Explore chapters and articles related to this topic
The Era of High-Performance Networks
Published in James Aweya, Designing Switch/Routers, 2023
The Internet is a global network that is composed of different interconnected networks and in which devices and the various constituent networks use the Internet Protocol suite (i.e., the TCP/IP suite) to communicate between themselves. The large collection of hosts in the Internet communicates with each other using routers as intermediate packet devices.
Self-Repeating Robotic Arm
Published in Kaushik Kumar, Sridhar B. Babu, Industrial Automation and Robotics, 2023
B. Nagamani, N. Subadra, Sathvik Parasa, Hari Sarada, Ashrith Gadeela
The Internet of Things (IoT) is an internetworking of physical devices, automobiles, organizations, and other items that are equipped with computers, software, sensors, actuators, and network connectivity to gather and share data.
Real-World Applications of Data Science
Published in Pallavi Vijay Chavan, Parikshit N Mahalle, Ramchandra Mangrulkar, Idongesit Williams, Data Science, 2022
A search engine is a software system designed to carry out internet searches. It means it provides a systematic way to search for particular information on the World Wide Web. Most used search engines are Google, Yahoo, YouTube, Bing, Ask, America Online, etc. However, to get specific information as per the interest of the user based on certain keywords specified in the search query search engine applies proper filtering. As shown in Figure 3.10, generalized query without proper filtering produces huge results.
Using geospatial social media data for infectious disease studies: a systematic review
Published in International Journal of Digital Earth, 2023
Fengrui Jing, Zhenlong Li, Shan Qiao, Jiajia Zhang, Banky Olatosi, Xiaoming Li
Social media platforms such as Twitter (Li, Erfani, et al. 2021; Li, Huang, et al. 2021), Facebook (Ascani et al. 2021), and Instagram (Puspitasari, Ariful, and Nuqoba 2021) have been recognized as unique and powerful data sources for studying infectious diseases over the last decade due to their accessibility, timeliness, and richness. Social media are internet-based applications that enable communication and resource sharing, where users post and share their opinions, experiences, and emotions, including texts, images, and videos (Kaplan and Haenlein 2010). In some cases, it is referred to as crowdsourced data (Chunara, Smolinski, and Brownstein 2013). Among these various types of social media data, the Geospatial Social Media data (GSM) data (i.e. social media data with geolocation/spatial information) provide rich information about geolocation and mobility in addition to individual behaviors and user characteristics (Sun et al. 2019; Li, Wachowicz, and Fan 2021). Such timely spatial data enable researchers to rapidly obtain a wealth of useful information for a variety of infectious disease studies that inherently include a spatial component, including surveillance (Chang et al. 2021), prediction (Fakhry, Asfoura, and Kassam 2020), response (Chang et al. 2021).
Intellectual structure of cybersecurity research in enterprise information systems
Published in Enterprise Information Systems, 2023
Nitin Singh, Venkataraghavan Krishnaswamy, Justin Zuopeng Zhang
In today’s hyperconnected world, organisational systems are more cohesively interlinked through the internet and mobile networks (Lin, Jia, and Song 2021; Simetinger and Zhang 2020; Xu and Duan 2019). As organisations communicate more, networks have become more open within enterprises’ facilities and their vendors, dealers, and customers (Bhatti and Ahsan 2017; Sohaib 2021). Eventually, enterprises become exposed and increasingly susceptible to information leakages, data thefts, cyber-attacks, and sabotage. For example, an Accenture study in 2018 found a 29% increase in vulnerabilities related to industrial control systems (Ray 2018). The study also reported that costs associated with cybersecurity are accelerating. On average, Enterprises spent nearly $11.7 million on cybersecurity in 2017, 23% higher than in 2016 (Ray 2018). The field of cybersecurity deals with the threats to the security of cyber-physical systems, in other words, systems that are connected to the internet or those which may be accessed through the internet. Lezzi, Lazoi, and Corallo (2018) define cybersecurity as the activities and the ability to protect, defend, preserve information assets, systems, and persons against threats and restoration.
How the technologies underlying cyber-physical systems support the reconfigurability capability in manufacturing: a literature review
Published in International Journal of Production Research, 2023
Alessia Napoleone, Elisa Negri, Marco Macchi, Alessandro Pozzetti
Cloud computing, relying on internet-based big data analytics, is the enabling technology when data need to be collected from socialised and distributed resources and then, exploiting shared big data analytics, analysed to promptly react to disturbances and unexpected events (Ding and Jiang 2018). Cloud computing is the aggregation of computing as a utility and software as a service, where the applications are delivered as services over the Internet. Although cloud computing can support distributed engineering scenarios, intelligence and processing (e.g. decision-making) typically remain central, which means distributed clients depend on consistent and resilient connections with the cloud; therefore, these centralised services are not suited to the control architecture needed for decentralised and autonomous decision-making (O’Donovan et al. 2018). As explained below, acting on different layers, fog and edge computing complement cloud computing and overcome this limitation.