To trace the asset with the antitheft tag, participants use their GPS-enabled smart phones to scan BLE tags through a specific smartphone client application and report the location of the asset to an operation center so that owners can locate their assets. Once such an item (e.g., a bicycle) is stolen, the owner informs the authorities, which, in turn, broadcast an alert signal to activate the BLE sensor. Stolen objects are traced by using a prototype Bluetooth Low Energy (BLE)-based system, which sends signals, thus becoming a beacon. Specifically, an Internet of Things (IoT)-based participatory platform was developed in order to allow asset-tracking tasks to be crowd-sourced to a community. This article focuses on the development of a scheme that, despite its low cost, acts as a smart antitheft system that achieves small property detection. The risk of theft of goods is certainly an important source of negative influence in human psychology. Finally, we conclude with four future research opportunities. Besides, we summarized the artificial intelligence solutions for the physical security and safety of IoT equipment. Afterward, we discuss, among other aspects, anti-theft and anti-vandalism schemes along with circuit and system design, additional sensing devices, biometry and behavior analysis, and tracking methods. Therefore, this paper provides an overview of IoT equipment's physical security and safety to draw attention to new research opportunities in this area. However, an important aspect that is often overlooked in security literature is IoT equipment's physical security and safety, namely, preventing IoT equipment from vandalism and theft. Cyber-security and privacy countermeasures are widely used in IoT equipment, and many studies have been conducted. The connectivity and intelligence of IoT equipment offer improved services, but several technical challenges have emerged in recent years that hinder the widespread application of IoT, e.g., security and safety. We evaluate the proposed method using the open dataset of Nokia Mobile Data Challenge, and experimental results show the effectiveness of the proposed method in personalized location recommendation. To efficiently reduce model parameters, factorization machines are employed to construct the recommendation model, which models feature interactions as the inner products of latent vectors with matrix factorization. Demographic features and location features are also extracted. In this paper, we propose a personalized location recommendation method using mobile phone usage information, which transforms the location recommendation problem into a regression task, and extracts six types of mobile phone usage features to profile users. In addition, abundant mobile phone usage information can be recorded when users are using their phones, e.g., the use frequency of Apps, which can fully reveal the diverse characteristics of different users. However, such little information is not sufficient to profile users accurately. To address this problem, the existing studies usually exploit other information, e.g., demographic features, to characterize users. The cold-start problem is still a great challenge in personalized location recommendation, which makes it difficult to infer a new user’s preferences, because a new user generally has never visited any location at the start. Location recommendation has become a hot research area in recent years.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |