摘要 :
he Internet of Things (IoT) as an emerging technology has widely been discussed in the literature in recent years. There are also bibliometric analyses in this regard that illustrate the current status of IoT research. The bibliom...
展开
he Internet of Things (IoT) as an emerging technology has widely been discussed in the literature in recent years. There are also bibliometric analyses in this regard that illustrate the current status of IoT research. The bibliometric analyses have been used widely by researchers to provide insights into current topics and identify emerging and future research in different fields. As there are challenges or barriers to the use of IoT, it is necessary for researchers to focus on this area. Various studies have discussed IoT challenges/barriers; however, a picture from such research is not accessible in terms of bibliometrics. This research, therefore, conducts a bibliometric analysis on publications that discuss IoT challenges/barriers to identify challenges most discussed in the literature. Results show that challenges/barriers to IoT usually discussed in the literature include security, privacy, trust, standards, architecture, and energy.
收起
摘要 :
Most of the countries with elderly populations are currently facing with chronic diseases. In this regard, Internet of Things (IoT) technology offers promising tools for reducing the chronic disease burdens. Despite the presence o...
展开
Most of the countries with elderly populations are currently facing with chronic diseases. In this regard, Internet of Things (IoT) technology offers promising tools for reducing the chronic disease burdens. Despite the presence of fruitful works on the use of IoT for chronic disease management in literature, these are rarely overviewed consistently. The present study provides an overview on the use of IoT for chronic disease management, followed by ranking different chronic diseases based on their priority for using IoT in the developing countries. For this purpose, a structural coding was used to provide a list of technologies adopted so far, and then latent Dirichlet allocation algorithm was applied to find major topics in literature. In order to rank chronic diseases based on their priority for using IoT, a list of common categories of chronic diseases was subjected to fuzzy analytic hierarchy process. The research findings include lists of IoT technologies for chronic disease management and the most-discussed chronic diseases. In addition, with the help of text mining, a total of 18 major topics were extracted from the relevant pieces of literature. The results indicated that the cardiovascular disease and to a slightly lesser extent, diabetes mellitus are of the highest priorities for using IoT in the context of developing countries.
收起
摘要 :
Safety of transfer and reception of various data over the internet can be accompanied by a presence of harmful components in a passed content. The phishing attack is one of versions of such harmful components. Thus it is important...
展开
Safety of transfer and reception of various data over the internet can be accompanied by a presence of harmful components in a passed content. The phishing attack is one of versions of such harmful components. Thus it is important to know the relationship between the phishes verified as valid and suspected phishes Submitted. This is necessary for the forecast. To solve this problem, we use the wavelet analysis of time series which represent phishes verified as valid and suspected phishes submitted. We are considering the change of Hurst indicator; we analyse of a spectrum of wavelet energy. This allows you to identify the features of the main characteristics of time series which are considered. Conducted researches have shown the presence of essential duration of long-term dependence of investigated data. We also identified presence of trend component in structure of investigated series of data. It allows you to investigate recurrence of occurrence of phishing attacks that allows concentrating forces and means during the periods of activisation of such harmful influences. The analysis is spent on real data that reflects the importance of the conclusions obtained.
收起
摘要 :
Purpose - This paper aims to present a hybrid approach based on classification algorithms that was capable of identifying different types of phishing pages. In this approach, after eliminating features that do not play an importan...
展开
Purpose - This paper aims to present a hybrid approach based on classification algorithms that was capable of identifying different types of phishing pages. In this approach, after eliminating features that do not play an important role in identifying phishing attacks and also after adding the technique of searching page title in the search engine, the capability of identifying journal phishing and phishing pages embedded in legal sites was added to the presented approach in this paper. Design/methodology/approach - The hybrid approach of this paper for identifying phishing web sites is presented. This approach consists of four basic sections. The action of identifying phishing web sites and journal phishing attacks is performed via selecting two classification algorithms separately. To identify phishing attacks embedded in legal web sites also the method of page title searching is used and then the result is returned. To facilitate identifying phishing pages the black list approach is used along with the proposed approach so that the operation of identifying phishing web sites can be performed more accurately, and, finally, by using a decision table, it is judged that the intended web site is phishing or legal. Findings - In this paper, a hybrid approach based on classification algorithms to identify phishing web sites is presented that has the ability to identify a new type of phishing attack known as journal phishing. The presented approach considers the most used features and adds new features to identify these attacks and to eliminate unused features in the identifying process of these attacks, does not have the problems of previous techniques and can identify journal phishing too.Originality/value - The major advantage of this technique was considering all of the possible and effective features in identifying phishing attacks and eliminating unused features of previous techniques; also, this technique in comparison with other similar techniques has the ability of identifying journal phishing attacks and phishing pages embedded in legal sites.
收起
摘要 :
Internet of Things (IoT) is a popular technological paradigm offering several promised advantages. IoT has been facing different challenges discussed by various researchers. The available literature on IoT challenges is mostly bas...
展开
Internet of Things (IoT) is a popular technological paradigm offering several promised advantages. IoT has been facing different challenges discussed by various researchers. The available literature on IoT challenges is mostly based on experimental studies or reviews. The analysis of webpages as a valuable database can be a good idea to provide an insight into IoT challenges. Thus, this paper was aimed at providing an overall view of webpages discussing IoT challenges. In this regard, the text mining approach was implemented to analyze the related webpages. The obtained results revealed that challenges relate to the security of IoT devices, connectivity, data processing, and storage have been the most prevalent topics in the selected webpages.
收起
摘要 :
Internet of things (loT) as a popular technology plays an important role in the future of the economy. Current literature highlights that IoT has different applications and will change human interaction with the virtual world. As ...
展开
Internet of things (loT) as a popular technology plays an important role in the future of the economy. Current literature highlights that IoT has different applications and will change human interaction with the virtual world. As IoT will be a key enabling technology in the future, it is important for all countries to be aware of this development and its applications, and to support related research and investments. In this paper, we aim to inspect the current status of IoT related research in Iran and present a short and brief overview on current IoT related research areas in Iran. We used Scopus as the scientific citation base to access papers published by Iranian authors in this area. Our analysis shows that Iran is in the emerging stage of IoT. Thus, Iranian scholars and institutions should pay more attention to this highly relevant topic and try to create a good body of knowledge to migrate in the maturity stage as soon as possible. Founding an especial Iranian society on internet of thing or a journal, which focuses on IoT in Iran, could be first steps in this direction.
收起
摘要 :
Purpose – Internet of Things (IoT) as the new technological paradigm has found many applications in different domains. Nowadays, more than 30,000 records related to IoT research can be accessed in Scopus (Scopus.com). Health care...
展开
Purpose – Internet of Things (IoT) as the new technological paradigm has found many applications in different domains. Nowadays, more than 30,000 records related to IoT research can be accessed in Scopus (Scopus.com). Health care is the one of domains which benefits from IoT. However, observations indicate that most active researchers in this area are technical people not health professionals. The purpose of this paper is to understand how health professionals can contribute to the IoT body of knowledge. Design/methodology/approach – IoT professionals are asked to provide their views regarding research concerns, and the collected data are analyzed by phenomenography research methodology. Findings – Findings indicate that health professionals can contribute through providing information, requirement or standards for developing IoT systems or devices. They can also introduce new applications or domains for which IoT is fit. Originality/value – This paper tries to fill the gap concerning the lack of attention to undertaking IoTrelated research from health professionals' side and highlights ways that health professionals can contribute IoT body of knowledge.
收起
摘要 :
Web-based applications are being increasingly used to share data and remote access. These applications form an integral part of the financial, education, and government sectors in most countries. The most important issue in web-ba...
展开
Web-based applications are being increasingly used to share data and remote access. These applications form an integral part of the financial, education, and government sectors in most countries. The most important issue in web-based applications is maintaining basic principles of security: integrity, confidentiality and availability. Many web vulnerabilities have been identified and should be always considered by web-based applications developers and security professionals. Lack of vigilance in attending to these vulnerabilities may result in the software system being attacked by hackers and the most important asset of an organization, i. e., protected data, being compromised. This paper identifies a new type of web susceptibility termed remote installation vulnerability (RIV) which renders content management systems (CMS) and websites exploitable to cyber-attacks. A simple strategy is recommended to address this vulnerability.
收起
摘要 :
Every day, academic world is confronted with new challenges and possible scams and awareness of them is necessary for researchers. Lack of information about these issues would lead to serious problems including the difficulties at...
展开
Every day, academic world is confronted with new challenges and possible scams and awareness of them is necessary for researchers. Lack of information about these issues would lead to serious problems including the difficulties at finding validated academic resource. Journals are the most important academic resource for a researcher however certain unethical practices have come to light regarding authenticity of certain Journals. Journals with names that are similar to existing (and reputed) journals is one of the recently noted problem. These names occasionally are used by 'certain dubious publishers' to deceive researchers. In this short paper we address this issue of similar names in academic literature and the way it is used to deceive researchers.
收起
摘要 :
Adaptive grippers should be able to detect and recognize grasping objects. To be able to do it control algorithm need to be established to control gripper tasks. Since the gripper movements are highly nonlinear systems it is desir...
展开
Adaptive grippers should be able to detect and recognize grasping objects. To be able to do it control algorithm need to be established to control gripper tasks. Since the gripper movements are highly nonlinear systems it is desirable to avoid using of conventional control strategies for robotic manipulators. Instead of the conventional control strategies more advances algorithms can be used. In this study several soft computing methods are analyzed for robotic gripper applications. The gripper structure is fully compliant with embedded sensors. The sensors could be used for grasping shape detection. As soft computing methods, extreme learning machine (ELM) and support vector regression (SVR) were established. Also other soft computing methods are analyzed like fuzzy, neuro-fuzzy and artificial neural network approach. The results show the highest accuracy with ELM approach than other soft computing methods.
收起