• Home
  • اینترنت اشیاء
    • List of Articles اینترنت اشیاء

      • Open Access Article

        1 - Investigate the role of Internet objects in decision support and supply chain systems
        fatemeh ranjbar parizi
        The purpose of this research is to develop a framework for understanding the convergence between the Internet of objects and the future of decision support systems and supply chain. Research results have shown that when large data are available, it is necessary to use m More
        The purpose of this research is to develop a framework for understanding the convergence between the Internet of objects and the future of decision support systems and supply chain. Research results have shown that when large data are available, it is necessary to use mathematical algorithms and complex analytical techniques. The Internet of objects improves the intelligence of business intelligence with the accumulation of data and the extraction of information. This improvement is due to the use of information technology to conclude and provide solutions based on past experiences. Manuscript profile
      • Open Access Article

        2 - Presentation of IoT Policies Pattern in Iran through Applying of Thematic Analysis Method
        Leyla Hasanzadeh Garavand Mahdi Abdolhamid Amir Zakery
        This paper is based on a perspective view of the potential of the impact of emerging technologies such as the IoT on developing countries, and, by understanding the challenges of the IoT in Iran, presents a pattern of internet of Things policies in the country. The esse More
        This paper is based on a perspective view of the potential of the impact of emerging technologies such as the IoT on developing countries, and, by understanding the challenges of the IoT in Iran, presents a pattern of internet of Things policies in the country. The essence of the present research is exploratory descriptive. In the process of data analysis, the present study utilizes methods of library studies and semi-structured interviews. The method of thematic analysis is the main method of this research. Interviews were analyzed in 548 basic themes, 56 organizing themes, and 13 comprehensive themes. Finally, the themes were formulated as IoT policies in Iran. Among the most important of these policies are the establishment and strengthening of IoT policy bodies with legal competencies for the sustainable development of IoT;to provide a platform for the production of integrated and extensive applications by creative groups based on government oversight and support;localization of IoT in accordance with Iranian Islamic culture for its acceptance and development of internal laws and standards of IoT in line with international standards and active supervision. The major innovation is that it goes beyond the requirements and presents operational policies for the development of IoT. Manuscript profile
      • Open Access Article

        3 - Scheduling of IoT Application Tasks in Fog Computing Environment Using Deep Reinforcement Learning
        Pegah Gazori Dadmehr Rahbari Mohsen Nickray
        With the advent and development of IoT applications in recent years, the number of smart devices and consequently the volume of data collected by them are rapidly increasing. On the other hand, most of the IoT applications require real-time data analysis and low latency More
        With the advent and development of IoT applications in recent years, the number of smart devices and consequently the volume of data collected by them are rapidly increasing. On the other hand, most of the IoT applications require real-time data analysis and low latency in service delivery. Under these circumstances, sending the huge volume of various data to the cloud data centers for processing and analytical purposes is impractical and the fog computing paradigm seems a better choice. Because of limited computational resources in fog nodes, efficient utilization of them is of great importance. In this paper, the scheduling of IoT application tasks in the fog computing paradigm has been considered. The main goal of this study is to reduce the latency of service delivery, in which we have used the deep reinforcement learning approach to meet it. The proposed method of this paper is a combination of the Q-Learning algorithm, deep learning, experience replay, and target network techniques. According to experiment results, The DQLTS algorithm has improved the ASD metric by 76% in comparison to QLTS and 6.5% compared to the RS algorithm. Moreover, it has been reached to faster convergence time than QLTS. Manuscript profile
      • Open Access Article

        4 - Imposing learning based roadmap for the application of Industry 4 Internet of Things in the health care products industry
        Niloofar Aminikalibar Fatemeh saghafi mansure hoorali SEDIGHEH Rezaiian
        There is a difference in the technology development model between developing and developed countries. In developing countries, it commences with learning the technology from innovations takes place in developed ones. Thus, the driving engine of technology development in More
        There is a difference in the technology development model between developing and developed countries. In developing countries, it commences with learning the technology from innovations takes place in developed ones. Thus, the driving engine of technology development in late countries is learning the technology instead of providing innovation; in the way that the core of activities, organizations and communications are all concentrating on learning. The combination of virtual and real world has created a concept named as Industry 4.0. Nowadays, the application of Industry 4.0 in different scopes is expanding; applying it there requires setting a roadmap. This research aims to propose a learning-based roadmap for the application of industry 4.0 (especially the Internet of Things) in the sale and distribution of healthcare products. Here, there has been used the learning-based roadmapping method, the process of which is explained in eight steps. Two groups of a distinct expert panel including the business industry and technology industry contributed to this research; the Delphi method has been used to guarantee the convergence. The paper’s result can be used as a pattern for deployment in other related fields and secondly guidance in the industry to estimate required funds in the sale and distribution of health care products. Manuscript profile
      • Open Access Article

        5 - The Role of IoT Technology Features in Perceived Value Creation, Intention to Advertise and Continue to Receive Customer Services at Sepah Bank
        Yaser Ghasemi Nezhad hamidreza fallah lajimi Ahmad Sheikhol-Islami Tonekaboni
        The use of IoT in the banking industry leads to the provision of various banking products and services to customers. New digital innovations, including the Internet of Things, have also created a competitive market for banks, and banks need to adapt their practices acco More
        The use of IoT in the banking industry leads to the provision of various banking products and services to customers. New digital innovations, including the Internet of Things, have also created a competitive market for banks, and banks need to adapt their practices accordingly. Therefore, in the present study, value creation with IoT technology was investigated in Sepah Bank. For this purpose, the statistical population of this research includes 130 employees of all departments of the information technology department of Sepah Bank. Using Morgan table, the number of statistical samples of this research was 86 people. For inferential analysis of data obtained from standard questionnaires, based on Balaji & Roy research (2017), the correlation method based on structural equation modeling with partial least squares approach and SPSS and SmartPLS software were used. The results of the study showed that the perceived excellent performance had a positive and significant effect on the shared value creation and the intention to continue receiving services from the Internet of Things, as well as the perceived aesthetic demand on the perceived value creation and excellent performance of The Internet of Things and the intention to continue receiving services and the intention to verbally advertise has had a positive and significant effect, as well as the intention to continue receiving services has a positive effect on the intention to verbally advertise customers, but perceived ease of use and perceived existence do not have a positive effect on perceived shared value creation. Manuscript profile
      • Open Access Article

        6 - Proposing a Detection and Mitigation Approach for DDoS Attacks on SDN-Based IoT Networks
        fatemeh MotieShirazi Seyedakbar Mostafavi
        Internet of Things (IoT) is a network of objects on which objects can communicate with other objects. The Internet of Things is currently constantly under numerous attacks due to technical, legal and human problems. One of the most important of these attacks is the Deni More
        Internet of Things (IoT) is a network of objects on which objects can communicate with other objects. The Internet of Things is currently constantly under numerous attacks due to technical, legal and human problems. One of the most important of these attacks is the Denial of Service (DoS) attack, in which normal network services are out of service and it is impossible for objects and users to access the server and other resources. Existing security solutions have not been able to effectively prevent interruption attacks in Internet of Things services. Software-oriented network (SDN) is a new architecture in the network based on the separation of the control and data plane of the network. Programmability and network management capability by SDN can be used in IoT services because some IoT devices send data periodically and in certain time intervals. SDN can help reduce or prevent the data flood caused by IoT if properly deployed in the data center. In this article, a method to detect DDoS attacks in Internet of Things based on SDN is presented and then an algorithm to reduce DDoS attacks is presented. The proposed method is based on the entropy criterion, which is one of the most important concepts in information theory and is calculated based on the characteristics of the flow. In this method, by using two new components on the controller to receive incoming packets and considering the time window and calculating entropy and flow rate, a possible attack is detected in the network, and then based on the statistics of the flow received from the switches, the certainty of the attack is determined. Compared to the existing methods, the proposed method has improved 12% in terms of attack detection time and 26% in terms of false positives/negatives. Manuscript profile
      • Open Access Article

        7 - Priority based Deployment of IoT Applications in Fog
        Masomeh Azimzadeh Ali Rezaee Somayyeh  Jafarali Jassbi MohammadMahdi Esnaashari
        Fog computing technology has emerged to respond to the need for modern IoT applications for low latency, high security, etc. On the other hand, the limitations of fog computing such as heterogeneity, distribution, and resource constraints make service management in this More
        Fog computing technology has emerged to respond to the need for modern IoT applications for low latency, high security, etc. On the other hand, the limitations of fog computing such as heterogeneity, distribution, and resource constraints make service management in this environment challenging. Intelligent service placement means placing application services on fog nodes to ensure their QoS and effective use of resources. Using communities to organize nodes for service placement is one of the approaches in this area, where communities are mainly created based on the connection density of nodes, and applications are placed based on a single-criteria prioritization approach. This leads to the creation of unbalanced communities and inefficient placement of applications. This paper presents a priority-based method for deploying applications in the fog environment. To this end, balanced communities are created and applications are placed in balanced communities based on a multi-criteria prioritization approach. This leads to optimal use of network capacities and increases in QoS. The simulation results show that the proposed method improves deadline by up to 22%, increases availability by about 12%, and increases resource utilization by up to 10%. Manuscript profile
      • Open Access Article

        8 - The extent of the effects of Covid-19 on the global patterns of digital transformation
        seyed omid azarkasb Seyed Hossein Khasteh
        Although the corona crisis is a health phenomenon and a disease, over time it has become a super phenomenon that has involved other parts of society. In the current situation, all countries are dealing with this crisis in different ways and trying to control this crisis More
        Although the corona crisis is a health phenomenon and a disease, over time it has become a super phenomenon that has involved other parts of society. In the current situation, all countries are dealing with this crisis in different ways and trying to control this crisis with less damage. As a result, community management has been placed in a strategic situation and a great managerial experiment. With the covid-19 pandemic, there have been global changes in the profitability of startups. The stock market crashed and there was recession and unemployment all over the world. In general, startups in digital markets performed better than traditional industries. Some time later, the digital economy began to adapt according to its original nature, business models changed and digital methods became more powerful than what was predicted, and technological solutions to overcome the challenges of Covid-19 were gradually applied in all industries. Hence, regardless of the current situation, measures related to Covid-19 have the potential to change the market again. The digital world's global response to Covid-19 is now taking place in the three areas of detection, diagnosis and prevention, and treatment, and digital companies' performance in risk and data analytics, health and wellness, crisis management, and education, in response to The Covid-19 pandemic has become more severe. Therefore, for the future, experts are both waiting for risk and looking for opportunities Manuscript profile
      • Open Access Article

        9 - The effect of Internet of Things (IOT) implementation on the Rail Freight Industry; A futures study approach
        Noureddin Taraz Monfared علی شایان ali rajabzadeh ghotri
        The rail freight industry in Iran has been faced several challenges which affected its performance. Notwithstanding that Internet of Things leverage is rapidly increasing in railway industries-as an experienced solution in other countries-, Iran’s rail freight industry More
        The rail freight industry in Iran has been faced several challenges which affected its performance. Notwithstanding that Internet of Things leverage is rapidly increasing in railway industries-as an experienced solution in other countries-, Iran’s rail freight industry has not been involved in, yet. Related research and experiment has not been identified in Iran, as well. The aim of this survey is to identify the effects of the implementation of Internet of Things in the Rail Freight Industry in Iran. To gather the data, the Delphi method was selected, and the Snowball technique was used for organizing a Panel including twenty experts. To evaluate the outcomes, IQR, Binomial tests, and Mean were calculated. Several statements were identified and there was broad consensus on most of them, which approved that their implementation affects the Iranian rail freight industry, but in different ranks. Finally, the results formed in the Balanced Scorecard’s format. The internal business process has been affected more than the other aspects by the approved statements. Eleven recognized elements are affected in different ranks, including Internal Business Process, Financial, Learning, and Growth, Customers. The Financial perspective remarked as least consensus and the Internal Business Process has received the extreme consensus. The research outcomes can be used to improve the strategic planning of the Iranian rail freight industry by applying the achievements of information technology in practice. Manuscript profile
      • Open Access Article

        10 - Improvement of intrusion detection system on Industrial Internet of Things based on deep learning using metaheuristic algorithms
        mohammadreza zeraatkarmoghaddam majid ghayori
        Due to the increasing use of industrial Internet of Things (IIoT) systems, one of the most widely used security mechanisms is intrusion detection system (IDS) in the IIoT. In these systems, deep learning techniques are increasingly used to detect attacks, anomalies or i More
        Due to the increasing use of industrial Internet of Things (IIoT) systems, one of the most widely used security mechanisms is intrusion detection system (IDS) in the IIoT. In these systems, deep learning techniques are increasingly used to detect attacks, anomalies or intrusions. In deep learning, the most important challenge for training neural networks is determining the hyperparameters in these networks. To overcome this challenge, we have presented a hybrid approach to automate hyperparameter tuning in deep learning architecture by eliminating the human factor. In this article, an IDS in IIoT based on convolutional neural networks (CNN) and recurrent neural network based on short-term memory (LSTM) using metaheuristic algorithms of particle swarm optimization (PSO) and Whale (WOA) is used. This system uses a hybrid method based on neural networks and metaheuristic algorithms to improve neural network performance and increase detection rate and reduce neural network training time. In our method, considering the PSO-WOA algorithm, the hyperparameters of the neural network are determined automatically without the intervention of human agent. In this paper, UNSW-NB15 dataset is used for training and testing. In this research, the PSO-WOA algorithm has use optimized the hyperparameters of the neural network by limiting the search space, and the CNN-LSTM neural network has been trained with this the determined hyperparameters. The results of the implementation indicate that in addition to automating the determination of hyperparameters of the neural network, the detection rate of are method improve 98.5, which is a good improvement compared to other methods. Manuscript profile
      • Open Access Article

        11 - Strategies and Ecosystem Transformations in the Internet of Everything in Malaysia
        Seyed Omid Azarkasb Seyed Hossein Khasteh
        In the digital era, the Internet of Everything (IoE) technology has rapidly become a cornerstone of technological and economic development. Malaysia, as one of the leading and developing countries in Southeast Asia, has examined its preparedness, opportunities, and chal More
        In the digital era, the Internet of Everything (IoE) technology has rapidly become a cornerstone of technological and economic development. Malaysia, as one of the leading and developing countries in Southeast Asia, has examined its preparedness, opportunities, and challenges for adopting and developing this technology through the formulation of its IoT roadmap. Undoubtedly, the IoT roadmap in Malaysia is one of the most comprehensive documents in the study of macro-level Internet of Everything plans. This roadmap provides an analysis of Malaysia's current and future position in the IoT domain, including infrastructure, data and information, security, ecosystem, and talent, followed by a gap analysis. Studies show that the adoption of the next generation of information and communication technology in Malaysia has paved the way for the development of the IoE, outlined opportunities for economic innovation, and facilitated the commercialization of research outcomes by research organizations. The roadmap also emphasizes the importance of balancing development and security in this field, stating that with progress in this domain, Malaysia can emerge as a top hub and regional focal point for IoE development. The younger generation in Malaysia is highly interested in IoE, and they are not only consumers but also creative developers of this technology. This paper highlights Malaysia's recognition as a global pioneer in the IoE technology sector. The country has become a frontrunner in this field through advancements in infrastructure, increased domestic sales and exports, the development of services and platforms, emphasis on innovation, the importance of human resources, and, most importantly, the formulation of a comprehensive and complete IoT roadmap. Malaysia has benefited in two major ways: by deriving new value from technological innovation and gaining a competitive advantage and market share over governments unable to adapt and invest in the IoE market Manuscript profile
      • Open Access Article

        12 - Identifying the Advantages, Disadvantages and Challenges of Advancing the Smart Home from the Perspective of Users in Tehran
        Fatemeh Cheshmeh عباس حبیبی
        <p>In today's world, technologies have reached such a level of progress and development that they cannot be ignored at the level of daily life. The smart house represents a new definition of the home space, which is associated with the entry of more and more technology More
        <p>In today's world, technologies have reached such a level of progress and development that they cannot be ignored at the level of daily life. The smart house represents a new definition of the home space, which is associated with the entry of more and more technology into homes. The place of intelligentization in Iran, as an imported phenomenon, needs further study and investigations. The purpose of this research is to find the challenges facing smart building in Iranian homes and find out the users' attitude towards this issue. In the following, it has been tried to examine the advantages and disadvantages and the strengths and weaknesses of the smart home based on the lived experience of the users of Tehran. This research is based on the purpose of a fundamental research and in terms of method, it is a qualitative ethnographic study that was conducted by conducting in-depth and semi-structured interviews with two groups of actual and potential smart home users in Tehran. The findings of this research indicate that various components are effective in the level of users' satisfaction with the smartness of homes, which in the group of actual users include the components; psychological, social, economic, cultural, infrastructure and technology and in the group of potential users also includes the components; It is economic, social and cultural. The results show that despite the initial ideas, actual users often feel satisfied with living in these spaces and even if they are not completely satisfied, they do not deny the benefits of smartening. In fact, the most important challenge for the adoption of a smart home from the point of view of both groups is its high costs.</p> Manuscript profile
      • Open Access Article

        13 - Community-Based Multi-Criteria Placement of Applications in the Fog Environment
        Masomeh Azimzadeh Ali Rezaee Somayyeh  Jafarali Jassbi MohammadMahdi Esnaashari
        Fog computing technology has emerged to respond to the need for modern IoT applications for low latency, high security, etc. On the other hand, the limitations of fog computing such as heterogeneity, distribution, and resource constraints make service management in this More
        Fog computing technology has emerged to respond to the need for modern IoT applications for low latency, high security, etc. On the other hand, the limitations of fog computing such as heterogeneity, distribution, and resource constraints make service management in this environment challenging. Intelligent service placement means placing application services on fog nodes to ensure their QoS and effective use of resources. Using communities to organize nodes for service placement is one of the approaches in this area, where communities are mainly created based on the connection density of nodes, and applications are placed based on a single-criteria prioritization approach. This leads to the creation of unbalanced communities and inefficient placement of applications. This paper presents a priority-based method for deploying applications in the fog environment. To this end, balanced communities are created and applications are placed in balanced communities based on a multi-criteria prioritization approach. This leads to optimal use of network capacities and increases in QoS. The simulation results show that the proposed method improves deadline by up to 22%, increases availability by about 12%, and increases resource utilization by up to 10%. Manuscript profile