Abstract
Internet of thing (IoT) building sensors can capture several types of building operations, performances, and conditions and send them to a central dashboard to analyze data to support decision-making. Traditionally, laptops and cell phones are the majority of Internet-connected devices. IoT tracking allows customers to close the distance between devices and enterprises by collecting and analyzing various IoT data through connected devices, customers, and applications on the network. There is a lack of requirements for IoT edge applications security and approval. There are no best practices regarding operations focused on IoT incidents. IoT elements are not covered by audit and logging requirements. In this article, a big data analytics-based customer operation (BDA-CO) system analyzes the operation. With the exponential rise in data usage, the explosive development in the IoT devices reflects the ideal overlap of big data growth with IoT. Big data analytics continuously evolving network raises trivial questions about the performance, distribution of data, analysis, and protection of data collection. IoT modifies almost all the construction industry characteristics. Human-centered artificial intelligence is described as systems that always improve because of human input while also delivering an effective experience between the human and the robotic. The IoT is the key factor that ensures greater building performance. It was the first evolution of technology in a long time to turn genuine inventions into an industry that depended heavily on paper and manual processes. The benefits of the IoT in construction are now quite obviously much heavier than those of current manual processes. As a result, more construction companies explore and incorporate IoT strategies to address their productivity challenges, increasing efficiencies and profits. The simulation analysis shows that the proposed BDA-CO model enhances the trust score of 98.5%, accuracy detection ratio of 93.4%, probability ratio of 97.6%, and security ratio of 98.7% and reduces the false negative ratio of 21.3%, response time of 10.5%, delay rate of 19.9%, and packet loss ratio of 15.4% when compared to other existing techniques.
1 Overview of the building management based on IoT and big data analytics
Cities are becoming more and more of a pivotal point for our societies and economies, predominantly due to ongoing urbanization and progressively knowledge-intensive economies and their increasing share of emissions and resource consumption [1]. In addition, the construction industry influences the living and working quality of all citizens. The building must thus include methods for minimizing its energy consumption and improving occupant comfort and productivity (including by integrating the energy sources for their energy sustainability) [2]. The number of Internet-linked devices and objects has recently surpassed the number of persons on Earth, designing the dawn of a modern era of the Internet of things (IoT). IoT is the fundamental enabler for smart settings that allow the interaction among intelligent objects and the successful integration into the digital world of actual information and knowledge [3]. Smart objects, instrumented with interaction and sensing abilities and identifying technologies, give a far more detailed way to gain information about the actual world than ever before that real-world entities, and other agents in intelligent ecosystems may be influenced in real time [4]. IoT devices have been rolling out mostly in industrial and business scenarios. Their potential for smart applications, which meet the demands of individual inhabitants, customer communities, or the wider community, is restricted and unclear to many individuals [5]. Releasing IoT’s full potential demands shifting beyond company-centric systems to a user-inclusive IoT system that encouraged IoT devices and contributed data flows from individuals [6]. This will enable us to open a range of new user-centered IoT data and initiate a unique production of high-value services for the public. In this view, the IoT paradigm’s fundamental strength lies in its substantial influence on various elements of potential consumers’ daily lives and behavior [7,8].
An accurate simulation model must be provided in a thorough description of the structure and its subsystems, yet it incorporates all those parts, which need the most effort [9]. IoT and big data are developing technologies that can be used to generate knowledge and support energy-efficient building applications. Building energy management relies heavily on accurate forecasts of heating and cooling needs. Correlation analysis is used to establish the input variables for the hybrid machine learning-based predictive model. The daily weather profile’s recurring patterns can be found using clustering analysis. As a result, the annual profile can be divided into various feature categories. In human-centered artificial intelligence (AI) for each group of weather profiles, IoT sensor data, building operation schedules, and heating/cooling demand are utilized for training the sub-artficial neural network predictive models.
The major contribution of this article is as follows:
Designing the big data analytics-based customer operation (BDA-CO) system for smart building management.
The scale of IoT applications is promoted, and the goal of IoT customer operations big data is realized.
The simulation analysis has been performed, and the recommended model increases the security rate, trust score, accurate detection ratio, and probability ratio and reduces the packet loss, delay, response time, and false negative ratio (FNR) compared to other popular models.
In the context of human-centered AI, algorithms must be created to understand that they are part of a bigger system that includes human beings.
The remainder of this study is structured as follows: Sections 1 and 2 deliberated the overview and related works on the smart building management system. In Section 3, the BDA-CO model has been recommended. In Section 4, numerical results have been executed. Finally, Section 5 concludes the research article.
2 Related works
Mohammed et al. [10] introduced the supervisory control and data acquisition (SCADA) system to optimize energy consumption and thermal comfort for intelligent building management systems. The key characteristic of the real-time model is to anticipate the inside building environment to regulate the interior heating system, ventilation, and air conditioning and use the maximum power consumption under the optimized air temperature value.
Harasymiuk et al. [11,12] suggested the terrestrial laser scanning (TLS) method for building management systems. 3D TLS is an advanced measuring technology that enables a great deal of data to be obtained in little time.
Yang et al. [13] proposed the IoT-oriented intelligent building management system (IoT-IBMS). The measurement of IoT characteristics to assess and determine management systems for intelligent building is integrated into an IoT-oriented decision-making model employing the multiple-criteria decision making procedure and incorporating the zero-one objectives in an optimal portfolio process an activity-based evaluation of costs and limitation resources. The fundamental involvement of this work is to develop novel decision models incorporating resource and costing requirements based on activities in IBM’s optimal selection of the portfolio [14].
Ramelan et al. [15] initialized the long range (LoRA) modulation and message queuing telemetry transport (MQTT) (LoRA-MQTT) protocol for Building Energy Monitoring and Controlling System. A series of sensors with a power source attached to the model through a microcontroller with LoRA communication interfaces are then termed nodes to deliver electrical power to energy monitoring systems.
In the study by Reddy [16], data scientists carried out the task by creating heuristic algorithms and models that will be useful in the future. Data science can be a lucrative professional path because of the combination of technology and concepts.
In this article, the BDA-CO model has been suggested to overcome the existing issues. Section 3 discusses the proposed BDA-CO model briefly.
3 Big data analytics-based customer operation
This article examined the efficacy of a trust calculation model for context-based assessment systems for the intelligent building projects, allowing the customer to trust the service provider in an IoT environment. The customer may select the best service provider based on the estimated trust score for every requested service. It is neither enough to send out the newest observation nor enough to communicate the web log-likelihood relationship for optimal detection with restricted communication. Nevertheless, the latter is not sufficiently near-optimal and global Hidden Markov model (HMM) avoids its high demands for communication. The proposed architecture uses sensors that execute an HMM algorithm independently to provide local estimations of the probability ratio of user status (presence or absence). According to a suggested new communication method, the individual sensors’ interaction is based on local confidence in their benefit and updates their estimates according to collaborative fusion functions.
Figure 1 shows the user data collection. The efficacy and application of such a system are strongly linked to the quality and interaction of its building pieces and different approaches to IoT design. This image discusses our practical experience with our IoT developers to introduce their unique ideas of a scalable and flexible IoT architecture. The graphic showing the architectural elements of an IoT system and how the information is being collected, stored, or processed reflects our approach to the IoT architecture.

User data collection.
Figure 2 shows how a user from here on interacts with this infrastructure. To define regulations about collecting and administering the information in the building, the BDA-OC building administrator uses the intelligent building management system (stage (1) in Figure 2). Based on these principles, the many sensors within the building are operated, and data are taken and stored from them, some of which may be associated with their residents (stage (2)) and captured to save data. The IoT Resource Registers (stage (4)) provide public access to these policies. IoT accessibility IoTA detects existing resource-related registrations. It receives machine-readable privacy policies that define resource practices near the user site in the building with their smartphone IoTA installed in it (stage (5)). The IoTA shows the user summaries of the relevant aspects of these rules (stage 6) by concentrating on a policy that respects the user’s privacy choices. The BDA-OC data protection model is used and learned over time. This can include gathering information and applying information-informing techniques (step (7)). If the policy identifies settings, IoTA can utilize knowledge about preferences of BDA-OC privacy to assist user-controlled configuration of these settings (step (8)). If there are further user location requests for service (phase (9)), the application will be handled according to BDA-desired OC’s settings for opting out of sharing locations; stage (10). Users built a machine-readable political language to record and transmit building policies of green building to the population to accomplish this interaction. The policy language transmits user preferences and settings to the intelligent building system using IoTA. In the interaction mentioned earlier, several parts might make a difference using language to market the building regulations (stage (4)) match them to user preferences (stage (5)).

Building-based user interaction.
The local individual nodes are based on an HMM, their best belief about the occupation. Then when required, data between sensors are transmitted. Figure 2 presents the overall architectural system for the suggested occupancy-based control technique.
The human presence as a Markovian on–off process in our prior study of the mixturistic fusion with two alternative user statements
Matrix of state transition likelihood:
Probability matrix for emission:
As shown in equation (1), emission probability has been calculated. The initial vector of probability status is expressed as
The labeled observations and statements have been employed in a training stage to determine the HMM model parameters. In a given
As deliberated in equation (2), a partial probability observation sequence has been computed. The presence of the detection system enables each unique independent sensor to determine its optimal user status dynamically, whether present or absent in our example. The node predicts the likelihood of the user status given earlier user behavior knowledge. A single test node j estimates, in particular,
As obtained in equation (3), two-state user behavior has been analyzed. Where
As found in equation (4), the probability ratio has been obtained. This offers the absolute probability a lot more intuitive to deal with, making the priors a good element. When conducting a random experiment and looking at the probability ratio, one may determine how likely an event will occur. Enumeration or counting of the sample space becomes tiresome with infinite possible outcomes. Personalized customer experiences, web application automation, and web 4.0 goals can be achieved by utilizing human-centered AI better to understand end users’ deeper requirements and aspirations. In the probability ratio
As initialized in equation (5), user inductively has been described. According to the following decision rule, user status can eventually be assessed/determined by every node. The paradigm, also known as inductive navigation, offers how to simplify software applications by dividing functions into screens or pages that are simple to explain and grasp. In addition to this, it aids in a more successful product development process that is more robust and scalable. There are many advancements in human-centered AI for web 4.0, and this special issue is designed to highlight these developments.
As calculated in equation (6), the decision rule has been discussed, where φ is a specified threshold for presence/absence. Normally, values of
In our opinion, a multisensory system where each sensor provides a status observation at each unit S, namely, observation
As introduced, the threshold function in equation (7). The choice of α threshold defines the traffic load. No suitable fusion function E has been previously examined for restricted communication, to the best of our knowledge. The mathematical formulation of merging many sensor observations in an HMM framework is provided.
As deliberated in equation (8), HMM multiple sensor observation has been performed, where the common probability ratio is
As shown in equation (9), Bayes rule has been discussed and conditional independence calculated in equation (10)
As obtained in equation (10), conditional independence has been calculated. This is a multiplication of the n individual probability ratio correction of
As initialized in equation (11), the correction term has been computed. The number of time a person enters a room is equal to the number of times the person departs the room since the transitions between states is balanced, the ratio of the previous chances may be stated as follows:
As expressed in equation (12), prior probability has been evaluated to increase the trust score. This word can be seen as a correction term that prohibits duplicate counting of the priors by the function. Measurement merger formula: Experimentally, a simple averaging function had been an efficient functional fusion technology:
As demonstrated in equation (13), average fusion has been formulated. The decision rule is the same as described.
Figure 3 illustrates building management. The most common way to address environmental issues is that intelligent construction designs are inherent solutions. They include optimum use of time, space and other resources available, increased usefulness, and the efficient use of materials and technology. Superior and exemplary use of the smart and automated IoT-based technologies are smart buildings. It comprises several structures (sensors, data sink nodes, server nodes, etc.) that automatically regulate different activities, including smart managing resources, conditioning systems, illuminating and fire sensing, security, and privacy. There is a hidden problem with their stability with the various environmental challenges. Some servers perform different procedures on these data sink nodes’ requests. Several disruptive technologies will be critical to successfully developing and deploying web 4.0 in practice. Human-centered AI can make a difference for web 4.0 in this specific area. Human-centered AI aims to design algorithms that learn from human inputs and collaboration.

Building management.
The existing user experience of V
B
in connection with T
i
, a service provider offering
As shown in equation (14) and Figure 4, US has been explored for accurate detection and less packet loss. Equation (14) explains that

User satisfaction.
As deliberated in equation (15), direct trust has been discussed to increase the high-security rate. First, the estimate of
Service provider similarity
As described in equation (16), service provider similarity has been expressed. The list includes the instance in which the estimated similitude index is 0.5−1 at that time. This filtered list will be transmitted to the service provider for context evaluation in the following phase.
As discussed in equation (17), service provider location similarity has been performed. This filtered list is submitted for contextual evaluation of services obtained from a service provider similarly positioned in the subsequent step. The similarity of service providers is supplied with the similarity index to calculate the kind of service. This is calculated to further assess the received list for its sort of similarity. The nodes that used the same sort of service as CNV
A
are then added. CNV
A
will swap its list of services with all
As explored in equation (18), service provider service similarity has been calculated. Based on the service similarity result of the recommended node, whether the node is included in the filtered list for a suggestion. The
As found in equation (19), indirect trust has been demonstrated. CNV
B
may now take into account the nodes specified in
As obtained in equation (20), total trust has been computed.
In equation (21),
In Figure 5, the human-centered approach keeps humans in the loop when developing AI to monitor for bias in algorithmic choices. More objective decisions may be made by algorithms than those made by humans who are susceptible to bias, conflict of interest, or exhaustion. It has been argued that algorithmic decision-making can lead to privacy invasion, information asymmetry, opacity, and discrimination of some sort.

Human-centered AI.
Figure 6 explores building-based user authentication. Big Data Analytics’ primary objective is to analyze vast amounts, including other data sources, and standard business intelligence tools cannot use in data-driven decision-making and data-driven applications. Data warehouse or business intelligence architectures are not altered by big data analytics. It adds new technologies and access ways better targeted to fulfill end users’ information needs, including business analysts and data scientists. The proposed BDA-CO model enhances the trust score, accuracy detection ratio, probability ratio, and security ratio, and reduces the FNR, response time, delay rate, and packet loss ratio.

Building-based user authentication.
4 Numerical results and discussion
4.1 Accurate detection ratio
Trust management and data security in intelligent buildings are sensitive, vital, and essential to achieving reliability and security. Intelligent buildings are one of the conspicuous and archetypal uses of IoT-based smart and automated systems. A prearranged structure comprises various resources (data sink node, server node, sensors) to automatically regulate different operations like intelligent resource management, fire detection, lighting, privacy, air conditioning, and security. The proposed BDA-CO model enhances the accurate detection ratio compared to other popular models. Figure 7 demonstrates the accurate detection ratio of the BDA-CO model.

Accurate detection ratio.
4.2 Probability rate
The transition likelihoods define how space changes occupancy over the period. Since this study assumes two probable states, two transition likelihoods must be stated. The first state distribution defines the occupancy likelihood at the preliminary period stage

Probability ratio.
4.3 Response time ratio
The service provider’s feedback rating plays a crucial role in service computing. This feedback is delivered by the customer having direct communication with service providers, and it depends on some nonfunctional features. These features may contain response time, throughput, and accessibility of server to deliver requested services. Numerous trust management methods do not deliberate these nonfunctional features to contain settings while computing the server’s trust values. This study utilized the executed scenario’s response time the overall round trip time for request services. It is calculated as the overall period needed to request services and lastly accepts its response from service providers. Figure 9 illustrates the response time of the suggested BDA-CO method.

Response time.
4.4 Packet loss ratio
For a situation with several nodes making their noise observation, prediction can be attained if every node interchange every observation at each time unit. However, this leads to unnecessary communication loads. If sensor communication is reserved, it is an open question of what data nodes rather interchange. A pragmatic method could be to send the newest and a few current observations in each packet. However, this postures key computational and memory needs. This study quantifies the decrease in data interchange among nodes mainly as a key battery life extension. Hence, it decreases traffic load and decreases packet losses and interference because of the collision while preserving prediction performance. Figure 10 shows the packet loss ratio.

Packet loss ratio.
4.5 Security rate
The building management system captures a digital depiction of a dynamically developing building at any point in period for goals like security and comfort based on big data analytics. This representation must contain different patterns that can disclose the presence or absence of individuals and their actions, potentially resultant in the disclosure of information that individuals may not feel comfortable revealing. Context defines meta-information about the building and the building management system that points customers to general information. This meta-information can contain a common description of data ownership and security of relevant data to the customers. The proposed BDA-CO model enhances the security rate in a smart building environment compared to other existing models (Figure 11).

Security rate.
4.6 False negative ratio
The FNR is the overall period that the proposed that BDA-CO incorrectly assumed nonpresence standardized over the overall presence period. Therefore, utilizing a logarithmic form permits us to modify the threshold better to trade-off false negatives and false positives. The FNR can be inferred as an extent that reproduces user discomfort or annoyance. The average power usage per desk is simply an average daily energy use per luminaire. Manual control shows how users handle a lighting system. This research assumes that the first time an individual enters the room, the lights turn on, and finally when the individual departs the room, the lights will be switched off. This situation is the basis of our comparison. An ideal classifier decreases the usage of lighting systems for energy purposes (light activated if the user is present; zero false negative rate). Figure 12 shows the FNR.

False negative ratio.
4.7 Trust score
The trust scores for services are computed on the user’s preceding interface and suggestions from the same users. This study offers context-based trust management solutions for intelligent building applications that can utilize customers’ undeviating proficiencies determined via a service retrieved in various environments. The malicious nodes are strained out in an unintended trust evaluation progression that their recommendation does not have any critical influence on overall trust scores. Our services assortment process is exceptional in terms of data assortment. The data utilized in the service assortment procedure depend on the contextual data of service providers, which is utilized to be dynamic in trust evaluation. Figure 13 displays the trust score ratio of the suggested BDA-CO model.

Trust score rate.
Table 1 signifies the delay rate of the suggested BDA-CO model. Smart monitoring systems, like automated lighting systems, in which the time delay among the response of this automated system and the activities executed can decrease any energy savings, while a speedy response can produce incompetent activities. Although these monitoring systems contribute to the energy efficiency of an infrastructure that integrates actuators with sensors to manage and change the total energy usage, they demand considerable investments in intelligent infrastructures. These networks typically limit their sustainability due to their costs and difficulties.
Delay rate
Number of devices | SCADA | TLS | IoT-IBMS | LoRA-MQTT | BDA-CO |
---|---|---|---|---|---|
10 | 67.9 | 68.2 | 65.9 | 63.8 | 58.9 |
20 | 64.2 | 65.4 | 63.3 | 60.2 | 55.3 |
30 | 60.4 | 64.5 | 66.1 | 68.3 | 53.3 |
40 | 54.5 | 56.7 | 57.2 | 58.4 | 45.3 |
50 | 50.6 | 53.9 | 52.4 | 55.5 | 41.4 |
60 | 48.8 | 49.8 | 47.6 | 44.6 | 38.4 |
70 | 42.9 | 43.7 | 45.4 | 42.8 | 33.6 |
80 | 41.8 | 54.5 | 39.6 | 32.7 | 27.7 |
90 | 34.5 | 35.2 | 36.7 | 38.9 | 21.8 |
100 | 33.2 | 35.3 | 27.8 | 28.2 | 19.9 |
Table 2 compares the performance of existing technology with the proposed method. Because they need significant investments in intelligent infrastructures, these monitoring systems can help improve infrastructure’s energy efficiency by integrating actuators with sensors to regulate and adjust the total energy use. In building, current manual techniques are clearly outperformed by the IoT. Human-centered AI learns from human input and cooperation, concentrating on algorithms part of a larger, human-based system. The term human-centered AI refers to AI systems that are constantly improved by the input of humans while also delivering a positive human–robot interaction.
Comparison of performance
Number of dataset | SCADA | TLS | IoT-IBMS | BDA-CO |
---|---|---|---|---|
10 | 30.01 | 38.33 | 35.14 | 36.56 |
20 | 34.51 | 39.45 | 41.24 | 20.6 |
30 | 41.36 | 34.15 | 34.19 | 46.99 |
40 | 20.21 | 29.47 | 43.76 | 62.62 |
50 | 42.56 | 56.33 | 69.33 | 69.34 |
60 | 33.98 | 47.14 | 36.54 | 41.98 |
70 | 51.54 | 21.89 | 56.39 | 36.41 |
80 | 67.22 | 65.25 | 65.25 | 59.89 |
90 | 72.36 | 82.66 | 66.15 | 83.57 |
The proposed BDA-CO model enhances the trust score, accuracy detection ratio, probability ratio, and security ratio and reduces the FNR, response time, delay rate, and packet loss ratio when compared to other existing SCADA, TLS, IoT-IBMS, and LoRA-MQTT methods.
5 Conclusion
This article introduced and investigated the effectiveness of the contextual evaluation system model in determining consumer confidence in intelligent building applications in IoT service providers. The consumer may choose the best service provider for every service requested based on the assessed trust value. It is not enough to communicate the newest observation or simply provide the logic ratio to optimize detection and restricted communication. Nevertheless, this article finds that the latter is relatively near the optimal global HMM, which does not need much communication. The proposed architecture consists of sensors that automatically execute an HMM algorithm to determine the user probability ratio (presence or absence). In addition, as the volume of data generated by IoT sensors grows, so does the difficulty of managing and protecting that data. Data must be protected against unwanted access to function properly. Developing an effective cyber security strategy for a future big data platform will assure data privacy and the uncompromising behavior of its stakeholders. Human-centered AI helps scientists and industry experts to produce powerful tools, convenient web apps, well-designed web services, and products that better serve the requirements of humans. According to a suggested new communication method, the individual sensors’ communication is based on local confidence in their user state and updates their estimates according to collaborative fusion functions.
-
Conflict of interest: The authors state no conflict of interest.
References
[1] Salhaoui M, Guerrero-González A, Arioua M, Ortiz FJ, El Oualkadi A, Torregrosa CL. Smart industrial iot monitoring and control system based on UAV and cloud computing applied to a concrete plant. Sensors. 2019;19(15):3316.10.3390/s19153316Search in Google Scholar PubMed PubMed Central
[2] Lu Y, Xu X. Cloud-based manufacturing equipment and big data analytics to enable on-demand manufacturing services. Robot Computer-Integrated Manuf. 2019;57:92–102.10.1016/j.rcim.2018.11.006Search in Google Scholar
[3] Ren S, Zhang Y, Liu Y, Sakao T, Huisingh D, Almeida CM. A comprehensive review of big data analytics throughout product lifecycle to support sustainable smart manufacturing: A framework, challenges and future research directions. J Clean Prod. 2019;210:1343–65.10.1016/j.jclepro.2018.11.025Search in Google Scholar
[4] You Z, Wu C. A framework for data-driven informatization of the construction company. Adv Eng Inform. 2019;39:269–77.10.1016/j.aei.2019.02.002Search in Google Scholar
[5] Anshari M, Almunawar MN, Lim SA, Al-Mudimigh A. Customer relationship management and big data enabled: Personalization & customization of services. Appl Comput Inform. 2019;15(2):94–101.10.1016/j.aci.2018.05.004Search in Google Scholar
[6] Zahid AH, Iliyasu AM, Ahmad M, Shaban MMU, Arshad MJ, Alhadawi HS, et al. A novel construction of dynamic S-Box with high nonlinearity using heuristic evolution. IEEE Access. 2021;9:67797–812.10.1109/ACCESS.2021.3077194Search in Google Scholar
[7] Manogaran G, Varatharajan R, Lopez D, Kumar PM, Sundarasekar R, Thota C. A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system. Future Gener Computer Syst. 2018;82:375–87.10.1016/j.future.2017.10.045Search in Google Scholar
[8] Behera RK, Reddy KHK, Sinha, Roy D. Modeling and assessing reliability of service-oriented Internet of things. Int J Computers Appl. 2019;41(3):195–206.10.1080/1206212X.2017.1420589Search in Google Scholar
[9] Yang A, Li Y, Kong F, Wang G, Chen E. Security control redundancy allocation technology and security keys based on internet of things. IEEE Access. 2018;6:50187–96.10.1109/ACCESS.2018.2868951Search in Google Scholar
[10] Mohammed SA, Awad OA, Radhi AM. Optimization of energy consumption and thermal comfort for intelligent building management system using genetic algorithm. Indonesian J Electr Eng Computer Sci. 2020;20(3):1613–25.10.11591/ijeecs.v20.i3.pp1613-1625Search in Google Scholar
[11] Harasymiuk J, Pawlowicz JA, Szafranko E. The TLS method as an element of the building management system. IOP Conf Series: Mater Sci Eng. 2019 (September);603:052054.10.1088/1757-899X/603/5/052054Search in Google Scholar
[12] Yin N. A big data analysis method based on modified collaborative filtering recommendation algorithms. Open Phys. 2019;17(1):966–74.10.1515/phys-2019-0102Search in Google Scholar
[13] Yang CH, Lee KC, Li SE. A mixed activity-based costing and resource constraint optimal decision model for IoT-oriented intelligent building management system portfolios. Sustain Cities Soc. 2020;60:102142.10.1016/j.scs.2020.102142Search in Google Scholar
[14] Al-Shawakfa E, Alsghaier H. An empirical study of cloud computing and big data analytics. Int J Innovative Comput Appl. 2018;9(3):180–8.10.1504/IJICA.2018.093736Search in Google Scholar
[15] Ramelan A, Adriyanto F, Hermanu BAC, Ibrahim MH, Saputro JS, Setiawan O. IoT Based Building Energy Monitoring and Controlling System Using LoRa Modulation and MQTT Protocol. IOP Conf Series: Mater Sci Eng. 2021, March;1096(1):012069. IOP Publishing.10.1088/1757-899X/1096/1/012069Search in Google Scholar
[16] Reddy R. Research on data science, data analytics and big data. SSRN Electron J. 2020;9(5):99–105.Search in Google Scholar
© 2022 Xinxin Liu et al., published by De Gruyter
This work is licensed under the Creative Commons Attribution 4.0 International License.
Articles in the same Issue
- Research Articles
- Construction of 3D model of knee joint motion based on MRI image registration
- Evaluation of several initialization methods on arithmetic optimization algorithm performance
- Application of visual elements in product paper packaging design: An example of the “squirrel” pattern
- Deep learning approach to text analysis for human emotion detection from big data
- Cognitive prediction of obstacle's movement for reinforcement learning pedestrian interacting model
- The application of neural network algorithm and embedded system in computer distance teach system
- Machine translation of English speech: Comparison of multiple algorithms
- Automatic control of computer application data processing system based on artificial intelligence
- A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing
- Application of mining algorithm in personalized Internet marketing strategy in massive data environment
- On the correction of errors in English grammar by deep learning
- Research on intelligent interactive music information based on visualization technology
- Extractive summarization of Malayalam documents using latent Dirichlet allocation: An experience
- Conception and realization of an IoT-enabled deep CNN decision support system for automated arrhythmia classification
- Masking and noise reduction processing of music signals in reverberant music
- Cat swarm optimization algorithm based on the information interaction of subgroup and the top-N learning strategy
- State feedback based on grey wolf optimizer controller for two-wheeled self-balancing robot
- Research on an English translation method based on an improved transformer model
- Short-term prediction of parking availability in an open parking lot
- PUC: parallel mining of high-utility itemsets with load balancing on spark
- Image retrieval based on weighted nearest neighbor tag prediction
- A comparative study of different neural networks in predicting gross domestic product
- A study of an intelligent algorithm combining semantic environments for the translation of complex English sentences
- IoT-enabled edge computing model for smart irrigation system
- A study on automatic correction of English grammar errors based on deep learning
- A novel fingerprint recognition method based on a Siamese neural network
- A hidden Markov optimization model for processing and recognition of English speech feature signals
- Crime reporting and police controlling: Mobile and web-based approach for information-sharing in Iraq
- Convex optimization for additive noise reduction in quantitative complex object wave retrieval using compressive off-axis digital holographic imaging
- CRNet: Context feature and refined network for multi-person pose estimation
- Improving the efficiency of intrusion detection in information systems
- Research on reform and breakthrough of news, film, and television media based on artificial intelligence
- An optimized solution to the course scheduling problem in universities under an improved genetic algorithm
- An adaptive RNN algorithm to detect shilling attacks for online products in hybrid recommender system
- Computing the inverse of cardinal direction relations between regions
- Human-centered artificial intelligence-based ice hockey sports classification system with web 4.0
- Construction of an IoT customer operation analysis system based on big data analysis and human-centered artificial intelligence for web 4.0
- An improved Jaya optimization algorithm with ring topology and population size reduction
- Review Articles
- A review on voice pathology: Taxonomy, diagnosis, medical procedures and detection techniques, open challenges, limitations, and recommendations for future directions
- An extensive review of state-of-the-art transfer learning techniques used in medical imaging: Open issues and challenges
- Special Issue: Explainable Artificial Intelligence and Intelligent Systems in Analysis For Complex Problems and Systems
- Tree-based machine learning algorithms in the Internet of Things environment for multivariate flood status prediction
- Evaluating OADM network simulation and an overview based metropolitan application
- Radiography image analysis using cat swarm optimized deep belief networks
- Comparative analysis of blockchain technology to support digital transformation in ports and shipping
- IoT network security using autoencoder deep neural network and channel access algorithm
- Large-scale timetabling problems with adaptive tabu search
- Eurasian oystercatcher optimiser: New meta-heuristic algorithm
- Trip generation modeling for a selected sector in Baghdad city using the artificial neural network
- Trainable watershed-based model for cornea endothelial cell segmentation
- Hessenberg factorization and firework algorithms for optimized data hiding in digital images
- The application of an artificial neural network for 2D coordinate transformation
- A novel method to find the best path in SDN using firefly algorithm
- Systematic review for lung cancer detection and lung nodule classification: Taxonomy, challenges, and recommendation future works
- Special Issue on International Conference on Computing Communication & Informatics
- Edge detail enhancement algorithm for high-dynamic range images
- Suitability evaluation method of urban and rural spatial planning based on artificial intelligence
- Writing assistant scoring system for English second language learners based on machine learning
- Dynamic evaluation of college English writing ability based on AI technology
- Image denoising algorithm of social network based on multifeature fusion
- Automatic recognition method of installation errors of metallurgical machinery parts based on neural network
- An FCM clustering algorithm based on the identification of accounting statement whitewashing behavior in universities
- Emotional information transmission of color in image oil painting
- College music teaching and ideological and political education integration mode based on deep learning
- Behavior feature extraction method of college students’ social network in sports field based on clustering algorithm
- Evaluation model of multimedia-aided teaching effect of physical education course based on random forest algorithm
- Venture financing risk assessment and risk control algorithm for small and medium-sized enterprises in the era of big data
- Interactive 3D reconstruction method of fuzzy static images in social media
- The impact of public health emergency governance based on artificial intelligence
- Optimal loading method of multi type railway flatcars based on improved genetic algorithm
- Special Issue: Evolution of Smart Cities and Societies using Emerging Technologies
- Data mining applications in university information management system development
- Implementation of network information security monitoring system based on adaptive deep detection
- Face recognition algorithm based on stack denoising and self-encoding LBP
- Research on data mining method of network security situation awareness based on cloud computing
- Topology optimization of computer communication network based on improved genetic algorithm
- Implementation of the Spark technique in a matrix distributed computing algorithm
- Construction of a financial default risk prediction model based on the LightGBM algorithm
- Application of embedded Linux in the design of Internet of Things gateway
- Research on computer static software defect detection system based on big data technology
- Study on data mining method of network security situation perception based on cloud computing
- Modeling and PID control of quadrotor UAV based on machine learning
- Simulation design of automobile automatic clutch based on mechatronics
- Research on the application of search algorithm in computer communication network
- Special Issue: Artificial Intelligence based Techniques and Applications for Intelligent IoT Systems
- Personalized recommendation system based on social tags in the era of Internet of Things
- Supervision method of indoor construction engineering quality acceptance based on cloud computing
- Intelligent terminal security technology of power grid sensing layer based upon information entropy data mining
- Deep learning technology of Internet of Things Blockchain in distribution network faults
- Optimization of shared bike paths considering faulty vehicle recovery during dispatch
- The application of graphic language in animation visual guidance system under intelligent environment
- Iot-based power detection equipment management and control system
- Estimation and application of matrix eigenvalues based on deep neural network
- Brand image innovation design based on the era of 5G internet of things
- Special Issue: Cognitive Cyber-Physical System with Artificial Intelligence for Healthcare 4.0.
- Auxiliary diagnosis study of integrated electronic medical record text and CT images
- A hybrid particle swarm optimization with multi-objective clustering for dermatologic diseases diagnosis
- An efficient recurrent neural network with ensemble classifier-based weighted model for disease prediction
- Design of metaheuristic rough set-based feature selection and rule-based medical data classification model on MapReduce framework
Articles in the same Issue
- Research Articles
- Construction of 3D model of knee joint motion based on MRI image registration
- Evaluation of several initialization methods on arithmetic optimization algorithm performance
- Application of visual elements in product paper packaging design: An example of the “squirrel” pattern
- Deep learning approach to text analysis for human emotion detection from big data
- Cognitive prediction of obstacle's movement for reinforcement learning pedestrian interacting model
- The application of neural network algorithm and embedded system in computer distance teach system
- Machine translation of English speech: Comparison of multiple algorithms
- Automatic control of computer application data processing system based on artificial intelligence
- A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing
- Application of mining algorithm in personalized Internet marketing strategy in massive data environment
- On the correction of errors in English grammar by deep learning
- Research on intelligent interactive music information based on visualization technology
- Extractive summarization of Malayalam documents using latent Dirichlet allocation: An experience
- Conception and realization of an IoT-enabled deep CNN decision support system for automated arrhythmia classification
- Masking and noise reduction processing of music signals in reverberant music
- Cat swarm optimization algorithm based on the information interaction of subgroup and the top-N learning strategy
- State feedback based on grey wolf optimizer controller for two-wheeled self-balancing robot
- Research on an English translation method based on an improved transformer model
- Short-term prediction of parking availability in an open parking lot
- PUC: parallel mining of high-utility itemsets with load balancing on spark
- Image retrieval based on weighted nearest neighbor tag prediction
- A comparative study of different neural networks in predicting gross domestic product
- A study of an intelligent algorithm combining semantic environments for the translation of complex English sentences
- IoT-enabled edge computing model for smart irrigation system
- A study on automatic correction of English grammar errors based on deep learning
- A novel fingerprint recognition method based on a Siamese neural network
- A hidden Markov optimization model for processing and recognition of English speech feature signals
- Crime reporting and police controlling: Mobile and web-based approach for information-sharing in Iraq
- Convex optimization for additive noise reduction in quantitative complex object wave retrieval using compressive off-axis digital holographic imaging
- CRNet: Context feature and refined network for multi-person pose estimation
- Improving the efficiency of intrusion detection in information systems
- Research on reform and breakthrough of news, film, and television media based on artificial intelligence
- An optimized solution to the course scheduling problem in universities under an improved genetic algorithm
- An adaptive RNN algorithm to detect shilling attacks for online products in hybrid recommender system
- Computing the inverse of cardinal direction relations between regions
- Human-centered artificial intelligence-based ice hockey sports classification system with web 4.0
- Construction of an IoT customer operation analysis system based on big data analysis and human-centered artificial intelligence for web 4.0
- An improved Jaya optimization algorithm with ring topology and population size reduction
- Review Articles
- A review on voice pathology: Taxonomy, diagnosis, medical procedures and detection techniques, open challenges, limitations, and recommendations for future directions
- An extensive review of state-of-the-art transfer learning techniques used in medical imaging: Open issues and challenges
- Special Issue: Explainable Artificial Intelligence and Intelligent Systems in Analysis For Complex Problems and Systems
- Tree-based machine learning algorithms in the Internet of Things environment for multivariate flood status prediction
- Evaluating OADM network simulation and an overview based metropolitan application
- Radiography image analysis using cat swarm optimized deep belief networks
- Comparative analysis of blockchain technology to support digital transformation in ports and shipping
- IoT network security using autoencoder deep neural network and channel access algorithm
- Large-scale timetabling problems with adaptive tabu search
- Eurasian oystercatcher optimiser: New meta-heuristic algorithm
- Trip generation modeling for a selected sector in Baghdad city using the artificial neural network
- Trainable watershed-based model for cornea endothelial cell segmentation
- Hessenberg factorization and firework algorithms for optimized data hiding in digital images
- The application of an artificial neural network for 2D coordinate transformation
- A novel method to find the best path in SDN using firefly algorithm
- Systematic review for lung cancer detection and lung nodule classification: Taxonomy, challenges, and recommendation future works
- Special Issue on International Conference on Computing Communication & Informatics
- Edge detail enhancement algorithm for high-dynamic range images
- Suitability evaluation method of urban and rural spatial planning based on artificial intelligence
- Writing assistant scoring system for English second language learners based on machine learning
- Dynamic evaluation of college English writing ability based on AI technology
- Image denoising algorithm of social network based on multifeature fusion
- Automatic recognition method of installation errors of metallurgical machinery parts based on neural network
- An FCM clustering algorithm based on the identification of accounting statement whitewashing behavior in universities
- Emotional information transmission of color in image oil painting
- College music teaching and ideological and political education integration mode based on deep learning
- Behavior feature extraction method of college students’ social network in sports field based on clustering algorithm
- Evaluation model of multimedia-aided teaching effect of physical education course based on random forest algorithm
- Venture financing risk assessment and risk control algorithm for small and medium-sized enterprises in the era of big data
- Interactive 3D reconstruction method of fuzzy static images in social media
- The impact of public health emergency governance based on artificial intelligence
- Optimal loading method of multi type railway flatcars based on improved genetic algorithm
- Special Issue: Evolution of Smart Cities and Societies using Emerging Technologies
- Data mining applications in university information management system development
- Implementation of network information security monitoring system based on adaptive deep detection
- Face recognition algorithm based on stack denoising and self-encoding LBP
- Research on data mining method of network security situation awareness based on cloud computing
- Topology optimization of computer communication network based on improved genetic algorithm
- Implementation of the Spark technique in a matrix distributed computing algorithm
- Construction of a financial default risk prediction model based on the LightGBM algorithm
- Application of embedded Linux in the design of Internet of Things gateway
- Research on computer static software defect detection system based on big data technology
- Study on data mining method of network security situation perception based on cloud computing
- Modeling and PID control of quadrotor UAV based on machine learning
- Simulation design of automobile automatic clutch based on mechatronics
- Research on the application of search algorithm in computer communication network
- Special Issue: Artificial Intelligence based Techniques and Applications for Intelligent IoT Systems
- Personalized recommendation system based on social tags in the era of Internet of Things
- Supervision method of indoor construction engineering quality acceptance based on cloud computing
- Intelligent terminal security technology of power grid sensing layer based upon information entropy data mining
- Deep learning technology of Internet of Things Blockchain in distribution network faults
- Optimization of shared bike paths considering faulty vehicle recovery during dispatch
- The application of graphic language in animation visual guidance system under intelligent environment
- Iot-based power detection equipment management and control system
- Estimation and application of matrix eigenvalues based on deep neural network
- Brand image innovation design based on the era of 5G internet of things
- Special Issue: Cognitive Cyber-Physical System with Artificial Intelligence for Healthcare 4.0.
- Auxiliary diagnosis study of integrated electronic medical record text and CT images
- A hybrid particle swarm optimization with multi-objective clustering for dermatologic diseases diagnosis
- An efficient recurrent neural network with ensemble classifier-based weighted model for disease prediction
- Design of metaheuristic rough set-based feature selection and rule-based medical data classification model on MapReduce framework