{"title":"Research on Teaching Method of Children’s Image Cognition Based on AR Technology","authors":"Jie Gui, J. Suh","doi":"10.32604/jiot.2022.037182","DOIUrl":"https://doi.org/10.32604/jiot.2022.037182","url":null,"abstract":"","PeriodicalId":345256,"journal":{"name":"Journal on Internet of Things","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122343247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jesús Hamilton Ortiz, Osamah Ibrahim Khalaf, Fernando Velez Varela, Nicolas Minotta Rodriguez, Christian Andres Mosquera Gil
{"title":"Definition and Development of a Control Concept Applied in Elements Distributed for Manage Them Using IoT","authors":"Jesús Hamilton Ortiz, Osamah Ibrahim Khalaf, Fernando Velez Varela, Nicolas Minotta Rodriguez, Christian Andres Mosquera Gil","doi":"10.32604/jiot.2021.014737","DOIUrl":"https://doi.org/10.32604/jiot.2021.014737","url":null,"abstract":": In recent years, the Internet has gradually developed into a mature tool, which can integrate technologies involved in different application scenarios. The Internet allows the integration of solutions to different problems, which benefits both users and companies. The Internet of Things is a further development of the Internet, which can further realize the interconnection of people, machines, and things. The work of this paper mainly focuses on the use of Internet of Things technology to achieve efficient management. A wireless device is designed in the paper, which can be integrated in a helmet. This helmet can be used in some specific scenarios. Managers can use the Internet of Things technology to call the data generated by the hearing equipment and lighting equipment in the helmet to identify users. These helmets can be managed through a network platform. On the network platform, in addition to the helmet, some other components can be allowed to access, making the platform more universal and convenient. This paper elaborates on the design and development of the project and shows how to use it for effective time management in the skating rink.","PeriodicalId":345256,"journal":{"name":"Journal on Internet of Things","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116960449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yong Hua, Bolun Chen, Yan Yuan, Zhu Guochang, Li Fenfen
{"title":"An Influence Maximization Algorithm Based on the Influence Propagation Range of Nodes","authors":"Yong Hua, Bolun Chen, Yan Yuan, Zhu Guochang, Li Fenfen","doi":"10.32604/JIOT.2019.05941","DOIUrl":"https://doi.org/10.32604/JIOT.2019.05941","url":null,"abstract":"The problem of influence maximization in the social network G is to find k seed nodes with the maximum influence. The seed set S has a wider range of influence in the social network G than other same-size node sets. The influence of a node is usually established by using the IC model (Independent Cascade model) with a considerable amount of Monte Carlo simulations used to approximate the influence of the node. In addition, an approximate effect (1 − 1/e) is obtained, when the number of Monte Carlo simulations is 10000 and the probability of propagation is very small. In this paper, we analyze that the propagative range of influence of node set is limited in the IC model, and we find that the influence of node only spread to the t′-th neighbor. Therefore, we propose a greedy algorithm based on the improved IC model that we only consider the influence in the t′-th neighbor of node. Finally, we perform experiments on 10 real social network and achieve favorable results.","PeriodicalId":345256,"journal":{"name":"Journal on Internet of Things","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126802281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qirun Wang, Fujian Zhu, Y. Leng, Yongjun Ren, Jinyue Xia
{"title":"Ensuring Readability of Electronic Records Based on Virtualization Technology in Cloud Storage","authors":"Qirun Wang, Fujian Zhu, Y. Leng, Yongjun Ren, Jinyue Xia","doi":"10.32604/JIOT.2019.05898","DOIUrl":"https://doi.org/10.32604/JIOT.2019.05898","url":null,"abstract":"","PeriodicalId":345256,"journal":{"name":"Journal on Internet of Things","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126186898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Virtual Machine Placement Strategy Based on Virtual Machine Selection and Integration","authors":"Denghui Zhang, Guo Yin","doi":"10.32604/jiot.2021.016936","DOIUrl":"https://doi.org/10.32604/jiot.2021.016936","url":null,"abstract":": Cloud data centers face the largest energy consumption. In order to save energy consumption in cloud data centers, cloud service providers adopt a virtual machine migration strategy. In this paper, we propose an efficient virtual machine placement strategy (VMP-SI) based on virtual machine selection and integration. Our proposed VMP-SI strategy divides the migration process into three phases: physical host state detection, virtual machine selection and virtual machine placement. The local regression robust (LRR) algorithm and minimum migration time (MMT) policy are individual used in the first and section phase, respectively. Then we design a virtual machine migration strategy that integrates the process of virtual machine selection and placement, which can ensure a satisfactory utilization efficiency of the hardware resources of the active physical host. Experimental results show that our proposed method is better than the approach in Cloudsim under various performance metrics.","PeriodicalId":345256,"journal":{"name":"Journal on Internet of Things","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123411626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Internet of Things Technology in Enterprise Marketing Management Innovation","authors":"Huan Xu, Sixuan Chen","doi":"10.32604/jiot.2022.030610","DOIUrl":"https://doi.org/10.32604/jiot.2022.030610","url":null,"abstract":"","PeriodicalId":345256,"journal":{"name":"Journal on Internet of Things","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131933183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guoqing Xu, Changsen Xia, Jun Qian, Guo Ran, Zilong Jin
{"title":"A Network Traffic Prediction Algorithm Based on Prophet-EALSTM-GPR","authors":"Guoqing Xu, Changsen Xia, Jun Qian, Guo Ran, Zilong Jin","doi":"10.32604/jiot.2022.036066","DOIUrl":"https://doi.org/10.32604/jiot.2022.036066","url":null,"abstract":"","PeriodicalId":345256,"journal":{"name":"Journal on Internet of Things","volume":"74 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120857761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TMCA-Net: A Compact Convolution Network for Monitoring Upper Limb Rehabilitation","authors":"Qi Liu, Zihao Wu, Xiaodong Liu","doi":"10.32604/jiot.2022.040368","DOIUrl":"https://doi.org/10.32604/jiot.2022.040368","url":null,"abstract":",","PeriodicalId":345256,"journal":{"name":"Journal on Internet of Things","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121123827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review about Wireless Sensor Networks and the Internet of Things","authors":"Amar Singh","doi":"10.32604/jiot.2022.026170","DOIUrl":"https://doi.org/10.32604/jiot.2022.026170","url":null,"abstract":"","PeriodicalId":345256,"journal":{"name":"Journal on Internet of Things","volume":"44 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115068340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Signature-Based Intrusion Detection System in Wireless 6G IoT Networks","authors":"Mansoor Farooq, Mubashir Hassan Khan","doi":"10.32604/jiot.2022.039271","DOIUrl":"https://doi.org/10.32604/jiot.2022.039271","url":null,"abstract":".","PeriodicalId":345256,"journal":{"name":"Journal on Internet of Things","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115111239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}