{"title":"Enhancing customer satisfaction through IIoT-Enabled coopetition: Strategic insights and impacts","authors":"Agostinho da Silva , Antonio J. Marques Cardoso","doi":"10.1016/j.iot.2024.101408","DOIUrl":"10.1016/j.iot.2024.101408","url":null,"abstract":"<div><div>This research investigates the significant role of Industrial Internet of Things (IIoT) to enable Coopetition Network Practices (CNPs) in enhancing the performance of Small and Medium Enterprises (SMEs) within the context of global digital supply chains. Employing a quantitative approach, our study reveals that CNPs contribute to a noTable 51.0 % improvement in factors determining customer satisfaction. This underscores the strategic importance of blending competition with collaboration to refine production processes and align with consumer expectations. Additionally, the research presents a remarkable 69.1 % boost in operational consistency and reports substantial progress in manufacturing flexibility and the value-to-weight ratio, witnessing increases of 125.8 % and 33.2 %, respectively. These improvements are pivotal in optimizing production resources, which in turn, have led to a 29.3 % decrease in customer complaints and a 15.6 % rise in on-time delivery rates. Conversely, a slight decline in the consistency of the value-to-weight ratio was observed, pointing to potential areas for future research. The findings decisively show that CNPs offer concrete advantages by enhancing customer satisfaction determinants and operational efficiency in SMEs. The paper advocates for future studies to directly measure customer satisfaction and to formulate actionable guidelines for the effective implementation of coopetition strategies. This proposed research direction aims to provide solutions to the manufacturing sector's emerging challenges, thereby promoting competitive advantage and growth in the digital era.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101408"},"PeriodicalIF":6.0,"publicationDate":"2024-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142531782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaoling Han , Bin Lin , Nan Wu , Ping Wang , Zhenyu Na , Miyuan Zhang
{"title":"Design of a turbo-based deep semantic autoencoder for marine Internet of Things","authors":"Xiaoling Han , Bin Lin , Nan Wu , Ping Wang , Zhenyu Na , Miyuan Zhang","doi":"10.1016/j.iot.2024.101393","DOIUrl":"10.1016/j.iot.2024.101393","url":null,"abstract":"<div><div>With the rapid growth of the global marine economy and flourishing maritime activities, the marine Internet of Things (IoT) is gaining unprecedented momentum. However, current marine equipment is deficient in data transmission efficiency and semantic comprehension. To address these issues, this paper proposes a novel End-to-End (E2E) coding scheme, namely the Turbo-based Deep Semantic Autoencoder (Turbo-DSA). The Turbo-DSA achieves joint source-channel coding at the semantic level through the E2E design of transmitter and receiver, while learning to adapt to environment changes. The semantic encoder and decoder are composed of transformer technology, which efficiently converts messages into semantic vectors. These vectors are dynamically adjusted during neural network training according to channel characteristics and background knowledge base. The Turbo structure further enhances the semantic vectors. Specifically, the channel encoder utilizes Turbo structure to separate semantic vectors, ensuring precise transmission of meaning, while the channel decoder employs Turbo iterative decoding to optimize the representation of semantic vectors. This deep integration of the transformer and Turbo structure is ensured by the design of the objective function, semantic extraction, and the entire training process. Compared with traditional Turbo coding techniques, the Turbo-DSA shows a faster convergence speed, thanks to its efficient processing of semantic vectors. Simulation results demonstrate that the Turbo-DSA surpasses existing benchmarks in key performance indicators, such as bilingual evaluation understudy scores and sentence similarity. This is particularly evident under low signal-to-noise ratio conditions, where it shows superior text semantic transmission efficiency and adaptability to variable marine channel environments.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101393"},"PeriodicalIF":6.0,"publicationDate":"2024-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142572263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nguyen-Ngan-Ha Lam , Chiao-Hsin Lin , Yi-Lu Li , Wei-Siang Ciou , Yi-Chun Du
{"title":"An IoT-enabled EEG headphones with customized music for chronic tinnitus assessment and symptom management","authors":"Nguyen-Ngan-Ha Lam , Chiao-Hsin Lin , Yi-Lu Li , Wei-Siang Ciou , Yi-Chun Du","doi":"10.1016/j.iot.2024.101411","DOIUrl":"10.1016/j.iot.2024.101411","url":null,"abstract":"<div><div>Chronic tinnitus often affects elderly or hearing-impaired individuals, which can disturb their daily lives by disrupting concentration and limiting communication. Clinically, sound masking using external sounds like white noise (WN) aims to mask tinnitus and relieve secondary symptoms. Even when symptoms are relieved, tinnitus often requires long-term management, and for patients to visit healthcare professionals regularly. Generally, it could make maintaining symptom management challenging due to the time and effort required for consistent follow-ups. EEG is considered as one of the objective marker for assessing tinnitus symptoms. In this study, we designed IoT-enabled EEG sensing (IEES) headphones, an innovative IoT device that provided customized music (CM) and EEG measurement. The headphones employed a pitch-matching (PM) method to create CM tailored to each patient at specific frequencies for tinnitus patients. To collect EEG measurements, the device incorporated OpenBCI electrodes and a sensing chip to monitor brain waves and evaluate the outcomes.. After 30 days of experiment, participants showed significant reductions in both tinnitus handicap inventory (THI) scores and visual analog scale for annoyance (VAS-A) scores. In comparison, tinnitus frequency showed a slight reduction. EEG measurements demonstrated an increase in alpha band activity. In questionnaires, patients reported high satisfaction with their experiences. These findings highlight the potential of the proposed method for chronic tinnitus assessment and symptom management.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101411"},"PeriodicalIF":6.0,"publicationDate":"2024-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142531739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artificial intelligence of things and distributed technologies as enablers for intelligent mobility services in smart cities-A survey","authors":"Bokolo Anthony Jnr","doi":"10.1016/j.iot.2024.101399","DOIUrl":"10.1016/j.iot.2024.101399","url":null,"abstract":"<div><div>The society is witnessing an accelerated large-scale adoption of technology with transformative effects on daily transport operations, with cities now depending on data driven mobility services. Disruptive technologies such as Artificial Intelligence (AI), the Internet of Things (IoT), and decentralized technologies for example Distributed Ledger Technologies (DLT) are being deployed in smart cities. However, AI is faced with data security and privacy issues due to its centralized mode of deployment. Conversely, DLT which employs a decentralized architecture can be converged with AI to provide a secure data sharing across various IoT thereby overcoming the existing setbacks faced in deploying AI in smart cities. Evidently, the convergence of AI and IoT as AIoT and DLT have great potential to create novel business models for improved data driven services such as intelligent mobility in smart cities. Although research on the convergence of AI, IoT and DLT exists, our understanding of its integration in achieving intelligent mobility services in smart cities remains fragmented as current research in this area remains scarce. This study bridges the gap between theory and practice by providing researchers and practitioners with insights on the potential benefits of converging AIoT and DLT. Grounded on the Technology Organization Environment (TOE) framework this study presents the technological, organizational, and environmental factors that impacts the convergence of AIoT and DLT in smart cities. Additionally, findings from this study present use cases on the applicability of AIoT and DLT to support intelligent mobility services in smart cities.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101399"},"PeriodicalIF":6.0,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142532404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haijuan Wang , Weijin Jiang , Yirong Jiang , Yixiao Li , Yusheng Xu
{"title":"LPF-IVN: A lightweight privacy-enhancing scheme with functional mechanism of intelligent vehicle networking","authors":"Haijuan Wang , Weijin Jiang , Yirong Jiang , Yixiao Li , Yusheng Xu","doi":"10.1016/j.iot.2024.101400","DOIUrl":"10.1016/j.iot.2024.101400","url":null,"abstract":"<div><div>Due to decentralization and effective prevention of privacy leakage, Differential Private Federated Learning(DP-FL) has emerged as an efficient technique in the Internet of Vehicles (IoV). However, the essence of key industrial is big data. When applying the DP-FL model to the IoV, these large-scale nonlightweight data such as Non-IID and high-dimensional will decrease the security and accuracy of the model. Therefore, for the security and accuracy of the IoV, we proposed a lightweight DP-FL framework called DPF-IVN, considering the impact of heterogeneous and privacy leak in the context of IoV. It adopts the idea of “lowering dimension first and then optimization” to process non-light quantified data in the IoV. Specifically, we novelly design a Federated Randomized Principal Component Analysis (FRPCA) algorithm, allowing users to map local data to low-dimensional data. Then, we propose the Functional Mechanism(FM) to disturb the gradient parameters to solve the problem of low training accuracy caused by gradient cutting. Besides, to reduce model differences, we used the Bregman dispersal as a regularized item update loss function to improve the accuracy of the model. Extensive experiments demonstrate the superior performance of DPF-IVN in the heterogeneous environment compared to other methods.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101400"},"PeriodicalIF":6.0,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142531777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing the Internet of Things with Ascon-Sign","authors":"Alexander Magyari, Yuhua Chen","doi":"10.1016/j.iot.2024.101394","DOIUrl":"10.1016/j.iot.2024.101394","url":null,"abstract":"<div><div>With a Cryptographically-Relevant Quantum Computer (CRQC) estimated to be viable within the next 15 years, the development of post-quantum security is imperative. Previously secure networks may soon fall victim to these CRQCs as they will likely attack the weakest link in a network. In modern networks, these weak-links are often present in the form of Internet of Things (IoT) devices, as the resource constrains imposed by these wireless nodes leads to lowered security. We offer the first Ascon-Sign implementation for resource constrained FPGAs, which allows a wireless sensor network to verify nodes. Our design runs twice as fast as similarly-area constrained devices, and shows a 33% reduction in power per operation. We demonstrate the capability of our design by integrating it with a wireless sensor network for weather detecting. We also propose an amendment to the Ascon-Sign specification that allows for shortened processing time and lower memory requirements.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101394"},"PeriodicalIF":6.0,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142531718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT-HGDS: Internet of Things integrated machine learning based hazardous gases detection system for smart kitchen","authors":"Kanak Kumar , Anshul Verma , Pradeepika Verma","doi":"10.1016/j.iot.2024.101396","DOIUrl":"10.1016/j.iot.2024.101396","url":null,"abstract":"<div><div>This paper proposes an Internet of Things (IoT) and Machine Learning (ML) integrated Hazardous Gas Detection System (IoT-HGDS) for smart kitchens. The design incorporates six tin-oxide-based metal–oxide–semiconductor (MOS) gas sensor arrays and one DHT22 (temperature & humidity sensor). This IoT-HGDS can detect different hazardous gases, Volatile Organic Compounds (VOCs), and odors responses released from the kitchen’s materials and transmit them to a Remote Data Processing Centre (RDPC) through Amazon-Web Services (AWS) in real time. In this experiment, we collected <span><math><mrow><mn>150</mn><mo>×</mo><mn>9</mn><mo>=</mo><mn>1350</mn></mrow></math></span> samples from 9 kitchen materials like ghee, milk, liquid petroleum gas (LPG), bread, mustard oil, compressed natural gas (CNG), pigeon peas, refined oil, and kerosene. The Standardized Independent Component Analysis (SICA) pre-processing technique has been used to clean data, standardize the features, and remove outliers. ML approaches like Logistic Regression (LR), Adaptive Boosting (AdaBoost) and Regularized Discriminant Analysis (RDA) have been applied for accurate identification of gases/VOCs class and provide immediate alerts to improve kitchen safety. The SICA-RDA classifier outperformed (highest accuracy at 97.78 %) as compared to LR and AdaBoost in terms of performance and balanced precision, recall, and F1-Score. LR has the lowest performance in all metrics. LPG has the lowest Mean Squared Error (MSE) of <span><math><mrow><mn>6</mn><mo>.</mo><mn>62</mn><mo>×</mo><mn>10</mn><mo>−</mo><mn>7</mn></mrow></math></span>, while CNG has the highest MSE of <span><math><mrow><mn>3</mn><mo>.</mo><mn>60</mn><mo>×</mo><mn>10</mn><mo>−</mo><mn>4</mn></mrow></math></span>. This system can intelligently preserve gases, ensure safety precautions, and prevent accidents in the kitchens.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101396"},"PeriodicalIF":6.0,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142531781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Phan The Duy, Do Thi Thu Hien, Tran Duc Luong, Nguyen Huu Quyen, Van-Hau Pham
{"title":"Fed-Evolver: An automated evolving approach for federated Intrusion Detection System using adversarial autoencoder in SDN-enabled networks","authors":"Phan The Duy, Do Thi Thu Hien, Tran Duc Luong, Nguyen Huu Quyen, Van-Hau Pham","doi":"10.1016/j.iot.2024.101397","DOIUrl":"10.1016/j.iot.2024.101397","url":null,"abstract":"<div><div>Intrusion Detection Systems (IDS) have garnered escalating significance in response to the evolving landscape of cyberattacks, driven by the adaptability and versatility of Software Defined Networking (SDN)-based networks in enhancing security orchestration. Although Machine Learning (ML) models have been developed for IDS, they require large amounts of labeled data to achieve high performance. However, acquiring labels for attacks is a time-consuming process and can cause problems in deploying the existing ML models in new systems or lower performance due to a shortage of labeled data on pre-trained datasets. Additionally, such ML-based IDS models lack the self-learning function to automatically adapt to new cyberattacks during network operations. To overcome these challenges, our work proposes Fed-Evolver, an automated evolving approach for federated IDS that combines Generative Adversarial Networks (GANs) with Auto Encoder (AE) and a semi-supervised adversarial Autoencoder (SSAAE) for spotting intrusion actions. Our Fed-Evolver leverages supervised and unsupervised learning strategies to build efficient IDS models in the context of labeled data scarcity with the help of Federated Learning (FL). It allows data owners to collaborate for training intrusion detection models to provide the self-evolving capability in SDN-enabled networks. Our proposed framework is evaluated on 6 cyberattack datasets, including CICIDS2018, CIC-ToN-IoT, NF-UNSW-NB15, InSDN, InSecLab-IDS2021, DNP3 Intrusion Detection, and it outperforms other ML methods even when trained with only 1% proportion of labeled data, achieving consistently high performance across all metrics on the datasets.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101397"},"PeriodicalIF":6.0,"publicationDate":"2024-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142531780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated image-based fire detection and alarm system using edge computing and cloud-based platform","authors":"Xueliang Yang, Yenchun Li, Qian Chen","doi":"10.1016/j.iot.2024.101402","DOIUrl":"10.1016/j.iot.2024.101402","url":null,"abstract":"<div><div>To tackle the increasing wildfire challenges, this paper presents an automated image-based fire detection and alarm system utilizing edge computing and a cloud-based platform, specifically designed for urban building fire detection. The system captures both RGB and infrared images from thermal cameras and employs existing computer vision techniques to detect fire characteristics such as flames and smoke. By integrating edge computing, the system minimizes latency to enhance the accuracy of fire detection and alarm activation. The cloud platform supports extensive data storage, analysis, and remote monitoring, which can ensure data accessibility and scalable data management. The proposed system descriptions include a detailed system architecture design, data collection, and the selection and application of detection algorithms that leverage both RGB and thermal image data for fire detection. Using the campus building and surrounding risk-prone areas as a testbed, the proposed system demonstrated desired fire detection capabilities and a robust solution to quickly identify and respond to fire incidents within the urban area. The proposed system functionalities can be scaled and adapted to other fire risk-prone areas.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101402"},"PeriodicalIF":6.0,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142531779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ali Nikseresht , Sajjad Shokouhyar , Erfan Babaee Tirkolaee , Nima Pishva
{"title":"Applications and emerging trends of blockchain technology in marketing to develop Industry 5.0 Businesses: A comprehensive survey and network analysis","authors":"Ali Nikseresht , Sajjad Shokouhyar , Erfan Babaee Tirkolaee , Nima Pishva","doi":"10.1016/j.iot.2024.101401","DOIUrl":"10.1016/j.iot.2024.101401","url":null,"abstract":"<div><div>With the availability of enormous amounts of data come the difficulties of big data, privacy, and ransomware assaults, which result in Marketing fraud and spam. Blockchain offers an extensive array of possible applications in the Marketing field. Nevertheless, both Marketing research and practice exhibit a degree of hesitance toward using Blockchain technology and have not yet come around to completely understand and adopt the technology. Here, the aim is to examine the Blockchain concepts and their applications in Marketing through bibliometrics, network, and thematic analyses, which can provide several novel insights and perspectives into current research trends in this field by evaluating the most significant and cited research publications, keywords, institutions, authors' collaboration network, and finally countries that promote Industry 5.0 (I5.0) businesses. This study performs a detailed bibliometric and thematic-based Systematic Literature Review (SLR) on 124 of over 15000 research papers. Major outcomes include the identification of emerging themes such as the role of Blockchain in advertising, and dynamic pricing, as well as the need for further exploration of underdeveloped areas (e.g., consumer behavior and brand equity). The results contribute to theoretical and practical management elements and provide the groundwork for future study in this area. The overarching target of this research is to give a complete overview of applications and emerging trends of Blockchain technology in Marketing, thereby serving as a resource for future research topics for Marketing scholars and experts aiming to implement solutions based on Blockchain technology and algorithms to develop an I5.0 business.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101401"},"PeriodicalIF":6.0,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142445491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}