-
961
Design and implementation of low-cost hardware architecture for authentication encryption algorithm SM4-GCM
Published 2023-12-01“…The internet of things (IoT) has gained wide adoption across various industries, driving digitalization and intelligence in industry applications.However, the data collected by IoT devices in some industry applications may be closely linked to user privacy and property security.To ensure the security of such data, a cost-effective, multifunctional hardware architecture design based on the Chinese authenticated encryption algorithm SM4-GCM (Galois/Counter Mode) was proposed, which offered a balanced approach to performance, cost, and hardware-level data confidentiality and integrity assurance, and supported three operation modes: SM4-CTR, SM4-ECB, and SM4-GCM.The implementation results on the field programmable gate array (FPGA) development board demonstrate that the design requires only 1 761 look-up tables and 1 825 registers, occupies only 604 slices, and has a throughput rate of 39.78 Mbit/s@100 MHz.These results suggest that the proposed design can effectively meet the requirements of IoT data security applications.…”
Get full text
Article -
962
Digital twin based intelligent urban traffic forecasting and guidance strategy
Published 2023-03-01“…As the technology of ubiquitous Internet of things and artificial intelligence improves by leaps and bounds, the transportation system revolution is flourishing and bringing new opportunities and challenges.Considering the defect in the existing navigation system, and the neglect of the temporal and spatial characteristics of traffic flow, the macro traffic network and micro vehicle network were modeled and their coupling relationship was mined.Then, a digital twin based urban traffic forecasting and guidance method was proposed to alleviate the problem of traffic congestion.The spatial-temporal traffic flow information was predicted through the diffusion convolution recurrent neural network, which was explicitly applied to the vehicle path planning decision.On this basis, a spatial-temporal collaborative deep reinforcement learning method was proposed to implement the future-oriented collaborative path planning of vehicles.It also guided the underlying vehicle twins to select the optimal strategy for the real world.With SUMO for simulation verification, the experimental results show that the proposed method is significantly better than the existing algorithms in improving the travel completion ratio and congestion relief, and can improve the efficiency of urban traffic travel.…”
Get full text
Article -
963
Sequential Uniformly Reweighted Sum-Product Algorithm for Cooperative Localization in Wireless Networks
Published 2014-08-01Get full text
Article -
964
A genetic algorithm based method of optimizing dispersion matrix for RDSM system
Published 2022-12-01“…Rectangular differential spatial modulation (RDSM) is a multi-antenna incoherent modulation technology with high spectral efficiency, low power consumption, and zero-overhead for channel estimation.RDSM is especially suitable for 6G communication systems, such as fast-moving Internet of vehicles, Internet of things, cellular networks, etc.However, the construction of the sparse rectangular unitary space-time dispersion matrix (DM) at transmitter is a problem.The proposed Genetic algorithm (GA) will result in less computational complexity than the currently used random research.The fitness of GA was calculated by the rank and determinant criterion (RDC) method to avoid discussions in differential system.Due to characteristics of constellation symbols of RDSM, the proposed method reduced the computational complexity during each single iteration in GA.The simulation results show that the optimized DMS can significantly improve the bit error rate (BER) performance of the RDSM system.Compared with random search, the low-complexity GA effectively improves the DMS optimization efficiency of RDSM.The computational complexity required for optimizing DMS is about 0.1% of random search optimization method.…”
Get full text
Article -
965
Research on pairing-free certificateless batch anonymous authentication scheme for VANET
Published 2017-11-01“…To solve the problem of security and efficiency of anonymous authentication in vehicular ad hoc network,a pairing-free certificateless batch anonymous authentication scheme was proposed.The public and private keys and pseudonyms were jointly generated by the trusted third party and vehicle,so the system security didn't depend on the tamper device.The scheme can realize authentication,anonymity,traceability,unforgeability,forward or backward security,and so on.Furthermore,under the random oracle model,the scheme can resist Type I and Type II attacks.Because there is no need to use certificates during authentication,the system storage load is effectively reduced.At the same time,the scheme realizes the batch message authentication on the basis of pairing-free operation,so the authentication efficiency is improved.Therefore,the scheme has important theoretical significance and application value in the resource-limited internet of things or embedded environment.…”
Get full text
Article -
966
Wi-freshness: research on CSI-based pork freshness detecting system
Published 2023-06-01“…Effective and rapid detection of pork freshness is important for pork quality.However, traditional sensory evaluation methods are too subjective, physical and chemical analysis methods are time-consuming and destructive.Recently, radio frequency is widely used in the field of location, material identification and human body monitoring, while, the meat freshness detection is ignored.A real-time, non-destructive and low-cost system for pork freshness detecting based on channel state information (CSI) was proposed.It is a new application of internet of things in the field of fresh agricultural products based on ubiquitous network (commercial Wi-Fi).The proposed Wi-freshness consists of four modules: CSI data sensing, data pre-processing, detection modelling and freshness detection.Considering the need for Wi-freshness data characteristic value processing is not much, and high demand for real-time prediction characteristics, a detection model based broad learning system (BLS) was proposed.Experiment shows that Wi-freshness system can achieve more than 93% detection accuracy.…”
Get full text
Article -
967
Design of polling access control protocol in WSN based on FPGA
Published 2016-10-01“…MAC(media access control) protocol is a direct link between physical and network layer,which is one of the key protocols to ensure high efficient communication.According to the characteristics of WSN (wireless sensor network) nodes,the design and implementation of polling access control protocol based on FPGA (field programmable gate array) were presented for the first time.The design made full use of the characteristics of flexibility and reconfigurability of FPGA.The method of combination of the hardware circuit description language Verilog HDL and the principle diagram was adopted,using Quartus II 8.0 to carry on the synthesis and routing,testing in the DE2.The design has the characteristics of good real-time,high reliability,strong portability,and can effectively reduce the transmission delay and improve the bus utilization.The designed system can be widely used in WSN,software radio network,ad hoc networks,military integrated service network,mobile communications networks,Internet of things as well as other fields.…”
Get full text
Article -
968
Ontologies for the Transactions on IoT
Published 2015-03-01“…To facilitate the efficient use of information generated from the Internet of Things (IoT) by sensors and automatically drive entities to meet the needs of human beings, this paper presents an information processing framework using semantic web technologies. …”
Get full text
Article -
969
Blockchain empowered 6G
Published 2020-03-01“…6G network not only explore higher communication rates but also combine with the emerging technologies such as cloud computing,edge computing,artificial intelligence,and big data,and use a new network architecture to achieve wider interconnection and interoperability across network and domains,and provide an intelligent,safe and efficient technical support for industrial Internet of things,smart cities,and intelligent transportation.Blockchain technology as a decentralized,open and transparent distributed ledger technology can provide strong security for 6G.The integration of blockchain technology and 6G network was studied.Firstly,the difference between 5G and 6G network and the challenges of 6G faced were given,and the research of blockchain technology in spectrum management,mobile edge computing and D2D communication was reviewed.Then,the integration of blockchain technology and 6G emerging network was explored.Thus,the technical challenges in terms of blockchain and the cloud-edge-device network,blockchain and federal learning,blockchain-based resource transactions,and lightweight blockchain for edge network were presented.The corresponding solutions were also given.…”
Get full text
Article -
970
Analysis and Prediction of Body Test Results Based on Improved Backpropagation Neural Network Algorithm
Published 2022-01-01“…At the same time, the prediction results are combined with the Internet of things technology to produce a student sports prescription management system, which sets different sunshine running parameters for students with different predicted results and provides personalized sports prescriptions for students with different physical conditions, which has extensive and far-reaching application value.…”
Get full text
Article -
971
Advances in Remote Sensing and Propulsion Systems for Earth Observation Nanosatellites
Published 2025-01-01“…Nanosatellites are widely used in generic applications, such as education, vegetation monitoring, natural disasters, oceanography, and specialized applications, such as disaster response, and they serve as an Internet of Things (IoT) communications platform. This paper presents a review of the latest public nanosatellite EO missions, their applications, and their propulsion systems. …”
Get full text
Article -
972
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
Published 2023-01-01“…Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment. …”
Get full text
Article -
973
Digital and circularity in building. KETs for waste management in the European Union
Published 2023-06-01“… The article analyses the potential and limitations of using enabling technologies of the digital transition for construction and demolition waste in construction management (BIM, GIS, Virtual and Augmented Reality, Digital Manufacturing, Blockchain, Internet of Things, Digital Twin, Artificial Intelligence) in the context of the European Union. …”
Get full text
Article -
974
Prediction of the waterborne navigation density based on the multi-feature spatio-temporal graph convolution network
Published 2020-09-01“…In the face of the development of the information technology in the port and waterway,the Internet of things (IoT) technology can help to build China’s water transport perception network.The big data analysis of the waterborne transport has become a hot topic for researchers and practitioners in the field of transportation.The navigation density of each port in the water transportation is nonlinear and spatio-temporal correlation,so it is a great challenge to accurately predict it.A multi-feature spatiotemporal graph convolution network (MFSTGCN) was proposed to solve the problem of the traffic density prediction.MFSTGCN effectively captured the spatial-temporal correlation of the ship navigation density data by using the spatial convolution and temporal convolution through three features,which were navigation volume,average ship speed and ship density.The experiment was carried out on the automatic identification system (AIS) data set collected from a shipping platform.The results show that the prediction effect of the MFSTGCN model is better than the spatio-temporal graph convolution network (STGCN) model.…”
Get full text
Article -
975
Main directions of implementing research results of artificial intelligence systems into domestic production
Published 2024-03-01“…Wireless communication, the Internet of Things, unmanned vehicle including aircraft are the terms of the XXI century. …”
Get full text
Article -
976
Intent-driven 6G radio access network
Published 2020-03-01“…To satisfy the requirements of full-spectrum,full-scenario and full-service networking in the future Internet of things,the intent-driven radio access network (ID-RAN) is proposed for the 6G wireless communication system to decrease the networking costs and save the labor expense,while enhancing the intelligent capabilities of the radio access network.Based on the artificial intelligence,network function virtualization and software-defined networking,the intents from applications,performance requirements and networking status can be translated to the configuration and optimization strategies by the proposed ID-RAN,which enables 6G work efficiently,flexibility and elastically.The system architecture of ID-RAN was proposed firstly,and then the principles and solutions of key techniques were formulated,including intent translation,conflict resolution,configuration trigger,performance evaluation and optimization.Meanwhile,the open software-defined hardware platform for ID-RAN was built,and the corresponding performances aimed for 6G were presented.…”
Get full text
Article -
977
Improve security monitoring knowledge management in IoT applications based on user behavior analysis
Published 2023-09-01“…This article presents a way to monitor knowledge management as well as to store and retrieve user information in the Internet of Things. Using the proposed method, users can transfer their data to IoT storage servers with more security than similar methods without knowing how and where to store it. …”
Get full text
Article -
978
Research on deep reinforcement learning based intelligent shop scheduling method
Published 2022-03-01“…The unprecedented prosperity of the industrial internet of things (IIoT) has opened up a new path for the traditional industrial manufacturing model.Intelligent shop scheduling is one of the key technologies to achieve the overall control and flexible production of the whole production process.It requires an effective plan with a minimum makespan to allocate multiple processes and multiple machines for production scheduling.Firstly, the shop scheduling problem was defined as a Markov decision process (MDP), and a shop scheduling model based on the pointer network was established.Secondly, the job scheduling process was regarded as a mapping from one sequence to another, and a new shop scheduling algorithm based on deep reinforcement learning (DRL) was proposed.By analyzing the convergence of the model under different parameter settings, the optimal parameters were determined.Experimental results on different scales of public data sets and actual production data sets show that the proposed DRL algorithm can obtain better performances.…”
Get full text
Article -
979
Teacher Readiness for Digital Transformation
Published 2023-11-01“…However, there are obstacles in carrying out teacher activities using digital devices and media such as virtual media, web- based learning platforms, and the use of IoT (Internet of Things) caused by low adaptability. In overcoming this, the school's efforts are to provide digital literacy supplies and provide adequate digital technology. …”
Get full text
Article -
980
Energy efficiency maximization resource allocation algorithm in wireless-powered backscatter communication network
Published 2020-10-01“…In order to alleviate the energy consumption problem caused by the increasing number of Internet of things (IoT) nodes,an energy-efficient (EE) maximization based resource allocation algorithm was proposed for multi-carrier wireless-powered backscatter communication network.Firstly,a multivariable and nonlinear resource allocation model was formulated to jointly optimize transmit power,transmission time,reflection coefficient,and energy-harvesting allocation coefficient,where the maximum transmit power constraint of the power station and the minimum harvested energy constraint at the backscatter device were considered.Then,the original non-convex optimization problem was transformed into a convex one which was solved by using Dinkelbach’s method and the variable substitution approach.Furthermore,the analytical solution of the resource allocation problem was obtained based on Lagrange dual theory.Simulation results verify that the proposed algorithm has better EE by comparing it with the existing algorithm under pure backscatter mode and algorithm under the harvested-then-transmit mode.…”
Get full text
Article