Pub Date : 2023-03-01DOI: 10.11591/ijres.v12.i1.pp87-96
Imane Laassar, Moulay Youssef Hadi
Network security is one of the foremost anxieties of the modern time. Over the previous years, numerous studies have been accompanied on the intrusion detection system. However, network security is one of the foremost apprehensions of the modern era this is due to the speedy development and substantial usage of altered technologies over the past period. The vulnerabilities of these technologies security have become a main dispute intrusion detection system is used to classify unapproved access and unusual attacks over the secured networks. For the implementation of intrusion detection system different approaches are used machine learning technique is one of them. In order to comprehend the present station of application of machine learning techniques for solving the intrusion discovery anomalies in internet of thing (IoT) based big data this review paper conducted. Total 55 papers are summarized from 2010 and 2021 which were centering on the manner of the single, hybrid and collaborative classifier design. This review paper also includes some of the basic information like IoT, big data, and machine learning approaches are discussed.
{"title":"Intrusion detection systems for internet of thing based big data: a review","authors":"Imane Laassar, Moulay Youssef Hadi","doi":"10.11591/ijres.v12.i1.pp87-96","DOIUrl":"https://doi.org/10.11591/ijres.v12.i1.pp87-96","url":null,"abstract":"Network security is one of the foremost anxieties of the modern time. Over the previous years, numerous studies have been accompanied on the intrusion detection system. However, network security is one of the foremost apprehensions of the modern era this is due to the speedy development and substantial usage of altered technologies over the past period. The vulnerabilities of these technologies security have become a main dispute intrusion detection system is used to classify unapproved access and unusual attacks over the secured networks. For the implementation of intrusion detection system different approaches are used machine learning technique is one of them. In order to comprehend the present station of application of machine learning techniques for solving the intrusion discovery anomalies in internet of thing (IoT) based big data this review paper conducted. Total 55 papers are summarized from 2010 and 2021 which were centering on the manner of the single, hybrid and collaborative classifier design. This review paper also includes some of the basic information like IoT, big data, and machine learning approaches are discussed.","PeriodicalId":158991,"journal":{"name":"International Journal of Reconfigurable and Embedded Systems (IJRES)","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134273978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-01DOI: 10.11591/ijres.v12.i1.pp60-69
Didigam Anitha, Mohd. Masood Ahmad
An ultra-low leakage static random-access memory (SRAM) cell structure with 8 transistors is proposed in this paper. Compared to the 6T SRAM and other existing 8T SRAM cells, leakage power of the proposed cell in hold mode reduced significantly. The stability parameters of the proposed cell are calculated using butterfly method and also N-curve method. Proposed SRAM achieves better write margin with slightly less read margin than 6T SRAM. Proposed technique consumes 790 PW of power in hold mode, which is very less compared to other existing techniques. Therefore, the proposed cell is appropriate for hold mode applications. The simulations are carried out by using Cadence (Virtuoso Schematic and layout editor) tools with GPDK45-nm technology.
{"title":"Ultra-low leakage static random access memory design","authors":"Didigam Anitha, Mohd. Masood Ahmad","doi":"10.11591/ijres.v12.i1.pp60-69","DOIUrl":"https://doi.org/10.11591/ijres.v12.i1.pp60-69","url":null,"abstract":"An ultra-low leakage static random-access memory (SRAM) cell structure with 8 transistors is proposed in this paper. Compared to the 6T SRAM and other existing 8T SRAM cells, leakage power of the proposed cell in hold mode reduced significantly. The stability parameters of the proposed cell are calculated using butterfly method and also N-curve method. Proposed SRAM achieves better write margin with slightly less read margin than 6T SRAM. Proposed technique consumes 790 PW of power in hold mode, which is very less compared to other existing techniques. Therefore, the proposed cell is appropriate for hold mode applications. The simulations are carried out by using Cadence (Virtuoso Schematic and layout editor) tools with GPDK45-nm technology.","PeriodicalId":158991,"journal":{"name":"International Journal of Reconfigurable and Embedded Systems (IJRES)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114874488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-01DOI: 10.11591/ijres.v12.i1.pp125-134
Zetian Dai, J. Xue, Shoushan Wang
The texture and color on wood are key factors that influence an individual's perception of it. However, little research has been done to confirm what kind of pattern in textures and colors are more likely to evoke individual aesthetic pleasure. Therefore, twenty-four decorative wood from northern China were selected, identified, and quantified in their colors with a CR-5 Colorimeter. We picked out eight kinds of wood with optimal texture characteristics through feature-fusion wood grain recognition (FWGR) and enhanced the texture features with photoshop in VR space. The result show that, in the color dimension, woods in the hue range of 20-25 and saturation of 65-75 were considered beautiful for individual perception of aesthetic. In the texture dimension, the size of the space affects the individual's preference for texture. When the pattern of the wood ray is continuous and clear, the individual's perception of its fluidity is enhanced; while for the fuzzy and interrupted pattern of the wood ray, the individual does not follow the fluidity of the line but focuses on the overall uniformity.
{"title":"Effects of wood texture and color on aesthetic pleasure: two experimental studies","authors":"Zetian Dai, J. Xue, Shoushan Wang","doi":"10.11591/ijres.v12.i1.pp125-134","DOIUrl":"https://doi.org/10.11591/ijres.v12.i1.pp125-134","url":null,"abstract":"The texture and color on wood are key factors that influence an individual's perception of it. However, little research has been done to confirm what kind of pattern in textures and colors are more likely to evoke individual aesthetic pleasure. Therefore, twenty-four decorative wood from northern China were selected, identified, and quantified in their colors with a CR-5 Colorimeter. We picked out eight kinds of wood with optimal texture characteristics through feature-fusion wood grain recognition (FWGR) and enhanced the texture features with photoshop in VR space. The result show that, in the color dimension, woods in the hue range of 20-25 and saturation of 65-75 were considered beautiful for individual perception of aesthetic. In the texture dimension, the size of the space affects the individual's preference for texture. When the pattern of the wood ray is continuous and clear, the individual's perception of its fluidity is enhanced; while for the fuzzy and interrupted pattern of the wood ray, the individual does not follow the fluidity of the line but focuses on the overall uniformity.","PeriodicalId":158991,"journal":{"name":"International Journal of Reconfigurable and Embedded Systems (IJRES)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129257159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Since many internet of things (IoT) devices are threatened by side-channel attacks, security measures are essential for their safe use. However, there are a variety of IoT devices, so the accuracy required depends on the system’s application. In addition, security related to arithmetic operations has been attracting attention in recent years. Therefore, this paper presents an empirical experiment of masking for adders on field programmable gate arrays (FPGAs) and explores the trade-off between cost and security by varying the bit length of the mask. The experimental results show that masking improves power analysis attack resistance, and increasing the bit length of the random numbers used for masking increases security. In particular, the series-connected masked adder is found to be effective in improving power analysis attack resistance.
{"title":"Side channel power analysis resistance evaluation of masked adders on FPGA","authors":"Yilin Zhao, Hiroki Nishikawa, Xiangbo Kong, Hiroyuki Tomiyama","doi":"10.11591/ijres.v12.i1.pp97-112","DOIUrl":"https://doi.org/10.11591/ijres.v12.i1.pp97-112","url":null,"abstract":"Since many internet of things (IoT) devices are threatened by side-channel attacks, security measures are essential for their safe use. However, there are a variety of IoT devices, so the accuracy required depends on the system’s application. In addition, security related to arithmetic operations has been attracting attention in recent years. Therefore, this paper presents an empirical experiment of masking for adders on field programmable gate arrays (FPGAs) and explores the trade-off between cost and security by varying the bit length of the mask. The experimental results show that masking improves power analysis attack resistance, and increasing the bit length of the random numbers used for masking increases security. In particular, the series-connected masked adder is found to be effective in improving power analysis attack resistance.","PeriodicalId":158991,"journal":{"name":"International Journal of Reconfigurable and Embedded Systems (IJRES)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114091465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-01DOI: 10.11591/ijres.v12.i1.pp113-124
C. Raju, S. Rajagopal, Kanagaraj Venusamy, K. Suriyan, Manjunathan Alagarsamy
Optical network is an emerging technology for data communication inworldwide. The information is transmitted from the source to destination through the fiber optics. All optical network (AON) provides good transmission transparency, good expandability, large bandwidth, lower bit error rate (BER), and high processing speed. Link failure and node failure haveconsistently occurred in the traditional methods. In order to overcome the above mentioned issues, this paper proposes a robust software defined switching enabled fault localization framework (SDSFLF) to monitor the node and link failure in an AON. In this work, a novel faulty node localization (FNL) algorithm is exploited to locate the faulty node. Then, the software defined faulty link detection (SDFLD) algorithm that addresses the problem of link failure. The failures are localized in multi traffic stream (MTS) and multi agent system (MAS). Thus, the throughput is improved in SDSFLF compared than other existing methods like traditional routing and wavelength assignment (RWA), simulated annealing (SA) algorithm, attackaware RWA (A-RWA) convex, longest path first (LPF) ordering, and biggest source-destination node degree (BND) ordering. The performance of the proposed algorithm is evaluated in terms of network load, wavelength utilization, packet loss rate, and burst loss rate. Hence, proposed SDSFLF assures that high performance is achieved than other traditional techniques.
{"title":"SDSFLF: fault localization framework for optical communication using software digital switching network","authors":"C. Raju, S. Rajagopal, Kanagaraj Venusamy, K. Suriyan, Manjunathan Alagarsamy","doi":"10.11591/ijres.v12.i1.pp113-124","DOIUrl":"https://doi.org/10.11591/ijres.v12.i1.pp113-124","url":null,"abstract":"Optical network is an emerging technology for data communication inworldwide. The information is transmitted from the source to destination through the fiber optics. All optical network (AON) provides good transmission transparency, good expandability, large bandwidth, lower bit error rate (BER), and high processing speed. Link failure and node failure haveconsistently occurred in the traditional methods. In order to overcome the above mentioned issues, this paper proposes a robust software defined switching enabled fault localization framework (SDSFLF) to monitor the node and link failure in an AON. In this work, a novel faulty node localization (FNL) algorithm is exploited to locate the faulty node. Then, the software defined faulty link detection (SDFLD) algorithm that addresses the problem of link failure. The failures are localized in multi traffic stream (MTS) and multi agent system (MAS). Thus, the throughput is improved in SDSFLF compared than other existing methods like traditional routing and wavelength assignment (RWA), simulated annealing (SA) algorithm, attackaware RWA (A-RWA) convex, longest path first (LPF) ordering, and biggest source-destination node degree (BND) ordering. The performance of the proposed algorithm is evaluated in terms of network load, wavelength utilization, packet loss rate, and burst loss rate. Hence, proposed SDSFLF assures that high performance is achieved than other traditional techniques.","PeriodicalId":158991,"journal":{"name":"International Journal of Reconfigurable and Embedded Systems (IJRES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128596265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-01DOI: 10.11591/ijres.v12.i1.pp135-148
Santo Wijaya, Arief Ramadhan, Andhika Andhika
Control systems and computer science are two distinct and important fields of engineering. The development of cloud computing in computer science has become an enabler for the widely used controller in control systems to migrate to the cloud and has created a new field of research in cloud-based control systems (CCS). The paper used the systematic literature review approach to obtain insight into current CCS research. The objectives include a review in areas such as the demographics, topics of the research, evaluation method, and application domain. To that end, systematic literature review (SLR) has been conducted. The study obtained 64 primary studies from 581 articles. The CCS has a distinct characteristic; despite the fact that the cloud and network dynamics system, when coupled with the controlled plant, is inherently nonlinear, research efforts have used linear models with optimal control to approach it successfully in a limited case of control objectives. Furthermore, cloud-centric and cloud-fog network architecture approaches are considered in the studies—whereas, the quantitative method mainly uses simulation and discussion. Finally, the SLR summarizes open challenges for CCS in the future.
{"title":"Cloud-based control systems: a systematic literature review","authors":"Santo Wijaya, Arief Ramadhan, Andhika Andhika","doi":"10.11591/ijres.v12.i1.pp135-148","DOIUrl":"https://doi.org/10.11591/ijres.v12.i1.pp135-148","url":null,"abstract":"Control systems and computer science are two distinct and important fields of engineering. The development of cloud computing in computer science has become an enabler for the widely used controller in control systems to migrate to the cloud and has created a new field of research in cloud-based control systems (CCS). The paper used the systematic literature review approach to obtain insight into current CCS research. The objectives include a review in areas such as the demographics, topics of the research, evaluation method, and application domain. To that end, systematic literature review (SLR) has been conducted. The study obtained 64 primary studies from 581 articles. The CCS has a distinct characteristic; despite the fact that the cloud and network dynamics system, when coupled with the controlled plant, is inherently nonlinear, research efforts have used linear models with optimal control to approach it successfully in a limited case of control objectives. Furthermore, cloud-centric and cloud-fog network architecture approaches are considered in the studies—whereas, the quantitative method mainly uses simulation and discussion. Finally, the SLR summarizes open challenges for CCS in the future.","PeriodicalId":158991,"journal":{"name":"International Journal of Reconfigurable and Embedded Systems (IJRES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129049592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-01DOI: 10.11591/ijres.v12.i1.pp19-28
Zul Imran Azhari, S. Setumin, A. D. Rosli, Siti Juliana Abu Bakar
Image processing has become under the spotlight recently and leads to a significant shift in various fields such as biomedical, satellite images, and graphical applications. Nevertheless, the poor quality of an image is one of the noticeable limitations of image processing as it restricts efficient data extraction to be conducted. Conventionally, the image was processed via software applications such as MATLAB. In spite of the software's ability to cater to the data extraction of low-quality image issues, it still suffers from the time-consuming issue. As the ability to obtain a rapid outcome is a favorable feature of efficient image processing, the use of hardware in image processing is deemed to keep the addressed issue at bay. Thus, the image enhancement techniques using hardware have gradually rising interest among researchers with numerous approaches such as field programmable gate array (FPGA). In this study, 25 different research papers published from 2016 to 2021 are studied and analyzed to focus on the performance of FPGA as hardware implementation in image processing techniques.
{"title":"A systematic literature review on hardware implementation of image processing","authors":"Zul Imran Azhari, S. Setumin, A. D. Rosli, Siti Juliana Abu Bakar","doi":"10.11591/ijres.v12.i1.pp19-28","DOIUrl":"https://doi.org/10.11591/ijres.v12.i1.pp19-28","url":null,"abstract":"Image processing has become under the spotlight recently and leads to a significant shift in various fields such as biomedical, satellite images, and graphical applications. Nevertheless, the poor quality of an image is one of the noticeable limitations of image processing as it restricts efficient data extraction to be conducted. Conventionally, the image was processed via software applications such as MATLAB. In spite of the software's ability to cater to the data extraction of low-quality image issues, it still suffers from the time-consuming issue. As the ability to obtain a rapid outcome is a favorable feature of efficient image processing, the use of hardware in image processing is deemed to keep the addressed issue at bay. Thus, the image enhancement techniques using hardware have gradually rising interest among researchers with numerous approaches such as field programmable gate array (FPGA). In this study, 25 different research papers published from 2016 to 2021 are studied and analyzed to focus on the performance of FPGA as hardware implementation in image processing techniques.","PeriodicalId":158991,"journal":{"name":"International Journal of Reconfigurable and Embedded Systems (IJRES)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126459430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.11591/ijres.v11.i3.pp275-283
P. U. Reddy, K. Naresh
The internet of things (IoT) has a significant impact on increasing the efficiency and quality of electricity in large power systems. Smart voltage and current monitoring systems (SVCMS) have been developed using a novel method. Using an Arduino Uno microcontroller and a Wi-Fi module, the integrated SVCMS design measures voltage and current sensor findings and sends the processed data to an Android phone. In order to communicate, the global systems for mobile communication (GSM) module is required. When anything goes wrong, an Android app may be used to notify users by text message or email and help them take the right action. It is possible to remotely monitor and control the operation of a gadget using logical programming techniques in Arduino which results easy load control.
{"title":"Monitoring and control of single-phase electrical systems using IoT based microcontrollers","authors":"P. U. Reddy, K. Naresh","doi":"10.11591/ijres.v11.i3.pp275-283","DOIUrl":"https://doi.org/10.11591/ijres.v11.i3.pp275-283","url":null,"abstract":"The internet of things (IoT) has a significant impact on increasing the efficiency and quality of electricity in large power systems. Smart voltage and current monitoring systems (SVCMS) have been developed using a novel method. Using an Arduino Uno microcontroller and a Wi-Fi module, the integrated SVCMS design measures voltage and current sensor findings and sends the processed data to an Android phone. In order to communicate, the global systems for mobile communication (GSM) module is required. When anything goes wrong, an Android app may be used to notify users by text message or email and help them take the right action. It is possible to remotely monitor and control the operation of a gadget using logical programming techniques in Arduino which results easy load control.","PeriodicalId":158991,"journal":{"name":"International Journal of Reconfigurable and Embedded Systems (IJRES)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123992042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.11591/ijres.v11.i3.pp284-294
Mohammad Minhazur Rahman, A. Kabir, Al Mamun Mizan, Kazi Mushfiqur Rahman Alvi, Nazmus Sakib Nabil, Istiak Ahmad
As the number of transports on the road increases every day, so does the number of accidents. Reckless driving and consuming alcohol are two of the leading causes of accidents. Apart from these issues, the safety of humans and vehicles is also critical. A thorough investigation is required to minimize the accident rate and improve human safety, particularly if an incident occurs. The purpose of this study is to develop a few sensor-based black box system that will help us reduce traffic accidents by continuously providing precise guidance to the driver. At the same time, the evidence will be uploaded to its server for further evaluation. This system also includes a way of detecting drowsiness in the driver. Finally, using global positioning system (GPS) and global system for mobile communications (GSM), the relevant authorities will get information on the vehicle's condition and whereabouts. For security purposes, a panic button is introduced here to get emergency help from the security personnel by detecting the victim’s area.
{"title":"Smart vehicle management by using sensors and an IoT based black box","authors":"Mohammad Minhazur Rahman, A. Kabir, Al Mamun Mizan, Kazi Mushfiqur Rahman Alvi, Nazmus Sakib Nabil, Istiak Ahmad","doi":"10.11591/ijres.v11.i3.pp284-294","DOIUrl":"https://doi.org/10.11591/ijres.v11.i3.pp284-294","url":null,"abstract":"As the number of transports on the road increases every day, so does the number of accidents. Reckless driving and consuming alcohol are two of the leading causes of accidents. Apart from these issues, the safety of humans and vehicles is also critical. A thorough investigation is required to minimize the accident rate and improve human safety, particularly if an incident occurs. The purpose of this study is to develop a few sensor-based black box system that will help us reduce traffic accidents by continuously providing precise guidance to the driver. At the same time, the evidence will be uploaded to its server for further evaluation. This system also includes a way of detecting drowsiness in the driver. Finally, using global positioning system (GPS) and global system for mobile communications (GSM), the relevant authorities will get information on the vehicle's condition and whereabouts. For security purposes, a panic button is introduced here to get emergency help from the security personnel by detecting the victim’s area.","PeriodicalId":158991,"journal":{"name":"International Journal of Reconfigurable and Embedded Systems (IJRES)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125393526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.11591/ijres.v11.i3.pp265-274
M. H. Widianto, Ranny Ranny
More things are connected to the Internet, making the internet of things (IoT) develop significantly. But IoT also has weaknesses in communication, one of which can be overcome by utilizing message querying telemetry transfer (MQTT) because there are too many benefits of MQTT. Because there have been many published studies regarding MQTT, this study aims to conduct a review utilizing Preferred reporting items for systematic reviews and meta-analyses (PRISMA) on the application of MQTT in IoT applications to enhance technology. The results of using PRISMA were 57 papers selected from this process, which starts from the identification stage, screening, eligibility, and included. The last author found components that can be discussed to enhance technology. In this discussion, several topics will be used to enhance technology, such as; smart technology, security, MQTT performance for IoT, monitoring systems, MQTT comparison, enhancement or optimization. This paper is expected to help academia and industry related to MQTT research that can help IoT to enhance technology quality.
{"title":"Message querying telemetry transfer on IoT applications to enhance technology: a systematic review","authors":"M. H. Widianto, Ranny Ranny","doi":"10.11591/ijres.v11.i3.pp265-274","DOIUrl":"https://doi.org/10.11591/ijres.v11.i3.pp265-274","url":null,"abstract":"More things are connected to the Internet, making the internet of things (IoT) develop significantly. But IoT also has weaknesses in communication, one of which can be overcome by utilizing message querying telemetry transfer (MQTT) because there are too many benefits of MQTT. Because there have been many published studies regarding MQTT, this study aims to conduct a review utilizing Preferred reporting items for systematic reviews and meta-analyses (PRISMA) on the application of MQTT in IoT applications to enhance technology. The results of using PRISMA were 57 papers selected from this process, which starts from the identification stage, screening, eligibility, and included. The last author found components that can be discussed to enhance technology. In this discussion, several topics will be used to enhance technology, such as; smart technology, security, MQTT performance for IoT, monitoring systems, MQTT comparison, enhancement or optimization. This paper is expected to help academia and industry related to MQTT research that can help IoT to enhance technology quality.","PeriodicalId":158991,"journal":{"name":"International Journal of Reconfigurable and Embedded Systems (IJRES)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124720661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}