A Capability – Driven modelling approach applied in smart transportation & management systems for large scale events
Journal Title: EAI Endorsed Transactions on Internet of Things - Year 2017, Vol 3, Issue 9
Abstract
Economic growth in Europe has been, strongly associated with urbanization, overwhelming cities with vehicles. This renders mobility inside cities problematic, since it is often associated with large waste of time in traffic congestions, environmental pollution and accidents. Cities struggle to invent and deploy “smart” solutions in the domain of urban mobility, so as to offer innovative services to citizens and visitors and improve the overall quality of life. At the same time, organisation of large-scale events impose even more challenges and difficulties in the provision of such services. In this context, the paper discusses on the basic challenges that cities face especially in cases of large scale events, and proposes a capability – driven enterprise modelling approach towards enabling Smart Objects for Smart City Operations (SCO). It presents specific examples of deploying this approach in smart traffic management and smart spectators’ management in large scale events. Moreover, a process towards linking capability models to simulation ones is presented, trying to set the basis for effective SCO based on Smart Objects deployment.
Authors and Affiliations
G. Bravos, P. Loucopoulos, G. Dimitrakopoulos, D. Anagnostopoulos, V. A. Kiousi
Towards Smart and Sustainable Future Cities Based on Internet of Things for Developing Countries: What Approach for Africa?
This article aims first at reviewing and discussing previous works on Internet of Things based sustainable smart cities. Secondly, it proposes an ideological and technical framework that better suits communities in futur...
Secure Login Using Multi-Tier Authentication Schemes in Fog Computing
Security threats are major barriers in authentication process in Fog Computing. Identification of a user through single signon process like simple password-based authentications are no longer considered secure. Different...
State-of-the-Art Congestion Control Protocols in WSN: A Survey
Wireless Sensor Networks (WSNs) inherently are resource-constrained in terms of available energy, bandwidth, processing power and memory space. In these networks, congestion occurs when the incoming traffic load surpasse...
A Taxonomy and Survey of IoT Cloud Applications
Internet of Things (IoT) systems are realized by dynamic global network infrastructure with self-configuring capabilities, in which things can interact and communicate in the environment through the Internet by exchangin...
Studies in Small Scale Data: Three Case Studies on Describing Individuals’ Spatial Behaviour in Cities
Big Data has been effectively mined to understand behavioural patterns in cities and to map large-scale trends predicated upon the repeated actions of many aggregated individuals. While acknowledging the vital role that...