Home / Journals / JIOT / Vol.2, No.4, 2020
Special lssues
  • Open AccessOpen Access

    ARTICLE

    Non-Linear Localization Algorithm Based on Newton Iterations

    Jianfeng Lu*, Guirong Fei
    Journal on Internet of Things, Vol.2, No.4, pp. 129-134, 2020, DOI:10.32604/jiot.2020.07196
    Abstract In order to improve the performance of time difference of arrival (TDOA) localization, a nonlinear least squares algorithm is proposed in this paper. Firstly, based on the criterion of the minimized sum of square error of time difference of arrival, the location estimation is expressed as an optimal problem of a non-linear programming. Then, an initial point is obtained using the semi-definite programming. And finally, the location is extracted from the local optimal solution acquired by Newton iterations. Simulation results show that when the number of anchor nodes is large, the performance of the proposed algorithm will be significantly better… More >

  • Open AccessOpen Access

    ARTICLE

    Brain MRI Patient Identification Based on Capsule Network

    Shuqiao Liu, Junliang Li, Xiaojie Li*
    Journal on Internet of Things, Vol.2, No.4, pp. 135-144, 2020, DOI:10.32604/jiot.2020.09797
    Abstract In the deep learning field, “Capsule” structure aims to overcome the shortcomings of traditional Convolutional Neural Networks (CNN) which are difficult to mine the relationship between sibling features. Capsule Net (CapsNet) is a new type of classification network structure with “Capsule” as network elements. It uses the “Squashing” algorithm as an activation function and Dynamic Routing as a network optimization method to achieve better classification performance. The main problem of the Brain Magnetic Resonance Imaging (Brain MRI) recognition algorithm is that the difference between Alzheimer’s disease (AD) image, the Mild Cognitive Impairment (MCI) image, and the normal image is not… More >

  • Open AccessOpen Access

    ARTICLE

    KNEMAG: Key Node Estimation Mechanism Based on Attack Graph for IoT Security

    Bichen Che1, Long Liu2,*, Huali Zhang1
    Journal on Internet of Things, Vol.2, No.4, pp. 145-162, 2020, DOI:10.32604/jiot.2020.010035
    Abstract With the rapid development and widespread application of the IoT, the at-tacks against IoT vulnerabilities have become more complex and diverse. Most of the previous research focused on node vulnerability and its risk analysis. There is little information available about the importance of the location of the node in the system. Therefore, an estimation mechanism is proposed to assess the key node of the IoT system. The estimation of the key node includes two parts: one is the utilization relationship between nodes, and the other is the impact on the system after the node is conquered. We use the node… More >

  • Open AccessOpen Access

    ARTICLE

    An Optimization Scheme for Task Offloading and Resource Allocation in Vehicle Edge Networks

    Yuxin Xu1, Zilong Jin1,2,*, Xiaorui Zhang1, Lejun Zhang3
    Journal on Internet of Things, Vol.2, No.4, pp. 163-173, 2020, DOI:10.32604/jiot.2020.011792
    Abstract The vehicle edge network (VEN) has become a new research hotspot in the Internet of Things (IOT). However, many new delays are generated during the vehicle offloading the task to the edge server, which will greatly reduce the quality of service (QOS) provided by the vehicle edge network. To solve this problem, this paper proposes an evolutionary algorithm-based (EA) task offloading and resource allocation scheme. First, the delay of offloading task to the edge server is generally defined, then the mathematical model of problem is given. Finally, the objective function is optimized by evolutionary algorithm, and the optimal solution is… More >

Per Page:

Share Link