فهرست مطالب

Big Data Analysis and Computing Visions
Volume:3 Issue: 2, Jun 2023

  • تاریخ انتشار: 1402/03/11
  • تعداد عناوین: 6
|
  • Haifa Alqahtani * Pages 39-44
    The Internet of Things (IoTs) enables the incorporation and connecting of physical devices to the internet with little human intervention and human-to-human or human-to-PC communication. It discusses the future pattern and the next major upheaval unfolding in the realm of information technology. Individuals and objects are linked to everything and anybody, anytime, wherever, and via the use of organization or administration. It also focuses on how IoT can promote a greener and cleaner environment through Green Internet of Things (G-IoT). This article provides an overview of IoT and G-IoT. It also covers various advancements and problems in G-IoT and how it might reduce energy use. This article clarifies the concept of the IoT, including its features, security concerns, and technology adoption trends.
    Keywords: Environment, IoT, G-IoT, network, Revolution
  • Mingyue Wang * Pages 45-49
    The goal of research in the intriguing area of cloud computing is to discover the most effective solution and method for sharing and protecting data. Load Balancing (LB) on public infrastructure using cloud computing's ideal geographic location. In cloudy environments, LB is widely used as a visitor control approach. Cloud requests look for resources to support performance. The resources are frequently things like bandwidth, processing power, and storage. LB is the process of effectively allocating these resources to each competing job. This study will offer a thorough analysis of cloud load-balancing methods.
    Keywords: scheduling, Load Balancing, cloud computing
  • Aziza Algarni * Pages 50-54
    Cloud computing is an essential tool for sharing resources across virtual machines, and it relies on scheduling and load balancing to ensure that tasks are assigned to the most appropriate resources. Multiple independent tasks need to be handled by cloud computing, and static and dynamic scheduling plays a crucial role in allocating tasks to the right resources. This is especially important in heterogeneous environments, where algorithms can improve load balancing and enhance cloud computing's efficiency. This paper aims to evaluate and discuss algorithms that can improve load balancing in cloud systems.
    Keywords: cloud computing, algorithms, Computer science, software engineering
  • Lu Fan * Pages 55-62
    This paper will explain that the growing global population and increasing energy utilization have underscored the urgent need to conserve energy through every available means. One significant factor contributing to energy waste is the lack of access to and control over applications from remote locations. To mitigate this issue, users can utilize web or Android applications to send instructions to these systems. Communication protocols such as Wi-Fi, GSM, bluetooth, and ZigBee can be leveraged to establish connectivity between the design and user devices. Existing systems feature diverse monitoring devices and structural components to facilitate efficient energy management. Numerous examples of such applications have already been implemented in various settings. By harnessing these technologies, users can remotely control and monitor their energy consumption, reducing energy waste and promoting environmental sustainability. Continued research and development of energy-saving solutions will be critical in mitigating the negative impact of rising energy demand.
    Keywords: ZigBee, population, Android applications, Wi-Fi, Save Energy
  • Zhi Zhou * Pages 63-69
    Wearable technology, wearables, fashion technology, smart wear, skin electronics, or fashion electronics are smart electronic devices. Wearable technology has various applications that grow as the field expands. It appears prominently in consumer electronics with the popularization of the smartwatch and activity tracker. A popular activity tracker called the fit bit is widely used in the fitness industry to track calories and health-related goals. A popular smartwatch in the market is the Apple Watch. Apart from commercial uses, wearable technology is incorporated into navigation systems, advanced textiles, and healthcare. As wearable technology is being proposed for critical applications, it must be vetted for its reliability and security properties. Applications based on Wireless Sensor Networks (WSN) for Internet of Things (IoTs) scenarios are rising. The multiple possibilities they offer have spread towards previously hard-to-imagine fields, like e-health or human physiological monitoring. An application has been developed for its usage in scenarios where data collection is applied to smart spaces, aiming at its usage in firefighting and sports. This application has been tested in a gymnasium with real, non-simulated nodes and devices. A graphic user interface has been implemented to suggest a series of exercises to improve a sportsman/woman s condition, depending on the context and their profile. This system can be adapted to a wide variety of e-health applications with minimum changes, and the user will interact using different devices, like smartphones, smartwatches, and/or tablets.
    Keywords: accelerometer, magnetometers, Heart rate sensors, Energy harvesting, Healthcare, BSNs, Wearable Sensors, Nanotechnology, ZigBee
  • Ibrahim Mekawy * Pages 70-75
    Nowadays, we know that Wireless Sensor Networks (WSNs) are being widely applied in many fields of human life such as civil and military applications. WSNs are broadly applied for various applications in tracking and surveillance due to their ease of use and other distinctive characteristics compelled by real-time cooperation among the Sensor Nodes (SNs). When applying the WSN in the real world we have to face many challenges such as security, and storage due to its centralized server/client models. Although WSNs can bring a lot of benefits and conveniences. This paper discusses an in-depth survey of a blockchain-based approach for malicious node detection, an exhaustive examination of the integration of blockchain techniques with WSNs (BWSN), and insights into this novel concept.
    Keywords: Wireless Sensor Networks, Blockchain technology, malicious node detection, Security issues, Centralized, Distributed