-
941
Loosing no time to deploy digital economy and digital transformation to spur ICT innovation——The latest ICT development trend showcased in the science and technology award of CIC i...
Published 2021-01-01“…ICT Innovation, industrial development and the new information infrastructure construction, represented by 5G, artificial intelligence, and integrated space-air-ground networks will play an important role in the implementation of the national strategy of building a powerful communications network and comprehensively building a modern socialist country.Based on the current technological development in the ICT field, the China Institute of Communications summarized and sorted out the key directions of technological innovation in this field, including a new generation of mobile communications, network enabling, quantum communications, satellite internet, smart network operation and maintenance, cyberspace security, and the internet of things and the internet of vehicles, network cost reduction and efficiency enhancement, and basic technologies, etc., providing references for all walks of life to understand the technological development in the ICT field.…”
Get full text
Article -
942
Research Progress and Prospect of Reservoir Intelligent Operation
Published 2023-01-01“…Reservoir operation is an important tool to adapt to climate changes and prevent floods and droughts.With the continuously advancing digitization,a new generation of information technology has begun to integrate with traditional reservoir operations.Based on 445 references collected by CNKI from 2000 to 2023 and 412 references in the core collection database of Web of Science,this paper employs CiteSpace to analyze the status and trend of intelligent operation research.Meanwhile,it systematically sorts out two types of operation technologies including model building and model solving,and six types of information technologies containing knowledge graphs,the internet of things,big data,cloud platform,artificial intelligence,and digital twins.Finally,the intelligent operation provides new ideas for reservoir group operation in river basins,but it still needs further breakthroughs in fields such as thorough perception,data mining,universal model building,and intelligent decision-making.…”
Get full text
Article -
943
Enhanced SDIoT Security Framework Models
Published 2016-05-01“…Following the recent increase in the interest in IoT (Internet of Things) environment, devices that provide various services are being developed. …”
Get full text
Article -
944
Efficient pairing-free CP-ABE based on ordered binary decision diagram
Published 2019-12-01“…To improve the computational efficiency of ABE,its access structure was optimized and a pairing-free CP-ABE scheme based on ordered binary decision diagram (OBDD) was proposed.Based on the elliptic curve cryptography,the complex bilinear pairing operation in traditional CP-ABE was replaced with the relatively lightweight scalar multiplication,thus the overall computation overhead was reduced.And OBDD was used as the access structure of CP-ABE,which can not only represent any Boolean expression about attributes,but also support both positive and negative attributes.The length of the key was independent of the number of attributes and the length of the ciphertext was only related to the number of valid paths in the access policy.The security and performance analysis show that the scheme can resist chosen plaintext attack under the decisional Diffie-Hellman (DDH) assumption,and the computation efficiency can meet the practical application requirements of Internet of things.…”
Get full text
Article -
945
The High Security Mechanisms Algorithm of Similarity Metrics for Wireless and Mobile Networking
Published 2017-01-01“…With the development of human society and the development of Internet of things, wireless and mobile networking have been applied to every field of scientific research and social production. …”
Get full text
Article -
946
Survey on backscatter communication for zero-power IoT
Published 2022-11-01“…Although Internet of things (IoT) can enhance the quality of people’s life, but it also brings the problems of energy consumption and network transmission congestion.To solve the above problems, backscatter communication technology for zero-power IoT has been proposed.Thus, it is of great significance to survey the state-of-the-art technologies and study the relevant challenges.Firstly, the basic definition and technical characteristics of zero-power IoT and backscatter communications were presented.Secondly, several typical application scenarios for zero-power backscatter communications in 6G were introduced.Thirdly, the system structure of zero-power backscatter communications was given and the potential key technologies of zero-power backscatter communications for 6G applications were also discussed.Finally, the technical challenges and potential research directions for zero-power backscatter communications were analyzed.Additionally, the proposed overview was of important theoretical significance and practical values for promoting the development of IoT toward full scenes, full spectrum, and many types of services.…”
Get full text
Article -
947
Research on edge offloading delay optimization of cellular networks based on optimal transport theory
Published 2023-12-01“…With the development of the internet of things, a large number of user device (UD) were connected to cellular network.Since the changes in the spatial distribution of UD and application requirements, it is necessary to dynamically adjust the UD’ offloading decision.Comprehensively considering various parameter information in the networks such as the spatial distribution of UD, application requirements, and the processing capability of the edge servers on the base station (BS) side, the offloading decision of UD were optimized from the perspective of distribution.Based on the optimal transport theory, a delay optimization algorithm was proposed to reduce the average delay of the UD’ computing tasks offloading process by reasonably planning the offloading BS of the UD in the networks.The simulation results show that the average delay can be reduced by 81.06% using the proposed offloading mechanism based on delay optimization, and the traffic handled by each BS is balanced.…”
Get full text
Article -
948
Analysis and suggestions on the development of IoT technology
Published 2020-12-01“…The Internet of things (IoT) has been developing for a decade in China,which has rapidly evolved from the early sensor network technology,radio frequency identification (RFID) technology to the intelligent networking technology based on 5G.The Internet of everything is coming to our life.The application of IoT has also been gradually and comprehensively applied in from the area of financial IC card to the industry,government affairs,transportation,health care,education,and etc.The development of the IoT hot technologies represented by 5G and low-power wide-area network (LPWAN),and the deep integration of blockchain,edge computing and other technologies with the IoT,comprehensively promote the deep application of the IoT in the industry,which brings great development opportunities to all the industry.It was focused on the analysis of the status of 5G,IoT identification,edge computing,LPWAN,security technology,and etc.The development tendency of the IoT was also forecasted,and the corresponding policy suggestion to promote the development of IoT was put forward.…”
Get full text
Article -
949
Development,challenge and opportunity of optical fiber communication system technologies
Published 2016-05-01“…Optical fiber communication system is one of the core supporting systems of the modern internet age.Firstly,major recent technological advances in optical fiber communication system were summarized.Then,the driving forces for its future development in the emerging cloud era,the future challenges and opportunities that it faced were analyzed.With the consideration of these challenges and opportunities,the future evolution paths in key areas such as optical fiber communication system overall network architectures,core network technologies,metro network technologies,access network technologiesand novel software-defined optical transport network technologies in the upcoming cloud erawere described,aiming to support future generations of internet,data center interconnect,internet of things and 5G mobile network,as well as the smart home and smart city initiativesmore effectively.…”
Get full text
Article -
950
A lightweight privacy-preserving truth discovery mechanism for IoT
Published 2021-05-01“…In order to solve diverse quality and privacy leakage of perceived data in fog-cloud integrated internet of things (IoT), a streaming encryption-based privacy-preserving truth discovery mechanism for IoT was proposed.Firstly, by utilizing shuffling and streaming encryption algorithms, the ground truths and the weights were anonymously updated on the cloud server and fog server, respectively, so that the collusion attacks between malicious attackers and cloud or fog servers could be resisted to defend against privacy leakage of IoT devices.Secondly, by adopting the Softmax function, the device weights were calculated on fog server, which reduces the error rate for calculating the ground truths.Finally, the theoretical analysis proved that the mechanism could protect privacy of the devices.And, the experimental results demonstrate that the proposed mechanism is an effective privacy-preserving trust discovery mechanism for large-scale IoT devices, which can outperform existing ones in computing efficiency.…”
Get full text
Article -
951
Certificate-based cross-domain authentication scheme with anonymity
Published 2018-05-01“…Considered the cross-domain authentication of mobile devices in the Internet of things,a certificate based anonymous cross-domain authentication scheme was proposed.First,combined with the characteristics of PKI and IBS,a certificate based signature (CBS) algorithm was proposed,and the security of the proposed CBS scheme was proved.The verification result of the signature in the algorithm was constant,which ensured the anonymity of the authentication entities in the cross-domain process.The algorithm does not contain pairing,and avoids complex certificate management in traditional PKI and the key escrow and distribution of IBS.Then a cross-domain authentication scheme for mobile devices was constructed by combining the proposed signature algorithm.The scheme ensures the anonymity of authentication at the same time.Finally,compared with other schemes,the scheme proposed is more secure and has less computation cost and communication cost.Moreover,the scheme is simple and efficient,and could be applied to the cross-domain authentication of mobile devices.…”
Get full text
Article -
952
An UAV-Assisted Edge Computing Resource Allocation Strategy for 5G Communication in IoT Environment
Published 2022-01-01“…As the computing capacity of existing mobile devices cannot fully meet the needs of users for communication quality, a computing resource allocation strategy for 5G communication in the Internet of Things (IoT) environment is proposed by applying UAV-assisted edge computing. …”
Get full text
Article -
953
IoT-based cloud monitoring system for building fires
Published 2025-01-01“…This paper presents an IoT (Internet of Things) based smart building fire cloud monitoring system to enhance fire safety in smart buildings. …”
Get full text
Article -
954
Availability evaluation method for extended epidemic model and Markov chain based IoT
Published 2021-04-01“…To reflect the availability status of the Internet of things (IoT) under malware diffusion, an availability evaluation method of IoT based on the extended epidemic model SEIRD and Markov chain was proposed.According to actual states of IoT nodes, the classic epidemic model SIR was extended to establish the node state transition model SEIRD.From the dynamic change process of each state of IoT nodes, the dynamic probability equations of IoT nodes belonging to five states were constructed, the Markov matrix reflecting the state transition was obtained, and an availability calculation method of an IoT node was achieved.Taking typical star and cluster IoT topologies as examples, the availability evaluation methods of the whole IoT with different topologies were given.Experiments provide suggestions for administrators how to reasonably deploy the number of normal working nodes and routes.The research results have theoretical significance for improving IoT availability and promoting the successful IoT applications.…”
Get full text
Article -
955
Intelligent Control System Design of Ring Light via IOT Mobile Robot
Published 2023-01-01“…In the Internet of Things (IoT) era, the combination of mobile robots and IoT technology has realized the complementary advantages of the IoT and robots, which has brought new challenges and opportunities for the development and application of the IoT and mobile robots. …”
Get full text
Article -
956
Implementasi Algoritme Morus V2 untuk Pengamanan Data Pada Perangkat Bluetooth Low Energy
Published 2022-12-01“…Pengamanan data merupan bagian penting dalam penerapan jaringan berbasis Internet of things (IoT). Sistem IoT membutuhkan sebuah protokol komunikasi, seperti Bluetooth Low Energy (BLE). …”
Get full text
Article -
957
Research Progress in Monitoring Technology of Cold Chain Logistics for Meat Products
Published 2025-02-01“…Advanced technologies like big data, the internet of things, and artificial intelligence are becoming widely used as Industry 4.0 technology, which develops quickly. …”
Get full text
Article -
958
Smart tags based on the batteryless backscatter technology:applications and challenges
Published 2020-09-01“…Since the radio frequency identification (RFID) technology was put forward,it has been widely used in the transportation,logistics,industry and business due to its convenience and high efficiency.As a carrier for storing recognizable data,the RFID tags play a crucial role in the Internet of things (IoT).More and more functions and modules are embedded in the RFID tags and developed into smart tags in different application fields.Recently,wireless batteryless smart tags have arisen and grown rapidly with the development of the IoT and various emerging backscatter technologies.Wireless batteryless smart tags use the passive backscatter technology to harvest the energy and transmit information through radio frequency signals.Starting from the RFID technology,the history of the RFID and smart tags was introduced briefly,the differences between traditional smart tags and emerging wireless smart tags were compared,the advantages of wireless batteryless smart tags were concluded,several specific applications of it in different fields were listed,and the open challenges were analyzed.…”
Get full text
Article -
959
AIoT: a taxonomy, review and future directions
Published 2021-08-01“…AIoT (artificial intelligence of things) is an integrated product of artificial intelligence (AI) and internet of things (IoT).Currently, it has been widely used in smart cities, smart homes, smart manufacturing, and driverless.However, the research of AIoT is still in its infancy, facing with many problems and challenges.In order to clarify the concept and provide possible solutions, a comprehensive survey was carried out on AIoT.Firstly, a clear definition of AIoT was provided, along with the brief introduction on its background and application scenarios.And then a novel cloud-edge-end hybrid AIoT architecture for intelligent information processing was constructed.Based on the research framework of AIoT, the research status and solutions were discussed, including AI integrated IoT data acquisition, complex event processing and coordination, cloud-edge-end integration, AI-enhanced IoT security and privacy, and AI-based applications, etc.Finally, it identified the open challenges and offers future research directions.…”
Get full text
Article -
960
Digital solutions in the activities of small logistics enterprises (on the example of the Sverdlovsk region)
Published 2024-10-01“…The introduction of information technologies such as the Internet of Things, blockchain, sustainability technologies, robotization, big data analysis and artificial intelligence significantly allows to increase the efficiency of logistics companies, optimize routes and improve inventory management. …”
Get full text
Article