Have a personal or library account? Click to login
Lightweight Coordination Patterns for Applications of the Internet of Things Cover

Lightweight Coordination Patterns for Applications of the Internet of Things

Open Access
|Dec 2020

References

  1. [1] S. Kraijak and P. Tuwanut, “A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends,” in 11th International Conference on Wireless Communications, Networking and Mobile Computing, IET, 2015, pp. 1–6. https://doi.org/10.1049/cp.2015.071410.1049/cp.2015.0714
  2. [2] C. Wang, M. Daneshmand, M. Dohler, X. Mao, R. Q. Hu, and H. Wang, “Guest editorial - special issue on internet of things (IoT): architecture, protocols and services,” IEEE Sensors Journal, vol. 13, no. 10, pp. 3505–3510, Oct. 2013. https://doi.org/10.1109/JSEN.2013.227490610.1109/JSEN.2013.2274906
  3. [3] S. K. Lee, M. Bae, and H. Kim, “Future of IoT networks: A Survey,” Applied Sciences, vol. 7, no. 10, article number 1072, Oct. 2017. https://doi.org/10.3390/app710107210.3390/app7101072
  4. [4] S. Madakam, R. Ramaswamy, and S. Tripathi, “Internet of things (IoT): A Literature Review,” Journal of Computer and Communications, vol. 3, no. 5, pp. 164–173, May 2015. https://doi.org/10.4236/jcc.2015.3502110.4236/jcc.2015.35021
  5. [5] S. Wang, J. Wan, D. Li, and C. Zhang, “Implementing smart factory of industrie 4.0: An Outlook,” International Journal of Distributed Sensor Networks, vol. 12, no. 1, Jan. 2016. https://doi.org/10.1155/2016/315980510.1155/2016/3159805
  6. [6] X. Lin, C. Zhou, and J. Song, “IoT-based early-warning system of unsafe behaviors for horizontal-transportation in shield tunnel,” China Safety Science Journal, no. 11, pp. 109–115, 2014.
  7. [7] D. Bilgeri and F. Wortmann, “Barriers to IoT business model innovation,” in 13. Internationale Tagung Wirtschaftsinformatik, Universität St. Gallen, 2017, pp. 987–990.
  8. [8] M. Almulhim and N. Zaman, “Proposing secure and lightweight authentication scheme for IoT based E-health applications,” in 2018 20th International Conference on Advanced Communication Technology, IEEE, 2018, pp. 481–487. https://doi.org/10.23919/ICACT.2018.832380110.23919/ICACT.2018.8323801
  9. [9] K. Ryu, Y. Koizumi, and T. Hasegawa, “Name-based geographical routing/forwarding support for location-based IoT services,” in 2016 IEEE 24th International Conference on Network Protocols, IEEE, 2016, pp. 1–6. https://doi.org/10.1109/ICNP.2016.778532110.1109/ICNP.2016.7785321
  10. [10] U. Durak, “Flight 4.0: The Changing Technology Landscape of Aeronautics,” in Advances in Aeronautical Informatics, (U. Durak, J. Becker, S. Hartmann, N. S. Voros, Eds.), Springer, 2018, pp. 3–13. https://doi.org/10.1007/978-3-319-75058-3_110.1007/978-3-319-75058-3_1
  11. [11] J. H. Kim, “A Review of Cyber-Physical System Research Relevant to The Emerging IT Trends: Industry 4.0, IoT, Big Data, And Cloud Computing,” Journal of Industrial Integration and Management, vol. 2, no. 3, Sep. 2017. https://doi.org/10.1142/S242486221750011710.1142/S2424862217500117
  12. [12] X. Su, H. Zhang, J. Riekki, A. Keränen, J. K. Nurminen, and L. Du, “Connecting IoT Sensors to Knowledge-based Systems by Transforming SenML to RDF,” in 5th International Conference on Ambient Systems, Networks and Technologies and 4th International Conference on Sustainable Energy Information Technology, Elsevier, 2014, pp. 215–222. https://doi.org/10.1016/j.procs.2014.05.41710.1016/j.procs.2014.05.417
  13. [13] J. D. Brock, R. F. Bruce, and M. E. Cameron, “Changing the world with a Raspberry Pi,” Journal of Computing Sciences in Colleges, vol. 29, no.2, pp. 151–153, Dec. 2013.
  14. [14] H. Chaudhari, “Raspberry Pi Technology: A Review,” International Journal of Innovative and Emerging Research in Engineering, vol. 2, no. 3, pp. 83–87, 2015.
  15. [15] B. Furht and F. Villanustre, “Introduction to big data,” in Big Data Technologies and Applications, (B. Furht, F. Villanustre, Eds.). Springer, 2016, pp. 3–11. https://doi.org/10.1007/978-3-319-44550-2_110.1007/978-3-319-44550-2_1
  16. [16] S. Kaisler, F. Armour, and J. A. Espinosa, “Introduction to Big Data: Challenges, Opportunities, and Realities Minitrack,” in 2014 47th Hawaii International Conference on System Sciences, IEEE, 2014, pp. 728–728. https://doi.org/10.1109/HICSS.2014.9710.1109/HICSS.2014.97
  17. [17] M. N. O. Sadiku, Y. Wang, S. Cui, and S. M. Musa, “Industrial Internet of Things,” Journal of Advances in Scientific Research and Engineering, vol. 3, no. 11, Dec. 2017. https://doi.org/10.7324/IJASRE.2017.3253810.7324/IJASRE.2017.32538
  18. [18] H. Boyes, B. Hallaq, J. Cunningham, and T. Watson, “The industrial internet of things (IIoT): An analysis framework,” Computers in Industry, vol. 101, pp. 1–12, Oct. 2018. https://doi.org/10.1016/j.compind.2018.04.01510.1016/j.compind.2018.04.015
  19. [19] E. Gamma, R. Helm, R. Johnson, and J. Vlissides, Design Patterns: Elements of Reusable Object-Oriented Software, 1st edition. Addison-Wesley Professional, 1995.
  20. [20] B. C. D. S. Oliveira, M. Wang, and J. Gibbons, “The visitor pattern as a reusable, generic, type-safe component,” in 23rd ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages and Applications, 2008, pp. 439–456. https://doi.org/10.1145/1449764.144979910.1145/1449764.1449799
  21. [21] J. Vaughn, “Hands-on computing with Arduino,” Journal of Computing Sciences in Colleges, vol. 27, no. 6, pp. 105–106, Jun. 2012.
  22. [22] A. Ghosh, R. Ratasuk, B. Mondal, N. Mangalvedhe, and T. Thomas, “LTE-advanced: next-generation wireless broadband technology,” IEEE Wireless Communications, vol. 17, no. 3, pp. 10–22, Jun. 2010. https://doi.org/10.1109/MWC.2010.549097410.1109/MWC.2010.5490974
  23. [23] W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge computing: vision and challenges,” IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637–646, Oct. 2016. https://doi.org/10.1109/JIOT.2016.257919810.1109/JIOT.2016.2579198
  24. [24] L. M. Vaquero and L. Rodero-Merino, “Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing,” ACM SIGCOMM Computer Communication Review, vol. 44, no. 5, pp. 27–32, Oct. 2014. https://doi.org/10.1145/2677046.267705210.1145/2677046.2677052
  25. [25] S. Buzzi, I. Chih-Lin, T. E. Klein, H. V. Poor, C. Yang, and A. Zappone, “A survey of energy-efficient techniques for 5G networks and challenges ahead,” IEEE Journal on Selected Areas in Communications, vol. 34, no. 4, pp. 697–709, Apr. 2016. https://doi.org/10.1109/JSAC.2016.255033810.1109/JSAC.2016.2550338
  26. [26] X. Ge, H. Cheng, M. Guizani, and T. Han, “5G wireless backhaul networks: challenges and research advances,” IEEE Network, vol. 28, no. 6, pp. 6–11, Nov. 2014. https://doi.org/10.1109/MNET.2014.696379810.1109/MNET.2014.6963798
  27. [27] W. A. Mufti, “ClientNet cluster an alternative of transferring big data files by use of mobile code,” in Xia Y., Zhang LJ. (eds) Services - SERVICES 2019. Lecture Notes in Computer Science, vol. 11517. Springer, Cham, 2019. https://doi.org/10.1007/978-3-030-23381-5_810.1007/978-3-030-23381-5_8
  28. [28] F.-J. Ferrández-Pastor, H. Mora, A. Jimeno-Morenilla, and B. Volckaert, “Deployment of IoT Edge and Fog Computing Technologies to Develop Smart Building Services,” Sustainability, vol. 10, no. 11, article number 3832, Oct. 2018. https://doi.org/10.3390/su1011383210.3390/su10113832
  29. [29] M. Habib ur Rehman, P. P. Jayaraman, S. U. R. Malik, A. U. R. Khan, and M. Medhat Gaber, “RedEdge: A Novel Architecture for Big Data Processing in Mobile Edge Computing Environments,” Journal of Sensor and Actuator Networks, vol. 6, no. 3, article number 17, Sep. 2017. https://doi.org/10.3390/jsan603001710.3390/jsan6030017
  30. [30] D. Soni and A. Makwana, “A survey on MQTT: a protocol of internet of things (IOT),” in International Conference on Telecommunication, Power Analysis and Computing Techniques, 2017.
  31. [31] S. Monk, Programming the Raspberry Pi: Getting Started with Python. McGraw-Hill, 2013.
  32. [32] H. Boyes, B. Hallaq, J. Cunningham, and T. Watson, “The industrial internet of things (IIoT): An analysis framework,” Computers in Industry, vol. 101, pp. 1–12, Oct. 2018. https://doi.org/10.1016/j.compind.2018.04.01510.1016/j.compind.2018.04.015
  33. [33] E. Pitt and K. McNiff. Java.rmi: The Remote Method Invocation Guide. Addison-Wesley, 2001.
DOI: https://doi.org/10.2478/acss-2020-0013 | Journal eISSN: 2255-8691 | Journal ISSN: 2255-8683
Language: English
Page range: 117 - 123
Published on: Dec 28, 2020
Published by: Riga Technical University
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2020 Waseem Akhtar Mufti, published by Riga Technical University
This work is licensed under the Creative Commons Attribution 4.0 License.