-
921
Precisely positioning method for roadheaders and robotic roadheader system
Published 2020-02-01“…To overcome the problems faced in underground positioning,the robotic roadheader mine Internet of things (IoT) was designed which connected multi sensors,surveying devices and industrial computers,and a novel positioning method was developed,based on which a robotic roadheader system was built.The robotic roadheader system was employed for real-world tunnel cutting.The experimental results verifies the high accuracy of the positioning method,which achieves an RMSE error less than 5 cm,and the robust running of the robotic roadheader indicates that the robotic roadheader system can precisely perceive the surrounding environment and make precise interaction with the working environment,which yield a safety,high efficiency,and precisely underground tunnel building and coal mining and an unmanned working surface.…”
Get full text
Article -
922
NB-IoT network and service collaborative optimization
Published 2018-11-01“…The preliminary construction of the NB-IoT network has been completed at this stage.The overall coverage is good,but there are more partial coverage holes,insufficient coverage of indoor difficult scenes,prominent interference problems and overlapping coverage.At present,the industry application of NB-IoT is low in maturity,and the application of the industry is in its infancy.Different terminal manufacturers have different specifications,which leads to major problems in the deployment process of network deployment.The NB-IoT network related indicators according to different business characteristics were analyzed,according to the main types of business of the internet of things.The coverage performance of such services was researched according to test data and statistical data.In-depth coverage analysis on the covers of manholes and poles was conducted.Overlapping coverage analysis gives an optimized solution to the business model with relatively concentrated service access.…”
Get full text
Article -
923
Research on Material Design of Medical Products for Elderly Families Based on Artificial Intelligence
Published 2022-01-01“…With the crucial details given via Internet of Things gadgets, emergency events may be foreseen relatively promptly, and appropriate actions can be proposed by AI technology. …”
Get full text
Article -
924
Rekayasa E-Aquaculture untuk Pemantauan Tambak Udang secara Realtime dengan Model Multipoint Node
Published 2021-03-01“…The process can be automated with the Internet of Things (IoT) developed in this research. The model developed consists of a set of nodes installed in each pond and a masterboard for data collection. …”
Get full text
Article -
925
Diversity Perceptions in the UK Retail Industry: A Case of Tesco
Published 2023-03-01“…It can be argued that with exponential technological changes like the emergence of artificial intelligence, machine learning, the internet of things (IoT), etc. retailers around the world are facing continuous challenges in keeping their business model updated and relevant for sustainable business growth and profitability. …”
Get full text
Article -
926
Prototype verification for integrated sensing and communications:current status and development trends
Published 2023-11-01“…Considering the practical challenges faced by the commercialization of integrated sensing and communication (ISAC), the implementation progress and future trends of ISAC were elaborated and summarized.First, the research progress and empirical performance of single node-based ISAC prototype systems were summarized, including positioning, environmental mapping, imaging, waveform design, and beam tracking.Next, the actual gain of multi-nodes cooperation-based ISAC prototype systems in the scenarios of the Internet of vehicles and the Internet of things were analyzed.Then, focusing on cross-sensor-based ISAC prototype systems, the advantages and disadvantages of each kind of sensor and the experimental fusion performance were overviewed.Finally, the future trends in the system implementation and technical validation of ISAC were highlighted, addressing the challenges encountered in existing ISAC prototype systems.…”
Get full text
Article -
927
Multi-domain collaborative anti-jamming based on multi-agent deep reinforcement learning
Published 2022-12-01“…Dynamic transmission requirements and the limited cache space bring great challenges to wireless data transmission in the malicious jamming environment.Aiming at the above problems, a collaborative anti-jamming channel selection and data scheduling joint decision method for distributed internet of things was studied from the perspective of frequency domain and time domain.A data transmission model based on multi-user Markov decision process was constructed and a collaborativeanti-jamming joint-channel-and-data decision algorithm based on multi-agent deep reinforcement learning was proposed.Simulation results show that the proposed algorithm can effectively avoid the malicious jamming and the co-channel interference.Compared with the comparison algorithm, the network throughput is significantly improved, and the number of packet dropout is significantly reduced.…”
Get full text
Article -
928
Performance analysis of dual-media cooperative communication based on wireless and power line under hybrid fading
Published 2019-05-01“…Wireless communication and power line communication are extensively applied in various fields, such as household Internet of things. For cooperative communication of amplify–forward relay using wireless access and power line transmission, the hybrid model of universal Nakagami wireless fading and lognormal power line fading was used in this study. …”
Get full text
Article -
929
Research on batch anonymous authentication scheme for VANET based on bilinear pairing
Published 2017-06-01“…To solve the problem of efficiency of anonymous authentication in vehicular ad hoc network,a batch anonymous authentication scheme was proposed by using bilinear pairing on elliptic curves .The signature was generated by the roadside unit node (RSU) and the vehicle together.Thus,the burden of VANET certification center was reduced and the authentication efficiency was proved.Meanwhile,the difficulty of the attacker to extract the key was increased.Furthermore,security proofs were given to the scheme in the random oracle model.Analysis shows that the proposed scheme can meet the needs of many kinds of security requirements,the computational overhead is significantly reduced,and the authentication efficiency is improved effectively too.Therefore,the scheme has important theoretical significance and application value under computational capability constrained Internet of things (IoT) environment.…”
Get full text
Article -
930
Cross-network access control mechanism for complex network environment
Published 2018-02-01“…Complex network environments,such as space-ground integrated networks,internet of things and complex private networks,have some typical characteristics,e.g.…”
Get full text
Article -
931
Firefly Optimization-Based Cooperative Localization Algorithm for Intelligent IoT
Published 2022-01-01“…To achieve effective connection between each node of the Internet of Things (IoT), there is a great demand of precise positioning. …”
Get full text
Article -
932
Design and implementation of NB-IoT based environmental temperature and humidity monitoring system
Published 2021-12-01“…In view of the disadvantages of the traditional environmental monitoring system, such as high power consumption, high maintenance cost and no real-time monitoring, an environmental temperature and humidity monitoring system based on narrow band Internet of things (NB-IoT) technology was developed, which is mainly controlled by singlechip microcomputer.The work flow of the main controller and the working mode of the communication module were optimized to reduce the power consumption of the system.NB-IoT communication technology was utilized for data transmission to the cloud platform through the base station and core network.China Mobile IoT open platform (OneNET platform) was adopted to achieve the connection between the terminal device and the application, and expanded functions provided by the platform was used to design a mobile phone application to achieve the remote real-time monitoring of environmental parameters and improve the user’s convenience.…”
Get full text
Article -
933
A survey on resource allocation in backscatter communication networks
Published 2021-09-01“…With the development of Internet of things (IoT) technology, wireless networks have the characteristics of massive user access, high power consumption, and high capacity requirements.In order to meet the transmission requirements and reduce energy consumption, backscatter communication technology was considered to be one of the most effective solutions to the above problems.In the fact of complex network scenarios, the improvement of spectrum efficiency, system capacity, and energy management has become an urgent problem of resource allocation areas in backscatter communications.For this problem, resource allocation algorithms in backscatter communications were surveyed.Firstly, the basic concept and different network architectures of backscatter communication were introduced.Then, resource allocation algorithms in backscatter communication networks were analyzed according to different network types, optimization objectives, and the number of antennas.Finally, the challenges and future research trends of resource allocation problems in backscatter communication networks were prospected.…”
Get full text
Article -
934
Collaborative offloading computing scheme based on energy harvesting technology
Published 2024-06-01“…In recent years, the energy requirements for devices in internet of things (IoT) applications have increased, making energy harvesting (EH) technology an important way to alleviate the energy shortage problem in edge computing and extend the battery life of devices. …”
Get full text
Article -
935
-
936
Research on Design and Application of National Fitness System
Published 2021-01-01“…The perception layer mainly uses Internet of Things gateway, central machine, wireless perception node, and fitness data dashboard to obtain fitness data. …”
Get full text
Article -
937
Adopting an Improved Genetic Algorithm for Multi-Objective Service Composition Optimization in Smart Agriculture
Published 2024-12-01“… In order to modernize numerous areas, the Internet of Things (IoT) is an emerging paradigm that connects various intelligent physical objects. …”
Get full text
Article -
938
Concept, architecture and key technologies of industrial internet
Published 2022-06-01“…As one of the key paths to realize the digital transformation of traditional industries, the industrial internet has attracted widespread attention in both the academia and the industry.As the content of the industrial internet is quite extensive, while its system architecture and key technologies are constantly evolving and developing, it also confronts problems such as unclear conceptual scope, unsound system architecture, and unclear key technologies.In order to further explore the above issues, the basic concepts of the industrial internet were clarified by sorting the relationship between the industrial internet and three other concepts of the industrial internet of things, industry 4.0/5.0, and intelligent manufacturing.Based on the analysis of the industrial internet system architecture and the key technologies involved, the challenges faced by the industrial internet were summarized and the future research directions in the industrial internet field were looked forward.…”
Get full text
Article -
939
Research on distributed network intrusion detection system for IoT based on honeyfarm
Published 2024-01-01“…To solve the problems that the network intrusion detection system in the Internet of things couldn’t identify new attacks and has limited flexibility, a network intrusion detection system based on honeyfarm was proposed, which could effectively identify abnormal traffic and have continuous learning ability.Firstly, considering the characteristics of the convolutional block attention module, an abnormal traffic detection model was developed, focusing on both channel and spatial dimensions, to enhance the model’s recognition abilities.Secondly, a model training scheme utilizing federated learning was employed to enhance the model’s generalization capabilities.Finally, the abnormal traffic detection model at the edge nodes was continuously updated and iterated based on the honeyfarm, so as to improve the system’s accuracy in recognizing new attack traffic.The experimental results demonstrate that the proposed system not only effectively detects abnormal behavior in network traffic, but also continually enhances performance in detecting abnormal traffic.…”
Get full text
Article -
940
6G oriented wireless communication channel characteristics analysis and modeling
Published 2020-03-01“…,global coverage,all spectrums and all applications,we comprehensively survey 6G related wireless channel measurements,channel characteristics,and channel models for all frequency bands and all scenarios.Millimeter wave (mmWave),terahertz (THz),optical band,satellite,unmanned aerial vehicle (UAV),maritime,underwater acoustic,high-speed train (HST),vehicle-to-vehicle (V2V),massive/ultra-massive multiple-input multiple-output (MIMO),orbital angular momentum (OAM),and industry Internet of things (IoT) communication channels were particularly investigated.The related 6G channel measurement and modeling results were also given.Finally,future research challenges on 6G channel measurements and modeling were pointed out.…”
Get full text
Article