DevOps-Enabled Cloud Framework for Next-Gen Learning." Panamerican Mathematical Journal 35, no. 3s (2025): 193–206. https://doi.org/10.52783/pmj.v35.i3s.3845.

Full text
Abstract:
In the current scenario, the reliance on information and communication technology (ICT) in education has a number of limitations. Historically, the education sector of managing was extremely labor-intensive and manual, thus creating many a problem regarding the use of educational solutions. The institutes are trying to broaden their scope of functioning with limited infrastructure to meet the demands of the future since education is gaining significant importance. Emerging technologies such as DevOps and cloud computing can play a prominent role in lessening such adversities and serve the educ
APA, Harvard, Vancouver, ISO, and other styles
46

Haridas, Reethu, Jayadev Velore, Sourava Chandra Pradhan, et al. "Indoor light-harvesting dye-sensitized solar cells surpassing 30% efficiency without co-sensitizers." Materials Advances 2, no. 23 (2021): 7773–87. http://dx.doi.org/10.1039/d1ma00829c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Haridas, Reethu, Jayadev Velore, Sourava Chandra Pradhan, et al. "Indoor light-harvesting dye-sensitized solar cells surpassing 30% efficiency without co-sensitizers." Materials Advances 2, no. 23 (2021): 7773–87. http://dx.doi.org/10.1039/d1ma00829c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Qasim, Hiba Adnan, and Rana Saad Mohammed. "Lightweight Steganography Technique in The Internet of Things: A survey." Al-Salam Journal for Engineering and Technology 3, no. 1 (2023): 97–108. http://dx.doi.org/10.55145/ajest.2024.03.01.008.

Full text
Abstract:
In the context of the Internet of Things (IoT), lightweight steganography provides a revolutionary combination of technology and security, where data concealment meets the efficiency requirements of IoT devices. Lightweight steganography, as opposed to conventional steganographic methods, focuses on concealing information inside digital content while using the least amount of computer resources and energy. Secure data transfer is essential in the IoT world because linked devices may communicate with one another without interruption. IoT devices may communicate private data discreetly while con
APA, Harvard, Vancouver, ISO, and other styles
49

Asst., Professor Sayema Shaikh, and Jayashree Kumawat Ms. "A study of IoT in Ecommerce and its benefits in different sectors." International Journal of Advance and Applied Research 10, no. 4 (2023): 93–94. https://doi.org/10.5281/zenodo.7791013.

Full text
Abstract:
The existence of clients are continually developing as the Internet of Things (IoT) contraptions become more typical. Essentially, as the quantity of individuals utilizing the web and IoT develops, so does Web based business, which is projected to be the fate of retail, since most of the development happens on the web.The Internet of things (IoT) has for quite some time been a roaring field. It has impacted numerous ventures, from the travel industry to medical services to strategies. What&#39;s more, wherever this impact has been positive: lower costs, better client experience, extra dependab
APA, Harvard, Vancouver, ISO, and other styles
50

Guerrero-Sanchez, Alma E., Edgar A. Rivas-Araiza, Jose Luis Gonzalez-Cordoba, Manuel Toledano-Ayala, and Andras Takacs. "Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network." Sensors 20, no. 10 (2020): 2798. http://dx.doi.org/10.3390/s20102798.

Full text
Abstract:
The Internet of Things (IoT) paradigm allows the connection and exchange of information between millions of smart devices. This paradigm grows and develops exponentially as do the risks and attacks on IoT infrastructures. Security, privacy, reliability, and autonomy are the most important requirements in IoT Systems. If these issues are not guaranteed, the IoT system could be susceptible to malicious users and malicious use. In centralized IoT systems, attacks and risks are greater, especially when data is transmitted between devices and shared with other organizations. To avoid these types of
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!