Artificial Intelligence and Machine Learning with RFID Technology for IoT

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: 15 October 2024 | Viewed by 7817

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Engineering, Graduate School, Dongseo University, Sasanggu 47011, Korea
Interests: IoT; VANETs; UAVs; AI; cryptology; network security; side-channel attack; deep learning; cloud computing; computer networks and digital communications
Blockchain Laboratory of Agriculture and Vegetables, Weifang University of Science and Technology, Weifang 262700, China
Interests: artificial intelligence; VANETs; UAVs/drones; deep learning; logistics transportation; mathematics

Special Issue Information

Dear Colleagues,

With the development of science and technology, information technology has also achieved higher development, of which the internet of things occupies an impotant position. The internet of things is a relatively large scale self organizing network, and RFID technology and sensing equipment are the technical foundation of the internet of things. RFID technology is a new type of non contact automatic identification technology, which achieves the purpose of autonatucally identifying target objects by using radio frequency signals and coupling transmation. Users can modify the information acquired from the data of all the RFID tag readings to analyze the best solution for the practical challenges by integrating Machine Learning algorithms with RFID technology.

The aim of this Special Issue is to bring together researchers to disseminate their recent advances related to the challenges and solutions in building Artificial Intelligence Machine Learning with RFID technology for IoT.

The particular topics of interest include, but are not limited to:

  • Antenna design
  • Security issues and protocols
  • RFID Applications
  • Industrial Internet
  • Green RFID Applications
  • Artificial Intelligence Machine Learning with RFID Devices
  • RFID Data Management
  • Middleware for Internet of Things
  • Reader antennas/systems
  • Cryptography, Cybersecurity, and privacy-enhancing techniques
  • RFID-based infrastructures for Internet of Things
  • RFID for Industry 4.0
  • RFID for Smart Cities
  • RFID manufacturing processes, 3D and inkjet printing
  • RFID sensors
  • Modelling, simulation and implementation of RFID-based systems
  • Near Field Communications
  • IoT and 5G wireless sensing based on RFID concepts

Dr. Mohammed Abdulhakim Al-Absi
Dr. Rui Fu
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • IoT 
  • AL and ML 
  • RFID 
  • wierless sensors

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

25 pages, 4614 KiB  
Article
Process Discovery Techniques Recommendation Framework
by Mohammed Abdulhakim Al-Absi and Hind R’bigui
Electronics 2023, 12(14), 3108; https://doi.org/10.3390/electronics12143108 - 17 Jul 2023
Cited by 1 | Viewed by 884
Abstract
In a competitive environment, organizations need to continuously understand, analyze and improve the behavior of processes to maintain their position in the market. Process mining is a set of techniques that allows organizations to have an X-ray view of their processes by extracting [...] Read more.
In a competitive environment, organizations need to continuously understand, analyze and improve the behavior of processes to maintain their position in the market. Process mining is a set of techniques that allows organizations to have an X-ray view of their processes by extracting process related knowledge from the information recorded in today’s process aware information systems such as ‘Enterprise Resource Planning’ systems, ‘Business Process Management’ systems, ‘Supply Chain Management’ systems, etc. One of the major categories of process mining techniques is the process of discovery. This later allows for automatically constructing process models just from the information stored in the system representing the real behavior of the process discovered. Many process discovery algorithms have been proposed today which made users and businesses, in front of many techniques, unable to choose or decide the appropriate mining algorithm for their business processes. Moreover, existing evaluation and recommendation frameworks have several important drawbacks. This paper proposes a new framework for recommending the most suitable process discovery technique to a given process taking into consideration the limitations of existing frameworks. Full article
Show Figures

Figure 1

44 pages, 6909 KiB  
Article
Inaudible Attack on AI Speakers
by Seyitmammet Saparmammedovich Alchekov, Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi and Hoon Jae Lee
Electronics 2023, 12(8), 1928; https://doi.org/10.3390/electronics12081928 - 19 Apr 2023
Viewed by 2760
Abstract
The modern world does not stand still. We used to be surprised that technology could speak, but now voice assistants have become real family members. They do not simply turn on the alarm clock or play music. They communicate with children, help solving [...] Read more.
The modern world does not stand still. We used to be surprised that technology could speak, but now voice assistants have become real family members. They do not simply turn on the alarm clock or play music. They communicate with children, help solving problems, and sometimes even take offense. Since all voice assistants have artificial intelligence, when communicating with the user, they take into account the change in their location, time of day and days of the week, search query history, previous orders in the online store, etc. However, voice assistants, which are part of modern smartphones or smart speakers, pose a threat to their owner’s personal data since their main function is to capture audio commands from the user. Generally, AI smart speakers such as Siri, Google Assistance, Google Home, and so on are moderately harmless. As voice assistants become versatile, like any other product, they can be used for the most nefarious purposes. There are many common attacks that people with bad intentions can use to hack our voice assistant. We show in our experience that a laser beam can control Google Assistance, smart speakers, and Siri. The attacker does not need to make physical contact with the victim’s equipment or interact with the victim; since the attacker’s laser can hit the smart speaker, it can send commands. In our experiments, we achieve a successful attack that allows us to transmit invisible commands by aiming lasers up to 87 m into the microphone. We have discovered the possibility of attacking Android and Siri devices using the built-in voice assistant module through the charging port. Full article
Show Figures

Figure 1

13 pages, 4095 KiB  
Article
Test Platform for Developing Processes of Autonomous Identification in RFID Systems with Proximity-Range Read/Write Devices
by Bartłomiej Wilczkiewicz, Piotr Jankowski-Mihułowicz and Mariusz Węglarski
Electronics 2023, 12(3), 617; https://doi.org/10.3390/electronics12030617 - 26 Jan 2023
Cited by 3 | Viewed by 1362
Abstract
The subject of a distributed RFID system with proximity-range read/write devices (RWD) is considered in this paper. Possible work scenarios were presented in the scope of industrial implementations and were then tested in a dedicated laboratory set. The development system is based on [...] Read more.
The subject of a distributed RFID system with proximity-range read/write devices (RWD) is considered in this paper. Possible work scenarios were presented in the scope of industrial implementations and were then tested in a dedicated laboratory set. The development system is based on a high-frequency RWD integrated with a Wi-Fi microcontroller unit to create an Internet of things connected with a server (for data exchanging, user interface, etc.) via a wireless local area network. In practical applications, in order to increase the interrogation zone (IZ), there is a tendency to use one RWD with significant output power equipped with a multiplexer for managing several antennas located in the operational space. Such a solution is often economically unprofitable and even impossible to implement, especially in the case of the need to create the large IZ. Responding to market demand, the authors propose a distributed system developed on the basis of several cheap RFID reader modules and a few freely available hardware/software tools. They created the fully functional RFID platform and confirmed its usefulness in static and dynamic systems of object identification. Full article
Show Figures

Figure 1

Review

Jump to: Research

21 pages, 849 KiB  
Review
Review of Time Domain Electronic Medical Record Taxonomies in the Application of Machine Learning
by Haider Ali, Imran Khan Niazi, Brian K. Russell, Catherine Crofts, Samaneh Madanian and David White
Electronics 2023, 12(3), 554; https://doi.org/10.3390/electronics12030554 - 21 Jan 2023
Cited by 2 | Viewed by 1827
Abstract
Electronic medical records (EMRs) help in identifying disease archetypes and progression. A very important part of EMRs is the presence of time domain data because these help with identifying trends and monitoring changes through time. Most time-series data come from wearable devices monitoring [...] Read more.
Electronic medical records (EMRs) help in identifying disease archetypes and progression. A very important part of EMRs is the presence of time domain data because these help with identifying trends and monitoring changes through time. Most time-series data come from wearable devices monitoring real-time health trends. This review focuses on the time-series data needed to construct complete EMRs by identifying paradigms that fall within the scope of the application of artificial intelligence (AI) based on the principles of translational medicine. (1) Background: The question addressed in this study is: What are the taxonomies present in the field of the application of machine learning on EMRs? (2) Methods: Scopus, Web of Science, and PubMed were searched for relevant records. The records were then filtered based on a PRISMA review process. The taxonomies were then identified after reviewing the selected documents; (3) Results: A total of five main topics were identified, and the subheadings are discussed in this review; (4) Conclusions: Each aspect of the medical data pipeline needs constant collaboration and update for the proposed solutions to be useful and adaptable in real-world scenarios. Full article
Show Figures

Figure 1

Back to TopTop