Showing 901 - 920 results of 1,444 for search '"Internet of things"', query time: 0.05s Refine Results
  1. 901

    Dynamic and semantic-aware access-control model for privacy preservation in multiple data center environments by Aiguo Chen, Guoming Lu, Hanwen Xing, Yuan Xie, Shunwei Yuan

    Published 2020-05-01
    “…With the rapid development of intelligent perception and other data acquisition technologies in the Internet of things, large-scale scientific workflows have been widely used in geographically distributed multiple data centers to realize high performance in business model construction and computational processing. …”
    Get full text
    Article
  2. 902

    Discussion of 5G satellite dual-mode terminal requirement and application in the integration communication scenario of satellite and UTRAN by Wenzhe WANG, Gang AN, Xin LI, Weiqiang ZHANG, Zhenhua LIU, Nianqin ZHENG, Shengwei CHEN, Wendong ZHAO, Zixiang DI, Zhaojie GU

    Published 2022-05-01
    “…The research mainly starts from the development trend of 5G+ satellite integration, and conducts research and analysis on typical domestic and foreign satellite Internet of things/internet solutions, and then leads to application scenarios and services requirement for the development of 5G+ satellite integration, including research and discussion on the technical requirements of 5G satellite space-ground integrated dual-mode terminals, finally, the challenges faced by 5G satellite dual-mode communication terminals are given.With a view to providing industry with guidance on the challenging aspects of standardization and pre-development of 5G+ satellite dual-mode terminals, and to provide useful suggestions and references for overcoming these challenges.…”
    Get full text
    Article
  3. 903

    Overview of Key Technologies of Transmission in Massive MIMO System by Xi Yang, Shi Jin

    Published 2015-05-01
    “…With the rise of the internet of things and rapid development of the mobile internet business,higher data rate of service is demanded. …”
    Get full text
    Article
  4. 904

    Development trends of the information technology and cyberspace security by Feng-hua LI

    Published 2015-12-01
    “…The basic characteristics,mutual differences and intrinsic relationships of the internet,mobile internet,internet of things,cloud computing and big data technologies were analyzed,and the evolutions of the information technology and information service mode were deeply studied,the spiraling development trends of information technology and our catching up opportunities were explored,and that the major problem in next generation of in-formation technology was energy consumption was pointed out.Based on the analysis,the security requirements and challenges of the network connections,Industrie 4.0 issues in our cyberspace were analyzed,and that the research on security technology should be synchronized with the development of information technology was presented.Finally,the development opportunities and strategies of our cyberspace security were concluded,and an outlook of the de-velopment trends of the cyberspace security was given.…”
    Get full text
    Article
  5. 905

    Security risk analysis of power 5G hybrid networking by Xiaojian ZHANG, Jiaxuan FEI, Haitao JIANG, Qigui YAO

    Published 2022-01-01
    “…5G communication technology provides strong support for the power internet of things, and it also introduces new security challenges in the application process of the power industry.Starting from the analysis of the needs of the power 5G business, five 5G networking deployment and construction plans were proposed, and a comparative analysis of them was conducted in security and cost.And then, a hybrid networking architecture of 5G and power communication networks was proposed, and the 5G network slicing architecture was re-segmented according to business scenarios.Finally, from the four parts of terminal access, edge computing, network channel and core network, the security risks introduced by 5G technology were analyzed in detail.…”
    Get full text
    Article
  6. 906

    Research on cloud native based distributed IoT operating system architecture by Nan CHEN, Jianjun ZHAO, Ping ZHONG, Yongjun HUANG, Tian CHEN

    Published 2022-07-01
    “…Complex application development, various types of IoT devices, diverse network technology and different types of IoT edge are the major problems of IoT.The novel concept and architecture of the cloud native based distributed IoT operating system were proposed with 8 core features, which extended the scope of operating system from IoT devices to the edge and cloud, followed the trend analysis of IoT industry and technology.The cloud native based distributed IoT operating system has been utilized to decoupling the complexity and differences of massive heterogeneous resources of cloud (platform), edge gateway, devices and the one-stop full life cycle support of intelligent Internet of things applications development, deployment and hosting.The research and development practices of CTWing OS as well as testing and applications were also introduced.…”
    Get full text
    Article
  7. 907

    Power optimization of superimposed pilot for downlink short-packet transmission in IIoT by XIA Wenchao, XU Jing, ZHOU Xingguang, WU Weihua, ZHAO Haitao

    Published 2024-06-01
    “…The industrial internet of things (IIoT) has great potential in achieving automation and intelligent production. …”
    Get full text
    Article
  8. 908

    Security of the deployment of SDN-based IoT using blockchain by Ping XIE, Xiaosong LIU

    Published 2020-12-01
    “…Compared with the traditional internet,the SDN-based internet of things (IoT) has a wider coverage,more connected devices,more complex data transmission.There are many security technical challenges.The security challenges of SDN-based IoT deployment were firstly analyzed,and then the advantages of blockchain technology in solving those security issues were introduced.Finally,to add a blockchain-based security layer was proposed,which acted as a security gateway,data entering the IoT was verified accurately one time.Each security gateway was added to the blockchain system as an equal blockchain node,combined with the traceability and non-tampering of the blockchain system,the security performance and efficiency of SDN-based IoT deployments was improved.…”
    Get full text
    Article
  9. 909

    Quantum-based wireless sensor networks: A review and open questions by Mario E Rivero-Angeles

    Published 2021-10-01
    “…However, we can expect that in the future (possibly in the next decade) quantum computers will be commercial and reduced in size, and hence, they can be used for sensor network applications which are the basis of the Internet of Things. In this review, we study the road from quantum computing to quantum wireless sensor networks and how the analysis and design of these systems have to change to accommodate quantum capabilities in sensors, processors, communication links, and overall performance of these monitoring networks.…”
    Get full text
    Article
  10. 910

    Analysis of the development trend and key scenarios of smart communities based on 5G+AIoT by Nian TAO, Sheng ZHANG, Tai FU

    Published 2022-05-01
    “…With the continuous development and maturity of new-generation information technologies such as 5G, artificial intelligence, and the Internet of things, the construction of smart communities has entered the second half, with greater space and higher requirements.Firstly, the development status of community and business needs was analyzed.Secondly, the design ideas based on “pan-sensing, data collection, and intelligent application” was proposed for the pain points of users, such as government, property management and residents.Thirdly, an overall plan for 5G+AIoT smart community was built, focusing on wisdom community 5G application scenarios, the industrial and social benefits of smart community construction were discussed.Finally, the future development trend of smart communities was looked forward.…”
    Get full text
    Article
  11. 911

    A systemic approach and multiscale data management. A ‘refrigerator’ case study by Paolo Marco Tamborrini, Eleonora Fiore

    Published 2020-06-01
    “…Many digital technologies, such as the Internet of Things, Artificial Intelligence and Machine Learning, could radically change the way of conceiving a design process, especially when they are used to retrieve essential information to define a problem, identify the requirements and support design decisions, all of which are typical of the pre-design phase. …”
    Get full text
    Article
  12. 912

    Prediction and modeling of connectivity probability in vehicular Ad Hoc networks by Huimin WANG, Haitao ZHAO

    Published 2016-03-01
    “…Recently,with the rapid development of vehicular communication technology,IoV(internet of vehicles)as one of the applications of IoT(internet of things),is attracting more and more attention as well as its basic applications.The algorithm of predicting the connectivity probability based on highway model was proposed.Also,the joint distribution of vehicles on highway was studied,and the equation calculating the boundaries of connectivity probability on one road segment was analyzed quantitatively.The diagram presenting the relationship between the connectivity probability on one road segment and the average number of vehicles in each tuple was depicted by Rstudio.As a consequence,the model of connectivity probability on one path was achieved by calculating the products of the connectivity probability on all road segments along one path.The analysis result shows that the connectivity probability on one path can be improved by increasing the communication range or the density of vehicles.…”
    Get full text
    Article
  13. 913

    Research on consensus mechanism optimization for IoT blockchain by Qijie SONG, Tieming CHEN, Yuan CHEN, Dongjie MA, Zhengqiu WENG

    Published 2020-02-01
    “…The essence of the blockchain is a decentralized distributed ledger system.The Internet of things is interconnected by massive heterogeneous terminals and has natural distributed characteristics.Therefore,the combinedIoT blockchain is widely optimistic.At the same time,due to the heterogeneity of the IoT-aware terminal,the limited computing capacity and the ability of data transmission,the IoT blockchain faces great challenges.The password consensus technology has become a key issue.On the basis of summarizing the current blockchain consensus algorithm,its applicability to the IoT blockchain was analyzed,the current application status of several IoT blockchain platforms and consensus mechanisms was introduced,and the optimization research progress of the consensus mechanismin IoT blockchain was described.Finally,the optimization technology of the IoT blockchain and the potential research directions were summarized.…”
    Get full text
    Article
  14. 914

    Political Organising and Mobilising in the Age of the Fourth Industrial Revolution: A Reflection on the Gauteng Young Communist League of South Africa by Kgabo Morifi

    Published 2020-03-01
    “…As “a way of describing the blurring of boundaries between the physical, digital, and biological worlds...a fusion of advances in artificial intelligence, robotics, the Internet of Things, 3D printing, genetic engineering, quantum computing, and other technologies…” (McGinnis, 2018), the 4IR is primarily concerned with the inchoate transformation of the production of goods and services, resulting from the application of a new wave of technological innovations. …”
    Get full text
    Article
  15. 915

    Dual verifiable cloud storage scheme based on blockchain by Tao FENG, Fanqi KONG, Chunyan LIU, Rong MA, Albettar Maher

    Published 2021-12-01
    “…In response to the problem that in the industrial Internet of things (IIoT), industrial equipment stored data in the cloud, causing data to be easily tampered with and unable to track malicious users, causing a vicious circle, with the help of the traceability and immutability of the blockchain, a dual verifiable cloud storage scheme based on the blockchain was proposed.Firstly, homomorphic encryption technology was used to encrypt data and upload it to the cloud , which ensured transmission security and realized data privacy protection.Secondly, the aggregated ciphertext and uploader information were stored on the blockchain, which could effectively avoid the risk of data being tampered with by illegal users, and could trace malicious users to achieve double verification of cloud data integrity.Finally, a safety analysis was carried out to prove that the proposed scheme is safer and more reliable than similar schemes.…”
    Get full text
    Article
  16. 916

    Research on mobile stroke unit based on 5G network technology by Yu SHENG, Zhiheng LIU, Liya SHAN, Yi FENG

    Published 2020-01-01
    “…The 5G mobile stroke unit uses advanced next-generation information and communication technologies such as the Internet of things,mobile Internet,cloud computing,5G,etc.…”
    Get full text
    Article
  17. 917

    Differentiated and negotiable mechanism for data communication by Wenlong KOU, Fenghua LI, Xiuze DONG, Xiaogang CAO, Kui GENG, Qing LI

    Published 2021-10-01
    “…In view of the massive and differentiated computing units and terminal devices in the cloud environment and the Internet of things, the differences in hardware resources and computing capabilities posed new challenges to high reliability and high performance data communication, a data communication mechanism supporting differentiation and negotiation was proposed.A parameters negotiation method was proposed, and parameters were negotiated by the sender according to the difference of the receiver capability to achieve differentiated and negotiable data communication.A retransmission feedback mechanism was designed, and the transmission rate was dynamically adjusted and the data was retransmitted based on the data reception feedback of the receiver by the sender to improve communication efficiency and reliability.The experimental results show that the proposed mechanism can perform dynamic adaptive, efficient and parallel communication according to the difference of the receiver capability.…”
    Get full text
    Article
  18. 918

    Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space by Jian-hua LI

    Published 2016-02-01
    “…With a rapid development of information technologies including big data,cloud computing,Internet of things,etc.,the threats in cyber space also become more ubiquitous and complex.Moreover,more and more persis-tence and hidden features present in all kinds of network attacks.Threat intelligence based network defense can analyze the undergoing attacks and predict the threat situation in the future.Furthermore,based on the potential risk,users can define efficient security policy,thus the defense capabilities of the cyber space could be enhanced system-atically.Threat intelligence is a very wide research area.The research works and developments of the sensing,shar-ing and analysis for threat intelligence were studied and reviewed deeply.…”
    Get full text
    Article
  19. 919

    An Intelligent Optimization Strategy Based on Deep Reinforcement Learning for Step Counting by Zhoubao Sun, Pengfei Chen, Xiaodong Zhang

    Published 2021-01-01
    “…With the popularity of Internet of things technology and intelligent devices, the application prospect of accurate step counting has gained more and more attention. …”
    Get full text
    Article
  20. 920

    Traces et espaces de consommation by Franck Cochoy, Jan Smolinski

    Published 2016-10-01
    “…They contribute to the Internet of Things and are thus an interaction between physical space and the digital universe. …”
    Get full text
    Article