• Home
  • Internet of Things
    • List of Articles Internet of Things

      • Open Access Article

        1 - Providing the model of Internet-of-Things Based Business Model for Telemedicine using the Falcon Artificial Neural Networks and Fuzzy Inference System (F-ANFIS)
        Masoumeh Omidvar
        The main purpose of this study is to use Falcon's artificial neural networks and fuzzy inference system to designing an IOT-based business model in the field of telemedicine at the National Institute of Medical Research Development of Iran. In fact, the research fatigue More
        The main purpose of this study is to use Falcon's artificial neural networks and fuzzy inference system to designing an IOT-based business model in the field of telemedicine at the National Institute of Medical Research Development of Iran. In fact, the research fatigue of NIMAD decision makers and physicians can be explained by the combination of different ways of designing an IOT-based business model in the field of telemedicine, and the need to use the T-MEDICINE+IOT.F-ANFIS system to increase confidence and reliability in Decision making, as well as the issue of the need for multiple expertise through the simultaneous use of multi-disciplinary knowledge of different areas to solve the problem of designing an internet of things-based business model in the field of telemedicine. In this study, the Matlab R2017b programming environment was applied to design an Expert system based on Falcon neural networks. Finally, using the T-MEDICINE+IOT.F-ANFIS system outputs, the status of "IOT-based business model in the field of telemedicine" can be analyzed based on variables such as the use of the IOT in telemedicine; the ability to managing devices; The position of the IOT networks; the security of the IOT; the degree of familiarity with the analysis of the uses of the IOT; In fact, the final difference between the analysis of the outputs of the Expert system based on Falcon neuro-fuzzy system of this study, and the average views of Telemedicine physicians and IOT-based business model specialists, It is not significant and it equals to 0.065. Manuscript profile
      • Open Access Article

        2 - Reducing Energy Consumption in Sensor-Based Internet of Things Networks Based on Multi-Objective Optimization Algorithms
        Mohammad sedighimanesh Hessam  Zandhessami Mahmood  Alborzi Mohammadsadegh  Khayyatian
        Energy is an important parameter in establishing various communications types in the sensor-based IoT. Sensors usually possess low-energy and non-rechargeable batteries since these sensors are often applied in places and applications that cannot be recharged. The mos More
        Energy is an important parameter in establishing various communications types in the sensor-based IoT. Sensors usually possess low-energy and non-rechargeable batteries since these sensors are often applied in places and applications that cannot be recharged. The most important objective of the present study is to minimize the energy consumption of sensors and increase the IoT network's lifetime by applying multi-objective optimization algorithms when selecting cluster heads and routing between cluster heads for transferring data to the base station. In the present article, after distributing the sensor nodes in the network, the type-2 fuzzy algorithm has been employed to select the cluster heads and also the genetic algorithm has been used to create a tree between the cluster heads and base station. After selecting the cluster heads, the normal nodes become cluster members and send their data to the cluster head. After collecting and aggregating the data by the cluster heads, the data is transferred to the base station from the path specified by the genetic algorithm. The proposed algorithm was implemented with MATLAB simulator and compared with LEACH, MB-CBCCP, and DCABGA protocols, the simulation results indicate the better performance of the proposed algorithm in different environments compared to the mentioned protocols. Due to the limited energy in the sensor-based IoT and the fact that they cannot be recharged in most applications, the use of multi-objective optimization algorithms in the design and implementation of routing and clustering algorithms has a significant impact on the increase in the lifetime of these networks. Manuscript profile
      • Open Access Article

        3 - Smart Pre-Seeding Decision Support System for Agriculture
        Ahmed Wasif Reza Kazi  Saymatul Jannat MD.Shariful  Islam Surajit  Das Barman
        In recent years, the Internet of Things (IoT) brings a new dimension for establishing a precision network connectivity of sensors, especially in the agriculture and farming industry, medical, economic, and several sectors of modern society. Agriculture is an important a More
        In recent years, the Internet of Things (IoT) brings a new dimension for establishing a precision network connectivity of sensors, especially in the agriculture and farming industry, medical, economic, and several sectors of modern society. Agriculture is an important area for the sustainability of mankind engulfing manufacturing, security, and resource management. Due to the exponential diminishing of the resources, innovative techniques to support the subsistence of agriculture and farming. IoT aims to extend the use of internet technology to a large number of distributed and connected devices by representing standard and interoperable communication protocols. This paper brings up a solution by IoT, presents the design and implementation of a smart pre-seeding decision support system for agricultural modernization. This project is accomplished by understanding the real-time circumstances in the agriculture field using wireless technology that highlighted the features including pH and temperature sensors, hardware, mobile application, system’s frontend, and backend analysis, and stores the extracted information in the cloud using IoT. The system is made up of frontend data acquisition, data transmission, data processing, and reception, and is also experimentally validated to find out all possible crops that can be cultivated in a specific land with the required amount of fertilizers as well as the overall crops distribution lists. Manuscript profile
      • Open Access Article

        4 - Detection of Attacks and Anomalies in the Internet of Things System using Neural Networks Based on Training with PSO Algorithms, Fuzzy PSO, Comparative PSO and Mutative PSO
        Mohammad  Nazarpour navid nezafati Sajjad  Shokouhyar
        Integration and diversity of IOT terminals and their applicable programs make them more vulnerable to many intrusive attacks. Thus, designing an intrusion detection model that ensures the security, integrity, and reliability of IOT is vital. Traditional intrusion detect More
        Integration and diversity of IOT terminals and their applicable programs make them more vulnerable to many intrusive attacks. Thus, designing an intrusion detection model that ensures the security, integrity, and reliability of IOT is vital. Traditional intrusion detection technology has the disadvantages of low detection rates and weak scalability that cannot adapt to the complicated and changing environment of the Internet of Things. Hence, one of the most widely used traditional methods is the use of neural networks and also the use of evolutionary optimization algorithms to train neural networks can be an efficient and interesting method. Therefore, in this paper, we use the PSO algorithm to train the neural network and detect attacks and abnormalities of the IOT system. Although the PSO algorithm has many benefits, in some cases it may reduce population diversity, resulting in early convergence. Therefore,in order to solve this problem, we use the modified PSO algorithm with a new mutation operator, fuzzy systems and comparative equations. The proposed method was tested with CUP-KDD data set. The simulation results of the proposed model of this article show better performance and 99% detection accuracy in detecting different malicious attacks, such as DOS, R2L, U2R, and PROB. Manuscript profile
      • Open Access Article

        5 - Identification of Effective Factors in Accepting Internet Objects from the Perspective of Users using the TAM Supplemental Model Presented in the Gao and Bai Model. Case Study: Customers of Iran Mobile Communications Company
        Mohammad Kargar sharif abad mohsen gerami ahmadali yazdanpanah
        The markets for mobile operators are changing rapidly and increasingly competitive, and for quick and effective responses to change customer needs in these markets, in order to remain at high levels of competition, operators are continually looking for ways to Overcomin More
        The markets for mobile operators are changing rapidly and increasingly competitive, and for quick and effective responses to change customer needs in these markets, in order to remain at high levels of competition, operators are continually looking for ways to Overcoming rivals. Utilizing the valuable opportunity of Internet technology to create competitive advantage as the largest mobile phone operator in the Middle East is one of the key issues affecting customer satisfaction and preservation, and ultimately gaining market share in the current competitive market. In this research, using the TAM (Technology Acceptance Model) and adding three factors of technology, social context and individual characteristics, and creating a model for accepting Internet technology, the objects of existing hypotheses were studied. The purpose of this study was to investigate factors affecting the adoption of Internet technology of objects. For this purpose, 384 data from the first company customers were collected through a questionnaire. The data of this research have been analyzed using Smart PLS software and Structural Equation Method. According to the results obtained in this research, factors affecting the acceptance of Internet technology of objects among first-time subscribers, perceived usefulness, effects Social, pleasure and behavioral control. Meanwhile, behavioral control variable is felt and social impact has the greatest impact on adoption of this technology. Manuscript profile
      • Open Access Article

        6 - Investigation of Various Fields of the Iranian Industry Applicability to Advance the Fourth Industrial Revolution Based on the Internet of Things
        Sadegh Abdolabadi Mohammad Mehdi Movahedi
        The purpose of this study is to investigate industry 4.0 advancement in various application areas of Iranian industry using Internet of Things -based achievements and technologies. In this research, 112 articles were studied by searching for specialized keywords related More
        The purpose of this study is to investigate industry 4.0 advancement in various application areas of Iranian industry using Internet of Things -based achievements and technologies. In this research, 112 articles were studied by searching for specialized keywords related to the topic and using valid research sources. In the following, 88 abstracts of articles related to Internet of Things applications were reviewed. In the review we finally made up the 32 title of our article on the subject literature. According to the subject literature, various applications of iot were extracted and categorized in a table; Then, by forming a target group of experts and designing a paired comparative questionnaire for the AHP method and using Expert Choice software, the results showed that according to infrastructure criteria, financial support, senior management support, training training, firmware availability., Communication Security, Expertise and Desire for Innovation, Intelligent Manufacturing Including Automotive Industry, Intelligent Industrial Control and Manufacturing, Supply Chain Management and Support, Smart Networks, Intelligent Logistics, Intelligent Manufacturing Services and Processes, etc. Industry 4.0 with Internet of Things technology. There is also a low level of environmental and recycling usability that requires senior managers to support Internet of Things technology transfer strategies, the use of Internet of Things specialists, and the financial support of upstream managers to leverage the Internet of Things -compliant infrastructure. This area will pave the way for industry 4.0. Manuscript profile
      • Open Access Article

        7 - Big IoT Data from the Perspective of Smart Agriculture
        Bahareh Jamshidi Hossein  Dehghanisani
        Internet of Things (IoT) as an emerging technology in the field of Information and Communication Technology is the next revolution related to the Internet application. IoT focuses on the communication of things such as sensors, drivers, devices, etc., with data collecti More
        Internet of Things (IoT) as an emerging technology in the field of Information and Communication Technology is the next revolution related to the Internet application. IoT focuses on the communication of things such as sensors, drivers, devices, etc., with data collection capability controlling remote communication rather than focusing on the communication between people. Development of smart solutions and new technologies of IoT in agriculture can pave the way to a new paradigm of farming called “Smart Agriculture” by making a fundamental change in all aspects of current practices. IoT-based Smart Agriculture can improve agricultural productivity with more food production through the optimal utilization of the basic resources, minimizing environmental impacts, reducing the costs, and increasing the incomes with linking to the business market that facilitates sustainable agricultural development goals. IoT-based data is a collection of large data called “Big Data” that cannot be processed and managed by traditional databases and conventional management tools. IoT and Big Data technologies are interconnected and it can be predicted that the future of optimal agriculture in the world would not be possible to meet the food demand and sustainability of production without these technologies and Smart Agriculture. This article introduces IoT and Big Data technologies, as well as the relationship between them from the vision of Smart Agriculture. Moreover, the article aims to assist in the decision-making of the strategy from the pre-production stage to the business marketing in the country by assessing life cycle and technology trends. Some of the big IoT data applications in the Smart Agriculture cycle are also introduced. Manuscript profile
      • Open Access Article

        8 - Using Internet Of Things Technology For Make Smart Tourism Attractions And Destinations
        Khadije Kaveh Maryam Nekooeezade Moslem  Alimohammadlo
        Given that tourism is one of the most important industries in the present era, the use of modern technologies to meet the needs of growth and development of this industry seems inevitable. On the other hand, today, in order to increase economic growth and job creation, More
        Given that tourism is one of the most important industries in the present era, the use of modern technologies to meet the needs of growth and development of this industry seems inevitable. On the other hand, today, in order to increase economic growth and job creation, countries are looking for appropriate investments in their tourism. The Internet of Things is a modern and Smart technology that has led to the transformation and development of this industry by entering tourism. Many countries have moved towards using this modern and smart technology in their cities and tourism destinations and have been able to get good results from it, considering the investments they have made in this field. In this regard, the present study has been conducted with the aim of research on the use of IoT technology to smarten tourism attractions and destinations in the country. In this article, based on a review study and thematic analysis of research related to the Internet of Things in tourism and smart tourism destinations, as well as interviews with experts in the field of tourism and the Internet of Things, the most important applications of this smart technology in tourism achievements that help to make tourism attractions and destinations smarter. The findings can lead to the awareness of tourism activists who are familiar with this modern and Smart technology, as well as provide the necessary background to create the appropriate infrastructure for the implementation of this technology in tourism, as well as the program. Provide long-term and suitable investments to achieve this. Manuscript profile
      • Open Access Article

        9 - Presentation of IoT Policies Pattern in Iran through Applying of Thematic Analysis Method
        Leyla Hasanzadeh Garavand Mahdi Abdolhamid Amir Zakery
        This paper is based on a perspective view of the potential of the impact of emerging technologies such as the IoT on developing countries, and, by understanding the challenges of the IoT in Iran, presents a pattern of internet of Things policies in the country. The esse More
        This paper is based on a perspective view of the potential of the impact of emerging technologies such as the IoT on developing countries, and, by understanding the challenges of the IoT in Iran, presents a pattern of internet of Things policies in the country. The essence of the present research is exploratory descriptive. In the process of data analysis, the present study utilizes methods of library studies and semi-structured interviews. The method of thematic analysis is the main method of this research. Interviews were analyzed in 548 basic themes, 56 organizing themes, and 13 comprehensive themes. Finally, the themes were formulated as IoT policies in Iran. Among the most important of these policies are the establishment and strengthening of IoT policy bodies with legal competencies for the sustainable development of IoT;to provide a platform for the production of integrated and extensive applications by creative groups based on government oversight and support;localization of IoT in accordance with Iranian Islamic culture for its acceptance and development of internal laws and standards of IoT in line with international standards and active supervision. The major innovation is that it goes beyond the requirements and presents operational policies for the development of IoT. Manuscript profile
      • Open Access Article

        10 - Optimal and Sub-optimal Transmitter-Receiver Design in Dense Wireless Sensor Networks and the Internet of Things
        Farzad H. Panahi Fereidoun H. Panahi Zahra Askarizadeh Ardestani
        With the rapid development of new technologies in the field of internet of things (IoT) and intelligent networks, researchers are more interested than ever in the concept of wireless sensor networks (WSNs). The emergence of these densely structured networks in recent ye More
        With the rapid development of new technologies in the field of internet of things (IoT) and intelligent networks, researchers are more interested than ever in the concept of wireless sensor networks (WSNs). The emergence of these densely structured networks in recent years has raised the importance of the use of telecommunications technologies, such as ultra-wideband (UWB) technology with high reliability, industrial applications, and appropriate communication security. However, there are still numerous concerns about the extent of inter-network interference, particularly owing to undesired spectral discrete lines in this technology. As a result, it is necessary to provide an optimal solution to eliminate interference and control the power spectrum, and then design the optimal transmitter-receiver structures while considering high sensitivities to the synchronization problem in WSNs based on UWB technology. These goals are pursued in the present study by employing the optimal spectral strategy in the signal model, the structure of the transmitter sensor, and then constructing the optimal or sub-optimal receiver sensor structures, the results of which indicate improved communication performance in WSNs. Manuscript profile
      • Open Access Article

        11 - Providing lightweight mutual group authentication of Internet of Things
        reza sarabi miyanaji sam jabbehdari nasser modiri
        The Internet of things is becoming the largest computing platform and we are seeing an increase in the number of devices in this environment. In addition, most Things in this infrastructure have the computational power and memory constraints. They cannot perform complex More
        The Internet of things is becoming the largest computing platform and we are seeing an increase in the number of devices in this environment. In addition, most Things in this infrastructure have the computational power and memory constraints. They cannot perform complex computational operations. These limitations have been ignored in most traditional authentication methods. Meanwhile, in the new methods of authentication of this environment, not much attention has been paid to the issue of scalability. Therefore, the need for a lightweight, scalable authentication is felt. In this paper, a lightweight authentication protocol is presented in which things are placed in different groups. In each group, a group manager node is considered and as an agent, it performs authentication on behalf of other members. Therefore, Authentication is done in groups, which makes the proposed protocol highly scalable. The proposed method reduces the computational cost of nodes and servers and provides privacy through node anonymity. In addition, it has forward-looking privacy without the use of asynchronous encryption and key agreement. The AVISPA tool has been used to confirm the security of the proposed method. In our method, the computation time of the node and server in authentication has been decreased by 7.8% and 3.5%, respectively, compared with reviewing protocols. Manuscript profile
      • Open Access Article

        12 - Mutual Continuous Lightweight Authentication Based on Node Prioritization Using Traffic Rates for Internet of Things
        reza sarabi miyanaji sam jabbehdari nasser modiri
        Today, billions of devices are connected via the Internet of Things, often through insecure communications. Therefore, security and privacy issues of these devices are a major concern. Since devices in IoT are typically resource-constrained devices, the security solutio More
        Today, billions of devices are connected via the Internet of Things, often through insecure communications. Therefore, security and privacy issues of these devices are a major concern. Since devices in IoT are typically resource-constrained devices, the security solutions of this environment in terms of processing and memory must be secure and lightweight. However, many existing security solutions are not particularly suitable for IoT due to high computation. So there is a need for a lightweight authentication protocol for IoT devices. In this paper, a mutual lightweight authentication protocol between nodes with limited resources and IoT servers is introduced that uses node prioritization based on traffic rates. This scheme is light due to the use of lightweight XOR and Hash operations. The proposed is resistant to cyber-attacks such as eavesdropping attack, and replay attack. The proposed is also secure using the AVISPA tool in the Dolev-Yao threat model. The security risks of this scheme are low compared to other lightweight methods. In addition, the proposal is compared with existing authentication schemes reduces the computational cost, protects privacy through anonymity of nodes, and provides forward secrecy. In our method, the execute time of authentication is reduced by 15% compared to the other methods. Manuscript profile
      • Open Access Article

        13 - Improving IoT Botnet Anomaly Detection Based on Dynamic Feature Selection and Hybrid Processing
        Boshra Pishgoo Ahmad akbari azirani
        The complexity of real-world applications, especially in the field of the Internet of Things, has brought with it a variety of security risks. IoT Botnets are known as a type of complex security attacks that can be detected using machine learning tools. Detection of the More
        The complexity of real-world applications, especially in the field of the Internet of Things, has brought with it a variety of security risks. IoT Botnets are known as a type of complex security attacks that can be detected using machine learning tools. Detection of these attacks, on the one hand, requires the discovery of their behavior patterns using batch processing with high accuracy, and on the other hand, must be operated in real time and adaptive like stream processing. This highlights the importance of using batch/stream hybrid processing techniques for botnet detection. Among the important challenges of these processes, we can mention the selection of appropriate features to build basic models and also the intelligent selection of basic models to combine and present the final result. In this paper, we present a solution based on a combination of stream and batch learning methods with the aim of botnet anomaly detection. This approach uses a dynamic feature selection method that is based on a genetic algorithm and is fully compatible with the nature of hybrid processing. The experimental results in a data set consisting of two known types of botnets indicate that on the one hand, the proposed approach increases the speed of hybrid processing and reduces the detection time of the botnets by reducing the number of features and removing inappropriate features, and on the other hand, increases accuracy by selecting appropriate models for combination. Manuscript profile
      • Open Access Article

        14 - Imposing learning based roadmap for the application of Industry 4 Internet of Things in the health care products industry
        Niloofar Aminikalibar Fatemeh saghafi mansure hoorali SEDIGHEH Rezaiian
        There is a difference in the technology development model between developing and developed countries. In developing countries, it commences with learning the technology from innovations takes place in developed ones. Thus, the driving engine of technology development in More
        There is a difference in the technology development model between developing and developed countries. In developing countries, it commences with learning the technology from innovations takes place in developed ones. Thus, the driving engine of technology development in late countries is learning the technology instead of providing innovation; in the way that the core of activities, organizations and communications are all concentrating on learning. The combination of virtual and real world has created a concept named as Industry 4.0. Nowadays, the application of Industry 4.0 in different scopes is expanding; applying it there requires setting a roadmap. This research aims to propose a learning-based roadmap for the application of industry 4.0 (especially the Internet of Things) in the sale and distribution of healthcare products. Here, there has been used the learning-based roadmapping method, the process of which is explained in eight steps. Two groups of a distinct expert panel including the business industry and technology industry contributed to this research; the Delphi method has been used to guarantee the convergence. The paper’s result can be used as a pattern for deployment in other related fields and secondly guidance in the industry to estimate required funds in the sale and distribution of health care products. Manuscript profile
      • Open Access Article

        15 - Introducing robotic process automation as the connection point of Internet of everything with artificial intelligence projects
        Seyed Omid Azarkasb Seyed Hossein Khasteh
        Robotic process automation is an emerging technology, which can be used to automate repetitive tasks with large but low volume. Automation space consists of providers of construction, operation and transfer contracts, consulting, business process automation and cloud ro More
        Robotic process automation is an emerging technology, which can be used to automate repetitive tasks with large but low volume. Automation space consists of providers of construction, operation and transfer contracts, consulting, business process automation and cloud robotics process automation and markets. Automation refers to the use of technology to perform various tasks with minimal human intervention, so that the automation of the robotic process, intelligent process and various operations of the artificial intelligence business are its main components. In the meantime, the Internet of Things is one of the most up-to-date technologies in the new age of information and communication, which has a concept very close to the Internet of Things. The Internet of Things is a term used to describe physical objects around the world using their digital communication, while the Internet is all about data sets, considering people and processes. The reason for paying attention to the automation of the robotic process is the continuous expansion of the artificial intelligence market due to the widespread use of this technology in most important fields, especially in the components of the Internet. To make the most of robotic process automation, multiple discrete automations as well as artificial intelligence technologies can be used. With this approach, the robotic automation process can be considered as the connection point of everything Internet to software artificial intelligence projects. Therefore, robotic process automation, which aims to improve business processes, is proposed as an Internet connection point for everything with artificial intelligence projects. Manuscript profile
      • Open Access Article

        16 - The Role of IoT Technology Features in Perceived Value Creation, Intention to Advertise and Continue to Receive Customer Services at Sepah Bank
        Yaser Ghasemi Nezhad hamidreza fallah lajimi Ahmad Sheikhol-Islami Tonekaboni
        The use of IoT in the banking industry leads to the provision of various banking products and services to customers. New digital innovations, including the Internet of Things, have also created a competitive market for banks, and banks need to adapt their practices acco More
        The use of IoT in the banking industry leads to the provision of various banking products and services to customers. New digital innovations, including the Internet of Things, have also created a competitive market for banks, and banks need to adapt their practices accordingly. Therefore, in the present study, value creation with IoT technology was investigated in Sepah Bank. For this purpose, the statistical population of this research includes 130 employees of all departments of the information technology department of Sepah Bank. Using Morgan table, the number of statistical samples of this research was 86 people. For inferential analysis of data obtained from standard questionnaires, based on Balaji & Roy research (2017), the correlation method based on structural equation modeling with partial least squares approach and SPSS and SmartPLS software were used. The results of the study showed that the perceived excellent performance had a positive and significant effect on the shared value creation and the intention to continue receiving services from the Internet of Things, as well as the perceived aesthetic demand on the perceived value creation and excellent performance of The Internet of Things and the intention to continue receiving services and the intention to verbally advertise has had a positive and significant effect, as well as the intention to continue receiving services has a positive effect on the intention to verbally advertise customers, but perceived ease of use and perceived existence do not have a positive effect on perceived shared value creation. Manuscript profile
      • Open Access Article

        17 - Proposing a Detection and Mitigation Approach for DDoS Attacks on SDN-Based IoT Networks
        fatemeh MotieShirazi Seyedakbar Mostafavi
        Internet of Things (IoT) is a network of objects on which objects can communicate with other objects. The Internet of Things is currently constantly under numerous attacks due to technical, legal and human problems. One of the most important of these attacks is the Deni More
        Internet of Things (IoT) is a network of objects on which objects can communicate with other objects. The Internet of Things is currently constantly under numerous attacks due to technical, legal and human problems. One of the most important of these attacks is the Denial of Service (DoS) attack, in which normal network services are out of service and it is impossible for objects and users to access the server and other resources. Existing security solutions have not been able to effectively prevent interruption attacks in Internet of Things services. Software-oriented network (SDN) is a new architecture in the network based on the separation of the control and data plane of the network. Programmability and network management capability by SDN can be used in IoT services because some IoT devices send data periodically and in certain time intervals. SDN can help reduce or prevent the data flood caused by IoT if properly deployed in the data center. In this article, a method to detect DDoS attacks in Internet of Things based on SDN is presented and then an algorithm to reduce DDoS attacks is presented. The proposed method is based on the entropy criterion, which is one of the most important concepts in information theory and is calculated based on the characteristics of the flow. In this method, by using two new components on the controller to receive incoming packets and considering the time window and calculating entropy and flow rate, a possible attack is detected in the network, and then based on the statistics of the flow received from the switches, the certainty of the attack is determined. Compared to the existing methods, the proposed method has improved 12% in terms of attack detection time and 26% in terms of false positives/negatives. Manuscript profile
      • Open Access Article

        18 - A new approach to IoT-based disease diagnosis using genetic algorithms and various classifiers
        seyed ebrahim dashti maryam nikpor mehdi nikpor mahbobe johari
        Medical information technology and health services are related to the national welfare and livelihood of the people. The integration of cloud computing and the Internet of Things will be a major breakthrough in modern medical applications. This study focuses on the chro More
        Medical information technology and health services are related to the national welfare and livelihood of the people. The integration of cloud computing and the Internet of Things will be a major breakthrough in modern medical applications. This study focuses on the chronic disease of diabetes, which is one of the leading causes of death worldwide. This research has applied medical information technology in the field of IoT, especially in the field of medical monitoring and management applications. A model architecture for remote monitoring and management of the health information cloud platform is proposed and analyzed, and then an algorithm based on genetic algorithm and hybrid classification for the diagnosis of diabetes is proposed for medical monitoring. The results show that the proposed method has a higher performance than the basic methods and has reached an accuracy of 94%. Manuscript profile
      • Open Access Article

        19 - Improved routing for load balancing in wireless sensor networks on the Internet of things, based on multiple ant colony algorithm
        Farhang Padidaran Moghaddam Hamid Maghsoudi
        An important issue in dynamic computer networks such as Internet networks, where the cost of connections varies continuously, is to create a traffic load balancing and increase the transmission speed of packets in the network, so that data packets are using paths with m More
        An important issue in dynamic computer networks such as Internet networks, where the cost of connections varies continuously, is to create a traffic load balancing and increase the transmission speed of packets in the network, so that data packets are using paths with minimal congestion, as a result, one of the main approaches to solve routing problems and load balancing algorithms is based on ant - based algorithms using a novel approach based on optimization of multiple ant colony optimization, the purpose of this research is to present an appropriate routing algorithm in order to shorten and improve the path due to end - to - end delay parameters, packet loss rate, bandwidth and energy consumption rate, to reach a sense of data on the Internet systems. this method has been implemented in MATLAB software and shows the results of the improvement experiments in the mentioned parameters. Manuscript profile
      • Open Access Article

        20 - Designing a Digital Transformation Strategy Framework for the Road Freight Transportation Industry Focusing on Internet of Things Technology and Data Analytics
        Mehran Ehteshami Mohammad Hasan Cheraghali Bita Tabrizian Maryam Teimourian sefidehkhan
        The current research aims to design the framework of the digital transformation strategy of the road freight transportation industry, focusing on Internet of Things technology and data analytics, and uses the research method of design science. This research is fundament More
        The current research aims to design the framework of the digital transformation strategy of the road freight transportation industry, focusing on Internet of Things technology and data analytics, and uses the research method of design science. This research is fundamental-applied in terms of data type, mixed in exploratory type; According to the time of data collection, it was cross-sectional and according to the method of data collection or the nature and method of the research, it was a survey. Data collection in the qualitative part was done with semi-structured interviews with 20 experts from universities and the road freight transportation industry of Iran who were selected using the purposive sampling method and the principle of saturation. A researcher-made questionnaire was used to collect data in quantitative part and the opinions of 170 employees of this industry who were selected using Cochran's formula and stratified sampling method were obtained. Data analysis was done in the qualitative part with Delphi technique, literature review and coding. In the quantitative part, inferential statistics, one-sample t-test, structural equation modeling, and SPSS and smartPLS software were used. The fifth step of the design science method was done by testing the designed strategy framework in a company in the relevant industry. The results showed that the digital transformation strategy includes two managerial and operational strategies. Also, the consequences, influencing factors, mechanisms, facilitators and obstacles were presented in this framework. Based on the results, among the components of the framework, management strategies need to be further strengthened. Manuscript profile
      • Open Access Article

        21 - Identifying and ranking factors affecting the digital transformation strategy in Iran's road freight transportation industry focusing on the Internet of Things and data analytics
        Mehran Ehteshami Mohammad Hasan Cheraghali Bita Tabrizian Maryam Teimourian sefidehkhan
        This research has been done with the aim of identifying and ranking the factors affecting the digital transformation strategy in Iran's road freight transportation industry, focusing on the Internet of Things and data analytics. After reviewing the literature, semi-stru More
        This research has been done with the aim of identifying and ranking the factors affecting the digital transformation strategy in Iran's road freight transportation industry, focusing on the Internet of Things and data analytics. After reviewing the literature, semi-structured interviews were conducted with 20 academic and road freight transportation industry experts in Iran, who were selected using the purposive sampling method and saturation principle. In the quantitative part, the opinions of 170 employees of this industry, who were selected based on Cochran's formula and stratified sampling method, were collected using a researcher-made questionnaire. Delphi technique, literature review and coding were used to analyze the data in the qualitative part. In the quantitative part, inferential statistics and SPSS and smartPLS software were used. Finally, 40 indicators were extracted in the form of 8 factors and ranking of indicators and affecting factors was done using factor analysis. The result of this research shows that the internal factors have the highest rank and software infrastructure, hardware infrastructure, economic, external factors, legal, cultural and penetration factor are in the next ranks respectively. Therefore, it is suggested that organizations consider their human resource empowerment program in line with the use of technology and digital tools. Manuscript profile
      • Open Access Article

        22 - Priority based Deployment of IoT Applications in Fog
        Masomeh Azimzadeh Ali Rezaee Somayyeh  Jafarali Jassbi MohammadMahdi Esnaashari
        Fog computing technology has emerged to respond to the need for modern IoT applications for low latency, high security, etc. On the other hand, the limitations of fog computing such as heterogeneity, distribution, and resource constraints make service management in this More
        Fog computing technology has emerged to respond to the need for modern IoT applications for low latency, high security, etc. On the other hand, the limitations of fog computing such as heterogeneity, distribution, and resource constraints make service management in this environment challenging. Intelligent service placement means placing application services on fog nodes to ensure their QoS and effective use of resources. Using communities to organize nodes for service placement is one of the approaches in this area, where communities are mainly created based on the connection density of nodes, and applications are placed based on a single-criteria prioritization approach. This leads to the creation of unbalanced communities and inefficient placement of applications. This paper presents a priority-based method for deploying applications in the fog environment. To this end, balanced communities are created and applications are placed in balanced communities based on a multi-criteria prioritization approach. This leads to optimal use of network capacities and increases in QoS. The simulation results show that the proposed method improves deadline by up to 22%, increases availability by about 12%, and increases resource utilization by up to 10%. Manuscript profile
      • Open Access Article

        23 - Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning
        Mohammad Mahdi  Abdian majid ghayori Seyed Ahmad  Eftekhari
        Intrusion detection systems seek to realize several objectives, such as increasing the true detection rate, reducing the detection time, reducing the computational load, and preserving the resulting logs in such a way that they cannot be manipulated or deleted by unauth More
        Intrusion detection systems seek to realize several objectives, such as increasing the true detection rate, reducing the detection time, reducing the computational load, and preserving the resulting logs in such a way that they cannot be manipulated or deleted by unauthorized people. Therefore, this study seeks to solve the challenges by benefiting from the advantages of blockchain technology, its durability, and relying on IDS architecture based on multi-node cooperation. The proposed model is an intrusion detection engine based on the decision tree algorithm implemented in the nodes of the architecture. The architecture consists of several connected nodes on the blockchain platform. The resulting model and logs are stored on the blockchain platform and cannot be manipulated. In addition to the benefits of using blockchain, reduced occupied memory, the speed, and time of transactions are also improved by blockchain. In this research, several evaluation models have been designed for single-node and multi-node architectures on the blockchain platform. Finally, proof of architecture, possible threats to architecture, and defensive ways are explained. The most important advantages of the proposed scheme are the elimination of the single point of failure, maintaining trust between nodes, and ensuring the integrity of the model, and discovered logs. Manuscript profile
      • Open Access Article

        24 - Friendship Selection Based on Social Features in Social Internet of Things
        Mohammad Mahdian S.Mojtaba Matinkhah
        The Social Internet of Things (SIoT) network is the result of the union of the Social Network and the Internet of Things network; wherein, each object tries to use the services provided by its friends. In this network, to find the right friend in order to use the right More
        The Social Internet of Things (SIoT) network is the result of the union of the Social Network and the Internet of Things network; wherein, each object tries to use the services provided by its friends. In this network, to find the right friend in order to use the right service is demanding. Great number of objects' friends, in classical algorithms, causes increasing the computational time and load of network navigation to find the right service with the help of friendly objects. In this article, in order to reduce the computational load and network navigation, it is proposed, firstly, to select the appropriate object friend from a heuristic approach; secondly, to use an adapted binary cuckoo optimization algorithm (AB-COA) which tries to select the appropriate friendly object to receive the service according to the maximum response capacity of each friendly object, and finally, adopting the Adamic-Adar local index (AA) with the interest degree centrality criterion so that it represents the characteristics of the common neighbors of the objects are involved in the friend selection. Finally, by executing the proposed algorithm on the Web-Stanford dataset, an average of 4.8 steps was obtained for reaching a service in the network, indicating the superiority of this algorithm over other algorithms. Manuscript profile
      • Open Access Article

        25 - Modeling and evaluation of RPL routing protocol by colored Petri nets
        Mohammad Pishdar Younes Seifi
        The Internet of Things (IoT) is a novel and widely used idea aimed at connecting objects through communication technologies. The problem of the prior technology adaptation has always been one of the most challenging issues in this area over the years. The Recognition of More
        The Internet of Things (IoT) is a novel and widely used idea aimed at connecting objects through communication technologies. The problem of the prior technology adaptation has always been one of the most challenging issues in this area over the years. The Recognition of Prior Learning (RPL) protocol has been proposed by scientists since 2012 as a solution for IoT routing. This protocol has been utilized by many researchers and hardware companies in the field of the mentioned technology. The present study evaluates RPL behavior from the perspective of the existence of stopping conditions, crossing multiple routes from a special route (loop conditions), and how it reacts to different inputs, while presenting a modular and readable model of this protocol. Manuscript profile
      • Open Access Article

        26 - The extent of the effects of Covid-19 on the global patterns of digital transformation
        seyed omid azarkasb Seyed Hossein Khasteh
        Although the corona crisis is a health phenomenon and a disease, over time it has become a super phenomenon that has involved other parts of society. In the current situation, all countries are dealing with this crisis in different ways and trying to control this crisis More
        Although the corona crisis is a health phenomenon and a disease, over time it has become a super phenomenon that has involved other parts of society. In the current situation, all countries are dealing with this crisis in different ways and trying to control this crisis with less damage. As a result, community management has been placed in a strategic situation and a great managerial experiment. With the covid-19 pandemic, there have been global changes in the profitability of startups. The stock market crashed and there was recession and unemployment all over the world. In general, startups in digital markets performed better than traditional industries. Some time later, the digital economy began to adapt according to its original nature, business models changed and digital methods became more powerful than what was predicted, and technological solutions to overcome the challenges of Covid-19 were gradually applied in all industries. Hence, regardless of the current situation, measures related to Covid-19 have the potential to change the market again. The digital world's global response to Covid-19 is now taking place in the three areas of detection, diagnosis and prevention, and treatment, and digital companies' performance in risk and data analytics, health and wellness, crisis management, and education, in response to The Covid-19 pandemic has become more severe. Therefore, for the future, experts are both waiting for risk and looking for opportunities Manuscript profile
      • Open Access Article

        27 - The effect of Internet of Things (IOT) implementation on the Rail Freight Industry; A futures study approach
        Noureddin Taraz Monfared علی شایان ali rajabzadeh ghotri
        The rail freight industry in Iran has been faced several challenges which affected its performance. Notwithstanding that Internet of Things leverage is rapidly increasing in railway industries-as an experienced solution in other countries-, Iran’s rail freight industry More
        The rail freight industry in Iran has been faced several challenges which affected its performance. Notwithstanding that Internet of Things leverage is rapidly increasing in railway industries-as an experienced solution in other countries-, Iran’s rail freight industry has not been involved in, yet. Related research and experiment has not been identified in Iran, as well. The aim of this survey is to identify the effects of the implementation of Internet of Things in the Rail Freight Industry in Iran. To gather the data, the Delphi method was selected, and the Snowball technique was used for organizing a Panel including twenty experts. To evaluate the outcomes, IQR, Binomial tests, and Mean were calculated. Several statements were identified and there was broad consensus on most of them, which approved that their implementation affects the Iranian rail freight industry, but in different ranks. Finally, the results formed in the Balanced Scorecard’s format. The internal business process has been affected more than the other aspects by the approved statements. Eleven recognized elements are affected in different ranks, including Internal Business Process, Financial, Learning, and Growth, Customers. The Financial perspective remarked as least consensus and the Internal Business Process has received the extreme consensus. The research outcomes can be used to improve the strategic planning of the Iranian rail freight industry by applying the achievements of information technology in practice. Manuscript profile
      • Open Access Article

        28 - Improvement of intrusion detection system on Industrial Internet of Things based on deep learning using metaheuristic algorithms
        mohammadreza zeraatkarmoghaddam majid ghayori
        Due to the increasing use of industrial Internet of Things (IIoT) systems, one of the most widely used security mechanisms is intrusion detection system (IDS) in the IIoT. In these systems, deep learning techniques are increasingly used to detect attacks, anomalies or i More
        Due to the increasing use of industrial Internet of Things (IIoT) systems, one of the most widely used security mechanisms is intrusion detection system (IDS) in the IIoT. In these systems, deep learning techniques are increasingly used to detect attacks, anomalies or intrusions. In deep learning, the most important challenge for training neural networks is determining the hyperparameters in these networks. To overcome this challenge, we have presented a hybrid approach to automate hyperparameter tuning in deep learning architecture by eliminating the human factor. In this article, an IDS in IIoT based on convolutional neural networks (CNN) and recurrent neural network based on short-term memory (LSTM) using metaheuristic algorithms of particle swarm optimization (PSO) and Whale (WOA) is used. This system uses a hybrid method based on neural networks and metaheuristic algorithms to improve neural network performance and increase detection rate and reduce neural network training time. In our method, considering the PSO-WOA algorithm, the hyperparameters of the neural network are determined automatically without the intervention of human agent. In this paper, UNSW-NB15 dataset is used for training and testing. In this research, the PSO-WOA algorithm has use optimized the hyperparameters of the neural network by limiting the search space, and the CNN-LSTM neural network has been trained with this the determined hyperparameters. The results of the implementation indicate that in addition to automating the determination of hyperparameters of the neural network, the detection rate of are method improve 98.5, which is a good improvement compared to other methods. Manuscript profile
      • Open Access Article

        29 - Strategies and Ecosystem Transformations in the Internet of Everything in Malaysia
        Seyed Omid Azarkasb Seyed Hossein Khasteh
        In the digital era, the Internet of Everything (IoE) technology has rapidly become a cornerstone of technological and economic development. Malaysia, as one of the leading and developing countries in Southeast Asia, has examined its preparedness, opportunities, and chal More
        In the digital era, the Internet of Everything (IoE) technology has rapidly become a cornerstone of technological and economic development. Malaysia, as one of the leading and developing countries in Southeast Asia, has examined its preparedness, opportunities, and challenges for adopting and developing this technology through the formulation of its IoT roadmap. Undoubtedly, the IoT roadmap in Malaysia is one of the most comprehensive documents in the study of macro-level Internet of Everything plans. This roadmap provides an analysis of Malaysia's current and future position in the IoT domain, including infrastructure, data and information, security, ecosystem, and talent, followed by a gap analysis. Studies show that the adoption of the next generation of information and communication technology in Malaysia has paved the way for the development of the IoE, outlined opportunities for economic innovation, and facilitated the commercialization of research outcomes by research organizations. The roadmap also emphasizes the importance of balancing development and security in this field, stating that with progress in this domain, Malaysia can emerge as a top hub and regional focal point for IoE development. The younger generation in Malaysia is highly interested in IoE, and they are not only consumers but also creative developers of this technology. This paper highlights Malaysia's recognition as a global pioneer in the IoE technology sector. The country has become a frontrunner in this field through advancements in infrastructure, increased domestic sales and exports, the development of services and platforms, emphasis on innovation, the importance of human resources, and, most importantly, the formulation of a comprehensive and complete IoT roadmap. Malaysia has benefited in two major ways: by deriving new value from technological innovation and gaining a competitive advantage and market share over governments unable to adapt and invest in the IoE market Manuscript profile
      • Open Access Article

        30 - Identifying the Advantages, Disadvantages and Challenges of Advancing the Smart Home from the Perspective of Users in Tehran
        Fatemeh Cheshmeh عباس حبیبی
        <p>In today's world, technologies have reached such a level of progress and development that they cannot be ignored at the level of daily life. The smart house represents a new definition of the home space, which is associated with the entry of more and more technology More
        <p>In today's world, technologies have reached such a level of progress and development that they cannot be ignored at the level of daily life. The smart house represents a new definition of the home space, which is associated with the entry of more and more technology into homes. The place of intelligentization in Iran, as an imported phenomenon, needs further study and investigations. The purpose of this research is to find the challenges facing smart building in Iranian homes and find out the users' attitude towards this issue. In the following, it has been tried to examine the advantages and disadvantages and the strengths and weaknesses of the smart home based on the lived experience of the users of Tehran. This research is based on the purpose of a fundamental research and in terms of method, it is a qualitative ethnographic study that was conducted by conducting in-depth and semi-structured interviews with two groups of actual and potential smart home users in Tehran. The findings of this research indicate that various components are effective in the level of users' satisfaction with the smartness of homes, which in the group of actual users include the components; psychological, social, economic, cultural, infrastructure and technology and in the group of potential users also includes the components; It is economic, social and cultural. The results show that despite the initial ideas, actual users often feel satisfied with living in these spaces and even if they are not completely satisfied, they do not deny the benefits of smartening. In fact, the most important challenge for the adoption of a smart home from the point of view of both groups is its high costs.</p> Manuscript profile
      • Open Access Article

        31 - Community-Based Multi-Criteria Placement of Applications in the Fog Environment
        Masomeh Azimzadeh Ali Rezaee Somayyeh  Jafarali Jassbi MohammadMahdi Esnaashari
        Fog computing technology has emerged to respond to the need for modern IoT applications for low latency, high security, etc. On the other hand, the limitations of fog computing such as heterogeneity, distribution, and resource constraints make service management in this More
        Fog computing technology has emerged to respond to the need for modern IoT applications for low latency, high security, etc. On the other hand, the limitations of fog computing such as heterogeneity, distribution, and resource constraints make service management in this environment challenging. Intelligent service placement means placing application services on fog nodes to ensure their QoS and effective use of resources. Using communities to organize nodes for service placement is one of the approaches in this area, where communities are mainly created based on the connection density of nodes, and applications are placed based on a single-criteria prioritization approach. This leads to the creation of unbalanced communities and inefficient placement of applications. This paper presents a priority-based method for deploying applications in the fog environment. To this end, balanced communities are created and applications are placed in balanced communities based on a multi-criteria prioritization approach. This leads to optimal use of network capacities and increases in QoS. The simulation results show that the proposed method improves deadline by up to 22%, increases availability by about 12%, and increases resource utilization by up to 10%. Manuscript profile
      • Open Access Article

        32 - Identifying and Ranking Factors Affecting the Digital Transformation Strategy in Iran's Road Freight Transportation Industry Focusing on the Internet of Things and Data Analytics
        Mehran Ehteshami Mohammad Hasan Cheraghali Bita Tabrizian Maryam Teimourian sefidehkhan
        This research has been done with the aim of identifying and ranking the factors affecting the digital transformation strategy in Iran's road freight transportation industry, focusing on the Internet of Things and data analytics. After reviewing the literature, semi-stru More
        This research has been done with the aim of identifying and ranking the factors affecting the digital transformation strategy in Iran's road freight transportation industry, focusing on the Internet of Things and data analytics. After reviewing the literature, semi-structured interviews were conducted with 20 academic and road freight transportation industry experts in Iran, who were selected using the purposive sampling method and saturation principle. In the quantitative part, the opinions of 170 employees of this industry, who were selected based on Cochran's formula and stratified sampling method, were collected using a researcher-made questionnaire. Delphi technique, literature review and coding were used to analyze the data in the qualitative part. In the quantitative part, inferential statistics and SPSS and smartPLS software were used. Finally, 40 indicators were extracted in the form of 8 factors and ranking of indicators and affecting factors was done using factor analysis. The result of this research shows that the internal factors have the highest rank and software infrastructure, hardware infrastructure, economic, external factors, legal, cultural and penetration factor are in the next ranks respectively. Therefore, it is suggested that organizations consider their human resource empowerment program in line with the use of technology and digital tools. Manuscript profile
      • Open Access Article

        33 - Intrusion Detection Based on Cooperation on the Permissioned Blockchain Platform in the Internet of Things Using Machine Learning
        Mohammad Mahdi  Abdian majid ghayori Seyed Ahmad  Eftekhari
        Intrusion detection systems seek to realize several objectives, such as increasing the true detection rate, reducing the detection time, reducing the computational load, and preserving the resulting logs in such a way that they cannot be manipulated or deleted by unauth More
        Intrusion detection systems seek to realize several objectives, such as increasing the true detection rate, reducing the detection time, reducing the computational load, and preserving the resulting logs in such a way that they cannot be manipulated or deleted by unauthorized people. Therefore, this study seeks to solve the challenges by benefiting from the advantages of blockchain technology, its durability, and relying on IDS architecture based on multi-node cooperation. The proposed model is an intrusion detection engine based on the decision tree algorithm implemented in the nodes of the architecture. The architecture consists of several connected nodes on the blockchain platform. The resulting model and logs are stored on the blockchain platform and cannot be manipulated. In addition to the benefits of using blockchain, reduced occupied memory, the speed, and time of transactions are also improved by blockchain. In this research, several evaluation models have been designed for single-node and multi-node architectures on the blockchain platform. Finally, proof of architecture, possible threats to architecture, and defensive ways are explained. The most important advantages of the proposed scheme are the elimination of the single point of failure, maintaining trust between nodes, and ensuring the integrity of the model, and discovered logs. Manuscript profile