{"id":"https://openalex.org/W4416161453","doi":"https://doi.org/10.58346/jowua.2025.i3.024","title":"Implementing Ubiquitous Computing for Remote Monitoring of Marine Infrastructure in Harsh Environments","display_name":"Implementing Ubiquitous Computing for Remote Monitoring of Marine Infrastructure in Harsh Environments","publication_year":2025,"publication_date":"2025-09-30","ids":{"openalex":"https://openalex.org/W4416161453","doi":"https://doi.org/10.58346/jowua.2025.i3.024"},"language":null,"primary_location":{"id":"doi:10.58346/jowua.2025.i3.024","is_oa":true,"landing_page_url":"https://doi.org/10.58346/jowua.2025.i3.024","pdf_url":"https://doi.org/10.58346/jowua.2025.i3.024","source":{"id":"https://openalex.org/S2738080829","display_name":"Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications","issn_l":"2093-5374","issn":["2093-5374","2093-5382"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://doi.org/10.58346/jowua.2025.i3.024","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Manjul Tripathi","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Manjul Tripathi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5120647373","display_name":"Yasvanthra Ekambaram","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yasvanthra Ekambaram","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.41115268,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"16","issue":"3","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13925","display_name":"Offshore Engineering and Technologies","score":0.08950000256299973,"subfield":{"id":"https://openalex.org/subfields/2212","display_name":"Ocean Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13925","display_name":"Offshore Engineering and Technologies","score":0.08950000256299973,"subfield":{"id":"https://openalex.org/subfields/2212","display_name":"Ocean Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11622","display_name":"Maritime Navigation and Safety","score":0.08259999752044678,"subfield":{"id":"https://openalex.org/subfields/2212","display_name":"Ocean Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14431","display_name":"Diverse Research and Applications","score":0.030500000342726707,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5932000279426575},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5170999765396118},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5011000037193298},{"id":"https://openalex.org/keywords/subsea","display_name":"Subsea","score":0.4805000126361847},{"id":"https://openalex.org/keywords/ubiquitous-computing","display_name":"Ubiquitous computing","score":0.4681999981403351},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4503999948501587},{"id":"https://openalex.org/keywords/pipeline-transport","display_name":"Pipeline transport","score":0.4478999972343445},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.44679999351501465},{"id":"https://openalex.org/keywords/schedule","display_name":"Schedule","score":0.44119998812675476}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.661899983882904},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5932000279426575},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5170999765396118},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5011000037193298},{"id":"https://openalex.org/C2777737062","wikidata":"https://www.wikidata.org/wiki/Q14898686","display_name":"Subsea","level":2,"score":0.4805000126361847},{"id":"https://openalex.org/C172195944","wikidata":"https://www.wikidata.org/wiki/Q541265","display_name":"Ubiquitous computing","level":2,"score":0.4681999981403351},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4503999948501587},{"id":"https://openalex.org/C175309249","wikidata":"https://www.wikidata.org/wiki/Q725864","display_name":"Pipeline transport","level":2,"score":0.4478999972343445},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.44679999351501465},{"id":"https://openalex.org/C68387754","wikidata":"https://www.wikidata.org/wiki/Q7271585","display_name":"Schedule","level":2,"score":0.44119998812675476},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4059000015258789},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.40560001134872437},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38019999861717224},{"id":"https://openalex.org/C180591934","wikidata":"https://www.wikidata.org/wiki/Q1253369","display_name":"Downtime","level":2,"score":0.35569998621940613},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.3075000047683716},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3009999990463257},{"id":"https://openalex.org/C3019020692","wikidata":"https://www.wikidata.org/wiki/Q17141406","display_name":"Location tracking","level":2,"score":0.2994000017642975},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2946000099182129},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.29030001163482666},{"id":"https://openalex.org/C2775846686","wikidata":"https://www.wikidata.org/wiki/Q643012","display_name":"Condition monitoring","level":2,"score":0.2847999930381775},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.2809999883174896},{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.267300009727478},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26489999890327454},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.26429998874664307},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.26010000705718994},{"id":"https://openalex.org/C1668388","wikidata":"https://www.wikidata.org/wiki/Q1149776","display_name":"Data management","level":2,"score":0.2596000134944916}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.58346/jowua.2025.i3.024","is_oa":true,"landing_page_url":"https://doi.org/10.58346/jowua.2025.i3.024","pdf_url":"https://doi.org/10.58346/jowua.2025.i3.024","source":{"id":"https://openalex.org/S2738080829","display_name":"Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications","issn_l":"2093-5374","issn":["2093-5374","2093-5382"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.58346/jowua.2025.i3.024","is_oa":true,"landing_page_url":"https://doi.org/10.58346/jowua.2025.i3.024","pdf_url":"https://doi.org/10.58346/jowua.2025.i3.024","source":{"id":"https://openalex.org/S2738080829","display_name":"Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications","issn_l":"2093-5374","issn":["2093-5374","2093-5382"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4416161453.pdf","grobid_xml":"https://content.openalex.org/works/W4416161453.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"In":[0],"marines\u2019":[1],"infrastructure,":[2],"corrosion":[3],"alongside":[4],"extreme":[5],"pressures":[6],"and":[7,20,32,64,71,91,118,132],"wave":[8],"activities":[9],"are":[10,102,112],"some":[11],"of":[12,34,44,55,84,144],"the":[13,17,82,105,142],"chief":[14],"problems":[15],"about":[16],"subsea":[18],"pipelines":[19],"offshore":[21],"platforms.":[22],"This":[23],"paper":[24],"outlines":[25],"a":[26,50,93],"new":[27],"approach":[28],"to":[29,39,68],"remote":[30,69,121],"monitoring":[31,70],"management":[33],"infrastructure":[35],"using":[36],"ubiquitous":[37],"computing":[38,59],"allow":[40],"for":[41],"real-time":[42],"tracking":[43],"infrastructure.":[45],"The":[46,73],"proposed":[47],"architecture":[48],"integrates":[49],"distributed":[51],"sensor":[52],"network":[53],"comprised":[54],"intelligent":[56],"sensors,":[57],"edge":[58],"units,":[60],"wireless":[61],"communication":[62],"interfaces,":[63],"cloud":[65],"services":[66],"dedicated":[67],"control.":[72],"efficient":[74],"machine":[75],"learning":[76],"models":[77],"implemented":[78],"greatly":[79,108],"aid":[80],"in":[81],"identification":[83],"potential":[85],"system":[86,106],"risks,":[87],"ensure":[88],"advanced":[89],"tracking,":[90],"maintain":[92],"proper":[94],"maintenance":[95],"schedule":[96],"so":[97],"that":[98],"minimal":[99],"physical":[100],"interactions":[101],"made.":[103],"With":[104],"awareness":[107],"increased,":[109],"marine":[110],"operations":[111],"more":[113],"favorable":[114],"regarding":[115],"efficiency,":[116],"safety,":[117],"sustainability.":[119],"Ensured":[120],"operation":[122],"under":[123],"harsh":[124],"conditions":[125],"guarantees":[126],"reliability":[127],"when":[128],"it":[129],"matters":[130],"most":[131],"optimized":[133],"energy":[134],"use":[135],"along":[136],"with":[137],"secure":[138],"data":[139,145],"transmission":[140],"counteracts":[141],"risks":[143],"misuse.":[146]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-11-13T00:00:00"}
