U.S. flag

An official website of the United States government

Here’s how you know

Official websites use .gov A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS A lock ( Lock A locked padlock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

https://www.nist.gov/information-technology

yellow-green circuit board in the middle of a background that looks like circuit lines, blue on black

Information Technology

Advancing the state-of-the-art in IT in such applications as cyber security and biometrics, NIST accelerates the development and deployment of systems that are reliable, usable, interoperable, and secure; advances measurement science through innovations in mathematics, statistics, and computer science; and conducts research to develop the measurements and standards infrastructure for emerging information technologies and applications.

Featured Content

Information technology topics.

  • Artificial intelligence
  • Cloud computing & virtualization
  • Complex systems
  • Computational science
  • Conformance testing
  • Cyberphysical systems
  • Cybersecurity
  • Data & informatics
  • Federal information processing standards (FIPS)
  • Internet of Things (IoT)
  • Interoperability testing
  • Location based services
  • Software research
  • Usability & human factors
  • Video analytics
  • Virtual / augmented reality
  • Visualization research
  • Voting systems

The Research

Projects & programs, face recognition vendor test (frvt), health it at nist - program overview.

Logo that says NIST Cloud Computing Program and has a half blue cloud

NIST Cloud Computing Program - NCCP

Steven Satterfield in the NIST CAVE

Visualization

Additional resources links.

Illustration that shows an outline of a face and then icons to represent different areas of AI including heart (health), lock (cyber), windmills (energy), steering wheel (cars) and manufacturing arm

NIST Seeks Comments on AI Risk Management Framework Guidance, Workshop Date Set

Genetic codes

NIST, Nonprofit Research Consortium to Develop Safety Tools for Synthetic Biology to Defend Against Potential Misuse of AI

A person reaches out to a transparent screen with a circle of icons around the words "AI ETHICS."

NIST Researchers Suggest Historical Precedent for Ethical AI Research

Hands draw on a transparent screen with circuits making the shape of a brain and "AI" written in the center.

Biden-Harris Administration Announces First-Ever Consortium Dedicated to AI Safety

Stay in touch.

Sign up for our newsletter to stay up to date with the latest research, trends, and news for Information Technology.

Upcoming Events

Enhancing security of devices and components across the supply chain, ai metrology colloquia series.

Supply Chain Trust

CHIPS R&D Semiconductor Supply Chain Trust and Assurance Data Standards Workshop

Digital Twin Data Interoperability Standards

CHIPS R&D Digital Twin Data Interoperability Standards Workshop

Publications

Publishing our work allows us to share ideas and work collaboratively to advance the field of computer science.

People looking at a screen

  • Algorithms and Optimization 323
  • Applied science 186
  • Climate and Sustainability 10
  • Cloud AI 46
  • Language 235
  • Perception 291

Research Area

  • Algorithms and Theory 1316
  • Data Management 166
  • Data Mining and Modeling 353
  • Distributed Systems and Parallel Computing 340
  • Economics and Electronic Commerce 340
  • Education Innovation 68
  • General Science 329
  • Hardware and Architecture 145
  • Health & Bioscience 358
  • Human-Computer Interaction and Visualization 803
  • Information Retrieval and the Web 414
  • Machine Intelligence 3780
  • Machine Perception 1448
  • Machine Translation 145
  • Mobile Systems 107
  • Natural Language Processing 1068
  • Networking 312
  • Quantum Computing 124
  • Responsible AI 221
  • Robotics 198
  • Security, Privacy and Abuse Prevention 490
  • Software Engineering 198
  • Software Systems 448
  • Speech Processing 542
  • Title, desc

We believe open collaboration is essential for progress

We're proud to work with academic and research institutions to push the boundaries of AI and computer science. Learn more about our student and faculty programs, as well as our global outreach initiatives.

Outreach

  • Browse All Articles
  • Newsletter Sign-Up

TechnologicalInnovation →

No results found in working knowledge.

  • Were any results found in one of the other content buckets on the left?
  • Try removing some search filters.
  • Use different search filters.

research papers on it

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

  •  We're Hiring!
  •  Help Center

Information Technology

  • Most Cited Papers
  • Most Downloaded Papers
  • Newest Papers
  • Save to Library
  • Last »
  • Information Systems Follow Following
  • Computer Science Follow Following
  • Informatics Follow Following
  • Education Follow Following
  • Artificial Intelligence Follow Following
  • Data Mining Follow Following
  • E-learning Follow Following
  • Social Media Follow Following
  • Information Systems (Business Informatics) Follow Following
  • Enterprise Architecture Follow Following

Enter the email address you signed up with and we'll email you a reset link.

  • Academia.edu Publishing
  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

U.S. flag

An official website of the United States government

The .gov means it’s official. Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

The site is secure. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

  • Publications
  • Account settings
  • Advanced Search
  • Journal List
  • Sensors (Basel)

Logo of sensors

Study and Investigation on 5G Technology: A Systematic Review

Ramraj dangi.

1 School of Computing Science and Engineering, VIT University Bhopal, Bhopal 466114, India; [email protected] (R.D.); [email protected] (P.L.)

Praveen Lalwani

Gaurav choudhary.

2 Department of Applied Mathematics and Computer Science, Technical University of Denmark, 2800 Lyngby, Denmark; moc.liamg@7777yrahduohcvaruag

3 Department of Information Security Engineering, Soonchunhyang University, Asan-si 31538, Korea

Giovanni Pau

4 Faculty of Engineering and Architecture, Kore University of Enna, 94100 Enna, Italy; [email protected]

Associated Data

Not applicable.

In wireless communication, Fifth Generation (5G) Technology is a recent generation of mobile networks. In this paper, evaluations in the field of mobile communication technology are presented. In each evolution, multiple challenges were faced that were captured with the help of next-generation mobile networks. Among all the previously existing mobile networks, 5G provides a high-speed internet facility, anytime, anywhere, for everyone. 5G is slightly different due to its novel features such as interconnecting people, controlling devices, objects, and machines. 5G mobile system will bring diverse levels of performance and capability, which will serve as new user experiences and connect new enterprises. Therefore, it is essential to know where the enterprise can utilize the benefits of 5G. In this research article, it was observed that extensive research and analysis unfolds different aspects, namely, millimeter wave (mmWave), massive multiple-input and multiple-output (Massive-MIMO), small cell, mobile edge computing (MEC), beamforming, different antenna technology, etc. This article’s main aim is to highlight some of the most recent enhancements made towards the 5G mobile system and discuss its future research objectives.

1. Introduction

Most recently, in three decades, rapid growth was marked in the field of wireless communication concerning the transition of 1G to 4G [ 1 , 2 ]. The main motto behind this research was the requirements of high bandwidth and very low latency. 5G provides a high data rate, improved quality of service (QoS), low-latency, high coverage, high reliability, and economically affordable services. 5G delivers services categorized into three categories: (1) Extreme mobile broadband (eMBB). It is a nonstandalone architecture that offers high-speed internet connectivity, greater bandwidth, moderate latency, UltraHD streaming videos, virtual reality and augmented reality (AR/VR) media, and many more. (2) Massive machine type communication (eMTC), 3GPP releases it in its 13th specification. It provides long-range and broadband machine-type communication at a very cost-effective price with less power consumption. eMTC brings a high data rate service, low power, extended coverage via less device complexity through mobile carriers for IoT applications. (3) ultra-reliable low latency communication (URLLC) offers low-latency and ultra-high reliability, rich quality of service (QoS), which is not possible with traditional mobile network architecture. URLLC is designed for on-demand real-time interaction such as remote surgery, vehicle to vehicle (V2V) communication, industry 4.0, smart grids, intelligent transport system, etc. [ 3 ].

1.1. Evolution from 1G to 5G

First generation (1G): 1G cell phone was launched between the 1970s and 80s, based on analog technology, which works just like a landline phone. It suffers in various ways, such as poor battery life, voice quality, and dropped calls. In 1G, the maximum achievable speed was 2.4 Kbps.

Second Generation (2G): In 2G, the first digital system was offered in 1991, providing improved mobile voice communication over 1G. In addition, Code-Division Multiple Access (CDMA) and Global System for Mobile (GSM) concepts were also discussed. In 2G, the maximum achievable speed was 1 Mpbs.

Third Generation (3G): When technology ventured from 2G GSM frameworks into 3G universal mobile telecommunication system (UMTS) framework, users encountered higher system speed and quicker download speed making constant video calls. 3G was the first mobile broadband system that was formed to provide the voice with some multimedia. The technology behind 3G was high-speed packet access (HSPA/HSPA+). 3G used MIMO for multiplying the power of the wireless network, and it also used packet switching for fast data transmission.

Fourth Generation (4G): It is purely mobile broadband standard. In digital mobile communication, it was observed information rate that upgraded from 20 to 60 Mbps in 4G [ 4 ]. It works on LTE and WiMAX technologies, as well as provides wider bandwidth up to 100 Mhz. It was launched in 2010.

Fourth Generation LTE-A (4.5G): It is an advanced version of standard 4G LTE. LTE-A uses MIMO technology to combine multiple antennas for both transmitters as well as a receiver. Using MIMO, multiple signals and multiple antennas can work simultaneously, making LTE-A three times faster than standard 4G. LTE-A offered an improved system limit, decreased deferral in the application server, access triple traffic (Data, Voice, and Video) wirelessly at any time anywhere in the world.LTE-A delivers speeds of over 42 Mbps and up to 90 Mbps.

Fifth Generation (5G): 5G is a pillar of digital transformation; it is a real improvement on all the previous mobile generation networks. 5G brings three different services for end user like Extreme mobile broadband (eMBB). It offers high-speed internet connectivity, greater bandwidth, moderate latency, UltraHD streaming videos, virtual reality and augmented reality (AR/VR) media, and many more. Massive machine type communication (eMTC), it provides long-range and broadband machine-type communication at a very cost-effective price with less power consumption. eMTC brings a high data rate service, low power, extended coverage via less device complexity through mobile carriers for IoT applications. Ultra-reliable low latency communication (URLLC) offers low-latency and ultra-high reliability, rich quality of service (QoS), which is not possible with traditional mobile network architecture. URLLC is designed for on-demand real-time interaction such as remote surgery, vehicle to vehicle (V2V) communication, industry 4.0, smart grids, intelligent transport system, etc. 5G faster than 4G and offers remote-controlled operation over a reliable network with zero delays. It provides down-link maximum throughput of up to 20 Gbps. In addition, 5G also supports 4G WWWW (4th Generation World Wide Wireless Web) [ 5 ] and is based on Internet protocol version 6 (IPv6) protocol. 5G provides unlimited internet connection at your convenience, anytime, anywhere with extremely high speed, high throughput, low-latency, higher reliability and scalability, and energy-efficient mobile communication technology [ 6 ]. 5G mainly divided in two parts 6 GHz 5G and Millimeter wave(mmWave) 5G.

6 GHz is a mid frequency band which works as a mid point between capacity and coverage to offer perfect environment for 5G connectivity. 6 GHz spectrum will provide high bandwidth with improved network performance. It offers continuous channels that will reduce the need for network densification when mid-band spectrum is not available and it makes 5G connectivity affordable at anytime, anywhere for everyone.

mmWave is an essential technology of 5G network which build high performance network. 5G mmWave offer diverse services that is why all network providers should add on this technology in their 5G deployment planning. There are lots of service providers who deployed 5G mmWave, and their simulation result shows that 5G mmwave is a far less used spectrum. It provides very high speed wireless communication and it also offers ultra-wide bandwidth for next generation mobile network.

The evolution of wireless mobile technologies are presented in Table 1 . The abbreviations used in this paper are mentioned in Table 2 .

Summary of Mobile Technology.

Table of Notations and Abbreviations.

1.2. Key Contributions

The objective of this survey is to provide a detailed guide of 5G key technologies, methods to researchers, and to help with understanding how the recent works addressed 5G problems and developed solutions to tackle the 5G challenges; i.e., what are new methods that must be applied and how can they solve problems? Highlights of the research article are as follows.

  • This survey focused on the recent trends and development in the era of 5G and novel contributions by the researcher community and discussed technical details on essential aspects of the 5G advancement.
  • In this paper, the evolution of the mobile network from 1G to 5G is presented. In addition, the growth of mobile communication under different attributes is also discussed.
  • This paper covers the emerging applications and research groups working on 5G & different research areas in 5G wireless communication network with a descriptive taxonomy.
  • This survey discusses the current vision of the 5G networks, advantages, applications, key technologies, and key features. Furthermore, machine learning prospects are also explored with the emerging requirements in the 5G era. The article also focused on technical aspects of 5G IoT Based approaches and optimization techniques for 5G.
  • we provide an extensive overview and recent advancement of emerging technologies of 5G mobile network, namely, MIMO, Non-Orthogonal Multiple Access (NOMA), mmWave, Internet of Things (IoT), Machine Learning (ML), and optimization. Also, a technical summary is discussed by highlighting the context of current approaches and corresponding challenges.
  • Security challenges and considerations while developing 5G technology are discussed.
  • Finally, the paper concludes with the future directives.

The existing survey focused on architecture, key concepts, and implementation challenges and issues. In contrast, this survey covers the state-of-the-art techniques as well as corresponding recent novel developments by researchers. Various recent significant papers are discussed with the key technologies accelerating the development and production of 5G products.

2. Existing Surveys and Their Applicability

In this paper, a detailed survey on various technologies of 5G networks is presented. Various researchers have worked on different technologies of 5G networks. In this section, Table 3 gives a tabular representation of existing surveys of 5G networks. Massive MIMO, NOMA, small cell, mmWave, beamforming, and MEC are the six main pillars that helped to implement 5G networks in real life.

A comparative overview of existing surveys on different technologies of 5G networks.

2.1. Limitations of Existing Surveys

The existing survey focused on architecture, key concepts, and implementation challenges and issues. The numerous current surveys focused on various 5G technologies with different parameters, and the authors did not cover all the technologies of the 5G network in detail with challenges and recent advancements. Few authors worked on MIMO (Non-Orthogonal Multiple Access) NOMA, MEC, small cell technologies. In contrast, some others worked on beamforming, Millimeter-wave (mmWave). But the existing survey did not cover all the technologies of the 5G network from a research and advancement perspective. No detailed survey is available in the market covering all the 5G network technologies and currently published research trade-offs. So, our main aim is to give a detailed study of all the technologies working on the 5G network. In contrast, this survey covers the state-of-the-art techniques as well as corresponding recent novel developments by researchers. Various recent significant papers are discussed with the key technologies accelerating the development and production of 5G products. This survey article collected key information about 5G technology and recent advancements, and it can be a kind of a guide for the reader. This survey provides an umbrella approach to bring multiple solutions and recent improvements in a single place to accelerate the 5G research with the latest key enabling solutions and reviews. A systematic layout representation of the survey in Figure 1 . We provide a state-of-the-art comparative overview of the existing surveys on different technologies of 5G networks in Table 3 .

An external file that holds a picture, illustration, etc.
Object name is sensors-22-00026-g001.jpg

Systematic layout representation of survey.

2.2. Article Organization

This article is organized under the following sections. Section 2 presents existing surveys and their applicability. In Section 3 , the preliminaries of 5G technology are presented. In Section 4 , recent advances of 5G technology based on Massive MIMO, NOMA, Millimeter Wave, 5G with IoT, machine learning for 5G, and Optimization in 5G are provided. In Section 5 , a description of novel 5G features over 4G is provided. Section 6 covered all the security concerns of the 5G network. Section 7 , 5G technology based on above-stated challenges summarize in tabular form. Finally, Section 8 and Section 9 conclude the study, which paves the path for future research.

3. Preliminary Section

3.1. emerging 5g paradigms and its features.

5G provides very high speed, low latency, and highly salable connectivity between multiple devices and IoT worldwide. 5G will provide a very flexible model to develop a modern generation of applications and industry goals [ 26 , 27 ]. There are many services offered by 5G network architecture are stated below:

Massive machine to machine communications: 5G offers novel, massive machine-to-machine communications [ 28 ], also known as the IoT [ 29 ], that provide connectivity between lots of machines without any involvement of humans. This service enhances the applications of 5G and provides connectivity between agriculture, construction, and industries [ 30 ].

Ultra-reliable low latency communications (URLLC): This service offers real-time management of machines, high-speed vehicle-to-vehicle connectivity, industrial connectivity and security principles, and highly secure transport system, and multiple autonomous actions. Low latency communications also clear up a different area where remote medical care, procedures, and operation are all achievable [ 31 ].

Enhanced mobile broadband: Enhance mobile broadband is an important use case of 5G system, which uses massive MIMO antenna, mmWave, beamforming techniques to offer very high-speed connectivity across a wide range of areas [ 32 ].

For communities: 5G provides a very flexible internet connection between lots of machines to make smart homes, smart schools, smart laboratories, safer and smart automobiles, and good health care centers [ 33 ].

For businesses and industry: As 5G works on higher spectrum ranges from 24 to 100 GHz. This higher frequency range provides secure low latency communication and high-speed wireless connectivity between IoT devices and industry 4.0, which opens a market for end-users to enhance their business models [ 34 ].

New and Emerging technologies: As 5G came up with many new technologies like beamforming, massive MIMO, mmWave, small cell, NOMA, MEC, and network slicing, it introduced many new features to the market. Like virtual reality (VR), users can experience the physical presence of people who are millions of kilometers away from them. Many new technologies like smart homes, smart workplaces, smart schools, smart sports academy also came into the market with this 5G Mobile network model [ 35 ].

3.2. Commercial Service Providers of 5G

5G provides high-speed internet browsing, streaming, and downloading with very high reliability and low latency. 5G network will change your working style, and it will increase new business opportunities and provide innovations that we cannot imagine. This section covers top service providers of 5G network [ 36 , 37 ].

Ericsson: Ericsson is a Swedish multinational networking and telecommunications company, investing around 25.62 billion USD in 5G network, which makes it the biggest telecommunication company. It claims that it is the only company working on all the continents to make the 5G network a global standard for the next generation wireless communication. Ericsson developed the first 5G radio prototype that enables the operators to set up the live field trials in their network, which helps operators understand how 5G reacts. It plays a vital role in the development of 5G hardware. It currently provides 5G services in over 27 countries with content providers like China Mobile, GCI, LGU+, AT&T, Rogers, and many more. It has 100 commercial agreements with different operators as of 2020.

Verizon: It is American multinational telecommunication which was founded in 1983. Verizon started offering 5G services in April 2020, and by December 2020, it has actively provided 5G services in 30 cities of the USA. They planned that by the end of 2021, they would deploy 5G in 30 more new cities. Verizon deployed a 5G network on mmWave, a very high band spectrum between 30 to 300 GHz. As it is a significantly less used spectrum, it provides very high-speed wireless communication. MmWave offers ultra-wide bandwidth for next-generation mobile networks. MmWave is a faster and high-band spectrum that has a limited range. Verizon planned to increase its number of 5G cells by 500% by 2020. Verizon also has an ultra wide-band flagship 5G service which is the best 5G service that increases the market price of Verizon.

Nokia: Nokia is a Finnish multinational telecommunications company which was founded in 1865. Nokia is one of the companies which adopted 5G technology very early. It is developing, researching, and building partnerships with various 5G renders to offer 5G communication as soon as possible. Nokia collaborated with Deutsche Telekom and Hamburg Port Authority and provided them 8000-hectare site for their 5G MoNArch project. Nokia is the only company that supplies 5G technology to all the operators of different countries like AT&T, Sprint, T-Mobile US and Verizon in the USA, Korea Telecom, LG U+ and SK Telecom in South Korea and NTT DOCOMO, KDDI, and SoftBank in Japan. Presently, Nokia has around 150+ agreements and 29 live networks all over the world. Nokia is continuously working hard on 5G technology to expand 5G networks all over the globe.

AT&T: AT&T is an American multinational company that was the first to deploy a 5G network in reality in 2018. They built a gigabit 5G network connection in Waco, TX, Kalamazoo, MI, and South Bend to achieve this. It is the first company that archives 1–2 gigabit per second speed in 2019. AT&T claims that it provides a 5G network connection among 225 million people worldwide by using a 6 GHz spectrum band.

T-Mobile: T-Mobile US (TMUS) is an American wireless network operator which was the first service provider that offers a real 5G nationwide network. The company knew that high-band 5G was not feasible nationwide, so they used a 600 MHz spectrum to build a significant portion of its 5G network. TMUS is planning that by 2024 they will double the total capacity and triple the full 5G capacity of T-Mobile and Sprint combined. The sprint buyout is helping T-Mobile move forward the company’s current market price to 129.98 USD.

Samsung: Samsung started their research in 5G technology in 2011. In 2013, Samsung successfully developed the world’s first adaptive array transceiver technology operating in the millimeter-wave Ka bands for cellular communications. Samsung provides several hundred times faster data transmission than standard 4G for core 5G mobile communication systems. The company achieved a lot of success in the next generation of technology, and it is considered one of the leading companies in the 5G domain.

Qualcomm: Qualcomm is an American multinational corporation in San Diego, California. It is also one of the leading company which is working on 5G chip. Qualcomm’s first 5G modem chip was announced in October 2016, and a prototype was demonstrated in October 2017. Qualcomm mainly focuses on building products while other companies talk about 5G; Qualcomm is building the technologies. According to one magazine, Qualcomm was working on three main areas of 5G networks. Firstly, radios that would use bandwidth from any network it has access to; secondly, creating more extensive ranges of spectrum by combining smaller pieces; and thirdly, a set of services for internet applications.

ZTE Corporation: ZTE Corporation was founded in 1985. It is a partially Chinese state-owned technology company that works in telecommunication. It was a leading company that worked on 4G LTE, and it is still maintaining its value and doing research and tests on 5G. It is the first company that proposed Pre5G technology with some series of solutions.

NEC Corporation: NEC Corporation is a Japanese multinational information technology and electronics corporation headquartered in Minato, Tokyo. ZTE also started their research on 5G, and they introduced a new business concept. NEC’s main aim is to develop 5G NR for the global mobile system and create secure and intelligent technologies to realize 5G services.

Cisco: Cisco is a USA networking hardware company that also sleeves up for 5G network. Cisco’s primary focus is to support 5G in three ways: Service—enable 5G services faster so all service providers can increase their business. Infrastructure—build 5G-oriented infrastructure to implement 5G more quickly. Automation—make a more scalable, flexible, and reliable 5G network. The companies know the importance of 5G, and they want to connect more than 30 billion devices in the next couple of years. Cisco intends to work on network hardening as it is a vital part of 5G network. Cisco used AI with deep learning to develop a 5G Security Architecture, enabling Secure Network Transformation.

3.3. 5G Research Groups

Many research groups from all over the world are working on a 5G wireless mobile network [ 38 ]. These groups are continuously working on various aspects of 5G. The list of those research groups are presented as follows: 5GNOW (5th Generation Non-Orthogonal Waveform for Asynchronous Signaling), NEWCOM (Network of Excellence in Wireless Communication), 5GIC (5G Innovation Center), NYU (New York University) Wireless, 5GPPP (5G Infrastructure Public-Private Partnership), EMPHATIC (Enhanced Multi-carrier Technology for Professional Adhoc and Cell-Based Communication), ETRI(Electronics and Telecommunication Research Institute), METIS (Mobile and wireless communication Enablers for the Twenty-twenty Information Society) [ 39 ]. The various research groups along with the research area are presented in Table 4 .

Research groups working on 5G mobile networks.

3.4. 5G Applications

5G is faster than 4G and offers remote-controlled operation over a reliable network with zero delays. It provides down-link maximum throughput of up to 20 Gbps. In addition, 5G also supports 4G WWWW (4th Generation World Wide Wireless Web) [ 5 ] and is based on Internet protocol version 6 (IPv6) protocol. 5G provides unlimited internet connection at your convenience, anytime, anywhere with extremely high speed, high throughput, low-latency, higher reliability, greater scalablility, and energy-efficient mobile communication technology [ 6 ].

There are lots of applications of 5G mobile network are as follows:

  • High-speed mobile network: 5G is an advancement on all the previous mobile network technologies, which offers very high speed downloading speeds 0 of up to 10 to 20 Gbps. The 5G wireless network works as a fiber optic internet connection. 5G is different from all the conventional mobile transmission technologies, and it offers both voice and high-speed data connectivity efficiently. 5G offers very low latency communication of less than a millisecond, useful for autonomous driving and mission-critical applications. 5G will use millimeter waves for data transmission, providing higher bandwidth and a massive data rate than lower LTE bands. As 5 Gis a fast mobile network technology, it will enable virtual access to high processing power and secure and safe access to cloud services and enterprise applications. Small cell is one of the best features of 5G, which brings lots of advantages like high coverage, high-speed data transfer, power saving, easy and fast cloud access, etc. [ 40 ].
  • Entertainment and multimedia: In one analysis in 2015, it was found that more than 50 percent of mobile internet traffic was used for video downloading. This trend will surely increase in the future, which will make video streaming more common. 5G will offer High-speed streaming of 4K videos with crystal clear audio, and it will make a high definition virtual world on your mobile. 5G will benefit the entertainment industry as it offers 120 frames per second with high resolution and higher dynamic range video streaming, and HD TV channels can also be accessed on mobile devices without any interruptions. 5G provides low latency high definition communication so augmented reality (AR), and virtual reality (VR) will be very easily implemented in the future. Virtual reality games are trendy these days, and many companies are investing in HD virtual reality games. The 5G network will offer high-speed internet connectivity with a better gaming experience [ 41 ].
  • Smart homes : smart home appliances and products are in demand these days. The 5G network makes smart homes more real as it offers high-speed connectivity and monitoring of smart appliances. Smart home appliances are easily accessed and configured from remote locations using the 5G network as it offers very high-speed low latency communication.
  • Smart cities: 5G wireless network also helps develop smart cities applications such as automatic traffic management, weather update, local area broadcasting, energy-saving, efficient power supply, smart lighting system, water resource management, crowd management, emergency control, etc.
  • Industrial IoT: 5G wireless technology will provide lots of features for future industries such as safety, process tracking, smart packing, shipping, energy efficiency, automation of equipment, predictive maintenance, and logistics. 5G smart sensor technology also offers smarter, safer, cost-effective, and energy-saving industrial IoT operations.
  • Smart Farming: 5G technology will play a crucial role in agriculture and smart farming. 5G sensors and GPS technology will help farmers track live attacks on crops and manage them quickly. These smart sensors can also be used for irrigation, pest, insect, and electricity control.
  • Autonomous Driving: The 5G wireless network offers very low latency high-speed communication, significant for autonomous driving. It means self-driving cars will come to real life soon with 5G wireless networks. Using 5G autonomous cars can easily communicate with smart traffic signs, objects, and other vehicles running on the road. 5G’s low latency feature makes self-driving more real as every millisecond is essential for autonomous vehicles, decision-making is done in microseconds to avoid accidents.
  • Healthcare and mission-critical applications: 5G technology will bring modernization in medicine where doctors and practitioners can perform advanced medical procedures. The 5G network will provide connectivity between all classrooms, so attending seminars and lectures will be easier. Through 5G technology, patients can connect with doctors and take their advice. Scientists are building smart medical devices which can help people with chronic medical conditions. The 5G network will boost the healthcare industry with smart devices, the internet of medical things, smart sensors, HD medical imaging technologies, and smart analytics systems. 5G will help access cloud storage, so accessing healthcare data will be very easy from any location worldwide. Doctors and medical practitioners can easily store and share large files like MRI reports within seconds using the 5G network.
  • Satellite Internet: In many remote areas, ground base stations are not available, so 5G will play a crucial role in providing connectivity in such areas. The 5G network will provide connectivity using satellite systems, and the satellite system uses a constellation of multiple small satellites to provide connectivity in urban and rural areas across the world.

4. 5G Technologies

This section describes recent advances of 5G Massive MIMO, 5G NOMA, 5G millimeter wave, 5G IOT, 5G with machine learning, and 5G optimization-based approaches. In addition, the summary is also presented in each subsection that paves the researchers for the future research direction.

4.1. 5G Massive MIMO

Multiple-input-multiple-out (MIMO) is a very important technology for wireless systems. It is used for sending and receiving multiple signals simultaneously over the same radio channel. MIMO plays a very big role in WI-FI, 3G, 4G, and 4G LTE-A networks. MIMO is mainly used to achieve high spectral efficiency and energy efficiency but it was not up to the mark MIMO provides low throughput and very low reliable connectivity. To resolve this, lots of MIMO technology like single user MIMO (SU-MIMO), multiuser MIMO (MU-MIMO) and network MIMO were used. However, these new MIMO also did not still fulfill the demand of end users. Massive MIMO is an advancement of MIMO technology used in the 5G network in which hundreds and thousands of antennas are attached with base stations to increase throughput and spectral efficiency. Multiple transmit and receive antennas are used in massive MIMO to increase the transmission rate and spectral efficiency. When multiple UEs generate downlink traffic simultaneously, massive MIMO gains higher capacity. Massive MIMO uses extra antennas to move energy into smaller regions of space to increase spectral efficiency and throughput [ 43 ]. In traditional systems data collection from smart sensors is a complex task as it increases latency, reduced data rate and reduced reliability. While massive MIMO with beamforming and huge multiplexing techniques can sense data from different sensors with low latency, high data rate and higher reliability. Massive MIMO will help in transmitting the data in real-time collected from different sensors to central monitoring locations for smart sensor applications like self-driving cars, healthcare centers, smart grids, smart cities, smart highways, smart homes, and smart enterprises [ 44 ].

Highlights of 5G Massive MIMO technology are as follows:

  • Data rate: Massive MIMO is advised as the one of the dominant technologies to provide wireless high speed and high data rate in the gigabits per seconds.
  • The relationship between wave frequency and antenna size: Both are inversely proportional to each other. It means lower frequency signals need a bigger antenna and vise versa.

An external file that holds a picture, illustration, etc.
Object name is sensors-22-00026-g002.jpg

Pictorial representation of multi-input and multi-output (MIMO).

  • MIMO role in 5G: Massive MIMO will play a crucial role in the deployment of future 5G mobile communication as greater spectral and energy efficiency could be enabled.

State-of-the-Art Approaches

Plenty of approaches were proposed to resolve the issues of conventional MIMO [ 7 ].

The MIMO multirate, feed-forward controller is suggested by Mae et al. [ 46 ]. In the simulation, the proposed model generates the smooth control input, unlike the conventional MIMO, which generates oscillated control inputs. It also outperformed concerning the error rate. However, a combination of multirate and single rate can be used for better results.

The performance of stand-alone MIMO, distributed MIMO with and without corporation MIMO, was investigated by Panzner et al. [ 47 ]. In addition, an idea about the integration of large scale in the 5G technology was also presented. In the experimental analysis, different MIMO configurations are considered. The variation in the ratio of overall transmit antennas to spatial is deemed step-wise from equality to ten.

The simulation of massive MIMO noncooperative and cooperative systems for down-link behavior was performed by He et al. [ 48 ]. It depends on present LTE systems, which deal with various antennas in the base station set-up. It was observed that collaboration in different BS improves the system behaviors, whereas throughput is reduced slightly in this approach. However, a new method can be developed which can enhance both system behavior and throughput.

In [ 8 ], different approaches that increased the energy efficiency benefits provided by massive MIMO were presented. They analyzed the massive MIMO technology and described the detailed design of the energy consumption model for massive MIMO systems. This article has explored several techniques to enhance massive MIMO systems’ energy efficiency (EE) gains. This paper reviews standard EE-maximization approaches for the conventional massive MIMO systems, namely, scaling number of antennas, real-time implementing low-complexity operations at the base station (BS), power amplifier losses minimization, and radio frequency (RF) chain minimization requirements. In addition, open research direction is also identified.

In [ 49 ], various existing approaches based on different antenna selection and scheduling, user selection and scheduling, and joint antenna and user scheduling methods adopted in massive MIMO systems are presented in this paper. The objective of this survey article was to make awareness about the current research and future research direction in MIMO for systems. They analyzed that complete utilization of resources and bandwidth was the most crucial factor which enhances the sum rate.

In [ 50 ], authors discussed the development of various techniques for pilot contamination. To calculate the impact of pilot contamination in time division duplex (TDD) massive MIMO system, TDD and frequency division duplexing FDD patterns in massive MIMO techniques are used. They discussed different issues in pilot contamination in TDD massive MIMO systems with all the possible future directions of research. They also classified various techniques to generate the channel information for both pilot-based and subspace-based approaches.

In [ 19 ], the authors defined the uplink and downlink services for a massive MIMO system. In addition, it maintains a performance matrix that measures the impact of pilot contamination on different performances. They also examined the various application of massive MIMO such as small cells, orthogonal frequency-division multiplexing (OFDM) schemes, massive MIMO IEEE 802, 3rd generation partnership project (3GPP) specifications, and higher frequency bands. They considered their research work crucial for cutting edge massive MIMO and covered many issues like system throughput performance and channel state acquisition at higher frequencies.

In [ 13 ], various approaches were suggested for MIMO future generation wireless communication. They made a comparative study based on performance indicators such as peak data rate, energy efficiency, latency, throughput, etc. The key findings of this survey are as follows: (1) spatial multiplexing improves the energy efficiency; (2) design of MIMO play a vital role in the enhancement of throughput; (3) enhancement of mMIMO focusing on energy & spectral performance; (4) discussed the future challenges to improve the system design.

In [ 51 ], the study of large-scale MIMO systems for an energy-efficient system sharing method was presented. For the resource allocation, circuit energy and transmit energy expenditures were taken into consideration. In addition, the optimization techniques were applied for an energy-efficient resource sharing system to enlarge the energy efficiency for individual QoS and energy constraints. The author also examined the BS configuration, which includes homogeneous and heterogeneous UEs. While simulating, they discussed that the total number of transmit antennas plays a vital role in boosting energy efficiency. They highlighted that the highest energy efficiency was obtained when the BS was set up with 100 antennas that serve 20 UEs.

This section includes various works done on 5G MIMO technology by different author’s. Table 5 shows how different author’s worked on improvement of various parameters such as throughput, latency, energy efficiency, and spectral efficiency with 5G MIMO technology.

Summary of massive MIMO-based approaches in 5G technology.

4.2. 5G Non-Orthogonal Multiple Access (NOMA)

NOMA is a very important radio access technology used in next generation wireless communication. Compared to previous orthogonal multiple access techniques, NOMA offers lots of benefits like high spectrum efficiency, low latency with high reliability and high speed massive connectivity. NOMA mainly works on a baseline to serve multiple users with the same resources in terms of time, space and frequency. NOMA is mainly divided into two main categories one is code domain NOMA and another is power domain NOMA. Code-domain NOMA can improve the spectral efficiency of mMIMO, which improves the connectivity in 5G wireless communication. Code-domain NOMA was divided into some more multiple access techniques like sparse code multiple access, lattice-partition multiple access, multi-user shared access and pattern-division multiple access [ 52 ]. Power-domain NOMA is widely used in 5G wireless networks as it performs well with various wireless communication techniques such as MIMO, beamforming, space-time coding, network coding, full-duplex and cooperative communication etc. [ 53 ]. The conventional orthogonal frequency-division multiple access (OFDMA) used by 3GPP in 4G LTE network provides very low spectral efficiency when bandwidth resources are allocated to users with low channel state information (CSI). NOMA resolved this issue as it enables users to access all the subcarrier channels so bandwidth resources allocated to the users with low CSI can still be accessed by the users with strong CSI which increases the spectral efficiency. The 5G network will support heterogeneous architecture in which small cell and macro base stations work for spectrum sharing. NOMA is a key technology of the 5G wireless system which is very helpful for heterogeneous networks as multiple users can share their data in a small cell using the NOMA principle.The NOMA is helpful in various applications like ultra-dense networks (UDN), machine to machine (M2M) communication and massive machine type communication (mMTC). As NOMA provides lots of features it has some challenges too such as NOMA needs huge computational power for a large number of users at high data rates to run the SIC algorithms. Second, when users are moving from the networks, to manage power allocation optimization is a challenging task for NOMA [ 54 ]. Hybrid NOMA (HNOMA) is a combination of power-domain and code-domain NOMA. HNOMA uses both power differences and orthogonal resources for transmission among multiple users. As HNOMA is using both power-domain NOMA and code-domain NOMA it can achieve higher spectral efficiency than Power-domain NOMA and code-domain NOMA. In HNOMA multiple groups can simultaneously transmit signals at the same time. It uses a message passing algorithm (MPA) and successive interference cancellation (SIC)-based detection at the base station for these groups [ 55 ].

Highlights of 5G NOMA technology as follows:

An external file that holds a picture, illustration, etc.
Object name is sensors-22-00026-g003.jpg

Pictorial representation of orthogonal and Non-Orthogonal Multiple Access (NOMA).

  • NOMA provides higher data rates and resolves all the loop holes of OMA that makes 5G mobile network more scalable and reliable.
  • As multiple users use same frequency band simultaneously it increases the performance of whole network.
  • To setup intracell and intercell interference NOMA provides nonorthogonal transmission on the transmitter end.
  • The primary fundamental of NOMA is to improve the spectrum efficiency by strengthening the ramification of receiver.

State-of-the-Art of Approaches

A plenty of approaches were developed to address the various issues in NOMA.

A novel approach to address the multiple receiving signals at the same frequency is proposed in [ 22 ]. In NOMA, multiple users use the same sub-carrier, which improves the fairness and throughput of the system. As a nonorthogonal method is used among multiple users, at the time of retrieving the user’s signal at the receiver’s end, joint processing is required. They proposed solutions to optimize the receiver and the radio resource allocation of uplink NOMA. Firstly, the authors proposed an iterative MUDD which utilizes the information produced by the channel decoder to improve the performance of the multiuser detector. After that, the author suggested a power allocation and novel subcarrier that enhances the users’ weighted sum rate for the NOMA scheme. Their proposed model showed that NOMA performed well as compared to OFDM in terms of fairness and efficiency.

In [ 53 ], the author’s reviewed a power-domain NOMA that uses superposition coding (SC) and successive interference cancellation (SIC) at the transmitter and the receiver end. Lots of analyses were held that described that NOMA effectively satisfies user data rate demands and network-level of 5G technologies. The paper presented a complete review of recent advances in the 5G NOMA system. It showed the comparative analysis regarding allocation procedures, user fairness, state-of-the-art efficiency evaluation, user pairing pattern, etc. The study also analyzes NOMA’s behavior when working with other wireless communication techniques, namely, beamforming, MIMO, cooperative connections, network, space-time coding, etc.

In [ 9 ], the authors proposed NOMA with MEC, which improves the QoS as well as reduces the latency of the 5G wireless network. This model increases the uplink NOMA by decreasing the user’s uplink energy consumption. They formulated an optimized NOMA framework that reduces the energy consumption of MEC by using computing and communication resource allocation, user clustering, and transmit powers.

In [ 10 ], the authors proposed a model which investigates outage probability under average channel state information CSI and data rate in full CSI to resolve the problem of optimal power allocation, which increase the NOMA downlink system among users. They developed simple low-complexity algorithms to provide the optimal solution. The obtained simulation results showed NOMA’s efficiency, achieving higher performance fairness compared to the TDMA configurations. It was observed from the results that NOMA, through the appropriate power amplifiers (PA), ensures the high-performance fairness requirement for the future 5G wireless communication networks.

In [ 56 ], researchers discussed that the NOMA technology and waveform modulation techniques had been used in the 5G mobile network. Therefore, this research gave a detailed survey of non-orthogonal waveform modulation techniques and NOMA schemes for next-generation mobile networks. By analyzing and comparing multiple access technologies, they considered the future evolution of these technologies for 5G mobile communication.

In [ 57 ], the authors surveyed non-orthogonal multiple access (NOMA) from the development phase to the recent developments. They have also compared NOMA techniques with traditional OMA techniques concerning information theory. The author discussed the NOMA schemes categorically as power and code domain, including the design principles, operating principles, and features. Comparison is based upon the system’s performance, spectral efficiency, and the receiver’s complexity. Also discussed are the future challenges, open issues, and their expectations of NOMA and how it will support the key requirements of 5G mobile communication systems with massive connectivity and low latency.

In [ 17 ], authors present the first review of an elementary NOMA model with two users, which clarify its central precepts. After that, a general design with multicarrier supports with a random number of users on each sub-carrier is analyzed. In performance evaluation with the existing approaches, resource sharing and multiple-input multiple-output NOMA are examined. Furthermore, they took the key elements of NOMA and its potential research demands. Finally, they reviewed the two-user SC-NOMA design and a multi-user MC-NOMA design to highlight NOMA’s basic approaches and conventions. They also present the research study about the performance examination, resource assignment, and MIMO in NOMA.

In this section, various works by different authors done on 5G NOMA technology is covered. Table 6 shows how other authors worked on the improvement of various parameters such as spectral efficiency, fairness, and computing capacity with 5G NOMA technology.

Summary of NOMA-based approaches in 5G technology.

4.3. 5G Millimeter Wave (mmWave)

Millimeter wave is an extremely high frequency band, which is very useful for 5G wireless networks. MmWave uses 30 GHz to 300 GHz spectrum band for transmission. The frequency band between 30 GHz to 300 GHz is known as mmWave because these waves have wavelengths between 1 to 10 mm. Till now radar systems and satellites are only using mmWave as these are very fast frequency bands which provide very high speed wireless communication. Many mobile network providers also started mmWave for transmitting data between base stations. Using two ways the speed of data transmission can be improved one is by increasing spectrum utilization and second is by increasing spectrum bandwidth. Out of these two approaches increasing bandwidth is quite easy and better. The frequency band below 5 GHz is very crowded as many technologies are using it so to boost up the data transmission rate 5G wireless network uses mmWave technology which instead of increasing spectrum utilization, increases the spectrum bandwidth [ 58 ]. To maximize the signal bandwidth in wireless communication the carrier frequency should also be increased by 5% because the signal bandwidth is directly proportional to carrier frequencies. The frequency band between 28 GHz to 60 GHz is very useful for 5G wireless communication as 28 GHz frequency band offers up to 1 GHz spectrum bandwidth and 60 GHz frequency band offers 2 GHz spectrum bandwidth. 4G LTE provides 2 GHz carrier frequency which offers only 100 MHz spectrum bandwidth. However, the use of mmWave increases the spectrum bandwidth 10 times, which leads to better transmission speeds [ 59 , 60 ].

Highlights of 5G mmWave are as follows:

An external file that holds a picture, illustration, etc.
Object name is sensors-22-00026-g004.jpg

Pictorial representation of millimeter wave.

  • The 5G mmWave offer three advantages: (1) MmWave is very less used new Band, (2) MmWave signals carry more data than lower frequency wave, and (3) MmWave can be incorporated with MIMO antenna with the potential to offer a higher magnitude capacity compared to current communication systems.

In [ 11 ], the authors presented the survey of mmWave communications for 5G. The advantage of mmWave communications is adaptability, i.e., it supports the architectures and protocols up-gradation, which consists of integrated circuits, systems, etc. The authors over-viewed the present solutions and examined them concerning effectiveness, performance, and complexity. They also discussed the open research issues of mmWave communications in 5G concerning the software-defined network (SDN) architecture, network state information, efficient regulation techniques, and the heterogeneous system.

In [ 61 ], the authors present the recent work done by investigators in 5G; they discussed the design issues and demands of mmWave 5G antennas for cellular handsets. After that, they designed a small size and low-profile 60 GHz array of antenna units that contain 3D planer mesh-grid antenna elements. For the future prospect, a framework is designed in which antenna components are used to operate cellular handsets on mmWave 5G smartphones. In addition, they cross-checked the mesh-grid array of antennas with the polarized beam for upcoming hardware challenges.

In [ 12 ], the authors considered the suitability of the mmWave band for 5G cellular systems. They suggested a resource allocation system for concurrent D2D communications in mmWave 5G cellular systems, and it improves network efficiency and maintains network connectivity. This research article can serve as guidance for simulating D2D communications in mmWave 5G cellular systems. Massive mmWave BS may be set up to obtain a high delivery rate and aggregate efficiency. Therefore, many wireless users can hand off frequently between the mmWave base terminals, and it emerges the demand to search the neighbor having better network connectivity.

In [ 62 ], the authors provided a brief description of the cellular spectrum which ranges from 1 GHz to 3 GHz and is very crowed. In addition, they presented various noteworthy factors to set up mmWave communications in 5G, namely, channel characteristics regarding mmWave signal attenuation due to free space propagation, atmospheric gaseous, and rain. In addition, hybrid beamforming architecture in the mmWave technique is analyzed. They also suggested methods for the blockage effect in mmWave communications due to penetration damage. Finally, the authors have studied designing the mmWave transmission with small beams in nonorthogonal device-to-device communication.

This section covered various works done on 5G mmWave technology. The Table 7 shows how different author’s worked on the improvement of various parameters i.e., transmission rate, coverage, and cost, with 5G mmWave technology.

Summary of existing mmWave-based approaches in 5G technology.

4.4. 5G IoT Based Approaches

The 5G mobile network plays a big role in developing the Internet of Things (IoT). IoT will connect lots of things with the internet like appliances, sensors, devices, objects, and applications. These applications will collect lots of data from different devices and sensors. 5G will provide very high speed internet connectivity for data collection, transmission, control, and processing. 5G is a flexible network with unused spectrum availability and it offers very low cost deployment that is why it is the most efficient technology for IoT [ 63 ]. In many areas, 5G provides benefits to IoT, and below are some examples:

Smart homes: smart home appliances and products are in demand these days. The 5G network makes smart homes more real as it offers high speed connectivity and monitoring of smart appliances. Smart home appliances are easily accessed and configured from remote locations using the 5G network, as it offers very high speed low latency communication.

Smart cities: 5G wireless network also helps in developing smart cities applications such as automatic traffic management, weather update, local area broadcasting, energy saving, efficient power supply, smart lighting system, water resource management, crowd management, emergency control, etc.

Industrial IoT: 5G wireless technology will provide lots of features for future industries such as safety, process tracking, smart packing, shipping, energy efficiency, automation of equipment, predictive maintenance and logistics. 5G smart sensor technology also offers smarter, safer, cost effective, and energy-saving industrial operation for industrial IoT.

Smart Farming: 5G technology will play a crucial role for agriculture and smart farming. 5G sensors and GPS technology will help farmers to track live attacks on crops and manage them quickly. These smart sensors can also be used for irrigation control, pest control, insect control, and electricity control.

Autonomous Driving: 5G wireless network offers very low latency high speed communication which is very significant for autonomous driving. It means self-driving cars will come to real life soon with 5G wireless networks. Using 5G autonomous cars can easily communicate with smart traffic signs, objects and other vehicles running on the road. 5G’s low latency feature makes self-driving more real as every millisecond is important for autonomous vehicles, decision taking is performed in microseconds to avoid accidents [ 64 ].

Highlights of 5G IoT are as follows:

An external file that holds a picture, illustration, etc.
Object name is sensors-22-00026-g005.jpg

Pictorial representation of IoT with 5G.

  • 5G with IoT is a new feature of next-generation mobile communication, which provides a high-speed internet connection between moderated devices. 5G IoT also offers smart homes, smart devices, sensors, smart transportation systems, smart industries, etc., for end-users to make them smarter.
  • IoT deals with moderate devices which connect through the internet. The approach of the IoT has made the consideration of the research associated with the outcome of providing wearable, smart-phones, sensors, smart transportation systems, smart devices, washing machines, tablets, etc., and these diverse systems are associated to a common interface with the intelligence to connect.
  • Significant IoT applications include private healthcare systems, traffic management, industrial management, and tactile internet, etc.

Plenty of approaches is devised to address the issues of IoT [ 14 , 65 , 66 ].

In [ 65 ], the paper focuses on 5G mobile systems due to the emerging trends and developing technologies, which results in the exponential traffic growth in IoT. The author surveyed the challenges and demands during deployment of the massive IoT applications with the main focus on mobile networking. The author reviewed the features of standard IoT infrastructure, along with the cellular-based, low-power wide-area technologies (LPWA) such as eMTC, extended coverage (EC)-GSM-IoT, as well as noncellular, low-power wide-area (LPWA) technologies such as SigFox, LoRa etc.

In [ 14 ], the authors presented how 5G technology copes with the various issues of IoT today. It provides a brief review of existing and forming 5G architectures. The survey indicates the role of 5G in the foundation of the IoT ecosystem. IoT and 5G can easily combine with improved wireless technologies to set up the same ecosystem that can fulfill the current requirement for IoT devices. 5G can alter nature and will help to expand the development of IoT devices. As the process of 5G unfolds, global associations will find essentials for setting up a cross-industry engagement in determining and enlarging the 5G system.

In [ 66 ], the author introduced an IoT authentication scheme in a 5G network, with more excellent reliability and dynamic. The scheme proposed a privacy-protected procedure for selecting slices; it provided an additional fog node for proper data transmission and service types of the subscribers, along with service-oriented authentication and key understanding to maintain the secrecy, precision of users, and confidentiality of service factors. Users anonymously identify the IoT servers and develop a vital channel for service accessibility and data cached on local fog nodes and remote IoT servers. The author performed a simulation to manifest the security and privacy preservation of the user over the network.

This section covered various works done on 5G IoT by multiple authors. Table 8 shows how different author’s worked on the improvement of numerous parameters, i.e., data rate, security requirement, and performance with 5G IoT.

Summary of IoT-based approaches in 5G technology.

4.5. Machine Learning Techniques for 5G

Various machine learning (ML) techniques were applied in 5G networks and mobile communication. It provides a solution to multiple complex problems, which requires a lot of hand-tuning. ML techniques can be broadly classified as supervised, unsupervised, and reinforcement learning. Let’s discuss each learning technique separately and where it impacts the 5G network.

Supervised Learning, where user works with labeled data; some 5G network problems can be further categorized as classification and regression problems. Some regression problems such as scheduling nodes in 5G and energy availability can be predicted using Linear Regression (LR) algorithm. To accurately predict the bandwidth and frequency allocation Statistical Logistic Regression (SLR) is applied. Some supervised classifiers are applied to predict the network demand and allocate network resources based on the connectivity performance; it signifies the topology setup and bit rates. Support Vector Machine (SVM) and NN-based approximation algorithms are used for channel learning based on observable channel state information. Deep Neural Network (DNN) is also employed to extract solutions for predicting beamforming vectors at the BS’s by taking mapping functions and uplink pilot signals into considerations.

In unsupervised Learning, where the user works with unlabeled data, various clustering techniques are applied to enhance network performance and connectivity without interruptions. K-means clustering reduces the data travel by storing data centers content into clusters. It optimizes the handover estimation based on mobility pattern and selection of relay nodes in the V2V network. Hierarchical clustering reduces network failure by detecting the intrusion in the mobile wireless network; unsupervised soft clustering helps in reducing latency by clustering fog nodes. The nonparametric Bayesian unsupervised learning technique reduces traffic in the network by actively serving the user’s requests and demands. Other unsupervised learning techniques such as Adversarial Auto Encoders (AAE) and Affinity Propagation Clustering techniques detect irregular behavior in the wireless spectrum and manage resources for ultradense small cells, respectively.

In case of an uncertain environment in the 5G wireless network, reinforcement learning (RL) techniques are employed to solve some problems. Actor-critic reinforcement learning is used for user scheduling and resource allocation in the network. Markov decision process (MDP) and Partially Observable MDP (POMDP) is used for Quality of Experience (QoE)-based handover decision-making for Hetnets. Controls packet call admission in HetNets and channel access process for secondary users in a Cognitive Radio Network (CRN). Deep RL is applied to decide the communication channel and mobility and speeds up the secondary user’s learning rate using an antijamming strategy. Deep RL is employed in various 5G network application parameters such as resource allocation and security [ 67 ]. Table 9 shows the state-of-the-art ML-based solution for 5G network.

The state-of-the-art ML-based solution for 5G network.

Highlights of machine learning techniques for 5G are as follows:

An external file that holds a picture, illustration, etc.
Object name is sensors-22-00026-g006.jpg

Pictorial representation of machine learning (ML) in 5G.

  • In ML, a model will be defined which fulfills the desired requirements through which desired results are obtained. In the later stage, it examines accuracy from obtained results.
  • ML plays a vital role in 5G network analysis for threat detection, network load prediction, final arrangement, and network formation. Searching for a better balance between power, length of antennas, area, and network thickness crossed with the spontaneous use of services in the universe of individual users and types of devices.

In [ 79 ], author’s firstly describes the demands for the traditional authentication procedures and benefits of intelligent authentication. The intelligent authentication method was established to improve security practice in 5G-and-beyond wireless communication systems. Thereafter, the machine learning paradigms for intelligent authentication were organized into parametric and non-parametric research methods, as well as supervised, unsupervised, and reinforcement learning approaches. As a outcome, machine learning techniques provide a new paradigm into authentication under diverse network conditions and unstable dynamics. In addition, prompt intelligence to the security management to obtain cost-effective, better reliable, model-free, continuous, and situation-aware authentication.

In [ 68 ], the authors proposed a machine learning-based model to predict the traffic load at a particular location. They used a mobile network traffic dataset to train a model that can calculate the total number of user requests at a time. To launch access and mobility management function (AMF) instances according to the requirement as there were no predictions of user request the performance automatically degrade as AMF does not handle these requests at a time. Earlier threshold-based techniques were used to predict the traffic load, but that approach took too much time; therefore, the authors proposed RNN algorithm-based ML to predict the traffic load, which gives efficient results.

In [ 15 ], authors discussed the issue of network slice admission, resource allocation among subscribers, and how to maximize the profit of infrastructure providers. The author proposed a network slice admission control algorithm based on SMDP (decision-making process) that guarantees the subscribers’ best acceptance policies and satisfiability (tenants). They also suggested novel N3AC, a neural network-based algorithm that optimizes performance under various configurations, significantly outperforms practical and straightforward approaches.

This section includes various works done on 5G ML by different authors. Table 10 shows the state-of-the-art work on the improvement of various parameters such as energy efficiency, Quality of Services (QoS), and latency with 5G ML.

The state-of-the-art ML-based approaches in 5G technology.

4.6. Optimization Techniques for 5G

Optimization techniques may be applied to capture NP-Complete or NP-Hard problems in 5G technology. This section briefly describes various research works suggested for 5G technology based on optimization techniques.

In [ 80 ], Massive MIMO technology is used in 5G mobile network to make it more flexible and scalable. The MIMO implementation in 5G needs a significant number of radio frequencies is required in the RF circuit that increases the cost and energy consumption of the 5G network. This paper provides a solution that increases the cost efficiency and energy efficiency with many radio frequency chains for a 5G wireless communication network. They give an optimized energy efficient technique for MIMO antenna and mmWave technologies based 5G mobile communication network. The proposed Energy Efficient Hybrid Precoding (EEHP) algorithm to increase the energy efficiency for the 5G wireless network. This algorithm minimizes the cost of an RF circuit with a large number of RF chains.

In [ 16 ], authors have discussed the growing demand for energy efficiency in the next-generation networks. In the last decade, they have figured out the things in wireless transmissions, which proved a change towards pursuing green communication for the next generation system. The importance of adopting the correct EE metric was also reviewed. Further, they worked through the different approaches that can be applied in the future for increasing the network’s energy and posed a summary of the work that was completed previously to enhance the energy productivity of the network using these capabilities. A system design for EE development using relay selection was also characterized, along with an observation of distinct algorithms applied for EE in relay-based ecosystems.

In [ 81 ], authors presented how AI-based approach is used to the setup of Self Organizing Network (SON) functionalities for radio access network (RAN) design and optimization. They used a machine learning approach to predict the results for 5G SON functionalities. Firstly, the input was taken from various sources; then, prediction and clustering-based machine learning models were applied to produce the results. Multiple AI-based devices were used to extract the knowledge analysis to execute SON functionalities smoothly. Based on results, they tested how self-optimization, self-testing, and self-designing are done for SON. The author also describes how the proposed mechanism classifies in different orders.

In [ 82 ], investigators examined the working of OFDM in various channel environments. They also figured out the changes in frame duration of the 5G TDD frame design. Subcarrier spacing is beneficial to obtain a small frame length with control overhead. They provided various techniques to reduce the growing guard period (GP) and cyclic prefix (CP) like complete utilization of multiple subcarrier spacing, management and data parts of frame at receiver end, various uses of timing advance (TA) or total control of flexible CP size.

This section includes various works that were done on 5G optimization by different authors. Table 11 shows how other authors worked on the improvement of multiple parameters such as energy efficiency, power optimization, and latency with 5G optimization.

Summary of Optimization Based Approaches in 5G Technology.

5. Description of Novel 5G Features over 4G

This section presents descriptions of various novel features of 5G, namely, the concept of small cell, beamforming, and MEC.

5.1. Small Cell

Small cells are low-powered cellular radio access nodes which work in the range of 10 meters to a few kilometers. Small cells play a very important role in implementation of the 5G wireless network. Small cells are low power base stations which cover small areas. Small cells are quite similar with all the previous cells used in various wireless networks. However, these cells have some advantages like they can work with low power and they are also capable of working with high data rates. Small cells help in rollout of 5G network with ultra high speed and low latency communication. Small cells in the 5G network use some new technologies like MIMO, beamforming, and mmWave for high speed data transmission. The design of small cells hardware is very simple so its implementation is quite easier and faster. There are three types of small cell tower available in the market. Femtocells, picocells, and microcells [ 83 ]. As shown in the Table 12 .

Types of Small cells.

MmWave is a very high band spectrum between 30 to 300 GHz. As it is a significantly less used spectrum, it provides very high-speed wireless communication. MmWave offers ultra-wide bandwidth for next-generation mobile networks. MmWave has lots of advantages, but it has some disadvantages, too, such as mmWave signals are very high-frequency signals, so they have more collision with obstacles in the air which cause the signals loses energy quickly. Buildings and trees also block MmWave signals, so these signals cover a shorter distance. To resolve these issues, multiple small cell stations are installed to cover the gap between end-user and base station [ 18 ]. Small cell covers a very shorter range, so the installation of a small cell depends on the population of a particular area. Generally, in a populated place, the distance between each small cell varies from 10 to 90 meters. In the survey [ 20 ], various authors implemented small cells with massive MIMO simultaneously. They also reviewed multiple technologies used in 5G like beamforming, small cell, massive MIMO, NOMA, device to device (D2D) communication. Various problems like interference management, spectral efficiency, resource management, energy efficiency, and backhauling are discussed. The author also gave a detailed presentation of all the issues occurring while implementing small cells with various 5G technologies. As shown in the Figure 7 , mmWave has a higher range, so it can be easily blocked by the obstacles as shown in Figure 7 a. This is one of the key concerns of millimeter-wave signal transmission. To solve this issue, the small cell can be placed at a short distance to transmit the signals easily, as shown in Figure 7 b.

An external file that holds a picture, illustration, etc.
Object name is sensors-22-00026-g007.jpg

Pictorial representation of communication with and without small cells.

5.2. Beamforming

Beamforming is a key technology of wireless networks which transmits the signals in a directional manner. 5G beamforming making a strong wireless connection toward a receiving end. In conventional systems when small cells are not using beamforming, moving signals to particular areas is quite difficult. Beamforming counter this issue using beamforming small cells are able to transmit the signals in particular direction towards a device like mobile phone, laptops, autonomous vehicle and IoT devices. Beamforming is improving the efficiency and saves the energy of the 5G network. Beamforming is broadly divided into three categories: Digital beamforming, analog beamforming and hybrid beamforming. Digital beamforming: multiuser MIMO is equal to digital beamforming which is mainly used in LTE Advanced Pro and in 5G NR. In digital beamforming the same frequency or time resources can be used to transmit the data to multiple users at the same time which improves the cell capacity of wireless networks. Analog Beamforming: In mmWave frequency range 5G NR analog beamforming is a very important approach which improves the coverage. In digital beamforming there are chances of high pathloss in mmWave as only one beam per set of antenna is formed. While the analog beamforming saves high pathloss in mmWave. Hybrid beamforming: hybrid beamforming is a combination of both analog beamforming and digital beamforming. In the implementation of MmWave in 5G network hybrid beamforming will be used [ 84 ].

Wireless signals in the 4G network are spreading in large areas, and nature is not Omnidirectional. Thus, energy depletes rapidly, and users who are accessing these signals also face interference problems. The beamforming technique is used in the 5G network to resolve this issue. In beamforming signals are directional. They move like a laser beam from the base station to the user, so signals seem to be traveling in an invisible cable. Beamforming helps achieve a faster data rate; as the signals are directional, it leads to less energy consumption and less interference. In [ 21 ], investigators evolve some techniques which reduce interference and increase system efficiency of the 5G mobile network. In this survey article, the authors covered various challenges faced while designing an optimized beamforming algorithm. Mainly focused on different design parameters such as performance evaluation and power consumption. In addition, they also described various issues related to beamforming like CSI, computation complexity, and antenna correlation. They also covered various research to cover how beamforming helps implement MIMO in next-generation mobile networks [ 85 ]. Figure 8 shows the pictorial representation of communication with and without using beamforming.

An external file that holds a picture, illustration, etc.
Object name is sensors-22-00026-g008.jpg

Pictorial Representation of communication with and without using beamforming.

5.3. Mobile Edge Computing

Mobile Edge Computing (MEC) [ 24 ]: MEC is an extended version of cloud computing that brings cloud resources closer to the end-user. When we talk about computing, the very first thing that comes to our mind is cloud computing. Cloud computing is a very famous technology that offers many services to end-user. Still, cloud computing has many drawbacks. The services available in the cloud are too far from end-users that create latency, and cloud user needs to download the complete application before use, which also increases the burden to the device [ 86 ]. MEC creates an edge between the end-user and cloud server, bringing cloud computing closer to the end-user. Now, all the services, namely, video conferencing, virtual software, etc., are offered by this edge that improves cloud computing performance. Another essential feature of MEC is that the application is split into two parts, which, first one is available at cloud server, and the second is at the user’s device. Therefore, the user need not download the complete application on his device that increases the performance of the end user’s device. Furthermore, MEC provides cloud services at very low latency and less bandwidth. In [ 23 , 87 ], the author’s investigation proved that successful deployment of MEC in 5G network increases the overall performance of 5G architecture. Graphical differentiation between cloud computing and mobile edge computing is presented in Figure 9 .

An external file that holds a picture, illustration, etc.
Object name is sensors-22-00026-g009.jpg

Pictorial representation of cloud computing vs. mobile edge computing.

6. 5G Security

Security is the key feature in the telecommunication network industry, which is necessary at various layers, to handle 5G network security in applications such as IoT, Digital forensics, IDS and many more [ 88 , 89 ]. The authors [ 90 ], discussed the background of 5G and its security concerns, challenges and future directions. The author also introduced the blockchain technology that can be incorporated with the IoT to overcome the challenges in IoT. The paper aims to create a security framework which can be incorporated with the LTE advanced network, and effective in terms of cost, deployment and QoS. In [ 91 ], author surveyed various form of attacks, the security challenges, security solutions with respect to the affected technology such as SDN, Network function virtualization (NFV), Mobile Clouds and MEC, and security standardizations of 5G, i.e., 3GPP, 5GPPP, Internet Engineering Task Force (IETF), Next Generation Mobile Networks (NGMN), European Telecommunications Standards Institute (ETSI). In [ 92 ], author elaborated various technological aspects, security issues and their existing solutions and also mentioned the new emerging technological paradigms for 5G security such as blockchain, quantum cryptography, AI, SDN, CPS, MEC, D2D. The author aims to create new security frameworks for 5G for further use of this technology in development of smart cities, transportation and healthcare. In [ 93 ], author analyzed the threats and dark threat, security aspects concerned with SDN and NFV, also their Commercial & Industrial Security Corporation (CISCO) 5G vision and new security innovations with respect to the new evolving architectures of 5G [ 94 ].

AuthenticationThe identification of the user in any network is made with the help of authentication. The different mobile network generations from 1G to 5G have used multiple techniques for user authentication. 5G utilizes the 5G Authentication and Key Agreement (AKA) authentication method, which shares a cryptographic key between user equipment (UE) and its home network and establishes a mutual authentication process between the both [ 95 ].

Access Control To restrict the accessibility in the network, 5G supports access control mechanisms to provide a secure and safe environment to the users and is controlled by network providers. 5G uses simple public key infrastructure (PKI) certificates for authenticating access in the 5G network. PKI put forward a secure and dynamic environment for the 5G network. The simple PKI technique provides flexibility to the 5G network; it can scale up and scale down as per the user traffic in the network [ 96 , 97 ].

Communication Security 5G deals to provide high data bandwidth, low latency, and better signal coverage. Therefore secure communication is the key concern in the 5G network. UE, mobile operators, core network, and access networks are the main focal point for the attackers in 5G communication. Some of the common attacks in communication at various segments are Botnet, message insertion, micro-cell, distributed denial of service (DDoS), and transport layer security (TLS)/secure sockets layer (SSL) attacks [ 98 , 99 ].

Encryption The confidentiality of the user and the network is done using encryption techniques. As 5G offers multiple services, end-to-end (E2E) encryption is the most suitable technique applied over various segments in the 5G network. Encryption forbids unauthorized access to the network and maintains the data privacy of the user. To encrypt the radio traffic at Packet Data Convergence Protocol (PDCP) layer, three 128-bits keys are applied at the user plane, nonaccess stratum (NAS), and access stratum (AS) [ 100 ].

7. Summary of 5G Technology Based on Above-Stated Challenges

In this section, various issues addressed by investigators in 5G technologies are presented in Table 13 . In addition, different parameters are considered, such as throughput, latency, energy efficiency, data rate, spectral efficiency, fairness & computing capacity, transmission rate, coverage, cost, security requirement, performance, QoS, power optimization, etc., indexed from R1 to R14.

Summary of 5G Technology above stated challenges (R1:Throughput, R2:Latency, R3:Energy Efficiency, R4:Data Rate, R5:Spectral efficiency, R6:Fairness & Computing Capacity, R7:Transmission Rate, R8:Coverage, R9:Cost, R10:Security requirement, R11:Performance, R12:Quality of Services (QoS), R13:Power Optimization).

8. Conclusions

This survey article illustrates the emergence of 5G, its evolution from 1G to 5G mobile network, applications, different research groups, their work, and the key features of 5G. It is not just a mobile broadband network, different from all the previous mobile network generations; it offers services like IoT, V2X, and Industry 4.0. This paper covers a detailed survey from multiple authors on different technologies in 5G, such as massive MIMO, Non-Orthogonal Multiple Access (NOMA), millimeter wave, small cell, MEC (Mobile Edge Computing), beamforming, optimization, and machine learning in 5G. After each section, a tabular comparison covers all the state-of-the-research held in these technologies. This survey also shows the importance of these newly added technologies and building a flexible, scalable, and reliable 5G network.

9. Future Findings

This article covers a detailed survey on the 5G mobile network and its features. These features make 5G more reliable, scalable, efficient at affordable rates. As discussed in the above sections, numerous technical challenges originate while implementing those features or providing services over a 5G mobile network. So, for future research directions, the research community can overcome these challenges while implementing these technologies (MIMO, NOMA, small cell, mmWave, beam-forming, MEC) over a 5G network. 5G communication will bring new improvements over the existing systems. Still, the current solutions cannot fulfill the autonomous system and future intelligence engineering requirements after a decade. There is no matter of discussion that 5G will provide better QoS and new features than 4G. But there is always room for improvement as the considerable growth of centralized data and autonomous industry 5G wireless networks will not be capable of fulfilling their demands in the future. So, we need to move on new wireless network technology that is named 6G. 6G wireless network will bring new heights in mobile generations, as it includes (i) massive human-to-machine communication, (ii) ubiquitous connectivity between the local device and cloud server, (iii) creation of data fusion technology for various mixed reality experiences and multiverps maps. (iv) Focus on sensing and actuation to control the network of the entire world. The 6G mobile network will offer new services with some other technologies; these services are 3D mapping, reality devices, smart homes, smart wearable, autonomous vehicles, artificial intelligence, and sense. It is expected that 6G will provide ultra-long-range communication with a very low latency of 1 ms. The per-user bit rate in a 6G wireless network will be approximately 1 Tbps, and it will also provide wireless communication, which is 1000 times faster than 5G networks.

Acknowledgments

Author contributions.

Conceptualization: R.D., I.Y., G.C., P.L. data gathering: R.D., G.C., P.L, I.Y. funding acquisition: I.Y. investigation: I.Y., G.C., G.P. methodology: R.D., I.Y., G.C., P.L., G.P., survey: I.Y., G.C., P.L, G.P., R.D. supervision: G.C., I.Y., G.P. validation: I.Y., G.P. visualization: R.D., I.Y., G.C., P.L. writing, original draft: R.D., I.Y., G.C., P.L., G.P. writing, review, and editing: I.Y., G.C., G.P. All authors have read and agreed to the published version of the manuscript.

This paper was supported by Soonchunhyang University.

Institutional Review Board Statement

Informed consent statement, data availability statement, conflicts of interest.

The authors declare no conflict of interest.

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

  • View all journals

Technology articles from across Nature Portfolio

research papers on it

Flexible fibres take fabrics into the information age

A technique for embedding fibres with semiconductor devices produces defect-free strands that are hundreds of metres long. Garments woven with these threads offer a tantalizing glimpse of the wearable electronics of the future.

  • Xiaoting Jia
  • Alex Parrott

Latest Research and Reviews

research papers on it

Optimizing skin disease diagnosis: harnessing online community data with contrastive learning and clustering techniques

research papers on it

Beyond the 510(k): The regulation of novel moderate-risk medical devices, intellectual property considerations, and innovation incentives in the FDA’s De Novo pathway

  • Cristina Crespo
  • Ariel Stern

research papers on it

The potential use of supercritical carbon dioxide in sugarcane juice processing

  • Fernanda Cristina Pimenta
  • Talita Cristiane Krice Moraes
  • Rodrigo Rodrigues Petrus

research papers on it

Neurodesk: an accessible, flexible and portable data analysis environment for reproducible neuroimaging

Neurodesk is a platform for analyzing human neuroimaging data, which provides numerous tools in a containerized form, thereby ensuring reproducibility and portability.

  • Angela I. Renton
  • Thuy T. Dao
  • Steffen Bollmann

research papers on it

Selective knowledge sharing for privacy-preserving federated distillation without a good teacher

While federated learning is promising for efficient collaborative learning without revealing local data, it remains vulnerable to white-box privacy attacks, suffers from high communication overhead, and struggles to adapt to heterogeneous models. Here, the authors show a federated distillation method to tackle these challenges, which leverages the strengths of knowledge distillation in a federated learning setting.

  • Jiawei Shao
  • Fangzhao Wu

research papers on it

How citizens engage with the social media presence of climate authorities: the case of five Brazilian cities

  • Lesandro Ponciano

Advertisement

News and Comment

research papers on it

Building robots to get kids hooked on STEM subjects

Robotics are a key part of the Fundi Bots education program and its aim to excite children about science and technology.

AI-based diabetes care: risk prediction models and implementation concerns

The utilization of artificial intelligence (AI) in diabetes care has focused on early intervention and treatment management. Notably, usage has expanded to predict an individual’s risk for developing type 2 diabetes. A scoping review of 40 studies by Mohsen et al. shows that while most studies used unimodal AI models, multimodal approaches were superior because they integrate multiple types of data. However, creating multimodal models and determining model performance are challenging tasks given the multi-factored nature of diabetes. For both unimodal and multimodal models, there are also concerns of bias with the lack of external validations and representation of race, age, and gender in training data. The barriers in data quality and evaluation standardization are ripe areas for developing new technologies, especially for entrepreneurs and innovators. Collaboration amongst providers, entrepreneurs, and researchers must be prioritized to ensure that AI in diabetes care is providing quality and equitable patient care.

  • Serena C. Y. Wang
  • Grace Nickel
  • Joseph C. Kvedar

research papers on it

Techno-optimism needs a reality check

  • Mark Buchanan

research papers on it

Information is a determinant of health

  • Garth Graham
  • Karen DeSalvo

research papers on it

Private Moon launch a success! But will the craft land safely on the lunar surface?

Anxiety is high as the company Intuitive Machines takes its first crack at a touchdown.

  • Alexandra Witze

research papers on it

Apple Vision Pro: what does it mean for scientists?

The headset opens up possibilities in accessibility and medical research — and raises concerns about human behaviour.

  • Jonathan O'Callaghan

Quick links

  • Explore articles by subject
  • Guide to authors
  • Editorial policies

research papers on it

computer science Recently Published Documents

Total documents.

  • Latest Documents
  • Most Cited Documents
  • Contributed Authors
  • Related Sources
  • Related Keywords

Hiring CS Graduates: What We Learned from Employers

Computer science ( CS ) majors are in high demand and account for a large part of national computer and information technology job market applicants. Employment in this sector is projected to grow 12% between 2018 and 2028, which is faster than the average of all other occupations. Published data are available on traditional non-computer science-specific hiring processes. However, the hiring process for CS majors may be different. It is critical to have up-to-date information on questions such as “what positions are in high demand for CS majors?,” “what is a typical hiring process?,” and “what do employers say they look for when hiring CS graduates?” This article discusses the analysis of a survey of 218 recruiters hiring CS graduates in the United States. We used Atlas.ti to analyze qualitative survey data and report the results on what positions are in the highest demand, the hiring process, and the resume review process. Our study revealed that a software developer was the most common job the recruiters were looking to fill. We found that the hiring process steps for CS graduates are generally aligned with traditional hiring steps, with an additional emphasis on technical and coding tests. Recruiters reported that their hiring choices were based on reviewing resume’s experience, GPA, and projects sections. The results provide insights into the hiring process, decision making, resume analysis, and some discrepancies between current undergraduate CS program outcomes and employers’ expectations.

A Systematic Literature Review of Empiricism and Norms of Reporting in Computing Education Research Literature

Context. Computing Education Research (CER) is critical to help the computing education community and policy makers support the increasing population of students who need to learn computing skills for future careers. For a community to systematically advance knowledge about a topic, the members must be able to understand published work thoroughly enough to perform replications, conduct meta-analyses, and build theories. There is a need to understand whether published research allows the CER community to systematically advance knowledge and build theories. Objectives. The goal of this study is to characterize the reporting of empiricism in Computing Education Research literature by identifying whether publications include content necessary for researchers to perform replications, meta-analyses, and theory building. We answer three research questions related to this goal: (RQ1) What percentage of papers in CER venues have some form of empirical evaluation? (RQ2) Of the papers that have empirical evaluation, what are the characteristics of the empirical evaluation? (RQ3) Of the papers that have empirical evaluation, do they follow norms (both for inclusion and for labeling of information needed for replication, meta-analysis, and, eventually, theory-building) for reporting empirical work? Methods. We conducted a systematic literature review of the 2014 and 2015 proceedings or issues of five CER venues: Technical Symposium on Computer Science Education (SIGCSE TS), International Symposium on Computing Education Research (ICER), Conference on Innovation and Technology in Computer Science Education (ITiCSE), ACM Transactions on Computing Education (TOCE), and Computer Science Education (CSE). We developed and applied the CER Empiricism Assessment Rubric to the 427 papers accepted and published at these venues over 2014 and 2015. Two people evaluated each paper using the Base Rubric for characterizing the paper. An individual person applied the other rubrics to characterize the norms of reporting, as appropriate for the paper type. Any discrepancies or questions were discussed between multiple reviewers to resolve. Results. We found that over 80% of papers accepted across all five venues had some form of empirical evaluation. Quantitative evaluation methods were the most frequently reported. Papers most frequently reported results on interventions around pedagogical techniques, curriculum, community, or tools. There was a split in papers that had some type of comparison between an intervention and some other dataset or baseline. Most papers reported related work, following the expectations for doing so in the SIGCSE and CER community. However, many papers were lacking properly reported research objectives, goals, research questions, or hypotheses; description of participants; study design; data collection; and threats to validity. These results align with prior surveys of the CER literature. Conclusions. CER authors are contributing empirical results to the literature; however, not all norms for reporting are met. We encourage authors to provide clear, labeled details about their work so readers can use the study methodologies and results for replications and meta-analyses. As our community grows, our reporting of CER should mature to help establish computing education theory to support the next generation of computing learners.

Light Diacritic Restoration to Disambiguate Homographs in Modern Arabic Texts

Diacritic restoration (also known as diacritization or vowelization) is the process of inserting the correct diacritical markings into a text. Modern Arabic is typically written without diacritics, e.g., newspapers. This lack of diacritical markings often causes ambiguity, and though natives are adept at resolving, there are times they may fail. Diacritic restoration is a classical problem in computer science. Still, as most of the works tackle the full (heavy) diacritization of text, we, however, are interested in diacritizing the text using a fewer number of diacritics. Studies have shown that a fully diacritized text is visually displeasing and slows down the reading. This article proposes a system to diacritize homographs using the least number of diacritics, thus the name “light.” There is a large class of words that fall under the homograph category, and we will be dealing with the class of words that share the spelling but not the meaning. With fewer diacritics, we do not expect any effect on reading speed, while eye strain is reduced. The system contains morphological analyzer and context similarities. The morphological analyzer is used to generate all word candidates for diacritics. Then, through a statistical approach and context similarities, we resolve the homographs. Experimentally, the system shows very promising results, and our best accuracy is 85.6%.

A genre-based analysis of questions and comments in Q&A sessions after conference paper presentations in computer science

Gender diversity in computer science at a large public r1 research university: reporting on a self-study.

With the number of jobs in computer occupations on the rise, there is a greater need for computer science (CS) graduates than ever. At the same time, most CS departments across the country are only seeing 25–30% of women students in their classes, meaning that we are failing to draw interest from a large portion of the population. In this work, we explore the gender gap in CS at Rutgers University–New Brunswick, a large public R1 research university, using three data sets that span thousands of students across six academic years. Specifically, we combine these data sets to study the gender gaps in four core CS courses and explore the correlation of several factors with retention and the impact of these factors on changes to the gender gap as students proceed through the CS courses toward completing the CS major. For example, we find that a significant percentage of women students taking the introductory CS1 course for majors do not intend to major in CS, which may be a contributing factor to a large increase in the gender gap immediately after CS1. This finding implies that part of the retention task is attracting these women students to further explore the major. Results from our study include both novel findings and findings that are consistent with known challenges for increasing gender diversity in CS. In both cases, we provide extensive quantitative data in support of the findings.

Designing for Student-Directedness: How K–12 Teachers Utilize Peers to Support Projects

Student-directed projects—projects in which students have individual control over what they create and how to create it—are a promising practice for supporting the development of conceptual understanding and personal interest in K–12 computer science classrooms. In this article, we explore a central (and perhaps counterintuitive) design principle identified by a group of K–12 computer science teachers who support student-directed projects in their classrooms: in order for students to develop their own ideas and determine how to pursue them, students must have opportunities to engage with other students’ work. In this qualitative study, we investigated the instructional practices of 25 K–12 teachers using a series of in-depth, semi-structured interviews to develop understandings of how they used peer work to support student-directed projects in their classrooms. Teachers described supporting their students in navigating three stages of project development: generating ideas, pursuing ideas, and presenting ideas. For each of these three stages, teachers considered multiple factors to encourage engagement with peer work in their classrooms, including the quality and completeness of shared work and the modes of interaction with the work. We discuss how this pedagogical approach offers students new relationships to their own learning, to their peers, and to their teachers and communicates important messages to students about their own competence and agency, potentially contributing to aims within computer science for broadening participation.

Creativity in CS1: A Literature Review

Computer science is a fast-growing field in today’s digitized age, and working in this industry often requires creativity and innovative thought. An issue within computer science education, however, is that large introductory programming courses often involve little opportunity for creative thinking within coursework. The undergraduate introductory programming course (CS1) is notorious for its poor student performance and retention rates across multiple institutions. Integrating opportunities for creative thinking may help combat this issue by adding a personal touch to course content, which could allow beginner CS students to better relate to the abstract world of programming. Research on the role of creativity in computer science education (CSE) is an interesting area with a lot of room for exploration due to the complexity of the phenomenon of creativity as well as the CSE research field being fairly new compared to some other education fields where this topic has been more closely explored. To contribute to this area of research, this article provides a literature review exploring the concept of creativity as relevant to computer science education and CS1 in particular. Based on the review of the literature, we conclude creativity is an essential component to computer science, and the type of creativity that computer science requires is in fact, a teachable skill through the use of various tools and strategies. These strategies include the integration of open-ended assignments, large collaborative projects, learning by teaching, multimedia projects, small creative computational exercises, game development projects, digitally produced art, robotics, digital story-telling, music manipulation, and project-based learning. Research on each of these strategies and their effects on student experiences within CS1 is discussed in this review. Last, six main components of creativity-enhancing activities are identified based on the studies about incorporating creativity into CS1. These components are as follows: Collaboration, Relevance, Autonomy, Ownership, Hands-On Learning, and Visual Feedback. The purpose of this article is to contribute to computer science educators’ understanding of how creativity is best understood in the context of computer science education and explore practical applications of creativity theory in CS1 classrooms. This is an important collection of information for restructuring aspects of future introductory programming courses in creative, innovative ways that benefit student learning.

CATS: Customizable Abstractive Topic-based Summarization

Neural sequence-to-sequence models are the state-of-the-art approach used in abstractive summarization of textual documents, useful for producing condensed versions of source text narratives without being restricted to using only words from the original text. Despite the advances in abstractive summarization, custom generation of summaries (e.g., towards a user’s preference) remains unexplored. In this article, we present CATS, an abstractive neural summarization model that summarizes content in a sequence-to-sequence fashion while also introducing a new mechanism to control the underlying latent topic distribution of the produced summaries. We empirically illustrate the efficacy of our model in producing customized summaries and present findings that facilitate the design of such systems. We use the well-known CNN/DailyMail dataset to evaluate our model. Furthermore, we present a transfer-learning method and demonstrate the effectiveness of our approach in a low resource setting, i.e., abstractive summarization of meetings minutes, where combining the main available meetings’ transcripts datasets, AMI and International Computer Science Institute(ICSI) , results in merely a few hundred training documents.

Exploring students’ and lecturers’ views on collaboration and cooperation in computer science courses - a qualitative analysis

Factors affecting student educational choices regarding oer material in computer science, export citation format, share document.

  • Survey Paper
  • Open access
  • Published: 09 December 2019

Internet of Things is a revolutionary approach for future technology enhancement: a review

  • Sachin Kumar   ORCID: orcid.org/0000-0003-3949-0302 1 ,
  • Prayag Tiwari 2 &
  • Mikhail Zymbler 1  

Journal of Big Data volume  6 , Article number:  111 ( 2019 ) Cite this article

236k Accesses

445 Citations

43 Altmetric

Metrics details

Internet of Things (IoT) is a new paradigm that has changed the traditional way of living into a high tech life style. Smart city, smart homes, pollution control, energy saving, smart transportation, smart industries are such transformations due to IoT. A lot of crucial research studies and investigations have been done in order to enhance the technology through IoT. However, there are still a lot of challenges and issues that need to be addressed to achieve the full potential of IoT. These challenges and issues must be considered from various aspects of IoT such as applications, challenges, enabling technologies, social and environmental impacts etc. The main goal of this review article is to provide a detailed discussion from both technological and social perspective. The article discusses different challenges and key issues of IoT, architecture and important application domains. Also, the article bring into light the existing literature and illustrated their contribution in different aspects of IoT. Moreover, the importance of big data and its analysis with respect to IoT has been discussed. This article would help the readers and researcher to understand the IoT and its applicability to the real world.

Introduction

The Internet of Things (IoT) is an emerging paradigm that enables the communication between electronic devices and sensors through the internet in order to facilitate our lives. IoT use smart devices and internet to provide innovative solutions to various challenges and issues related to various business, governmental and public/private industries across the world [ 1 ]. IoT is progressively becoming an important aspect of our life that can be sensed everywhere around us. In whole, IoT is an innovation that puts together extensive variety of smart systems, frameworks and intelligent devices and sensors (Fig.  1 ). Moreover, it takes advantage of quantum and nanotechnology in terms of storage, sensing and processing speed which were not conceivable beforehand [ 2 ]. Extensive research studies have been done and available in terms of scientific articles, press reports both on internet and in the form of printed materials to illustrate the potential effectiveness and applicability of IoT transformations. It could be utilized as a preparatory work before making novel innovative business plans while considering the security, assurance and interoperability.

figure 1

General architecture of IoT

A great transformation can be observed in our daily routine life along with the increasing involvement of IoT devices and technology. One such development of IoT is the concept of Smart Home Systems (SHS) and appliances that consist of internet based devices, automation system for homes and reliable energy management system [ 3 ]. Besides, another important achievement of IoT is Smart Health Sensing system (SHSS). SHSS incorporates small intelligent equipment and devices to support the health of the human being. These devices can be used both indoors and outdoors to check and monitor the different health issues and fitness level or the amount of calories burned in the fitness center etc. Also, it is being used to monitor the critical health conditions in the hospitals and trauma centers as well. Hence, it has changed the entire scenario of the medical domain by facilitating it with high technology and smart devices [ 4 , 5 ]. Moreover, IoT developers and researchers are actively involved to uplift the life style of the disabled and senior age group people. IoT has shown a drastic performance in this area and has provided a new direction for the normal life of such people. As these devices and equipment are very cost effective in terms of development cost and easily available within a normal price range, hence most of the people are availing them [ 6 ]. Thanks to IoT, as they can live a normal life. Another important aspect of our life is transportation. IoT has brought up some new advancements to make it more efficient, comfortable and reliable. Intelligent sensors, drone devices are now controlling the traffic at different signalized intersections across major cities. In addition, vehicles are being launched in markets with pre-installed sensing devices that are able to sense the upcoming heavy traffic congestions on the map and may suggest you another route with low traffic congestion [ 7 ]. Therefore IoT has a lot to serve in various aspects of life and technology. We may conclude that IoT has a lot of scope both in terms of technology enhancement and facilitate the humankind.

IoT has also shown its importance and potential in the economic and industrial growth of a developing region. Also, in trade and stock exchange market, it is being considered as a revolutionary step. However, security of data and information is an important concern and highly desirable, which is a major challenging issue to deal with [ 5 ]. Internet being a largest source of security threats and cyber-attacks has opened the various doors for hackers and thus made the data and information insecure. However, IoT is committed to provide the best possible solutions to deal with security issues of data and information. Hence, the most important concern of IoT in trade and economy is security. Therefore, the development of a secure path for collaboration between social networks and privacy concerns is a hot topic in IoT and IoT developers are working hard for this.

The remaining part of the article is organized as follows: “ Literature survey ” section will provide state of art on important studies that addressed various challenges and issues in IoT. “ IoT architecture and technologies ” section discussed the IoT functional blocks, architecture in detail. In “ Major key issues and challenges of IoT ” section, important key issues and challenges of IoT is discussed. “ Major IoT applications ” section provides emerging application domains of IoT. In “ Importance of big data analytics in IoT ” section, the role and importance of big data and its analysis is discussed. Finally, the article concluded in “ Conclusions ” section.

Literature survey

IoT has a multidisciplinary vision to provide its benefit to several domains such as environmental, industrial, public/private, medical, transportation etc. Different researchers have explained the IoT differently with respect to specific interests and aspects. The potential and power of IoT can be seen in several application domains. Figure  2 illustrates few of the application domains of IoTs potentials.

figure 2

Some of the potential application domains of IoT

Various important IoT projects have taken charge over the market in last few years. Some of the important IoT projects that have captured most of the market are shown in Fig.  3 . In Fig.  3 , a global distribution of these IoT projects is shown among American, European and Asia/Pacific region. It can be seen that American continent are contributing more in the health care and smart supply chain projects whereas contribution of European continent is more in the smart city projects [ 8 ].

figure 3

Global distribution of IoT projects among America (USA, South America and Canada), Europe and APAC (Asia and Pacific region) [ 8 ]

Figure  4 , illustrates the global market share of IoT projects worldwide [ 8 ]. It is evident that industry, smart city, smart energy and smart vehicle based IoT projects have a big market share in comparison to others.

figure 4

Global share of IoT projects across the world [ 8 ]

Smart city is one of the trendy application areas of IoT that incorporates smart homes as well. Smart home consists of IoT enabled home appliances, air-conditioning/heating system, television, audio/video streaming devices, and security systems which are communicating with each other in order to provide best comfort, security and reduced energy consumption. All this communication takes place through IoT based central control unit using Internet. The concept of smart city gained popularity in the last decade and attracted a lot of research activities [ 9 ]. The smart home business economy is about to cross the 100 billion dollars by 2022 [ 10 ]. Smart home does not only provide the in-house comfort but also benefits the house owner in cost cutting in several aspects i.e. low energy consumption will results in comparatively lower electricity bill. Besides smart homes, another category that comes within smart city is smart vehicles. Modern cars are equipped with intelligent devices and sensors that control most of the components from the headlights of the car to the engine [ 11 ]. The IoT is committed towards developing a new smart car systems that incorporates wireless communication between car-to-car and car-to-driver to ensure predictive maintenance with comfortable and safe driving experience [ 12 ].

Khajenasiri et al. [ 10 ] performed a survey on the IoT solutions for smart energy control to benefit the smart city applications. They stated that at present IoT has been deployed in very few application areas to serve the technology and people. The scope of IoT is very wide and in near future IoT is able to capture almost all application areas. They mentioned that energy saving is one of the important part of the society and IoT can assist in developing a smart energy control system that will save both energy and money. They described an IoT architecture with respect to smart city concept. The authors also discussed that one of the challenging task in achieving this is the immaturity of IoT hardware and software. They suggested that these issues must be resolved to ensure a reliable, efficient and user friendly IoT system.

Alavi et al. [ 13 ] addressed the urbanization issue in the cities. The movement of people from rural to urban atmosphere resulting in growing population of the cities. Therefore, there is a need to provide smart solutions for mobility, energy, healthcare and infrastructure. Smart city is one of the important application areas for IoT developers. It explores several issues such as traffic management, air quality management, public safety solutions, smart parking, smart lightning and smart waste collection (Fig.  5 ). They mentioned that IoT is working hard to tackle these challenging issues. The need for improved smart city infrastructure with growing urbanization has opened the doors for entrepreneurs in the field of smart city technologies. The authors concluded that IoT enabled technology is very important for the development of sustainable smart cities.

figure 5

Potential IoT application areas for smart cities

Another important issue of IoT that requires attention and a lot of research is security and privacy. Weber [ 14 ] focused on these issues and suggested that a private organization availing IoT must incorporate data authentication, access control, resilience to attacks and client privacy into their business activities that would be an additional advantage. Weber suggested that in order to define global security and privacy issues, IoT developers must take into account the geographical limitations of the different countries. A generic framework needs to be designed to fit the global needs in terms of privacy and security. It is highly recommended to investigate and recognize the issues and challenges in privacy and security before developing the full fledge working IoT framework.

Later, Heer et al. [ 15 ] came up with a security issue in IP based IoT system. They mentioned that internet is backbone for the communication among devices that takes place in an IoT system. Therefore, security issues in IP based IoT systems are an important concern. In addition, security architecture should be designed considering the life cycle and capabilities of any object in the IoT system. It also includes the involvement of the trusted third party and the security protocols. The security architecture with scalability potential to serve the small-scale to large-scale things in IoT is highly desirable. The study pointed out that IoT gave rise to a new way of communication among several things across the network therefore traditional end to end internet protocol are not able to provide required support to this communication. Therefore, new protocols must be designed considering the translations at the gateways to ensure end-to-end security. Moreover, all the layers responsible for communication has their own security issues and requirements. Therefore, satisfying the requirements for one particular layers will leave the system into a vulnerable state and security should be ensured for all the layers.

Authentication and access control is another issue in IoT that needs promising solutions to strengthen the security. Liu et al. [ 16 ] brought up a solution to handle authentication and access control. Authentication is very important to verify the communicating parties to prevent the loss of confidential information. Liu et al. [ 16 ] provided an authentication scheme based on Elliptic Curve Cryptosystem and verified it on different security threats i.e. eavesdropping, man-in-the-middle attack, key control and replay attack. They claimed that there proposed schemes are able to provide better authentication and access control in IoT based communication. Later, Kothmayr et al. [ 17 ] proposed a two-way authentication scheme based of datagram transport layer security (DTLS) for IoT. The attackers over the internet are always active to steal the secured information. The proposed approach are able to provide message security, integrity, authenticity and confidentiality, memory overhead and end-to-end latency in the IoT based communication network.

Li et al. [ 18 ] proposed a dynamic approach for data centric IoT applications with respect to cloud platforms. The need of an appropriate device, software configuration and infrastructure requires efficient solutions to support massive amount of IoT applications that are running on cloud platforms. IoT developers and researchers are actively engaged in developing solutions considering both massive platforms and heterogeneous nature of IoT objects and devices. Olivier et al. [ 19 ] explained the concept of software defined networking (SDN) based architecture that performs well even if a well-defined architecture is not available. They proposed that SDN based security architecture is more flexible and efficient for IoT.

Luk et al. [ 20 ] stated that the main task of a secure sensor network (SSN) is to provide data privacy, protection from replay attacks and authentication. They discussed two popular SSN services namely TinySec [ 21 ] and ZigBee [ 22 ]. They mentioned that although both the SSN services are efficient and reliable, however, ZigBee is comparatively provides higher security but consumes high energy whereas TinySec consumes low energy but not as highly secured as ZigBee. They proposed another architecture MiniSec to support high security and low energy consumption and demonstrated its performance for the Telos platform. Yan et al. [ 23 ] stated that trust management is an important issue in IoT. Trust management helps people to understand and trust IoT services and applications without worrying about uncertainty issues and risks [ 24 ]. They investigated different issues in trust management and discussed its importance with respect to IoT developers and users.

Noura et al. [ 25 ] stated the importance of interoperability in IoT as it allows integration of devices, services from different heterogeneous platforms to provide the efficient and reliable service. Several other studies focused on the importance of interoperability and discussed several challenges that interoperability issue is facing in IoT [ 26 , 27 , 28 ]. Kim et al. [ 29 ] addressed the issue of climate change and proposed an IoT based ecological monitoring system. They mentioned that existing approaches are time consuming and required a lot of human intervention. Also, a routine visit is required to collect the information from the sensors installed at the site under investigation. Also, some information remained missing which leads to not highly accurate analysis. Therefore, IoT based framework is able to solve this problem and can provide high accuracy in analysis and prediction. Later, Wang et al. [ 30 ] shows their concern for domestic waste water treatment. They discussed several deficiencies in the process of waste water treatment and dynamic monitoring system and suggested effective solutions based on IoT. They stated that IoT can be very effective in the waste water treatment and process monitoring.

Agriculture is one of the important domain around the world. Agriculture depends on several factors i.e. geographical, ecological etc. Qiu et al. [ 31 ] stated that technology that is being used for ecosystem control is immature with low intelligence level. They mentioned that it could be a good application area for IoT developers and researchers.

Qiu et al. [ 31 ] proposed an intelligent monitoring platform framework for facility agriculture ecosystem based on IoT that consists of four layer mechanism to manage the agriculture ecosystem. Each layer is responsible for specific task and together the framework is able to achieve a better ecosystem with reduced human intervention.

Another important concern around the world is climate change due to global warming. Fang et al. [ 32 ] introduced an integrated information system (IIS) that integrates IoT, geo-informatics, cloud computing, global positioning system (GPS), geographical information system (GIS) and e-science in order to provide an effective environmental monitoring and control system. They mentioned that the proposed IIS provides improved data collection, analysis and decision making for climate control. Air pollution is another important concern worldwide. Various tools and techniques are available to air quality measures and control. Cheng et al. [ 33 ] proposed AirCloud which is a cloud based air quality and monitoring system. They deployed AirCloud and evaluated its performance using 5 months data for the continuous duration of 2 months.

Temglit et al. [ 34 ] considered Quality of Service (QoS) as an important challenge and a complex task in evaluation and selection of IoT devices, protocols and services. QoS is very important criteria to attract and gain trust of users towards IoT services and devices. They came up with an interesting distributed QoS selection approach. This approach was based on distributed constraint optimization problem and multi-agent paradigm. Further, the approach was evaluated based on several experiments under realistic distributed environments. Another important aspect of IoT is its applicability to the environmental and agriculture standards. Talavera et al. [ 35 ] focused in this direction and presented the fundamental efforts of IoT for agro-industrial and environmental aspects in a survey study. They mentioned that the efforts of IoT in these areas are noticeable. IoT is strengthening the current technology and benefiting the farmers and society. Jara et al. [ 36 ] discussed the importance of IoT based monitoring of patients health. They suggested that IoT devices and sensors with the help of internet can assist health monitoring of patients. They also proposed a framework and protocol to achieve their objective. Table 1 provides a summary of the important studies and the direction of research with a comparison of studies on certain evaluation parameters.

IoT architecture and technologies

The IoT architecture consists of five important layers that defines all the functionalities of IoT systems. These layers are perception layer, network layer, middleware layer, application layer, business layer. At the bottom of IoT architecture, perception layer exists that consists of physical devices i.e. sensors, RFID chips, barcodes etc. and other physical objects connected in IoT network. These devices collects information in order to deliver it to the network layer. Network layer works as a transmission medium to deliver the information from perception layer to the information processing system. This transmission of information may use any wired/wireless medium along with 3G/4G, Wi-Fi, Bluetooth etc. Next level layer is known as middleware layer. The main task of this layer is to process the information received from the network layer and make decisions based on the results achieved from ubiquitous computing. Next, this processed information is used by application layer for global device management. On the top of the architecture, there is a business layer which control the overall IoT system, its applications and services. The business layer visualizes the information and statistics received from the application layer and further used this knowledge to plan future targets and strategies. Furthermore, the IoT architectures can be modified according to the need and application domain [ 19 , 20 , 37 ]. Besides layered framework, IoT system consists of several functional blocks that supports various IoT activities such as sensing mechanism, authentication and identification, control and management [ 38 ]. Figure  6 illustrates such functional blocks of IoT architecture.

figure 6

A generic function module of IoT system

There are several important functional blocks responsible for I/O operations, connectivity issues, processing, audio/video monitoring and storage management. All these functional block together incorporates an efficient IoT system which are important for optimum performance. Although, there are several reference architectures proposed with the technical specifications, but these are still far from the standard architecture that is suitable for global IoT [ 39 ]. Therefore, a suitable architecture is still needsvk to be designed that could satisfy the global IoT needs. The generic working structure of IoT system is shown in Fig.  7 . Figure  7 shows a dependency of IoT on particular application parameters. IoT gateways have an important role in IoT communication as it allows connectivity between IoT servers and IoT devices related to several applications [ 40 ].

figure 7

Working structure of IoT

Scalability, modularity, interoperability and openness are the key design issues for an efficient IoT architecture in a heterogenous environment. The IoT architecture must be designed with an objective to fulfil the requirements of cross domain interactions, multi-system integration with the potential of simple and scalable management functionalities, big data analytics and storage, and user friendly applications. Also, the architecture should be able to scaleup the functionality and add some intelligence and automation among the IoT devices in the system.

Moreover, increasing amount of massive data being generated through the communication between IoT sensors and devices is a new challenge. Therefore, an efficient architecture is required to deal with massive amount of streaming data in IoT system. Two popular IoT system architectures are cloud and fog/edge computing that supports with the handling, monitoring and analysis of huge amount of data in IoT systems. Therefore, a modern IoT architecture can be defined as a 4 stage architecture as shown in Fig.  8 .

figure 8

Four stage IoT architecture to deal with massive data

In stage 1 of the architecture, sensors and actuators plays an important role. Real world is comprised of environment, humans, animals, electronic gadgets, smart vehicles, and buildings etc. Sensors detect the signals and data flow from these real world entities and transforms into data which could further be used for analysis. Moreover, actuators is able to intervene the reality i.e. to control the temperature of the room, to slow down the vehicle speed, to turn off the music and light etc. Therefore, stage 1 assist in collecting data from real world which could be useful for further analysis. Stage 2 is responsible to collaborate with sensors and actuators along with gateways and data acquisition systems. In this stage, massive amount of data generated in stage 1 is aggregated and optimized in a structured way suitable for processing. Once the massive amount of data is aggregated and structured then it is ready to be passed to stage 3 which is edge computing. Edge computing can be defined as an open architecture in distributed fashion which allows use of IoT technologies and massive computing power from different locations worldwide. It is very powerful approach for streaming data processing and thus suitable for IoT systems. In stage 3, edge computing technologies deals with massive amount of data and provides various functionalities such as visualization, integration of data from other sources, analysis using machine learning methods etc. The last stage comprises of several important activities such as in depth processing and analysis, sending feedback to improve the precision and accuracy of the entire system. Everything at this stage will be performed on cloud server or data centre. Big data framework such as Hadoop and Spark may be utilized to handle this large streaming data and machine learning approaches can be used to develop better prediction models which could help in a more accurate and reliable IoT system to meet the demand of present time.

Major key issues and challenges of IoT

The involvement of IoT based systems in all aspects of human lives and various technologies involved in data transfer between embedded devices made it complex and gave rise to several issues and challenges. These issues are also a challenge for the IoT developers in the advanced smart tech society. As technology is growing, challenges and need for advanced IoT system is also growing. Therefore, IoT developers need to think of new issues arising and should provide solutions for them.

Security and privacy issues

One of the most important and challenging issues in the IoT is the security and privacy due to several threats, cyber attacks, risks and vulnerabilities [ 41 ]. The issues that give rise to device level privacy are insufficient authorization and authentication, insecure software, firmware, web interface and poor transport layer encryption [ 42 ]. Security and privacy issues are very important parameters to develop confidence in IoT Systems with respect to various aspects [ 43 ]. Security mechanisms must be embedded at every layer of IoT architecture to prevent security threats and attacks [ 23 ]. Several protocols are developed and efficiently deployed on every layer of communication channel to ensure the security and privacy in IoT based systems [ 44 , 45 ]. Secure Socket Layer (SSL) and Datagram Transport Layer Security (DTLS) are one of the cryptographic protocols that are implemented between transport and application layer to provide security solutions in various IoT systems [ 44 ]. However, some IoT applications require different methods to ensure the security in communication between IoT devices. Besides this, if communication takes place using wireless technologies within the IoT system, it becomes more vulnerable to security risks. Therefore, certain methods should be deployed to detect malicious actions and for self healing or recovery. Privacy on the other hand is another important concern which allows users to feel secure and comfortable while using IoT solutions. Therefore, it is required to maintain the authorization and authentication over a secure network to establish the communication between trusted parties [ 46 ]. Another issue is the different privacy policies for different objects communicating within the IoT system. Therefore, each object should be able to verify the privacy policies of other objects in IoT system before transmitting the data.

Interoperability/standard issues

Interoperability is the feasibility to exchange the information among different IoT devices and systems. This exchange of information does not rely on the deployed software and hardware. The interoperability issue arises due to the heterogeneous nature of different technology and solutions used for IoT development. The four interoperability levels are technical, semantic, syntactic and organizational [ 47 ]. Various functionalities are being provided by IoT systems to improve the interoperability that ensures communication between different objects in a heterogeneous environment. Additionally, it is possible to merge different IoT platforms based on their functionalities to provide various solutions for IoT users [ 48 ]. Considering interoperability an important issue, researchers approved several solutions that are also know as interoperability handling approaches [ 49 ]. These solutions could be adapaters/gateways based, virtual networks/overlay based, service oriented architecture based etc. Although interoperability handling approaches ease some pressure on IoT systems but there are still certain challenges remain with interoperability that could be a scope for future studies [ 25 ].

Ethics, law and regulatory rights

Another issue for IoT developers is the ethics, law and regulatory rights. There are certain rules and regulations to maintain the standard, moral values and to prevent the people from violating them. Ethics and law are very similar term with the only difference is that ethics are standards that people believes and laws are certain restrictions decided by the government. However, both ethics and laws are designed to maintain the standard, quality and prevent people from illegal use. With the development of IoT, several real life problems are solved but it has also given rise to critical ethical and legal challenges [ 50 ]. Data security, privacy protection, trust and safety, data usability are some of those challenges. It has also been observed that majority of IoT users are supporting government norms and regulations with respect to data protection, privacy and safety due to the lack of trust in IoT devices. Therefore, this issue must be taken into consideration to maintain and improve the trust among people for the use of IoT devices and systems.

Scalability, availability and reliability

A system is scalable if it is possible to add new services, equipments and devices without degrading its performance. The main issue with IoT is to support a large number of devices with different memory, processing, storage power and bandwidth [ 28 ]. Another important issue that must be taken into consideration is the availability. Scalability and availability both should be deployed together in the layered framework of IoT. A great example of scalability is cloud based IoT systems which provide sufficient support to scale the IoT network by adding up new devices, storage and processing power as required.

However, this global distributed IoT network gives rise to a new research paradigm to develop a smooth IoT framework that satisfy global needs [ 51 ]. Another key challenge is the availability of resources to the authentic objects regardless of their location and time of the requirement. In a distributed fashion, several small IoT networks are timely attached to the global IoT platforms to utilize their resources and services. Therefore, availability is an important concern [ 52 ]. Due to the use of different data transmission channels i.e. satellite communication, some services and availability of resources may be interrupted. Therefore, an independent and reliable data transmission channel is required for uninterrupted availability of resources and services.

Quality of Service (QoS)

Quality of Service (QoS) is another important factor for IoT. QoS can be defined as a measure to evaluate the quality, efficiency and performance of IoT devices, systems and architecture [ 34 ]. The important and required QoS metrics for IoT applications are reliability, cost, energy consumption, security, availability and service time [ 53 ]. A smarter IoT ecosystem must fulfill the requirements of QoS standards. Also, to ensure the reliability of any IoT service and device, its QoS metrics must be defined first. Further, users may also be able to specifiy their needs and requirements accordingly. Several approaches can be deployed for QoS assessment, however as mentioned by White et al. [ 54 ] there is a trade-off between quality factors and approaches. Therefore, good quality models must be deployed to overcome this trade-off. There are certain good quality models available in literature such as ISO/IEC25010 [ 55 ] and OASIS-WSQM [ 56 ] which can be used to evaluate the approaches used for QoS assessment. These models provides a wide range of quality factors that is quite sufficient for QoS assessment for IoT services. Table  2 summarizes the different studies with respect to IoT key challenges and issues discussed above.

Major IoT applications

Emerging economy, environmental and health-care.

IoT is completely devoted to provide emerging public and financial benefits and development to the society and people. This includes a wide range of public facilities i.e. economic development, water quality maintenance, well-being, industrialization etc. Overall, IoT is working hard to accomplish the social, health and economic goals of United Nations advancement step. Environmental sustainability is another important concern. IoT developers must be concerned about environmental impact of the IoT systems and devices to overcome the negative impact [ 48 ]. Energy consumption by IoT devices is one of the challenges related to environmental impact. Energy consumption is increasing at a high rate due to internet enabled services and edge cutting devices. This area needs research for the development of high quality materials in order to create new IoT devices with lower energy consumption rate. Also, green technologies can be adopted to create efficient energy efficient devices for future use. It is not only environmental friendly but also advantageous for human health. Researchers and engineers are engaged in developing highly efficient IoT devices to monitor several health issues such as diabetes, obesity or depression [ 57 ]. Several issues related to environment, energy and healthcare are considered by several studies.

Smart city, transport and vehicles

IoT is transforming the traditional civil structure of the society into high tech structure with the concept of smart city, smart home and smart vehicles and transport. Rapid improvements are being done with the help of supporting technologies such as machine learning, natural language processing to understand the need and use of technology at home [ 58 ]. Various technologies such as cloud server technology, wireless sensor networks that must be used with IoT servers to provide an efficient smart city. Another important issue is to think about environmental aspect of smart city. Therefore, energy efficient technologies and Green technologies should also be considered for the design and planning of smart city infrastructure. Further, smart devices which are being incorporated into newly launched vehicles are able to detect traffic congestions on the road and thus can suggest an optimum alternate route to the driver. This can help to lower down the congestion in the city. Furthermore, smart devices with optimum cost should be designed to be incorporated in all range vehicles to monitor the activity of engine. IoT is also very effective in maintaining the vehicle’s health. Self driving cars have the potential to communicate with other self driving vehicles by the means of intelligent sensors. This would make the traffic flow smoother than human-driven cars who used to drive in a stop and go manner. This procedure will take time to be implemented all over the world. Till the time, IoT devices can help by sensing traffic congestion ahead and can take appropriate actions. Therefore, a transport manufacturing company should incorporate IoT devices into their manufactured vehicles to provide its advantage to the society.

Agriculture and industry automation

The world’s growing population is estimated to reach approximate 10 billion by 2050. Agriculture plays an important role in our lives. In order to feed such a massive population, we need to advance the current agriculture approaches. Therefore, there is a need to combine agriculture with technology so that the production can be improved in an efficient way. Greenhouse technology is one of the possible approaches in this direction. It provides a way to control the environmental parameters in order to improve the production. However, manual control of this technology is less effective, need manual efforts and cost, and results in energy loss and less production. With the advancement of IoT, smart devices and sensors makes it easier to control the climate inside the chamber and monitor the process which results in energy saving and improved production (Fig.  9 ). Automatization of industries is another advantage of IoT. IoT has been providing game changing solutions for factory digitalization, inventory management, quality control, logistics and supply chain optimization and management.

figure 9

A working structure of IoT system in agriculture production

Importance of big data analytics in IoT

An IoT system comprises of a huge number of devices and sensors that communicates with each other. With the extensive growth and expansion of IoT network, the number of these sensors and devices are increasing rapidly. These devices communicate with each other and transfer a massive amount of data over internet. This data is very huge and streaming every second and thus qualified to be called as big data. Continuous expansion of IoT based networks gives rise to complex issue such as management and collection of data, storage and processing and analytics. IoT big data framework for smart buildings is very useful to deal with several issues of smart buildings such as managing oxygen level, to measure the smoke/hazardous gases and luminosity [ 59 ]. Such framework is capable to collect the data from the sensors installed in the buildings and performs data analytics for decision making. Moreover, industrial production can be improved using an IoT based cyber physical system that is equipped with an information analysis and knowledge acquisition techniques [ 60 ]. Traffic congestion is an important issue with smart cities. The real time traffic information can be collected through IoT devices and sensors installed in traffic signals and this information can be analyzed in an IoT based traffic management system [ 61 ]. In healthcare analysis, the IoT sensors used with patients generate a lot of information about the health condition of patients every second. This large amount of information needs to be integrated at one database and must be processed in real time to take quick decision with high accuracy and big data technology is the best solution for this job [ 62 ]. IoT along with big data analytics can also help to transform the traditional approaches used in manufacturing industries into the modern one [ 63 ]. The sensing devices generates information which can be analyzed using big data approaches and may help in various decision making tasks. Furthermore, use of cloud computing and analytics can benefit the energy development and conservation with reduced cost and customer satisfaction [ 64 ]. IoT devices generate a huge amount of streaming data which needs to be stored effectively and needs further analysis for decision making in real time. Deep learning is very effective to deal with such a large information and can provide results with high accuracy [ 65 ]. Therefore, IoT, Big data analytics and Deep learning together is very important to develop a high tech society.

Conclusions

Recent advancements in IoT have drawn attention of researchers and developers worldwide. IoT developers and researchers are working together to extend the technology on large scale and to benefit the society to the highest possible level. However, improvements are possible only if we consider the various issues and shortcomings in the present technical approaches. In this survey article, we presented several issues and challenges that IoT developer must take into account to develop an improved model. Also, important application areas of IoT is also discussed where IoT developers and researchers are engaged. As IoT is not only providing services but also generates a huge amount of data. Hence, the importance of big data analytics is also discussed which can provide accurate decisions that could be utilized to develop an improved IoT system.

Availability of data and materials

Not applicable.

Abbreviations

Internet of Things

Quality of Service

Web of Things

Cloud of Things

Smart Home System

Smart Health Sensing System

Sfar AR, Zied C, Challal Y. A systematic and cognitive vision for IoT security: a case study of military live simulation and security challenges. In: Proc. 2017 international conference on smart, monitored and controlled cities (SM2C), Sfax, Tunisia, 17–19 Feb. 2017. https://doi.org/10.1109/sm2c.2017.8071828 .

Gatsis K, Pappas GJ. Wireless control for the IoT: power spectrum and security challenges. In: Proc. 2017 IEEE/ACM second international conference on internet-of-things design and implementation (IoTDI), Pittsburg, PA, USA, 18–21 April 2017. INSPEC Accession Number: 16964293.

Zhou J, Cap Z, Dong X, Vasilakos AV. Security and privacy for cloud-based IoT: challenges. IEEE Commun Mag. 2017;55(1):26–33. https://doi.org/10.1109/MCOM.2017.1600363CM .

Article   Google Scholar  

Sfar AR, Natalizio E, Challal Y, Chtourou Z. A roadmap for security challenges in the internet of things. Digit Commun Netw. 2018;4(1):118–37.

Minoli D, Sohraby K, Kouns J. IoT security (IoTSec) considerations, requirements, and architectures. In: Proc. 14th IEEE annual consumer communications & networking conference (CCNC), Las Vegas, NV, USA, 8–11 January 2017. https://doi.org/10.1109/ccnc.2017.7983271 .

Gaona-Garcia P, Montenegro-Marin CE, Prieto JD, Nieto YV. Analysis of security mechanisms based on clusters IoT environments. Int J Interact Multimed Artif Intell. 2017;4(3):55–60.

Behrendt F. Cycling the smart and sustainable city: analyzing EC policy documents on internet of things, mobility and transport, and smart cities. Sustainability. 2019;11(3):763.

IoT application areas. https://iot-analytics.com/top-10-iot-project-application-areas-q3-2016/ . Accessed 05 Apr 2019.

Zanella A, Bui N, Castellani A, Vangelista L, Zorgi M. Internet of things for smart cities. IEEE IoT-J. 2014;1(1):22–32.

Google Scholar  

Khajenasiri I, Estebsari A, Verhelst M, Gielen G. A review on internet of things for intelligent energy control in buildings for smart city applications. Energy Procedia. 2017;111:770–9.

Internet of Things. http://www.ti.com/technologies/internet-of-things/overview.html . Accessed 01 Apr 2019.

Liu T, Yuan R, Chang H. Research on the internet of things in the automotive industry. In: ICMeCG 2012 international conference on management of e-commerce and e-Government, Beijing, China. 20–21 Oct 2012. p. 230–3.

Alavi AH, Jiao P, Buttlar WG, Lajnef N. Internet of things-enabled smart cities: state-of-the-art and future trends. Measurement. 2018;129:589–606.

Weber RH. Internet of things-new security and privacy challenges. Comput Law Secur Rev. 2010;26(1):23–30.

Article   MathSciNet   Google Scholar  

Heer T, Garcia-Morchon O, Hummen R, Keoh SL, Kumar SS, Wehrle K. Security challenges in the IP based internet of things. Wirel Pers Commun. 2011;61(3):527–42.

Liu J, Xiao Y, Philip-Chen CL. Authentication and access control in the internet of things. In: 32nd international conference on distributed computing systems workshops, Macau, China. IEEE xplore; 2012. https://doi.org/10.1109/icdcsw.2012.23 .

Kothmayr T, Schmitt C, Hu W, Brunig M, Carle G. DTLS based security and two-way authentication for the internet of things. Ad Hoc Netw. 2013;11:2710–23.

Li Y, et al. IoT-CANE: a unified knowledge management system for data centric internet of things application systems. J Parallel Distrib Comput. 2019;131:161–72.

Olivier F, Carlos G, Florent N. New security architecture for IoT network. In: International workshop on big data and data mining challenges on IoT and pervasive systems (BigD2M 2015), procedia computer science, vol. 52; 2015. p. 1028–33.

Luk M, Mezzour G, Perrig A, Gligor V. MiniSec: a secure sensor netowrk communication architecture. In: Proc: 6th international symposium on information processing in sensor networks, Cambridge, MA, USA, 25–27 April 2007.

Karlof C, Sastry N, Wagner D. TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of the second ACM conference on embedded networked sensor systems (SenSys 2004), November 2004.

ZigBee Alliance. Zigbee specification. Technical Report Document 053474r06, Version 1.0, ZigBee Alliance, June 2005.

Yan Z, Zhang P, Vasilakos AV. A survey on trust management for internet of things. J Netw Comput Appl. 2014;42:120–34.

Bao F, Chen I-R, Guo J. Scalable, adaptive and survivable trust management for community of interest based internet of things systems. In: Proc. IEEE 11th international symposium on autonomous decentralized systems (ISADS); 2013. p. 1–7.

Noura M, Atiquazzaman M, Gaedke M. Interoperability in internet of things: taxonomies and open challenges. Mob Netw Appl. 2019;24(3):796–809.

Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M. Internet of things: a survey, on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor. 2015;17(June):2347–76.

Palattella MR, Dohler M, Grieco A, Rizzo G, Torsner J, Engel T, Ladid L. Internet of things in the 5G era: enablers, architecture and business models. IEEE J Sel Areas Commun. 2016;34(3):510–27.

Pereira C, Aguiar A. Towards efficient mobile M2M communications: survey and open challenges. Sensors. 2014;14(10):19582–608.

Kim NS, Lee K, Ryu JH. Study on IoT based wild vegetation community ecological monitoring system. In: Proc. 2015 7th international conference on ubiquitous and future networks, Sapporo, Japan, 7–10 July 2015. IEEE.

Wang JY, Cao Y, Yu GP, Yuan M. Research on applications of IoT in domestic waste treatment and disposal. In: Proc. 11th World congress on intelligent control and automation, Shenyang, China, 2014. IEEE.

Qiu T, Xiao H, Zhou P. Framework and case studies of intelligent monitoring platform in facility agriculture ecosystem. In: Proc. 2013 second international conference on agro-geoinformatics (agro-geoinformatics), Fairfax, VA, USA, 12–16 Aug 2013. IEEE.

Fang S, et al. An integrated system for regional environmental monitoring and management based on internet of things. IEEE Trans Ind Inf. 2014;10(2):1596–605.

Cheng Y, et al. AirCloud: a cloud based air-quality monitoring system for everyone. In: Proceedings of the 12th ACM conference on embedded network sensor systems, ACM, Memphis, Tennessee, 03–06 Nov 2014. p. 251–65.

Temglit N, Chibani A, Djouani K, Nacer MA. A distributed agent-based approach for optimal QoS selection in web of object choreography. IEEE Syst J. 2018;12(2):1655–66.

Talavera JM, et al. Review of IoT applications in agro-industrial and environmental fields. Comput Electron Agric. 2017;142(7):283–97.

Jara AJ, Zamora-Izquierdo MA, Skarmeta AF. Interconnection framework for mHealth and remote monitoring based in the internet of things. IEEE J Sel Areas Commun. 2013;31(9):47–65.

Gubbi J, Buyya R, Marusic S, Palaniswami M. Internet of things (IoT): a vision, architectural elements, and future directions. Future Gener Comput Syst. 2013;29(7):1645–60.

Sebastian S, Ray PP. Development of IoT invasive architecture for complying with health of home. In: Proc: I3CS, Shillong; 2015. p. 79–83.

Nicolescu R, Huth M, Radanliev P, Roure DD. Mapping the values of IoT. J Inf Technol. 2018;33(4):345–60.

Hu P, Ning H, Qiu T, Xu Y, Luo X, Sangaiah AK. A unified face identification and resolutions scheme using cloud computing in internet of things. Future Gener Comput Syst. 2018;81:582–92.

Babovic ZB, Protic V, Milutinovic V. Web performance evaluation for internet of things applications. IEEE Access. 2016;4:6974–92.

Internet of Things research study: Hewlett Packard Enterprise Report. 2015. http://www8.hp.com/us/en/hp-news/press-release.html?id=1909050#.WPoNH6KxWUk .

Xu LD, He W, Li S. Internet of things in industries: a survey. IEEE Trans Ind Inf. 2014;10(4):2233–43.

Dierks T, Allen C. The TLS protocol version 1.0, IETF RFC, 2246; 1999. https://www.ietf.org/rfc/rfc2246.txt .

Pei M, Cook N, Yoo M, Atyeo A, Tschofenig H. The open trust protocol (OTrP). IETF 2016. https://tools.ietf.org/html/draft-pei-opentrustprotocol-00 .

Roman R, Najera P, Lopez J. Securing the internet of things. Computer. 2011;44(9):51–8.

Van-der-Veer H, Wiles A. Achieving technical, interoperability-the ETSI approach, ETSI White Paper No. 3. 2008. http://www.etsi.org/images/files/ETSIWhitePapers/IOP%20whitepaper%20Edition%203%20final.pdf .

Colacovic A, Hadzialic M. Internet of things (IoT): a review of enabling technologies, challenges and open research issues. Comput Netw. 2018;144:17–39.

Noura M, Atiquazzaman M, Gaedke M. Interoperability in internet of things infrastructure: classification, challenges and future work. In: Third international conference, IoTaaS 2017, Taichung, Taiwan. 20–22 September 2017.

Tzafestad SG. Ethics and law in the internet of things world. Smart Cities. 2018;1(1):98–120.

Mosko M, Solis I, Uzun E, Wood C. CCNx 1.0 protocol architecture. A Xerox company, computing science laboratory PARC; 2017.

Wu Y, Li J, Stankovic J, Whitehouse K, Son S, Kapitanova K. Run time assurance of application-level requirements in wireless sensor networks. In: Proc. 9th ACM/IEEE international conference on information processing in sensor networks, Stockholm, Sweden, 21–16 April 2010. p. 197–208.

Huo L, Wang Z. Service composition instantiation based on cross-modified artificial Bee Colony algorithm. Chin Commun. 2016;13(10):233–44.

White G, Nallur V, Clarke S. Quality of service approaches in IoT: a systematic mapping. J Syst Softw. 2017;132:186–203.

ISO/IEC 25010—Systems and software engineering—systems and software quality requirements and evaluation (SQuaRE)—system and software quality models, Technical Report; 2010.

Oasis. Web services quality factors version 1.0. 2012. http://docs.oasis-open.org/wsqm/wsqf/v1.0/WS-Quality-Factors.pdf .

Fafoutis X, et al. A residential maintenance-free long-term activity monitoring system for healthcare applications. EURASIP J Wireless Commun Netw. 2016. https://doi.org/10.1186/s13638-016-0534-3 .

Park E, Pobil AP, Kwon SJ. The role of internet of things (IoT) in smart cities: technology roadmap-oriented approaches. Sustainability. 2018;10:1388.

Bashir MR, Gill AQ. Towards an IoT big data analytics framework: smart buildings system. In: IEEE 18th international conference on high performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems; 2016. p. 1325–32.

Lee C, Yeung C, Cheng M. Research on IoT based cyber physical system for industrial big data analytics. In: 2015 IEEE international conference on industrial engineering and engineering management (IEEM). New York: IEEE; 2015. p. 1855–9.

Rizwan P, Suresh K, Babu MR. Real-time smart traffic management system for smart cities by using internet of things and big data. In: International conference on emerging techno-logical trends (ICETT). New York: IEEE; 2016. p. 1–7.

Vuppalapati C, Ilapakurti A, Kedari S. The role of big data in creating sense EHR, an integrated approach to create next generation mobile sensor and wear-able data driven electronic health record (EHR). In: 2016 IEEE second international conference on big data computing service and applications (BigDataService). New York: IEEE; 2016. p. 293–6.

Mourtzis D, Vlachou E, Milas N. Industrial big data as a result of IoT adoption in manufacturing. Procedia CIRP. 2016;55:290–5.

Ramakrishnan R, Gaur L. Smart electricity distribution in residential areas: Internet of things (IoT) based advanced metering infrastructure and cloud analytics. In: International Conference on internet of things and applications (IOTA). New York: IEEE; 2016. p. 46–51.

Mohammadi M, Al-Fuqaha A, Sorour S, Guizani M. Deep learning for IoT big data and streaming analytics: a survey. IEEE Commun Surv Tutor. 2018;20(4):2923–60.

Clausen T, Herberg U, Philipp M. A critical evaluation of the IPv6 routing protocol for low power and lossy networks (RPL). In: 2011 IEEE 7th international conference on wireless and mobile computing, networking and communications (WiMob), Wuhan, China, 10–12 Oct 2011.

Li H, Wang H, Yin W, Li Y, Qian Y, Hu F. Development of remote monitoring system for henhouse based on IoT technology. Future Internet. 2015;7(3):329–41.

Zhang L. An IoT system for environmental monitoring and protecting with heterogeneous communication networks. In: Proc. 2011 6th international ICST conference on communications and networking in China (CHINACOM), Harbin, China, 17–19 Aug 2011. IEEE.

Montori F, Bedogni L, Bononi L. A collaborative internet of things architecture for smart cities and environmental monitoring. IEEE Internet Things J. 2018;5(2):592–605.

Distefano S, Longo F, Scarpa M. QoS assessment of mobile crowd sensing services. J Grid Comput. 2015;13(4):629–50.

Stankovic JA. Research directions for the internet of things. IEEE Internet Things J. 2014;1(1):3–9.

Al-Fuqaha A, Khreishah A, Guizani M, Rayes A, Mohammadi M. Toward better horizontal integration among IoT services. IEEE Commun Mag. 2015;53(9):72–9.

Chen IR, Guo J, Bao F. Trust management for SOA-based IoT and its application to service composition. IEEE Trans Serv Comput. 2016;9(3):482–95.

Sarkar C, et al. DIAT: a scalable distributed architecture for IoT. IEEE Internet Things J. 2014;2(3):230–9.

Chen S, Xu H, Liu D, Hu B, Wang H. A vision of IoT: applications, challenges, and opportunities with China perspective. IEEE Internet Things J. 2014;1(4):349–59.

Kang K, Pang J, Xu LD, Ma L, Wang C. An interactive trust model for application market of the internet of things. IEEE Trans Ind Inf. 2014;10(2):1516–26.

Gupta A, Jha RK. A survey of 5G network: architecture and emerging technologies. IEEE Access. 2015;3:1206–32.

Vlacheas P, et al. Enabling smart cities through a cognitive management framework for the internet of things. IEEE Commun Mag. 2013;51(6):102–11.

Bizanis N, Kuipers FA. SDN and virtualization solutions for the internet of things: a survey. IEEE Access. 2016;4:5591–606.

Zeng X, et al. IOTSim: a simulator for analyzing IoT applications. J Syst Architect. 2017;72:93–107.

Fantacci R, Pecorella T, Viti R, Carlini C. A network architecture solutions for efficient IOT WSN backhauling: challenges and opportunities. IEEE Wirel Commun. 2014;21(4):113–9.

Kim M, Ahn H, Kim KP. Process-aware internet of things: a conceptual extension of the internet of things framework and architecture. KSII Trans Internet Inf Syst. 2016;10(8):4008–22.

Hsieh H-C, Chang K-D, Wang L-F, Chen J-L, Chao H-C. ScriptIoT: a script framework for and internet of things applications. IEEE Internet Things J. 2015;3(4):628–36.

Kiljander J, et al. Semantic interoperability architecture for pervasive computing and internet of things. IEEE Access. 2014;2:856–73.

Ye J, Chen B, Liu Q, Fang Y. A precision agriculture management system based on internet of things and WebGIS. In: Proc. 2013 21st international conference on geoinformatics, Kaifeng, China, 20–22 June 2013. IEEE.

Jara AJ, Martinez-Julia P, Skarmeta A. Light-weight multicast DNS and DNS-SD (ImDNS-SD): IPv6-based resource and service discovery for web of things. In: Proc. sixth international conference on innovative mobile and internet services in ubiquitous computing, Palermo, Italy, 4–6 July 2012.

Diaz M, Martin C, Rubio B. State-of-the-art, challenges, and open issues in the integration of internet of things and cloud computing. J Netw Comput Appl. 2016;67:99–117.

Lo A, Law YW, Jacobsson M. A cellular-centric service architecture for machine to machine (M2M) communications. IEEE Wirel Commun. 2013;20(5):143–51.

Kecskemeti G, Casale G, Jha DN, Lyon J, Ranjan R. Modeling and simulation challenges in internet of things. IEEE Cloud Comput. 2017;4(1):62–9.

Cuomo S, Somma VD, Sica F. An application of the one-factor HullWhite model in an IoT financial scenario. Sustain Cities Soc. 2018;38:18–20.

Liu J, et al. A cooperative evolution for QoS-driven IOT service composition. Autom J Control Meas Electron Comput Commun. 2013;54(4):438–47.

Huo Y, et al. Multi-objective service composition model based on cost-effective optimization. Appl Intell. 2017;48(3):651–69.

Han SN, Crespi N. Semantic service provisioning for smart objects: integrating IoT applications into the web. Future Gener Comput Syst. 2017;76:180–97.

Alodib M. QoS-aware approach to monitor violations of SLAs in the IoT. J Innov Digit Ecosyst. 2016;3(2):197–207.

Rizzardi A, Sicari S, Miorandi D, Coen-Porisini A. AUPS: an open source authenticated publish/subscribe system for internet of things. Inf Syst. 2016;62:29–41.

Fenye B, Ing-Ray C, Jia G. Scalable, adaptive and survivable trust management for community of interest based internet of things systems. In: Proc. IEEE eleventh international symposium on autonomous decentralized systems (ISADS), Mexico City, Mexico, 6–8 March 2013.

Tehrani MN, Uysal M, Yanikomeroglu H. Device to device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Commun Mag. 2014;52(5):86–92.

Zhu C, Leung VCM, Shu L, Ngai ECH. Green internet of things for smart world. IEEE Access. 2015;3:2151–62.

Adame T, Bel A, Bellalta B, Barcelo J, Oliver M. IEEE 802.11AH: the WiFi approach for M2M communications. IEEE Wirel Commun. 2014;21(6):144–52.

Shaikh FK, Zeadally S, Exposito E. Enabling technologies for green internet of things. IEEE Syst J. 2015;99:1–12.

Palattella MR, et al. Standardized protocol stack for the internet of (important) things. IEEE Commun Surv Tutor. 2012;15(3):1389–406.

Vatari S, Bakshi A, Thakur T. Green house by using IoT and cloud computing. In: Proc. 2016 IEEE international conference on recent trends in electronic, information & communication technology (RTEICT), Bangalore, India, 20–21 May 2016.

Chiang M, Zhang T. Fog and IoT: an overview of research opportunities. IEEE Internet Things J. 2016;3(6):854–64.

Elkhodr M, Shahrestani S, Cheung H. A smart home application based on the internet of things management platform. In: Proc. 2015 IEEE international conference on data science and data intensive systems, Sydney, Australia, 11–13 Dec 2015.

Talari S, et al. A review of smart cities based on the internet of things concept. Energies. 2017;10(4):421–43.

Burange AW, Misalkar HD. Review of internet of things in development of smart cities with data management & privacy. In: Proc. 2015 international conference on advances in computer engineering and applications, Ghaziabad, India, 19–20 March 2015.

Zia T, Liu P, Han W. Application-specific digital forensics investigative model in internet of things (IoT). In: Proc. 12th international conference on availability, reliability and security, Reggio Calabria, Italy; 2017.

Lingling H, Haifeng L, Xu X, Jian L. An intelligent vehicle monitoring system based on internet of things. In: Proc. 7th international conference on computational intelligence and security, Hainan, China, 3–4 Dec 2011. IEEE.

Duttagupta S, Kumar M, Ranjan R, Nambiar M. Performance prediction of IoT application: an experimental analysis. In: Proc. 6th international conference on the internet of things, Stuttgart, Germany, 07–09 Nov 2016. p. 43–51.

Chen S, Liu B, Chen X, Zhang Y, Huang G. Framework for adaptive computation offloading in IoT applications. In: Proc. 9th Asia-Pacific symposium on internetware, Shanghai, China, 23 Sep 2017. ACM.

Li Q, Dou R, Chen F, Nan G. A QoS-oriented web service composition approach based on multi-population genetic algorithm for internet of things. Int J Comput Intell Syst. 2014;7(Sup2):26–34.

Urbieta A, Gonzalez-Beltran A, Mokhtar SB, Hossain MA, Capra L. Adaptive and context-aware service composition for IoT-based smart cities. Future Gener Comput Syst. 2017;76:262–74.

Krishna GG, Krishna G, Bhalaji N. Analysis of routing protocol for low-power and lossy networks in IoT real time applications. Procedia Comput Sci. 2016;87:270–4.

Singh D, Tripathi G, Jara AJ. A survey of internet of things: future vision, architecture, challenge and services. In: Proc. IEEE world forum on internet of things, Seoul, South Korea; 2014. p. 287–92.

Jara AJ, Ladid L, Skarmeta A. The internet of everything through Ipv6: an analysis of challenges, solutions and opportunities. J Wirel Mob Netw Ubiquitous Comput Dependable Appl. 2013;4(3):97–118.

Madsen H, Burtschy B, Albeanu G, Popentiu-Vladicescu Fl. Reliability in the utility computing era: towards reliable Fog computing. In: Proc. 20th international conference on systems, signals, and image processing (IWSSIP); 2013. p. 43–6.

Soret B, Pedersen KI, Jorgensen NTK, Fernandez-Lopez V. Interference coordination for dense wireless networks. IEEE Commun Mag. 2015;53(1):102–9.

Andrews JG. Seven ways that HetNets are a cellular paradigm shift. IEEE Commun Mag. 2013;51(3):136–44.

Jaber M, Imran MA, Tafazolli R, Tukmanov A. 5G Backhaul challenges and emerging research directions: a survey. IEEE Access. 2016;4:1743–66.

Choi S, Koh S-J. Use of proxy mobile IPv6 for mobility management in CoAP-based internet of things networks. IEEE Commun Lett. 2016;20(11):2284–7.

Maier M, Chowdhury M, Rimal BP, Van DP. The tactile internet: vision, recent progress, and open challenges. IEEE Commun Mag. 2016;54(5):138–45.

Fernandes JL, Lopes IC, Rodrigues JJPC, Ullah S. Performance evaluations of RESTful web services and AMQP protocol. In: 5th international conference on ubiquitous and future networks (ICUFN), Da Nang, Vietnam, 2–5 July 2013.

Download references

Acknowledgements

This work was financially supported by the Ministry of Education and Science of Russian Federation (government order 2.7905.2017/8.9).

The research received no external funding.

Author information

Authors and affiliations.

Department of Computer Science, South Ural State University, Chelyabinsk, Russian Federation

Sachin Kumar & Mikhail Zymbler

Department of Information Engineering, University of Padova, Padua, Italy

Prayag Tiwari

You can also search for this author in PubMed   Google Scholar

Contributions

SK and PT prepared the draft and Idea. SK wrote the manuscript. MZ prepared the tables, references and checked the English. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Sachin Kumar .

Ethics declarations

Competing interests.

The authors declare that they have no competing interests.

Additional information

Publisher's note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License ( http://creativecommons.org/licenses/by/4.0/ ), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Reprints and permissions

About this article

Cite this article.

Kumar, S., Tiwari, P. & Zymbler, M. Internet of Things is a revolutionary approach for future technology enhancement: a review. J Big Data 6 , 111 (2019). https://doi.org/10.1186/s40537-019-0268-2

Download citation

Received : 24 July 2019

Accepted : 10 November 2019

Published : 09 December 2019

DOI : https://doi.org/10.1186/s40537-019-0268-2

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Internet of Things (IoT)
  • IoT architecture
  • IoT challenges
  • IoT applications

research papers on it

Technology Research Paper

Academic Writing Service

This sample technology research paper features: 8300 words (approx. 27 pages), an outline, and a bibliography with 48 sources. Browse other research paper examples for more inspiration. If you need a thorough research paper written according to all the academic standards, you can always turn to our experienced writers for help. This is how your paper can get an A! Feel free to contact our writing service for professional assistance. We offer high-quality assignments for reasonable rates.

Introduction

Man’s relation to technology: a brief history, technology and biological anthropology, the sts approach, classical philosophical anthropology, philosophy of technology, the continental approach to the philosophy of technology, the analytic approach to the philosophy of technology, recent developments: bridging the gap, conclusion and future directions.

  • Bibliography

More Technology Research Papers:

  • History of Technology Research Paper
  • Internet Research Paper
  • Nanotechnology Research Paper
  • Compstat Research Paper
  • Computer Forensics Research Paper
  • Healthcare Technology Assessment Research Paper
  • Ethics of Information Technology Research Paper
  • Neurotechnology Research Paper

The term technology is derived from the Greek word techné. The Greek word refers to all forms of skillful, rule-based mastery in any field of human praxis, originally encompassing both arts (like painting, sculpture, writing, and the like) and craftsmanship (like carpentry, shipbuilding, architecture, and the like). The Roman culture uses the Latin word arts for these domains. Accordingly the medieval terminology distinguishes between the seven free arts (grammar, rhetoric, logic, geometry, arithmetic, music, astronomy) and the mechanical arts (e.g., agriculture, architecture, tailoring), thus prefiguring the later distinction between arts (as linked to the study of humans and the humanities) and technology (as linked to engineering and the study and science of nature).

Academic Writing, Editing, Proofreading, And Problem Solving Services

Get 10% off with 24start discount code.

The modern word technology finally refers either to procedures and skillful application of sciences for the production of industrial or manual products or to the products of these processes themselves. In this sense, technology nowadays encompasses only a part of the original Greek definition. The place of technology as being on the one hand a product of humans (being thus rooted in human anthropology and human tool usage), and being on the other hand based on a solid scientific understanding of the laws of nature (modern technology), can be seen as the two key features of contemporary and recent approaches to analyze and understand technology. Technology is then in one respect as old as humankind: Many approaches in anthropology thus refer to the general structure of technology in all of human history and relate it to the biological condition of humans. But recent anthropological thinking also reflects on the specific details of modern technology. It has often been argued that there is a structural difference between modern, science-based technology and older forms of craftsmanship of ancient or medieval types of technology. Therefore, a central question for modern anthropology is to analyze the consequences modern technology has for our picture of humankind: how to define man in the age of technology.

Reflection about the anthropological function of technology is probably as old as human self-reflection itself, since the ability to use tools and create cultural products has always been seen as a unique human feature, distinguishing humankind from most other animals (see also the next section on biological anthropology). But an analysis of technology was not at the center of political, social, anthropological, or philosophical thoughts before the development of the modern natural sciences and their counterpart, modern technology. Following Carl Mitcham (1994) one can roughly distinguish three approaches to technology before the 20th century, encompassing many topics that later became essential parts of contemporary discussions about technology (p. 275). The three approaches are as follows:

  • In the ancient world, technology is looked at with certain skepticism. The use of tools is seen as necessary for survival, but also regarded as dangerous, since it might lead to human hubris and might raise the envy and anger of the gods. In this sense, mythological thinking envisions technology as, for example, stolen from the gods (the myth of Prometheus), and thus not properly belonging to humans. The extensive use of technology is often seen as leading to megalomaniac fantasies or unjustified overstepping of religious and ethical boundaries (e.g., myth of the Tower of Babel, myth of Icarus). Philosophical reflection, however, acknowledges the value of technology for an otherwise defenseless human being. Already Plato anticipates a central thought of modern anthropology: Human beings are poorly equipped for survival in nature. They need to compensate for this lack by developing skills of rational thinking and the usage of tools (this idea later becomes a central thesis of the famous anthropology of Arnold Gehlen [1988]). But the emphasis in ancient philosophical anthropology lies not so much on man’s capacities to invent technology, but on man’s moral character (exemplified by ancient wisdom or medieval religiosity). The usage of technical knowledge should thus be kept within strict ethical boundaries.
  • In the hierarchy of knowledge, ethical wisdom is regarded in principle as higher than and superior to technological skills. Socrates points to the question that we should not only seek knowledge about how to do certain things (technical knowledge), but rather about whether we should perform certain actions (ethical knowledge); this idea can also be found in the medieval distinction between the (superior form of a) life in contemplation ( vita contemplativa ) and the (lower) life in active involvement ( vita activa ). Ancient and medieval technology is thus embedded in an anthropological vision, in which human virtues play an important role. Different forms of virtues are combined in the original crafts, as opposed to the later, modern differentiation of these virtues: In craftmanship one can find a union of economical virtues (e.g., efficient usage of limited resources), technical virtues (creating new entities that did not exist before), and often also aesthetic virtues (a sense of beauty that adds an aesthetic component to these newly created entities going beyond the modern idea that “form follows function”). In the Greek world, these three skills are combined in the realm of poiesis, while in modernity they are separated in the three domains of economy, technology, and art—each relatively independent of the others (Hösle, 2004, p. 366).
  • A profound change in the evaluation of technology emerges with modernity, a position that Mitcham (1994) summarizes as Enlightenment optimism. Already in the writings of Francis Bacon (1620), the new science of nature and its application to experimental and technological research is highly welcomed. Progress in technology is seen as very beneficial to humankind, as it may lead to the cure of diseases, mastery over nature, and a constant progress toward a more human society. Many utopian writings mark the beginning of early modern thoughts in which technology is seen as essential in leading to a brighter future for humankind (e.g., Thomas More’s Utopia [1516], J. V. Andreae’s Christianopolis [1619], F. Bacon’s New Atlantis [1627]). In a similar line of thought, Enlightenment thinkers defend science and modern technology against attacks from religious conservatism, pointing at the beneficial consequences of technological and scientific progress.
  • A countermovement to the Enlightenment is Romanticism, which accordingly has a different view on technology, referred to by Mitcham (1994) as Romantic uneasiness. Again, the central thought is an anthropological perspective in which man is seen as being good by nature, while it is civilization that poses the danger of alienating man from nature and from his fellow man, focusing only on his rational capacities and suppressing his emotional and social skills. Already Vico (1709) opposed Cartesian rationalism and feared that the new interest in science would lead to a neglect of traditional humanistic education. Rousseau’s critique of modern societies then became influential, seeing an advancement of knowledge and science, but a decay of virtues and immediacy ( Discourse on the Arts and Sciences; Rousseau, 1750). With the age of industrialism, the negative social consequences of modern labor work become the scope of interest of social theorists, leading up to Marx’s famous analysis of modern societies (see subsequent section on cultural and sociological anthropology). In opposition to the positive utopias centered on technology in early modernity, the 20th century then sees the literary success of pessimistic dystopias, in which often technological means of suppression or control play an important role (e.g., already in M. W. Schelley’s Frankenstein or the Modern Prometheus [1818] and later in H. G. Wells’s The Island of Doctor Moreau [1896], A. Huxley’s Brave New World [1932], George Orwell’s 1984 [1948], and Ray Bradbury’s Fahrenheit 451 [1953]).

The tension between approaches praising the benefits of technology (in the spirit of the Enlightenment) and approaches focusing on negative consequences (in the spirit of Romanticism) still forms the background of most of the contemporary philosophical and anthropological debate; this debate circles around an understanding of modern technology, often rooted in the different “cultures” of the humanities and the sciences. It can be regarded as being a particularly vivid opposition at the beginning of the 20th century, that only later gave room for more detailed and balanced accounts of technology (some classics of the debate being Snow, 1959; McDermott, 1969).

Recent contributions toward a deeper understanding of the usage and development of technology stem from such different disciplines as biology, sociology, philosophical anthropology, metaphysics, ethics, theory of science, and religious worldviews. This research paper aims at a brief overview of important topics in the debate over technology during the 20th century to the present time. Three anthropological perspectives will be distinguished, depending on the main focus of anthropological interest. This will start with a brief summary of the biological anthropological perspective on technology, move on to those theories which focus more on social or cultural aspects, and conclude with more general philosophical anthropologies. This research paper is thus not chronologically organized, but tries to identify common themes of the debate, even though sometimes the topics might overlap (e.g., the case of Gehlen, a philosophical anthropologist who starts from a biological perspective and then moves on toward a more social view on technology).

In contemporary anthropology, technology becomes a central issue for at least two different reasons:

  • From a biological perspective the usage of tools is regarded (next to the development of language and a cognitive rational apparatus) as one of the key features of humanization. Biological anthropology thus initially focuses on the differences and similarities of tool usage in humans and animals, trying to understand the role technology plays in general for an understanding of humans’ biological and social nature. With the focus on human evolution, attention is often drawn to the question of which role technology played at the beginning of humankind.
  • While in this way always being a part of human culture, technology becomes arguably one of the single most influential key features of society only in modernity. According to Max Weber, science, technology, and economy form the “superstructure” of modernity, while they all share a common “rationality” (mainly of means-ends reasoning in economy and technology). The experience of the powers and dangers of modern technology (as in industrialized labor work, medical progress, nuclear energy and weapon technology, environmental problems due to pollution, and extensive usage of resources, etc.) has triggered many social, political, and philosophical reflections that—in opposition to biological anthropology—aim primarily at understanding the specifics of modern

Let us look at these two tendencies in turn, starting with the biological perspective, before moving to the social or cultural anthropology of technology.

Biological anthropologists are interested in the role technology played during humanization, and they attempt to give evolutionary accounts of the development of tool usage and technology and compare tool usage in man with tool usage in other animals. The development of technology has often been regarded as an evolutionarily necessary form of adaption or compensation. Since most of man’s organs are less developed than those of other species, he needed to compensate for this disadvantage in the evolutionary struggle for life (see Gehlen, 1980). Initially the usage of tools was considered a unique human feature, distinguishing the genus Homo from other animals (Oakley, 1957), but research on tool usage in different animals, especially chimpanzees, led to a more or less complete revision of this thesis (Schaik, Deaner, & Merrill, 1999).

Nowadays, many examples of tool usage in the animal kingdom are known (Beck, 1980). For example, chimpanzees use sticks to fish for termites, and elephants have been described as having a remarkable capacity for tool usage. Even though tool usage must thus be regarded as more common among animals, attention still needs to be drawn to the specifics of man’s tool usage, which arguably in scope and quality goes beyond what is known from the animal kingdom. It has been pointed out that our biological anatomy offers us several advantages for an extended usage of tools: walking erectly frees the two hands, which can then be used for other purposes. Furthermore, the position of the human thumb and short straight finger are of great benefit, especially in making and using stone tools (Ambrose, 2001). Still debated, however, is whether social and technological developments go hand in hand or whether one of the two factors is prior.

Even though many anthropologists tended to see social behaviors and cultural revolutions mostly as a consequence of a change in tool usage or a development of new technologies, it has also occasionally been argued that the development of social skills precedes the development of technical skills (e.g., in joint group hunting). It has additionally been acknowledged that chimpanzees also pass over some of their technical knowledge through the mechanism of learning and establishing cultural “traditions” that resemble, to some extent, human traditions (Wrangham, 1994; Laland, 2009). But there seems to be a specific difference in human and primate learning, namely in the fact that human children learn tool usage mainly via imitation and by simply copying a shown behavior, even if it is not the most efficient solution to a given problem. Opposed to this, chimpanzees seem to learn through a process called emulation, which implies that they diverge from the paradigmatic solution that has been “taught” to them. It has been argued that learning through imitation has been selected in humans, even though it is a less flexible strategy, because it is a more social strategy of learning (Tomasello, 1999, p. 28). In this way, biological anthropology mirrors a debate in social anthropology about the role of technology; this can be seen either as a driving force born out of necessity that calls for social changes (technical determinism), or as highly mediated or even constructed by culture (social constructivism).

Technology and Social/Cultural Anthropology

As already mentioned, technology was identified early on as a key feature of modern society (Misa, Brey, & Feenberg, 2004). Many studies have been written about the impact of modern technology on society, focusing mainly on the industrial revolution (e.g., Haferkamp, 1992; Pressnell, 1960; Smelser, 1969) or on the more recent revolution of the information society (e.g., Castells, 1999; Nora, 1980), as well as on the impact of technological change on traditional societies.

The analyses of Karl Marx and the Frankfurt School are influential, not only in trying to grasp the role of modern technology in society, but also in hinting on potential anthropological roots of technology and their essential interrelation with social aspects of the human condition. Marx insisted that the study of technology holds the highest relevance for human sciences, since it reveals the way humans deal with nature and sustain life (Marx, 1938). An essential feature of man’s nature is that he has to work in order to sustain his life, that he is the “toolmaking animal” or—as he has later been called—the Homo faber. Marx analyzes the role of technology in Chapter 13 of his first volume of Das Kapital. He argues that the division of labor becomes fostered through machines, which at the same time replace more and more traditional manpower and can furthermore be operated by less skilled employees, thus leading to very bad labor conditions for the working class. Technology in general is, however, still greeted as an option to make humans’ lives easier; it is mainly the social distribution of the possession of the means of production that Marx regards as problematic. (Also later thinkers, inspired by Marxian thought, tend to see technology as an important means toward establishing a better future.) On the other hand, at the same time, technology is seen as rooted in man’s will to dominate nature.

Following this later insight in particular, Theodor Adorno argues that Western civilization has developed powerful tools to ensure its self-preservation against nature. Technical rationality is regarded as the exercise of strategic power to dominate (external) nature, but it is at the same time also leading to a suppression of the inner nature of man (Adorno, 1979). The main strategy of this rationality is quantification, which lies at the heart of the mathematical-scientific interpretation of nature and the development of modern technology. At the same time it brings forth a type of rationality, which leads to a selfmutilation. The will to exercise power becomes the main feature of modern rationality, thus leading to a dialectic that turns the noble aims of the Age of Enlightenment into a morality of humankind that is its very opposite: A new barbaric system of oppression and dictatorship arises, using technology for totalitarian purposes.

While Adorno seeks redemption mainly in the arts (Adorno, 1999), seeming to promise the possibility of a completely different kind of subjectivity, Jürgen Habermas (1971) tries to propose an antidote; this does not lie outside of modern-Enlightenment rationality, but rather returns to its original intention. Habermas argues with Marx and Adorno, asserting that technological knowledge has its anthropological roots in the will to dominate nature and therefore serves a strategic interest of man. With this, man is not only Homo faber but also a social animal. Besides the strategic means-end rationality he also possesses a communicative rationality, aimed at defining common moral values and engaging in discourse over ethically acceptable principles of actions. In thus distinguishing two types of rationality, Habermas tries to incorporate much of the German tradition of cognitivistic ethics into his approach. It is important for Habermas that technology be brought under the control of democratic decision-making processes; his discourse ethics has thus helped to inspire ideas of participatory technology assessment.

Outside the Frankfurt School, technology has not been at the center of social and cultural anthropology, as has been often complained (Pfaffenberger, 1988, 1992). Langdon Winner (1986) coined the term technological somnambulism to refer to those theories that neglect the social dimension of technology. According to this dominant tradition, the human-technology relation is “too obvious” to merit serious reflection. Technology is seen as an independent factor of the material and social world, one that forms a relatively autonomous realm of ethically neutral tools to acquire human ends. But already Winner argues that technology is essentially social and is shaped by cultural conditions and underlying value decisions. He claims in a famous article (Winner, 1980) that Long Island’s low bridges were intentionally built in a way that would keep buses away, making it more difficult for the poor, and mainly the black population, to reach the island. Even though this particular claim has been challenged, Winner seems to be correct in pointing out that value decisions play a role in creating technology, and that the social value system leaves its trace in technological artifacts.

In line with this renewed interest in social issues, a new field of studies related to technology emerged in the 1980s, focusing explicitly on this neglected relation between society and technology: the so-called STS approach. Having been labeled the “turn to technology” (Woolgar, 1991), science and technology studies (STS) analyzes society’s impact on science and technology, and science and technology’s impact on society. Several writers draw attention to the social shaping of technology. An influential author is Bruno Latour, who contributed to both the initial appeal to social constructivism (that he later gave up) and the development of the actor-network theory; both are at the center of the debate about the theoretical underpinnings of STS.

Social Constructivism

Woolgar and Latour employ a social-constructivist perspective in their early case study on the production of scientific results, in which they analyze scientists’ attempt to establish and accumulate recognition and credibility of their research through the “cycle of credibility” (Latour, 1979). The main idea of social constructivism is the attempt to interpret alleged objective “facts” in the social world as being socially constructed, so that knowledge of the world and its interpretation depends on social mechanisms and cannot be traced back to objective facts (Berger & Luckmann, 1966). In this sense technology is also not an objective, independent given, but shaped by social ideas and societal interpretations.

Actor-Network Theory

In the 1980s and 1990s, Latour became one of the main proponents of the actor-network theory (Latour, 2005); this is also attractive to scholars who reject social constructivism, since it can be combined with the idea that not all of technology is socially constructed. The social-constructive interpretation of this theory aims to develop a framework in which society and nature, or society and technology, are not separated. The idea of technology as a sociotechnical system implies that agent and tool form a unity, which cannot be explained completely by referring to one of the two elements in isolation. According to this idea, technological artifacts dispose over some form of agency and can be—to some extent—regarded as actants. This ascription of intentionality and agency to technical systems is, however, highly debated. The debate between realism and social constructivism has thus not been settled.

Philosophical Anthropology and the Philosophy of Technology

Research in philosophical anthropology peaked in early 20th-century Germany, discussed in the next section. But outside of anthropological discussions, the topic of technology became an important issue for philosophy, so in this brief overview, important contributions and themes of the continental and analytic tradition will be discussed next. Finally, more recent developments and topics in the philosophy of technology will be sketched that do not try to revitalize a philosophical anthropology, but that nevertheless do touch in one way or another on anthropological perspectives on technology.

Classical philosophical anthropology was mainly interested in understanding the essence of human nature and often draws specific attention to the role of technology. Important contributions came from Gehlen, Plessner, and Scheler during the first half of the 20th century. The attempt to link technology to a biological interpretation of man in Gehlen’s early works especially deserves attention. Given his biological constitution, man must be seen as deficient by nature ( Mängelwesen ), since he is not endowed with instinctive routines and is not adapted well to a specific natural environment, but rather is open to the world ( weltoffen ). He compensates for this deficiency with the help of his mental capacities and tool usage. Gehlen interprets human language and human institutions as relief mechanisms ( Entlastungen ) that help him to interpret and organize the plentitude of impressions (the sensory overload, Reizüberflutung ) that he is exposed to. Most technologies can thus be regarded to be either organ-amplification ( Organverstärkung ) or organ-replacement ( Organersatz ) (Gehlen, 1988). In Man in the Age of Technology (1980), Gehlen focuses more on sociological perspectives of technology. He identifies two essential cultural breaks marking principle changes in humans’ world interpretation and social organization, both of which are linked to technological developments: (1) the neolithic revolution of sedentism, marking the passage from a hunter’s culture to a society of agriculture and cattle breeding, and (2) the industrial revolution in modernity (Gehlen, 1980).

Scheler also analyzes man’s rational capacities from a biological perspective, but he concludes that a purely naturalistic approach does not render justice to our selfunderstanding. The human ways of sustaining life are from an often inefficient biological perspective. Therefore, it must be pointed out that the main function of human knowledge is not only to strategically ensure humans’ own survival, but also to be directed toward the discovery of moral values and toward the process of self-education ( Bildung ). Humans not only live in an environment, but also reflect on their place in the world—a capacity that marks a fundamental difference between humans and animals (Scheler, 1961).

This type of philosophical anthropology came to a certain end when the main interest of philosophers shifted from understanding “man” to understanding “society” during the 1960s. With the recent developments of sociobiology, philosophers have taken a renewed interest in the linkage between biological and cultural interpretations of man. Let us look at some tendencies of later research in the philosophy of technology.

If we look at a philosophical interpretation of technology, we find the first origins of a discipline of the philosophy of technology by the end of the 19th and the beginning of the 20th century (see Kapp, 1877, and Dessauer, 1933). During the first half of the 20th century, the philosophical analysis of technology can, roughly speaking, be divided into two main schools of thought: the continental, often skeptical approach, and the analytical, often optimistic approach . As with all such very generic typologies, this distinction likewise does not claim to be more than an approximation, while the general tendency of recent research seems precisely to be to overcome this gap and to aim for a convergence or crossfertilization of these two approaches. Therefore, what follows is an ideal-type distinction that tries to make some of the basic ideas of these two approaches more visible and aims at understanding their more general features.

The continental approach originally focused on a humanities-centered perspective on technology, its (mainly negative) consequences for society, and its rootedness in a problematic feature of human anthropology (the will to power), and finally tried to understand technology as such (its “essence”). The analytic approach, on the other hand, originally focused on a more science-based understanding of technology, its (mostly beneficial) potential for the progress of societies, and its rootedness in a rational (scientific) way to approach nature, and it finally tried to look not at technology as such but at specific problems or specific types of technologies.

In the continental philosophy of technology, technology is often interpreted as closely linked to a certain form of consciousness, a form of approaching nature (and also human interaction) from a perspective that is rooted in a scientific understanding of the world, which itself is rooted in the will to dominate nature. This approach is seen to replace or at least to endanger a value-based approach to reality. In this sense, Edmund Husserl’s phenomenology regards science and technology as a mere abstraction from the fullfledged real experience of the world we live in. In this way, the sphere of technical knowledge is limited and needs to be guided by value decisions, which do not have their basis in scientific or technical knowledge, but stem from our ethical knowledge of our life-world.

While technology is not at the center of Husserl’s interest, José Ortega y Gasset (1914/1961) was one of the first philosophers who aimed at a deeper understanding of the relation between human nature and technology. Rejecting Husserl’s later emphasis on the transcendental subject, he insists that human nature can only be understood by the formula “I am I plus my circumstances.” Philosophy can thus neither start from the isolated subject (as in idealism), nor can it interpret everything from the perspective of the material conditions (as in materialism). Rather, it must find a middle ground. The essence of humans is for Ortega not determined by nature; this distinguishes humans from plants or animals or from physical objects—all having a defined, specific given nature. Man must determine his own nature by himself by way of the creative imagination. Technology is interpreted as the material realization of this self-image; it is a projection of an inner invention into nature. According to Ortega, technology evolved in three phases: It started as a collection of accidental findings of means toward ends by pure chance. In a later state, these findings became traditions and skills that were passed on to the next generation. Modern technology marks a radical difference, since it is based on a systematic scientific approach, which forms the third phase. This approach, however, tends to become the dominant mode of thinking, so that man’s creative capacity for imagination (which is at the heart of man’s very essence) is in danger of being replaced or losing its importance (Ortega y Gasset, 1914/1961).

Martin Heidegger’s (1977) analysis of technology in his essay “The Question Concerning Technology” is also very influential. His philosophy aims at understanding the notion of being, which—so claims Heidegger—has been misinterpreted or neglected by traditional European philosophy. Since man is the only known being that can ask for the meaning of being, Heidegger’s analysis in Sein und Zeit starts from an interpretation of the existence of such a being ( Da-sein ). Even though his book is meant to be an exercise in philosophical (fundamental) ontology, it offers many anthropological insights about the specific human form of existence, in which the knowledge and the denial of one’s own mortality form essential human features.

In his later work, Heidegger (1977) understands technology as a specific form of disclosing reality. Asked for the essence of technology, people usually refer to it as a means to achieve an end (instrumental definition), or they define technology as an essential human activity (anthropological definition). Even though Heidegger admits that these definitions are “correct,” they do not disclose the essential truth about technology for two reasons. Essentially, (1) technology is not a tool for achieving an end, but rather the perspective under which everything that exists is seen only as a potential resource to achieve an (external) end. Furthermore, (2) this disclosure of reality is not a human-directed practice: Humans are driven objects rather than being themselves the active subjects. According to these conclusions, the instrumental and the anthropological definitions of technology do not capture the whole truth of technology. Let us look at these two points in turn, as follows:

  • The essence of technology lies, according to Heidegger, in its capacity to disclose reality ( entbergen ) under a very specific, limited perspective. This perspective reduces everything to a potential object for manipulation, a resource ( Bestand ) for further activity. Technology is thus a way to disclose something hidden. Following his analysis of the Greek word for truth ( aletheia ) as referring to something undisclosed, he sees thus a “truth” at work, under which reality presents itself as a mere collection of resources for external purposes, rid of all inner logic and teleology that was so prominent in traditional understandings of nature. Heidegger points at the different ways in which a river is seen by a poet in an artwork ( Kunst werk), on the one hand, and, on the other hand, in which the same river is seen by an engineer as a potential resource for energy generation in a power plant ( Kraft werk).
  • Heidegger then goes on to claim that opposed to the image of man being in control of technology and using it for his purposes, he should rather be seen as being provoked ( herausgefordert ) by this coming to pass. Heidegger clearly wants to reject the optimistic idea of “man being in control” through the help of modern technology and, rather, revert it to its opposite: man being driven by a force greater than himself. He calls this driving force the essence of technology, the en-framing ( Ge-stell ) that prompts humans to look at nature under the idea of its usability. In doing so, man is in highest danger, but not because of potential hazards or specific negative consequence of modern technology. The danger is, rather, that he loses sight of understanding nature in a different way and that he might finally end up understanding also himself and other humans only as potential “resources” or potential material for manipulation and instrumentalization. Heidegger suspects that art might be a potential antidote to this development: In Greek, techne originally encompassed also the production of beautiful objects in art. Thus, a deeper understanding of technology might reveal its relation to art and might point to the fact that art offers a potential answer to the challenge that modern technology poses to human self-understanding.

Certainly, Heidegger’s contribution to the modern philosophy of technology lies more in highlighting this essential dimension of technology as a threat, rather than in elaborating strategies to counter these inherent dangers. Heidegger’s article is arguably the single most influential essay written in the philosophy of technology, although his mannered, often dark language allows for different interpretations and often lacks the clarity of philosophical contributions from the analytical school. But the idea that “technology” and technological rationality is a limited form of looking at reality—one that is in strong need of a countervision, and that might further lead to a deformation of intersubjective human relations and that finally affects human self-understanding—has ever since been a prominent topic in different thinkers from Adorno and Marcuse to Jürgen Habermas, as illustrated earlier. This idea has often been linked with an ethical concern: Modern technology calls for new ethical guidelines, and despite some beneficial consequence, poses a potential threat to human existence. Much of this ethical debate about modern technology was triggered by its potential to radically destroy human life, be it through nuclear, biological, or chemical weapons or by consequences of environmental pollution and climate change.

Heidegger’s pupil Hans Jonas (1984) was one of the first philosophers to emphasize the need for a specific “ethics for the age of technology,” feeling that modern technology urges us to radically reconsider our ethical intuitions in order to meet the new challenges. Nevertheless, based on humans’ anthropological need to seek protection against nature, classical technology never fully reached this aim. Nature remained always more powerful than men, and the consequences of human actions were mostly not far-reaching. Traditional ethics could therefore focus on the “near and dear.” Modern technology, however, radically changes the picture: Its scope is unknown in premodern times; its consequences and potential dangers could be fatal, far-reaching, and irreversible. Focusing on the environmental problems of modern societies with, as the darkest perspective, the possible extinction of humankind, Jonas suggests broadening the scope of our ethical obligations: If our actions are more far-reaching than ever before in the history of humankind, we need to acquire a new ethical countervision. Jonas finds this remedy in the anthropological feature of our feelings of responsibility. Responsibility often expresses an asymmetrical relation, as in parents who feel responsible to care for their children. The old ethical intuition to derive obligations from the rights of free and conscious individuals, able to participate in argumentation and democratic decisions, seems to be too narrow to account for most environmental problems: Future generations are not yet born, animals and nature cannot in the same sense be regarded as having rights, as has been established in previous ethical approaches to the idea of universal human rights. But obligations may also stem from the idea of responsibility, from the idea that something has been given into our care.

Analytic philosophy is rooted in the quest for clear conceptualization, sound argumentation, and scientific precision. For early analytical philosophy in the Vienna Circle, the mathematical nature of scientific knowledge could serve as a role model for knowledge as such: hence, the need for and the extended usage of logical formalization within analytic philosophy. Skeptical of the quest to address the essence of things like “the technology” in general, analytic philosophers very often focus on concrete problems linked to very specific technologies. Even though many thinkers in the line of logical positivism thus greeted scientific knowledge as the highest form of knowledge, this did not always lead to an unbalanced embrace of technology. In Bertrand Russell (1951), we find a skeptical attitude toward the social benefits of technology, especially if it is linked with totalitarian ideology. Thus, he stresses the importance of democratic education; if placed in a democratic context and applied in well-defined careful steps, technology is, however, beneficial for progress in a way in which Karl Popper (1957) typically advertises as piecemeal social engineering. Important early contributions to an analytic philosophy of technology stem further from Mario Bunge (1979), whose ideas closely link to the program of logical empiricism and oppose the “romantic wailings about the alleged evils of technology” (p. 68).

Even though this distinction between humanities’ philosophy of technology and engineering’s philosophy of technology (Mitcham, 1994) marks the background of the philosophical discussion on technology in the early 20th century, the debate soon moved beyond this opposition. Three tendencies seem to be of importance.

First, continental philosophy was moving away from the attempt to come up with metaphysical, religious, or anthropological answers to the big questions. With the emergence of postmodernism, the alleged end of the “big stories” was proclaimed, thus making a metaphysical approach less fashionable. Appealing to ontology (as in Heidegger), to metaphysics, or to religious ideals (as in Jonas) seemed less promising. Even though early continental philosophy was very critical with regard to strategic rationality and technology, it has been criticized by postmodernism as not moving radically beyond the central modernistic Western ideal of a rational philosophical synthesis or universal world interpretation.

Second, the focus within the philosophy of technology moved toward a renewed interest in looking at concrete technologies and the challenges they pose for analytical and ethical reflection, a movement that has been called the empirical turn in the philosophy of technology (Kroes, 2001).

Third, different attempts were soon made to bridge the gap between the two camps. In post-world-war Germany, the Society of German Engineers (VDI) established a dialogue about the responsibilities of scientists and engineers, addressing topics and worries of the humanities. The experience of the massive and systematic use of technology for organized mass murder during the holocaust and the development of technology for modern warfare, including the development of the nuclear bomb, raised issues about the responsibilities of engineers. The debate of the VDI meetings resulted in a series of important publications on the philosophy of technology (Rapp, 1981); these must be recognized as an important attempt to synthesize different strands of philosophical thinking, even though it can be asked how far the VDI school was really successful in transcending its engineering-philosophical origins (Mitcham, 1994, p. 71).

Along a similar line, authors have tried to combine the phenomenological approach with American pragmatism, thus bridging insights of a more continental and a more analytical tradition. Common to phenomenology and pragmatism is the idea of the priority of praxis over theory and thus the tendency not to see technology as applied science but, rather, science as a purified or abstract form of (technological) praxis. Following the works of John Dewey, thinkers like Paul T. Durbin (1992), Larry Hickman (1990), and Don Ihde (1979) have tried to establish a pragmatist phenomenological approach to technology. The insights of Don Ihde that each technology either extends human bodily experience (e.g., the microscope) or calls for human interpretations (e.g., the thermometer) are of particular anthropological interest. If technology amplifies our experience, then it always does so at the cost of a reduction: In highlighting or amplifying certain aspects of reality, it makes invisible other aspects of this very same reality (as in an ultrasonic picture) (Ihde, 1979). The way technology thus “mediates” our interpretation of the world, and our actions within it, has been a further object of extended research (e.g., Verbeek, 2005).

A further attempt to bridge humanist and engineering tradition has been made by Carl Mitcham (1994), who nevertheless tries to defend the priority of the humanist perspective, but at the same time develops an analytic framework that should serve for further investigation within the philosophy of technology. He distinguishes among technology as object (tools), as type of knowledge, as activity, and as volition (expression of man’s intention or will). The 1980s and 1990s saw an increased interest, especially in the analyses of the first three aspects of this distinction.

With regard to the fourth aspect, ethical issues have been a central topic for many philosophers of technology, ranging from debates about the responsibility of scientists and engineers, medical and bioethics, business ethics, technology assessment, risk assessment and decision under uncertainty, to environmental ethics. Two of these fields are of particular interest from an anthropological perspective: In environmental ethics, those theories might shed light on anthropological questions seeking to interpret the environmental crisis as essentially rooted in human nature. It has been argued that it is a human tendency to value short-term (individual) interests more highly than long-term (collective) interests, thus putting a pessimistic neo-Hobbesian anthropology in the middle of the debate. According to Garrett Hardin (1968), it is this very human tendency (together with a mismatch in the growth of the human population that exceeds the growth of the supply of the food or other resources) that leads to the “tragedy of the commons.” Research in game theory and environmental sociobiology indicates the possibility of holding a more optimistic view of the development of cooperative strategies in humans (Axelrod, 1984), though the issue is still debated and there is room for a more pessimistic perspective, as has been defended early on by some sociobiologists (Dawkins, 1978) or recently by some philosophers (Gardiner, 2001).

In the ethical debate on transhumanism, finally, many links can be found to classical anthropological questions about the essence of man (e.g., Baillie, 2005; Fukuyama, 2004). The central debated question is whether it is morally allowed, forbidden, or even demanded from us to enhance our human capacities through new technologies, ranging from short-term nonevasive ways (like taking performanceenhancing drugs) to fundamental irreversible changes (like genetic engineering). While bioconservativists argue against an extended usage of enhancement technologies, transhumanists point to the potential benefits of these new options. It is reasonable to assume that these issues will be with us as technology advances and opens new possibilities to alter the human condition. This opens a radical new challenge to anthropology, which until recently dedicated itself to understanding the given human nature, while it now has to face the normative question of which we should choose as our future nature, once technology offers radical new options of changing human nature (e.g., as by slowing down or even stopping the process of aging). It seems that the anthropology of the future must take into consideration, more and more, normative claims and it must reach out to incorporate ethics to prepare itself for the challenges modern technology poses.

Looking at recent tendencies in research, it can be argued that the initial focus on linking technology with a universal, philosophical anthropological vision, also rooted in biological knowledge, was one of the key achievements of early philosophical anthropology in the works of Gehlen and others. What made these anthropologies remarkable was their attempt to bring together the different traditions of anthropological thought, ranging from philosophy to sociology and biology. A turn toward a more social perspective was established first by Gehlen himself, the Frankfurt school, and later STS studies, sometimes leading away from or even lacking both an underlying philosophical vision and an interest in our biological nature. Very recently, however, sociologists and philosophers have shown an increased interest in biology (as is visible in the ever-growing numbers of publications in sociobiology and the philosophy of biology). This increased attention has not yet led to a revival of an interest in the links between anthropology and technology. But in order to understand man—both in his evolutionary origins and (maybe even more) in his current historical situation—it seems to demand attention to man’s amazing capacity to develop technology.

It can reasonably be argued that what is thus needed is a new vision of how to synthesize the different fields of biological, social, and cultural anthropology. It seems that after the empirical turn to gather extended details over the biological and social aspects of technology, there is now a call for a new philosophical turn, seeking a new discourse synthesis. Many classical questions of anthropology will tend to remain unanswered, if academic research remains focused only on disciplinary perspectives, which always look at only a part of the whole picture. It is certainly true that man is a social animal, that he has biological roots and that he can ask ethical and philosophical questions about the good and about his place in this universe. The disciplinary separations in biology, sociology, and philosophy (to name just a few) tend, however, to distract from the fact that man in reality is a unity, meaning that a true answer to the most fundamental question of anthropology (What is man?) calls for a plausible combination of these approaches. To synthesize the different aspects of our knowledge about our own human nature is certainly far from being an easy task, but it seems more needed than ever.

But if this is not yet a big enough challenge, there is even a second aspect that makes the quest for a synthesis even more challenging. It seems that a new anthropological vision of humankind must answer a question that classical anthropology has not been dealing with: If technology soon allows us to alter our very nature, then we must know not only what the human condition is, but also what the human condition should be.

Ethics might again enter anthropological reflection, as has been hinted at already by early thinkers such as Scheler and Jonas. Recent attempts to place man in the middle of both a normative vision of ideals, on the one side, and against a profound overview of our descriptive knowledge about our essence, on the other side (as in the voluminous attempt at a synthesis in Hösle, 2004), deserve attention, as they might be the first steps toward a renewed synthetic anthropology that tries to bridge the gaps among the different disciplines. A deepened understanding of technology must be a central part of these efforts, since the way we use tools and produce artifacts is one of the remarkable features of humankind—a feature in much need of guidance by descriptive knowledge and ethical wisdom, especially in our age in which technology (of which humans have been the subject) is about to discover the condition humana as its potential object in a way more radical than ever before.

Bibliography:

  • Adorno, T. (1979). Dialectic of enlightenment. London: Verso.
  • Adorno, T. (1999). Aesthetic theory. London: Athlone.
  • Ambrose, S. H. (2001). Paleolithic technology and human evolution. Science, 291 (5509), 1748–1753.
  • Axelrod, R. (1984). The evolution of cooperation. New York: Basic Books.
  • Baillie, H. (2005). Is human nature obsolete? Genetics, bioengineering, and the future of the human condition. Cambridge: MIT Press.
  • Beck, B. (1980). Animal tool behaviour. New York: Garland.
  • Berger, P. L., & Luckmann, T. (1966). The social construction of reality: A treatise in the sociology of knowledge. Garden City, NY: Anchor Books.
  • Bunge, M. (1979). The five buds of technophilosophy. Technology in Society, 1 (1), 67–74.
  • Castells, M. (1999). The information age: Economy, society and culture. Malden, MA: Blackwell.
  • Dawkins, R. (1978). The selfish gene. Oxford, UK: Oxford University Press.
  • Durbin, P. (1992). Social responsibility in science, technology, and medicine. Bethlehem, PA: Lehigh University Press.
  • Fukuyama, F. (2004). Transhumanism. Foreign Policy, 144, 42–43.
  • Gardiner, S. M. (2001). The real tragedy of the commons. Philosophy and Public Affairs, 30 (4), 387–416.
  • Gehlen, A. (1980). Man in the age of technology. New York: Columbia University Press.
  • Gehlen, A. (1988). Man, his nature and place in the world. New York: Columbia University Press.
  • Habermas, J. (1971). Knowledge and human interests. Boston: Beacon Press.
  • Haferkamp, H. (1992). Social change and modernity. Berkeley: University of California Press.
  • Heidegger, M. (1977). The question concerning technology, and other essays. New York: Harper & Row.
  • Hickman, L. (1990). John Dewey’s pragmatic technology. Bloomington: Indiana University Press.
  • Hösle, V. (2004). Morals and politics (S. Randall, Trans.). Notre Dame, IN: University of Notre Dame Press.
  • Ihde, D. (1979). Technics and praxis. Boston: D. Reidel.
  • Jonas, H. (1984). The imperative of responsibility: In search of an ethics for the technological age. Chicago: University of Chicago Press.
  • Kroes, P. (2001). The empirical turn in the philosophy of technology. New York: JAI.
  • Laland, K. (2009). The question of animal culture. Cambridge, MA: Harvard University Press.
  • Latour, B. (1979). The social construction of scientific facts. Beverly Hills, CA: Sage.
  • Latour, B. (2005). Reassembling the social: An introduction to actor-network-theory. New York: Oxford University Press.
  • Marx, K. (1938). London: Allen & Unwin.
  • McDermott, J. (1969). Technology: The opiate of the intellectuals. The New York Review of Books, 13 (2), 25–35.
  • Misa, T. J., Brey, P., & Feenberg, A. (2004). Modernity and technology. Cambridge: MIT Press.
  • Mitcham, C. (1994). Thinking through technology: The path between engineering and philosophy. Chicago: University of Chicago Press.
  • Nora, S. (1980). The computerization of society: A report to the president of France. Cambridge: MIT Press.
  • Oakley, K. (1957). Man the tool-maker. Chicago: University of Chicago Press.
  • Ortega y Gasset, J. (1961). Meditations on Quixote. New York: Norton. (Original work published 1914)
  • Pfaffenberger, B. (1988). Fetishised objects and humanized nature: Towards an anthropology of technology. Man, 23 (2), 236–252.
  • Pfaffenberger, B. (1992). Social anthropology of technology. Annual Revue of Anthropology, 21, 491–516.
  • Pressnell, L. (1960). Studies in the industrial revolution, presented to T. S. Ashton. London: University of LondonAthlone Press.
  • Rapp, F. (1981). Analytical philosophy of technology. Boston: D. Reidel.
  • Russell, B. (1951). The impact of science on society. New York: Columbia University Press.
  • Schaik, C. P., Deaner, R. O., & Merrill, M.Y. (1999).The conditions for tool use in primates: Implications for the evolution of material culture. Journal of Human Evolution, 36 (6), 719–741.
  • Scheler, M. (1961). Man’s place in nature. New York: Farrar, Strauss & Giroux.
  • Smelser, N. (1969). Social change in the industrial revolution: An application of theory to the British cotton industry. Chicago: University of Chicago Press.
  • Snow, C. (1959). The two cultures and the scientific revolution (The Rede lecture, 1959). Cambridge, UK: Cambridge University Press.
  • Tomasello, M. (1999). The cultural origins of human cognition. Cambridge, MA: Harvard University Press.
  • Verbeek, P. P. (2005). What things do: Philosophical reflections on technology, agency, and design. University Park: Pennsylvania State University Press.
  • Winner, L. (1980). Do artifacts have politics? Daedalus, 109, 121–123.
  • Winner, L. (1986). Technology as forms of life. In The whale and the reactor: A search for limits in an age of high technology. Chicago: University of Chicago Press.
  • Woolgar, S. (1991). The turn to technology. Science, Technology and Human Values, 16 (1), 20–50.
  • Wrangham, R. (1994). Chimpanzee cultures. Cambridge, MA: Harvard University Press.

ORDER HIGH QUALITY CUSTOM PAPER

research papers on it

  • Free Samples >
  • Type of Paper >
  • Research Paper

Information Technology Research Papers Samples That Help You Write Better, Faster & with Gusto

When you need a slight spank to craft a proper Information Technology Research Paper, nothing does the job better than a high-quality sample you can use for inspiration or as a prototype to follow. And hardly can you find a better place with so many top-notch Research Paper samples than WePapers.com free repository of Information Technology papers. Each Information Technology Research Papers example you spot here can do one or several of these elements for you: give you a tip about an exciting topic; motivate you to come up with an authentic outlook on a well-studied problem; demonstrate the best writing approaches you can employ; and/or present you with accurate structure patterns. Apply this precious insight to create a superior paper of your own or use our competent writers' assistance to get a unique Information Technology Research Paper sample delivered right to your email inbox.

We use cookies to improve your experience with our site. Please accept before continuing or read our cookie policy here .

Wait, have you seen our prices?

Have a language expert improve your writing

Run a free plagiarism check in 10 minutes, generate accurate citations for free.

  • Knowledge Base
  • Research paper

Writing a Research Paper Introduction | Step-by-Step Guide

Published on September 24, 2022 by Jack Caulfield . Revised on March 27, 2023.

Writing a Research Paper Introduction

The introduction to a research paper is where you set up your topic and approach for the reader. It has several key goals:

  • Present your topic and get the reader interested
  • Provide background or summarize existing research
  • Position your own approach
  • Detail your specific research problem and problem statement
  • Give an overview of the paper’s structure

The introduction looks slightly different depending on whether your paper presents the results of original empirical research or constructs an argument by engaging with a variety of sources.

Instantly correct all language mistakes in your text

Be assured that you'll submit flawless writing. Upload your document to correct all your mistakes.

upload-your-document-ai-proofreader

Table of contents

Step 1: introduce your topic, step 2: describe the background, step 3: establish your research problem, step 4: specify your objective(s), step 5: map out your paper, research paper introduction examples, frequently asked questions about the research paper introduction.

The first job of the introduction is to tell the reader what your topic is and why it’s interesting or important. This is generally accomplished with a strong opening hook.

The hook is a striking opening sentence that clearly conveys the relevance of your topic. Think of an interesting fact or statistic, a strong statement, a question, or a brief anecdote that will get the reader wondering about your topic.

For example, the following could be an effective hook for an argumentative paper about the environmental impact of cattle farming:

A more empirical paper investigating the relationship of Instagram use with body image issues in adolescent girls might use the following hook:

Don’t feel that your hook necessarily has to be deeply impressive or creative. Clarity and relevance are still more important than catchiness. The key thing is to guide the reader into your topic and situate your ideas.

Receive feedback on language, structure, and formatting

Professional editors proofread and edit your paper by focusing on:

  • Academic style
  • Vague sentences
  • Style consistency

See an example

research papers on it

This part of the introduction differs depending on what approach your paper is taking.

In a more argumentative paper, you’ll explore some general background here. In a more empirical paper, this is the place to review previous research and establish how yours fits in.

Argumentative paper: Background information

After you’ve caught your reader’s attention, specify a bit more, providing context and narrowing down your topic.

Provide only the most relevant background information. The introduction isn’t the place to get too in-depth; if more background is essential to your paper, it can appear in the body .

Empirical paper: Describing previous research

For a paper describing original research, you’ll instead provide an overview of the most relevant research that has already been conducted. This is a sort of miniature literature review —a sketch of the current state of research into your topic, boiled down to a few sentences.

This should be informed by genuine engagement with the literature. Your search can be less extensive than in a full literature review, but a clear sense of the relevant research is crucial to inform your own work.

Begin by establishing the kinds of research that have been done, and end with limitations or gaps in the research that you intend to respond to.

The next step is to clarify how your own research fits in and what problem it addresses.

Argumentative paper: Emphasize importance

In an argumentative research paper, you can simply state the problem you intend to discuss, and what is original or important about your argument.

Empirical paper: Relate to the literature

In an empirical research paper, try to lead into the problem on the basis of your discussion of the literature. Think in terms of these questions:

  • What research gap is your work intended to fill?
  • What limitations in previous work does it address?
  • What contribution to knowledge does it make?

You can make the connection between your problem and the existing research using phrases like the following.

Now you’ll get into the specifics of what you intend to find out or express in your research paper.

The way you frame your research objectives varies. An argumentative paper presents a thesis statement, while an empirical paper generally poses a research question (sometimes with a hypothesis as to the answer).

Argumentative paper: Thesis statement

The thesis statement expresses the position that the rest of the paper will present evidence and arguments for. It can be presented in one or two sentences, and should state your position clearly and directly, without providing specific arguments for it at this point.

Empirical paper: Research question and hypothesis

The research question is the question you want to answer in an empirical research paper.

Present your research question clearly and directly, with a minimum of discussion at this point. The rest of the paper will be taken up with discussing and investigating this question; here you just need to express it.

A research question can be framed either directly or indirectly.

  • This study set out to answer the following question: What effects does daily use of Instagram have on the prevalence of body image issues among adolescent girls?
  • We investigated the effects of daily Instagram use on the prevalence of body image issues among adolescent girls.

If your research involved testing hypotheses , these should be stated along with your research question. They are usually presented in the past tense, since the hypothesis will already have been tested by the time you are writing up your paper.

For example, the following hypothesis might respond to the research question above:

The only proofreading tool specialized in correcting academic writing - try for free!

The academic proofreading tool has been trained on 1000s of academic texts and by native English editors. Making it the most accurate and reliable proofreading tool for students.

research papers on it

Try for free

The final part of the introduction is often dedicated to a brief overview of the rest of the paper.

In a paper structured using the standard scientific “introduction, methods, results, discussion” format, this isn’t always necessary. But if your paper is structured in a less predictable way, it’s important to describe the shape of it for the reader.

If included, the overview should be concise, direct, and written in the present tense.

  • This paper will first discuss several examples of survey-based research into adolescent social media use, then will go on to …
  • This paper first discusses several examples of survey-based research into adolescent social media use, then goes on to …

Full examples of research paper introductions are shown in the tabs below: one for an argumentative paper, the other for an empirical paper.

  • Argumentative paper
  • Empirical paper

Are cows responsible for climate change? A recent study (RIVM, 2019) shows that cattle farmers account for two thirds of agricultural nitrogen emissions in the Netherlands. These emissions result from nitrogen in manure, which can degrade into ammonia and enter the atmosphere. The study’s calculations show that agriculture is the main source of nitrogen pollution, accounting for 46% of the country’s total emissions. By comparison, road traffic and households are responsible for 6.1% each, the industrial sector for 1%. While efforts are being made to mitigate these emissions, policymakers are reluctant to reckon with the scale of the problem. The approach presented here is a radical one, but commensurate with the issue. This paper argues that the Dutch government must stimulate and subsidize livestock farmers, especially cattle farmers, to transition to sustainable vegetable farming. It first establishes the inadequacy of current mitigation measures, then discusses the various advantages of the results proposed, and finally addresses potential objections to the plan on economic grounds.

The rise of social media has been accompanied by a sharp increase in the prevalence of body image issues among women and girls. This correlation has received significant academic attention: Various empirical studies have been conducted into Facebook usage among adolescent girls (Tiggermann & Slater, 2013; Meier & Gray, 2014). These studies have consistently found that the visual and interactive aspects of the platform have the greatest influence on body image issues. Despite this, highly visual social media (HVSM) such as Instagram have yet to be robustly researched. This paper sets out to address this research gap. We investigated the effects of daily Instagram use on the prevalence of body image issues among adolescent girls. It was hypothesized that daily Instagram use would be associated with an increase in body image concerns and a decrease in self-esteem ratings.

The introduction of a research paper includes several key elements:

  • A hook to catch the reader’s interest
  • Relevant background on the topic
  • Details of your research problem

and your problem statement

  • A thesis statement or research question
  • Sometimes an overview of the paper

Don’t feel that you have to write the introduction first. The introduction is often one of the last parts of the research paper you’ll write, along with the conclusion.

This is because it can be easier to introduce your paper once you’ve already written the body ; you may not have the clearest idea of your arguments until you’ve written them, and things can change during the writing process .

The way you present your research problem in your introduction varies depending on the nature of your research paper . A research paper that presents a sustained argument will usually encapsulate this argument in a thesis statement .

A research paper designed to present the results of empirical research tends to present a research question that it seeks to answer. It may also include a hypothesis —a prediction that will be confirmed or disproved by your research.

Cite this Scribbr article

If you want to cite this source, you can copy and paste the citation or click the “Cite this Scribbr article” button to automatically add the citation to our free Citation Generator.

Caulfield, J. (2023, March 27). Writing a Research Paper Introduction | Step-by-Step Guide. Scribbr. Retrieved February 16, 2024, from https://www.scribbr.com/research-paper/research-paper-introduction/

Is this article helpful?

Jack Caulfield

Jack Caulfield

Other students also liked, writing strong research questions | criteria & examples, writing a research paper conclusion | step-by-step guide, research paper format | apa, mla, & chicago templates, what is your plagiarism score.

PrepScholar

Choose Your Test

Sat / act prep online guides and tips, 113 great research paper topics.

author image

General Education

feature_pencilpaper

One of the hardest parts of writing a research paper can be just finding a good topic to write about. Fortunately we've done the hard work for you and have compiled a list of 113 interesting research paper topics. They've been organized into ten categories and cover a wide range of subjects so you can easily find the best topic for you.

In addition to the list of good research topics, we've included advice on what makes a good research paper topic and how you can use your topic to start writing a great paper.

What Makes a Good Research Paper Topic?

Not all research paper topics are created equal, and you want to make sure you choose a great topic before you start writing. Below are the three most important factors to consider to make sure you choose the best research paper topics.

#1: It's Something You're Interested In

A paper is always easier to write if you're interested in the topic, and you'll be more motivated to do in-depth research and write a paper that really covers the entire subject. Even if a certain research paper topic is getting a lot of buzz right now or other people seem interested in writing about it, don't feel tempted to make it your topic unless you genuinely have some sort of interest in it as well.

#2: There's Enough Information to Write a Paper

Even if you come up with the absolute best research paper topic and you're so excited to write about it, you won't be able to produce a good paper if there isn't enough research about the topic. This can happen for very specific or specialized topics, as well as topics that are too new to have enough research done on them at the moment. Easy research paper topics will always be topics with enough information to write a full-length paper.

Trying to write a research paper on a topic that doesn't have much research on it is incredibly hard, so before you decide on a topic, do a bit of preliminary searching and make sure you'll have all the information you need to write your paper.

#3: It Fits Your Teacher's Guidelines

Don't get so carried away looking at lists of research paper topics that you forget any requirements or restrictions your teacher may have put on research topic ideas. If you're writing a research paper on a health-related topic, deciding to write about the impact of rap on the music scene probably won't be allowed, but there may be some sort of leeway. For example, if you're really interested in current events but your teacher wants you to write a research paper on a history topic, you may be able to choose a topic that fits both categories, like exploring the relationship between the US and North Korea. No matter what, always get your research paper topic approved by your teacher first before you begin writing.

113 Good Research Paper Topics

Below are 113 good research topics to help you get you started on your paper. We've organized them into ten categories to make it easier to find the type of research paper topics you're looking for.

Arts/Culture

  • Discuss the main differences in art from the Italian Renaissance and the Northern Renaissance .
  • Analyze the impact a famous artist had on the world.
  • How is sexism portrayed in different types of media (music, film, video games, etc.)? Has the amount/type of sexism changed over the years?
  • How has the music of slaves brought over from Africa shaped modern American music?
  • How has rap music evolved in the past decade?
  • How has the portrayal of minorities in the media changed?

music-277279_640

Current Events

  • What have been the impacts of China's one child policy?
  • How have the goals of feminists changed over the decades?
  • How has the Trump presidency changed international relations?
  • Analyze the history of the relationship between the United States and North Korea.
  • What factors contributed to the current decline in the rate of unemployment?
  • What have been the impacts of states which have increased their minimum wage?
  • How do US immigration laws compare to immigration laws of other countries?
  • How have the US's immigration laws changed in the past few years/decades?
  • How has the Black Lives Matter movement affected discussions and view about racism in the US?
  • What impact has the Affordable Care Act had on healthcare in the US?
  • What factors contributed to the UK deciding to leave the EU (Brexit)?
  • What factors contributed to China becoming an economic power?
  • Discuss the history of Bitcoin or other cryptocurrencies  (some of which tokenize the S&P 500 Index on the blockchain) .
  • Do students in schools that eliminate grades do better in college and their careers?
  • Do students from wealthier backgrounds score higher on standardized tests?
  • Do students who receive free meals at school get higher grades compared to when they weren't receiving a free meal?
  • Do students who attend charter schools score higher on standardized tests than students in public schools?
  • Do students learn better in same-sex classrooms?
  • How does giving each student access to an iPad or laptop affect their studies?
  • What are the benefits and drawbacks of the Montessori Method ?
  • Do children who attend preschool do better in school later on?
  • What was the impact of the No Child Left Behind act?
  • How does the US education system compare to education systems in other countries?
  • What impact does mandatory physical education classes have on students' health?
  • Which methods are most effective at reducing bullying in schools?
  • Do homeschoolers who attend college do as well as students who attended traditional schools?
  • Does offering tenure increase or decrease quality of teaching?
  • How does college debt affect future life choices of students?
  • Should graduate students be able to form unions?

body_highschoolsc

  • What are different ways to lower gun-related deaths in the US?
  • How and why have divorce rates changed over time?
  • Is affirmative action still necessary in education and/or the workplace?
  • Should physician-assisted suicide be legal?
  • How has stem cell research impacted the medical field?
  • How can human trafficking be reduced in the United States/world?
  • Should people be able to donate organs in exchange for money?
  • Which types of juvenile punishment have proven most effective at preventing future crimes?
  • Has the increase in US airport security made passengers safer?
  • Analyze the immigration policies of certain countries and how they are similar and different from one another.
  • Several states have legalized recreational marijuana. What positive and negative impacts have they experienced as a result?
  • Do tariffs increase the number of domestic jobs?
  • Which prison reforms have proven most effective?
  • Should governments be able to censor certain information on the internet?
  • Which methods/programs have been most effective at reducing teen pregnancy?
  • What are the benefits and drawbacks of the Keto diet?
  • How effective are different exercise regimes for losing weight and maintaining weight loss?
  • How do the healthcare plans of various countries differ from each other?
  • What are the most effective ways to treat depression ?
  • What are the pros and cons of genetically modified foods?
  • Which methods are most effective for improving memory?
  • What can be done to lower healthcare costs in the US?
  • What factors contributed to the current opioid crisis?
  • Analyze the history and impact of the HIV/AIDS epidemic .
  • Are low-carbohydrate or low-fat diets more effective for weight loss?
  • How much exercise should the average adult be getting each week?
  • Which methods are most effective to get parents to vaccinate their children?
  • What are the pros and cons of clean needle programs?
  • How does stress affect the body?
  • Discuss the history of the conflict between Israel and the Palestinians.
  • What were the causes and effects of the Salem Witch Trials?
  • Who was responsible for the Iran-Contra situation?
  • How has New Orleans and the government's response to natural disasters changed since Hurricane Katrina?
  • What events led to the fall of the Roman Empire?
  • What were the impacts of British rule in India ?
  • Was the atomic bombing of Hiroshima and Nagasaki necessary?
  • What were the successes and failures of the women's suffrage movement in the United States?
  • What were the causes of the Civil War?
  • How did Abraham Lincoln's assassination impact the country and reconstruction after the Civil War?
  • Which factors contributed to the colonies winning the American Revolution?
  • What caused Hitler's rise to power?
  • Discuss how a specific invention impacted history.
  • What led to Cleopatra's fall as ruler of Egypt?
  • How has Japan changed and evolved over the centuries?
  • What were the causes of the Rwandan genocide ?

main_lincoln

  • Why did Martin Luther decide to split with the Catholic Church?
  • Analyze the history and impact of a well-known cult (Jonestown, Manson family, etc.)
  • How did the sexual abuse scandal impact how people view the Catholic Church?
  • How has the Catholic church's power changed over the past decades/centuries?
  • What are the causes behind the rise in atheism/ agnosticism in the United States?
  • What were the influences in Siddhartha's life resulted in him becoming the Buddha?
  • How has media portrayal of Islam/Muslims changed since September 11th?

Science/Environment

  • How has the earth's climate changed in the past few decades?
  • How has the use and elimination of DDT affected bird populations in the US?
  • Analyze how the number and severity of natural disasters have increased in the past few decades.
  • Analyze deforestation rates in a certain area or globally over a period of time.
  • How have past oil spills changed regulations and cleanup methods?
  • How has the Flint water crisis changed water regulation safety?
  • What are the pros and cons of fracking?
  • What impact has the Paris Climate Agreement had so far?
  • What have NASA's biggest successes and failures been?
  • How can we improve access to clean water around the world?
  • Does ecotourism actually have a positive impact on the environment?
  • Should the US rely on nuclear energy more?
  • What can be done to save amphibian species currently at risk of extinction?
  • What impact has climate change had on coral reefs?
  • How are black holes created?
  • Are teens who spend more time on social media more likely to suffer anxiety and/or depression?
  • How will the loss of net neutrality affect internet users?
  • Analyze the history and progress of self-driving vehicles.
  • How has the use of drones changed surveillance and warfare methods?
  • Has social media made people more or less connected?
  • What progress has currently been made with artificial intelligence ?
  • Do smartphones increase or decrease workplace productivity?
  • What are the most effective ways to use technology in the classroom?
  • How is Google search affecting our intelligence?
  • When is the best age for a child to begin owning a smartphone?
  • Has frequent texting reduced teen literacy rates?

body_iphone2

How to Write a Great Research Paper

Even great research paper topics won't give you a great research paper if you don't hone your topic before and during the writing process. Follow these three tips to turn good research paper topics into great papers.

#1: Figure Out Your Thesis Early

Before you start writing a single word of your paper, you first need to know what your thesis will be. Your thesis is a statement that explains what you intend to prove/show in your paper. Every sentence in your research paper will relate back to your thesis, so you don't want to start writing without it!

As some examples, if you're writing a research paper on if students learn better in same-sex classrooms, your thesis might be "Research has shown that elementary-age students in same-sex classrooms score higher on standardized tests and report feeling more comfortable in the classroom."

If you're writing a paper on the causes of the Civil War, your thesis might be "While the dispute between the North and South over slavery is the most well-known cause of the Civil War, other key causes include differences in the economies of the North and South, states' rights, and territorial expansion."

#2: Back Every Statement Up With Research

Remember, this is a research paper you're writing, so you'll need to use lots of research to make your points. Every statement you give must be backed up with research, properly cited the way your teacher requested. You're allowed to include opinions of your own, but they must also be supported by the research you give.

#3: Do Your Research Before You Begin Writing

You don't want to start writing your research paper and then learn that there isn't enough research to back up the points you're making, or, even worse, that the research contradicts the points you're trying to make!

Get most of your research on your good research topics done before you begin writing. Then use the research you've collected to create a rough outline of what your paper will cover and the key points you're going to make. This will help keep your paper clear and organized, and it'll ensure you have enough research to produce a strong paper.

What's Next?

Are you also learning about dynamic equilibrium in your science class? We break this sometimes tricky concept down so it's easy to understand in our complete guide to dynamic equilibrium .

Thinking about becoming a nurse practitioner? Nurse practitioners have one of the fastest growing careers in the country, and we have all the information you need to know about what to expect from nurse practitioner school .

Want to know the fastest and easiest ways to convert between Fahrenheit and Celsius? We've got you covered! Check out our guide to the best ways to convert Celsius to Fahrenheit (or vice versa).

Need more help with this topic? Check out Tutorbase!

Our vetted tutor database includes a range of experienced educators who can help you polish an essay for English or explain how derivatives work for Calculus. You can use dozens of filters and search criteria to find the perfect person for your needs.

Connect With a Tutor Now

These recommendations are based solely on our knowledge and experience. If you purchase an item through one of our links, PrepScholar may receive a commission.

author image

Christine graduated from Michigan State University with degrees in Environmental Biology and Geography and received her Master's from Duke University. In high school she scored in the 99th percentile on the SAT and was named a National Merit Finalist. She has taught English and biology in several countries.

Student and Parent Forum

Our new student and parent forum, at ExpertHub.PrepScholar.com , allow you to interact with your peers and the PrepScholar staff. See how other students and parents are navigating high school, college, and the college admissions process. Ask questions; get answers.

Join the Conversation

Ask a Question Below

Have any questions about this article or other topics? Ask below and we'll reply!

Improve With Our Famous Guides

  • For All Students

The 5 Strategies You Must Be Using to Improve 160+ SAT Points

How to Get a Perfect 1600, by a Perfect Scorer

Series: How to Get 800 on Each SAT Section:

Score 800 on SAT Math

Score 800 on SAT Reading

Score 800 on SAT Writing

Series: How to Get to 600 on Each SAT Section:

Score 600 on SAT Math

Score 600 on SAT Reading

Score 600 on SAT Writing

Free Complete Official SAT Practice Tests

What SAT Target Score Should You Be Aiming For?

15 Strategies to Improve Your SAT Essay

The 5 Strategies You Must Be Using to Improve 4+ ACT Points

How to Get a Perfect 36 ACT, by a Perfect Scorer

Series: How to Get 36 on Each ACT Section:

36 on ACT English

36 on ACT Math

36 on ACT Reading

36 on ACT Science

Series: How to Get to 24 on Each ACT Section:

24 on ACT English

24 on ACT Math

24 on ACT Reading

24 on ACT Science

What ACT target score should you be aiming for?

ACT Vocabulary You Must Know

ACT Writing: 15 Tips to Raise Your Essay Score

How to Get Into Harvard and the Ivy League

How to Get a Perfect 4.0 GPA

How to Write an Amazing College Essay

What Exactly Are Colleges Looking For?

Is the ACT easier than the SAT? A Comprehensive Guide

Should you retake your SAT or ACT?

When should you take the SAT or ACT?

Stay Informed

research papers on it

Get the latest articles and test prep tips!

Looking for Graduate School Test Prep?

Check out our top-rated graduate blogs here:

GRE Online Prep Blog

GMAT Online Prep Blog

TOEFL Online Prep Blog

Holly R. "I am absolutely overjoyed and cannot thank you enough for helping me!”
  • Skip to primary navigation
  • Skip to main content

Eduzenith

Information Technology Research Paper Topics

The information technology field is vast. It is evolving with every passing day, as new technologies and products are being introduced in it. Therefore, narrowing down your search for some interesting information technology research paper topics can be a difficult task. We help you in this article to choose an ideal IT research topic.

Like it? Share it!

Information Technology Research Paper Topics

We all are stupefied by the way technology has changed our lives. None of us would have imagined, few decades ago, that there will be something like Google that would give us information about anything and everything we want. Similarly, there are social networking websites, smartphones, Mac computers, iPads, HDTVs, 5G Internet, amazing operating systems, and what not! Information Technology (IT) has changed the way we live. It has ushered us in an era of comfort and luxury. If you are an IT student or a researcher interested in writing some thesis in the IT field, there are abundant topics to choose. However, the topics you choose must be relevant and useful to the IT world. It must be able to solve technical problems in the field of IT or it can be anything that helps in general improvement of the IT field.

Suggested Topics for Information Technology Research Paper

It is imperative for you to make a note of several points while writing a technical research paper. Your research must be totally relevant to your chosen topic. Your research must help engineers or scientists in some way with their ongoing projects or it should help in sorting out some limitations of this field. Your paper must also consider innovations of the present day methods or any further key development related to it. Moreover, excellent technical details, presentation and documentation are also vital aspects of a research paper. But before all that, you must know what to research and write about.

✍ Cloud Computing: A new Era of IT Opportunity and Challenges IT industry stands at the threshold of a new era in the technological leap. Cloud computing is everything that could answer the problems of IT companies. Cloud computing has the ability to make IT resources more cheaper and it gives businesses a great flexibility to expand. Discuss how cloud computing will prove to the next milestone in IT world.

✍ Developing Graphic Systems for IT Applications There are number of fields like military, healthcare, architecture where computer graphics play a crucial role. Image analysis, threat identification, weather prediction, body analysis, architectural drawings, everywhere graphics are vital. By analyzing the most advanced present day graphic systems, the paper should suggest innovations and developments in them.

✍ Internet Censorship: Should It be Allowed? It is an issue that has created huge controversies after some world renowned Internet Search engines were banned in some countries. Should we control the flow of information? Is Internet censorship essential to avoid several cyber crimes? Study and analyze the both sides of the coin, giving innovative alternatives to it.

✍ Cryptography and Computer Security Cryptography has amazingly benefited computers, ATMs and e-commerce in the last couple of years. Understanding the working of hackers, identity thieves presents a very interesting area of research. Viruses, Trojans, cyber laws, anything related to computer security, forms one of the best research paper topic ideas on computers, especially for computer engineers and young IT professionals.

Some Other Information Technology Research Paper Topics

✍ Assessment of Robot Assisted Surgery ✍ Issues of Privacy and Databases in the Ever Broadening IT World ✍ The Future of Artificial Intelligence ✍ E-commerce and the World Wide Web: An Evolving Relationship ✍ Genetic Engineering and Role of Computers in It ✍ Controlling Pornography over the Internet ✍ Evolving Human Computer Interaction ✍ The Future of Computational Photography ✍ Sensor Networks Evolution: Opportunities and Challenges ✍ Claytronics Future Applications ✍ Future of Bioinformatics and Biometrix ✍ Electronic surveillance In Modern World ✍ Future of Social Media ✍ Multimedia over ATM Networks ✍ Comparative Study of Windows, Linux, Unix, and Ubuntu ✍ Basic input/output system (BIOS) Functions and Modifications ✍ Growing Challenges in Website Development ✍ Making Parallel Packet Switches Practical ✍ Network Congestion Control Program (NCP) ✍ Design and Study of Single Buffered Routers ✍ Implementing Real-Time Programmable Shading ✍ 3-D Rendering Algorithms ✍ Simulation & Analysis of Musculosekeltal Systems ✍ Human Modeling and Simulation Future ✍ Multilayer Switch In Networking

These are just some of the many information technology research paper topics. While writing a technical research paper, your research must be backed by sufficient proofs and facts. Since academic researches take time, your dedication, focus and time management are also very important. We did not give you a long list of topics so that you don’t get confused due to many options. Choose any of the above topics that you find interesting and just start your research. All the best!

Privacy Overview

Outstanding Achievements Recognized: Two Research Papers get Best Paper Awards at International Conference on Cyber Intelligence and Information Retrieval (CIIR 2023)

Photo of Profespor Debabrata Samanta

At the 2nd International Conference on Cyber Intelligence and Information Retrieval (CIIR 2023) held on December 14-15, 2023, the distinguished Best Paper Awards was awarded to Prof. Debabrata Samanta , Ph.D., who serves as the Program Head & Assistant Professor at the Department of Computing and Information Technologies, Rochester Institute of Technology, Kosovo, in recognition of his outstanding contributions to the research community.

Dr. Debabrata Samanta, distinguished academic and researcher, has effectively cultivated a dynamic and collaborative research team comprising esteemed faculty members, dedicated non-teaching staff, and talented students. The establishment of this interdisciplinary team under Dr. Samanta's guidance mirrors his visionary approach to research and dedication to nurturing an innovative culture within the academic community.

This diverse research team, comprising individuals with varied expertise and perspectives, has consistently demonstrated exceptional performance, yielding commendable research outcomes over the past years. Dr. Samanta's strategic leadership has created an environment that encourages synergy among team members, fostering a collaborative spirit that transcends traditional boundaries creating a cohesive unit that excels in addressing complex research challenges. The inclusive approach, which involves both faculty members and students, not only enhances the learning experience but also ensures a continuous exchange of knowledge and fresh perspectives.  We are immensely proud to see our research garner recognition at a forum as esteemed as CIIR 2023, a testament to the quality and impact of our scholarly endeavors. 

The awarded papers and their respective co-researchers are as follows:

Paper 1: A Ymerhalili, Debabrata Samanta, S Podder, Impact of Health Information Systems on Healthcare Service Quality in Supporting Non-Communicable Disease Management in Kosovo , 2nd International Conference on Cyber Intelligence and Information Retrieval, 14-15 Dec, 2023 @ Springer-Scopus , Acknowledgments extend to Alba Ymerhalili and Dr. Suplab Podder, whose collaborative efforts significantly contributed to the success of this research endeavor.

Paper 2: K Muloor, S K Sahu, Debabrata Samanta and Karthikeyan M P, A Bhattacharya, S Dutta, Automate threat detection and analysis through intelligent data mining techniques for network traffic and cyber security , 2nd International Conference on Cyber Intelligence and Information Retrieval, 14-15 Dec, 2023 @ Springer-Scopus, Gratitude is expressed to a great team of co-researchers - Kiran Muloor, Somesh Kumar Sahu, Marimuthu Karuppiah, Dr. Abhishek Bhattacharya, and Dr. Soumi Dutta. Their collective expertise and dedication have played a pivotal role in securing this prestigious recognition.  As these accolades underscore, our dedication to advancing the frontiers of knowledge and generating meaningful contributions to the field remains steadfast.  We express our heartfelt thanks to everyone involved for their invaluable contributions to this remarkable achievement.  Stay tuned for further insights into the groundbreaking research presented at CIIR 2023 as we continue to strive for excellence in academic endeavors.

Recommended News

February 13, 2024

Picture of Petrit Kelmendi working at Microsoft

RIT Kosovo (A.U.K) Alumni Driving Growth at Microsoft

Petrit Kelmendi (BS ’09) works at Microsoft where he plays a pivotal role in defining growth strategies, product business models, and pricing for various Microsoft Power Platform products, including the launch of new generative AI features.

He is passionate about pricing and has been a featured speaker at numerous pricing-focused conferences, including the upcoming "For Big Pricing Wins" conference by the Pricing Professional Society in Dallas, Texas. Petrit is also a co-founder of the Pricing Academy, which empowers North American pricing talent to achieve their full potential and transform their companies into profit powerhouses.

February 1, 2024

photo of stefora training in maymooth university Ireland

RIT K Team Visit Maynooth University Ireland As Part of the STEFORA Project Implementation

As part of the STEFORA Project activities, RIT Kosovo team participated in the Digital Citizenship training for STEM faculty and administrators that was held at Maynooth University in Ireland on January 24-26, 2024.  The training covered topics such as Digital Citizenship, Digital Safety and Higher Education Institutions, Security Awareness, Digital Literacy, and Responsible Online Behavior.

January 31, 2024

picture cutting the ribbon Promoting new labs

RIT Kosovo (A.U.K) College Launches Educational Partnership Hubs (EPH) for Inter-Ethnic Collaboration

Pristina, Kosovo – [January 31, 2024] – In a significant stride towards fostering inter-ethnic understanding and collaboration, the American University in Kosovo Foundation and RIT Kosovo (A.U.K) are honored to announce the inauguration of the Educational Partnership Hubs (EPH) for Inter-Ethnic Collaboration. This initiative, supported by a generous grant from the USAID's American Schools and Hospitals Abroad (ASHA) program, signifies a pivotal advancement in educational integration and excellence.

January 26, 2024

research papers on it

Faculty development session Paper publishing Strategies Workshop

The Faculty Development Center at RIT K has recently organized the 'Paper Publishing Strategies Workshop' as part of its ongoing activities.

share this!

February 6, 2024

This article has been reviewed according to Science X's editorial process and policies . Editors have highlighted the following attributes while ensuring the content's credibility:

fact-checked

peer-reviewed publication

trusted source

Reading on screens instead of paper is a less effective way to absorb and retain information, suggests research

by Georgia Gowing, Macquarie University

Reading on screens is a less effective way to absorb and retain information than paper

Research suggests that reading on screens is a less effective way to absorb and retain information than reading the old-fashioned way, but why? And when so many of us are noticing shortening attention spans, how do we learn to concentrate on books again?

In a world where screens are ubiquitous, both in work hours and leisure time, it was inevitable that the way we read would change.

Digital content ranges from brief social media posts and video subtitles to longer-form material like e-books, reports and academic papers, which require more sustained focus and attention and a higher level of comprehension.

While the basic process of looking at and interpreting the written word remains the same, reading on a screen differs from "static" reading of paper-based material.

Macquarie University researchers, Dr. Sixin Liao, Dr. Lili Yu, Dr. Jan-Louis Kruger and Professor Erik Reichle recently conducted a review of dynamic reading in the digital age, now published in Trends in Cognitive Science .

Professor Erik Reichle, from the School of Psychological Sciences, says in terms of human brain development, reading is a recent addition to our communication arsenal.

"We did not evolve to read, and the interplay of cognitive and visual systems that is needed for us to do so is incredibly complex," he says.

"It requires rapid shifts of attention and higher-level linguistic representation in a series of separate mental processes all happening dynamically, and each taking 60–200 milliseconds.

"Our language developed as speech, so speaking and listening come naturally, but reading only emerged about 5,500 years ago.

"We are not hard-wired to read, and it remains something we have to learn, and can only master by practicing for 10 to 15 years."

The screen inferiority effect

If reading is a recent innovation, then reading on screens is brand new, and it has brought further challenges for our brains.

A number of research studies strongly suggest that when we read text on a screen, we understand less than if we read the same text on paper, and this applies across languages and writing systems.

This is the screen inferiority effect, and one of its problems is that we are likely to come away with only the gist of what we've read but struggle to recall details.

Dr. Lili Yu, from the School of Psychological Sciences, says a number of contributing factors may be at play, including the content of what we are reading.

"When people become immersed in a narrative, like a novel, then comprehension is less likely to be affected by reading on a screen," she says.

"However, comprehension drops when we are using a screen to read information-dense text, like a textbook for study.

"The amount of time you have available also seems to be a factor, as when readers are put under pressure in studies to read something quickly, their comprehension drops for test on screen compared to paper.

"The effect is more pronounced for less skilled readers, and one study also suggested that reading on a screen can increase readers' susceptibility to misinformation, as they don't notice discrepancies in the content so easily."

Just why this drop in comprehension happens is not well understood and requires further research.

Dr. Yu says physical factors such as eye strain, brightness, comfort and fatigue may be adding to it, and habit and association could also have an effect.

With the advent of smartphones, we have come to associate screens with shorter, less serious content that encourages skimming. Trying to read something longer and with more complex language can result in a struggle to focus, particularly on small screens.

Screens also come with built-in distractions like frequent notifications, animated ads, pop-ups, auto‑playing video, and links to take us away to other stories, and all these are competing for our attention.

The only exception to the screen inferiority rule may be e-readers, which are designed to mirror the experience of reading a book as closely as possible.

Dr. Yu says that screen inferiority may have implications for learning, both online and in classrooms when screens are used.

"We know people who are less skilled readers are most affected, which means the greatest impact is likely to be on the people who already need more help to succeed," she says.

"Something we don't yet understand is what effect it will have on children who are learning to read primarily on screens, and we are not likely to find out for another 10 to 15 years."

Getting back to paper

As reading on screens is chipping away at our comprehension, some of us are also noticing that our ability to focus on printed material like books has fallen.

Professor Reichle says constant multitasking has had a part to play to reducing the amount of time we can sustain our concentration.

"When we are watching TV or talking to someone, we are often using our phones to scroll social media or play a game at the same time," he says.

"We aren't giving either activity our full attention, but the content we're seeing there is very short, it is engaging, and we've learned that it can give us frequent hits of dopamine.

"Books are static, there's nothing moving or flashing, so it has become harder for them to keep our attention."

And if we are hoping for a quick fix, the news is not promising.

The only way to get used to focusing on books again is to spend more time reading them, Professor Reichle says.

He recommends choosing a book you know will be of interest, sitting in a comfortable place with good lighting, and minimizing other distractions like phones and TVs.

"Focus is a skill that you have to rebuild gradually, so don't expect to get it back immediately," he says.

"It's going to take time, but it is worth the effort."

This content was originally published on The Macquarie University Lighthouse .

Journal information: Trends in Cognitive Sciences

Provided by Macquarie University

Explore further

Feedback to editors

research papers on it

CERN researchers measure speed of sound in the quark–gluon plasma more precisely than ever before

14 hours ago

research papers on it

NASA's final tally shows spacecraft returned double the amount of asteroid rubble

research papers on it

Harnessing light with hemispherical shells for improved photovoltaics

research papers on it

New species of pirate spiders discovered on South Atlantic island

15 hours ago

research papers on it

Bacteria in the Arctic seabed are active all year round, researchers find

research papers on it

Martians wanted: Apply here now for NASA's simulated yearlong Mars mission

research papers on it

5,000 atoms are all you need: The smallest solid-state ferroelectricity

research papers on it

Stabilizing mRNA vaccines for delivery to cells

17 hours ago

research papers on it

Measuring neutrons to reduce nuclear waste: New technique paves the way for improved nuclear waste treatment facilities

research papers on it

'Live fast, die young': Agriculture is transforming entire ecosystems

Relevant physicsforums posts, music to lift your soul: 4 genres & honorable mention.

26 minutes ago

Cover songs versus the original track, which ones are better?

36 minutes ago

Two-tone, Ska rock

2 hours ago

What are your favorite Disco "Classics"?

6 hours ago

Great Rhythm Sections in the 21st Century

21 hours ago

Which ancient civilizations are you most interested in?

23 hours ago

More from Art, Music, History, and Linguistics

Related Stories

research papers on it

Study shows digital leisure reading does little to improve reading comprehension for students

Dec 13, 2023

research papers on it

You can always become a better reader, say researchers

Dec 12, 2023

research papers on it

Deepen your empathy by reading more and reading more often, linguist says

Jan 11, 2024

research papers on it

My kid won't read chapter books. What do I do?

Jan 9, 2023

research papers on it

Character count per line of digital text found to affect reading speed

Nov 10, 2020

research papers on it

How vocabulary breadth and depth influence bilingual reading comprehension

Aug 21, 2023

Recommended for you

research papers on it

Suicide rates in the US are on the rise. A new study offers surprising reasons why

Feb 15, 2024

research papers on it

How Chinese migrants in Los Angeles Chinatown gained self-reliance

research papers on it

Most people would be equally satisfied with having one child as with two or three, finds research

research papers on it

Nearly 15% of Americans deny climate change is real, AI study finds

Feb 14, 2024

research papers on it

Study finds emojis are differently interpreted depending on gender, culture, and age of viewer

research papers on it

Online images may be turning back the clock on gender bias

Let us know if there is a problem with our content.

Use this form if you have come across a typo, inaccuracy or would like to send an edit request for the content on this page. For general inquiries, please use our contact form . For general feedback, use the public comments section below (please adhere to guidelines ).

Please select the most appropriate category to facilitate processing of your request

Thank you for taking time to provide your feedback to the editors.

Your feedback is important to us. However, we do not guarantee individual replies due to the high volume of messages.

E-mail the story

Your email address is used only to let the recipient know who sent the email. Neither your address nor the recipient's address will be used for any other purpose. The information you enter will appear in your e-mail message and is not retained by Phys.org in any form.

Newsletter sign up

Get weekly and/or daily updates delivered to your inbox. You can unsubscribe at any time and we'll never share your details to third parties.

More information Privacy policy

Donate and enjoy an ad-free experience

We keep our content available to everyone. Consider supporting Science X's mission by getting a premium account.

E-mail newsletter

Mobile Navigation

Video generation models as world simulators.

We explore large-scale training of generative models on video data. Specifically, we train text-conditional diffusion models jointly on videos and images of variable durations, resolutions and aspect ratios. We leverage a transformer architecture that operates on spacetime patches of video and image latent codes. Our largest model, Sora, is capable of generating a minute of high fidelity video. Our results suggest that scaling video generation models is a promising path towards building general purpose simulators of the physical world.

More resources

  • View Sora overview

This technical report focuses on (1) our method for turning visual data of all types into a unified representation that enables large-scale training of generative models, and (2) qualitative evaluation of Sora’s capabilities and limitations. Model and implementation details are not included in this report.

Much prior work has studied generative modeling of video data using a variety of methods, including recurrent networks, [^1] [^2] [^3] generative adversarial networks, [^4] [^5] [^6] [^7] autoregressive transformers, [^8] [^9] and diffusion models. [^10] [^11] [^12] These works often focus on a narrow category of visual data, on shorter videos, or on videos of a fixed size. Sora is a generalist model of visual data—it can generate videos and images spanning diverse durations, aspect ratios and resolutions, up to a full minute of high definition video.

Turning visual data into patches

We take inspiration from large language models which acquire generalist capabilities by training on internet-scale data. [^13] [^14] The success of the LLM paradigm is enabled in part by the use of tokens that elegantly unify diverse modalities of text—code, math and various natural languages. In this work, we consider how generative models of visual data can inherit such benefits. Whereas LLMs have text tokens, Sora has visual patches . Patches have previously been shown to be an effective representation for models of visual data. [^15] [^16] [^17] [^18] We find that patches are a highly-scalable and effective representation for training generative models on diverse types of videos and images.

Figure Patches

At a high level, we turn videos into patches by first compressing videos into a lower-dimensional latent space, [^19] and subsequently decomposing the representation into spacetime patches.

Video compression network

We train a network that reduces the dimensionality of visual data. [^20] This network takes raw video as input and outputs a latent representation that is compressed both temporally and spatially. Sora is trained on and subsequently generates videos within this compressed latent space. We also train a corresponding decoder model that maps generated latents back to pixel space.

Spacetime latent patches

Given a compressed input video, we extract a sequence of spacetime patches which act as transformer tokens. This scheme works for images too since images are just videos with a single frame. Our patch-based representation enables Sora to train on videos and images of variable resolutions, durations and aspect ratios. At inference time, we can control the size of generated videos by arranging randomly-initialized patches in an appropriately-sized grid.

Scaling transformers for video generation

Sora is a diffusion model [^21] [^22] [^23] [^24] [^25] ; given input noisy patches (and conditioning information like text prompts), it’s trained to predict the original “clean” patches. Importantly, Sora is a diffusion transformer . [^26] Transformers have demonstrated remarkable scaling properties across a variety of domains, including language modeling, [^13] [^14] computer vision, [^15] [^16] [^17] [^18] and image generation. [^27] [^28] [^29]

Figure Diffusion

In this work, we find that diffusion transformers scale effectively as video models as well. Below, we show a comparison of video samples with fixed seeds and inputs as training progresses. Sample quality improves markedly as training compute increases.

Variable durations, resolutions, aspect ratios

Past approaches to image and video generation typically resize, crop or trim videos to a standard size—e.g., 4 second videos at 256x256 resolution. We find that instead training on data at its native size provides several benefits.

Sampling flexibility

Sora can sample widescreen 1920x1080p videos, vertical 1080x1920 videos and everything inbetween. This lets Sora create content for different devices directly at their native aspect ratios. It also lets us quickly prototype content at lower sizes before generating at full resolution—all with the same model.

Improved framing and composition

We empirically find that training on videos at their native aspect ratios improves composition and framing. We compare Sora against a version of our model that crops all training videos to be square, which is common practice when training generative models. The model trained on square crops (left) sometimes generates videos where the subject is only partially in view. In comparison, videos from Sora (right) have improved framing.

Language understanding

Training text-to-video generation systems requires a large amount of videos with corresponding text captions. We apply the re-captioning technique introduced in DALL·E 3 [^30] to videos. We first train a highly descriptive captioner model and then use it to produce text captions for all videos in our training set. We find that training on highly descriptive video captions improves text fidelity as well as the overall quality of videos.

Similar to DALL·E 3, we also leverage GPT to turn short user prompts into longer detailed captions that are sent to the video model. This enables Sora to generate high quality videos that accurately follow user prompts.

Prompting with images and videos

All of the results above and in our landing page show text-to-video samples. But Sora can also be prompted with other inputs, such as pre-existing images or video. This capability enables Sora to perform a wide range of image and video editing tasks—creating perfectly looping video, animating static images, extending videos forwards or backwards in time, etc.

Animating DALL·E images

Sora is capable of generating videos provided an image and prompt as input. Below we show example videos generated based on DALL·E 2 [^31] and DALL·E 3 [^30] images.

research papers on it

Extending generated videos

Sora is also capable of extending videos, either forward or backward in time. Below are four videos that were all extended backward in time starting from a segment of a generated video. As a result, each of the four videos starts different from the others, yet all four videos lead to the same ending.

We can use this method to extend a video both forward and backward to produce a seamless infinite loop.

Video-to-video editing

Diffusion models have enabled a plethora of methods for editing images and videos from text prompts. Below we apply one of these methods, SDEdit, [^32] to Sora. This technique enables Sora to transform  the styles and environments of input videos zero-shot.

Connecting videos

We can also use Sora to gradually interpolate between two input videos, creating seamless transitions between videos with entirely different subjects and scene compositions. In the examples below, the videos in the center interpolate between the corresponding videos on the left and right.

Image generation capabilities

Sora is also capable of generating images. We do this by arranging patches of Gaussian noise in a spatial grid with a temporal extent of one frame. The model can generate images of variable sizes—up to 2048x2048 resolution.

research papers on it

Emerging simulation capabilities

We find that video models exhibit a number of interesting emergent capabilities when trained at scale. These capabilities enable Sora to simulate some aspects of people, animals and environments from the physical world. These properties emerge without any explicit inductive biases for 3D, objects, etc.—they are purely phenomena of scale.

3D consistency. Sora can generate videos with dynamic camera motion. As the camera shifts and rotates, people and scene elements move consistently through three-dimensional space.

Long-range coherence and object permanence. A significant challenge for video generation systems has been maintaining temporal consistency when sampling long videos. We find that Sora is often, though not always, able to effectively model both short- and long-range dependencies. For example, our model can persist people, animals and objects even when they are occluded or leave the frame. Likewise, it can generate multiple shots of the same character in a single sample, maintaining their appearance throughout the video.

Interacting with the world. Sora can sometimes simulate actions that affect the state of the world in simple ways. For example, a painter can leave new strokes along a canvas that persist over time, or a man can eat a burger and leave bite marks.

Simulating digital worlds. Sora is also able to simulate artificial processes–one example is video games. Sora can simultaneously control the player in Minecraft with a basic policy while also rendering the world and its dynamics in high fidelity. These capabilities can be elicited zero-shot by prompting Sora with captions mentioning “Minecraft.”

These capabilities suggest that continued scaling of video models is a promising path towards the development of highly-capable simulators of the physical and digital world, and the objects, animals and people that live within them.

Sora currently exhibits numerous limitations as a simulator. For example, it does not accurately model the physics of many basic interactions, like glass shattering. Other interactions, like eating food, do not always yield correct changes in object state. We enumerate other common failure modes of the model—such as incoherencies that develop in long duration samples or spontaneous appearances of objects—in our landing page .

We believe the capabilities Sora has today demonstrate that continued scaling of video models is a promising path towards the development of capable simulators of the physical and digital world, and the objects, animals and people that live within them.

  • Bill Peebles
  • Connor Holmes
  • David Schnurr
  • Troy Luhman
  • Eric Luhman
  • Clarence Wing Yin Ng
  • Aditya Ramesh

Acknowledgments

Please cite as Brooks, Peebles, et al., and use the following BibTeX for citation:  https://openai.com/bibtex/videoworldsimulators2024.bib

Sponsored Content | 5 Best Sites to Buy Research Papers Online

Share this:.

  • Click to share on Facebook (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to print (Opens in new window)
  • Click to email a link to a friend (Opens in new window)
  • Click to share on Reddit (Opens in new window)

Today's e-Edition

  • Things to Do
  • Real Estate
  • Marketplace

Breaking News

Sponsored content | judge orders trump to pay $355 million for lying about his wealth in staggering civil fraud ruling, sponsored content.

research papers on it

If you want to purchase research paper from a trusted company, then PaperHelp is your best choice. Their team has been working since 2013, and their experience and devotion have earned the company a stellar reputation. You can be absolutely sure that your order will be delivered on time. All the specialists at PaperHelp have degrees in different fields. Hence, they are capable of writing papers of any complexity in a wide range of disciplines.

According to customer feedback and our own experience, research paper writers at PaperHelp always meet the required deadlines and deliver plagiarism-free content. It’s also important to note that prices for academic writing services start from $13 per page, which is quite affordable compared to other services.

2. BBQPapers : Professional Writers, Top Quality

BBQPapers: Professional Writers, Top Quality

If you need to write a complex research paper but there’s no time for it, you should definitely turn to BBQPapers. This company specializes in advanced research paper writing, handling the most complex tasks. You can choose an expert with a Ph.D. degree in the most suitable field and get a paper of excellent quality delivered to you in a day. In fact, in-depth research skill is a strong point of any BBQPapers’ specialist.

They always conduct in-depth analysis and build college papers on impeccable logic. The good news is that the service offers competitive prices, so you won’t spend too much money on your homework. The rates start at $5.85 per 100 words for high school students and $6.77 per 100 words for individuals studying at college.

3. WritePaperForMe : Cheap Service

WritePaperForMe: Cheap Service

WritePaperForMe is a place where you can buy college research papers at an affordable price. If your budget is very limited, it could be the perfect solution. Although it offers custom papers at low prices, the quality remains relatively high. This is a case where professionalism and affordability go hand in hand.

At WritePaperForMe, you can primarily choose ESL writers who have an advanced command of English. Despite this, their professionalism shouldn’t be questioned. You will definitely receive your college research papers on time and at the lowest price. If you’re looking to purchase research papers from WritePaperForMe, the minimum rate per page starts at $6.99.

4. EssayPro : Best Bidding Platform

EssayPro: Best Bidding Platform

If you are looking for an old, reputable company, you should consider EssayPro. Many years of experience have made this website one of the best in its niche. You can connect with professional writers by learning about their qualifications and placing a bid for your work. Once you match with a specialist, discuss all the necessary details of your order and agree on a deadline.

If needed, you can also ask a writer to share an outline or request a plagiarism report. Being one of the oldest companies in the market, EssayPro always delivers top-notch services to maintain its reputation. Therefore, you can receive an unlimited number of revisions if you are not satisfied with the result. Prices start at $10.80 per page.

5. SpeedyPaper : Exceptional Customer Service

SpeedyPaper: Exceptional Customer Service

Everyone is looking for a great customer experience, and this is exactly what SpeedyPaper can provide. The service caters to both high school and college students. Specialists from SpeedyPaper are very client-oriented, so purchasing research papers from this company is quick and efficient.

This means your needs will be met, no matter how complicated your requirements may be. And you don’t have to spend a lot of money on your order because the prices at SpeedyPaper are quite fair. The minimum rate for high school tasks is $11 per page, while university research papers can be written for as little as $13 per page.

Buying research papers online is a legitimate way to advance in your academic career without burning out. However, it’s crucial to use well-regarded services to ensure plagiarism-free, high-quality writing.

We understand that the process of buying research paper online raises many questions and concerns, so we’ll answer the most commonly asked ones here. This way, you’ll know precisely where to find the best of the best.

Is it safe to buy research paper online?

Students often worry about safety issues when using the services of custom writing companies—and with good reason! Most institutions view such practices as cheating, making it particularly risky if professors discover that your assignment was completed by someone else.

The negative consequences can damage your reputation in the academic world and disrupt your career prospects. However, your fears should not deter you from seeking help. In fact, established and reliable companies are absolutely safe for users. They protect your private data and do not share any information with third parties. Your identity will remain confidential, ensuring that no one, including your instructors, will ever know if your assignment was commissioned.

According to their privacy policies, names, orders, and banking details provided by customers cannot be disclosed to anyone. Violating this policy puts a company’s reputation at risk and leads to a loss of clients. Therefore, if you encounter multiple positive reviews and a large customer base, you can be confident that the chosen service is 100% safe.

How much does it cost to buy a research paper?

Price is one of the most important aspects to consider when choosing a custom writing company. If you are a student on a budget, you are probably limited in the amount of money to spend on your studies.  Hence, you must be wondering if buying a research paper online is expensive. It’s difficult to give an exact answer to this question because the prices vary dramatically from one service to another. What’s more, they depend on your academic level and some other criteria.

For instance, high school papers can be found at rates starting from $7 per page, while college students will typically pay more, with professional writing services charging at least $10 per page for college-level work. Ph.D. research papers command even higher prices. There are websites that offer cheap research papers, but more often than not, they are written by amateur writers or by AI.

When calculating the cost of your order, companies also consider the discipline you’re studying. The more complex the subject, the higher the price. Deadline urgency is another critical factor; tighter deadlines mean higher costs as you’re required to pay a premium for expedited service.

Who will write my research paper?

In most cases, selecting the individual who will write your research paper is your responsibility. Websites typically provide a list of writers, featuring brief descriptions of their education, skills, and experience. You can review the degrees held by each specialist and the dates they were conferred. Generally, all writers possess advanced degrees, ensuring the high quality of their work.

For instance, if you need a paper completed in Economics, you can choose a reputable research paper writer with higher education in this specific field. This approach is applicable to any discipline you are studying.

Your choice can also extend between ESL (English as a Second Language) writers and native English speakers. However, it’s important not to be influenced by stereotypes. Some people assume that native speakers are invariably superior to ESL writers. But is this assumption accurate? In reality, certifications like the IELTS Academic demonstrate an individual’s proficient command of English and their capability to perform their job effectively. Therefore, verifying qualifications is crucial.

How soon can I have my custom research paper written?

Students often turn to essay writing services when they can’t manage their homework on time. Tight deadlines prompt young people to seek help, making the delivery speed of your research paper critically important.

The good news is that nearly all reputable essay writing services are capable of completing your urgent assignments. If you’re facing imminent deadlines, you can have your term paper completed within a few days. Some services even promise to finish college tasks within 24 hours. However, be prepared to pay extra for swift services. Why? Because writers must prioritize your order, which increases their workload.

In fact, the more time you allow for the completion of your paper, the less it will cost. If you require a custom research paper to be written in just a few hours, the price can escalate to $36 per page or more.

Is it illegal to buy research papers online?

Since most institutions strictly prohibit using the services of assignment writing companies, it raises a lot of concerns among young people. Students are often worried about the legal consequences of their actions. They are afraid of being punished according to the existing laws. However, it doesn’t make any sense because there are no laws prohibiting paper writing services. If a company has a license and operates according to the required business regulations, it’s absolutely safe.

Officially registered agencies that don’t break any general rules are a great solution for busy university students. But the question is “How to make sure that you’ve chosen the right essay writing service?” Well, actually it’s pretty easy. All you need to do is just to check their official website and see if there is any information about licensing.

Where can I buy a research paper online?

Now, obtaining research paper assistance online is no longer a challenge. The availability of writing services that cater to academic assignments is on the rise. By simply searching phrases like ‘buy college research paper,’ ‘write my assignment for me,’ or ‘order research paper’ on Google, you’ll be presented with a lengthy list of companies.

Hundreds of agencies are capable of completing almost any academic task. Among the most renowned are PaperHelp, BBQPapers, WritePaperForMe, EssayPro, and SpeedyPaper. When selecting a service, it’s crucial to gather as much information about it as you can. Evaluate its pricing, review the qualifications of its writers, and scrutinize its terms and conditions meticulously.

Where can I get research papers for free?

You can find research papers in your area of study for free from a variety of online directories and libraries. But keep in mind that they are not for submitting as your own work. Instead, you can use them to bolster your own original research paper. Some sites offering free papers include:

  • Library Genesis

What are the dangers of hiring a research paper writer on Reddit?

Hiring a research paper writer from Reddit or any other place that isn’t a reputable writing company comes with a plethora of dangers, including:

1. Plagiarism risk

Writers on Reddit don’t have protocols in place to ensure complete originality in the final product. Submitting a research paper filled with plagiarism or unoriginal thoughts could seriously impact your grades and, depending on your institution, lead to expulsion.

Checking for plagiarism should be of utmost importance, and hiring a Reddit-based writer doesn’t necessarily give you this peace of mind.

2. Late delivery

As you know, the punctual submission of term papers and research papers is paramount to success. If the writer fails to meet the deadline you set, the paper could be useless, wasting time and money.

While life does through curveballs to everybody, hiring a writer from Reddit provides no assurance that they’ll deliver your paper on time.

3. Poor writing quality

Poor writing quality is very likely if you fail to use a legitimate writing service and instead choose to hire a writer from Reddit.

It’s unlikely that they will show you samples of their previous work, causing your grades to slip if they can’t meet the high standards of academic writing.

4. Failure to meet requirements

Every essay has criteria that must be met. Writers who aren’t experienced with such writing can fail to meet the standards or conduct a thorough research.

We recommend hiring expert writers from reputable websites only, despite the potentially low cost of those advertising their services on Reddit.

How can a research paper writing website guarantee original, plagiarism-free papers?

Naturally, you need original, plagiarism-free work from your writing service. Otherwise, your grades are at stake.

Only reliable services offer guarantees of originality and ensure they write the paper from scratch. So, that’s the first thing you should look for when deciding where to buy a research paper online.

The services ensure original work by running all final papers through at least one plagiarism checker. Depending on the specific site, they may give you this report for free.

Reasons to Buy Custom Research Paper Online

The advantages of buying research papers from reputable companies are numerous. Firstly, it’s all about quality. Well-known agencies value their reputation on the market, so they never deliver papers of a poor quality. Otherwise, you will get your money back. What’s more, recognized assignment writing services complete orders on time.

Therefore, you can be confident about submitting your homework due to the deadline date. Another important feature of highly-rated companies is that they can write your paper very fast. So if you have an urgent task, you can pay extra and get it done in 24-72 hours.

Just in case you’ve noticed any mistakes in your paper, you can ask writers for a revision. Usually, credible companies offer an unlimited number of revisions, so you can request them until your requirements are completely met.

And last but not least, reputable sites where you can order research paper online typically provide clients with a plagiarism report. Hence, you can make sure that your research paper is original. For your instructors, it will be impossible to reveal that your work was written by somebody else.

Buying research papers online is a common practice nowadays. Many students turn to special services that complete their assignments for money. This is a very convenient way to get your homework done when you are overloaded with academic and professional responsibilities. A reliable writing service can save your time and energy, helping you avoid emotional burnout.

Before you choose a company to buy a paper from, you need to do proper research. Try to find as much information about different platforms as possible. Also, compare their prices and terms. Judging by multiple reviews, one of the best services available today is PaperHelp. But the choice is completely up to you, so you should make your own analysis.

Article paid for by: Ocasio Media The news and editorial staffs of the Bay Area News Group had no role in this post’s preparation.

google-site-verification: googled55ac16d608893c5.html

More in Sponsored Content

Red Malay Kratom Guide [2024] – Effects, Benefits, Dosage + Where to Buy

Sponsored Content | Red Malay Kratom Guide [2024] – Effects, Benefits, Dosage + Where to Buy

Best Bingo Sites for Real Money: Top 10 Online Bingo Rooms with Bonuses

Sponsored Content | Best Bingo Sites for Real Money: Top 10 Online Bingo Rooms with Bonuses

2024 Land Rover Defender: rugged, pricey

Sponsored Content | 2024 Land Rover Defender: rugged, pricey

The 2024 Subaru Crosstrek Wilderness Edition SUV

Sponsored Content | The 2024 Subaru Crosstrek Wilderness Edition SUV

IMAGES

  1. Information technology research paper Essay Example

    research papers on it

  2. Sample research paper example

    research papers on it

  3. How To Write A Chemistry Research Paper? All Details

    research papers on it

  4. 🔥 Example of research paper in english. Research Paper Examples. 2022-10-17

    research papers on it

  5. How to Write a Research Paper: Tips to Use

    research papers on it

  6. Professional Research Paper For Undergraduate CS Student from Experts

    research papers on it

VIDEO

  1. Lecture No. 5, How to Write a Research Paper

  2. How to critically review research papers in 4 steps #academicwriting #studytips #thesis

  3. Struggling finding research papers for your literature review? #researchtips #studytips #chatgpt

  4. This is how you read research papers faster #researchtips #studytips #thesis

  5. Research Paper Methodology

  6. Websites for research papers #philippines #research #thesis #studytips #rrl #presentation

COMMENTS

  1. Journal of Information Technology: Sage Journals

    First published Jan 5, 2024 Procuring services through IT crowdsourcing: The role of IT administration and IT flexibility Joseph Taylor KD Joshi Terence Saldanha Arvin Sahaym Open Access Research article First published Dec 18, 2023 Disruptive change within financial technology: A methodological analysis of digital transformation challenges

  2. Information Technology: News, Articles, Research, & Case Studies

    New research on information technology from Harvard Business School faculty on issues including the HealthCare.gov fiasco, online privacy concerns, and the civic benefits of technologies that utilize citizen-created data. Page 1 of 58 Results →. 16 Jan 2024. Cold Call Podcast.

  3. (PDF) Current Trends In Information Technology: Which ...

    Abstract and Figures. Information Technology is currently the enabler of most services. Advancements in technology has affected the society's way of living both positively and negatively. Today ...

  4. Information technology

    Jehan Hamadneh Abdelazim G. Hussien Research Open Access 10 Feb 2024 Scientific Reports Volume: 14, P: 3436 Detection and isolation of wormhole nodes in wireless ad hoc networks based on...

  5. Information Technology

    Advancing the state-of-the-art in IT in such applications as cyber security and biometrics, NIST accelerates the development and deployment of systems that are reliable, usable, interoperable, and secure; advances measurement science through innovations in mathematics, statistics, and computer science; and conducts research to develop the measur...

  6. Publications

    This paper presents folk theories of text-to-image (T2I) models to enrich understanding of how artist communities experience creative machine learning (ML) systems. This research draws on data collected from a workshop with 15 artists from 10 countries who incorporate T2I models in their creative practice.

  7. Technological Innovation: Articles, Research, & Case Studies on

    Research by Edward McFowland III, Karim Lakhani, Fabrizio Dell'Acqua, and colleagues. 24 Oct 2023; Cold Call Podcast How the United States Air Force Accelerated AI Adoption. Re: Maria P. Roche. In August 2022, the Pentagon tasked U.S. Air Force Captain Victor Lopez with launching a new Air Force innovation unit that leveraged commercial ...

  8. Information Technology Research Papers

    The current research aims to provide a profound analysis of 15 (out of 844) research papers published in highly standard journals and conference proceedings throughout the past 10 years, from 2009 to 2019. This review study can be considered a pivotal reference for scholars as it fills in some gaps in knowledge management especially in IT and ...

  9. Study and Investigation on 5G Technology: A Systematic Review

    1. Introduction. Most recently, in three decades, rapid growth was marked in the field of wireless communication concerning the transition of 1G to 4G [1,2].The main motto behind this research was the requirements of high bandwidth and very low latency. 5G provides a high data rate, improved quality of service (QoS), low-latency, high coverage, high reliability, and economically affordable ...

  10. Technology

    Ultrathin materials have long been touted as a solution to the problems faced by the ever-growing semiconductor industry. Evidence that 3D chips can be built from 2D semiconductors suggests that ...

  11. Research Paper

    A research paper is not that easy to generate and definitely not in one semester. Consequently, only a precise template for writing research papers is elaborated down to details, and students are asked to bring their previously concluded research rewritten according to the template just described.

  12. computer science Latest Research Papers

    Software Developer . Hiring Process . Qualitative Survey. Computer science ( CS ) majors are in high demand and account for a large part of national computer and information technology job market applicants. Employment in this sector is projected to grow 12% between 2018 and 2028, which is faster than the average of all other occupations.

  13. Internet of Things is a revolutionary approach for future technology

    Internet of Things (IoT) is a new paradigm that has changed the traditional way of living into a high tech life style. Smart city, smart homes, pollution control, energy saving, smart transportation, smart industries are such transformations due to IoT. A lot of crucial research studies and investigations have been done in order to enhance the technology through IoT. However, there are still a ...

  14. Internet of Things (IoT): Definitions, Challenges, and Recent Research

    Figures (1) Abstract and Figures. In this paper, we seek to highlight the concept of Internet of Things (IoT) in general, as well as reviewing the main challenges of the IoT environment by ...

  15. How to Write a Research Paper

    A research paper is a piece of academic writing that provides analysis, interpretation, and argument based on in-depth independent research. Research papers are similar to academic essays, but they are usually longer and more detailed assignments, designed to assess not only your writing skills but also your skills in scholarly research.

  16. 100 Technology Topics for Research Papers

    1. General 2. Reproduction 3. Health 4. Genetic Engineering 5. Technical Experiments on Humans 6. Relationships and Media 7. War 8. Information and Communication Tech 9. Computer Science and Robotics Researching technology can involve looking at how it solves problems, creates new problems, and how interaction with technology has changed humankind.

  17. Technology Research Paper

    How to Write a Research Paper Research Paper Topics Research Paper Examples for more inspiration. If you need a thorough research paper written according to all the academic standards, you can always turn to our experienced writers for help. This is how your paper can get an A! Feel free to contact our writing service for professional assistance.

  18. Search

    Find the research you need | With 160+ million publications, 1+ million questions, and 25+ million researchers, this is where everyone can access science

  19. 150+ Research Paper Topics For Information Technology

    150+ Research Paper Topics For Information Technology. The area of technology for information is among the most modern technological advancements in the 21st century. Each year, technology-based devices get smaller, faster, and more sophisticated. In reality, the phone you use holds more information than the huge computers that took a human to ...

  20. Information Technology Research Paper

    Each Information Technology Research Papers example you spot here can do one or several of these elements for you: give you a tip about an exciting topic; motivate you to come up with an authentic outlook on a well-studied problem; demonstrate the best writing approaches you can employ; and/or present you with accurate structure patterns.

  21. Writing a Research Paper Introduction

    Step 1: Introduce your topic The first job of the introduction is to tell the reader what your topic is and why it's interesting or important. This is generally accomplished with a strong opening hook. The hook is a striking opening sentence that clearly conveys the relevance of your topic.

  22. 113 Great Research Paper Topics

    Below are 113 good research topics to help you get you started on your paper. We've organized them into ten categories to make it easier to find the type of research paper topics you're looking for. Arts/Culture Discuss the main differences in art from the Italian Renaissance and the Northern Renaissance.

  23. PDF Keyframer: Empowering Animation Design using Large Language Models

    paper, we present Keyframer, a design tool for animating static images (SVGs) with natural language. Informed by interviews ... research instruments, and study format can be found inA.4. 5.2 Participant Recruitment To recruit participants, we advertised our user study on an location-based, general-purpose Slack channel with 2,500 ...

  24. Information Technology Research Paper Topics

    Design and Study of Single Buffered Routers. Implementing Real-Time Programmable Shading. 3-D Rendering Algorithms. Simulation & Analysis of Musculosekeltal Systems. Human Modeling and Simulation Future. Multilayer Switch In Networking. These are just some of the many information technology research paper topics.

  25. Outstanding Achievements Recognized: Two Research Papers get Best Paper

    At the 2nd International Conference on Cyber Intelligence and Information Retrieval (CIIR 2023) held on December 14-15, 2023, the distinguished Best Paper Awards was awarded to Prof. Debabrata Samanta, Ph.D., who serves as the Program Head & Assistant Professor at the Department of Computing and Information Technologies, Rochester Institute of Technology, Kosovo, in recognition of his ...

  26. Breaking BFT: Quantifying the Cost to Attack Bitcoin and Ethereum

    Much has been hypothesized and feared about 51% attacks on Bitcoin and 34% attacks on Ethereum. However, the costs and benefits associated with perpetrating these attacks remain a mystery. In this paper, we present a novel model to quantify the costs to breach Byzantine fault tolerance thresholds in Bitcoin and Ethereum.

  27. Reading on screens instead of paper is a less effective way to absorb

    A number of research studies strongly suggest that when we read text on a screen, we understand less than if we read the same text on paper, and this applies across languages and writing systems.

  28. Video generation models as world simulators

    We explore large-scale training of generative models on video data. Specifically, we train text-conditional diffusion models jointly on videos and images of variable durations, resolutions and aspect ratios. We leverage a transformer architecture that operates on spacetime patches of video and image latent codes. Our largest model, Sora, is capable of generating a minute of high fidelity video.

  29. 5 Best Sites to Buy Research Papers Online

    Buying research papers online is a legitimate way to advance in your academic career without burning out. However, it's crucial to use well-regarded services to ensure plagiarism-free, high ...