Volume 15, Issue 1, February-March 2024

A Dynamic Ontology Based Conversational Agent for Heterogenous Environmnet

Mishal Tayaba Iftikhar, Muhammad Azam Lashari

Computer Science Department, University of Engineering and Technology, Lahore

Abstract- By identifying concept associations during talks and drawing on prior knowledge, ontology-based chatbots preserve context. Even while these agents are able to adjust to their environment, in hostile circumstances they could still display abnormalities. These discrepancies could lead to poor action planning and ineffective adaptation. Therefore, we present a dynamic ontology-based conversational model that selects the best suited answer based on prior experience and knowledge base in order to better action planning and adaptation in hostile scenarios. Since emotions are important in human existence, our method shows the emotional state for different conversational agents instead of only emojis. For this reason, our research will illustrate a conversational bot that functions in a lifelike manner. We employ the ontology Rela-model for ontology, which consists of three parts (C, R,).

Keywords- Ontology, Conversational Agent, Emotions, Ontology Rela Model, Previous Experience and Learning

Download full paper PDF format (Page: 1-8)

Overview of the IIoT (Industrial Internet of Things): Protocols, Models, Roles, Objectives and Future Trends

Lea Yue, Kung Yi

Department of Computer Science and Information Technology (CS&IT), Korea

Abstract- As a complex cyber-physical system, IoT integrates various devices equipped with sensing, identification, processing, com-munication, and networking capabilities. In particular, sensors and actuators are getting increasingly powerful, less expensive and smaller, which makes their use ubiquitous. Industries have strong interest in deploying IoT devices to develop industrial applications such as automated monitoring, control, management, and maintenance. Due to the rapid advances in technology and industrial infrastructure, IoT is expected to be widely applied to industries. For example, the food industry is integrating WSN and RFID to build automated systems for tracking, monitoring, and tracing food quality along the food supply chain in order to improve food quality. This paper reviews the recent researches on IoT from the industrial perspective. Firstly, we introduce the background and SOA models of IoT and then discuss the fundamental technologies that might be used in IoT. Next, we introduce some key industrial applications of IoT. Afterward, we analyzed the research challenges and future trends associated with IoT. Different from other IoT survey papers, a main contribution of this review paper is that it focuses on industrial IoT applications and highlights the challenges and possible research opportunities for future industrial researchers.

Keywords- IIoT (Industrial Internet of Things), Information and Communication Technology (ICT), Industrial System, Computing, RFID and Protocols

Download full paper PDF format (Page: 9-16)

Analysis of IoT Security, Privacy, Threats and Future Directions

Saad Rehman Babary, Hamza Mashhood Elahi, Hamza Arif, M. Junaid

Department of Computer Science & Engineering, University of Engineering and Technology, Lahore, Pakistan

Abstract- Explores the key aspects of security, privacy, dangers, and future prospects in the Internet of Things (IoT). It investigates the issues and implications for security and privacy in modern IoT networks. Various dangers to IoT systems are investigated, along with their consequences. It also analyses new trends and techniques for improving security. The abstract continues by highlighting future prospects in IoT security, emphasising the continuous growth and adaptability necessary to adequately protect IoT infrastructure.

Keywords- IoT, Smart Home, Layers, Security and Deniel of Service (DoS)

Download full paper PDF format (Page: 17-23)

Privacy and Security Concerns in IoT-based Healthcare Systems

Maham Sana

Department of Computer Science, UET, Lahore

Abstract- The growing adoption of electronic health records (EHRs) and wearable devices in healthcare raises critical concerns about patient data privacy and security. This paper examines the challenges posed not only by EHRs but also by the integration of Interconnected medical equipment like intelligent pacemakers and insulin pumps, exploring the intricacies brought about by the integration of Internet of Things within healthcare ecosystems.It explores existing regulations and their effectiveness in protecting patient data, while emphasizing confidentiality, integrity, and availability of information is paramount, underscoring its crucial importance. The paper delves into potential consequences of data misuse, such as unfair treatment or identity theft, and analyzes the impact of emerging technologies like artificial intelligence, telemedicine, and IoT on data security.By examining various cyber threats, including those associated with IoT devices, and their potential impact, this research focuses on exploring the implications of the Internet of Things in healthcare ecosystems. It summarizes existing research, incorporates relevant case studies, and offers practical recommendations to navigate the ever-changing terrain of healthcare technology while prioritizing patient data security and privacy.

Keywords- Internet of Things (IoT), Electronic Health Records (EHRs), Wearable devices, Blockchain Technology, Data Security, Confidentiality, Integrity, Availability and Cybersecurity

Download full paper PDF format (Page: 24-31)

Peer to Peer Overlay Network in IoT: An Overview

Sofia Munawar

Department of Computer Science, University of Engineering and Technology, Lahore, Pakistan

Abstract- Within the quickly advancing scene of the Internet of Things (IoT), where computing and communications situations need centralized control, Peer-to-Peer (P2P) overlay systems have risen as a promising arrangement. These overlays serve as an establishment for large-scale information sharing, substance dispersion, and application-level multicast functionalities. This paper presents a comprehensive study and comparison of structured and Unstructured P2P overlay systems, categorizing them based on their plan range. The investigation starts with a foundational definition of P2P and a diagram of common operational methods. To pick up bits of knowledge into viable P2P models and conventions, execution measurements are talked about. The paper advance digs into a nitty gritty classification and comparison of current P2P structures, emphasizing question look conventions inside the comparing P2P systems. Furthermore, the consider surveys existing P2P demonstrating yields, laying out common approaches. Novel applications established in P2P strategies are investigated, providing a see into long term of P2P overlay systems. The objective of this paper is to offer a clear and intensive study of P2P systems, following their advancement and advancement, and clearing the way for future investigate headings in this energetic field.

Keywords- Information Sharing, Structured & Unstructured P2P Overlay Systems, Security Issue Challenges in IoT, Investigation, Strategy and Solution Survey

Download full paper PDF format (Page: 32-40)