An Assistive Model for the Visually Impaired Integrating the Domains of IoT, Blockchain and Deep Learning DOI Open Access
Shruti Jadon, Saisamarth Taluri, Sakshi Birthi

et al.

Symmetry, Journal Year: 2023, Volume and Issue: 15(9), P. 1627 - 1627

Published: Aug. 23, 2023

Internet of Things, blockchain and deep learning are emerging technologies that have recently gained popularity due to their various benefits applications. All three domains had success independently in applications such as automation, agriculture, travel, finance, image recognition, speech many others. This paper proposes an efficient, lightweight, user-friendly solution help visually impaired individuals navigate way by taking advantage modern technologies. The proposed method involves the usage a camera lens attached Raspberry Pi device capture live video frames user’s environment, which then transmitted cloud storage. link access these images is stored within symmetrical private network (no superior access), where all servers act nodes. model deployed on analyses detect objects feeds output back service. Ultimately, user receives audio notifications about obstacles through earphone plugged into Pi. In particular, when running high-performing RTX 3090 GPU, average obstacle notification time reported 2 s, highlighting system’s responsiveness effectiveness aiding individuals.

Language: Английский

Convergence of blockchain, IoT, and machine learning: exploring opportunities and challenges – a systematic review DOI Open Access
Youssef Aounzou, Abdelhak Boulaalam,

Fahd Kalloubi

et al.

International Journal on Smart Sensing and Intelligent Systems, Journal Year: 2025, Volume and Issue: 18(1)

Published: Jan. 1, 2025

Abstract With the rapid technological advancement, convergence of Internet Things (IoT), blockchain, and machine learning (ML) has a significant revolution across industries, driving them in areas like Industry 4.0, smart cities, advanced transportation systems. This study presents comprehensive review integration IoT, ML technologies, highlighting their transformative impact on diverse industries. It addresses challenges scalability, security, data management posed by growth interconnected IoT devices, proposing solutions through algorithms blockchain for security immutability. By examining real-world applications reviewing existing literature, this underscores potential benefits complexities merging these while also identifying research future directions. Overall, it offers insights into innovative constructive collaboration ML, which become most important modern advances.

Language: Английский

Citations

0

Decentralized energy optimization using blockchain with battery storage and electric vehicle networks DOI Creative Commons

C. Seelammal,

Sekar Kidambi Raju,

Amal H. Alharbi

et al.

Scientific Reports, Journal Year: 2025, Volume and Issue: 15(1)

Published: Feb. 18, 2025

The research is aimed at filling the gap regarding development of long-lasting, secure technologies that help build decentralized systems. Other consensus models, such as Proof Work (PoW), prevailing in cryptocurrencies, are known to be expensive terms energy, hence enlightened models like Lightweight Hash, whereby while developing model, an emphasis placed on energy efficiency without compromising security. At same time, new battery storage and electric vehicles disrupting consumer habits where renewable favored, a market promoted. It hails aspect fine access control provided by blockchain addition decentralization; permission system vital for any entities require strict due nature data they hold. Blockchain IoT AI makes strategies innovative, adaptable, large-scale, inclusive make unique changes benefit different industries need scalability. Due this combining innovations digital technologies, both networks become nearer consumers, advocating sustainable, efficient urbanism. Altogether, these improvements will lead toward emergence systems that, aside from being technologically also environmentally sustainable protected. So interaction technology, ecological stability, viable security provides basis cleaner, stronger, de-centralized future applied advanced thus inculcating equilibrium stronger society.

Language: Английский

Citations

0

6G to Take the Digital Divide by Storm: Key Technologies and Trends to Bridge the Gap DOI Creative Commons
Chiara Suraci, Sara Pizzi, Federico Montori

et al.

Future Internet, Journal Year: 2022, Volume and Issue: 14(6), P. 189 - 189

Published: June 19, 2022

The pandemic caused by COVID-19 has shed light on the urgency of bridging digital divide to guarantee equity in fruition different services all citizens. inability access world may be due a lack network infrastructure, which we refer as service-delivery divide, or physical conditions, handicaps, age, illiteracy citizens, that is mentioned service-fruition divide. In this paper, discuss way how future sixth-generation (6G) systems can remedy actual limitations realization truly world. Hence, introduce key technologies for gap and show they work two use cases particular importance, namely eHealth education, where inequalities have been dramatically augmented pandemic. Finally, considerations about socio-economical impacts 6G solutions are drawn.

Language: Английский

Citations

17

A Systematic Review of LPWAN and Short-Range Network using AI to Enhance Internet of Things DOI Open Access
Mochammad Haldi Widianto, Ardiles Sinaga, Maria Artanta Ginting

et al.

Journal of Robotics and Control (JRC), Journal Year: 2022, Volume and Issue: 3(4), P. 505 - 518

Published: July 1, 2022

Artificial intelligence (AI) has recently been used frequently, especially concerning the Internet of Things (IoT). However, IoT devices cannot work alone, assisted by Low Power Wide Area Network (LPWAN) for long-distance communication and Short-Range a short distance. few reviews about AI can help LPWAN Network. Therefore, author took opportunity to do this review. This study aims review Networks papers in systematically enhancing performance. Reviews are also maximize systems networks enhance quality discuss results that be applied specific scope. The utilizes selected reporting items systematic meta-analysis (PRISMA). authors conducted all support authors' objectives. Also, identify development related opportunities. found 79 suitable review, so discussion presented was carried out. Several technologies widely used, such as general, with several originating from China. Many reports conferences last year matter were 2020-2021. is expected inspire experimental studies finding relevant scientific become another

Language: Английский

Citations

14

AI and Onion Routing-based Secure Architectural Framework for IoT-based Critical Infrastructure DOI
Nilesh Kumar Jadav, Rajesh Gupta, Sudeep Tanwar

et al.

2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Journal Year: 2023, Volume and Issue: unknown, P. 559 - 564

Published: Jan. 19, 2023

The adoption of IoT in a multitude critical infrastructures revolutionizes several sectors, ranging from smart healthcare systems to financial organizations and thermal nuclear power plants. Yet, the progressive growth devices infrastructure without considering security risks can damage user's privacy, confidentiality, integrity both individuals organizations. To overcome aforementioned threats, we proposed an AI onion routing-based secure architecture for IoT-enabled infrastructure. Here, first employ classifiers that classify attack non-attack data, where data is discarded further communication. In addition, are poisoning attacks by incorporating isolation forest algorithm efficiently detects poisoned eradicates it dataset's feature space. Only forwarded routing network, which offers triple encryption encrypt data. As only processes less computationally expensive than other baseline works. Moreover, each router associated with blockchain nodes store verifying tokens evaluated using performance parameters, such as accuracy, precision, recall, training time, compromisation rate. this work, SVM outperforms achieving 97.7% accuracy.

Language: Английский

Citations

9

Exploring the Joint Potential of Blockchain and AI for Securing Internet of Things DOI Open Access
Md. Tauseef, Manjunath R Kounte, Abdul Haq Nalband

et al.

International Journal of Advanced Computer Science and Applications, Journal Year: 2023, Volume and Issue: 14(4)

Published: Jan. 1, 2023

The emergence of the Internet Things (IoT) has revolutionized way we interact with physical world. rapid growth IoT devices led to a pressing need for robust security measures. Two promising approaches that can enhance are blockchain and artificial intelligence (AI). Blockchain offer decentralized tamper-proof framework, ensuring confidentiality integrity data. AI analyze large volumes real-time data detect anomalies in response threats ecosystem. This paper explores potential these technologies how they complement each other provide secured system. Our main argument is combining solution securing networks safeguarding privacy users. survey aims comprehensive understanding discuss challenges opportunities associated their integration. It also provides discussion on current state research this topic presents future directions area.

Language: Английский

Citations

8

AI and Blockchain-Assisted Secure Data-Exchange Framework for Smart Home Systems DOI Creative Commons
Khush Shah, Nilesh Kumar Jadav, Sudeep Tanwar

et al.

Mathematics, Journal Year: 2023, Volume and Issue: 11(19), P. 4062 - 4062

Published: Sept. 25, 2023

The rapid expansion of the Internet Things (IoT) on a global scale has facilitated convergence revolutionary technologies such as artificial intelligence (AI), blockchain, and cloud computing. integration these paved way for development intricate infrastructures, smart homes, cities, industries, that are capable delivering advanced solutions enhancing human living standards. Nevertheless, IoT devices, while providing effective connectivity convenience, often rely traditional network interfaces can be vulnerable to exploitation by adversaries. If not properly secured updated, legacy communication protocols expose potential vulnerabilities attackers may exploit gain unauthorized access, disrupt operations, or compromise sensitive data. To overcome security challenges associated with home systems, we have devised robust framework leverages capabilities both AI blockchain technology. proposed employs standard dataset from which first eliminated anomalies using an isolation forest (IF) algorithm random partitioning, path length, anomaly score calculation, thresholding stages. Next, is utilized training classification algorithms, K-nearest neighbors (KNN), support vector machine (SVM), linear discriminate analysis (LDA), quadratic discriminant (QDA) classify attack non-attack data system. Further, interplanetary file system (IPFS) store classified (non-attack data) algorithms confront data-manipulation attacks. IPFS acts onsite storage system, securely storing data, its computed hash forwarded blockchain’s immutable ledger. We evaluated different performance parameters. These include accuracy (99.53%) KNN 99.27% IF detection. used validation curve, lift execution cost transactions, scalability (86.23%) showcase effectiveness framework.

Language: Английский

Citations

8

Blockchain Implementation in E-Commerce to Improve The Security Online Transactions DOI Creative Commons

Rangga Gelar Guntara,

Muhammad Naufal Nurfirmansyah,

Ferdiansyah Ferdiansyah

et al.

Journal of Scientific Research Education and Technology (JSRET), Journal Year: 2023, Volume and Issue: 2(1), P. 328 - 338

Published: Feb. 16, 2023

The implementation of blockchain technology in E-commerce has become an increasingly important topic recent years. Blockchain can bring big changes the industry, especially increasing customer security and trust online transactions. In this article, it is explained how be used E-commerce, such as transactions, product tracking, use smart contracts, digital identities. Nonetheless, also challenges obstacles that need to overcome, considerable cost time involved system development integration, well regulatory legal issues related cryptocurrencies Therefore, requires careful strategy planning maximize benefits provide.

Language: Английский

Citations

7

Application layer security for Internet communications: A comprehensive review, challenges, and future trends DOI
David Cevallos-Salas,

José Estrada-Jiménez,

Danny S. Guamán

et al.

Computers & Electrical Engineering, Journal Year: 2024, Volume and Issue: 119, P. 109498 - 109498

Published: July 29, 2024

Language: Английский

Citations

2

Low-Cost and High-Efficiency Electromechanical Integration for Smart Factories of IoT with CNN and FOPID Controller Design under the Impact of COVID-19 DOI Creative Commons
Chang-Hung Hsu, Shan-Jen Cheng,

Te-Jen Chang

et al.

Applied Sciences, Journal Year: 2022, Volume and Issue: 12(7), P. 3231 - 3231

Published: March 22, 2022

This study proposes a design for unmanned chemical factories and implementation based on ultra-low-cost Internet of Things technology, to combat the impact COVID-19 industrial factories. A safety private blockchain network architecture was established, including three-layer structure comprising edge, fog, cloud calculators. Edge computing uses programmable logic controller single-chip microcomputer transmit control motion path four-axis robotic arm motor. The fog is implemented using Python software. integrated applied convolutional neural (CNN) fractional-order proportional-integral-derivative (FOPID). In addition, edge signals are transmitted through blockchain, can be directly uploaded signal integration. application production line sensor image recognition layer addressed. We verified CNN robot motor FOPID. that + FOPID method improve efficiency factory by more than 50% compared with traditional manual operators. low-cost, high-efficiency equipment new has substantial contribution potential.

Language: Английский

Citations

10