Showing 961 - 980 results of 1,444 for search '"Internet of things"', query time: 0.06s Refine Results
  1. 961

    Design and implementation of low-cost hardware architecture for authentication encryption algorithm SM4-GCM by Rui CHEN, Chunqiang LI

    Published 2023-12-01
    “…The internet of things (IoT) has gained wide adoption across various industries, driving digitalization and intelligence in industry applications.However, the data collected by IoT devices in some industry applications may be closely linked to user privacy and property security.To ensure the security of such data, a cost-effective, multifunctional hardware architecture design based on the Chinese authenticated encryption algorithm SM4-GCM (Galois/Counter Mode) was proposed, which offered a balanced approach to performance, cost, and hardware-level data confidentiality and integrity assurance, and supported three operation modes: SM4-CTR, SM4-ECB, and SM4-GCM.The implementation results on the field programmable gate array (FPGA) development board demonstrate that the design requires only 1 761 look-up tables and 1 825 registers, occupies only 604 slices, and has a throughput rate of 39.78 Mbit/s@100 MHz.These results suggest that the proposed design can effectively meet the requirements of IoT data security applications.…”
    Get full text
    Article
  2. 962

    Digital twin based intelligent urban traffic forecasting and guidance strategy by Xiwen LIAO, Supeng LENG, Yujun MING, Tianyang LI

    Published 2023-03-01
    “…As the technology of ubiquitous Internet of things and artificial intelligence improves by leaps and bounds, the transportation system revolution is flourishing and bringing new opportunities and challenges.Considering the defect in the existing navigation system, and the neglect of the temporal and spatial characteristics of traffic flow, the macro traffic network and micro vehicle network were modeled and their coupling relationship was mined.Then, a digital twin based urban traffic forecasting and guidance method was proposed to alleviate the problem of traffic congestion.The spatial-temporal traffic flow information was predicted through the diffusion convolution recurrent neural network, which was explicitly applied to the vehicle path planning decision.On this basis, a spatial-temporal collaborative deep reinforcement learning method was proposed to implement the future-oriented collaborative path planning of vehicles.It also guided the underlying vehicle twins to select the optimal strategy for the real world.With SUMO for simulation verification, the experimental results show that the proposed method is significantly better than the existing algorithms in improving the travel completion ratio and congestion relief, and can improve the efficiency of urban traffic travel.…”
    Get full text
    Article
  3. 963
  4. 964

    A genetic algorithm based method of optimizing dispersion matrix for RDSM system by Peng ZHANG, Xiaoping JIN, Dongxiao CHEN

    Published 2022-12-01
    “…Rectangular differential spatial modulation (RDSM) is a multi-antenna incoherent modulation technology with high spectral efficiency, low power consumption, and zero-overhead for channel estimation.RDSM is especially suitable for 6G communication systems, such as fast-moving Internet of vehicles, Internet of things, cellular networks, etc.However, the construction of the sparse rectangular unitary space-time dispersion matrix (DM) at transmitter is a problem.The proposed Genetic algorithm (GA) will result in less computational complexity than the currently used random research.The fitness of GA was calculated by the rank and determinant criterion (RDC) method to avoid discussions in differential system.Due to characteristics of constellation symbols of RDSM, the proposed method reduced the computational complexity during each single iteration in GA.The simulation results show that the optimized DMS can significantly improve the bit error rate (BER) performance of the RDSM system.Compared with random search, the low-complexity GA effectively improves the DMS optimization efficiency of RDSM.The computational complexity required for optimizing DMS is about 0.1% of random search optimization method.…”
    Get full text
    Article
  5. 965

    Research on pairing-free certificateless batch anonymous authentication scheme for VANET by Cheng SONG, Ming-yue ZHANG, Wei-ping PENG, Zong-pu JIA, Zhi-zhong LIU, Xi-xi YAN

    Published 2017-11-01
    “…To solve the problem of security and efficiency of anonymous authentication in vehicular ad hoc network,a pairing-free certificateless batch anonymous authentication scheme was proposed.The public and private keys and pseudonyms were jointly generated by the trusted third party and vehicle,so the system security didn't depend on the tamper device.The scheme can realize authentication,anonymity,traceability,unforgeability,forward or backward security,and so on.Furthermore,under the random oracle model,the scheme can resist Type I and Type II attacks.Because there is no need to use certificates during authentication,the system storage load is effectively reduced.At the same time,the scheme realizes the batch message authentication on the basis of pairing-free operation,so the authentication efficiency is improved.Therefore,the scheme has important theoretical significance and application value in the resource-limited internet of things or embedded environment.…”
    Get full text
    Article
  6. 966

    Wi-freshness: research on CSI-based pork freshness detecting system by Chao NIU, Weidong YANG, Pengming HU, Xiangshang GAO, Erbo SHEN

    Published 2023-06-01
    “…Effective and rapid detection of pork freshness is important for pork quality.However, traditional sensory evaluation methods are too subjective, physical and chemical analysis methods are time-consuming and destructive.Recently, radio frequency is widely used in the field of location, material identification and human body monitoring, while, the meat freshness detection is ignored.A real-time, non-destructive and low-cost system for pork freshness detecting based on channel state information (CSI) was proposed.It is a new application of internet of things in the field of fresh agricultural products based on ubiquitous network (commercial Wi-Fi).The proposed Wi-freshness consists of four modules: CSI data sensing, data pre-processing, detection modelling and freshness detection.Considering the need for Wi-freshness data characteristic value processing is not much, and high demand for real-time prediction characteristics, a detection model based broad learning system (BLS) was proposed.Experiment shows that Wi-freshness system can achieve more than 93% detection accuracy.…”
    Get full text
    Article
  7. 967

    Design of polling access control protocol in WSN based on FPGA by Long-jun LIU, Hong-wei DING, Qian-lin LIU, Zheng-gang LIU

    Published 2016-10-01
    “…MAC(media access control) protocol is a direct link between physical and network layer,which is one of the key protocols to ensure high efficient communication.According to the characteristics of WSN (wireless sensor network) nodes,the design and implementation of polling access control protocol based on FPGA (field programmable gate array) were presented for the first time.The design made full use of the characteristics of flexibility and reconfigurability of FPGA.The method of combination of the hardware circuit description language Verilog HDL and the principle diagram was adopted,using Quartus II 8.0 to carry on the synthesis and routing,testing in the DE2.The design has the characteristics of good real-time,high reliability,strong portability,and can effectively reduce the transmission delay and improve the bus utilization.The designed system can be widely used in WSN,software radio network,ad hoc networks,military integrated service network,mobile communications networks,Internet of things as well as other fields.…”
    Get full text
    Article
  8. 968

    Ontologies for the Transactions on IoT by Chao Qu, Fagui Liu, Ming Tao

    Published 2015-03-01
    “…To facilitate the efficient use of information generated from the Internet of Things (IoT) by sensors and automatically drive entities to meet the needs of human beings, this paper presents an information processing framework using semantic web technologies. …”
    Get full text
    Article
  9. 969

    Blockchain empowered 6G by Yueyue DAI, Ke ZHANG, Yan ZHANG

    Published 2020-03-01
    “…6G network not only explore higher communication rates but also combine with the emerging technologies such as cloud computing,edge computing,artificial intelligence,and big data,and use a new network architecture to achieve wider interconnection and interoperability across network and domains,and provide an intelligent,safe and efficient technical support for industrial Internet of things,smart cities,and intelligent transportation.Blockchain technology as a decentralized,open and transparent distributed ledger technology can provide strong security for 6G.The integration of blockchain technology and 6G network was studied.Firstly,the difference between 5G and 6G network and the challenges of 6G faced were given,and the research of blockchain technology in spectrum management,mobile edge computing and D2D communication was reviewed.Then,the integration of blockchain technology and 6G emerging network was explored.Thus,the technical challenges in terms of blockchain and the cloud-edge-device network,blockchain and federal learning,blockchain-based resource transactions,and lightweight blockchain for edge network were presented.The corresponding solutions were also given.…”
    Get full text
    Article
  10. 970

    Analysis and Prediction of Body Test Results Based on Improved Backpropagation Neural Network Algorithm by Zhanju Ma, Yao Wang

    Published 2022-01-01
    “…At the same time, the prediction results are combined with the Internet of things technology to produce a student sports prescription management system, which sets different sunshine running parameters for students with different predicted results and provides personalized sports prescriptions for students with different physical conditions, which has extensive and far-reaching application value.…”
    Get full text
    Article
  11. 971

    Advances in Remote Sensing and Propulsion Systems for Earth Observation Nanosatellites by Georgios Fevgas, Thomas Lagkas, Panagiotis Sarigiannidis, Vasileios Argyriou

    Published 2025-01-01
    “…Nanosatellites are widely used in generic applications, such as education, vegetation monitoring, natural disasters, oceanography, and specialized applications, such as disaster response, and they serve as an Internet of Things (IoT) communications platform. This paper presents a review of the latest public nanosatellite EO missions, their applications, and their propulsion systems. …”
    Get full text
    Article
  12. 972

    Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK by Sugio Nobuyuki

    Published 2023-01-01
    “…Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment. …”
    Get full text
    Article
  13. 973

    Digital and circularity in building. KETs for waste management in the European Union by Marina Rigillo, Giuliano Galluccio, Federica Paragliola

    Published 2023-06-01
    “… The article analyses the potential and limitations of using enabling technologies of the digital transition for construction and demolition waste in construction management (BIM, GIS, Virtual and Augmented Reality, Digital Manufacturing, Blockchain, Internet of Things, Digital Twin, Artificial Intelligence) in the context of the European Union. …”
    Get full text
    Article
  14. 974

    Prediction of the waterborne navigation density based on the multi-feature spatio-temporal graph convolution network by Wei DONG, Leilei ZHANG, Ziheng JIN, Wei SUN, Junbo GAO

    Published 2020-09-01
    “…In the face of the development of the information technology in the port and waterway,the Internet of things (IoT) technology can help to build China’s water transport perception network.The big data analysis of the waterborne transport has become a hot topic for researchers and practitioners in the field of transportation.The navigation density of each port in the water transportation is nonlinear and spatio-temporal correlation,so it is a great challenge to accurately predict it.A multi-feature spatiotemporal graph convolution network (MFSTGCN) was proposed to solve the problem of the traffic density prediction.MFSTGCN effectively captured the spatial-temporal correlation of the ship navigation density data by using the spatial convolution and temporal convolution through three features,which were navigation volume,average ship speed and ship density.The experiment was carried out on the automatic identification system (AIS) data set collected from a shipping platform.The results show that the prediction effect of the MFSTGCN model is better than the spatio-temporal graph convolution network (STGCN) model.…”
    Get full text
    Article
  15. 975

    Main directions of implementing research results of artificial intelligence systems into domestic production by F. F. Sharipov, M. A. Dyakonova

    Published 2024-03-01
    “…Wireless communication, the Internet of Things, unmanned vehicle including aircraft are the terms of the XXI century. …”
    Get full text
    Article
  16. 976

    Intent-driven 6G radio access network by Yangcheng ZHOU, Shi YAN, Mugen PENG

    Published 2020-03-01
    “…To satisfy the requirements of full-spectrum,full-scenario and full-service networking in the future Internet of things,the intent-driven radio access network (ID-RAN) is proposed for the 6G wireless communication system to decrease the networking costs and save the labor expense,while enhancing the intelligent capabilities of the radio access network.Based on the artificial intelligence,network function virtualization and software-defined networking,the intents from applications,performance requirements and networking status can be translated to the configuration and optimization strategies by the proposed ID-RAN,which enables 6G work efficiently,flexibility and elastically.The system architecture of ID-RAN was proposed firstly,and then the principles and solutions of key techniques were formulated,including intent translation,conflict resolution,configuration trigger,performance evaluation and optimization.Meanwhile,the open software-defined hardware platform for ID-RAN was built,and the corresponding performances aimed for 6G were presented.…”
    Get full text
    Article
  17. 977

    Improve security monitoring knowledge management in IoT applications based on user behavior analysis by Hossein Amoozad-Khalili

    Published 2023-09-01
    “…This article presents a way to monitor knowledge management as well as to store and retrieve user information in the Internet of Things. Using the proposed method, users can transfer their data to IoT storage servers with more security than similar methods without knowing how and where to store it. …”
    Get full text
    Article
  18. 978

    Research on deep reinforcement learning based intelligent shop scheduling method by Zihui LUO, Chengling JIANG, Liang LIU, Xiaolong ZHENG, Huadong MA

    Published 2022-03-01
    “…The unprecedented prosperity of the industrial internet of things (IIoT) has opened up a new path for the traditional industrial manufacturing model.Intelligent shop scheduling is one of the key technologies to achieve the overall control and flexible production of the whole production process.It requires an effective plan with a minimum makespan to allocate multiple processes and multiple machines for production scheduling.Firstly, the shop scheduling problem was defined as a Markov decision process (MDP), and a shop scheduling model based on the pointer network was established.Secondly, the job scheduling process was regarded as a mapping from one sequence to another, and a new shop scheduling algorithm based on deep reinforcement learning (DRL) was proposed.By analyzing the convergence of the model under different parameter settings, the optimal parameters were determined.Experimental results on different scales of public data sets and actual production data sets show that the proposed DRL algorithm can obtain better performances.…”
    Get full text
    Article
  19. 979

    Teacher Readiness for Digital Transformation by Hamimah Turrohmah, Suryanto Suryanto

    Published 2023-11-01
    “…However, there are obstacles in carrying out teacher activities using digital devices and media such as virtual media, web- based learning platforms, and the use of IoT (Internet of Things) caused by low adaptability. In overcoming this, the school's efforts are to provide digital literacy supplies and provide adequate digital technology. …”
    Get full text
    Article
  20. 980

    Energy efficiency maximization resource allocation algorithm in wireless-powered backscatter communication network by Yongjun XU, Bowen GU, Qianbin CHEN, Jinzhao LIN

    Published 2020-10-01
    “…In order to alleviate the energy consumption problem caused by the increasing number of Internet of things (IoT) nodes,an energy-efficient (EE) maximization based resource allocation algorithm was proposed for multi-carrier wireless-powered backscatter communication network.Firstly,a multivariable and nonlinear resource allocation model was formulated to jointly optimize transmit power,transmission time,reflection coefficient,and energy-harvesting allocation coefficient,where the maximum transmit power constraint of the power station and the minimum harvested energy constraint at the backscatter device were considered.Then,the original non-convex optimization problem was transformed into a convex one which was solved by using Dinkelbach’s method and the variable substitution approach.Furthermore,the analytical solution of the resource allocation problem was obtained based on Lagrange dual theory.Simulation results verify that the proposed algorithm has better EE by comparing it with the existing algorithm under pure backscatter mode and algorithm under the harvested-then-transmit mode.…”
    Get full text
    Article