A practical social relationship-based system for cooperative internet of things operation

Author(s):  
Yasser Gadallah ◽  
Mostafa el-Tager ◽  
Yehia Ismail
2018 ◽  
Vol 14 (1) ◽  
pp. 155014771875496 ◽  
Author(s):  
Dawei Wei ◽  
Huansheng Ning ◽  
Yuke Qian ◽  
Tao Zhu

To apply the algorithms in Internet of Things for physical world objects, the relationship between physical objects is becoming more and more complicated. As we know, social relationship is widely used in human world and social Internet of Things to solve the multiple object problems. Thus, a way via combining social relationship with physical object to solve the problem with a huge number of objects or complicated interactions among objects has been analyzed. This article proposes a new concept of “Physical Objects’ Social Relationship” for describing, managing, and predicting the relationships between physical objects in Internet of Things. The classification method for physical objects’ social relationships is proposed using the spatial-temporal attribute of social relationships. Moreover, the logical expression method for physical objects’ social relationships is discussed.


2019 ◽  
Vol 92 ◽  
pp. 972-986 ◽  
Author(s):  
Cai Fu ◽  
Chenchen Peng ◽  
Xiao-Yang Liu ◽  
Laurence T. Yang ◽  
Jia Yang ◽  
...  

2021 ◽  
Vol 15 (5) ◽  
pp. 748-761
Author(s):  
Yue Xu ◽  
Zhi Gang Chen ◽  
Jia Wu ◽  
Genghua Yu

2020 ◽  
Vol 6 (2) ◽  
pp. 47-52
Author(s):  
Mohammed Yunusa Jeddah ◽  
Auwal Adam Sa’ad ◽  
Adamu Abubakar

This paper sought after identifying some likely traps a Muslim might fall into because of the geometric improvement in the field of network connectivity, with a strict focus on Internet of Things (IoT). The principal aim was to reawaken the people (Muslims) on their sole purpose on this earth as they swim in the pool of development and ease of doing things brought about by this technology. A Muslim should remain focused, despite the lures of things around him. This technology is studied together with the obvious problems it has come with. Findings showed some scary deep black holes a Muslim may fall into without really knowing he is into rebellious acts against the dictates of his religion, Islam. Due to their vulnerability, the Internet of Things devices could be compromised and used in committing illegal acts against humanity. This study would declare that these devices are so vulnerable that they can be used in perpetrating things like identity theft, snooping (privacy violation) and different other forms of crimes which are obviously not in conformity with Islamic dictates. Furthermore, it would additionally assert that the Internet of Things is one of the technologies which carry along so much to worry about in terms of ethics, social relationship and by extension even religious concerns (as stated in this paper). It was also instituted that the producers of these devices are yet to discover (or make a proper attempt to) a convincing solution to this problem. These findings establish the accomplishment of the fact that Muslims should always study deeply and be skeptical and investigative towards utilizing each technology to the fullest without infringing on the rights of Allah.


2019 ◽  
Author(s):  
Yu Heng Kwan ◽  
Elenore Judy Uy ◽  
Dianne Carro Bautista ◽  
Xiaohui Xin ◽  
Yunshan Xiao ◽  
...  

2020 ◽  
pp. 1-12
Author(s):  
Zhang Caiqian ◽  
Zhang Xincheng

The existing stand-alone multimedia machines and online multimedia machines in the market have certain deficiencies, so they cannot meet the actual needs. Based on this, this research combines the actual needs to design and implement a multi-media system based on the Internet of Things and cloud service platform. Moreover, through in-depth research on the MQTT protocol, this study proposes a message encryption verification scheme for the MQTT protocol, which can solve the problem of low message security in the Internet of Things communication to a certain extent. In addition, through research on the fusion technology of the Internet of Things and artificial intelligence, this research designs scheme to provide a LightGBM intelligent prediction module interface, MQTT message middleware, device management system, intelligent prediction and push interface for the cloud platform. Finally, this research completes the design and implementation of the cloud platform and tests the function and performance of the built multimedia system database. The research results show that the multimedia database constructed in this paper has good performance.


Author(s):  
Uppuluri Sirisha ◽  
G. Lakshme Eswari

This paper briefly introduces Internet of Things(IOT) as a intellectual connectivity among the physical objects or devices which are gaining massive increase in the fields like efficiency, quality of life and business growth. IOT is a global network which is interconnecting around 46 million smart meters in U.S. alone with 1.1 billion data points per day[1]. The total installation base of IOT connecting devices would increase to 75.44 billion globally by 2025 with a increase in growth in business, productivity, government efficiency, lifestyle, etc., This paper familiarizes the serious concern such as effective security and privacy to ensure exact and accurate confidentiality, integrity, authentication access control among the devices.


Author(s):  
Shreya Joshi ◽  
Ms Bhavyaa ◽  
Suhani Gupta ◽  
Lalita Luthra

Blockchain is considered to be a disruptive core technology. Although many researchers have realized the importance of blockchain, but the research of it is still emerging. It is the record-keeping technology behind bitcoin and is one of the hottest and fastest growing skills in the IT sector today. It serves as an immutable ledger which allows transactions to take place in a decentralized man Blockchain-based applications are rising up, covering numerous fields including finance, healthcare, product management, Internet of Things (IoT), and many more. However, there are still some challenges of blockchain technology such as scalability and security problems which need to be overcome. This paper comprises of a comprehensive study of Blockchain technology. We have included here a deep dive into how blockchains work, its architecture, consensus and various applications. Furthermore, technical challenges are briefly listed.


Sign in / Sign up

Export Citation Format

Share Document