-
Towards A Sustainable and Ethical Supply Chain Management: The Potential of IoT Solutions
Authors:
Hardik Sharma,
Rajat Garg,
Harshini Sewani,
Rasha Kashef
Abstract:
Globalization has introduced many new challenges making Supply chain management (SCM) complex and huge, for which improvement is needed in many industries. The Internet of Things (IoT) has solved many problems by providing security and traceability with a promising solution for supply chain management. SCM is segregated into different processes, each requiring different types of solutions. IoT dev…
▽ More
Globalization has introduced many new challenges making Supply chain management (SCM) complex and huge, for which improvement is needed in many industries. The Internet of Things (IoT) has solved many problems by providing security and traceability with a promising solution for supply chain management. SCM is segregated into different processes, each requiring different types of solutions. IoT devices can solve distributed system problems by creating trustful relationships. Since the whole business industry depends on the trust between different supply chain actors, IoT can provide this trust by making the entire ecosystem much more secure, reliable, and traceable. This paper will discuss how IoT technology has solved problems related to SCM in different areas. Supply chains in different industries, from pharmaceuticals to agriculture supply chain, have different issues and require different solutions. We will discuss problems such as security, tracking, traceability, and warehouse issues. All challenges faced by independent industries regarding the supply chain and how the amalgamation of IoT with other technology will be provided with solutions.
△ Less
Submitted 29 March, 2023;
originally announced March 2023.
-
Bridging the Bubbles: Connecting Academia and Industry in Cybersecurity Research
Authors:
Rasha Kashef,
Monika Freunek,
Jeff Schwartzentruber,
Reza Samavi,
Burcu Bulgurcu,
AJ Khan,
Marcus Santos
Abstract:
There is a perceived disconnect between how ad hoc industry solutions and academic research solutions in cyber security are developed and applied. Is there a difference in philosophy in how solutions to cyber security problems are developed by industry and by academia. What could academia and industry do to bridge this gap and speed up the development and use of effective cybersecurity solutions?…
▽ More
There is a perceived disconnect between how ad hoc industry solutions and academic research solutions in cyber security are developed and applied. Is there a difference in philosophy in how solutions to cyber security problems are developed by industry and by academia. What could academia and industry do to bridge this gap and speed up the development and use of effective cybersecurity solutions? This paper provides an overview of the most critical gaps and solutions identified by an interdisciplinary expert exchange on the topic. The discussion was held in the form of the webinar "Bridging the Bubbles: Connecting Academia and Industry in Cybersecurity Research" in November 2022 as part of the Rogers Cybersecure Catalyst webinar series. Panelists included researchers from academia and industry as well as experts from industry and business development. The key findings and recommendations of this exchange are supported by the relevant scientific literature on the topic within this paper. Different approaches and time frames in development and lifecycle management, challenges in knowledge transfer and communication as well as heterogeneous metrics for success in projects are examples of the evaluated subject areas.
△ Less
Submitted 27 February, 2023;
originally announced February 2023.
-
Exploring the Use of Data-Driven Approaches for Anomaly Detection in the Internet of Things (IoT) Environment
Authors:
Eleonora Achiluzzi,
Menglu Li,
Md Fahd Al Georgy,
Rasha Kashef
Abstract:
The Internet of Things (IoT) is a system that connects physical computing devices, sensors, software, and other technologies. Data can be collected, transferred, and exchanged with other devices over the network without requiring human interactions. One challenge the development of IoT faces is the existence of anomaly data in the network. Therefore, research on anomaly detection in the IoT enviro…
▽ More
The Internet of Things (IoT) is a system that connects physical computing devices, sensors, software, and other technologies. Data can be collected, transferred, and exchanged with other devices over the network without requiring human interactions. One challenge the development of IoT faces is the existence of anomaly data in the network. Therefore, research on anomaly detection in the IoT environment has become popular and necessary in recent years. This survey provides an overview to understand the current progress of the different anomaly detection algorithms and how they can be applied in the context of the Internet of Things. In this survey, we categorize the widely used anomaly detection machine learning and deep learning techniques in IoT into three types: clustering-based, classification-based, and deep learning based. For each category, we introduce some state-of-the-art anomaly detection methods and evaluate the advantages and limitations of each technique.
△ Less
Submitted 31 December, 2022;
originally announced January 2023.
-
Short-term Prediction of Household Electricity Consumption Using Customized LSTM and GRU Models
Authors:
Saad Emshagin,
Wayes Koroni Halim,
Rasha Kashef
Abstract:
With the evolution of power systems as it is becoming more intelligent and interactive system while increasing in flexibility with a larger penetration of renewable energy sources, demand prediction on a short-term resolution will inevitably become more and more crucial in designing and managing the future grid, especially when it comes to an individual household level. Projecting the demand for e…
▽ More
With the evolution of power systems as it is becoming more intelligent and interactive system while increasing in flexibility with a larger penetration of renewable energy sources, demand prediction on a short-term resolution will inevitably become more and more crucial in designing and managing the future grid, especially when it comes to an individual household level. Projecting the demand for electricity for a single energy user, as opposed to the aggregated power consumption of residential load on a wide scale, is difficult because of a considerable number of volatile and uncertain factors. This paper proposes a customized GRU (Gated Recurrent Unit) and Long Short-Term Memory (LSTM) architecture to address this challenging problem. LSTM and GRU are comparatively newer and among the most well-adopted deep learning approaches. The electricity consumption datasets were obtained from individual household smart meters. The comparison shows that the LSTM model performs better for home-level forecasting than alternative prediction techniques-GRU in this case. To compare the NN-based models with contrast to the conventional statistical technique-based model, ARIMA based model was also developed and benchmarked with LSTM and GRU model outcomes in this study to show the performance of the proposed model on the collected time series data.
△ Less
Submitted 16 December, 2022;
originally announced December 2022.
-
Edge, Fog, and Cloud Computing : An Overview on Challenges and Applications
Authors:
Thong Vo,
Pranjal Dave,
Gaurav Bajpai,
Rasha Kashef
Abstract:
With the rapid growth of the Internet of Things (IoT) and a wide range of mobile devices, the conventional cloud computing paradigm faces significant challenges (high latency, bandwidth cost, etc.). Motivated by those constraints and concerns for the future of the IoT, modern architectures are gearing toward distributing the cloud computational resources to remote locations where most end-devices…
▽ More
With the rapid growth of the Internet of Things (IoT) and a wide range of mobile devices, the conventional cloud computing paradigm faces significant challenges (high latency, bandwidth cost, etc.). Motivated by those constraints and concerns for the future of the IoT, modern architectures are gearing toward distributing the cloud computational resources to remote locations where most end-devices are located. Edge and fog computing are considered as the key enablers for applications where centralized cloud-based solutions are not suitable. In this paper, we review the high-level definition of edge, fog, cloud computing, and their configurations in various IoT scenarios. We further discuss their interactions and collaborations in many applications such as cloud offloading, smart cities, health care, and smart agriculture. Though there are still challenges in the development of such distributed systems, early research to tackle those limitations have also surfaced.
△ Less
Submitted 3 November, 2022;
originally announced November 2022.
-
The Impact of IT Projects Complexity on Cost Overruns and Schedule Delays
Authors:
Mahta Taghi Zadeh,
Rasha Kashef
Abstract:
This study aims to assist Company leaders and management team in providing more accurate time and cost estimations for future software projects. This paper focuses on analyzing the relationship between project complexity and cost and time overrun. The sample data of around 50 projects are collected from the Changepoint database. The two research hypotheses were defined and tested using statistical…
▽ More
This study aims to assist Company leaders and management team in providing more accurate time and cost estimations for future software projects. This paper focuses on analyzing the relationship between project complexity and cost and time overrun. The sample data of around 50 projects are collected from the Changepoint database. The two research hypotheses were defined and tested using statistical techniques. The quantitative analysis includes descriptive analysis and regression modelling. Experimental results show a strong positive linear relationship between project complexity and cost and time overrun. Based on the study outcome, there is a need to focus on the planning phase of complex projects and allocate more time and budget to estimate the completion date and the initial budget of this type of project more accurately.
△ Less
Submitted 24 February, 2022;
originally announced March 2022.
-
IoT Analytics and Blockchain
Authors:
Abbas Saleminezhadl,
Manuel Remmele,
Ravikumar Chaudhari,
Rasha Kashef
Abstract:
The Internet of Things (IoT) is revolutionizing human life with the idea of interconnecting everyday used devices (Things) and making them smart. By establishing a communication network between devices, the IoT system aids in automating tasks and making them efficient and powerful. The sensors and the physical world, connected over a network, involve a massive amount of data. The data collection a…
▽ More
The Internet of Things (IoT) is revolutionizing human life with the idea of interconnecting everyday used devices (Things) and making them smart. By establishing a communication network between devices, the IoT system aids in automating tasks and making them efficient and powerful. The sensors and the physical world, connected over a network, involve a massive amount of data. The data collection and sharing possess a critical threat of being stolen and manipulated over the network. These inadequate data security and privacy issues in IoT systems raise concerns about maintaining authentication of IoT data. Blockchain, a tempter-resistant ledger, has emerged as a viable alternative to provide security features. Blockchain technologies with decentralized structures can help resolve IoT structure issues and protect against a single point of failure. While providing robust security features, Blockchain also bears various critical challenges in the IoT environment to adapt. This paper presents a survey on state-of-the-art Blockchain technologies focusing on IoT applications. With Blockchain protocols and data structures, the IoT applications are outlined, along with possible advancements and modifications.
△ Less
Submitted 26 December, 2021;
originally announced December 2021.