期刊文献+
共找到38,645篇文章
< 1 2 250 >
每页显示 20 50 100
Theories and Key Technologies for New-generation Internet System
1
作者 Zhang Hongke, Dong Ping, Yang Dong (Next Generation Internet Research Center, School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 100044, China) 《ZTE Communications》 2008年第1期18-22,共5页
There exist serious problems in the trustworthiness (security, reliability, controllability and manageability) of the Internet. In order to solve these problems, a new-generation network architecture model, based on t... There exist serious problems in the trustworthiness (security, reliability, controllability and manageability) of the Internet. In order to solve these problems, a new-generation network architecture model, based on the research of the basic theories of new-generation Internet system, is proposed. The solution creates a switching routing model and theory for the new-generation Internet system, and defines the access identifier, generalized switching routing identifier and their mapping principles. It also establishes a pervasive service system architecture and theory, defines the service identifier, connection identifier and their mapping principles. This paper discusses key technologies for the new-generation Internet system, such as access control and management, trusted routing and Quality of Service (QoS), multi-streaming, and network monitoring and management. 展开更多
关键词 Theories and Key Technologies for New-generation internet system ZTE
下载PDF
China contributes to IEC's specification on industrial internet system
2
《China Standardization》 2022年第6期17-17,共1页
On October 18, the International Electrotechnical Commission(IEC) published IEC PAS 63441:2022, Functional architecture of industrial internet system for industrial automation applications, which is the first internat... On October 18, the International Electrotechnical Commission(IEC) published IEC PAS 63441:2022, Functional architecture of industrial internet system for industrial automation applications, which is the first international specification in this field.Laying the cornerstone of industrial internet, IEC PAS 63441:2022 normalizes the models, structures. 展开更多
关键词 internet IEC system
下载PDF
Tata Communications携手Internet Systems Consortium进行IPv6域名系统托管
3
《电脑与电信》 2008年第10期15-15,共1页
加州红木城和印度孟买2008年10月14日电/新华美通/-通信新世界领域的领先供应商Tata Communications和非营利性公益企业Internet Systems Consortium.Inc.(ISCl今天宣布,双方将合作为企业和服务供应商提供业界最佳的域名系统(DN... 加州红木城和印度孟买2008年10月14日电/新华美通/-通信新世界领域的领先供应商Tata Communications和非营利性公益企业Internet Systems Consortium.Inc.(ISCl今天宣布,双方将合作为企业和服务供应商提供业界最佳的域名系统(DNS)托管服务。DNS能够提供互联网必须的功能。 展开更多
关键词 internet systems 域名系统 IPv6 托管 服务供应商 非营利性 INC
下载PDF
Deep Transfer Learning Techniques in Intrusion Detection System-Internet of Vehicles: A State-of-the-Art Review
4
作者 Wufei Wu Javad Hassannataj Joloudari +8 位作者 Senthil Kumar Jagatheesaperumal Kandala N.V.P.SRajesh Silvia Gaftandzhieva Sadiq Hussain Rahimullah Rabih Najibullah Haqjoo Mobeen Nazar Hamed Vahdat-Nejad Rositsa Doneva 《Computers, Materials & Continua》 SCIE EI 2024年第8期2785-2813,共29页
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accide... The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks. 展开更多
关键词 Cyber-attacks internet of things internet of vehicles intrusion detection system
下载PDF
A digital twins enabled underwater intelligent internet vehicle path planning system via reinforcement learning and edge computing
5
作者 Jiachen Yang Meng Xi +2 位作者 Jiabao Wen Yang Li Houbing Herbert Song 《Digital Communications and Networks》 SCIE CSCD 2024年第2期282-291,共10页
The Autonomous Underwater Glider(AUG)is a kind of prevailing underwater intelligent internet vehicle and occupies a dominant position in industrial applications,in which path planning is an essential problem.Due to th... The Autonomous Underwater Glider(AUG)is a kind of prevailing underwater intelligent internet vehicle and occupies a dominant position in industrial applications,in which path planning is an essential problem.Due to the complexity and variability of the ocean,accurate environment modeling and flexible path planning algorithms are pivotal challenges.The traditional models mainly utilize mathematical functions,which are not complete and reliable.Most existing path planning algorithms depend on the environment and lack flexibility.To overcome these challenges,we propose a path planning system for underwater intelligent internet vehicles.It applies digital twins and sensor data to map the real ocean environment to a virtual digital space,which provides a comprehensive and reliable environment for path simulation.We design a value-based reinforcement learning path planning algorithm and explore the optimal network structure parameters.The path simulation is controlled by a closed-loop model integrated into the terminal vehicle through edge computing.The integration of state input enriches the learning of neural networks and helps to improve generalization and flexibility.The task-related reward function promotes the rapid convergence of the training.The experimental results prove that our reinforcement learning based path planning algorithm has great flexibility and can effectively adapt to a variety of different ocean conditions. 展开更多
关键词 Digital twins Reinforcement learning Edge computing Underwater intelligent internet vehicle Path planning
下载PDF
Federated Learning on Internet of Things:Extensive and Systematic Review
6
作者 Meenakshi Aggarwal Vikas Khullar +4 位作者 Sunita Rani Thomas AndréProla Shyama Barna Bhattacharjee Sarowar Morshed Shawon Nitin Goyal 《Computers, Materials & Continua》 SCIE EI 2024年第5期1795-1834,共40页
The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and ... The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and needs to be explored in various areas to understand the key challenges for deployment in real-world scenarios.The paper systematically reviewed the available literature using the PRISMA guiding principle.The study aims to provide a detailed overview of the increasing use of FL in IoT networks,including the architecture and challenges.A systematic review approach is used to collect,categorize and analyze FL-IoT-based articles.Asearch was performed in the IEEE,Elsevier,Arxiv,ACM,and WOS databases and 92 articles were finally examined.Inclusion measures were published in English and with the keywords“FL”and“IoT”.The methodology begins with an overview of recent advances in FL and the IoT,followed by a discussion of how these two technologies can be integrated.To be more specific,we examine and evaluate the capabilities of FL by talking about communication protocols,frameworks and architecture.We then present a comprehensive analysis of the use of FL in a number of key IoT applications,including smart healthcare,smart transportation,smart cities,smart industry,smart finance,and smart agriculture.The key findings from this analysis of FL IoT services and applications are also presented.Finally,we performed a comparative analysis with FL IID(independent and identical data)and non-ID,traditional centralized deep learning(DL)approaches.We concluded that FL has better performance,especially in terms of privacy protection and resource utilization.FL is excellent for preserving privacy becausemodel training takes place on individual devices or edge nodes,eliminating the need for centralized data aggregation,which poses significant privacy risks.To facilitate development in this rapidly evolving field,the insights presented are intended to help practitioners and researchers navigate the complex terrain of FL and IoT. 展开更多
关键词 internet of Things federated learning PRISMA framework of FL applications of FL data privacy COMMUNICATION
下载PDF
Research on a Comprehensive Monitoring System for Tunnel Operation based on the Internet of Things and Artificial Intelligence Identification Technology
7
作者 Xingxing Wang Donglin Dai Xiangjun Fan 《Journal of Architectural Research and Development》 2024年第2期84-89,共6页
This article proposes a comprehensive monitoring system for tunnel operation to address the risks associated with tunnel operations.These risks include safety control risks,increased traffic flow,extreme weather event... This article proposes a comprehensive monitoring system for tunnel operation to address the risks associated with tunnel operations.These risks include safety control risks,increased traffic flow,extreme weather events,and movement of tectonic plates.The proposed system is based on the Internet of Things and artificial intelligence identification technology.The monitoring system will cover various aspects of tunnel operations,such as the slope of the entrance,the structural safety of the cave body,toxic and harmful gases that may appear during operation,excessively high and low-temperature humidity,poor illumination,water leakage or road water accumulation caused by extreme weather,combustion and smoke caused by fires,and more.The system will enable comprehensive monitoring and early warning of fire protection systems,accident vehicles,and overheating vehicles.This will effectively improve safety during tunnel operation. 展开更多
关键词 internet of Things Artificial intelligence Operation tunnel MONITORING
下载PDF
Street Lamp Status Warning System Based on Internet of Things Technology
8
作者 Hanli Wang Yuanzhi Liu Yilin Wu 《Journal of Electronic Research and Application》 2024年第4期154-160,共7页
This paper proposes a street light warning system based on Internet of Things(IoT)technology,which uses cameras to detect moving targets such as vehicles and pedestrians around the system and adjust the brightness of ... This paper proposes a street light warning system based on Internet of Things(IoT)technology,which uses cameras to detect moving targets such as vehicles and pedestrians around the system and adjust the brightness of street lights according to road conditions to reduce unnecessary power waste.The system has a mature self-fault detection mechanism and is equipped with a wireless communication device for data exchange and timely communication with the host computer terminal.The intelligent street lamp system in this paper can be used to reduce the occurrence of pedestrian and vehicle accidents at intersections,and at the same time reduce the consumption of manpower and material resources for street lamp troubleshooting,to achieve energy conservation and emission reduction. 展开更多
关键词 internet of Things Early warning system Intelligent transportation
下载PDF
Construction and Application of a Quality Evaluation System for Group Elderly Care Services Based on the Internet of Things
9
作者 Xiyu Yang Jialu Li Weiming Tian 《Proceedings of Business and Economic Studies》 2024年第1期155-161,共7页
With the continuous intensification of global aging,the issue of elderly care has become an increasingly prominent social problem.The Internet of Things(IoT)technology,as an emerging field,holds broad application pros... With the continuous intensification of global aging,the issue of elderly care has become an increasingly prominent social problem.The Internet of Things(IoT)technology,as an emerging field,holds broad application prospects.This article focuses on the application of IoT technology in group elderly care services and constructs a quality evaluation system for these services based on IoT technology.Through the analysis of practical application cases,the advantages and challenges of IoT technology in group elderly care services have been examined,confirming the feasibility and effectiveness of the evaluation system. 展开更多
关键词 internet of Things Group retirement Quality assessment system
下载PDF
Technologies Behind the Smart Grid and Internet of Things: A System Survey 被引量:1
10
作者 Kuldeep Sharma Arun Malik +3 位作者 Isha Batra A.S.M.Sanwar Hosen Md Abdul Latif Sarker Dong Seog Han 《Computers, Materials & Continua》 SCIE EI 2023年第6期5049-5072,共24页
Electric smart grids enable a bidirectional flow of electricity and information among power system assets.For proper monitoring and con-trolling of power quality,reliability,scalability and flexibility,there is a need... Electric smart grids enable a bidirectional flow of electricity and information among power system assets.For proper monitoring and con-trolling of power quality,reliability,scalability and flexibility,there is a need for an environmentally friendly system that is transparent,sustainable,cost-saving,energy-efficient,agile and secure.This paper provides an overview of the emerging technologies behind smart grids and the internet of things.The dependent variables are identified by analyzing the electricity consumption patterns for optimal utilization and planning preventive maintenance of their legacy assets like power distribution transformers with real-time parameters to ensure an uninterrupted and reliable power supply.In addition,the paper sorts out challenges in the traditional or legacy electricity grid,power generation,transmission,distribution,and revenue management challenges such as reduc-ing aggregate technical and commercial loss by reforming the existing manual or semi-automatic techniques to fully smart or automatic systems.This article represents a concise review of research works in creating components of the smart grid like smart metering infrastructure for postpaid as well as in prepaid mode,internal structure comparison of advanced metering methods in present scenarios,and communication systems. 展开更多
关键词 Electricity consumption BIDIRECTIONAL advanced meter infrastructure energy internet of things smart grid smart meter
下载PDF
Internet of Things Intrusion Detection System Based on Convolutional Neural Network 被引量:1
11
作者 Jie Yin Yuxuan Shi +5 位作者 Wen Deng Chang Yin Tiannan Wang Yuchen Song Tianyao Li Yicheng Li 《Computers, Materials & Continua》 SCIE EI 2023年第4期2119-2135,共17页
In recent years, the Internet of Things (IoT) technology has developedby leaps and bounds. However, the large and heterogeneous networkstructure of IoT brings high management costs. In particular, the low costof IoT d... In recent years, the Internet of Things (IoT) technology has developedby leaps and bounds. However, the large and heterogeneous networkstructure of IoT brings high management costs. In particular, the low costof IoT devices exposes them to more serious security concerns. First, aconvolutional neural network intrusion detection system for IoT devices isproposed. After cleaning and preprocessing the NSL-KDD dataset, this paperuses feature engineering methods to select appropriate features. Then, basedon the combination of DCNN and machine learning, this paper designs acloud-based loss function, which adopts a regularization method to preventoverfitting. The model consists of one input layer, two convolutional layers,two pooling layers and three fully connected layers and one output layer.Finally, a framework that can fully consider the user’s privacy protection isproposed. The framework can only exchange model parameters or intermediateresults without exchanging local individuals or sample data. This paperfurther builds a global model based on virtual fusion data, so as to achievea balance between data privacy protection and data sharing computing. Theperformance indicators such as accuracy, precision, recall, F1 score, and AUCof the model are verified by simulation. The results show that the model ishelpful in solving the problem that the IoT intrusion detection system cannotachieve high precision and low cost at the same time. 展开更多
关键词 internet of things intrusion detection system convolutional neural network federated learning
下载PDF
Intelligent Intrusion Detection System for Industrial Internet of Things Environment 被引量:1
12
作者 R.Gopi R.Sheeba +4 位作者 K.Anguraj T.Chelladurai Haya Mesfer Alshahrani Nadhem Nemri Tarek Lamoudan 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1567-1582,共16页
Rapid increase in the large quantity of industrial data,Industry 4.0/5.0 poses several challenging issues such as heterogeneous data generation,data sensing and collection,real-time data processing,and high request ar... Rapid increase in the large quantity of industrial data,Industry 4.0/5.0 poses several challenging issues such as heterogeneous data generation,data sensing and collection,real-time data processing,and high request arrival rates.The classical intrusion detection system(IDS)is not a practical solution to the Industry 4.0 environment owing to the resource limitations and complexity.To resolve these issues,this paper designs a new Chaotic Cuckoo Search Optimiza-tion Algorithm(CCSOA)with optimal wavelet kernel extreme learning machine(OWKELM)named CCSOA-OWKELM technique for IDS on the Industry 4.0 platform.The CCSOA-OWKELM technique focuses on the design of feature selection with classification approach to achieve minimum computation complex-ity and maximum detection accuracy.The CCSOA-OWKELM technique involves the design of CCSOA based feature selection technique,which incorpo-rates the concepts of chaotic maps with CSOA.Besides,the OWKELM technique is applied for the intrusion detection and classification process.In addition,the OWKELM technique is derived by the hyperparameter tuning of the WKELM technique by the use of sunflower optimization(SFO)algorithm.The utilization of CCSOA for feature subset selection and SFO algorithm based hyperparameter tuning leads to better performance.In order to guarantee the supreme performance of the CCSOA-OWKELM technique,a wide range of experiments take place on two benchmark datasets and the experimental outcomes demonstrate the promis-ing performance of the CCSOA-OWKELM technique over the recent state of art techniques. 展开更多
关键词 Intrusion detection system artificial intelligence machine learning industry 4.0 internet of things
下载PDF
The impact of Internet access on household dietary quality:Evidence from rural China 被引量:1
13
作者 Yi Cui Qiran Zhao +1 位作者 Thomas Glauben Wei Si 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第2期374-383,共10页
Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access sig... Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access significantly impacts agricultural production and improves smallholder farmers’income.Beyond these,the Internet can affect other dimensions of social welfare.However,research about the impact of Internet access on dietary quality in rural China remains scarce.This study utilizes multi-period panel data from Fixed Observation Point in rural China from 2009 to 2015 to estimate the impact of Internet access on dietary quality and food consumption of rural households and conducts a causal analysis.Regression models with time and household fixed effects allow robust estimation while reducing potential issues of unobserved heterogeneity.The estimates show that Internet access has significantly increased rural household dietary quality(measured by the Chinese Diet Balance Index).Further research finds that Internet access has increased the consumption of animal products,such as aquatic and dairy products.We also examine the underlying mechanisms.Internet access improves dietary quality and food consumption mainly through increasing household income and food expenditure.These results encourage the promotion of Internet access as a valuable tool for nutritional improvements,especially in rural areas. 展开更多
关键词 dietary quality fixed effect model internet access rural China
下载PDF
A credibility-aware swarm-federated deep learning framework in internet of vehicles 被引量:1
14
作者 Zhe Wang Xinhang Li +2 位作者 Tianhao Wu Chen Xu Lin Zhang 《Digital Communications and Networks》 SCIE CSCD 2024年第1期150-157,共8页
Although Federated Deep Learning(FDL)enables distributed machine learning in the Internet of Vehicles(IoV),it requires multiple clients to upload model parameters,thus still existing unavoidable communication overhead... Although Federated Deep Learning(FDL)enables distributed machine learning in the Internet of Vehicles(IoV),it requires multiple clients to upload model parameters,thus still existing unavoidable communication overhead and data privacy risks.The recently proposed Swarm Learning(SL)provides a decentralized machine learning approach for unit edge computing and blockchain-based coordination.A Swarm-Federated Deep Learning framework in the IoV system(IoV-SFDL)that integrates SL into the FDL framework is proposed in this paper.The IoV-SFDL organizes vehicles to generate local SL models with adjacent vehicles based on the blockchain empowered SL,then aggregates the global FDL model among different SL groups with a credibility weights prediction algorithm.Extensive experimental results show that compared with the baseline frameworks,the proposed IoV-SFDL framework reduces the overhead of client-to-server communication by 16.72%,while the model performance improves by about 5.02%for the same training iterations. 展开更多
关键词 Swarm learning Federated deep learning internet of vehicles PRIVACY EFFICIENCY
下载PDF
Low-Cost Federated Broad Learning for Privacy-Preserved Knowledge Sharing in the RIS-Aided Internet of Vehicles 被引量:1
15
作者 Xiaoming Yuan Jiahui Chen +4 位作者 Ning Zhang Qiang(John)Ye Changle Li Chunsheng Zhu Xuemin Sherman Shen 《Engineering》 SCIE EI CAS CSCD 2024年第2期178-189,共12页
High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency... High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV. 展开更多
关键词 Knowledge sharing internet of Vehicles Federated learning Broad learning Reconfigurable intelligent surfaces Resource allocation
下载PDF
Design of Intelligent Pension Online Monitoring System Under the Environment of Internet of Things 被引量:1
16
作者 WANG Rong WANG Tianhu 《Instrumentation》 2023年第3期53-64,共12页
With the improvement of the degree of aging,the traditional pension model can no longer meet the growing needs of the elderly.Therefore,it is necessary to use the intelligent means of information technology to improve... With the improvement of the degree of aging,the traditional pension model can no longer meet the growing needs of the elderly.Therefore,it is necessary to use the intelligent means of information technology to improve the level of pension services.This paper will integrate multi-sensor fusion technology,NB-IoT communication technology and cloud platform technology to develop and design a smart pension online monitoring system to realize real-time collection of human health and motion status information and realize monitoring platform management.In this system,STM32 microcontroller will be used as the main control module,and MAX30102,ADXL345 and DS18B20 sensors will be used to collect the heart rate,blood oxygen,displacement and body temperature of the human body in real time.On the one hand,the communication part is completed by the BC20 Internet of Things module.The data transmission between the terminal detection device and the cloud platform,on the other hand,the HC-42 Bluetooth module is used to complete the data communication with the mobile phone.The test results show that the system can collect and process data accurately in real time and maintain good communication with the cloud platform and mobile phone.The designed system has strong pertinence,easy operation,high reliability and broad development prospects. 展开更多
关键词 Smart Pension internet of Things NB-IoT Communication Technology Ali Cloud Platform
下载PDF
A Systematic Review on the Internet of Medical Things:Techniques,Open Issues,and Future Directions
17
作者 Apurva Sonavane Aditya Khamparia Deepak Gupta 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第11期1525-1550,共26页
IoT usage in healthcare is one of the fastest growing domains all over the world which applies to every age group.Internet of Medical Things(IoMT)bridges the gap between the medical and IoT field where medical devices... IoT usage in healthcare is one of the fastest growing domains all over the world which applies to every age group.Internet of Medical Things(IoMT)bridges the gap between the medical and IoT field where medical devices communicate with each other through a wireless communication network.Advancement in IoMT makes human lives easy and better.This paper provides a comprehensive detailed literature survey to investigate different IoMT-driven applications,methodologies,and techniques to ensure the sustainability of IoMT-driven systems.The limitations of existing IoMTframeworks are also analyzed concerning their applicability in real-time driven systems or applications.In addition to this,various issues(gaps),challenges,and needs in the context of such systems are highlighted.The purpose of this paper is to interpret a rigorous review concept related to IoMT and present significant contributions in the field across the research fraternity.Lastly,this paper discusses the opportunities and prospects of IoMT and discusses various open research problems. 展开更多
关键词 internet ofMedical Things(IoMT) healthcare systems sensors PREPROCESSING RFID remote monitoring devices networks
下载PDF
An Efficient SDFRM Security System for Blockchain Based Internet of Things
18
作者 Vivekraj Mannayee Thirumalai Ramanathan 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期1545-1563,共19页
Blockchain has recently sparked interest in both the technological and businessfirms.The Internet of Things's(IoT)core principle emerged due to the connectivity of several new technologies,including wireless techno... Blockchain has recently sparked interest in both the technological and businessfirms.The Internet of Things's(IoT)core principle emerged due to the connectivity of several new technologies,including wireless technology,the Inter-net,embedded automation systems,and micro-electromechanical devices.Manu-facturing environments and operations have been successfully converted by implementing recent advanced technology like Cloud Computing(CC),Cyber-Physical System(CSP),Information and Communication Technologies(ICT)and Enterprise Model,and other technological innovations into the fourth indus-trial revolution referred to as Industry 4.0.Data management is defined as the pro-cess of accumulation in order to make better business decisions,and process,secure and store information about a company.In the incipient model,there are interconnected contrivances and Machine-to-Machine(M2M)interactions,and transaction data are stored on the Blockchain.Security is a challenging aspect that must be punctiliously considered during the design and development phases of a CSP.In this research article,we proposed a Secure and Distributed Framework for Resource Management(SDFRM)in Industry 4.0 environments within a distribu-ted and collaborative Industry 4.0 system,the dynamic and trust-based Distributed Management Framework(DMF)of shared resource access.Such issues are focused by taking into account of the traditional characteristics of IoT/Industrial Internet of Things’(IIoT)-predicated environments,an SDFRM in Industry 4.0 environments within a distributed and collaborative Industry 4.0 system.Also,to ensure strong privacy over the procedures associated with Access Control(AC),a privacy-preserving method is proposed and integrated into the DMF.The proposed DMF,based on blockchain technology and peer-to-peer networks,allows dynamic access management and system governance without using third parties who could be attacked.We worked hard to design and implement the pro-posal to demonstrate its viability and evaluate its performance.Our proposal out-performs the Multichain Blockchain in terms of successful storage transactions with an achieved average throughput of 98.15%. 展开更多
关键词 internet of things blockchain data privacy security system distributed management IIoT
下载PDF
Internet of Things Supported Airport Boarding System and Evaluation with Fuzzy
19
作者 Tolga Memika Tulay Korkusuz Polat 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期2687-2702,共16页
The existing systems sustained with the investments made require more automation and digital transformation with the continuous advancement of tech-nology.The aviation industry is a sector that is open to more automat... The existing systems sustained with the investments made require more automation and digital transformation with the continuous advancement of tech-nology.The aviation industry is a sector that is open to more automation and digi-tal transformation,mainly because of the intense competition and the analysis of a large variety of data.The long duration of operations in current airline processes and some processflows cause customer dissatisfaction and cost increase.In this study,the boarding process,which is one of the operational processes of airline transportation and is open to improvement,was discussed.The classical boarding process has been redesigned using Internet of Things technology a model called Boarding 4.0 was created.With Boarding 4.0,it is aimed to design a process where passengers can take their time before boarding more efficiently.In the study,the sub-processes of the Boarding 4.0 model,other processes that the sub-processes interact with,their activities,and data exchange passenger move-ments during the activities are explained in detail.Compared to the classical boarding process and Boarding 4.0 with the fuzzy ahp technique,it has been shown that boarding 4.0 is more advantageous and passenger movement times can be reduced during boarding.As a result of the evaluation made with the fuzzy ahp,it was determined that boarding 4.0 is more advantageous than the classical boarding process.In addition,when the total time of the sub-activities in the board-ing process is calculated,boarding activities for a passenger take 50 min with the classic boarding process and 20 min with Boarding 4.0.Thus,when Boarding 4.0 is used,the passenger gains 30 min.Furthermore,when the calculation is made concerning the airport’s current capacity,two passengers are hosted with the clas-sical boarding process,whilefive passengers are hosted with Boarding 4.0.This acquisition is significant for airports in terms of efficient use of resources. 展开更多
关键词 Intelligent airport internet of things boarding system process management model fuzzy ahp
下载PDF
Intelligent Intrusion Detection System for the Internet of Medical Things Based on Data-Driven Techniques
20
作者 Okba Taouali Sawcen Bacha +4 位作者 Khaoula Ben Abdellafou Ahamed Aljuhani Kamel Zidi Rehab Alanazi Mohamed Faouzi Harkat 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期1593-1609,共17页
Introducing IoT devices to healthcare fields has made it possible to remotely monitor patients’information and provide a proper diagnosis as needed,resulting in the Internet of Medical Things(IoMT).However,obtaining ... Introducing IoT devices to healthcare fields has made it possible to remotely monitor patients’information and provide a proper diagnosis as needed,resulting in the Internet of Medical Things(IoMT).However,obtaining good security features that ensure the integrity and confidentiality of patient’s information is a significant challenge.However,due to the computational resources being limited,an edge device may struggle to handle heavy detection tasks such as complex machine learning algorithms.Therefore,designing and developing a lightweight detection mechanism is crucial.To address the aforementioned challenges,a new lightweight IDS approach is developed to effectively combat a diverse range of cyberattacks in IoMT networks.The proposed anomaly-based IDS is divided into three steps:pre-processing,feature selection,and decision.In the pre-processing phase,data cleaning and normalization are performed.In the feature selection step,the proposed approach uses two data-driven kernel techniques:kernel principal component analysis and kernel partial least square techniques to reduce the dimension of extracted features and to ameliorate the detection results.Therefore,in decision step,in order to classify whether the traffic flow is normal or malicious the kernel extreme learning machine is used.To check the efficiency of the developed detection scheme,a modern IoMT dataset named WUSTL-EHMS-2020 is considered to evaluate and discuss the achieved results.The proposed method achieved 99.9%accuracy,99.8%specificity,100%Sensitivity,99.9 F-score. 展开更多
关键词 Machine learning data-driven technique KPCA KPLS intrusion detection IoT internet of Medical Things(IoMT)
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部