مطالب مرتبط با کلیدواژه
۱.
۲.
۳.
۴.
۵.
۶.
۷.
۸.
۹.
۱۰.
۱۱.
۱۲.
۱۳.
۱۴.
۱۵.
۱۶.
۱۷.
۱۸.
۱۹.
۲۰.
Internet of Things
حوزه های تخصصی:
Nowadays, marketing researchers are constantly striving to identify consumer behavior and therefore to find appropriate solutions for better and more effective sales and increase market share. In this regard, the purpose of the present study is the role of customer clustering in designing a targeted marketing model. The research method is applied and exploratory. The statistical population of the study was in the qualitative part of sales and marketing managers of IoT companies who were selected by non-random sampling method and 15 people were interviewed. The quantitative part also included all the customers of the companies surveyed. Due to the unlimited population of Morgan Table 384 persons were selected as the sample size. Data gathering tool was interview and questionnaire, which were used to assess the validity of the questionnaire by the opinions of marketing experts and Cronbach's alpha reliability. Content analysis approach was used to analyze the data in the qualitative part and PLS2 software in the structural part. The results showed that the dimensions of the model in the four main clusters were communication factors, behavioral factors, individual factors, and economic factors. Model performance is very high performance.
Cluster Node Migration Oriented Holistic Trust Management Protocol for Ubiquitous and Pervasive IoT Network(مقاله علمی وزارت علوم)
حوزه های تخصصی:
Smart applications with interconnected intelligent devices for sharing services arise serious security problems to the stability of this IoT complex and heterogeneous environment. Unless security considerations are analyzed and implemented properly in real time then IoT cannot be perceived as a pervasive network for the possible stakeholders. Current state of the art has analyzed trust-based security solutions as additional feature to application layer of the system which can identify and filter out the malicious nodes. In this paper we are proposing holistic trust management with edge computing mechanism to create trustworthy zones comprising different clusters, where Gateway on behalf of clusters will initiate migration of their nodes if falls below the defined Zone trust threshold level. The created zones are self-resilient against any malicious attacks and saves lots processing usage time and energy to address the security issues. By analyzing our proposed algorithm with other contemporary approaches to handle IoT security issues using trust mechanism, this approach is more precise in terms of protecting system against incurring malicious behavior, and also prolong the application operation duration by reducing communication and processing overhead.
Big Data Analytics and Management in Internet of Things(مقاله علمی وزارت علوم)
حوزه های تخصصی:
The Special Issue of the Journal of Information Technology Management (JITM) is publishing very selective papers on information management, Internet of Things (IoT), Algorithms, Quality of Service (QoS),Tourists Perception , Technology in higher education, integrated systems, enterprise management, Self-Service Technology (SST) , cultural thoughts, strategic contributions, management information systems, and cloud computing. We received numerous papers for this special issue but after an extensive peer-review process, eight papers were finally selected for publication. In the digital age, the management of electronic archives became a trend as well as the focus of management development in many institutions.
Designing an Ethical Targeted Marketing Model by Identifying Factors Affecting Customer Clustering(مقاله علمی وزارت علوم)
Background: The purpose of this study is to investigate the role of customer clustering in the design of an ethical and targeted marketing model in Internet of Things (IOT) Technology Services Companies. Method : The research method is applied, exploratory and mixed (qualitative-quantitative). Qualitative section: 15 people of sales and marketing managers of IOT companies, were selected for in-depth interviews by targeted and snowballs methods. In this phase used entropy and VIKOR decision-making techniques. The software used in this phase was Max QDE. Quantitative section : In this phase, all the customers of the studied companies were included, and due to the unlimited nature of the society with Morgan's table, 384 people were selected as the sample size by non-random and available methods. The data collection tool in this section was questionnaire, which used Cronbach's alpha to examine the validity of the questionnaire. In order to analyze the data, the exploratory factor analysis method and Partial least squares structural equation modeling (PLS-SEM) with Smart-PLS2 and Liserl software were used. Results : Qualitative section: In this phase, four clusters were identified: communication factors, ethical and behavioral factors, individual factors and economic factors Quantitative section : In this phase, the model obtained in the first phase was quantitatively examined and validated and approved . Conclusion : The results showed that four main clusters: communication factors, ethical and behavioral factors, individual factors and economic factors are dimensions of targeted marketing and customers are classified according to their characteristics. So, these companies should pay attention to these items as methods for sales promotion.
Conceptual Modeling of the Internet of Things Implementation in Hospitals Supply Chain(مقاله علمی وزارت علوم)
حوزه های تخصصی:
Given the complexities of supply chain networks, the firms consider modern technologies as a potential factor to improve their supply chain performances. One of these technologies is the Internet of Things (IoT). Hence, the main purpose of this study has been to achieve the conceptual model of the IoT implementation in hospital supply chains. Considering the qualitative nature of the study, relevant articles were specified through library research and collecting the related literature. The outputs obtained were analyzed using the meta-synthesis method and the grounded theory. Then the selected articles were extracted and the grounded theory was used to obtain the conceptual model of the IoT implementation in hospital supply chains. The research results indicated that the model featured 7 main categories, 19 subcategories and 86 codes. The results present a conceptual model for the implementation of the IoT in hospital supply chains including an explanation of the main research category, drivers, prerequisites and enablers, environmental and contextual conditions, challenges, technology implementation strategies, and results and outcomes.
IoT-Based Services in Banking Industry Using a Business Continuity Management Approach(مقاله علمی وزارت علوم)
حوزه های تخصصی:
Background: The Internet of things (IoT) is a new technology that expanding rapidly and has led to the emergence of new services in the banking industry. Although IoT is an emerging technology in Iran, it is expected to become a paradigm in the future. IoT applications in banking have helped to provide high quality and fast responses to customers anytime, anywhere. Purpose: This research aims to identify and prioritize IoT applications in the Iranian banking industry based on business continuity indicators. Methods: First, based on the comprehensive literature review and practical experiences, IoT applications in the banking industry are identified. Then, each indicator's weight was calculated using the Grey Decision-making trial and evaluation laboratory (DEMATEL). Finally, IoT-based applications in the Iranian banking industry have prioritized using the multi-attribute utility theory (MAUT). Due to the unstable economic conditions for the financial sector, business continuity indicators are employed in this study. Also, the reason for using MAUT is to consider the utility of banking experts for performing IoT banking services. Findings: According to results, IoT-based services in the banking industry, including Transmit instant reports, smart ATMs, non-contact electronic payments, and electronic checks, are identified for Iranian banks. Then, These appropriate services are prioritized with the capabilities of Iranian banks.
A QoS Aware Multi-Cloud Service Composition Algorithm(مقاله علمی وزارت علوم)
Devices that are connected on the internet and are exchanging data with internet brokers to receive requested services are a significant part of internet users. In order to manage and account well to IoT requests maximum processing power, speed in data transfer, and proper combining services in minimum time is needed. Since there is a large number of IoT devices which have a large scale, we have to use the abilities and services of cloud environment in order to solve its problems. So, service composition in a cloud environment is paid attention recently. We want to suggest an algorithm with the approach in this research, of improving factors propounded in the service composition problem like the number of clouds involved in service, number of services examined before responding to users’ requests SP and load balance between clouds. In this paper, the factor, similarity measure, is introduced and used to find the best cloud and composition plan in each phase which in addition to improving QoS metrics propounded in previous papers, it caused improving QoS metric of load balancing between clouds, prevention of formation of a bottleneck in clouds entrance. These changes, besides the proper load balancing, have avoided the clouds stop working suddenly and satisfied the users by presenting the services faster.
Fuzzy Ontology with ANFIS Neural Network for Semantic Sensor Networks in Smart Homes based on Internet of Things(مقاله علمی وزارت علوم)
In this paper, a fuzzy ontology for Semantic Sensor Networks (SSN) is proposed for smart homes in two phases. In the first phase, using the WordNet ontology, the location and type of an object is identified with the aid of a graphical interface. This object and its synonyms are added to the list of the known objects set. Succeeding, the relation of the object with other groups is assessed based on a similarity measure in addition to using the fuzzy ontology. In the second phase, sensors with erroneous information are identified and pruned by finding a relationship between some specific factors. To this end, temperature, moisture and light are considered and the Adaptive Neuro-Fuzzy Inference System (ANFIS) is incorporated. The proposed method is implemented using some parts of the Wikipedia database and the WordNet dictionary. The first phase of the proposed method is tested with several sample requests and the system shows favorable results on finding the original group (and other related groups) of the request. For training the neural network in the second phase, the Intel lab Dataset is used. Results of this phase show that the neural network can predict the temperature and moisture factors with low error, while the light factor has more error in prediction
Biometric Based User Authentication Protocol in Smart Homes(مقاله علمی وزارت علوم)
The smart home is an important Internet of Things applications. Due to the smartphones development, expansion of their network, and growing the data transfer rate, security in personal life has become a dramatic challenge. Therefore, it is essential to secure such a system to create a sense of relaxation in the lives of users and homeowners to deal with possible occurrences. The integration of technologies for the automation of home affairs with the Internet of things means that all physical objects can be accessed on cyberspace; therefore, the concerns raised by users about the lack of privacy and security are serious arguments that science and technology should answer. Therefore, addressing security issues is a crucial necessity for the development of the smart homes. Although authentication protocols have been proposed based on smart cards for multi-server architectures, their schemes cannot protect the system against stolen smart cards and dictionary attacks in the login phase and do not satisfy perfect forward secrecy. To overcome these limitations, this paper proposes an anonymous, secure protocol in connected smart home environments, using solely lightweight operations. The proposed protocol in this paper provides efficient authentication, key agreement, and enables the anonymity of devices and unlinkability. It is demonstrated that the computation complexity of the protocol is low as compared to the existing schemes, while security has been significantly improved. This protocol ensures that even if the stakeholder’s device or the IoT device is attacked, they are robust against them.
Presenting a Model for the use of the Internet of Things in the Iranian Knowledge-based Companies(مقاله علمی وزارت علوم)
حوزه های تخصصی:
The purpose of the present study is to present a model for the use of the Internet of Things in Iranian knowledge-based companies. From a purpose point of view, this research can be classified as applied research and in terms of data collection, it can be categorized as a qualitative and quantitative study. The main approach for achieving the model of using the Internet of Things is the grounded theory methodology which is based on a paradigmatic model. The research population for the qualitative phase is comprised of 25 executives and practitioners of knowledge-based companies who are somehow specialized in Internet of Things topics. The sample of this study was selected using the snowball sampling method and Cochran's formula for finite communities among all the managers and technology experts working in knowledge-based companies. After careful analysis of the interviews, 59 extracted concepts were identified in 5 main categories and 13 subcategories. Management requirements, customer requirements, and resistance economics give rise to the Internet of Things in knowledge-based companies. The characteristics of the company, the characteristics of the human resources and the characteristics of the managers can provide a suitable ground for using the Internet of Things. And the conditions in the country, international pressures and international cooperation can be among the intermediary factors influencing the use of the Internet of Things. Raw materials and infrastructure can also be effective strategies for using the Internet of Things. Using the Internet of Things, customer-related factors, international collaborations, and expected results can be expected in knowledge-based companies.
Geographic Routing Scheme for Resource and Communication Efficiency in the IoT Ecosystem using Swarm-Intelligence based BFO Algorithm(مقاله علمی وزارت علوم)
حوزه های تخصصی:
Wireless sensor networks (WSNs) are the sensor nodes that are generally interconnected and these nodes communicate wirelessly to collect the data from the environment around them. Sensor nodes are low-powered and distributed in a decentralized ADHOC manner. WSNs setup comes with some limitations such as energy constraints and the cooperative demands essential to perform multi-hop geographic routing for Internet of things (IoT) applications. Quality of Service (QoS) depends to a great extent on offering participating nodes an incentive for collaborating. The real-time applications of WSNs have potential design limitations such as energy and other QoS constraints in the context of IoT. This work formulates two different re-transmission strategies for optimized cross-layer design and also integrates the framework with a swarm intelligence technique assisted Bacteria Foraging Optimization (BFO) for efficient Cluster Head (CH) selection. The proposed work designs analytical modelling to realize the formulated concept and also simulates the computational design in a numerical computing tool. Finally, an extensive simulation is carried out using the MATLAB simulation tool. The obtained results show the effectiveness of the proposed system in terms of delay is reduced by 12%, throughput is increased to 10%, remaining energy of the network is increased to 11%, and packet delivery ratio of the proposed work in increased to 7-9% in comparison with the existing system.
STCP: A Novel Approach for Congestion Control in IoT Environment(مقاله علمی وزارت علوم)
حوزه های تخصصی:
The main idea of IoT is to connect several objects to each other through Internet. In the field of Computer Network the main problem identified by researchers is network congestion. Now a day’s network congestion is increasing very rapidly because IoT connect a huge number of devices to internet. A transport layer protocol TCP (Transmission Control Protocol) is accountable for network congestion control. The behavior of TCP is not stable as it takes long time to fill the available capacity of the network. It also continuously keeps assessing the capacity of data transmission through increasing the limits.TCP drops its data transmission rate aggressively when packets are dropped, which significantly reduces the throughput. This paper suggests a new approach, stable transmission control protocol for IoT applications. The experimental results show that stable transmission control protocol achieves better performance in terms of goodput.
Q-Learning Enabled Green Communication in Internet of Things(مقاله علمی وزارت علوم)
منبع:
Journal of Information Technology Management , Volume ۱۴, Security and Resource Management challenges for Internet of Things, ۲۰۲۲
103 - 117
حوزه های تخصصی:
Limited energy capacity, physical distance between two nodes and the stochastic link quality are the major parameters in the selection of routing path in the internet of things network. To alleviate the problem of stochastic link quality as channel gain reinforcement based Q-learning energy balanced routing is presented in this paper. Using above mentioned parameter an optimization problem has been formulated termed as reward or utility of network. Further, formulated optimization problem converted into Markov decision problem (MDP) and their state, value, action and reward function are described. Finally, a QRL algorithm is presented and their time complexity is analyses. To show the effectiveness of proposed QRL algorithm extensive simulation is performed in terms of convergence property, energy consumption, residual energy and reward with respect to state-of-art-algorithms.
IOT Future Security Challenges and Recent Solutions(مقاله علمی وزارت علوم)
حوزه های تخصصی:
Internet of Things could be current paradigm, with promising recent wireless communication. Simultaneously as its will likely deliver compelling and effective arrangement, security of the gadgets and organization could be challenge issue. Therefore security has arisen as quite difficult for the IoT during this paper is expect to create security challenges of the IoT, structural design of IoT through handling security troubles at every layer of the design, key advancements in IoT and use of IoT.
جستاری بر گستره تعاریف اینترنت اشیاء در راستای ارائه یک تعریف جامع(مقاله علمی وزارت علوم)
حوزه های تخصصی:
به عنوان یک موضوع رو به رشد، تعریف رسمی و عمومی پذیرفته شده ای از اینترنت اشیاء وجود ندارد. مرور پژوهش های این حوزه نشان می دهد که هر پژوهشگر و سازمانی این فناوری را آنگونه که درک می نماید، تفسیر نموده است. در نتیجه، تا کنون ۱۱۶ تعریف از این فناوری نوظهور ارائه شده است. تحقیق حاضر تلاشی است در راستای شناخت و تسلط بیش از پیش بر تعریف اینترنت اشیاء که با روش مرور پیشینه و بررسی متون انجام شده است. همه تعاریف و توصیف های مربوط اما متنوع به هم ربط داده شد تا تعریفی تهیه شود که بتواند به عنوان مرجعی برای ذینفعانی که مایل به درک مفهوم اینترنت اشیاء هستند قرار گیرد. بررسی تعاریف ارائه شده در این حوزه نشان داد که بسیاری از آن ها دارای وجوه مشترک و مشابه هستند. در این مقاله، یک تعریف جامع از اینترنت اشیاء ارائه شده است که از تعاریف علمی ارائه شده در مقالات، کتب و وب سایت های سازمان های مختلف جهانی استخراج شده است. در نهایت، نگارندگان یک تعریف نسبتا جامع از اینترنت اشیاء ارائه داده اند که یک تعریف مطلق از معنای واقعی اصطلاح مورد بحث نیست، بلکه انتظار می رود به عنوان بخشی از تحقیق و توسعه ی آن در جهت معناداریِ واضح تر این اصطلاح مورد استفاده قرار گیرد. این پژوهش نگاه جامعی به تعاریف ارائه شده در گستره اینترنت اشیاء دارد و می تواند برای علاقه مندانی که به تازگی وارد حوزه اینترنت اشیاء شده اند و یا محققانی که خواستار تعمیق بیشتری در این رابطه هستند، مفید واقع گردد.
A Hybrid Method for Intrusion Detection in the IOT(مقاله علمی وزارت علوم)
In computer networks, introducing an intrusion detection system with high precision and accuracy is considered vital. In this article, a proposed model using a deep learning algorithm is presented and its results are analyzed. To evaluate the performance of this algorithm, NSL-KDD, CIC-IDS 2018, UNSW-NB15 and MQTT datasets have been used. The evaluation criteria include precision, accuracy, F1 score, and, readability. The new approach uses a hybrid algorithm that includes a convolutional neural network (CNN) to extract general features and long-short-term memory (LSTM) to extract periodic features that are in the form of a layer. are cross-connected, it is introduced to detect penetration. This algorithm showed the highest known accuracy of 99% on the NSL-KDD dataset. It has reached 97% in all criteria in UNSW-NB15, 96% in all criteria in CIC-IDS 2018, and also, in MQTT for three abstraction levels of features, i.e. packet-based flow features, unidirectional flow, and The two-way flow has reached above 97%, which shows the superiority of this algorithm.
Energy-Efficient and Reliable Deployment of IoT Applications in a Fog Infrastructure Based on Enhanced Water Strider Algorithm(مقاله علمی وزارت علوم)
حوزه های تخصصی:
Fog computing is considered a promising solution to minimize processing and networking demands of the Internet of things (IoT) devices. In this work, a model based on the energy consumption evaluation criteria is provided to address the deployment issue in fog computing. Numerous factors, including processing loads, communication protocols, the distance between each connection of fog nodes, and the amount of traffic that is exchanged, all have an impact on the re-search system's overall energy consumption. The power consumption for implementing each com-ponent on the fog node as well as the power consumption for information exchange between the fog nodes are taken into account when calculating each fog node's energy use. Each fog node's energy consumption is closely correlated to how its resources are used, and as a result, to the average normalized resource utilization of a fog node. When the dependent components are spread across two distinct fog nodes, the transfer energy is taken into account in the computations. The sum of the energy used for transmission and the energy used for computational resources is the entire amount of energy consumed by a fog node. The goal is to reduce the energy consumption of the fog network while deploying components using a novel metaheuristic method. Therefore, this work presents an enhanced water strider algorithm (EWSA) to address the problem of deploying application components with minimum energy consumption. Simulation experiments with two scenarios have been conducted based on the proposed EWSA algorithm. The results show that the EWSA algorithm achieved better performance with 0.01364 and 0.01004 optimal energy consumption rates.
Comparative Study of Data Transfer in SDN Network Architecture in IoT(مقاله علمی وزارت علوم)
The Internet of Things (IoT) has gained significant attention in recent years, with the proliferation of connected devices and the need for efficient data transfer in IoT networks. Software-Defined Networking (SDN) has emerged as a promising solution to address the challenges of network management and optimization in IoT environments. This paper presents a comparative study of data transfer in SDN network architecture in IoT, focusing on the benefits, challenges, and future perspectives of integrating SDN and IoT. Given the crucial role of security in IoT, this paper seeks to access a secure architecture for computer networks to provide a solution for security challenges. To achieve this, a comparative analysis of two SDN architectures is conducted in this research. We have utilized the Miniedit software, which serves as a laboratory for software-defined networks, to implement and simulate these SDN architectures. The results of this study are based on a comparison of the two secure architectures using DITG tables. This comparative study offers valuable insights into the integration of SDN in IoT network architecture and its influence on data transfer.
The Influence of Predictive Maintenance Technologies on Operational Efficiency in Manufacturing Startups
حوزه های تخصصی:
The objective of this study is to explore the influence of predictive maintenance technologies on operational efficiency in manufacturing startups, focusing on implementation processes, operational impacts, and the challenges encountered. This qualitative study employed semi-structured interviews to gather data from key stakeholders in manufacturing startups, including founders, operations managers, and maintenance engineers. A total of 22 participants were interviewed, with the sample size determined by theoretical saturation. The interviews were transcribed verbatim and analyzed using NVivo software. Thematic analysis was conducted to identify and categorize key themes and subthemes related to the implementation and impact of predictive maintenance technologies. The analysis revealed three main themes: Implementation Process, Operational Impact, and Challenges and Barriers. Within these themes, several categories and concepts emerged. The Implementation Process theme highlighted the importance of planning, technology selection, system integration, employee involvement, pilot testing, change management, and post-implementation review. The Operational Impact theme identified efficiency gains, predictive analytics, maintenance scheduling, resource optimization, and quality improvement as significant outcomes. The Challenges and Barriers theme underscored technological challenges, financial constraints, organizational resistance, skill gaps, data management issues, and the necessity of vendor support. The findings indicate that predictive maintenance technologies significantly enhance operational efficiency in manufacturing startups by reducing downtime, increasing productivity, and optimizing resource utilization.
Investigating the Impact of Internet of Things and Artificial Intelligence on Environmental Sustainability Performance (Case Study: Hotel Industry)(مقاله علمی وزارت علوم)
حوزه های تخصصی:
Artificial intelligence enhances energy infrastructure efficiency, reduces waste in distributed energy systems, and ensures long-term durability. Additionally, green Internet of Things technology is positively linked to green innovation practices promoting sustainability. In this context, the primary objective of this study is to examine the impact of the Internet of Things and artificial intelligence on environmental sustainability performance, considering the mediating influence of green supply chain management within the hotel industry. This study is designed as applied research, and the data collection method is descriptive and correlational. The statistical population comprises hotel managers in Urmia City, with a sample size of 34 hotels determined using "Krejcie and Morgan" and "Cohen" tables. Sixty-four questionnaires were distributed among hotel managers in Urmia City. A standard questionnaire, validated by experts, was used to collect data. Its reliability was estimated using Cronbach's alpha coefficient. Structural equation modeling was used for data analysis, revealing that the Internet of Things and artificial intelligence positively impact green supply chain management. Furthermore, a positive relationship was observed between green supply chain management practices and environmental sustainability performance. This study suggests that adopting the Internet of Things and artificial intelligence technologies can enhance the efficiency of green supply chain management processes, emphasizing the importance for managers to grasp the impact of these two emerging technologies on overall supply chain performance.