ISSN:2579-0099(print)
ISSN:2579-0080(online)
Publication Frequency:Continuously
This Journal publishes papers related to all aspects of Internet of Things, from latest advance to review articles. Articles explore IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Investigations related to topical areas of research are especially encouraged, including IoT demands, impacts, and implications on sensors technologies, big data management, and future design for various IoT use cases, such as smart cities, smart environment, smart homes, etc.
Starting from July 2023, Journal on Internet of Things will transition to a continuous publication model, accepted articles will be promptly published online upon completion of the peer review and production processes.
Open Access
ARTICLE
Journal on Internet of Things, Vol.6, pp. 1-16, 2024, DOI:10.32604/jiot.2024.053584
Abstract With the rapid development of electric vehicles, the requirements for charging stations are getting higher and higher. In this study, we constructed a charging station topology network in Nanjing through the Space-L method, mapping charging stations as network nodes and constructing edges through road relationships. The experiment introduced five EV charging recommendation strategies (based on distance, number of fast charging piles, user preference, price, and overall rating) used to simulate disordered charging caused by different user preferences, and the impact of the network dynamic robustness in case of node failure is explored by simulating the… More >
Open Access
ARTICLE
Journal on Internet of Things, Vol.4, No.1, pp. 21-33, 2022, DOI:10.32604/jiot.2022.019893
Abstract Internet of things (IoT) is used in various fields such as smart cities, smart home, manufacturing industries, and healthcare. Its application in healthcare has many advantages and disadvantages. One of its most common protocols is Message Queue Telemetry Transport (MQTT). MQTT protocol works as a publisher/subscriber which is suitable for IoT devices with limited power. One of the drawbacks of MQTT is that it is easy to manipulate. The default security provided by MQTT during user authentication, through username and password, does not provide any type of data encryption, to ensure confidentiality or integrity. This… More >
Open Access
ARTICLE
Journal on Internet of Things, Vol.4, No.1, pp. 35-55, 2022, DOI:10.32604/jiot.2022.022256
Abstract IOT has carried out important function in converting the traditional fitness care corporation. With developing call for in population, traditional healthcare structures have reached their outmost functionality in presenting sufficient and as plenty as mark offerings. The worldwide is handling devastating developing antique population disaster and the right want for assisted-dwelling environments is turning into inevitable for senior citizens. There furthermore a determination by means of the use of way of countrywide healthcare organizations to increase crucial manual for individualized, right blanketed care to prevent and manipulate excessive coronial situations. Many tech orientated packages related… More >
Open Access
ARTICLE
Journal on Internet of Things, Vol.4, No.1, pp. 57-67, 2022, DOI:10.32604/jiot.2022.025327
Abstract The attention mechanism is one of the most important priori knowledge to enhance convolutional neural networks. Most attention mechanisms are bound to the convolutional layer and use local or global contextual information to recalibrate the input. This is a popular attention strategy design method. Global contextual information helps the network to consider the overall distribution, while local contextual information is more general. The contextual information makes the network pay attention to the mean or maximum value of a particular receptive field. Different from the most attention mechanism, this article proposes a novel attention mechanism with… More >
Open Access
ARTICLE
Journal on Internet of Things, Vol.4, No.1, pp. 1-20, 2022, DOI:10.32604/jiot.2022.019469
Abstract In recent years, with the development of the natural language processing (NLP) technologies, security analyst began to use NLP directly on assembly codes which were disassembled from binary executables in order to examine binary similarity, achieved great progress. However, we found that the existing frameworks often ignored the complex internal structure of instructions and didn’t fully consider the long-term dependencies of instructions. In this paper, we propose firmVulSeeker—a vulnerability search tool for embedded firmware images, based on BERT and Siamese network. It first builds a BERT MLM task to observe and learn the semantics of… More >
Open Access
ARTICLE
Journal on Internet of Things, Vol.4, No.2, pp. 75-84, 2022, DOI:10.32604/jiot.2022.030610
Abstract Marketing is a very important part of an enterprise. A rational and scientific marketing management can not only reduce the cost of enterprise sales, but also greatly improve the competitiveness of enterprises. The purpose of this paper is to study the innovative application of enterprise marketing management based on the Internet of Things technology. The most suitable competitive strategy of the company is put forward as the centralized strategy. And put forward the clear strategy implementation details, introduced the current situation and history of the Internet of things, and combined with the development status, put… More >
Open Access
REVIEW
Journal on Internet of Things, Vol.4, No.2, pp. 69-73, 2022, DOI:10.32604/jiot.2022.026170
Abstract Wireless sensor networks (WSNs) are created and affect our daily lives. You can find applications in various fields such as health, accident, life, manufacturing, production management, network management and many other fields. WSN now connects to the Internet of Things, connects the sensor to the Internet, and then uses it for collaboration and collaboration. However, when WSN is part of the internet we need to be able to study and analyze related terms. In this article, we’re going to look at different ways to get WSN online and identify the challenges that address in future More >
Open Access
ARTICLE
Journal on Internet of Things, Vol.4, No.2, pp. 99-111, 2022, DOI:10.32604/jiot.2022.037416
Abstract Intrusion detection is a hot field in the direction of network security. Classical intrusion detection systems are usually based on supervised machine learning models. These offline-trained models usually have better performance in the initial stages of system construction. However, due to the diversity and rapid development of intrusion techniques, the trained models are often difficult to detect new attacks. In addition, very little noisy data in the training process often has a considerable impact on the performance of the intrusion detection system. This paper proposes an intrusion detection system based on active incremental learning with… More >
Open Access
ARTICLE
Journal on Internet of Things, Vol.4, No.3, pp. 127-140, 2022, DOI:10.32604/jiot.2022.037489
Abstract Internet of Things (IoT) technologies used in health have the potential to address systemic difficulties by offering tools for cost reduction while improving diagnostic and treatment efficiency. Numerous works on this subject focus on clarifying the constructs and interfaces between various components of an IoT platform, such as knowledge generation via smart sensors collecting biosignals from the human body and processing them via data mining and, in recent times, deep neural networks offered to host on cloud computing architecture. These approaches are intended to assist healthcare professionals in their daily activities. In this comparative research, More >
Open Access
ARTICLE
Journal on Internet of Things, Vol.4, No.2, pp. 85-98, 2022, DOI:10.32604/jiot.2022.031043
Abstract The development of modern air combat requires aircraft to have certain intelligent decision-making ability. In some of the existing solutions, the automatic control of aircraft is mostly composed of the upper mission decision and the lower control system. Although the underlying PID (Proportional Integral Derivative) based controller has a good performance in stable conditions, it lacks stability in complex environments. So, we need to design a new system for the problem of aircraft decision making. Studies have shown that the behavior of an aircraft can be viewed as a combination of several basic maneuvers. The More >
Open Access
ARTICLE
Journal on Internet of Things, Vol.5, pp. 45-55, 2023, DOI:10.32604/jiot.2023.043102
(This article belongs to the Special Issue: Monitoring of Smart Controlled Secure Applications using IoT and Deep Learning Techniques)
Abstract Farming has been the most prominent and fundamental activity for generations. As the population has been multiplying exponentially, the demand for agricultural yield is growing relentlessly. Such high demand in production through traditional farming methodologies often falls short in terms of efficiency due to the limitations of manual labour. In the era of digitization, smart agricultural solutions have been emerging through the windows of Internet of Things and Artificial Intelligence to improve resource management, optimize the process of farming and enhance the yield of crops, hence, ensuring sustainable growth of the increasing production. By implementing… More >
Open Access
ARTICLE
Journal on Internet of Things, Vol.1, No.1, pp. 25-31, 2019, DOI:10.32604/jiot.2019.05897
Abstract Forest fire prediction constitutes a significant component of forest management. Timely and accurate forest fire prediction will greatly reduce property and natural losses. A quick method to estimate forest fire hazard levels through known climatic conditions could make an effective improvement in forest fire prediction. This paper presents a description and analysis of a forest fire prediction methods based on machine learning, which adopts WSN (Wireless Sensor Networks) technology and perceptron algorithms to provide a reliable and rapid detection of potential forest fire. Weather data are gathered by sensors, and then forwarded to the server, More >
Open Access
ARTICLE
Journal on Internet of Things, Vol.1, No.1, pp. 1-7, 2019, DOI:10.32604/jiot.2019.05804
Abstract As the development of smart grid and energy internet, this leads to a significant increase in the amount of data transmitted in real time. Due to the mismatch with communication networks that were not designed to carry high-speed and real time data, data losses and data quality degradation may happen constantly. For this problem, according to the strong spatial and temporal correlation of electricity data which is generated by human’s actions and feelings, we build a low-rank electricity data matrix where the row is time and the column is user. Inspired by matrix decomposition, we More >
Open Access
ARTICLE
Journal on Internet of Things, Vol.2, No.4, pp. 145-162, 2020, DOI:10.32604/jiot.2020.010035
Abstract With the rapid development and widespread application of the IoT,
the at-tacks against IoT vulnerabilities have become more complex and diverse.
Most of the previous research focused on node vulnerability and its risk analysis.
There is little information available about the importance of the location of the
node in the system. Therefore, an estimation mechanism is proposed to assess the
key node of the IoT system. The estimation of the key node includes two parts:
one is the utilization relationship between nodes, and the other is the impact on
the system after the node is… More >
Open Access
ARTICLE
Journal on Internet of Things, Vol.1, No.1, pp. 33-39, 2019, DOI:10.32604/jiot.2019.05898
Abstract With the rapid development of E-commerce and E-government, there are so many electronic records have been produced. The increasing number of electronic records brings about storage difficulties, the traditional electronic records center is difficult to cope with the current fast growth requirements of electronic records storage and management. Therefore, it is imperative to use cloud storage technology to build electronic record centers. However, electronic records also have weaknesses in the cloud storage environment, and one of them is that once electronic record owners or managers lose physical control of them, the electronic records are more More >
Open Access
ARTICLE
Journal on Internet of Things, Vol.1, No.2, pp. 41-53, 2019, DOI:10.32604/jiot.2019.07231
Abstract The symbolic network adds the emotional information of the relationship, that is, the “+” and “-” information of the edge, which greatly enhances the modeling ability and has wide application in many fields. Weak unbalance is an important indicator to measure the network tension. This paper starts from the weak structural equilibrium theorem, and integrates the work of predecessors, and proposes the weak unbalanced algorithm EAWSB based on evolutionary algorithm. Experiments on the large symbolic networks Epinions, Slashdot and WikiElections show the effectiveness and efficiency of the proposed method. In EAWSB, this paper proposes a More >
Open Access
ARTICLE
Journal on Internet of Things, Vol.1, No.2, pp. 77-88, 2019, DOI:10.32604/jiot.2019.05941
Abstract The problem of influence maximization in the social network G is to find k seed nodes with the maximum influence. The seed set S has a wider range of influence in the social network G than other same-size node sets. The influence of a node is usually established by using the IC model (Independent Cascade model) with a considerable amount of Monte Carlo simulations used to approximate the influence of the node. In addition, an approximate effect (1-1/e) is obtained, when the number of Monte Carlo simulations is 10000 and the probability of propagation is More >
Open Access
ARTICLE
Journal on Internet of Things, Vol.2, No.1, pp. 1-11, 2020, DOI:10.32604/jiot.2020.09071
Abstract In recent years, image restoration has become a huge subject, and
finite hybrid model has been widely used in image denoising because of its easy
modeling and strong explanatory results. The gaussian mixture model is the most
common one. The existing image denoising methods usually assume that each
component of the natural image is subject to the gaussian mixture model (GMM).
However, this approach is not entirely reasonable. It is well known that most
natural images are complex and their distribution is not entirely gaussian. As a
result, there are still many problems that GMM More >
Open Access
ARTICLE
Journal on Internet of Things, Vol.2, No.1, pp. 13-21, 2020, DOI:10.32604/jiot.2020.09073
Abstract Nonlocal property is an important feature of natural images, which
means that the patch matrix formed by similar image patches is low-rank.
Meanwhile, learning good image priors is of great importance for image
denoising. In this paper, we combine the image self-similarity with EPLL
(Expected patch log likelihood) method, and propose an EPLL denoising model
based on internal and external image similarity to improve the preservation of
image details. The experiment results show that the validity of our method is
proved from two aspects of visual and numerical results. More >
Open Access
ARTICLE
Journal on Internet of Things, Vol.2, No.1, pp. 37-45, 2020, DOI:10.32604/jiot.2020.09116
Abstract Compressive sensing theory mainly includes the sparsely of signal
processing, the structure of the measurement matrix and reconstruction
algorithm. Reconstruction algorithm is the core content of CS theory, that is,
through the low dimensional sparse signal recovers the original signal accurately.
This thesis based on the theory of CS to study further on seismic data
reconstruction algorithm. We select orthogonal matching pursuit algorithm as a
base reconstruction algorithm. Then do the specific research for the
implementation principle, the structure of the algorithm of AOMP and make the
signal simulation at the same time. In view… More >
Open Access
ARTICLE
Journal on Internet of Things, Vol.2, No.2, pp. 65-73, 2020, DOI:10.32604/jiot.2020.09868
Abstract User portrait has been a booming concept in big data industry in
recent years which is a direct way to restore users’ information. When it talks
about user portrait, it will be connected with precise marketing and operating.
However, there are more ways which can reflect the good use of user portrait.
Commercial use is the most acceptable use but it also can be used in different
industries widely. The goal of this paper is forecasting gender by user portrait
and making it useful in transportation safety. It can extract the information from
people who More >