EAI Endorsed Transactions on Internet of Things
https://publications.eai.eu/index.php/IoT
<p>EAI Endorsed Transactions on Internet of Things is open access, a peer-reviewed scholarly journal focused on all areas related to the technologies and application fields related to the Internet of Things. The journal publishes research articles, review articles, commentaries, editorials, technical articles, and short communications on a quarterly frequency. Authors are not charged for article submission and processing.</p> <p><strong>INDEXING</strong>: Scopus, DOAJ, CrossRef, Google Scholar, ProQuest, EBSCO, CNKI, Dimensions</p>European Alliance for Innovation (EAI)en-USEAI Endorsed Transactions on Internet of Things2414-1399<p>This is an open-access article distributed under the terms of the Creative Commons Attribution <a href="https://creativecommons.org/licenses/by/3.0/" target="_blank" rel="noopener">CC BY 3.0</a> license, which permits unlimited use, distribution, and reproduction in any medium so long as the original work is properly cited.</p>Exploring the Educational Transformations: A Systematic Literature Review on the Influence of the Internet of Things in Higher Education
https://publications.eai.eu/index.php/IoT/article/view/4999
<p>The rapid growth of the Internet of Things innovations stimulates higher educational institutions to invest in and adopt these technologies to support and enhance their learning and teaching strategies. This study aims to investigate the influence of the Internet of Things on teaching and learning in higher education, performing a systematic literature review. Therefore, this research focuses on the following research questions: R-Q1: What are the benefits of the Internet of Things for teaching and learning in higher education? R-Q2: What are the limitations of the Internet of Things for teaching and learning in higher education? The systematic literature review, including the search strategy, the inclusion and exclusion criteria, and the review of the titles, keywords, and abstracts, identified a total of 31 results, mainly journal and conference articles. The findings from the extracted articles in this review were grouped into eleven themes: adoption, personalized learning, learning efficiency, intelligent teaching, collaboration and connectivity, creativity, health and safety monitoring, latency time, security and privacy, quality and ethics, and financing issues. The findings suggest that the Internet of Things can enhance the learning quality, improve the gained knowledge, and reduce costs in higher education. Therefore, adopting a consistent Internet of Things implementation strategy is essential to address identified limitations in higher education.</p>Vasileios Paliktzoglou Olympia Vlachopoulou
Copyright (c) 2024 EAI Endorsed Transactions on Internet of Things
https://creativecommons.org/licenses/by/3.0/
2024-11-112024-11-111110.4108/eetiot.4999Digital Literacy: Comparative Review on Machine Learning Based Performance Assessment of Students
https://publications.eai.eu/index.php/IoT/article/view/6711
<p>The E-learning system paved an opportunity to make drastic changes in the educational system all over the world. Several institutions began to implement online learning to offer internet based courses contrary to the traditional classroom teaching. These online courses tends to provide several potential benefits such as flexibility and opportunities, to discover knowledge of the students. It also offers innovations in learning strategies of the students and resolve several complexities by accessing information from internet. Though e-learning based systems produces certain advantages, they also possess limitations of co-operative learning, active learning and performance mitigations. To address these issues, the present study focused on the different AI based techniques used in the prediction of student’s academic performance. The main objective of the study is to analyze the primary factors that affects the learning through online and analyze the performance using different intelligent approaches. A comparative study of the AI based techniques is performed to analyze the different methods involved in the assessment of academic performance. Further, the present issues and future works of the studies is deliberated to produce optimized analysis systems. This tends to support several researchers to overcome the disputes and provide effective e-learning assessment systems.</p>K. ShwethaS. Shahar Banu
Copyright (c) 2024 EAI Endorsed Transactions on Internet of Things
https://creativecommons.org/licenses/by/3.0/
2024-11-152024-11-151110.4108/eetiot.6711Major vulnerabilities in Ethereum smart contracts: Investigation and statistical analysis
https://publications.eai.eu/index.php/IoT/article/view/5120
<p class="ICST-abstracttext"><span lang="EN-GB">The general public is becoming increasingly familiar with blockchain technology. Numerous new applications are made possible by this technology's unique features, which include transparency, strong security via cryptography, and distribution. These applications need certain programming tools and interfaces to be implemented. This is made feasible by smart contracts. If the prerequisites are satisfied, smart contracts are carried out automatically. Any mistake in smart contract coding, particularly security-related ones, might have an impact on the project as a whole, available funds, and important data. The current paper discusses the flaws of the Ethereum smart contract in this respect. By examining publically accessible scientific sources, this work aims to present thorough information about vulnerabilities, examples, and current security solutions. Additionally, a substantial collection of current Ethereum (ETH) smart contracts has undergone a static code examination to conduct the vulnerability-finding procedure. The output has undergone assessments and statistical analysis. The study's conclusions demonstrate that smart contracts have several distinct flaws, including arithmetic flaws, that developers should be more aware of. These vulnerabilities and the solutions that can be used to address them are also included.</span></p>Mohammad PishdarMahdi BahaghighatRajeev KumarQin Xin
Copyright (c) 2024 Mohammad Pishdar, Mahdi Bahaghighat, Rajeev Kumar, Qin Xin
https://creativecommons.org/licenses/by-nc-sa/4.0
2024-12-182024-12-181110.4108/eetiot.5120Semantic Image Synthesis from Text: Current Trends and Future Horizons in Text-to-Image Generation
https://publications.eai.eu/index.php/IoT/article/view/5336
<p class="ICST-abstracttext"><span lang="EN-GB">Text-to-image generation, a captivating intersection of natural language processing and computer vision, has undergone a remarkable evolution in recent years. This research paper provides a comprehensive review of the state-of-the-art in text-to-image generation techniques, highlighting key advancements and emerging trends. We begin by surveying the foundational models, with a focus on Generative Adversarial Networks (GANs) and their pivotal role in generating realistic and diverse images from textual descriptions. We delve into the intricacies of training data, model architectures, and evaluation metrics, offering insights into the challenges and opportunities in this field. Furthermore, this paper explores the synergistic relationship between natural language processing and computer vision, showcasing multimodal models like DALL-E and CLIP. These models not only generate images from text but also understand the contextual relationships between textual descriptions and images, opening avenues for content recommendation, search engines, and visual storytelling. The paper discusses applications spanning art, design, e-commerce, healthcare, and education, where text-to-image generation has made significant inroads. We highlight the potential of this technology in automating content creation, aiding in diagnostics, and transforming the fashion and e-commerce industries. However, the journey of text-to-image generation is not without its challenges. We address ethical considerations, emphasizing responsible AI and the mitigation of biases in generated content. We also explore interpretability and model transparency, critical for ensuring trust and accountability.</span></p>Lakshmanan SudhaKari Balakrishnan ArunaVijayakumar SurekaMathavan NivedithaS Prema
Copyright (c) 2024 EAI Endorsed Transactions on Internet of Things
https://creativecommons.org/licenses/by/3.0/
2024-11-292024-11-291110.4108/eetiot.5336Performance Evaluation of Various Path Planning Methods for Robotics and Computational Geometry
https://publications.eai.eu/index.php/IoT/article/view/5433
<p class="ICST-abstracttext"><span lang="EN-GB">INTRODUCTION: In integrating Spiral Coverage into Cellular Decomposition, which combines structured grid-based techniques with flexible, quick spiral traversal, time efficiency is increased.</span></p><p class="ICST-abstracttext"><span lang="EN-GB">OBJECTIVES: In the field of robotics and computational geometry, the study proposes a comparative exploration of two prominent path planning methodologies—Boustrophedon Cellular Decomposition and the innovative Spiral Coverage. Boustrophedon coverage has limitations in time efficiency due to its back-and-forth motion pattern, which can lead to lengthier coverage periods, especially in congested areas. Nevertheless, it is useful in some situations. It is critical to address these time-related issues to make Boustrophedon algorithms more useful in practical settings. </span></p><p class="ICST-abstracttext"><span lang="EN-GB">METHODS: The research centres on achieving comprehensive cell coverage, addressing the complexities arising from confined spaces and intricate geometries. While conventional methods emphasise route optimization between points, the coverage path planning approach seeks optimal paths that maximize coverage and minimize associated costs. This study delves into the theory, practical implementation, and application of Spiral Coverage integrated with established cellular decomposition techniques.</span></p><p class="ICST-abstracttext"><span lang="EN-GB">RESULTS: Through comparative analysis, it illustrates the advantages of spiral coverage over boustrophedon coverage in diverse robotics and computational applications. The research highlights Spiral Coverage's superiority in terms of path optimization, computational efficiency, and adaptability, proposing a novel perspective into cell decomposition. The methodology integrates the Spiral Coverage concept, transcending traditional techniques reliant on grids or Voronoi diagrams. Rigorous evaluation validates its potential to enhance path planning, exemplifying a substantial advancement in robotics and computational geometry.</span></p><p class="ICST-abstracttext"><span lang="EN-GB">CONCLUSION: Our findings show that spiral coverage is on an average 45% more efficient than conventional Boustrophedon coverage. This paper set the basis for the future work on how different algorithms can traverse different shapes more efficiently.</span></p>Gokuldas Vedant Sarvesh RaikarGururaj HLVinayakumar RaviWael Suliman
Copyright (c) 2024 EAI Endorsed Transactions on Internet of Things
https://creativecommons.org/licenses/by/3.0/
2024-11-122024-11-121110.4108/eetiot.5433GTBTL-IoT: An Approach of Curtailing Task Offloading Time for Improved Responsiveness in IoT-MEC Model
https://publications.eai.eu/index.php/IoT/article/view/5556
<p class="ICST-abstracttext"><span lang="EN-GB">INTRODUCTION: The Internet of Things (IoT) has transformed daily life by interconnecting digital devices via integrated sensors, software, and connectivity. Although IoT devices excel at real-time data collection and decision-making, their performance on complex tasks is hindered by limited power, resources, and time. To address this, IoT is often combined with cloud computing (CC) to meet time-sensitive demands. However, the distance between IoT devices and cloud servers can result in latency issues.</span></p><p class="ICST-abstracttext"><span lang="EN-GB">OBJECTIVES: To mitigate latency challenges, Mobile Edge Computing (MEC) is integrated with IoT. MEC offers cloud-like services through servers located near network edges and IoT devices, enhancing device responsiveness by reducing transmission and processing latency. This study aims to develop a solution to optimize task offloading in IoT-MEC environments, addressing challenges like latency, uneven workloads, and network congestion.</span></p><p class="ICST-abstracttext"><span lang="EN-GB">METHODS: This research introduces the Game Theory-Based Task Latency (GTBTL-IoT) algorithm, a two-way task offloading approach employing Game Matching Theory and Data Partitioning Theory. Initially, the algorithm matches IoT devices with the nearest MEC server using game-matching theory. Subsequently, it splits the entire task into two halves and allocates them to both local and MEC servers for parallel computation, optimizing resource usage and workload balance.</span></p><p class="ICST-abstracttext"><span lang="EN-GB">RESULTS: GTBTL-IoT outperforms existing algorithms, such as the Delay-Aware Online Workload Allocation (DAOWA) Algorithm, Fuzzy Algorithm (FA), and Dynamic Task Scheduling (DTS), by an average of 143.75 ms with a 5.5 s system deadline. Additionally, it significantly reduces task transmission, computation latency, and overall job offloading time by 59%. Evaluated in an ENIGMA-based simulation environment, GTBTL-IoT demonstrates its ability to compute requests in real-time with optimal resource usage, ensuring efficient and balanced task execution in the IoT-MEC paradigm.</span></p><p class="ICST-abstracttext"><span lang="EN-GB">CONCLUSION: The Game Theory-Based Task Latency (GTBTL-IoT) algorithm presents a novel approach to optimize task offloading in IoT-MEC environments. By leveraging Game Matching Theory and Data Partitioning Theory, GTBTL-IoT effectively reduces latency, balances workloads, and optimizes resource usage. The algorithm's superior performance compared to existing methods underscores its potential to enhance the responsiveness and efficiency of IoT devices in real-world applications, ensuring seamless task execution in IoT-MEC systems.</span></p>Eram Fatima SiddiquiTasneem Ahmed
Copyright (c) 2024 EAI Endorsed Transactions on Internet of Things
https://creativecommons.org/licenses/by/3.0/
2024-11-082024-11-081110.4108/eetiot.5556Heart Disease Diagnosis and Diet Recommendation System Using Ayurvedic Dosha Analysis
https://publications.eai.eu/index.php/IoT/article/view/6016
<p>The current healthcare system often fails to account for individual health needs, leading to ineffective preventive measures and dietary guidance. Ayurvedic principles, which focus on the Dosha, offer a profound understanding of an individual's constitution, influencing their health, vulnerability to specific diseases, and ideal dietary choices. This paper explores the evolving intersection of ancient Ayurvedic wisdom and modern technology in the realm of disease diagnosis. Ayurveda, with its emphasis on personalized well-being, has long been a source of holistic health practices. In this context, the study delves into the intricate system of Ayurvedic Dosha analysis and its potential applications in contemporary healthcare. The research introduces an innovative way that seamlessly integrates traditional Ayurvedic pulse examination with state-of-the-art technology. By employing pulse sensors and advanced algorithms, the system not only identifies specific ailments but also classifies patients into Ayurvedic Prakriti types. Going beyond conventional diagnosis, this holistic approach extends to personalized recommendations, encompassing diet, lifestyle, Ayurvedic treatments, exercise, and daily routines. While addressing the challenges of harmonizing ancient principles with modern technology, the paper also presents the performance metrics of the model. The accuracy rates are as follows: Logistic Regression (LR) - 85.94%, Random Forest - 89.21%, Decision Tree - 99.70%, and k-Nearest Neighbors (KNN) - 86.43%. These metrics underscore the robustness of the system. In addition to outlining core concepts, methodologies, and model accuracies, the study explores current trends and recent developments in the field, offering readers a comprehensive understanding of Ayurvedic Dosha-based disease diagnosis. The research contributes to the broader discourse on healthcare by paving the way for early detection and individualized, holistic well-being for patients.</p>Kuldeep VayadandeChudaman D. SukteYogesh BodheTanishka JagtapAtharv JoshiPalash JoshiArushi KadamSai Kadam
Copyright (c) 2024 EAI Endorsed Transactions on Internet of Things
https://creativecommons.org/licenses/by/3.0/
2024-11-082024-11-081110.4108/eetiot.6016A Comparative Study on Machine Learning Classifiers for Cervical Cancer Prediction: A Predictive Analytic Approach
https://publications.eai.eu/index.php/IoT/article/view/6223
<p>INTRODUCTION: Cervical cancer is a significant global health concern, particularly in underdeveloped nations where preventive healthcare measures are limited. Early identification of the risks associated with cervical cancer is essential for both prevention and treatment.</p><p>OBJECTIVES: In recent years, machine-learning algorithms have gained popularity as potential techniques for determining a person's risk of developing cancer based on demographic and medical information. This study uses a dataset that contains patient demographics, clinical history, and results from diagnostic tests to examine how machine learning-based algorithms can be used to predict the risks of cervical cancer.</p><p>METHODS: Various machine learning approaches are used to create predictive systems, including Support Vector Machine (SVM), Naïve Bayes (NB), Decision Tree (DT), K-Nearest Neighbors (KNN), Random Forest (RF), Logistic Regression (LR), Gradient Boosting (GB), Nearest Centroid (NC), Multilayer Perceptron(MP), and AdaBoost (AB).</p><p>RESULTS: The prediction capability of these models is assessed using performance metrics such as accuracy, sensitivity, specificity, f-measure, precision, and area under the receiver operating characteristic curve (AUC-ROC). Our results show that the decision tree has the highest accuracy, precision, and f1-score (98.91%, 97.81%, and 0.9889). Additionally, model performance was optimized by the use of hyperparameter tuning. After hyperparameter adjustment, the Support Vector Machine (SVM) showed superior accuracy of 99.64%, precision of 99.26%, and an F1-score of 0.9963, thereby indicating its potential in cervical cancer probability prediction. We also created a web application that uses a machine-learning model to estimate the risk of cervical cancer.</p><p>CONCLUSION: The findings of this study highlight the significance of SVM and demonstrate the potential and capabilities of machine learning techniques to enhance accurate prediction and patient outcomes for cervical cancer screening.</p>Khandaker Mohammad Mohi UddinIftikhar Ahammad SikderMd. Nahid Hasan
Copyright (c) 2024 EAI Endorsed Transactions on Internet of Things
https://creativecommons.org/licenses/by/3.0/
2024-11-192024-11-191110.4108/eetiot.6223Comparative Study on Anomaly based Intrusion Detection using Deep Learning Techniques
https://publications.eai.eu/index.php/IoT/article/view/7178
<p>With an array of applications, Wireless Sensor Networks (WSNs) have the potential to transform the world into a smart planet. WSNs consist of a collection of resource-constrained sensors that gather data, which is then utilized for decision-making and analysis, leading to improvements in quality of service, management, and efficiency. However, the open nature of WSNs exposes them to numerous vulnerabilities and threats. Operating in potentially hostile and unattended environments makes these networks attractive targets for adversaries. Therefore, it is essential to detect the presence of malicious attacks within the networks and implement robust security systems to address these challenges. While traditional security mechanisms such as authentication and cryptographic methods are commonly employed, they often fall short in effectively countering the dynamic nature of modern attacks. Hence, IDS (Intrusion Detection System) tends to continuously monitor the network and detect potential threats in real-time scenarios. This method possess the ability of identifying, responding promptly, preventing and thus ensures resilience of the network. Therefore, the present study reviews the various intrusion detection techniques and data collection methods. The main aim of the study is to investigate the design challenges of deploying IDS in a WSN environment. So, the study analysed the AI (Artificial Intelligence) based techniques involved in intrusion detection and how these techniques could be adopted in WSN. In addition, the comparative analysis of several ML (Machine Learning) and DL (Deep Learning) algorithms are also deliberated to portray the different deployment technique with corresponding outcomes. Further, the main challenges faced by each studies with their limitations are specified for supporting future researchers in developing new trends in intrusion detection for WSN.</p>Sabeena SChitra S
Copyright (c) 2024 EAI Endorsed Transactions on Internet of Things
https://creativecommons.org/licenses/by/3.0/
2024-11-272024-11-271110.4108/eetiot.7178Brackish water parameters monitoring dashboard using Internet of things and industry 4.0
https://publications.eai.eu/index.php/IoT/article/view/6860
<p class="ICST-abstracttext"><span lang="EN-GB">INTRODUCTION: Brackish water aquaculture plays a crucial role in meeting the growing global demand for seafood. It offers an opportunity to diversify aquaculture production and reduce pressure on overexploited marine resources.</span></p><p class="ICST-abstracttext"><span lang="EN-GB">OBJECTIVES: By harnessing the unique properties of brackish ecosystems, this practice contributes to food security, economic growth, and sustainable resource management, while also promoting the conservation of valuable marine habitats. The development of a cutting-edge Indigenous Water Quality Monitoring Prototype named "Aqua BuoySis" for precision brackish water aquaculture utilizing machine intelligence.</span></p><p class="ICST-abstracttext"><span lang="EN-GB">METHODS: The prototype integrates sensors for Dissolved Oxygen (DO), pH, Temperature, Turbidity, and Total Dissolved Solids (TDS). These sensors are calibrated using a dynamic temperature-based machine-learning approach to ensure accuracy in real-time environments. Sensor calibration constants are uploaded to a server for comprehensive data calibration.</span></p><p class="ICST-abstracttext"><span lang="EN-GB">RESULTS: The system collects data at 20-second intervals, associating it with specific pond IDs. Data refinement is achieved through Long Short-Term Memory (LSTM) processing. An Android and Web application, available in native languages such as Tamil and Telugu, has been developed to provide live updates to aqua farmers, facilitating informed decision-making.</span></p><p class="ICST-abstracttext"><span lang="EN-GB">CONCLUSION: This technology represents a significant step towards enhancing precision in brackish water aquaculture through the fusion of machine intelligence and water quality management.</span></p>V. Sowmiya G. R. Kanagachidambaresan
Copyright (c) 2024 EAI Endorsed Transactions on Internet of Things
https://creativecommons.org/licenses/by/3.0/
2024-11-122024-11-121110.4108/eetiot.6860