{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:26:48Z","timestamp":1740173208881,"version":"3.37.3"},"reference-count":28,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,6,1]]},"DOI":"10.1109\/jiot.2021.3116159","type":"journal-article","created":{"date-parts":[[2021,9,29]],"date-time":"2021-09-29T21:54:49Z","timestamp":1632952489000},"page":"8800-8808","source":"Crossref","is-referenced-by-count":0,"title":["IoQZ: An Implementation of a Quiet Zone"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3471-4987","authenticated-orcid":false,"given":"Abdullah","family":"Almurayh","sequence":"first","affiliation":[{"name":"Department of Educational Technologies, College of Education, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1220-2908","authenticated-orcid":false,"given":"Ohoud","family":"Alshaeri","sequence":"additional","affiliation":[{"name":"College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1428-6508","authenticated-orcid":false,"given":"Noor","family":"Alghadeer","sequence":"additional","affiliation":[{"name":"College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2232-480X","authenticated-orcid":false,"given":"Reema","family":"Alyousef","sequence":"additional","affiliation":[{"name":"College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8117-4173","authenticated-orcid":false,"given":"Rayana","family":"Alshehri","sequence":"additional","affiliation":[{"name":"College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7432-9613","authenticated-orcid":false,"given":"Sukaina","family":"Al-Hajri","sequence":"additional","affiliation":[{"name":"College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia"}]},{"given":"Mehwash","family":"Farooqui","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computer Sciences and Information Technology, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia"}]}],"member":"263","reference":[{"volume-title":"Number of Smartphone Users Worldwide From 2016 to 2021(in Billions)\u2014Number of Smartphone Users Worldwide From 2016 to 2021","year":"2020","author":"O\u2019Dea","key":"ref1"},{"volume-title":"iBeacon\u2014Apple Developer","year":"2020","key":"ref2"},{"volume-title":"Beacons (Deprecated)\u2014Google Developers","year":"2020","key":"ref3"},{"volume-title":"Method and device for implementing a quiet zone","year":"2018","author":"Almurayh","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2914733"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.102015"},{"volume-title":"Personal technology in public places\u2014Face and mobile video","year":"2006","author":"Koskinen","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3917\/res.112.0050"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2019.8651877"},{"key":"ref10","first-page":"3300","article-title":"Harmon, viral geofencing: An exploration of emerging big-data driven direct digital marketing services","volume-title":"Proc. PICMET Conf. Portland Int. Center Manage. Eng. Technol.","author":"Brown"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2010.16"},{"issue":"2","key":"ref12","first-page":"71","article-title":"Design and development of mobile phone jammer","volume":"5","author":"Olumide","year":"2016","journal-title":"Amer. J. Eng. Res."},{"key":"ref13","first-page":"41","article-title":"Range of Bluetooth low energy beacons in relation to their transmit power","volume-title":"Proc. Int. Conf. Internet Comput. (ICOMP)","author":"Budan"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143385"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/s16050596"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2788449"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2843325"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6476854"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2312291"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/s17122917"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2798918"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2969088"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.198"},{"volume-title":"Kontakt.io: Transmission Power, Range and RSSI","year":"2021","author":"Toulson","key":"ref24"},{"volume-title":"Foreground Services\u2014Documentation","year":"2021","key":"ref25"},{"volume-title":"10 Things About Bluetooth Beacons and Your Mobile App You Need to Know","year":"2015","key":"ref26"},{"volume-title":"Beacons Are Vulnerable; It\u2019s Time We Made Beacons Secure","year":"2016","key":"ref27"},{"volume-title":"BluetoothLeScanner\u2014Documentation","year":"2021","key":"ref28"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9780059\/09552230.pdf?arnumber=9552230","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T23:06:24Z","timestamp":1705014384000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9552230\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,1]]},"references-count":28,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2021.3116159","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2022,6,1]]}}}