Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (48)
  • Open Access

    ARTICLE

    HDAM: Heuristic Difference Attention Module for Convolutional Neural Networks

    Yu Xue*, Ziming Yuan

    Journal on Internet of Things, Vol.4, No.1, pp. 57-67, 2022, DOI:10.32604/jiot.2022.025327

    Abstract The attention mechanism is one of the most important priori knowledge to enhance convolutional neural networks. Most attention mechanisms are bound to the convolutional layer and use local or global contextual information to recalibrate the input. This is a popular attention strategy design method. Global contextual information helps the network to consider the overall distribution, while local contextual information is more general. The contextual information makes the network pay attention to the mean or maximum value of a particular receptive field. Different from the most attention mechanism, this article proposes a novel attention mechanism with the heuristic difference attention module… More >

  • Open Access

    ARTICLE

    Internet of Things for in Home Health Based Monitoring System: Modern Advances, Challenges and Future Directions

    Omer Iqbal*, Tayyeba Iftakhar, Saleem Zubair Ahmad

    Journal on Internet of Things, Vol.4, No.1, pp. 35-55, 2022, DOI:10.32604/jiot.2022.022256

    Abstract IOT has carried out important function in converting the traditional fitness care corporation. With developing call for in population, traditional healthcare structures have reached their outmost functionality in presenting sufficient and as plenty as mark offerings. The worldwide is handling devastating developing antique population disaster and the right want for assisted-dwelling environments is turning into inevitable for senior citizens. There furthermore a determination by means of the use of way of countrywide healthcare organizations to increase crucial manual for individualized, right blanketed care to prevent and manipulate excessive coronial situations. Many tech orientated packages related to Health Monitoring have been… More >

  • Open Access

    ARTICLE

    Lightweight Algorithm for MQTT Protocol to Enhance Power Consumption in Healthcare Environment

    Anwar D. Alhejaili*, Omar H. Alhazmi

    Journal on Internet of Things, Vol.4, No.1, pp. 21-33, 2022, DOI:10.32604/jiot.2022.019893

    Abstract Internet of things (IoT) is used in various fields such as smart cities, smart home, manufacturing industries, and healthcare. Its application in healthcare has many advantages and disadvantages. One of its most common protocols is Message Queue Telemetry Transport (MQTT). MQTT protocol works as a publisher/subscriber which is suitable for IoT devices with limited power. One of the drawbacks of MQTT is that it is easy to manipulate. The default security provided by MQTT during user authentication, through username and password, does not provide any type of data encryption, to ensure confidentiality or integrity. This paper focuses on the security… More >

  • Open Access

    ARTICLE

    FirmVulSeeker—BERT and Siamese Network-Based Vulnerability Search for Embedded Device Firmware Images

    Yingchao Yu*, Shuitao Gan, Xiaojun Qin

    Journal on Internet of Things, Vol.4, No.1, pp. 1-20, 2022, DOI:10.32604/jiot.2022.019469

    Abstract In recent years, with the development of the natural language processing (NLP) technologies, security analyst began to use NLP directly on assembly codes which were disassembled from binary executables in order to examine binary similarity, achieved great progress. However, we found that the existing frameworks often ignored the complex internal structure of instructions and didn’t fully consider the long-term dependencies of instructions. In this paper, we propose firmVulSeeker—a vulnerability search tool for embedded firmware images, based on BERT and Siamese network. It first builds a BERT MLM task to observe and learn the semantics of different instructions in their context… More >

  • Open Access

    RETRACTION

    Retraction Notice to: New Solution Generation Strategy to Improve Brain Storm Optimization Algorithm for Classification

    Yu Xue1,2,* and Yan Zhao1

    Journal on Internet of Things, Vol.3, No.4, pp. 183-183, 2021, DOI:10.32604/jiot.2021.021063

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Authentication in Wireless Body Area Network: Taxonomy and Open Challenges

    Abdullah M. Almuhaideb, Kawther S. Alqudaihi*

    Journal on Internet of Things, Vol.3, No.4, pp. 159-182, 2021, DOI:10.32604/jiot.2021.018088

    Abstract Wearable body area network (WBAN) aids the communication between the health providers and patients by supporting health monitoring services. It assists the users to maintain their health status records by collecting the body signals and transmitting them for further processing measurements. However, sensor data are publicly transferred through insecure network that facilitates the attacker malicious acts like performing masquerading attack, man in the middle, and snooping. Several authentication techniques were suggested to levitate the security of the communication channels to preserve the user data from exposure. Moreover, authentication schemes aid plenty of security issues related to user and data privacy,… More >

  • Open Access

    ARTICLE

    A Virtual Machine Placement Strategy Based on Virtual Machine Selection and Integration

    Denghui Zhang1,*, Guocai Yin2

    Journal on Internet of Things, Vol.3, No.4, pp. 149-157, 2021, DOI:10.32604/jiot.2021.016936

    Abstract Cloud data centers face the largest energy consumption. In order to save energy consumption in cloud data centers, cloud service providers adopt a virtual machine migration strategy. In this paper, we propose an efficient virtual machine placement strategy (VMP-SI) based on virtual machine selection and integration. Our proposed VMP-SI strategy divides the migration process into three phases: physical host state detection, virtual machine selection and virtual machine placement. The local regression robust (LRR) algorithm and minimum migration time (MMT) policy are individual used in the first and section phase, respectively. Then we design a virtual machine migration strategy that integrates… More >

  • Open Access

    ARTICLE

    Routing Protocol in Underwater Wireless Acoustic Communication Using Non Orthogonal Multiple Access

    J. V. Anand1, R. Praveena2,*, T. R. Ganesh Babu2

    Journal on Internet of Things, Vol.3, No.4, pp. 139-147, 2021, DOI:10.32604/jiot.2021.016747

    Abstract The underwater wireless communication with the complexity of attenuation and low propagation speed makes resource constraints in networking sensor nodes and sink. Underwater Sensor Transmission with Attenuation Calculation using Non Orthogonal Multiple Access (UWSTAC-NOMA) protocol has been proposed. This protocol calculates channel gain along with attenuation in underwater channels and provides internetworking sensor for rate allocation minimizing interference. Successive Interference Cancellation has been used at the receiving sensor to decode the information sent. The network level performance of sensors and increasing the data rate improves the overall throughput. Simultaneously, connecting several sensors to sink based on its depth region of… More >

  • Open Access

    ARTICLE

    Wearable Sensors and Internet of Things Integration to Track and Monitor Children Students with Chronic Diseases Using Arduino UNO

    Ali Abdulameer Aldujaili1, Mohammed Dauwed2, Ahmed Meri3,*

    Journal on Internet of Things, Vol.3, No.4, pp. 131-137, 2021, DOI:10.32604/jiot.2021.015994

    Abstract Parents concerns for their children who has a critical health conditions may limit the children movements and live to engage with others peers anytime and anywhere. Thus, in this study aims to propose a framework to help the children who has critical disease to have more activity and engagement with other peers. Additionally, reducing their parents’ concerns by providing monitoring and tracking system to their parents for their children health conditions. However, this study proposed a framework include tracking and monitoring wearable (TMW) device and decision system to alert healthcare providers and parents for any failure in the children health… More >

  • Open Access

    ARTICLE

    Security Attacks on the IoT Network with 5G Wireless Communication

    Ghada Sultan Aljumaie, Ghada Hisham Alzeer, Sultan S. Alshamrani*

    Journal on Internet of Things, Vol.3, No.3, pp. 119-130, 2021, DOI:10.32604/jiot.2021.015900

    Abstract The term Internet of Things has increased in popularity in recent years and has spread to be used in many applications around us, such as healthcare applications, smart homes and smart cities, IoT is a group of smart devices equipped with sensors that have the ability to calculate data, and carry out actions in the environment in which they are located, they are connected to each other through the Internet and recently it has become supported by 5G technology due to many advantages such as its ability to provide a fast connection, despite the efficiency of the IoT supported by… More >

Displaying 1-10 on page 1 of 48. Per Page  

Share Link

WeChat scan