期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
An Intelligent Big Data Security Framework Based on AEFS-KENN Algorithms for the Detection of Cyber-Attacks from Smart Grid Systems
1
作者 Sankaramoorthy Muthubalaji Naresh Kumar Muniyaraj +4 位作者 Sarvade Pedda Venkata Subba Rao Kavitha Thandapani Pasupuleti Rama Mohan Thangam Somasundaram yousef farhaoui 《Big Data Mining and Analytics》 EI CSCD 2024年第2期399-418,共20页
Big data has the ability to open up innovative and ground-breaking prospects for the electrical grid,which also supports to obtain a variety of technological,social,and financial benefits.There is an unprecedented amo... Big data has the ability to open up innovative and ground-breaking prospects for the electrical grid,which also supports to obtain a variety of technological,social,and financial benefits.There is an unprecedented amount of heterogeneous big data as a consequence of the growth of power grid technologies,along with data processing and advanced tools.The main obstacles in turning the heterogeneous large dataset into useful results are computational burden and information security.The original contribution of this paper is to develop a new big data framework for detecting various intrusions from the smart grid systems with the use of AI mechanisms.Here,an AdaBelief Exponential Feature Selection(AEFS)technique is used to efficiently handle the input huge datasets from the smart grid for boosting security.Then,a Kernel based Extreme Neural Network(KENN)technique is used to anticipate security vulnerabilities more effectively.The Polar Bear Optimization(PBO)algorithm is used to efficiently determine the parameters for the estimate of radial basis function.Moreover,several types of smart grid network datasets are employed during analysis in order to examine the outcomes and efficiency of the proposed AdaBelief Exponential Feature Selection-Kernel based Extreme Neural Network(AEFS-KENN)big data security framework.The results reveal that the accuracy of proposed AEFS-KENN is increased up to 99.5%with precision and AUC of 99%for all smart grid big datasets used in this study. 展开更多
关键词 smart grid Machine Learning(ML) big data analytics AdaBelief Exponential Feature Selection(AEFS) Polar Bear Optimization(PBO) Kernel Extreme Neural Network(KENN)
原文传递
Adaptive Marine Predator Optimization Algorithm(AOMA)-Deep Supervised Learning Classification(DSLC)based IDS framework for MANET security
2
作者 M.Sahaya Sheela A.Gnana Soundari +4 位作者 Aditya Mudigonda C.Kalpana K.Suresh K.Somasundaram yousef farhaoui 《Intelligent and Converged Networks》 EI 2024年第1期1-18,共18页
Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks today.In MANET,the Intrusion Detection System(IDS)is crucial because it a... Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks today.In MANET,the Intrusion Detection System(IDS)is crucial because it aids in the identification and detection of malicious attacks that impair the network’s regular operation.Different machine learning and deep learning methodologies are used for this purpose in the conventional works to ensure increased security of MANET.However,it still has significant flaws,including increased algorithmic complexity,lower system performance,and a higher rate of misclassification.Therefore,the goal of this paper is to create an intelligent IDS framework for significantly enhancing MANET security through the use of deep learning models.Here,the min-max normalization model is applied to preprocess the given cyber-attack datasets for normalizing the attributes or fields,which increases the overall intrusion detection performance of classifier.Then,a novel Adaptive Marine Predator Optimization Algorithm(AOMA)is implemented to choose the optimal features for improving the speed and intrusion detection performance of classifier.Moreover,the Deep Supervise Learning Classification(DSLC)mechanism is utilized to predict and categorize the type of intrusion based on proper learning and training operations.During evaluation,the performance and results of the proposed AOMA-DSLC based IDS methodology is validated and compared using various performance measures and benchmarking datasets. 展开更多
关键词 Intrusion Detection System(IDS) Security Mobile Ad-hoc Network(MANET) min-max normalization Adaptive Marine Predator Optimization Algorithm(AOMA) Deep Supervise Learning Classification(DSLC)
原文传递
Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques 被引量:2
3
作者 Hanaa Attou Azidine Guezzaz +2 位作者 Said Benkirane Mourade Azrour yousef farhaoui 《Big Data Mining and Analytics》 EI CSCD 2023年第3期311-320,共10页
Cloud computing(CC)is a novel technology that has made it easier to access network and computer resources on demand such as storage and data management services.In addition,it aims to strengthen systems and make them ... Cloud computing(CC)is a novel technology that has made it easier to access network and computer resources on demand such as storage and data management services.In addition,it aims to strengthen systems and make them useful.Regardless of these advantages,cloud providers suffer from many security limits.Particularly,the security of resources and services represents a real challenge for cloud technologies.For this reason,a set of solutions have been implemented to improve cloud security by monitoring resources,services,and networks,then detect attacks.Actually,intrusion detection system(IDS)is an enhanced mechanism used to control traffic within networks and detect abnormal activities.This paper presents a cloud-based intrusion detection model based on random forest(RF)and feature engineering.Specifically,the RF classifier is obtained and integrated to enhance accuracy(ACC)of the proposed detection model.The proposed model approach has been evaluated and validated on two datasets and gives 98.3%ACC and 99.99%ACC using Bot-IoT and NSL-KDD datasets,respectively.Consequently,the obtained results present good performances in terms of ACC,precision,and recall when compared to the recent related works. 展开更多
关键词 cloud security anomaly detection features engineering random forest
原文传递
Editorial 被引量:1
4
作者 yousef farhaoui Stephen Ojo +1 位作者 Lateef Adesola Akinyemi Agbotiname Lucky Imoize 《Big Data Mining and Analytics》 EI CSCD 2023年第3期I0001-I0002,共2页
In the current scenario,information technology is taking maximum benefits from the“Intelligent Systems and Internet of Things(IoT)”.In order to get quality articles,we have circulated the call for papers to the rese... In the current scenario,information technology is taking maximum benefits from the“Intelligent Systems and Internet of Things(IoT)”.In order to get quality articles,we have circulated the call for papers to the researchers and academician and received numbers of quality papers.However,due to scope of special issue and review reports,we were able to add papers in this issue.The guest editors are thankful to the authors for supporting a long wait and finally it is before you.The aim of the special issue was to explore ample knowledge and submit some good pieces of papers for Big Data Mining and Analytics.We have received many papers for this special issue and based on the comments of the reviewers and quality of the research papers,we have identified 7 articles for this special issue.This special issue is addressing the original research on the theory,“Intelligent Systems and Internet of Things”,with the aim to contribute better work to the researcher and academic fraternity.We are very much thankful to the authors for their support and for keeping their faith in our guest editorial process.It takes more than a year to complete this issue,we are sure that their work will be well recognized by the researchers and readers who are working in engineering and informatics domain. 展开更多
关键词 THANK submit finally
原文传递
Human Action Recognition Using Difference of Gaussian and Difference of Wavelet
5
作者 Gopampallikar Vinoda Reddy Kongara Deepika +4 位作者 Lakshmanan Malliga Duraivelu Hemanand Chinnadurai Senthilkumar Subburayalu Gopalakrishnan yousef farhaoui 《Big Data Mining and Analytics》 EI CSCD 2023年第3期336-346,共11页
Human Action Recognition(HAR)attempts to recognize the human action from images and videos.The major challenge in HAR is the design of an action descriptor that makes the HAR system robust for different environments.A... Human Action Recognition(HAR)attempts to recognize the human action from images and videos.The major challenge in HAR is the design of an action descriptor that makes the HAR system robust for different environments.A novel action descriptor is proposed in this study,based on two independent spatial and spectral filters.The proposed descriptor uses a Difference of Gaussian(DoG)filter to extract scale-invariant features and a Difference of Wavelet(DoW)filter to extract spectral information.To create a composite feature vector for a particular test action picture,the Discriminant of Guassian(DoG)and Difference of Wavelet(DoW)features are combined.Linear Discriminant Analysis(LDA),a widely used dimensionality reduction technique,is also used to eliminate duplicate data.Finally,a closest neighbor method is used to classify the dataset.Weizmann and UCF 11 datasets were used to run extensive simulations of the suggested strategy,and the accuracy assessed after the simulations were run on Weizmann datasets for five-fold cross validation is shown to perform well.The average accuracy of DoG+DoW is observed as 83.6635%while the average accuracy of Discrinanat of Guassian(DoG)and Difference of Wavelet(DoW)is observed as 80.2312%and 77.4215%,respectively.The average accuracy measured after the simulation of proposed methods over UCF 11 action dataset for five-fold cross validation DoG+DoW is observed as 62.5231%while the average accuracy of Difference of Guassian(DoG)and Difference of Wavelet(DoW)is observed as 60.3214%and 58.1247%,respectively.From the above accuracy observations,the accuracy of Weizmann is high compared to the accuracy of UCF 11,hence verifying the effectiveness in the improvisation of recognition accuracy. 展开更多
关键词 human action recognition difference of Gaussian difference of wavelet linear discriminant analysis Weizmann UCF 11 ACCURACY
原文传递
An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security
6
作者 Mouaad Mohy-Eddine Azidine Guezzaz +2 位作者 Said Benkirane Mourade Azrour yousef farhaoui 《Big Data Mining and Analytics》 EI CSCD 2023年第3期273-287,共15页
Industrial Internet of Things(IIoT)represents the expansion of the Internet of Things(IoT)in industrial sectors.It is designed to implicate embedded technologies in manufacturing fields to enhance their operations.How... Industrial Internet of Things(IIoT)represents the expansion of the Internet of Things(IoT)in industrial sectors.It is designed to implicate embedded technologies in manufacturing fields to enhance their operations.However,IIoT involves some security vulnerabilities that are more damaging than those of IoT.Accordingly,Intrusion Detection Systems(IDSs)have been developed to forestall inevitable harmful intrusions.IDSs survey the environment to identify intrusions in real time.This study designs an intrusion detection model exploiting feature engineering and machine learning for IIoT security.We combine Isolation Forest(IF)with Pearson’s Correlation Coefficient(PCC)to reduce computational cost and prediction time.IF is exploited to detect and remove outliers from datasets.We apply PCC to choose the most appropriate features.PCC and IF are applied exchangeably(PCCIF and IFPCC).The Random Forest(RF)classifier is implemented to enhance IDS performances.For evaluation,we use the Bot-IoT and NF-UNSW-NB15-v2 datasets.RF-PCCIF and RF-IFPCC show noteworthy results with 99.98%and 99.99%Accuracy(ACC)and 6.18 s and 6.25 s prediction time on Bot-IoT,respectively.The two models also score 99.30%and 99.18%ACC and 6.71 s and 6.87 s prediction time on NF-UNSW-NB15-v2,respectively.Results prove that our designed model has several advantages and higher performance than related models. 展开更多
关键词 Industrial Internet of Things(IIoT) isolation forest Intrusion Detection Dystem(IDS) INTRUSION Pearson’s Correlation Coefficient(PCC) random forest
原文传递
A Machine Learning Based Framework for a Stage-Wise Classification of Date Palm White Scale Disease
7
作者 Abdelaaziz Hessane Ahmed El Youssefi +2 位作者 yousef farhaoui Badraddine Aghoutane Fatima Amounas 《Big Data Mining and Analytics》 EI CSCD 2023年第3期263-272,共10页
Date palm production is critical to oasis agriculture,owing to its economic importance and nutritional advantages.Numerous diseases endanger this precious tree,putting a strain on the economy and environment.White sca... Date palm production is critical to oasis agriculture,owing to its economic importance and nutritional advantages.Numerous diseases endanger this precious tree,putting a strain on the economy and environment.White scale Parlatoria blanchardi is a damaging bug that degrades the quality of dates.When an infestation reaches a specific degree,it might result in the tree’s death.To counter this threat,precise detection of infected leaves and its infestation degree is important to decide if chemical treatment is necessary.This decision is crucial for farmers who wish to minimize yield losses while preserving production quality.For this purpose,we propose a feature extraction and machine learning(ML)technique based framework for classifying the stages of infestation by white scale disease(WSD)in date palm trees by investigating their leaflets images.80 gray level co-occurrence matrix(GLCM)texture features and 9 hue,saturation,and value(HSV)color moments features are extracted from both grayscale and color images of the used dataset.To classify the WSD into its four classes(healthy,low infestation degree,medium infestation degree,and high infestation degree),two types of ML algorithms were tested;classical machine learning methods,namely,support vector machine(SVM)and k-nearest neighbors(KNN),and ensemble learning methods such as random forest(RF)and light gradient boosting machine(LightGBM).The ML models were trained and evaluated using two datasets:the first is composed of the extracted GLCM features only,and the second combines GLCM and HSV descriptors.The results indicate that SVM classifier outperformed on combined GLCM and HSV features with an accuracy of 98.29%.The proposed framework could be beneficial to the oasis agricultural community in terms of early detection of date palm white scale disease(DPWSD)and assisting in the adoption of preventive measures to protect both date palm trees and crop yield. 展开更多
关键词 machine learning feature extraction ensemble learning DISEASES precision agriculture date palm
原文传递
An Intelligent Heuristic Manta-Ray Foraging Optimization and Adaptive Extreme Learning Machine for Hand Gesture Image Recognition
8
作者 Seetharam Khetavath Navalpur Chinnappan Sendhilkumar +5 位作者 Pandurangan Mukunthan Selvaganesan Jana Lakshmanan Malliga Subburayalu Gopalakrishnan Sankuru Ravi Chand yousef farhaoui 《Big Data Mining and Analytics》 EI CSCD 2023年第3期321-335,共15页
The development of hand gesture recognition systems has gained more attention in recent days,due to its support of modern human-computer interfaces.Moreover,sign language recognition is mainly developed for enabling c... The development of hand gesture recognition systems has gained more attention in recent days,due to its support of modern human-computer interfaces.Moreover,sign language recognition is mainly developed for enabling communication between deaf and dumb people.In conventional works,various image processing techniques like segmentation,optimization,and classification are deployed for hand gesture recognition.Still,it limits the major problems of inefficient handling of large dimensional datasets and requires more time consumption,increased false positives,error rate,and misclassification outputs.Hence,this research work intends to develop an efficient hand gesture image recognition system by using advanced image processing techniques.During image segmentation,skin color detection and morphological operations are performed for accurately segmenting the hand gesture portion.Then,the Heuristic Manta-ray Foraging Optimization(HMFO)technique is employed for optimally selecting the features by computing the best fitness value.Moreover,the reduced dimensionality of features helps to increase the accuracy of classification with a reduced error rate.Finally,an Adaptive Extreme Learning Machine(AELM)based classification technique is employed for predicting the recognition output.During results validation,various evaluation measures have been used to compare the proposed model’s performance with other classification approaches. 展开更多
关键词 hand gesture recognition skin color detection morphological operations Multifaceted Feature Extraction(MFE)model Heuristic Manta-ray Foraging Optimization(HMFO) Adaptive Extreme Learning Machine(AELM)
原文传递
Extraction of Fetal Electrocardiogram by Combining Deep Learning and SVD-ICA-NMF Methods
9
作者 Said Ziani yousef farhaoui Mohammed Moutaib 《Big Data Mining and Analytics》 EI CSCD 2023年第3期301-310,共10页
This paper deals with detecting fetal electrocardiogram FECG signals from single-channel abdominal lead.It is based on the Convolutional Neural Network(CNN)combined with advanced mathematical methods,such as Independe... This paper deals with detecting fetal electrocardiogram FECG signals from single-channel abdominal lead.It is based on the Convolutional Neural Network(CNN)combined with advanced mathematical methods,such as Independent Component Analysis(ICA),Singular Value Decomposition(SVD),and a dimension-reduction technique like Nonnegative Matrix Factorization(NMF).Due to the highly disproportionate frequency of the fetus’s heart rate compared to the mother’s,the time-scale representation clearly distinguishes the fetal electrical activity in terms of energy.Furthermore,we can disentangle the various components of fetal ECG,which serve as inputs to the CNN model to optimize the actual FECG signal,denoted by FECGr,which is recovered using the SVD-ICA process.The findings demonstrate the efficiency of this innovative approach,which may be deployed in real-time. 展开更多
关键词 Convolutional Neural Network(CNN) feature extraction Deep Learning(DL) fetal electrocardiogram
原文传递
Design and analysis of a recommendation system based on collaborative filtering techniques for big data
10
作者 Najia Khouibiri yousef farhaoui Ahmad El Allaoui 《Intelligent and Converged Networks》 EI 2023年第4期296-304,共9页
Online search has become very popular,and users can easily search for any movie title;however,to easily search for moving titles,users have to select a title that suits their taste.Otherwise,people will have difficult... Online search has become very popular,and users can easily search for any movie title;however,to easily search for moving titles,users have to select a title that suits their taste.Otherwise,people will have difficulty choosing the film they want to watch.The process of choosing or searching for a film in a large film database is currently time-consuming and tedious.Users spend extensive time on the internet or on several movie viewing sites without success until they find a film that matches their taste.This happens especially because humans are confused about choosing things and quickly change their minds.Hence,the recommendation system becomes critical.This study aims to reduce user effort and facilitate the movie research task.Further,we used the root mean square error scale to evaluate and compare different models adopted in this paper.These models were employed with the aim of developing a classification model for predicting movies.Thus,we tested and evaluated several cooperative filtering techniques.We used four approaches to implement sparse matrix completion algorithms:k-nearest neighbors,matrix factorization,co-clustering,and slope-one. 展开更多
关键词 recommendation system machine learning collaborative filtering(CF) decision support system big data
原文传递
IoT-Based Data Logger for Weather Monitoring Using Arduino-Based Wireless Sensor Networks with Remote Graphical Application and Alerts 被引量:7
11
作者 Jamal Mabrouki Mourade Azrour +2 位作者 Driss Dhiba yousef farhaoui Souad El Hajjaji 《Big Data Mining and Analytics》 EI 2021年第1期25-32,共8页
In recent years,the monitoring systems play significant roles in our life.So,in this paper,we propose an automatic weather monitoring system that allows having dynamic and real-time climate data of a given area.The pr... In recent years,the monitoring systems play significant roles in our life.So,in this paper,we propose an automatic weather monitoring system that allows having dynamic and real-time climate data of a given area.The proposed system is based on the internet of things technology and embedded system.The system also includes electronic devices,sensors,and wireless technology.The main objective of this system is sensing the climate parameters,such as temperature,humidity,and existence of some gases,based on the sensors.The captured values can then be sent to remote applications or databases.Afterwards,the stored data can be visualized in graphics and tables form. 展开更多
关键词 ARDUINO weather station internet of things wireless sensors smart environment
原文传递
New Enhanced Authentication Protocol for Internet of Things 被引量:6
12
作者 Mourade Azrour Jamal Mabrouki +1 位作者 Azedine Guezzaz yousef farhaoui 《Big Data Mining and Analytics》 EI 2021年第1期1-9,共9页
Internet of Things(IoT)refers to a new extended network that enables to any object to be linked to the Internet in order to exchange data and to be controlled remotely.Nowadays,due to its multiple advantages,the IoT i... Internet of Things(IoT)refers to a new extended network that enables to any object to be linked to the Internet in order to exchange data and to be controlled remotely.Nowadays,due to its multiple advantages,the IoT is useful in many areas like environment,water monitoring,industry,public security,medicine,and so on.For covering all spaces and operating correctly,the IoT benefits from advantages of other recent technologies,like radio frequency identification,wireless sensor networks,big data,and mobile network.However,despite of the integration of various things in one network and the exchange of data among heterogeneous sources,the security of user’s data is a central question.For this reason,the authentication of interconnected objects is received as an interested importance.In 2012,Ye et al.suggested a new authentication and key exchanging protocol for Internet of things devices.However,we have proved that their protocol cannot resist to various attacks.In this paper,we propose an enhanced authentication protocol for IoT.Furthermore,we present the comparative results between our proposed scheme and other related ones. 展开更多
关键词 authetication Internet of Things(IoT) SENSOR SECURITY AUTHORIZATION
原文传递
Effect of Feature Selection on the Prediction of Direct Normal Irradiance 被引量:1
13
作者 Mohamed Khalifa Boutahir yousef farhaoui +2 位作者 Mourade Azrour Imad Zeroual Ahmad El Allaoui 《Big Data Mining and Analytics》 EI 2022年第4期309-317,共9页
Solar radiation is capable of producing heat,causing chemical reactions,or generating electricity.Thus,the amount of solar radiation at different times of the day must be determined to design and equip all solar syste... Solar radiation is capable of producing heat,causing chemical reactions,or generating electricity.Thus,the amount of solar radiation at different times of the day must be determined to design and equip all solar systems.Moreover,it is necessary to have a thorough understanding of different solar radiation components,such as Direct Normal Irradiance(DNI),Diffuse Horizontal Irradiance(DHI),and Global Horizontal Irradiance(GHI).Unfortunately,measurements of solar radiation are not easily accessible for the majority of regions on the globe.This paper aims to develop a set of deep learning models through feature importance algorithms to predict the DNI data.The proposed models are based on historical data of meteorological parameters and solar radiation properties in a specific location of the region of Errachidia,Morocco,from January 1,2017,to December 31,2019,with an interval of 60 minutes.The findings demonstrated that feature selection approaches play a crucial role in forecasting of solar radiation accurately when compared with the available data. 展开更多
关键词 machine learning deep learning feature importance renewable energies solar radiation
原文传递
Predicting Students’Final Performance Using Artificial Neural Networks
14
作者 Tarik Ahajjam Mohammed Moutaib +3 位作者 Haidar Aissa Mourad Azrour yousef farhaoui Mohammed Fattah 《Big Data Mining and Analytics》 EI 2022年第4期294-301,共8页
Artificial Intelligence(AI)is based on algorithms that allow machines to make decisions for humans.This technology enhances the users’experience in various ways.Several studies have been conducted in the field of edu... Artificial Intelligence(AI)is based on algorithms that allow machines to make decisions for humans.This technology enhances the users’experience in various ways.Several studies have been conducted in the field of education to solve the problem of student orientation and performance using various Machine Learning(ML)algorithms.The main goal of this article is to predict Moroccan students’performance in the region of Guelmim Oued Noun using an intelligent system based on neural networks,one of the best data mining techniques that provided us with the best results. 展开更多
关键词 data science Artificial Intelligence(AI) Machine Learning(ML) neural networks prediction RECOMMENDATION high school data analysis
原文传递
Application of Internet of Things in the Health Sector:Toward Minimizing Energy Consumption
15
作者 Mohammed Moutaib Tarik Ahajjam +3 位作者 Mohammed Fattah yousef farhaoui Badraddine Aghoutane Moulhime El Bekkali 《Big Data Mining and Analytics》 EI 2022年第4期302-308,共7页
The Internet of Things(IoT)is currently reflected in the increase in the number of connected objects,that is,devices with their own identity and computing and communication capacities.IoT is recognized as one of the m... The Internet of Things(IoT)is currently reflected in the increase in the number of connected objects,that is,devices with their own identity and computing and communication capacities.IoT is recognized as one of the most critical areas for future technologies,gaining worldwide attention.It applies to many areas,where it has achieved success,such as healthcare,where a patient is monitored using nodes and lightweight sensors.However,the powerful functions of IoT in the medical field are based on communication,analysis,processing,and management of data autonomously without any manual intervention,which presents many difficulties,such as energy consumption.However,these issues significantly slow down the development and rapid deployment of this technology.The main causes of wasted energy from connected objects include collisions that occur when two or more nodes send data simultaneously and the leading cause of data retransmission that occurs when a collision occurs or when data are not received correctly due to channel fading.The distance between nodes is one of the factors influencing energy consumption.In this article,we have proposed direct communication between nodes to avoid collision domains,which will help reduce data retransmission.The results show that the distribution can ensure the performance of the system under general conditions compared to the centralization and to the existing works. 展开更多
关键词 Internet of Things(IoT) energy consumption cloud computing data storage
原文传递
Call for Papers Special Issue on Artificial Intelligence Powered Internet of Healthcare Things(IoHT):Data Science,Emerging Trends and Applications
16
作者 yousef farhaoui Stephen Ojo +1 位作者 Lateef Adesola Akinyemi Agbotiname Lucky Imoize 《Big Data Mining and Analytics》 EI 2022年第2期161-161,共1页
The Internet of Things(IoT)is one of the most prominent technologies emerged in recent years.It has a broad spectrum of applications in diverse disciplines.The IoT is evolving as a significant area of future technolog... The Internet of Things(IoT)is one of the most prominent technologies emerged in recent years.It has a broad spectrum of applications in diverse disciplines.The IoT is evolving as a significant area of future technology and gaining much attention from various walks of life.IoT has revolutionized various application domains,such as home automation,industrial automation,medical aids,mobile healthcare,elderly assistance,intelligent energy management and smart grids,automotive,traffic management,and many others.These applications will make use of the potentially enormous amount and variety of data generated by such objects to provide new services to citizens,companies,and public administrations. 展开更多
关键词 IoT COMPANIES SERVICES
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部