Showing 1,041 - 1,060 results of 1,444 for search '"Internet of things"', query time: 0.06s Refine Results
  1. 1041

    Secure transmission for NOMA downlink based on short packet communication by Gangcan SUN, Shaoke ZHAO, Wanming HAO, Zhengyu ZHU

    Published 2021-02-01
    “…For the low-latency requirements of Internet of things (IoT) business, short packet communication (SPC) and non-orthogonal multiple access (NOMA) were combined to study the problem of secure transmission in the multi-user NOMA system with eavesdroppers.With the maximizing the secure throughput of weak uses as the objective, considering the user decoding error probability constraint, total power constraint and power allocation constraint, a low-complexity power allocation algorithm was proposed to realize secure transmission.In order to solve the problem caused by complex objective function formula and unreliable serial interference cancellation (SIC) technology, the proof that the compactness of the constraints was necessary to find the optimal solution.Under the constraint of maximum decoding error probability, the power constraint was transformed and calculated to obtain the strict limit of transmitting power for strong users, and the transmit power search set from base station to strong user was derived.Then, the one-dimensional search algorithm was used to allocate power resources to maximize the throughput of weak users.Simulation results prove that the proposed algorithm can effectively improve the security throughput of weak users in the system.…”
    Get full text
    Article
  2. 1042

    Coordinated UAV-UGV trajectory planning based on load balancing in IoT data collection by Yuchao ZHU, Shaowei WANG

    Published 2024-01-01
    “…To improve the efficiency of large-scale Internet of things (IoT) data collection, a coordinated trajectory planning algorithm for multiple aerial and ground vehicles based on load balancing region partitioning was proposed, where unmanned aerial vehicles (UAVs) acting as aerial base stations were dispatched to gather data from IoT devices and unmanned ground vehicles (UGVs) acting as mobile battery swap stations were used to compensate for the shortage of UAV’s energy.Aiming at shortening the mission completion time, the optimization task was to minimize the longest mission time among a fleet of UAV-UGVs, which was formulated as a variant of min-max multi-depot vehicle routing problem and solved from the load-balancing perspective.Specifically, the IoT devices were assigned to the UAV-UGVs’ service zones by a load-balancing region partition algorithm, based on which the trajectory planning problem of multiple UAV and UGV was reduced to several independent route planning problems for each UAV-UGV pair.Then, a cooperative trajectory planning strategy was developed to optimize the route in each service zone.Numerical results validate that the proposed algorithm outperforms the compared algorithms in terms of mission completion time and balancing degree.…”
    Get full text
    Article
  3. 1043

    Differential fault attack on LiCi cipher by Weijian CHEN, Haoxiang LUO

    Published 2021-04-01
    “…LiCi lightweight block cipher is a new algorithm proposed in 2017.With advantages of small structure and low energy consumption, LiCi is more suitable for resource-constrained environments such as the internet of things (IoT).In the design document of LiCi, the ability of LiCi algorithm to resist differential attack and linear attack is analyzed, but the resistance of LiCi algorithm to differential fault attack has not been discussed.According to the permutation law of each round iteration of LiCi algorithm, 32-bit key can be recovered by injecting a single bit fault into the left half of the 31st round iteration combined with its differential property.According to the key choreography scheme of the LiCi algorithm, the same differential fault attack was performed on iterations 30th, 29th, 28th, 27th and 26th round to recover all the original keys.The attack requires a total of 48-bit faults, and the computational complexity is 2<sup>32</sup>, which indicates the LiCi algorithm is difficult to resist differential fault attacks.…”
    Get full text
    Article
  4. 1044

    Sistem Akuaponik untuk Peternakan Lele dan Tanaman Kangkung Hidroponik Berbasis IoT dan Sistem Inferensi Fuzzy by Fachrul Rozie, Iwan Syarif, Muhammad Udin Harun Al Rasyid, Edi Satriyanto

    Published 2021-02-01
    “…This study aims to develop a smart system in aquaponic cultivation by utilizing Internet of Things technology which is equipped with several types of sensors to monitor and control water quality by applying the Fuzzy Inference System (FIS) algorithm to regulate the speed of pool water circulation in order to save electric power on the pump. …”
    Get full text
    Article
  5. 1045

    Analisis Kinerja Jaringan Sensor Nirkabel untuk Edge Computing Menggunakan LORA SX1278 by Mochammad Hannats Hanafi Ichsan

    Published 2021-10-01
    “…Jaringan Sensor Nirkabel (WSN) adalah salah satu teknologi yang muncul untuk proses deploy dari Internet of Things, Smart System, Machine to Machine networks dan lain sebagainya. …”
    Get full text
    Article
  6. 1046

    Perancangan User Experience Aplikasi Penghemat Listrik myECO dengan Otomatisasi dan Manajemen Listrik untuk Rumah Tangga by Maulana Derifato Achmad, Herman Tolle, Buce Trias Hanggara

    Published 2024-12-01
    “…Maka dapat dihadirkan suatu solusi yaitu aplikasi berbasis Internet of Things (IoT), Artificial Intelligence dan Machine Learning yang dapat menganalisis pemborosan dan memudahkan manajemen perangkat listrik. …”
    Get full text
    Article
  7. 1047

    Pengembangan Auto-AI Model Generatif Analisis Kompleksitas Waktu Algoritma Untuk Data Multi-Sensor IoT Pada Node-RED Menggunakan Extreme Learning Machine by Imam Cholissodin, Dahnial Syauqy, Dwi Ady Firmanda, Ibrahim Aji, Edy Rahman, Syazwandy Harahap, Fernando Septino

    Published 2022-12-01
    “…Hasil komparasi nilai T(n) dari ELM, yang tercepat atau terkecil waktu komputasinya digunakan sebagai rekomendasi algoritma untuk pengolahan data multi-sensor pada Internet of Things (IoT) simulator maupun non-simulator menggunakan Node-RED dengan tambahan platform yaitu flespi dan Heroku, sebagai solusi general untuk semua jenis kasus dan analisis algoritmanya. …”
    Get full text
    Article
  8. 1048

    A Review on Blockchain Applications in Operational Technology for Food and Agriculture Critical Infrastructure by Chengliang Zheng, Xiangzhen Peng, Ziyue Wang, Tianyu Ma, Jiajia Lu, Leiyang Chen, Liang Dong, Long Wang, Xiaohui Cui, Zhidong Shen

    Published 2025-01-01
    “…Keywords such as “blockchain”, “internet of things”, “smart contract”, “security”, and “critical infrastructure” appear with significant frequency. …”
    Get full text
    Article
  9. 1049

    Intelligent Construction, Operation, and Maintenance of a Large Wastewater-Treatment Plant Based on BIM by Jiu-Lin Li, Li-Min Chen, Hao Xu

    Published 2021-01-01
    “…The process involved intelligent design and simulation techniques, management and simulation of construction works, digital delivery solutions, BIM-based Internet of things O&M, and environmental monitoring. BIM was used to digitalize the construction, delivery, and O&M processes of the WTP. …”
    Get full text
    Article
  10. 1050
  11. 1051

    An access control scheme for IoT based on smart contracts and CP-ABE by SUN Changxia, ZHANG Chuanhu, LIU Bingjie, YANG Yingjie, BAÇÃO Fernando, LIU Qian

    Published 2024-10-01
    “…As the number of Internet of things (IoT) devices increases, traditional centralized access control solutions are inadequate for the current large-scale IoT environment. …”
    Get full text
    Article
  12. 1052

    mmWave radar based robust sign language recognition for the smart museum by Xuerong ZHAO, Xuan WANG, Tong LIU, Xia ZHENG, Yicheng JIANG

    Published 2023-08-01
    “…A smart museum is a new form of a museum, which uses devices or technologies including the Internet of things (IoT) and artificial intelligence (AI) to build the information interaction channels between people, things, and space.Sign language recognition not only assists the visitors who have hearing or speech impairment to visit the museum without barriers but also helps study the visitors’ natural gesture interaction.However, the methods based on cameras and wearable devices mayhave issues like privacy or usability when applied to museum spaces.Therefore, a robust sign language recognition method based on millimeter-wave radar was proposed.Different features of distance and velocity changes relative to the radar device were firstly extracted in this method, then a physical data enhancement method was adopted to expand the training data.Finally, a ResNet based on the pre-processed distance time features and Doppler time features was designed to further remove the environment-related information and perform feature fusion for classification.Experimental results show that this method can effectively recognize sign language and achieve an averaged recognition accuracy of over 90% when the testing environment and the user's location change, providing a new method for smart museum wireless sign language and gesture recognition.…”
    Get full text
    Article
  13. 1053

    Integration of Artificial Intelligence and Blockchain Technology in Healthcare and Agriculture by Sonali Vyas, Mohammad Shabaz, Prajjawal Pandit, L. Rama Parvathy, Isaac Ofori

    Published 2022-01-01
    “…By combining technologies such as the internet of things (IoT) and artificial intelligence (AI), innovative healthcare modifies and enhances traditional medical systems in terms of efficiency, service, and personalization. …”
    Get full text
    Article
  14. 1054

    Context-aware learning-based access control method for power IoT by Zhenyu ZHOU, Zehan JIA, Haijun LIAO, Xiongwen ZHAO, Lei ZHANG

    Published 2021-03-01
    “…In view of the problems of severe access conflicts, high queue backlog, and low energy efficiency in the massive terminal access scenario of the power Internet of things (power IoT) in 6G era, a context-aware learning-based access control (CLAC) algorithm was proposed.The proposed algorithm was based on reinforcement learning and fast uplink grant technology, considering active state and dormant state of terminals, and the optimization objective was to maximize the total network energy efficiency under the long-term constraint of terminal access service quality requirements.Lyapunov optimization was used to decouple the long-term optimization objective and constraint, and the long-term optimization problem was transformed into a series of single time-slot independent deterministic sub-problems, which could be solved by the terminal state-aware upper confidence bound algorithm.The simulation results show that CLAC can improve the network energy efficiency while meeting the terminal access service quality requirements.Compared with the traditional fast uplink grant, CLAC can improve the average energy efficiency by 48.11%, increase the proportion of terminals meeting access service quality requirements by 54.95%, and reduce the average queue backlog by 83.83%.…”
    Get full text
    Article
  15. 1055

    The Organizational Structure and Operational Logic of an Urban Smart Governance Information Platform: Discussion on the Background of Urban Governance Transformation in China by Junfang Kang, Xianjun Wang

    Published 2020-01-01
    “…Urban smart governance supported by mobile Internet, the Internet of Things, quantum computing, big data, artificial intelligence, and other information technologies has also entered the field of vision of academics and administrators. …”
    Get full text
    Article
  16. 1056

    Wearable respiratory sensors for health monitoring by Zhifu Yin, Yang Yang, Cong Hu, Jinzhe Li, Boyu Qin, Xue Yang

    Published 2024-02-01
    “…Along with the development of the Internet of Things and the medical drive for early detection and treatment, wearable devices will become increasingly important in the future. …”
    Get full text
    Article
  17. 1057

    AODV protocol for acoustic-radio integrated network based on location information and energy balance by Nongyu WEI, Zilong JIANG, Fangjiong CHEN

    Published 2023-03-01
    “…Different from terrestrial internet of things (IoT) applications, marine IoT applications need to solve the problem of information interaction between surface network and underwater network.The key to solve this problem is to design a proper routing scheme.An ad hoc on-demand distance vector for acoustic-radio integrated network (AR-AODV) was proposed based on location information and energy balance.The protocol enables surface radio links to forward more information data, so as to reduce the burden of underwater communication network and improve the overall performance.In the proposed protocol, the forwarding priority of the buoy nodes was higher than that of the underwater nodes.When the source node needs to send data, it enters the route discovery phase, i.e., the node uses its position and energy information as the heuristic information to calculate the forwarding probability and broadcast route request (RREQ) packets.When the destination node receives an RREQ packet, it sent an RREP packet to update the pheromone and select the optimal path based on the pheromone.Compared with AODV protocol, AR-AODV protocol has significantly improved the performance in terms of transmission success rate, transmission delay, throughput, energy conversion rate and routing packet forwarding times.…”
    Get full text
    Article
  18. 1058

    Development of a standardized data collection and intelligent fabric quality prediction system for the weaving department by Ning Dai, Lunjun Li, Kaixin Xu, Zhehao Lu, Xudong Hu, Yanhong Yuan

    Published 2025-01-01
    “…This study leverages the standardization and interoperability features of open platform communications unified architecture technology to facilitate data acquisition within the weaving department, establishing a reliable Internet of Things framework that supports subsequent fabric quality prediction, and optimizing the back propagation neural network through the K-means clustering algorithm and particle swarm optimization to predict the type and number of fabric defects. …”
    Get full text
    Article
  19. 1059

    Enhancing IoT security in smart grids with quantum-resistant hybrid encryption by Jian Xiong, Lu Shen, Yan Liu, Xiaofen Fang

    Published 2025-01-01
    “…Abstract Integrating the Internet of Things (IoT) in smart grids has revolutionized the energy sector, enabling real-time data collection and efficient energy distribution. …”
    Get full text
    Article
  20. 1060

    Sustainable Development in the Digital Age: Harnessing Emerging Digital Technologies to Catalyze Global SDG Achievement by Claudiu George Bocean

    Published 2025-01-01
    “…This research explores the transformative potential of cutting-edge digital technologies—including artificial intelligence, big data analytics, cloud computing, and the Internet of Things—in fostering sustainable development across economic, social, and environmental dimensions. …”
    Get full text
    Article