Distributed System Implementation Based on “Ants Feeding Birds” Algorithm: Electronics Transformation via Animals and Human

Distributed System Implementation Based on “Ants Feeding Birds” Algorithm: Electronics Transformation via Animals and Human

Preeti Mulay, Krishnal Patel, Hecto Gomez Gauchia
Copyright: © 2017 |Pages: 35
DOI: 10.4018/978-1-5225-2154-9.ch005
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Evolving technologies are intricately woven into the fabric of social and institutional systems. With the invent of “Internet of Everything (IoE)” concept it is realistic now to employ animals and or humans to transmit details electronically. IoE concepts with sensor technology can prove wonders in any domain for that matter starting from eFarming, eHealth, eCare and what not. Humans can transform electronics by using various eConnected gadgets also motivated due to or based on “Nature Inspired Algorithms”. The confluence of IT, psychology with non-IT systems will be part of new generation's life. Such collaborative concept can be implemented practically with the help of “Cloud-to-Dew-Computing” based technologies. To include so many concepts together, it is essential to concentrate also on Cyber Security and Risk associated with such conceptual implementation. Dew-Computing at root levels will take care of Cyber Security effectually. Dew-Computing being backend support of Distributed System, can process multiple entities resourcefully. “Animal Data Interchange Standards” are very well considered innovative business opportunity these days and for years to come. These standards have started their work focusing on the Dairy related animal standard. Every dairy animal should enjoy life to remain healthy and more productive. Incremental Learning about Animal Life Data and Animal Identification, behavior, seasonal-changes, health etc. can be easily achieved with IoE.
Chapter Preview
Top

Introduction

A paradigm shift is practically implemented in various dairy, agricultural related businesses, with a combination of Sensors, RFIDs usages, Business intelligence, Mobile technology, Cloud Computing etc. Get to leverage technology to help rural masses who have been left out of the technological progress we have seen in the cities. According to the United Nations’ Food and Agriculture Organization, food production must increase 60% to be able to feed the growing population expected to hit 9 billion in 2050. The global food challenge necessitates that farmers find new sources of productivity by concentrating on herds of animals & their feeding regime, the effect of seasonal changes on animals, grass growth details in farm, soil nutrition management, livestock performance, etc.

For 50 years, scientists searched for the secret to making tiny implantable devices that could travel through the bloodstream. Engineers at Stanford have demonstrated just such a device. Powered without wires or batteries, it can propel itself through the bloodstream and is small enough to fit through blood vessels (Ada et al 2015, 2016).

Technology influences, and is influenced by, the socio-structural nature of societies. The extraordinary advances in electronic technologies, global human interconnectedness presents novel adaptational challenges and expanded opportunities for people to shape their life with ease and best utilization of IT. “Human Generated Power for Mobile Electronics” is booming up the field, using wearable technology without physical implants. It is observed by researchers that the human joints are also a good source of generating energy and hence a device with sensors, able to capture energy is attached at the elbow in the form of a jacket. The precaution is taken while designing this jacket that the weight of jacket does not increase with this addition and yet gives information about store energy, which can be further used for mobile charging (Thad et al 2015). Soles of shoes extensively used during walking, running etc to harvest human motions is successfully experimented by Prof. Sangtae Kim MIT to power sensors and wearable gadgets.

Privacy-preserving in itself is the major research area. It is related to data generated due to transformation of human and animals, directly (by pervasive computing way) or indirectly (by simulation and use of technology extensively) includes securing the authenticity and integrity of context information and creating a secure context distribution algorithm, protection of roles and role-based access control by pervasive applications during distribution in any environment, a secure key-exchange mechanism that can be used to secure the communication between users and devices and automatic generation of a privacy policy.

A novel integrated approach to Multilaterally Secure Pervasive Cooperation as well as the supporting security techniques and mechanisms consists of threshold encryptions, location traces, end to end confidential messaging with anonymous receivers used for querying human sensors connected with mobile devices.

To achieve electronic transformation indirectly via human by taking inspiration from nature is amazing to realize and implement in the form of a novel conceptual algorithm using multi-robots. Multi-robot cooperation includes joint collaborative behaviour that is directed towards some goal in which there is a common interest or reward.

A nature inspired real story of “ant feeding birds” during recent summer drought is successfully converted into an algorithm. This algorithm is then mapped into real world scenarios, wherein a lot of dependencies of human on IT network is automated using multi-robots, and in another scenario related to automation; handshake among various entities is successfully and securely achieved. The first scenario includes any institution based audit mechanism. Audit process requires a lot of properly formatted documents. These documents are spread all across institution under various heads on varied computer systems. Mapping of “ant feeding birds” algorithm securely fetches all required documents without mail / personal follow up within given time duration very effectually with the help of multi-robots.

Also, secure way to automate multi-authored book publishing or multi-writer TV serial production can be mapped to the same “ant feeding birds” concept. Such real time scenarios are implemented using various semantic text mining techniques, sentiment analysis, opinion mining, topic modelling, generic process model, multi-vector topic tracking tool, lexical chaining, concept linkage tool, handshaking and Testor Theory etc to name a few.

Complete Chapter List

Search this Book:
Reset