Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » Tags cloud » IoT

Journals

  • IJIEC (747)
  • MSL (2643)
  • DSL (668)
  • CCL (508)
  • USCM (1092)
  • ESM (413)
  • AC (562)
  • JPM (271)
  • IJDS (912)
  • JFS (91)
  • HE (26)
  • SCI (26)

Keywords

Supply chain management(166)
Jordan(161)
Vietnam(149)
Customer satisfaction(120)
Performance(113)
Supply chain(110)
Service quality(98)
Competitive advantage(95)
Tehran Stock Exchange(94)
SMEs(87)
optimization(86)
Trust(83)
Financial performance(83)
Sustainability(81)
TOPSIS(81)
Job satisfaction(80)
Factor analysis(78)
Social media(78)
Genetic Algorithm(77)
Knowledge Management(77)


» Show all keywords

Authors

Naser Azad(82)
Mohammad Reza Iravani(64)
Zeplin Jiwa Husada Tarigan(62)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(39)
Jumadil Saputra(36)
Dmaithan Almajali(36)
Muhammad Turki Alshurideh(35)
Barween Al Kurdi(32)
Ahmad Makui(32)
Basrowi Basrowi(31)
Hassan Ghodrati(31)
Mohammad Khodaei Valahzaghard(30)
Sautma Ronni Basana(29)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)
Haitham M. Alzoubi(27)


» Show all authors

Countries

Iran(2181)
Indonesia(1289)
Jordan(786)
India(786)
Vietnam(504)
Saudi Arabia(452)
Malaysia(441)
United Arab Emirates(220)
China(206)
Thailand(153)
United States(110)
Turkey(106)
Ukraine(104)
Egypt(98)
Canada(92)
Peru(88)
Pakistan(85)
United Kingdom(80)
Morocco(79)
Nigeria(78)


» Show all countries
Sort articles by: Volume | Date | Most Rates | Most Views | Reviews | Alphabet
1.

Digital twin applications in supply chain management: A systematic literature review Pages 147-166 Right click to download the paper Download PDF

Authors: Sara Bouraya, Akram El Korchi

DOI: 10.5267/j.uscm.2025.2.001

Keywords: Digital twins Supply chain, Logistics, Simulation, Optimization, IoT, Artificial intelligence

Abstract:
The new economic context has brought new challenges to the supply chain and has increased the complexity of its processes. The digitalization; as one of these challenges, is a rapidly evolving paradigm that transforms supply chains by integrating data and communication technologies to optimize operations, enhance sustainability, and improve overall performance. Digital twin technology emerged as one of the most promising digital tools that offer an innovative approach to supply chain management. However, the adoption of digital twins in the supply chain is still in its early stages. Previous research papers presented limited overviews of the applications of digital twin technology in supply chain systems that need to be extended, as it is inevitably a work in progress. In this matter, we conducted a systematic literature review built upon 31 articles to determine the applications of supply chain digital twins (SCDT). This study is divided into three core themes; the first is a comprehensive review of the paradigm of digital supply chain with a focus on digital twin technology and its primary features. The second theme presents an analysis of the 31 papers where we explore the different purposes of SCDTs and their integration. in the third theme by using VOSviewer to conduct a network analysis. We aim; through this paper, to contribute significantly to the supply chain management field by summarizing and analyzing existing research and developments in the applications of digital twins in the different areas of supply chains.
Details
  • 51
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: USCM | Year: 2026 | Volume: 14 | Issue: 2 | Views: 286 | Reviews: 0

 
2.

The dynamic role of the Internet of Things (IoT) on the excel performance of Islamic banks in United Arab Emirates Pages 261-286 Right click to download the paper Download PDF

Authors: Hisham O. Mbaidin

DOI: 10.5267/j.dsl.2024.3.003

Keywords: IoT, PLS-SEM, Resource-Based View (RBV), Islamic Banking Theories, Fraud Triangle Theory, Islamic banks

Abstract:
The rapid advancement of technology has substantially impacted numerous sectors, including the banking industry. It is now apparent that the banking industry is affected by the innovative role that the Internet of Things (IoT) plays, which affects a multitude of operations and services. This study uses a quantitative approach and PLS-SEM to investigate the widespread impact of Internet of Things (IoT) technology on the Excel Performance of Islamic Banks in the UAE. The study integrates the Resource-Based View (RBV), Islamic Banking Theories, and Fraud Triangle Theory to create a complete framework. The research's reliability is supported by a sample of 407 replies from 504 participants. The findings strongly support the hypotheses that IoT integration improves Islamic banking performance in the UAE, such as data analytics, customer service, automation systems, fraud detection capabilities, and asset-backed finance, while aligning with Sharia Principles and improving risk-sharing mechanisms. However, the influence of IoT on escalating fraudulent activities and hence negatively impacting performance was not proven. The study emphasizes the importance of IoT in improving operational efficiency and customer satisfaction in Islamic banks in the UAE.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: DSL | Year: 2024 | Volume: 13 | Issue: 2 | Views: 920 | Reviews: 0

 
3.

Integrating blockchain technology for secure access control in smart home environments: A comprehensive review Pages 373-384 Right click to download the paper Download PDF

Authors: Tariq Bishtawi, Mohammad Shehab, Reem Alzubi, Ayman Ghaben, Suaad M. Alenzi

DOI: 10.5267/j.ijdns.2025.4.003

Keywords: Blockchain, Access control, Smart home, IoT, Cryptographic techniques

Abstract:
Smart home technologies have revolutionized modern living by enhancing convenience, efficiency, and security. In contrast, many interconnected devices introduce significant security and privacy challenges. This comprehensive review investigates the integration of blockchain technology as a robust solution for secure access control in smart home environments. The decentralized and tamper-resistant nature of blockchain technology effectively solves important problems, including device authentication, data integrity, and access management, through the use of cryptography and distributed ledgers. The study synthesizes findings from 52 research papers, categorizing them into three thematic areas: blockchain in access control systems, its applications in IoT, and specific implementations for smart homes. It highlights the transformative potential of blockchain in mitigating vulnerabilities inherent in centralized systems, fostering trust, and enhancing security frameworks. Despite its promising applications, challenges such as scalability, interoperability, and energy consumption persist, warranting further research. This paper stresses the necessity of collaboration to tackle these limitations and enhance blockchain-based access control solutions for smart homes, setting the stage for more secure and user-focused smart environments.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2025 | Volume: 9 | Issue: 3 | Views: 872 | Reviews: 0

 
4.

Optimal feature selection based on OCS for improved malware detection in IoT networks using an ensemble classifier Pages 2127-2140 Right click to download the paper Download PDF

Authors: Mangayarkarasi Ramaiah, Vanmathi Chandrasekaran, Padma Adla, Asokan Vasudevan, Mohammad Faleh Ahmmad Hunitie, Suleiman Ibrahim Shelash Mohammad

DOI: 10.5267/j.ijdns.2024.6.018

Keywords: Feature selection, K-fold cross-validation, Machine learning, Ensemble learning, Malware attack, IoT

Abstract:
The increasing amount of IoT devices increases the size of network traffic data, causing an increase in the incidence of security breaches in IoT networks. Cybercriminals have developed malware to compromise the security of sensitive data, among other cyber threats. In the presence of inadequate and robust security mechanisms, sensitive data is prone to vulnerability. Hence, protecting data in the IoT environment is becoming a mandatory task. Various approaches have addressed malware detection using network data features. However, there is still room for improvement in developing superior techniques and utilizing more comprehensive datasets. This paper presents a novel lightweight ensemble voting classifier to detect malware traffic by deploying the best possible network data. The merits of the correlation coefficient and Opposition-Based Crow Search Algorithm (OCS) have been leveraged to compute the best possible features. Another advantage of this proposed experiment is its focus on a dataset tailored to malware traffic features. This focus enables highly accurate malware detection. After feature selection using OCS, the proposed malware classifier is trained and validated with both 5-fold and 10-fold cross-validation techniques. The tested results confirm that the presented malware classifier performs best using a minimal feature set, which is highly advantageous for IoT networks due to resource constraints.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2024 | Volume: 8 | Issue: 4 | Views: 793 | Reviews: 0

 
5.

Individual, technological, organizational, and environmental factors impact of the internet of things on e-learning adoption in higher education institutions in Jordan Pages 1451-1462 Right click to download the paper Download PDF

Authors: Hassan Al Wahshat, Amin Khalifeh, Adnan Taha, Firas Rashed Wahsheh, Khalid Thaher Amayreh, Mohammed Al Matalka

DOI: 10.5267/j.ijdns.2024.3.020

Keywords: e-learning, IoT, Awareness, Attitude, Behavior, Jordanian banks

Abstract:
The world of the Internet of Things (IoT), even though it is continuously morphing as a fresh paradigm at the intersection of technology and education, is still struggling with several difficulties that prevent its absorption into the e-learning platforms of higher education institutions (HEIs). The breadth of Internet of Things implementation in developing countries, particularly Jordan, Malaysia, Iran, Saudi Arabia, Iraq, and Bangladesh, remains behind, even though industrialized nations have made significant advancements in their utilization of IoT, with the United Kingdom, the United States of America, China, and Japan acting as prominent examples. In the realm of research that focuses on the progression of the IOT integration into the e-learning systems of economically challenged countries, there is a substantial disparity. In particular, the focus of this research is on Jordan to shed light on the primary variables that are either facilitating or hindering the adoption of the IoT within the e-learning sector of Jordan's HEIs. A comprehensive analysis of previous research has been undertaken as a first stage in this investigation. The goal of this analysis is to identify important factors that are involved in the process of IOT adoption. Following that, we used an inferential technique, collecting data from 306 respondents who were enrolled in Jordanian higher education institutions. During our investigation, we discovered that the rate of the IOT integration was significantly influenced by factors such as accessibility, usability, technical assistance, and individual capabilities. In addition, our findings suggest that factors such as attitude, behavior, financial preparedness, dependability, and training have a substantial impact on the adoption of the IOT. On the other hand, the study seemed to indicate that characteristics such as class capacity, awareness, system resources, and course design had a minor influence on the adoption rates inside HEIs. In conclusion, this study provides tangible suggestions to strengthen the integration of the IoT inside Jordanian HEIs. These recommendations provide significant insights that can be used by policy architects, government entities, and higher education institutions to overcome the challenges that relate to the deployment of IoT in the higher learning sector.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2024 | Volume: 8 | Issue: 3 | Views: 701 | Reviews: 0

 
6.

Big data and IoT adoption in shaping organizational citizenship behavior: The role of innovation organizational predictor in the chemical manufacturing industry Pages 225-268 Right click to download the paper Download PDF

Authors: Uli Wildan Nuryanto, Basrowi Basrowi, Icin Quraysin

DOI: 10.5267/j.ijdns.2023.9.026

Keywords: Big Data, IoT, Innovation organizational, Citizenship behavior

Abstract:
This research aims to investigate the relationships between Big Data and Internet of Things (IoT) adoption and employee behavior in the chemical manufacturing industry, specifically focusing on the mediating role of organizational innovation. The research methodology employs a quantitative approach that involves employee surveys, statistical analysis, and mediation testing. The primary findings reveal that Big Data adoption significantly enhances Organizational Innovation, contributing positively to Organizational Citizenship Behavior (OCB) among employees. Conversely, IoT adoption has a significant positive impact on Organizational Innovation but does not directly influence OCB. The relationship between IoT adoption and OCB is mediated by Organizational Innovation, highlighting the pivotal role of innovation as an intermediary in influencing employee behavior. The practical implications of this research suggest that organizations in the chemical manufacturing industry should strategically integrate Big Data and IoT technologies to foster innovation and elevate OCB. Leadership support and employee training are crucial. Study limitations include industry specificity, self-reported data, and static analysis. Future research should diversify samples and use longitudinal methods. Recommendations: embrace tech with innovation focus, train leaders, and deepen understanding of tech, innovation, and behavior.
Details
  • 34
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2024 | Volume: 8 | Issue: 1 | Views: 4170 | Reviews: 0

 
7.

Botnet attacks detection in IoT environment using machine learning techniques Pages 1683-1706 Right click to download the paper Download PDF

Authors: Mousa AL-Akhras, Abdulmajeed Alshunaybir, Hani Omar, Samah Alhazmi

DOI: 10.5267/j.ijdns.2023.7.021

Keywords: IoT, Botnet, DDoS, Mirai, Bashlite, IDS, Machine Learning, Noise

Abstract:
IoT devices with weak security designs are a serious threat to organizations. They are the building blocks of Botnets, the platforms that launch organized attacks that are capable of shutting down an entire infrastructure. Researchers have been developing IDS solutions that can counter such threats, often by employing innovation from other disciplines like artificial intelligence and machine learning. One of the issues that may be encountered when machine learning is used is dataset purity. Since they are not captured from perfect environments, datasets may contain data that could affect the machine learning process, negatively. Algorithms already exist for such problems. Repeated Edited Nearest Neighbor (RENN), Encoding Length (Explore), and Decremental Reduction Optimization Procedure 5 (DROP5) algorithm can filter noises out of datasets. They also provide other benefits such as instance reduction which could help reduce larger Botnet datasets, without sacrificing their quality. Three datasets were chosen in this study to construct an IDS: IoTID20, N-BaIoT and MedBIoT. The filtering algorithms, RENN, Explore, and DROP5 were used on them to filter noise and reduce instances. Noise was also injected and filtered again to assess the resilience of these filters. Then feature optimizations were used to shrink the dataset features. Finally, machine learning was applied on the processed dataset and the resulting IDS was evaluated with the standard supervised learning metrics: Accuracy, Precision, Recall, Specificity, F-Score and G-Mean. Results showed that RENN and DROP5 filtering delivered excellent results. DROP5, in particular, managed to reduce the dataset substantially without sacrificing accuracy. However, when noise got injected, the DROP5 accuracy went down and could not keep up. Of the three dataset, N-BaIoT delivers the best accuracy overall across the learning techniques.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2023 | Volume: 7 | Issue: 4 | Views: 1243 | Reviews: 0

 
8.

A trust management model in internet of vehicles Pages 745-756 Right click to download the paper Download PDF

Authors: Fayez Alazemi, Ahmed Al-Mulla, Mousa Al-Akhras, Mohammed Alawairdhi, Marwah Al-Masri, Hani Omar, Hazza Alshareef

DOI: 10.5267/j.ijdns.2023.2.003

Keywords: Internet of Things (IoT), IoT, Internet of Vehicles, IoV, Trust Management, Traffic, Accident, Vehicle, Model, Authentication

Abstract:
The Internet of Things (IoT) is one of the most evolving technologies, which has a major impact on our daily life. Almost all new devices will have a feature to be connected and controlled over the Internet. Several applications are utilizing IoT to enhance routine processes and actions efficiently. The Internet of Vehicles (IoV) evolved from IoT, where vehicles communicate with each other or with other objects to have a better transportation environment to reduce the number of accidents and save people’s lives. IoV is considered new fields that need security requirements including confidentiality, integrity, availability, authentication, and trust. Trust management technique is used to validate entities behaviors automatically against well-defined policies. The major categories of trust model in IoV are based on entity, data, or a combination of both. This paper proposes a trust model which is based on a combination of entity and data to define the trust of vehicles and utilize the public key infrastructure to distribute certificates to vehicles. Based on certificate validation, messages will be trusted and accepted. This model has been tested across different simulation scenarios which showed that the proposed model detected malicious vehicles and trusted vehicles did not accept their messages.
Details
  • 85
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2023 | Volume: 7 | Issue: 2 | Views: 1109 | Reviews: 0

 

® 2010-2026 GrowingScience.Com