G. Gopinath, Kirubasri G. G.V., Haritha Sasikumar, Yazhini .., Jagruti Patil
{"title":"A Novel Artificial Intelligence Based Internet of Things for Fall Detection of Elderly Care Monitoring","authors":"G. Gopinath, Kirubasri G. G.V., Haritha Sasikumar, Yazhini .., Jagruti Patil","doi":"10.54216/jisiot.030102","DOIUrl":"https://doi.org/10.54216/jisiot.030102","url":null,"abstract":"A fall of an older adult often leads to severe injuries and is found to be a significant reason for the death due to post-traumatic complications. Many falls happen in the home atmosphere and prevail unrecognized. Thus, the need for reliable early fall detection is necessary for fast help. Lately, the emergence of wearables, smartphones, IoT, etc., made it possible to develop systems fall detection which aids in the remote monitoring of the elderly. The goal is to allow intelligent algorithms and smartphones to detect falls for elderly care and to monitor them regularly. This work presents the Artificial Intelligence of Things for Fall Detection (AIOTFD) system using a slime mould algorithm (SMA) to optimize the final data. The features extracted using SqueezeNet further CNN based SMA used for data optimization. The validation of the AIOTFD model performance is evaluated through the Multiple Cameras Fall Dataset (MCFD) and UR Fall Detection dataset (URFD). The empirical results accentuated the assuring realization of the model compared to other state-of the art methods.The obtained results shows our proposed AIOTFD attains accuracy of 99.82% and 99.79% and databases can be used for additional investigation and optimizations to increase the recognition rate to enhance the independent life of the elderly.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124489843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Share Generator for Slicing and Securely Retrieving the Cloud-Hosted Heterogeneous Multimedia Data","authors":"A. Admin","doi":"10.54216/jisiot.050103","DOIUrl":"https://doi.org/10.54216/jisiot.050103","url":null,"abstract":"Recently, the security of heterogeneous multimedia data becomes a very critical issue, substantially with the proliferation of multimedia data and applications. Cloud computing is the hidden back-end for storing heterogeneous multimedia data. Notwithstanding that using cloud storage is indispensable, but the remote storage servers are untrusted. Therefore, one of the most critical challenges is securing multimedia data storage and retrieval from the untrusted cloud servers. This paper applies a Shamir Secrete-Sharing scheme and integrates with cloud computing to guarantee efficiency and security for sensitive multimedia data storage and retrieval. The proposed scheme can fully support the comprehensive and multilevel security control requirements for the cloud-hosted multimedia data and applications. In addition, our scheme is also based on a source transformation that provides powerful mutual interdependence in its encrypted representation—the Share Generator slices and encrypts the multimedia data before sending it to the cloud storage. The extensive experimental evaluation on various configurations confirmed the effectiveness and efficiency of our scheme, which showed excellent performance and compatibility with several implementation strategies.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116796888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Metaheuristic based Node Localization Technique for Wireless Sensor Networks","authors":"M. Elsharkawy, I. S. Farahat","doi":"10.54216/jisiot.050204","DOIUrl":"https://doi.org/10.54216/jisiot.050204","url":null,"abstract":"Cloud computing (CC) becomes a familiar topic in offering unlimited access to services as well as resources via the Internet. A comprehensive CC management system is needed to collect details of the task processing and ensure proper resource allocation with the accomplishment of Quality of Service (QoS). At the same time, virtual machine (VM) migration is a crucial problem in the CC platform which contributes to energy utilization and resource usage. Therefore, this paper presents a new energy-aware elephant herd optimization-based VM migration (EAEHO-VMM) scheme. The EAEHO-VMM algorithm aims to migrate the VMs and prediction failure VMs. At the initial stage, the EHO algorithm is executed to minimize the energy utilization of the VM migration process in the CC environment. In addition, a support vector machine (SVM) model is applied to identify the failure VMs and allows relocation in an effective way. In order to make sure the better performance of the EAEHO-VMM algorithm, a series of simulations take place, and the results are investigated in terms of different aspects. The experimental outcomes ensured the enhanced VM migration performance of the EAEHO-VMM algorithm over the other techniques.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116010204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Challenges and Solutions in the Internet of Things","authors":"A. Abdullah, Ibrahim Elhenawy, A. Abdelmonem","doi":"10.54216/jisiot.060206","DOIUrl":"https://doi.org/10.54216/jisiot.060206","url":null,"abstract":"The Internet of Things (IoT) is pervasive in today's world and may be located almost throughout. It is employed in smart cities for things like highways and clinics, as well as in smart buildings for things like regulating doors and air conditioner units, avoiding fires, and many other things. The Internet of Things (IoT) refers to a set of interconnected computing devices that may communicate with one another by exchanging data over the internet. This provides the opportunity for the attacker to penetrate the IoT technologies and get the important data they contain. The restricted measure performance of IoT systems is the source of the issue, as they make it impossible to implement the conventional security mechanism on these devices. As a result of this constraint, it is necessary to propose lightweight algorithms that are capable of supporting IoT devices. However, Internet of Things (IoT) safety and confidentiality are important challenges that might impede the technology's long-term growth. In this study, we have addressed the security of the internet of things from two primary vantage points, namely, IoT design and protocols. We cover the many levels that make up the architecture of the Internet of Things (IoT), as well as the security problems that are connected with those layers and the possible alternatives to those concerns. We went through a variety of protocols that are used in the layered evolution of the Internet of Things, as well as the security mechanisms that were built for every protocol","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116724171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Edge Intelligence Framework for Elegant Power Management in IoT-enabled Power Grids","authors":"I. Pustokhina, D. A. Pustokhin","doi":"10.54216/jisiot.060204","DOIUrl":"https://doi.org/10.54216/jisiot.060204","url":null,"abstract":"The Internet of Things (IoT) is a concept that has the potential to attract new audiences in fields as diverse as manufacturing, healthcare, and more. IoT devices included in the sensor were the primary drivers of the massive data collection. To successfully combine, assess, and comprehend all program objects, thus, self-adaptive algorithms based on AI are necessary. The proliferation of both massive datasets and resource-intensive IoT devices makes stringent power management essential. The proliferation of both massive datasets and resource-intensive Internet of Things devices makes stringent energy management essential. Combining IoT with AI-based techniques is crucial for equitable power distribution to compact mobile devices. To this end, we offer an efficient way to communicate between power utilities and end users by forecasting future power usage over short periods of time. Innovations include a revolutionary convolutional recurrent model for a lightweight prediction method with low duration intricacy and minimum margins of error, as well as massive energy administration for edge devices via a centralized cloud-based data supervisory server. To maintain the power consumption and supply paradox efficiently, the suggested scheme has mobile nodes interact with a central remote server via an IoT network and then on to the corresponding power grid. We use a number of preparation methods to accommodate the varied electrical data, and then we construct a powerful decision-making engine for quick prediction on devices with limited resources.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133094134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent System for Ranking Big Data in Search Engine","authors":"M. -, M. E. EL-Hasnony","doi":"10.54216/jisiot.030201","DOIUrl":"https://doi.org/10.54216/jisiot.030201","url":null,"abstract":"The spread of Internet sources has increased the volume of big data that is difficult to handle in traditional ways. So, most users need modern search systems to facilitate the search and retrieval of information in the presence of big data. However, the main challenge in the first and second conventional generations of search engines are linking different web data based on the syntax of keywords not on the semantic meaning and without a knowledge base. This manuscript proposes a framework based on modern technologies such as ETI processes, ontology graphs, and indexing RDF using wide column NoSQL technique. The main contribution of our work is introducing a mathematical model that is used to calculate the similarity score between a query and stored RDF documents based on semantic relations. Various operations were carried out to measure the proposed model's efficiency using data sources such as DBpedia, YAGO dataset. According to experimental results, the proposed model is achieving high precision compared to other related systems.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133010507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent System for Forecasting Failure of Agile Projects","authors":"A. Abdelaziz, A. N. Mahmoud","doi":"10.54216/jisiot.050102","DOIUrl":"https://doi.org/10.54216/jisiot.050102","url":null,"abstract":"Revealing the failure of agile software projects is a great challenge faced by software companies. This paper focuses on the using of intelligent techniques such as fuzzy logic, multiple linear regressions, support vector machine, neural network to address this challenge. This paper also presents a review of some works related to this area of interest. In this paper, the researchers propose an approach for revealing the failure of agile software projects based on two intelligent techniques: fuzzy logic and multiple linear regressions (MLR). MLR is used to determine crucial failure factors of agile software projects. Fuzzy logic is used for revealing failure of agile software projects.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134646843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From the Wireless Sensor Networks (WSNs) to the Web of Things (WoT): An Overview","authors":"Mina Younan, S. Khattab, R. Bahgat","doi":"10.54216/jisiot.040201","DOIUrl":"https://doi.org/10.54216/jisiot.040201","url":null,"abstract":"In the last two decades, Wireless Sensor Networks (WSNs) are gaining more popularity, where the concept of WSN always exists when everything connects. Almost of WSN applications cover wide area and large spaces for assessing and monitoring certain phenomenon. Moreover, WSN components have been integrated in daily life objects or things (object, place, and person), so that they could be monitored and controlled. As a result, a new paradigm called the Internet of Things (IoT) connects WSN components to the Internet to be globally monitored and controlled representing the surrounding environmental events and conditions. The future IoT is called the Web of Things (WoT), which visualizes the IoT data (sensory data) using current web tools and services (HTTP, RESTful services). This paper presents an overview of the WSNs, the IoT and its future paradigm (WoT) discussing key elements, main layers, main challenges, and annotation formats.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127867224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An intelligent model to identify industry 4.0, IoT and circular economy adoption barriers","authors":"A. Abdelmonem, Shimaa S. Mohamed","doi":"10.54216/jisiot.040104","DOIUrl":"https://doi.org/10.54216/jisiot.040104","url":null,"abstract":"In the industry 4.0 idea, new cutting-edge techniques like the Internet of Things (IoT) are advocated. There is still a long way to go before IoT is widely adopted in the circular economy. The goal of this research is to identify the most significant impediments to the integration of IoT in the circular economy in the manufacturing industry. For this purpose, survey research was carried out to provide a framework for the assessment of the hurdles to IoT adoption in the circular economy. This led to a new approach that combines the SWARA and TOPSIS methodologies based on MCDM. The SWARA model is employed to compute the weights of criteria, while the TOPSIS approach is used to rank different manufacturing businesses under the identified obstacles.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134196794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Altaee, A. Jawad, M. Jalil, S. Al-Kikani, A. Oleiwi, Hatira Gunerhan
{"title":"A Multi-level Fusion System for Intelligent Capture and Assessment of Student Activity in Physical Training based on Machine Learning","authors":"M. Altaee, A. Jawad, M. Jalil, S. Al-Kikani, A. Oleiwi, Hatira Gunerhan","doi":"10.54216/jisiot.090101","DOIUrl":"https://doi.org/10.54216/jisiot.090101","url":null,"abstract":"To record and evaluate students' physical education class participation, this study proposes using a Machine Learning aided Physical Training Framework (ML-PTF). Improve student achievement in physical education with the help of the Multi-level Fusion System that employs machine learning strategies. The system integrates sensor data, video data, and contextual data to deliver a holistic and precise evaluation of student engagement. This study's simulation analysis shows that the ML-PTF improves the reliability of evaluating universities' physical education programs. A important reference path and paradigm for advancing tertiary-level physical education for graduates, the multi-level fusion system also provides an investigation of information technology and language education integration. The experimental findings demonstrate that the ML-PTF is superior to other approaches in terms of learning rate, f1-score, precision, and probability, as well as student engagement, involvement, and recognition accuracy.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133091852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}