scholarly journals Cross-Modal Travel Route Recommendation Algorithm Based on Internet of Things Awareness

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Yuran Zhang ◽  
Ziyan Tang

In recent years, the Internet of Things has developed rapidly in people’s lives. This brand-new technology is flooding people’s lives and widely used in many fields, such as medical field, science and technology field, and industry and agriculture field. As a modern technology, the Internet of Things has many characteristics of low power consumption and multifunction, and it also has the characteristics of data-aware computing. This is the characteristic of this new product. In people’s daily life, the Internet of Things is also closely related to people’s daily life. In the tourism industry, the Internet of Things can make the best use of everything and give full play to its various advantages as much as possible. The Internet of Things can perceive cross-modal tourism routes. So here, this paper summarizes various algorithms recommended by the Internet of Things for this tourist route and works out the experimental data methods of these algorithms for cross-modal tourism route recommendation. The proposed algorithm is verified by data simulation, compared with related algorithms. We analyze and summarize the simulation results. At present, there is no comparative analysis of the performance of ant colony algorithm, genetic algorithm, and its optimization algorithm in tourism route recommendation. On the basis of crawling the tourism data in the Internet, this paper applies ant colony algorithm, genetic algorithm, max–min optimization ant colony algorithm, and hybrid ant colony algorithm based on greedy solution to tourism route recommendation and evaluates and compares the algorithms from three aspects: average evaluation score, optimal evaluation score, and algorithm time. Experimental results show that the max–min optimization ant colony algorithm and the hybrid ant colony algorithm based on greedy solution can be effectively applied to automated tourist route recommendation.

2013 ◽  
Vol 753-755 ◽  
pp. 2845-2848
Author(s):  
Ke Wang Huang

The paper focuses on improved ant colony algorithm using in design of the internet of things storage and mailbox system. The improved ant colony algorithm solves the problems of the location of the storage mailbox mounting and user selection of optimal delivery.


2015 ◽  
Vol 2015 ◽  
pp. 1-16 ◽  
Author(s):  
Jun Huang ◽  
Liqian Xu ◽  
Cong-cong Xing ◽  
Qiang Duan

The design of wireless sensor networks (WSNs) in the Internet of Things (IoT) faces many new challenges that must be addressed through an optimization of multiple design objectives. Therefore, multiobjective optimization is an important research topic in this field. In this paper, we develop a new efficient multiobjective optimization algorithm based on the chaotic ant swarm (CAS). Unlike the ant colony optimization (ACO) algorithm, CAS takes advantage of both the chaotic behavior of a single ant and the self-organization behavior of the ant colony. We first describe the CAS and its nonlinear dynamic model and then extend it to a multiobjective optimizer. Specifically, we first adopt the concepts of “nondominated sorting” and “crowding distance” to allow the algorithm to obtain the true or near optimum. Next, we redefine the rule of “neighbor” selection for each individual (ant) to enable the algorithm to converge and to distribute the solutions evenly. Also, we collect the current best individuals within each generation and employ the “archive-based” approach to expedite the convergence of the algorithm. The numerical experiments show that the proposed algorithm outperforms two leading algorithms on most well-known test instances in terms of Generational Distance, Error Ratio, and Spacing.


Author(s):  
Varsha Sharma ◽  
Vivek Sharma ◽  
Nishchol Mishra

Recently, Internet of Things (IoT) has aroused great interest among the educational, scientific research, and industrial communities. Researchers affirm that IoT environments will make people's daily life easier and will lead to superior services, great savings as well as a nifty use of resources. Consequently, IoT merchandise and services will grow exponentially in the upcoming years. The basic idea of IoT is to connect physical objects to the Internet and use that connection to provide some kind of useful remote monitoring or control of those objects. The chapter presents the overall IoT vision, the technologies for achieving it, IoT challenges and its applications. This chapter also attempts to describe and analyze threat types for privacy, security and trust in IoT as well as shows how big data is an important factor in IoT. This chapter will expose the readers and researchers who are interested in exploring and implementing the IoT and related technologies to the progress towards the bright future of the Internet of Things


Due to the technology of IOT the human daily life services were became easier. With this technology the scalability will become very more to handle this kind of networks 6LOWPAN protocol was used, In this 6LOWPAn networks the RPL protocol was used to route the packets. The RPL protocol is constrain protocol particularly suits for the constrain node. Due to this constrain behavior this protocol may leads to many attacks. The attacks may be a black hole, wormhole, sinkhole etc. This paper was focused on Black hole attack. The black hole attack was simulated in the Contiki cooja simulator and proposed an detection approach based on the threshold value of each node in the network, to this black hole attack and the results was generated by using the contiki cooja simulator the results shows the effectiveness of the proposed technique in terms of the packet delivery rate, detection rate of attack.


Author(s):  
Sridarala Ramu ◽  
Daniel Osaku

IOT connected objects are new technologies used to connect objects to the internet and to users. The IOT influences our daily life in several fields such as logistics, health, energy, intelligent vehicles, the smart home or the smart city ... Subsequently, following the specific characteristics of the different areas of use, a multitude IOT applications have been developed and deployed using different IOT frameworks. An IOT framework is a set of rules, protocols and standards that simplify the implementation of IOT applications. The proper functioning and success of these applications depends on the characteristics of the framework, and also on the security mechanisms used. In this article, we will discuss the frameworks used by presenting the proposed architecture of each framework, the compatible hardwares and softwares and the security mechanisms used, then a comparative study of these frameworks will be presented. Finally, we will propose an architecture of a secure IOT framework.


2021 ◽  
pp. 1376-1385
Author(s):  
Hussein M. Burhan ◽  
Mustafa N. Abbas ◽  
Bara'a A. Attea

In the last few years, the Internet of Things (IoT) is gaining remarkable attention in both academic and industrial worlds. The main goal of the IoT is laying on describing everyday objects with different capabilities in an interconnected fashion to the Internet to share resources and to carry out the assigned tasks. Most of the IoT objects are heterogeneous in terms of the amount of energy, processing ability, memory storage, etc. However, one of the most important challenges facing the IoT networks is the energy-efficient task allocation. An efficient task allocation protocol in the IoT network should ensure the fair and efficient distribution of resources for all objects to collaborate dynamically with limited energy. The canonical definition for network lifetime in the IoT is to increase the period of cooperation between objects to carry out all the assigned tasks. The main contribution in this paper is to address the problem of task allocation in the IoT as an optimization problem with a lifetime-aware model. A genetic algorithm is proposed as a task allocation protocol. For the proposed algorithm, a problem-tailored individual representation and a modified uniform crossover are designed. Further, the individual initialization and perturbation operators (crossover and mutation) are designed so as to remedy the infeasibility of any solution located or reached by the proposed genetic algorithm. The results showed reasonable performance for the proposed genetic-based task allocation protocol. Further, the results prove the necessity for designing problem-specific operators instead of adopting the canonical counterparts.


2020 ◽  
Vol 14 (2) ◽  
pp. 185-195
Author(s):  
Ricardo Alirio González Bustamante ◽  
Roberto Ferro Escobar ◽  
Harold Vacca González

The use of the Internet has Reached a point in the world in Which it has Become essential in everyday life, the need to Have information at hand in the shortest possible time has generated a technological revolution That incurs the constant connection to this tool, from our Personal life to the same objects That we use in daily life, creating a need to check what surrounds us to Improve our quality of life, reason for the birth of the Internet of Things (IoT, for acronym in English), as well as the convergence of our environment through the creation with Technology of smart cities (Smart City in English). In view of the above, this article addresses concepts about the future of smart cities in collaboration with the Internet of things, the advantages and Disadvantages of these, their comparison, reception, adaptability.


Author(s):  
C. Y. Huang ◽  
C. H. Wu

The Internet of Things (IoT) is an infrastructure that interconnects uniquely-identifiable devices using the Internet. By interconnecting everyday appliances, various monitoring and physical mashup applications can be constructed to improve people’s daily life. However, IoT devices created by different manufacturers follow different proprietary protocols and cannot communicate with each other. This heterogeneity issue causes different products to be locked in multiple closed ecosystems that we call IoT silos. In order to address this issue, a common industrial solution is the hub approach, which implements connectors to communicate with IoT devices following different protocols. However, with the growing number of proprietary protocols proposed by device manufacturers, IoT hubs need to support and maintain a lot of customized connectors. Hence, we believe the ultimate solution to address the heterogeneity issue is to follow open and interoperable standard. Among the existing IoT standards, the Open Geospatial Consortium (OGC) SensorThings API standard supports comprehensive conceptual model and query functionalities. The first version of SensorThings API mainly focuses on connecting to IoT devices and sharing sensor observations online, which is the sensing capability. Besides the sensing capability, IoT devices could also be controlled via the Internet, which is the tasking capability. While the tasking capability was not included in the first version of the SensorThings API standard, this research aims on defining the tasking capability profile and integrates with the SensorThings API standard, which we call the extended-SensorThings API in this paper. In general, this research proposes a lightweight JSON-based web service description, the “Tasking Capability Description”, allowing device owners and manufacturers to describe different IoT device protocols. Through the extended- SensorThings API, users and applications can follow a coherent protocol to control IoT devices that use different communication protocols, which could consequently achieve the interoperable Internet of Things infrastructure.


Sign in / Sign up

Export Citation Format

Share Document