Forthcoming and Online First Articles

International Journal of Intelligent Internet of Things Computing

International Journal of Intelligent Internet of Things Computing (IJIITC)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Intelligent Internet of Things Computing (3 papers in press)

Regular Issues

  • Underwater Wireless Communication Using TCP/IP   Order a copy of this article
    by M.D. AKTARUL HASAN, Yubo Peng, Wei Shen 
    Abstract: In this paper, underwater wireless (acoustic) communications system is described that leads to the design and development of a small, inexpensive system on the basis of a low frequency, single-directional piezo electric transducer to communicate via webpage. An 8-bit microcontroller and a piezo transducer were used to encode data into an acoustic wave that was transferred through water and detected by another microcontroller that used an identical piezo transducer as a microphone. It is capable of delivering throughput up to 200 bps within 13 KHz band. It is a versatile platform that may be used in a range of circumstances and includes real-time channel characteristics to improve communication. During operation, the system can be modified as needed by changing its implementation on the microcontroller. A 12-bit DAC is used for signal generation through transmitter. With its ADC and FFT-based architecture, the receiver has a variety of unique features and enhancements.
    Keywords: underwater acoustic; piezo transducer; microcontroller; digital to analogue converter; DAC; analogue to digital converter; ADC; FFT; Arduino.
    DOI: 10.1504/IJIITC.2023.10048055
  • A Lightweight Fog-Based Internal Intrusion Detection System for Smart Environments   Order a copy of this article
    by Eduardo Lussi, Hugo Vaz Sampaio, Cristiano Antonio De Souza, Carlos Becker Westphall 
    Abstract: We introduce a lightweight specification-based internal intrusion detection system for smart environments monitoring IoT devices directly in fog computing layer, solving latency issues and being able to protect fog and above layers from denial of service (DoS) attacks. We further investigate different approaches to mitigate an attack considering not only fog computing layer, but also exploiting the distributed nature of IoT using mist computing layer to mitigate an attack. Considering a smart condominium fire alarm system with 300 IoT devices traffic, our approach could spot a DoS attack that comes from an infected IoT layer node and reduce the fog device processing consumption from 31%, when under attack, to 24% with fog-only acting and 9% with fog and mist layer acting afterwards.
    Keywords: intrusion detection; fog computing; cloud computing; mist computing; internet of things; denial of service attack; distributed denial of service attack.
    DOI: 10.1504/IJIITC.2023.10048176
  • Comparative analysis of DDA algorithm and Bresenham algorithm   Order a copy of this article
    by Yaxin Zhang, Kangru Zhang, Chuanhao Wu, Guiping Ge, Yong'an Xu 
    Abstract: The straight line segment is the basic graphic element, and its generation algorithm has a great influence on the generation speed of complex graphics. In the past, the efficiency of integer operation is higher than that of floating-point operation, and the complexity of DDA algorithm is mainly floating-point addition and rounding operation, and the complexity of Bresenham algorithm is mainly integer operation through further improvement. Therefore, it is clearly explained in the existing computer graphics textbooks that the efficiency of Bresenham algorithm is higher than that of DDA algorithm. Through experiments, endpoints of 1,000 to 10,000 straight line segments are randomly generated, and the runtime of Bresenham algorithm and DDA algorithm is compared. It is found that the efficiency of DDA algorithm is higher than that of Bresenham algorithm. Then, by combining the comparison of the efficiency of modern CPU for addition, multiplication and division of integer and floating point with the improvement of floating-point computing hardware and instruction set in modern CPU, the computer’s floating-point computing capabilities have been greatly improved, thus making the DDA algorithm more efficient than the Bresenham algorithm.
    Keywords: DDA algorithm; Bresenham algorithm; floating point operation; integer operation; instruction set.
    DOI: 10.1504/IJIITC.2023.10049811