Article

IoT-Inspired Framework for Athlete Performance Assessment in Smart Sport Industry

Authors:
To read the full-text of this research, you can request a copy directly from the author.

Abstract

Smart Sports industry presents a novel vision with immense potential for effective decision-making services. Conspicuously, this research presents an IoT-Fog computing inspired game-theoretic decision-making model for provisioning in-depth analysis of athlete performance in a time-sensitive manner. Specifically, sport-oriented parameters are acquired using smart devices using an energy-efficient mechanism, which is further classified and analyzed in terms of quantifiable parameters of Probability of Performability (PoP) and Form Index Value (FIV). Finally, a game-theoretic mathematical model has been proposed between the sports athlete and monitoring officials for effective decision-making services. For validation purposes, the simulation was performed over a challenging dataset of 4 cricket players comprising of 80,120 data instances. Comparative analysis was performed with numerous state-of-the-art analytical techniques. Based on the simulation results, the presented model was able to register enhanced performance in terms of sensitivity (93.14%), specificity (93.97%), precision (94.56%), and f-Measure (91.69%). Moreover, improved battery efficiency (25%) and stability (92.79%) were registered for the proposed technique.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

... (IoT). Using big data analysis, Bhatia presented an Internet of Things-Fog computing inspired game-theoretic decision-making model for provisioning in-depth analysis of athlete performance in a time-sensitive manner in sport industry [8]. The combination system he proposed is very effective for urban management, but it has little effect for this article. ...
Preprint
Full-text available
The Internet of Things(IoT) is one of the products of rapid development in the 5G era, and the cloud computing processing capabilities of edge computing are also very powerful. How to apply the IoT and edge computing to the forecast of sports industry trends is a problem. Therefore, this article studies the prediction of the development trend of sports industry from the perspective of the IoT and edge models. This paper proposes a multi-user QoE fairness bandwidth allocation modeling and model training service deployment algorithm to build a sports industry development prediction model based on the IoT and edge computing. And this paper designs an algorithm simulation experiment, and the experimental results show that its success rate is as high as 99%. So this article is based on the 2011-2017 Chinese sports industry trends to make predictions and comparisons, and the comparison results show that the similarity rate is as high as 90%.
... Following an experimental comparison study, students' cooperative awareness and their curiosity, initiative, and excitement for learning were examined. These studies have served as some starting points for the investigation in this study, but since there were no samples used in the earlier experiments, it is difficult to duplicate and use the results [12]. ...
Article
Full-text available
One of the most popular sports in Asia is badminton. Asia has the most talented players in badminton. The players in the conventional badminton teaching are totally reliant on the coach and the fitness instructor. But in today’s technologically advanced world, the educational system has caught up with technology in intelligence. By using the smart technology, the gamers may train on their own. These technologies range from mobile scheduling apps to fitness apps. In this study, a unique intelligent K-Nearest Neighbor algorithm is used, and the outcomes are assessed. Additionally, all conversation is recorded and made available in the database using the Deep K-Nearest Neighbor (DKNN) method. This DKNN model will perform the analysis of neighbor points about the badminton sports activities for training the players with the utilization of Internet of Things (IoT). Results indicate that the suggested DKNN algorithm performed 89% accurately, which is 6.5 percent better than the current sport motion segmentation technique. People may be able to accomplish enough while introducing this method as a real-time application to prepare for subsequent sports and its computing techniques.
... Above all else, the competitiveness of the characteristic business is a significant element influencing the center competitiveness of the sports characteristic town, and the modern coordination and foundation design are likewise one of the variables influencing the improvement of the town [3]. The construction of the sports characteristic town ought to be founded on the important arrangements of the public authority; on this premise, the undertaking construction can be done [13,14]. The general format of the town will influence the future advancement of the town [4]. ...
Article
Full-text available
As the development of sports industry, new business type is also a breakthrough in the development of new urbanization, and it will become a new economic point to promote economic development in the future. In this paper, the “Jewel” model is utilized to dissect the records that influence the center competitiveness of humble communities with sports characteristics, and the loads of the files are examined, and the principal component analysis (PAC) is utilized to build the evaluation model of the center competitiveness of unassuming communities. Finally, a “factor model” is constructed for evaluation. Through the quantitative analysis of the influencing factors, the index system is formed, which is composed of 6 first-level indicators, 23 second-level indicators, and 45 third-level indicators, including environmental resources, characteristic industry competitiveness, infrastructure competitiveness, overall layout, government support, and funding sources. Furthermore, this carries on the weight examination to the list, as per the investigation result advances the idea for the future improvement of the games trademark town, and gives the premise to the improvement of the games trademark town.
... Recent trends in smart wearable technologies based on the Internet of ings (IoT) have opened up a large number of applications [1], which involve the recognition of sports activities [2][3][4]. Soccer, also known as football in some countries, is one of the most popular sports in the world with numerous professionals and an even larger number of nonprofessional practitioners. ...
Article
Full-text available
Motion tracking in different fields (medical, military, film, etc.) based on microelectromechanical systems (MEMS) sensing technology has been attracted by world's leading researchers and engineers in recent years; however, there is still a lack of research covering the sports field. In this study, we propose a new AIoT (AI + IoT) paradigm for next-generation foot-driven sports (soccer, football, takraw, etc.) training and talent selection. The system built is cost-effective and easy-to-use and requires much fewer computational resources than traditional video-based analysis on monitoring motions of players during training. The system built includes a customized wireless wearable sensing device (WWSDs), a mobile application, and a data processing interface-based cloud with an ankle attitude angle analysis model. Eleven right-foot male participators wore the WWSD on their ankle while each performed 20 instances of different actions in a formal soccer field. The experimental outcome demonstrates the proposed motion tracking system based on AIoT and MEMS sensing technologies capable of recognizing different motions and assessing the players’ skills. The talent selection function can partition the elite and amateur players at an accuracy of 93%. This intelligent system can be an emerging technology based on wearable sensors and attain the experience-driven to data-driven transition in the field of sports training and talent selection and can be easily extended to analyze other foot-related sports motions (e.g., taekwondo, tumble, and gymnastics) and skill levels.
... Based on the experimental simulation in the real-world, scenario, authors were able to register enhanced results in comparison to the state-of-the-art decision-modeling technique. Bhatia (2020b) proposed an IoT-Fog computing inspired framework for athlete performance assessment in the smart sports industry. Specifically, the author quantified the performance parameters in terms of Form Index Value (FIV) for the estimation of real-time analytical results. ...
Article
Full-text available
Innovations in the Internet of Things (IoT) technology have revolutionized several industrial domains for smart decision-modeling. The capacity to perceive data about ubiquitous instances has resulted in numerous innovations in sensitive sectors like national security, and police departments. In this paper, an extensive IoT-based framework is introduced for assessing the integrity of police personnel based on his/her performance. The work introduced in this research is centered around analyzing several activities of police personnel to assess his/her integral behavior. In particular, the Probabilistic Measure of Integrity (PMI) is formalized based on professional data analysis for classification based on Bayesian Model. Moreover, the 2-player game model has been presented to assess the performance of police personnel for efficient decision-making. For validation purposes, the presented framework is deployed over challenging datasets acquired from the online repository of UCI. Based on the comparative analysis with the state-of-the-art decision-making models, the presented approach has registered enhanced performance in terms of Temporal Delay, Classification, Prediction, Reliability, and Stability.
Article
Full-text available
We participated in Taiwan's National Intercollegiate Athletic Games (NIAG) in early May 2021, and formed a Sport Technology Team of more than 30 scholars, students, and engineers to provide novel systems and solutions that make the athletic games rich in sport technologies. Some of the features could be the first time shown to the Internet audience for large-scale athletic games. The technologies involved include table tennis ball trajectory and bounce distribution, badminton shuttlecock tracking and trajectory, augmented-reality enriched video streaming on social networks, real-time three-dimensional broadcasting with free view-angle, in-stadium video stream pushing by a private fifth-generation (5G) network with multiaccess edge computing, AI-based sport data analytics during live streaming, etc. All the technologies and applications are integrated in a novel technology-enhanced broadcasting system (TEBS) that is dedicated to sport events. This article introduces the respective technologies that we have developed, deployed, and demonstrated in the 2021 NIAG. We stress the layered architecture design and integration of the TEBS, as well as experimental results from real games in the smart stadium and swimming pool. We also discuss the technical challenges and our approaches to tackle them, as well as lessons learned.
Article
In recent years use of IoT, smart devices and sensors has been increased to great extents which results in generation of large amount of heterogeneous data. This data need to be processed time effectively. The Cloud computing due to its centralized location and large distance from IoT and edge devices facing issues like congested network, high latency in service delivery, poor Quality of Service (QoS), increased load etc. and the situation becomes complicated while handling real time or latency sensitive applications. Fog computing is emerging paradigm to handle theses issues by extending cloud computing services like computing, storage and networking at the edge of network that is near IoT devices/data generator. This paper will overview and summarize various fog computing architectures,open research challenges.
Article
This article has been withdrawn at the request of the author(s) and/or editor. The Publisher apologizes for any inconvenience this may cause. The full Elsevier Policy on Article Withdrawal can be found at http://www.elsevier.com/locate/withdrawalpolicy. Subsequent to acceptance of this special issue paper by the responsible Guest Editor Hameem Shanavas, the integrity and rigor of the peer-review process was investigated and confirmed to fall beneath the high standards expected by Microprocessors & Microsystems. There are also indications that much of the Special Issue includes unoriginal and heavily paraphrased content. Due to a configuration error in the editorial system, unfortunately the Editor in Chief did not receive these papers for approval as per the journal’s standard workflow.
Article
Full-text available
The number of cyber-attacks and data breaches has immensely increased across different enterprises, companies, and industries as a result of the exploitation of the weaknesses in securing Internet of Things (IoT) devices. The increasing number of various devices connected to IoT and their different protocols has led to growing volume of zero-day attacks. Deep learning (DL) has demonstrated its superiority in big data fields and cyber-security. Recently, DL has been used in cyber-attacks detection because of its capability of extracting and learning deep features of known attacks and detecting unknown attacks without the need for manual feature engineering. However, DL cannot be implemented on IoT devices with limited resources because it requires extensive computation, strong power and storage capabilities. This paper presents a comprehensive attack detection framework of a distributed, robust, and high detection rate to detect several IoT cyber-attacks using DL. The proposed framework implements an attack detector on fog nodes because of its distributed nature, high computational capacity and proximity to edge devices. Six DL models are compared to identify the DL model with the best performance. All DL models are evaluated using five different datasets, each of which involves various attacks. Experiments show that the long shortterm memory model outperforms the five other DL models. The proposed framework is effective in terms of response time and detection accuracy and can detect several types of cyber-attacks with 99.97% detection rate and 99.96% detection accuracy in binary classification and 99.65% detection accuracy in multi-class classification.
Chapter
Full-text available
With the development of wearable technology and inertial sensor technology, the application of wearable sensors in the field of sports is becoming more extensive. The notion of Body Sensor Network (BSN) brings unique human-computer interaction mode and gives users a brand new experience. In terms of smart sports, BSN can be applied to table tennis training by detecting individual stroke motion and recognizing different technical movements, which provide a training evaluation for the players to improve their sport skills. A portable six-degree-of-freedom inertial sensor system was adopted to collect data in this research. After data pre-processing, triaxial angular velocity and triaxial acceleration data were used for table tennis stroke motion recognition. The classification and recognition of stroke action were achieved based on Support Vector Machine (SVM) algorithm after Principal Component Analysis (PCA) dimension reduction, and the recognition rate of five typical strokes can reach up to using the trained classification model. It can be assumed that BSN has practical significance and broad application prospects.
Article
Full-text available
Drones or Unmanned Aerial Vehicles (UAVs) can be highly efficient in various applications like hidden area exploration, delivery, or surveillance and can enhance the quality of experience (QoE) for end-users. However, the number of drone-based applications are not very high due to the constrained flight time. The weights of the drones need to be kept less, and intuitively they cannot be loaded with big batteries. Frequent recharging and battery replacement processes limit the appropriate use of drones in most applications. A peer-to-peer distributed network of drones and charging stations is a highly promising solution to empower drones to be used in multiple applications by increasing their flight time. The charging stations are limited, and therefore, an adequate, fair, and cost-optimal scheduling algorithm is required to serve the most needed drone first. The proposed model allows the drones to enter into the network and request for a charging time slot from the station. The stations are also the part of the same network, this work proposes a scheduling algorithm for drones who compete for charging slots with constraints of optimizing criticality and task deadline. A game-theoretic approach is used to model the energy trading between the drones and charging station in a cost-optimal manner. Numerical results based on simulations show that the proposed model provides a better price for the drones to get charged and better revenue for the charging stations simultaneously.
Article
Full-text available
In recent years, the Internet of Things (IoT) has gained global popularity. IoT can connect several objects and create a dynamic environment; thus, an IoT system must adapt to environmental changes. To adapt to a dynamic environment, an effective decision-making method is required for an IoT system. Game theory is a mathematical method for decision-making among decision makers, and it may be applied to decision-making for an IoT system. In addition, the concept of self-adaptive software may be applied to IoT because such software evaluates and changes its behavior to satisfy its intended use, and the IoT system then makes decisions and adapts to its dynamic environment. In this study, a decision-making method is proposed along with game theoretic decision-making and self-adaptive loop mechanisms for IoT. The proposed method is based on MAPE-K loops, which are general processes used in self-adaptive software with shared knowledge. In addition, Nash equilibrium is applied to extract candidate strategies, which are evaluated for selecting the most optimal solution. The proposed method was implemented as a prototype, and experiments were conducted to evaluate its runtime performance. The results show that the proposed method can be applied to an IoT environment at runtime.
Article
Full-text available
In the analysis of the project documentation of a two-storeyed sports complex it was established that despite compliance of the project to all standards in the fire safety field, under certain conditions there is a danger of a delay of full people evacuation from the gym room in case of fire that can entail people’s death. For the purpose of ensuring fire safety several versions of space-planning decisions were considered. The scientific literature analysis showed efficiency of game theory use in the field of fire safety, however in the field of fire safety in construction it was not applied yet. Game theory Application (games with the nature in the conditions of uncertainty) for the revealed problem solution was proved. Three possible scenarios of emergence and development of the fire and four alternative space-planning decisions were considered. For all development scenarios of the fire time of critical values achievement of dangerous fire factors was defined. All necessary evacuation schemes are made and calculations are executed. On the calculated parameters basis the payoff matrix was constructed. An optimal variant of space-planning decisions was chosen. Research results showed expediency and efficiency of game theory application in the field of fire safety in construction.
Article
Full-text available
We propose a novel integrated fog cloud IoT (IFCIoT) architectural paradigm that promises increased performance, energy efficiency, reduced latency, quicker response time, scalability, and better localized accuracy for future IoT applications. The fog nodes (e.g., edge servers, smart routers, base stations) receive computation offloading requests and sensed data from various IoT devices. To enhance performance, energy efficiency, and real-time responsiveness of applications, we propose a reconfigurable and layered fog node (edge server) architecture that analyzes the applications' characteristics and reconfigure the architectural resources to better meet the peak workload demands. The layers of the proposed fog node architecture include application layer, analytics layer, virtualization layer, reconfiguration layer, and hardware layer. The layered architecture facilitates abstraction and implementation for fog computing paradigm that is distributed in nature and where multiple vendors (e.g., applications, services, data and content providers) are involved. We also elaborate the potential applications of IFCIoT architecture, such as smart cities, intelligent transportation systems, localized weather maps and environmental monitoring, and real-time agricultural data analytics and control.
Article
Full-text available
The following work presents an overview of smart sensors and sensor fusion targeted at biomedical applications and sports areas. In this work, the integration of these areas is demonstrated, promoting a reflection about techniques and applications to collect, quantify and qualify some physical variables associated with the human body. These techniques are presented in various biomedical and sports applications, which cover areas related to diagnostics, rehabilitation, physical monitoring, and the development of performance in athletes, among others. Although some applications are described in only one of two fields of study (biomedicine and sports), it is very likely that the same application fits in both, with small peculiarities or adaptations. To illustrate the contemporaneity of applications, an analysis of specialized papers published in the last six years has been made. In this context, the main characteristic of this review is to present the largest quantity of relevant examples of sensor fusion and smart sensors focusing on their utilization and proposals, without deeply addressing one specific system or technique, to the detriment of the others.
Article
Full-text available
The rapid introduction of Internet of Things (IoT) Technology has boosted the service deliverance aspects of health sector in terms of m-health, and remote patient monitoring. IoT Technology is not only capable of sensing the acute details of sensitive events from wider perspectives, but it also provides a means to deliver services in time sensitive and efficient manner. Henceforth, IoT Technology has been efficiently adopted in different fields of the healthcare domain. In this paper, a framework for IoT based patient monitoring in Intensive Care Unit (ICU) is presented to enhance the deliverance of curative services. Though ICUs remained a center of attraction for high quality care among researchers, still number of studies have depicted the vulnerability to a patient’s life during ICU stay. The work presented in this study addresses such concerns in terms of efficient monitoring of various events (and anomalies) with temporal associations, followed by time sensitive alert generation procedure. In order to validate the system, it was deployed in 3 ICU room facilities for 30 days in which nearly 81 patients were monitored during their ICU stay. The results obtained after implementation depicts that IoT equipped ICUs are more efficient in monitoring sensitive events as compared to manual monitoring and traditional Tele-ICU monitoring. Moreover, the adopted methodology for alert generation with information presentation further enhances the utility of the system.
Article
Full-text available
Being aware of mutual influences between individuals is a major requirement a robot to efficiently operate in human populated environments. This is especially true for the navigation among humans with its mutual avoidance maneuvers. While humans easily manage this task, robotic systems are still facing problems. Most of the recent approaches concentrate on predicting the motions of humans individually and deciding afterwards. Thereby, interactivity is mostly neglected. In this work, we go one step back and focus on understanding the underlying principle of human decision making in the presence of multiple humans. Non-cooperative game theory is applied to formulate the problem of predicting the decisions of multiple humans that interact which each other during navigation. Therefore, we use the theory of Nash equilibria in static and dynamic games where different cost functions from literature rate the payoffs of the individual humans. The approach anticipates collisions and additionally reasons about several avoidance maneuvers of all humans. For the evaluation of the game theoretic approach we recorded trajectories of humans passing each other. The evaluation shows that game theory is able to reproduce the decision process of humans more accurately than a decision model that predicts humans individually.
Article
Conducting reputation management is very important for Internet of vehicles. However, most of the existing work evaluate the effectiveness of their schemes with settled attacking behaviors in their simulation, which cannot represent the real scenarios. In this paper, we propose to consider dynamical and diversity attacking strategies in the simulation of reputation management scheme evaluation. To that end, we apply evolutionary game theory to model the evolution process of malicious users' attacking strategies, and discuss the methodology of the evaluation simulations. We further apply our evaluation method to a reputation management scheme with multiple utility functions, and discuss the evaluation results. The results indicate that our evaluation method is able to depict the evolving process of the dynamic attacking strategies in a vehicular network, and the final state of the simulation could be used to quantify the protection effectiveness of the reputation management scheme.
Article
We consider an asymmetric lottery Blotto game with two agents and n items, where both agents wish to maximize their probability of winning a majority value of all n items. Duffy and Matros [2] showed that if there exists a Nash equilibrium, then the equilibrium is unique, and it is found in an explicit expression. They also provided sufficient conditions for the existence of a Nash equilibrium in the cases of n=3 and n=4. In this paper, we prove that the lottery Blotto game always has a unique Nash equilibrium for any value of n.
Chapter
In recent decades, research concern in vehicle routing has progressively more concentrated on dynamic and stochastic approaches in solving sophisticated dynamic vehicle routing problems (DVRP) due to its importance in helping potential customers to better manage their applications and to provide e-freight and e-commerce systems similarly. Many techniques were introduced in the DVRP field to solve part of its challenges since it’s hard to achieve equilibrium between finding feasible set of tours, minimum total travel time, shortest routing path and the capability of redirect a stirring vehicle to a new demand for additional savings; due to the fact that each one can be achieved at the expense of the other and combining them does not give an ideal result which requires a solution to track the optimum route during changes. In this paper, the game theory (GT) is integrated with Ant Colony Optimization algorithms (ACO) to adjust the attractiveness of arc and the pheromone level as it considers them competing players that prefer one according to the expected payoff. In addition, GT can be adapted inside the algorithm to facilitate the optimization, as it is considered a powerful technique in decision making and to find optimal solutions to conditions of conflict and cooperation. Experimental results show that the integration of GT with ACO algorithm improves the system performance in tackling DVRPs.
Article
Remote heart rate measurement has many powerful applications, such as measuring stress in the workplace, and the analysis of the impact of cognitive tasks on breathing and heart rate variability (HRV). Although many methods are available to measure heart rate remotely from face videos, most of them only work well on stationary subjects under well-controlled conditions, and their performance significantly degrades under subject's motions and illumination variation. We propose a novel algorithm to estimate heart rate. Also, it can differentiate between a photo of a human face and an actual human face meaning that it can detect false signals and skip them. The method obtains ROIs using facial landmarks, then it rectifies illumination based on Normalized Least Mean Square (NLMS) adaptive filter and eliminates non-rigid motions based on standard deviation of fixed length of the signal's segments. The method employs the RADICAL technique to extract independent subcomponents. The heart rate measures for each subcomponent, are estimated by analysis of frequency signal to find the one with the highest magnitude. A two-steps data fusion method is also introduced to combine current and previous measured heart rates to calculate a more accurate result. In this paper, we explore the potential of our algorithm on two self-collected, and DEAP databases. The results of three experiments demonstrate that our algorithm substantially outperforms all previous methods. Moreover, we investigate the behavior of our algorithm under challenging conditions including the subject's motions and illumination variation, which shows that our algorithm can reduce the influences of illumination interference and rigid motions significantly. Also, it indicates that our algorithm can be used for the online environment. Finally, the application of our algorithm in search and rescue scenarios using drones is considered and an experiment is conducted to investigate the algorithm's potential to be embedded in drones.
Article
Security-related risks of oil and gas pipelines are assessed in this paper using the technique of game theory in combination with a security risk assessment approach. A Socio-political index is defined and embedded in an innovative and comprehensive assessment method, considering the effects of social, economic and political elements on pipeline attractiveness and vulnerability. After having analysed the security threats, security measures, aimed at increasing the security level of a pipeline system, are assessed by using a game-theory model. The pipeline segments which are the most probable to be attacked are determined. In addition, having assessed the possible outcomes of attacks to each segment, the security of different segments of specific pipeline routes can be further improved. Our approach can efficiently allocate limited security resources to decrease the security risk along a pipeline route. It should be noted that although this study focuses on oil and gas pipelines, the proposed methodology could be easily adapted to other pipeline systems.
Article
With the rise of the Internet of Things, malicious attacks pose serious threats to the massive vulnerable IoT devices. Recently, attackers have initiated increasingly coordinated attack activities commonly pertaining to botnets. However, how to effectively detect the botnet based on attacker activities is proven challenging. In this paper, we propose a Machine Learning-based method for modeling attacker activities based on the following intuitive observations: attackers in the same botnet tend to launch temporally close attacks. We then directly model attack temporal patterns using a special class of point process called Multivariate Hawkes Process. Intuitively, Multivariate Hawkes Process identifies the latent influences between attackers by utilizing the mutually exciting properties. We then cluster the attacker activities based on the inferred weighted influence matrix with resort to the graph-based clustering approach. To evaluate the applicability of our method, we deployed 10 honeypots in a real-world environment, and conduct experiments on the collected dataset. The results show that we can identify the activity pattern and the structure of botnets effectively.
Article
In this work, we present a technique as well as a dataset for improving daily life assistive activities in a smart Internet of Things (IoT) driven environment. We propose that augmenting data from multiple sensing devices such as Microsoft Kinect and Smartwatches can significantly improve the detection performance once incorporated in the context of an IoT framework. Kinect, being the feature-wise richest input device in the IoT world, is a favorite pick of most of the researchers for detecting postural activities. However, there are certain activity classes in IoT based smart environments on which Kinect based solutions result in high misclassifications. This is due to the similarities in 3D joint position space. For such scenarios, Kinect must be augmented with additional sensor(s) to achieve the desired level of accuracy. In this work, we improve the detection of the assistive activities related to sitting posture in general and dining-related activities in particular. Our research focus is to enable a robot to understand the activities of a human at the dining table and plan the assistive tasks accordingly. This is a two-step process; in the first step, Kinect sensor data is augmented with a collection of motion sensors’ data. Then, this data is analyzed for discrimination power through cross-validation of the Hidden Markov Model (HMM). In addition, we propose a two-level security scheme consisting of key establishment and two-factor authentication for the IoT based activity recognition environment. Our experiments show that Kinect, when complemented by motion sensors’ data, reduces the confusion instances by up to 12% on average. Moreover, we demonstrate the data quality through clustering properties of the data using an unsupervised neural network.
Article
Buildings are responsible for almost half of all the energy consumption and greenhouse gas (GHG) emissions in the world. This situation highlights the importance of the green retrofit for existing buildings in reducing the energy consumption and GHG emissions, as emphasized by the academia and improved by the government. Although relevant stakeholders are interested in implementing green retrofit projects, this approach has not been widely pursued by the industry, the reasons of which remain unclear. Therefore, this study aims to reveal the underlying logic by analyzing the behaviors of the building owners and occupiers, who are the direct decision makers in initiating green retrofit at the initial intention phase. Three occupancy scenarios, namely, owner-occupied (baseline scenario), single-occupied, and multi-occupied buildings, are used for the game analysis. The Nash Equilibrium of the game is used to analyze the probable decisions of the owners and occupiers under the last two occupancy scenarios. Results demonstrate that both owners and occupiers are reluctant to retrofit under both scenarios. Nevertheless, the reasons vary under the two scenarios despite the same results obtained. This study clarifies the reasons for the reluctance of the direct decision makers to participate in green retrofit projects. The main reasons include the split incentives between the owners and occupiers, the complex coordination, and the uncertainty of green retrofit. The identified reasons are also beneficial to the policy makers, particularly in their effort to promote green retrofit by considering the requirements of owners and occupiers under the different occupancy types.
Article
Ubiquitous sensing enabled by Wireless Sensor Network (WSN) technologies cuts across many areas of modern day living. This offers the ability to measure, infer and understand environmental indicators, from delicate ecologies and natural resources to urban environments. The proliferation of these devices in a communicating-actuating network creates the Internet of Things (IoT), wherein, sensors and actuators blend seamlessly with the environment around us, and the information is shared across platforms in order to develop a common operating picture (COP). Fuelled by the recent adaptation of a variety of enabling device technologies such as RFID tags and readers, near field communication (NFC) devices and embedded sensor and actuator nodes, the IoT has stepped out of its infancy and is the the next revolutionary technology in transforming the Internet into a fully integrated Future Internet. As we move from www (static pages web) to web2 (social networking web) to web3 (ubiquitous computing web), the need for data-on-demand using sophisticated intuitive queries increases significantly. This paper presents a cloud centric vision for worldwide implementation of Internet of Things. The key enabling technologies and application domains that are likely to drive IoT research in the near future are discussed. A cloud implementation using Aneka, which is based on interaction of private and public clouds is presented. We conclude our IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.
Internet of Things for sports (IoTSport): An architectural framework for sports and recreational activity
  • P P Ray