Journal of Intelligent Systems and Internet of Things最新文献

筛选
英文 中文
Smart Security Area (SSA) for Radar system technology 智能安全区域(SSA)雷达系统技术
Journal of Intelligent Systems and Internet of Things Pub Date : 1900-01-01 DOI: 10.54216/jisiot.080203
Shamiza Hussein, Eslam Hesham
{"title":"Smart Security Area (SSA) for Radar system technology","authors":"Shamiza Hussein, Eslam Hesham","doi":"10.54216/jisiot.080203","DOIUrl":"https://doi.org/10.54216/jisiot.080203","url":null,"abstract":"Our ability to align with the trend of innovations in science and technology will not only emancipate ignorance but also unfold our ability to evaluate, understand and predict possibilities in our society, environment, and the world at large. Radar system technology gives us the privilege to achieve the above-mentioned fact. The word Radar is an acronym for Radio Detection and Ranging. It is a mean of getting information about a distant target, by sending electromagnetic waves to them and analyzing the echoes from the target to generate relevant reports about the target. In this paper, we will focus on some metrics and the effect of changes in them on the performance of the radar system using the MATLAB Radar Designer.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128475370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chaotic Butterfly Optimization with Optimal Multi-key Image Encryption Technique for Wireless Sensor Networks 基于最优多密钥图像加密技术的无线传感器网络混沌蝴蝶优化
Journal of Intelligent Systems and Internet of Things Pub Date : 1900-01-01 DOI: 10.54216/jisiot.010203
Disheng Zheng, Kai Liang
{"title":"Chaotic Butterfly Optimization with Optimal Multi-key Image Encryption Technique for Wireless Sensor Networks","authors":"Disheng Zheng, Kai Liang","doi":"10.54216/jisiot.010203","DOIUrl":"https://doi.org/10.54216/jisiot.010203","url":null,"abstract":"Wireless sensor network (WSN) comprises a set of sensor nodes, mainly used for data collection and tracking process. The imaging sensors in WSN captures the images from the target environment, which needs to be securely transmitted to the base station (BS). Since data transmission in WSN takes place through wireless links, security is a major challenging issue involved in the design of WSN. Image encryption is a commonly available solution to securely transmit the images to destination without comprising security. Therefore, this study designs a novel Chaotic Butterfly Optimization with Optimal Multi-key Image Encryption (CBO-OMKIE) technique for WSN. The goal of the CBO-OMKIE technique is to securely encrypt the images in WSN. The proposed CBO-OMKIE technique involves the design of multi-key based image encryption technique to accomplish security in WSN. In addition, the CBO algorithm is applied to determine the optimal keys involved in the encryption process and it helps for improving the security level to a maximum extent. The performance validation of the CBO-OMKIE technique takes place using benchmark test images and the outcomes were examined under several aspects. The simulation outcome pointed out the enhanced security analysis of the CBO-OMKIE technique over the other techniques.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114753386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Intelligent Asset Tracking System for Logistics Industry using IoT and Big Data 基于物联网和大数据的物流行业智能资产跟踪系统
Journal of Intelligent Systems and Internet of Things Pub Date : 1900-01-01 DOI: 10.54216/jisiot.000104
S. Krit
{"title":"Intelligent Asset Tracking System for Logistics Industry using IoT and Big Data","authors":"S. Krit","doi":"10.54216/jisiot.000104","DOIUrl":"https://doi.org/10.54216/jisiot.000104","url":null,"abstract":"The logistics industry is a complex and dynamic ecosystem that requires efficient and reliable asset tracking systems (IATS) to optimize operations and reduce costs. To address these challenges, an IATS is proposed in this paper that leverages the power of IoT and big data technologies to collect real-time data on the location, condition, and status of assets such as trucks, containers, and shipments. The system is designed to provide end-to-end visibility and control of assets throughout the logistics value chain. It uses a combination of RFID, GPS, and other tracking technologies to collect data on asset location, temperature, humidity, vibration, and other relevant parameters. The data is then transmitted to a cloud-based platform for storage, processing, and analysis using big data analytics and machine learning algorithms. The platform enables logistics companies to monitor and manage their assets in real-time, optimize routes and schedules, and improve delivery times. It also provides machine learning tools for predictive modeling of asset price movement, enabling companies to identify potential price changes before they occur and minimize loss. The efficiency and effectiveness of our system were shown through simulation studies using data from real-world assets; as a result, it is an attractive option for the tracking and management of assets in real-world logistic businesses.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129788950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Method for Web Service Recommendation Based on QoS Prediction 基于QoS预测的Web服务推荐新方法
Journal of Intelligent Systems and Internet of Things Pub Date : 1900-01-01 DOI: 10.54216/jisiot.000101
M. A. Salam
{"title":"A New Method for Web Service Recommendation Based on QoS Prediction","authors":"M. A. Salam","doi":"10.54216/jisiot.000101","DOIUrl":"https://doi.org/10.54216/jisiot.000101","url":null,"abstract":"As service-oriented architecture gains in popularity and grows in popularity, Web service recommendation and composition have become more important topics for research. Accurately predicting individualized QoS recommendations for recommending web services is a difficult task because of the inconsistency of the Internet and the scarcity of information regarding QoS history. Our team suggests a new framework for QoS values’ prediction and also presents two methods for clustering, User_BC and Service_BC, to support QoS prediction accuracy. Hierarchical clustering is used, based on the QoS dataset of PlanetLab1 (that) contains 200 service-user response time values, with 1,597 service values overall. In our research, we've found that our clustering-based methods beat other popular algorithms in detailed experimental comparisons and analyses.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128972590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Neural Network Based Approach for Food Recognition Using Various Filters 基于人工神经网络的各种滤波器食物识别方法
Journal of Intelligent Systems and Internet of Things Pub Date : 1900-01-01 DOI: 10.54216/jisiot.070205
Upma .., Praveen Gupta, Chaur Singh Rajpoot
{"title":"Artificial Neural Network Based Approach for Food Recognition Using Various Filters","authors":"Upma .., Praveen Gupta, Chaur Singh Rajpoot","doi":"10.54216/jisiot.070205","DOIUrl":"https://doi.org/10.54216/jisiot.070205","url":null,"abstract":"Food image recognition system has various applications now a day. In this paper, we have used a machine learning supervised approach and Support Vector Machine to classify different food images. SVM has been classified to detect and recognize food images with the least modification. By applying various filters like a texture filter, a segmentation method, clustering, and a SVM approach we have achieved more accuracy than other machine learning approaches with manually extracting features. Sustenance is an indivisible piece of people groups lives. we tend to apply a convolution neural network (CNN) to the undertakings of analyst work and perceiving sustenance pictures. Clarification for the wide decent variety of styles of nourishment, and picture acknowledgment of sustenance things are typically unpleasant difficulties. Nevertheless, profound learning has been demonstrated starting late to be a genuinely extreme picture acknowledgment framework, and CNN could be a dynamic approach to managing profound learning. CNN showed on a very basic level higher precision than did old-fashioned help vector-machine-based courses with carefully assembled decisions. For sustenance picture disclosure, CNN likewise demonstrated fundamentally count higher precision than a standard technique. Generally higher precision than standard techniques.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133745999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey of Artificial Intelligence of Things for Smart Buildings: A closer outlook 面向智能建筑的物联网人工智能研究综述
Journal of Intelligent Systems and Internet of Things Pub Date : 1900-01-01 DOI: 10.54216/jisiot.080206
A. Sleem, Ibrahim Elhenawy
{"title":"Survey of Artificial Intelligence of Things for Smart Buildings: A closer outlook","authors":"A. Sleem, Ibrahim Elhenawy","doi":"10.54216/jisiot.080206","DOIUrl":"https://doi.org/10.54216/jisiot.080206","url":null,"abstract":"Artificial Intelligence of Things (AIoT) is a term used to describe the integration of Artificial Intelligence (AI) and Internet of Things (IoT) technologies. AIoT combines the capabilities of AI algorithms with the data generated by IoT devices to enable real-time decision-making and automation of various processes. Smart buildings refers to a type of building that utilizes advanced technologies to improve its efficiency, performance, and functionality of indoor tasks in a way that provide a safe and comfortable environment for occupants. This paper provides an overview of the research literature on AIoT technologies that is contribute to the development of smart buildings and their functionality. We discuss the benefits of AIoT empowered smart buildings, which include reduced energy consumption and costs, improved occupant comfort and productivity, and increased safety and security. we also discusses the challenges associated with the deployment of AIoT in smart buildings, including data privacy and security concerns, interoperability issues, and the need for specialized expertise. Further, we discuss the promising areas of future research that pave the way for further research on AIoT empowered smart buildings. We concludes our work with a discussion of the potential for AIoT empowered smart buildings to contribute to the sustainability of cities and improve the quality of life for their occupants.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131440664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modeling of Multiple Share Creation with Optimal Signcryption Technique for Digital Image Security 基于最优签名加密技术的数字图像安全多共享创建建模
Journal of Intelligent Systems and Internet of Things Pub Date : 1900-01-01 DOI: 10.54216/jisiot.000103
A. R. W. Sait, I. Pustokhina, M. Ilayaraja
{"title":"Modeling of Multiple Share Creation with Optimal Signcryption Technique for Digital Image Security","authors":"A. R. W. Sait, I. Pustokhina, M. Ilayaraja","doi":"10.54216/jisiot.000103","DOIUrl":"https://doi.org/10.54216/jisiot.000103","url":null,"abstract":"Digital image security plays an essential role in the shared communication model. Encryption and decryption process is commonly applied to securely transmit the images in various real-time applications. In addition, the generation of encryption/decryption keys is also essential to achieve enhanced image security. This study presents a multiple share creation scheme with an optimal signcryption (MSS-OSC) technique for digital image security. The MSS-OSC technique primarily generates a set of various shares for every digital image that needs to be transmitted. In addition, the encryption of generated shares takes place via the optimal signcryption (OSC) technique. Moreover, genetic programming (GP) is employed to optimally choose the keys involved in the encryption and decryption process. The detailed experimental validation of the MSS-OSC technique is investigated using a set of benchmark test images. The results analysis demonstrated that the MSS-OSC technique had a superior performance by accomplishing maximum digital image security.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131237474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Proposed Optimization Model for Water Quality Prediction in Internet of Things Environment 一种物联网环境下水质预测优化模型
Journal of Intelligent Systems and Internet of Things Pub Date : 1900-01-01 DOI: 10.54216/jisiot.060203
Gopal Chaudhary, Puneet Singh Lamba, Deepali Virmani
{"title":"A Proposed Optimization Model for Water Quality Prediction in Internet of Things Environment","authors":"Gopal Chaudhary, Puneet Singh Lamba, Deepali Virmani","doi":"10.54216/jisiot.060203","DOIUrl":"https://doi.org/10.54216/jisiot.060203","url":null,"abstract":"The application of industrialization and urbanization strategies results in the proliferation of waste products in water resources which is a serious public challenge. They have resulted in calls for advanced technologies of water quality mitigation and monitoring, as emphasized in the sustainable development objectives. Now, environmental engineering researcher is looking for a more complex process of implementing practical assessments and of monitoring the quality of ground and surface water that is quantifiable to human beings over different locations. Many current techniques use the Internet of Things (IoT) for water quality assessment and monitoring. This paper explores the proposal of African Buffalo Optimization with Deep Belief Network for Water Quality Prediction (ABODBN-WQPR) model in an IoT environment. The presented proposed model majorly concentrates on the identification of water quality.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115955358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Differential Evolution based Feature Selection with Deep Neural Network for Intrusion Detection in Wireless Sensor Networks 基于智能差分进化特征选择的深度神经网络无线传感器网络入侵检测
Journal of Intelligent Systems and Internet of Things Pub Date : 1900-01-01 DOI: 10.54216/jisiot.000204
I. M. El-Hasnony
{"title":"Intelligent Differential Evolution based Feature Selection with Deep Neural Network for Intrusion Detection in Wireless Sensor Networks","authors":"I. M. El-Hasnony","doi":"10.54216/jisiot.000204","DOIUrl":"https://doi.org/10.54216/jisiot.000204","url":null,"abstract":"Wireless sensor network (WSN) is mainly utilized for data gathering and surveillance applications. As WSN is majorly deployed in harsh and hostile environments, security remains a critical issue which needs to be resolved. An intrusion detection system (IDS) is one of the proficient ways used to determine the presence of abnormal behaviors (i.e. intrusions) in the network. Earlier studies have focused on the design of machine learning (ML) and deep learning (ML) models to design IDS. With this motivation, this paper presents an intelligent differential evolution based feature selection with deep neural network (IDEFS-DNN) for intrusion detection in WSN. The proposed IDEFS-DNN model aims to select optimum set of features and classify the intrusions in the network. In addition, the IDEFS-DNN technique involves the design of IDEFS technique to choose a subset of optimum features. Moreover, the chosen features are fed into the DNN technique for classification purposes. The usage of IDEFS technique helps to reduce the complexity and increase the classifier outcome. In order to portray the improved performance of the IDEFS-DNN technique, wide ranging experiments take place on benchmark datasets and the results are inspected under varying aspects. The simulation results ensured the enhanced intrusion detection performance of the IDEFS-DNN technique over the other IDS models.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131094957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Recurrent Model for Automatic Detection Cardiac Arrhythmia on the Internet of Healthcare Things 基于医疗物联网的心律失常自动检测循环模型
Journal of Intelligent Systems and Internet of Things Pub Date : 1900-01-01 DOI: 10.54216/jisiot.020104
Waleed Abd Elkhalik
{"title":"Recurrent Model for Automatic Detection Cardiac Arrhythmia on the Internet of Healthcare Things","authors":"Waleed Abd Elkhalik","doi":"10.54216/jisiot.020104","DOIUrl":"https://doi.org/10.54216/jisiot.020104","url":null,"abstract":"With the growing prevalence of the Internet of Health Things (IoHT), there is an increasing need for reliable and precise categorization of electrocardiogram (ECG) indications for the early detection of cardiovascular diseases. In this research, we propose a machine learning approach for ECG classification in IoHT applications. Our solution use wavelet transforms to clean the ECG records before passing them to the model. Then, a stack of long short-term memory (LSTM) cells is built to learn the temporal interrelations in the ECG signals and make accurate predictions. We assessed the performance of our model on a publicly available dataset of ECG signals, achieving an overall accuracy of 97.5%. The experimental findings demonstrate that our models can effectively classify ECG signals in IoHT applications, providing a valuable tool for the early discovery of vascular diseases. Furthermore, our model can be certainly incorporated into IoHT systems, providing a reliable and efficient solution for ECG classification.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124270778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信