jiotOpen Access

Journal on Internet of Things

Publication Frequency:Quarterly

  • Online


  • on board


About Journal

This Journal publishes papers related to all aspects of Internet of Things, from latest advance to review articles. Articles explore IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Investigations related to topical areas of research are especially encouraged, including IoT demands, impacts, and implications on sensors technologies, big data management, and future design for various IoT use cases, such as smart cities, smart environment, smart homes, etc. Read More


    Wearable Sensors and Internet of Things Integration to Track and Monitor Children Students with Chronic Diseases Using Arduino UNO

    Journal on Internet of Things, Vol.3, No.4, pp. 131-137, 2021, DOI:10.32604/jiot.2021.015994
    Abstract Parents concerns for their children who has a critical health conditions may limit the children movements and live to engage with others peers anytime and anywhere. Thus, in this study aims to propose a framework to help the children who has critical disease to have more activity and engagement with other peers. Additionally, reducing their parents’ concerns by providing monitoring and tracking system to their parents for their children health conditions. However, this study proposed a framework include tracking and monitoring wearable (TMW) device and decision system to alert healthcare providers and parents for any failure in the children health… More >


    Routing Protocol in Underwater Wireless Acoustic Communication Using Non Orthogonal Multiple Access

    Journal on Internet of Things, Vol.3, No.4, pp. 139-147, 2021, DOI:10.32604/jiot.2021.016747
    Abstract The underwater wireless communication with the complexity of attenuation and low propagation speed makes resource constraints in networking sensor nodes and sink. Underwater Sensor Transmission with Attenuation Calculation using Non Orthogonal Multiple Access (UWSTAC-NOMA) protocol has been proposed. This protocol calculates channel gain along with attenuation in underwater channels and provides internetworking sensor for rate allocation minimizing interference. Successive Interference Cancellation has been used at the receiving sensor to decode the information sent. The network level performance of sensors and increasing the data rate improves the overall throughput. Simultaneously, connecting several sensors to sink based on its depth region of… More >


    A Virtual Machine Placement Strategy Based on Virtual Machine Selection and Integration

    Journal on Internet of Things, Vol.3, No.4, pp. 149-157, 2021, DOI:10.32604/jiot.2021.016936
    Abstract Cloud data centers face the largest energy consumption. In order to save energy consumption in cloud data centers, cloud service providers adopt a virtual machine migration strategy. In this paper, we propose an efficient virtual machine placement strategy (VMP-SI) based on virtual machine selection and integration. Our proposed VMP-SI strategy divides the migration process into three phases: physical host state detection, virtual machine selection and virtual machine placement. The local regression robust (LRR) algorithm and minimum migration time (MMT) policy are individual used in the first and section phase, respectively. Then we design a virtual machine migration strategy that integrates… More >


    Authentication in Wireless Body Area Network: Taxonomy and Open Challenges

    Journal on Internet of Things, Vol.3, No.4, pp. 159-182, 2021, DOI:10.32604/jiot.2021.018088
    Abstract Wearable body area network (WBAN) aids the communication between the health providers and patients by supporting health monitoring services. It assists the users to maintain their health status records by collecting the body signals and transmitting them for further processing measurements. However, sensor data are publicly transferred through insecure network that facilitates the attacker malicious acts like performing masquerading attack, man in the middle, and snooping. Several authentication techniques were suggested to levitate the security of the communication channels to preserve the user data from exposure. Moreover, authentication schemes aid plenty of security issues related to user and data privacy,… More >


    Retraction Notice to: New Solution Generation Strategy to Improve Brain Storm Optimization Algorithm for Classification

    Journal on Internet of Things, Vol.3, No.4, pp. 183-183, 2021, DOI:10.32604/jiot.2021.021063
    Abstract This article has no abstract. More >


    Based on Compressed Sensing of Orthogonal Matching Pursuit Algorithm Image Recovery

    Journal on Internet of Things, Vol.2, No.1, pp. 37-45, 2020, DOI:10.32604/jiot.2020.09116
    Abstract Compressive sensing theory mainly includes the sparsely of signal processing, the structure of the measurement matrix and reconstruction algorithm. Reconstruction algorithm is the core content of CS theory, that is, through the low dimensional sparse signal recovers the original signal accurately. This thesis based on the theory of CS to study further on seismic data reconstruction algorithm. We select orthogonal matching pursuit algorithm as a base reconstruction algorithm. Then do the specific research for the implementation principle, the structure of the algorithm of AOMP and make the signal simulation at the same time. In view of the OMP algorithm reconstruction… More >


    Research on Indoor Passive Positioning Technology Based on WiFi

    Journal on Internet of Things, Vol.2, No.1, pp. 23-35, 2020, DOI:10.32604/jiot.2020.09075
    Abstract In recent years, WiFi indoor positioning technology has become a hot research topic at home and abroad. However, at present, indoor positioning technology still has many problems in terms of practicability and stability, which seriously affects the accuracy of indoor positioning and increases the complexity of the calculation process. Aiming at the instability of RSS and the more complicated data processing, this paper proposes a low-frequency filtering method based on fast data convergence. Low-frequency filtering uses MATLAB for data fitting to filter out low-frequency data; data convergence combines the mean and multi-data parallel analysis process to achieve a good balance… More >


    An Optimization Scheme for Task Offloading and Resource Allocation in Vehicle Edge Networks

    Journal on Internet of Things, Vol.2, No.4, pp. 163-173, 2020, DOI:10.32604/jiot.2020.011792
    Abstract The vehicle edge network (VEN) has become a new research hotspot in the Internet of Things (IOT). However, many new delays are generated during the vehicle offloading the task to the edge server, which will greatly reduce the quality of service (QOS) provided by the vehicle edge network. To solve this problem, this paper proposes an evolutionary algorithm-based (EA) task offloading and resource allocation scheme. First, the delay of offloading task to the edge server is generally defined, then the mathematical model of problem is given. Finally, the objective function is optimized by evolutionary algorithm, and the optimal solution is… More >


    Design and Research of Intelligent Alcohol Detector Based on Single Chip Microcomputer

    Journal on Internet of Things, Vol.2, No.3, pp. 121-127, 2020, DOI:10.32604/jiot.2020.010200
    Abstract In order to prevent drunk driving timely and protect personal safety, a kind of vehicle-loaded alcohol concentration detector based on single chip microcomputer control is designed. The detector usesAT89C51 microcontroller as the core, makes use of the gas sensor, A/D converter to detect the alcohol concentration of the breath of the driver, can set different thresholds according to the space of the car model, automatically cut off the ignition circuit for the exceeded threshold, and has the sound and light alarm function, which fundamentally solve the problem of drunk driving. The instrument is compact in size, stable in performance, convenient… More >


    Brain MRI Patient Identification Based on Capsule Network

    Journal on Internet of Things, Vol.2, No.4, pp. 135-144, 2020, DOI:10.32604/jiot.2020.09797
    Abstract In the deep learning field, “Capsule” structure aims to overcome the shortcomings of traditional Convolutional Neural Networks (CNN) which are difficult to mine the relationship between sibling features. Capsule Net (CapsNet) is a new type of classification network structure with “Capsule” as network elements. It uses the “Squashing” algorithm as an activation function and Dynamic Routing as a network optimization method to achieve better classification performance. The main problem of the Brain Magnetic Resonance Imaging (Brain MRI) recognition algorithm is that the difference between Alzheimer’s disease (AD) image, the Mild Cognitive Impairment (MCI) image, and the normal image is not… More >


    An Expected Patch Log Likelihood Denoising Method Based on Internal and External Image Similarity

    Journal on Internet of Things, Vol.2, No.1, pp. 13-21, 2020, DOI:10.32604/jiot.2020.09073
    Abstract Nonlocal property is an important feature of natural images, which means that the patch matrix formed by similar image patches is low-rank. Meanwhile, learning good image priors is of great importance for image denoising. In this paper, we combine the image self-similarity with EPLL (Expected patch log likelihood) method, and propose an EPLL denoising model based on internal and external image similarity to improve the preservation of image details. The experiment results show that the validity of our method is proved from two aspects of visual and numerical results. More >

Share Link

WeChat scan