{"title":"AOF: An adaptive algorithm for enhancing RPL objective function in smart agricultural IoT networks","authors":"Abubakar Wakili, Sara Bakkali","doi":"10.1016/j.ijin.2024.09.001","DOIUrl":"10.1016/j.ijin.2024.09.001","url":null,"abstract":"<div><p>Within the Internet of Things (IoT) ecosystem, the Routing Protocol for Low-Power and Lossy Networks (RPL) serves as a foundational element for network communication. The protocol's effectiveness depends on its Objective Function (OF), which orchestrates route selection based on predefined criteria. However, traditional OFs often struggle to adapt to the dynamic nature of IoT environments. This paper presents the Adaptive Objective Function (AOF), an innovative algorithm designed to dynamically adjust the OF in real-time, responding to fluctuating network conditions and application requirements. AOF comprises: a Network Monitor, an OF Selector, an OF Switcher, and an Event Handler, all working in concert to enhance network performance, reliability, and energy efficiency. Through simulations, AOF has demonstrated superior performance over legacy OFs, achieving a 10 %–20 % reduction in End-to-End Delay (EED), a 1 %–2 % increase in Packet Delivery Ratio (PDR), a 10 %–20 % improvement in Network Lifetime (NLT), and a substantial 50 %–80 % decrease in Control Overhead (COH). The paper also presents a smart agriculture case study that illustrates AOF's practical application in optimizing sensor network data routing—a testament to its versatility and practicality. Future endeavours will concentrate on further refining AOF and broadening its application across various IoT domains.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"5 ","pages":"Pages 325-339"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603024000320/pdfft?md5=bf0e841f7517d2e4a59787401fa56ed6&pid=1-s2.0-S2666603024000320-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142238819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning-enhanced loT and Wireless Sensor Networks for predictive analysis and maintenance in wind turbine systems","authors":"Lei Gong , Yanhui Chen","doi":"10.1016/j.ijin.2024.02.002","DOIUrl":"10.1016/j.ijin.2024.02.002","url":null,"abstract":"<div><p>Wind power (WP) represents a Renewable Energy Source (RES) that has noticed substantial development as people continuously search for green energy sources. Utilizing predominantly Predictive Maintenance (PM) of Wind Turbines (WT), this research analyzes the potential benefits that could be generated by Wind Energy (WE) through the use of the Internet of Things (IoT) and Wireless Sensor Networks (WSN). This research recommends an Internet of Things-WSN model for PM comprised of three distinct phases: the primary phase is the collection of data via sensors, the second phase is the transmission of that data through a connection to the Internet, and the final phase is the implementation of data analytics on that data in the context of cloud computing. For PM analytics, this work introduces a Predictive Maintenance Convolutional Long Short-Term Memory (PM-<em>C</em>-LSTM) model that combines the spatial pattern recognition capabilities of a Convolutional Neural Network with the sequential data prowess of LSTM networks. The PM-<em>C</em>-LSTM model combines CNN for recognizing spatial patterns and LSTM networks for analyzing sequential data in a way that doesn't affect the accuracy of WT-PM. A Failure Sample Generator model is also fused into the study to measure soft failure and hard failure factors and improve the predictive accuracy of the Machine Learning (ML) model. Data became available over 16 months while the model was applied to a Wind Farm (WF) positioned on the Qinghai-Tibet Plateau. It has been demonstrated that the PM-<em>C</em>-LSTM model possesses enhanced PM capabilities by comparing its efficiency to other standard models using a selection of performance metrics. The result of the test indicates that there is a probability that the hybrid IoT and ML will improve PM methods in WT, which will subsequently help improve the effectiveness and sustainability of WE generation.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"5 ","pages":"Pages 133-144"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603024000083/pdfft?md5=b7b5ac54c0c8268a1260349ccf20f980&pid=1-s2.0-S2666603024000083-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139822786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive switching and routing protocol design and optimization in internet of things based on probabilistic models","authors":"Yi Yang","doi":"10.1016/j.ijin.2024.05.001","DOIUrl":"https://doi.org/10.1016/j.ijin.2024.05.001","url":null,"abstract":"<div><p>Through smart cities, Intelligent Transportation Systems (ITS), the agricultural sector, and wearable devices, the Internet of Things (IoT) has revolutionized several human interests. Through the development of new cluster tasks, the Decision-Making System (DMS) of Cluster Heads (CHs), and improving the accuracy of traffic prediction and reliability of transportation, the present study intends to improve the energy depletion of IoT devices. The paper explores the subject of data flow optimization using Fuzzy Assisted Cuckoo Search Optimization (FACSO), traffic flow using Gaussian Process Regression (GPR), and CH prediction using the Stochastic Optimization Algorithm (SOA). Optimizing network lifetime while minimizing Energy Consumption (EC) is feasible through the practical application of the SOA, GPR, and FACSO models. Increasing End-to-End Delay (EED), Network Throughput (NT), and energy efficiency can be rendered feasible through a real-time DMS regarding routing employing a novel approach referred to as FACSO. This approach has enhanced the efficacy and reliability of Wireless Sensor Networks (WSN). With up to 500 nodes and an EC of 0.3451 <em>J</em>, the experiment's findings demonstrate that a proposed SOA-FACSO model achieves superior EED.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"5 ","pages":"Pages 204-211"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603024000204/pdfft?md5=c394d35467f0128cd144f6b6466e3280&pid=1-s2.0-S2666603024000204-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140946946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure internet of medical things based electronic health records scheme in trust decentralized loop federated learning consensus blockchain","authors":"Megha Kuliha, Sunita Verma","doi":"10.1016/j.ijin.2024.03.001","DOIUrl":"10.1016/j.ijin.2024.03.001","url":null,"abstract":"<div><p>Electronic Health Records (EHRs) have become an increasingly significant source of information for healthcare professionals and researchers. Two technical challenges are addressed: motivating federated learning members to contribute their time and effort, and ensuring accurate aggregation of the global model by the centralized federated learning server. To overcome these issues and establish a decentralized solution, the integration of blockchain and federated learning proves effective, offering enhanced security and privacy for smart healthcare. The proposed approach includes a gamified element to incentivize and recognize contributions from federated learning members. This research work offers a solution involving resource management within the Internet of Medical Things (IoMT) using a newly proposed trust decentralized loop federated learning consensus blockchain. The obtained raw data is pre-processed by using handling missing values and adaptive min-max normalization. The appropriate features are selected with the aid of hybrid weighted-leader exponential distribution optimization algorithm. Because, data with multiple features exhibits varying levels of variation across each feature. The selected features are then forwarded to the training phase through the proposed pyramid squeeze attention generative adversarial networks to classify the EHR as positive and negative. The proposed classification model demonstrates high flexibility and scalability, making it applicable to a wide range of network architectures for various computer vision tasks. The introduced model provides better outcomes in terms of 98.5% in the training accuracy and 99% in the validation accuracy over Medical Information Mart for Intensive Care III (MIMIC-III) dataset, which is more efficient than the other traditional methods.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"5 ","pages":"Pages 161-174"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603024000162/pdfft?md5=30ce7cc6f43f1c29923858b571a1b08f&pid=1-s2.0-S2666603024000162-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140403754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Heterogeneity-aware device selection for efficient federated edge learning","authors":"Yiran Shi , Jieyan Nie , Xingwei Li , Hui Li","doi":"10.1016/j.ijin.2024.08.002","DOIUrl":"10.1016/j.ijin.2024.08.002","url":null,"abstract":"<div><p>Federated learning (FL) combined with mobile edge computing (FEEL) provides an end-to-edge synergetic learning approach to allow end devices to participate in machine learning model training parallelly while ensuring user privacy is maintained. However, conventional FL approaches often overlook two critical characteristics in the real-edge scenario: system heterogeneity and statistical heterogeneity. This oversight can detrimentally impact both the training efficiency and the model's accuracy. Specifically, it brings intolerable training delays and severe training accuracy degradation. To address these issues, this paper proposes a novel Quality-aware online Device Selection (<em>QDS</em>) algorithm. The <em>QDS</em> algorithm leverages a greedy selection method that guarantees the deadline restrictions and reflects upon their historical performance metrics, as indicated by their loss function values from preceding training rounds. This rigorous selection process ensures that the participating device set is optimally positioned to balance the dual objectives of training efficiency and model accuracy. Furthermore, we have developed a training loss-based device selection mechanism, aimed at prioritizing higher-quality devices for early submission of local updates prior to the designated deadline. Experimental findings demonstrate that the proposed <em>QDS</em> significantly enhances both the speed and accuracy of training when contrasted with baseline methods.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"5 ","pages":"Pages 293-301"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603024000290/pdfft?md5=10e74832d23796b9521bab282129c797&pid=1-s2.0-S2666603024000290-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142094854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introducing a high-throughput energy-efficient anti-collision (HT-EEAC) protocol for RFID systems","authors":"Sara El Mattar, Abdennaceur Baghdad","doi":"10.1016/j.ijin.2024.01.003","DOIUrl":"10.1016/j.ijin.2024.01.003","url":null,"abstract":"<div><p>The utilization of radio frequency identification (RFID) technology has witnessed a substantial rise in recent years, and this upward trend is expected to continue in the coming years. It is often described as an industry-changing concept, which is why continuous improvements in the technique of object identification are still needed. These enhancements are related to security, speed, and reliability of communications. RFID is frequently used in areas where a large number of things must be identified. Therefore, some problems of tag collision when many tags are transmitting their data are presented by these systems. The research presented here thoroughly analyzes and evaluates existing tag reading approaches that offer low power consumption during identification. The outcome of this work is the proposal of energy-efficient anti-collision protocol, namely HT-EEAC. By assessing the energy consumed for HT-EEAC at checkpoints, we were able to increase throughput and reduce energy consumption in our protocol. The HT-EEAC approach for updating frame size aims to enhance the energy and throughput of the EPC C1 G2 UHF RFID standard. Performance comparisons demonstrate the advantages of the strategy we propose in terms of low energy consumption per identified tag, minimal collisions, and high throughput. As a result, this method can be effectively utilized in the field of RFID systems to significantly enhance their efficiency.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"5 ","pages":"Pages 1-9"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603024000034/pdfft?md5=a8e3416b5442fe53fa212ed0aee8fc2e&pid=1-s2.0-S2666603024000034-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139539874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain-based electronic voting systems: A case study in Morocco","authors":"Tarik Chafiq , Rida Azmi , Ouadoud Mohammed","doi":"10.1016/j.ijin.2024.01.004","DOIUrl":"https://doi.org/10.1016/j.ijin.2024.01.004","url":null,"abstract":"<div><p>This research examines the feasibility of implementing blockchain-based electronic voting systems in Morocco to enhance electoral transparency and integrity. The study employs a methodology that combines Distributed Permission Ledger Technology (DPLT) and the Solana blockchain, resulting in a multilayered system. The main findings highlight the effectiveness of blockchain technology in mitigating electoral fraud and manipulation when implemented with precision, underscoring the importance of meticulous design and execution. These findings contribute significantly to discussions surrounding the modernization of electoral processes in the digital age and support the hypothesis that blockchain can address vulnerabilities in traditional voting methods. Moreover, the study marks a significant step toward modernizing elections, preserving democratic principles, and reinforcing the role of technology in addressing persistent electoral challenges, ultimately enhancing accessibility, security, and transparency in elections and strengthening democracy in the digital era.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"5 ","pages":"Pages 38-48"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603024000046/pdfft?md5=d2bed8b75db2d74cedaa1fab9e937566&pid=1-s2.0-S2666603024000046-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139709303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A macroscopic traffic flow modelling and collision avoidance using B-spline and Physics-Informed Neural Network approaches","authors":"Mourad Haddioui , Youssef Qaraai , Saleh Bouarafa , Said Agoujil , Abderrahman Bouhamidi","doi":"10.1016/j.ijin.2024.04.003","DOIUrl":"https://doi.org/10.1016/j.ijin.2024.04.003","url":null,"abstract":"<div><p>The macroscopic model, such as the Lighthill-Whitham-Richards (LWR), has been extensively studied and applied to various homogeneous traffic problems. However, numerical methods have been widely used with good performance. The outcome of this work is the proposal of a one-dimensional speed-density model. We applied both the B-spline collocation and the Physics-Informed Neural Network (PINN) methods to solve this model. The results clearly demonstrated that the B-spline method outperforms the PINN method in terms of accuracy. These results were then used firstly to compare it with thus obtained with a microscopic urban mobility simulator (SUMO) and secondly to visualize collision phenomena which are crucial for public safety. To manage collisions, the Intelligent Driver Model (IDM) was implemented. This integrated approach highlights the effectiveness of our density-speed model, coupled with advanced solving and control techniques, in enhancing the understanding and management of traffic.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"5 ","pages":"Pages 196-203"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603024000198/pdfft?md5=0976e4183d353abb1d7866c9c6f9c852&pid=1-s2.0-S2666603024000198-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140900999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Official Document Management and intelligent Information Retrieval System based on recommendation algorithm","authors":"Liang Xing","doi":"10.1016/j.ijin.2024.02.003","DOIUrl":"10.1016/j.ijin.2024.02.003","url":null,"abstract":"<div><p>Currently, servers store information from different sources and file types, which are then retrieved via electronic Information Management Systems (e-IMS), with Smart serving as an effective prototype system. Association rule testing and collaborative filtering are implemented to develop a Recommendation System (RS) for Mobile Application-based Official Document Management and Information Retrieval Systems (MA-ODM-IRS) that utilizes data structure and propensities to develop unique recommendations for common users. Reliable and accurate RS, which employs Machine Learning (ML)-based sentiment analysis to classify recommendations and novel performance metrics for target Information Retrieval (IF) from evaluation DMSs, enhances user trust. A recovery method significantly reduces data loss hazards and improves test case procedures for searching in IR, testing Mean Reciprocal Rank (MRR), Average Precision (AP), and retrieved document percentages. It recommends the novel MA-ODM-IRS and discusses the three experimental system iterations. A 0.75% reciprocal rank is better achieved by optimizing the MABIRS discovery process for users. Identifying feasible ideas, designing and implementing testing processes employing UML tools, and assessing the system gave the participants 98.19% acceptance.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"5 ","pages":"Pages 110-119"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603024000095/pdfft?md5=23f0a5a975d02ed8750b86940b30d6ab&pid=1-s2.0-S2666603024000095-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139824864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FCMPR:A multi-path secure transmission method based on link security assessment and fountain coding","authors":"Jianhang Liu, Qingao Gao, Xinyao Wang, Xiang Zhou, Shibao Li, Haowei Zhang, Xuerong Cui","doi":"10.1016/j.ijin.2024.02.009","DOIUrl":"10.1016/j.ijin.2024.02.009","url":null,"abstract":"<div><p>The security of network data transmission has always been a focus of attention. With the rapid development of quantum computers and the rise of intelligent algorithms such as semantic analysis, traditional data encryption methods struggle to ensure the secure transmission of data. The avoidance routing protocol improves transmission security by circumventing malicious nodes and dangerous areas, but it misses the actual optimal path setup, reducing routing opportunities and increasing communication delays, thus failing to meet the application requirements that demand high security and low latency. To address these issues, this paper proposes a multi-path secure transmission method (FCMPR) based on link security assessment and fountain coding. We have designed a link security assessment method based on a random forest traffic detection model, which can obtain the link's confidence level to assess its security. Furthermore, we have proposed a secure multi-path routing transmission mechanism based on fountain code, enabling safe and rapid data transmission without avoiding malicious nodes. Experimental results show that even with a high proportion of malicious nodes in the network, FCMPR can significantly improve the data transmission rate, reduce the transmission delay, and enhance communication quality while ensuring data security.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"5 ","pages":"Pages 275-285"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603024000150/pdfft?md5=b4b4e78be896785da8d481d7b3f548ab&pid=1-s2.0-S2666603024000150-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140280998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}