scholarly journals Virtual Assistant with Applications of IOT

Author(s):  
Vishesh Jakhar

Abstract: Man-made consciousness innovations are starting to be effectively utilized in human existence, this is worked with by the appearance and wide scattering of the Internet of Things (IOT). Independent gadgets are becoming more intelligent in their manner to communicate with both a human and themselves. New limits lead to making of different frameworks for mix of savvy things into Social Networks of the Internet of Things. One of the important patterns in man-made brainpower is the innovation of perceiving the normal language of a human. New experiences in this theme can prompt new method for normal humanmachine cooperation, in which the machine would figure out how to comprehend human's language, changing and connecting in it. One of such devices is voice associate, which can be incorporated into numerous other shrewd frameworks. In this workshop, the standards of the working of voice collaborators are depicted, its principle weaknesses and restrictions are given. The strategy for making a neighborhood voice colleague without utilizing cloud administrations is depicted, which permits to altogether grow the pertinence of such gadgets later on.

Sensors ◽  
2019 ◽  
Vol 19 (13) ◽  
pp. 2956 ◽  
Author(s):  
Paolo Lo Giudice ◽  
Antonino Nocera ◽  
Domenico Ursino ◽  
Luca Virgili

In the last years, several attempts to combine the Internet of Things (IoT) and social networking have been made. In the meantime, things involved in IoT are becoming increasingly sophisticated and intelligent, showing a behavior that tends to look like the one of users in social networks. Therefore, it is not out of place to talk about profiles of things and about information and topics exchanged among them. In such a context, constructing topic-driven virtual communities starting from the real ones operating in a Multi-IoT scenario is an extremely challenging issue. This paper aims at providing some contributions in this setting. First of all, it presents the concept of profile of a thing. Then, it introduces the concept of topic-guided virtual IoT. Finally, it illustrates two approaches (one supervised and one unsupervised) to constructing topic-guided virtual IoTs in a Multi-IoT scenario.


2017 ◽  
Vol 2017 ◽  
pp. 1-15 ◽  
Author(s):  
Zhen Qin ◽  
Jianfei Sun ◽  
Dajiang Chen ◽  
Hu Xiong

Online healthcare social networks (OHSNs) play an essential role in sharing information among medical experts and patients who are equipped with similar experiences. To access other patients’ data or experts’ diagnosis anywhere and anytime, it is necessary to integrate the OHSN into the Internet as part of the Internet of Things (IoT). Therefore, it is crucial to design an efficient and versatile access control scheme that can grant and revoke a user to access the OHSN. In this paper, we propose novel attribute-based encryption (ABE) features with user revocation and verifiable decryption outsourcing to control the access privilege of the users. The security of the proposed ABE scheme is given in the well-studied random oracle model. With the proposed ABE scheme, the malicious users can be excluded from the system and the user can offload most of the overhead in the decryption to an untrusted cloud server in a verifiable manner. An access control scheme for the OHSN has been given in the context of the IoT based on the proposed ABE scheme. The simulation demonstrates that our access control mechanism is practical.


2013 ◽  
Vol 380-384 ◽  
pp. 2431-2434
Author(s):  
Yang Yang ◽  
Xiao Wen ◽  
Peng Tang ◽  
Fang Yi Liu

With the development of the Internet of Things, collected data from the Internet of Things include more and more incomplete data because of the network fault or the sensing terminal breakdown. A lot of incomplete data do harm to the IoT application and decision. For filling the incomplete data in IoT effectively, this paper presents a new method based on power graph, which first uses the graph power to abstract the important attributes of the objects. Then the proposed method fills the important attributes using improved method based on similarity. Experimental results show the effectiveness of our method, especially for filling the massive incomplete data in IoT.


Sign in / Sign up

Export Citation Format

Share Document