期刊文献+
共找到458篇文章
< 1 2 23 >
每页显示 20 50 100
Energy-Efficient Content-Based Routing in Internet of Things 被引量:1
1
作者 Samia Allaoua Chelloug 《Journal of Computer and Communications》 2015年第12期9-20,共12页
The?convergence of the Internet, sensor networks, and Radio Frequency Identification (RFID) systems has ushered to the concept of Internet of Things (IoT) which is capable of connecting daily things, making them smart... The?convergence of the Internet, sensor networks, and Radio Frequency Identification (RFID) systems has ushered to the concept of Internet of Things (IoT) which is capable of connecting daily things, making them smart through sensing, reasoning, and cooperating with other things. Further, RFID technology enables tracking of an object and assigning it a unique ID. IoT has the potential for a wide range of applications relating to healthcare, environment, transportation, cities… Moreover, the middleware is a basic component in the IoT architecture. It handles heterogeneity issues among IoT devices and provides a common framework for communication. More recently, the interest has focusing on developing publish/subscribe middleware systems for the IoT to allow asynchronous communication between the IoT devices. The scope of our paper is to study routing protocols for publish/subscribe schemes that include content and context-based routing. We propose an Energy-Efficient Content-Based Routing (EECBR) protocol for the IoT that minimizes the energy consumption. The proposed algorithm makes use of a virtual topology that is constructed in a centralized manner and then routes the events from the publishers to the intended interested subscribers in a distributed manner. EECBR has been simulated using Omnet++. The simulation results show that EECBR has a significant performance in term of the energy variance compared to the other schemes. 展开更多
关键词 internet of things PUBLISH/SUBSCRIBE ROUTING ConTENT-based ROUTING Energy Virtual Topology OMNET++
下载PDF
Smart Classroom Design on the Basis of Internet of Things Technology
2
作者 Lei Zhang 《Modern Electronic Technology》 2019年第1期31-35,共5页
Internet of Things technology is a new type of network technology emerging in the new economic era. It has played a good role in various industries and provided new opportunities for the reform and optimization of the... Internet of Things technology is a new type of network technology emerging in the new economic era. It has played a good role in various industries and provided new opportunities for the reform and optimization of the education industry. This paper takes the intelligent teaching base on the basis of Internet of Things technology as the research object, introduces the connotation of the wisdom teaching base with reference to relevant literature materials, analyzes the research background of the wisdom teaching base on the basis of the Internet of Things technology, expounds the design method of smart teaching base on the basis of Internet of Things technology, and analyzes the function realization and application of intelligent teaching base on the basis of Internet of Things technology. 展开更多
关键词 internet of things technology SMART TEACHING base Design REALIZATIon
下载PDF
Saving Environment Using Internet of Things: Challenges and the Possibilities
3
作者 Praneet Sah 《Advances in Internet of Things》 2016年第4期55-64,共10页
The term Internet of Things (IoT) emerged in the early 2000s but actually gained momentum only in the past few years, however we still do not get to see them in our daily life. It has generally been avoided by the mai... The term Internet of Things (IoT) emerged in the early 2000s but actually gained momentum only in the past few years, however we still do not get to see them in our daily life. It has generally been avoided by the mainstream market due to its “cryptic” nature which requires technical knowledge prior to its use. Lack of strong business model (by companies) and inability to adapt to new rapid changes (by consumers) are the two primary factors contributing to the fact that IoT is well ahead of its times but it need no longer be. In this paper, I’ve created a setup for smart home that allows the users to control their electrical appliances from internet and even makes the appliances smart enough to react to the environmental conditions on their own. Using this setup, I observed the pattern in which electricity consumption and carbon footprints reduced as compared to the conventional setup i.e. without IoT. Analyzing this data provided me a solid proof that IoT definitely helps us to save electricity and environment. Since IoT is beneficial for all, I, then focused on the challenges that are hampering the penetration of IoT into the daily lives of consumers and how the consumer is overlooking the benefits that it has to offer, which even includes a primary concern for many, i.e. saving money. This paper is overall aimed to change the way a consumer thinks about IoT and to provide a solid ground to how it is beneficial. 展开更多
关键词 Arduino based Projects Embedded Devices internet of things Home Area Network RELAY Smart Homes
下载PDF
Proposed Caching Scheme for Optimizing Trade-off between Freshness and Energy Consumption in Name Data Networking Based IoT 被引量:1
4
作者 Rahul Shrimali Hemal Shah Riya Chauhan 《Advances in Internet of Things》 2017年第2期11-24,共14页
Over the last few years, the Internet of Things (IoT) has become an omnipresent term. The IoT expands the existing common concepts, anytime and anyplace to the connectivity for anything. The proliferation in IoT offer... Over the last few years, the Internet of Things (IoT) has become an omnipresent term. The IoT expands the existing common concepts, anytime and anyplace to the connectivity for anything. The proliferation in IoT offers opportunities but may also bear risks. A hitherto neglected aspect is the possible increase in power consumption as smart devices in IoT applications are expected to be reachable by other devices at all times. This implies that the device is consuming electrical energy even when it is not in use for its primary function. Many researchers’ communities have started addressing storage ability like cache memory of smart devices using the concept called—Named Data Networking (NDN) to achieve better energy efficient communication model. In NDN, memory or buffer overflow is the common challenge especially when internal memory of node exceeds its limit and data with highest degree of freshness may not be accommodated and entire scenarios behaves like a traditional network. In such case, Data Caching is not performed by intermediate nodes to guarantee highest degree of freshness. On the periodical updates sent from data producers, it is exceedingly demanded that data consumers must get up to date information at cost of lease energy. Consequently, there is challenge in maintaining tradeoff between freshness energy consumption during Publisher-Subscriber interaction. In our work, we proposed the architecture to overcome cache strategy issue by Smart Caching Algorithm for improvement in memory management and data freshness. The smart caching strategy updates the data at precise interval by keeping garbage data into consideration. It is also observed from experiment that data redundancy can be easily obtained by ignoring/dropping data packets for the information which is not of interest by other participating nodes in network, ultimately leading to optimizing tradeoff between freshness and energy required. 展开更多
关键词 internet of things (IoT) Named Data NETWORKING Smart CACHING Table Pending INTEREST Forwarding INFORMATIon Base ConTENT Store ConTENT Centric NETWORKING INFORMATIon Centric NETWORKING Data & INTEREST Packets SCTSmart CACHING
下载PDF
Blockchain Platform for Industrial Internet of Things 被引量:45
5
作者 Arshdeep Bahga Vijay K. Madisetti 《Journal of Software Engineering and Applications》 2016年第10期533-546,共14页
Internet of Things (IoT) are being adopted for industrial and manufacturing applications such as manufacturing automation, remote machine diagnostics, prognostic health management of industrial machines and supply cha... Internet of Things (IoT) are being adopted for industrial and manufacturing applications such as manufacturing automation, remote machine diagnostics, prognostic health management of industrial machines and supply chain management. Cloud-Based Manufacturing is a recent on-demand model of manufacturing that is leveraging IoT technologies. While Cloud-Based Manufacturing enables on-demand access to manufacturing resources, a trusted intermediary is required for transactions between the users who wish to avail manufacturing services. We present a decentralized, peer-to-peer platform called BPIIoT for Industrial Internet of Things based on the Block chain technology. With the use of Blockchain technology, the BPIIoT platform enables peers in a decentralized, trustless, peer-to-peer network to interact with each other without the need for a trusted intermediary. 展开更多
关键词 internet of things Blockchain Smart Contracts Cloud-based Manufacturing
下载PDF
An Intelligent Hybrid Mutual Authentication Scheme for Industrial Internet of Thing Networks
6
作者 Muhammad Adil Jehad Ali +6 位作者 Muhammad Sajjad Khan Junsu Kim Ryan Alturki Mohammad Zakarya Mukhtaj Khan Rahim Khan Su Min Kim 《Computers, Materials & Continua》 SCIE EI 2021年第7期447-470,共24页
Internet of Things(IoT)network used for industrial management is vulnerable to different security threats due to its unstructured deployment,and dynamic communication behavior.In literature various mechanisms addresse... Internet of Things(IoT)network used for industrial management is vulnerable to different security threats due to its unstructured deployment,and dynamic communication behavior.In literature various mechanisms addressed the security issue of Industrial IoT networks,but proper maintenance of the performance reliability is among the common challenges.In this paper,we proposed an intelligent mutual authentication scheme leveraging authentication aware node(AAN)and base station(BS)to identify routing attacks in Industrial IoT networks.The AAN and BS uses the communication parameter such as a route request(RREQ),node-ID,received signal strength(RSS),and round-trip time(RTT)information to identify malicious devices and routes in the deployed network.The feasibility of the proposed model is validated in the simulation environment,where OMNeT++was used as a simulation tool.We compare the results of the proposed model with existing field-proven schemes in terms of routing attacks detection,communication cost,latency,computational cost,and throughput.The results show that our proposed scheme surpasses the previous schemes regarding these performance parameters with the attack detection rate of 97.7%. 展开更多
关键词 SECURITY industrial internet of things routing attacks routing protocols base station authentication aware nodes
下载PDF
Situation Awareness Data Fusion Method Based on Library Events
7
作者 Haixu Xi Wei Gao Gyun Yeol Park 《Computer Systems Science & Engineering》 SCIE EI 2022年第9期1047-1061,共15页
Microelectronic technology and communication technology are developed in deep manner;the computing mode has been transferred from traditional computer-centered to human centered pervasive.So,the concept of Internet o... Microelectronic technology and communication technology are developed in deep manner;the computing mode has been transferred from traditional computer-centered to human centered pervasive.So,the concept of Internet of things(IoT)is gradually put forward,which allows people to access information about their surroundings on demand through different terminals.The library is the major public space for human to read and learn.How to provide a more comfortable library environment to better meet people’s learning requirements is a place where the Internet of things plays its role.The purpose of this paper is to solve the difference between the data fusion of library environment and the data fusion of other environments by the method of data fusion oriented to library.This paper presents a general technical framework of situational awareness for smart library system which includes a data fusion middleware.It can process data and inform the upper module of the changed library environment after deploying the smart library system in a library,including data collection and processing,how to judge whether events are triggered,how the system reacts,and the acquisition and update of user preferences.This paper presents a situational awareness recommendation method based on an effective data fusion model and algorithm for library after conducting experimental in service of library,which give more accurate of book recommendation than traditional method and good learning service environment of library for readers. 展开更多
关键词 Intelligent library internet of things situational awareness information fusion data fusion
下载PDF
Blockchain-Based Cognitive Computing Model for Data Security on a Cloud Platform 被引量:1
8
作者 Xiangmin Guo Guangjun Liang +1 位作者 Jiayin Liu Xianyi Chen 《Computers, Materials & Continua》 SCIE EI 2023年第12期3305-3323,共19页
Cloud storage is widely used by large companies to store vast amounts of data and files,offering flexibility,financial savings,and security.However,information shoplifting poses significant threats,potentially leading... Cloud storage is widely used by large companies to store vast amounts of data and files,offering flexibility,financial savings,and security.However,information shoplifting poses significant threats,potentially leading to poor performance and privacy breaches.Blockchain-based cognitive computing can help protect and maintain information security and privacy in cloud platforms,ensuring businesses can focus on business development.To ensure data security in cloud platforms,this research proposed a blockchain-based Hybridized Data Driven Cognitive Computing(HD2C)model.However,the proposed HD2C framework addresses breaches of the privacy information of mixed participants of the Internet of Things(IoT)in the cloud.HD2C is developed by combining Federated Learning(FL)with a Blockchain consensus algorithm to connect smart contracts with Proof of Authority.The“Data Island”problem can be solved by FL’s emphasis on privacy and lightning-fast processing,while Blockchain provides a decentralized incentive structure that is impervious to poisoning.FL with Blockchain allows quick consensus through smart member selection and verification.The HD2C paradigm significantly improves the computational processing efficiency of intelligent manufacturing.Extensive analysis results derived from IIoT datasets confirm HD2C superiority.When compared to other consensus algorithms,the Blockchain PoA’s foundational cost is significant.The accuracy and memory utilization evaluation results predict the total benefits of the system.In comparison to the values 0.004 and 0.04,the value of 0.4 achieves good accuracy.According to the experiment results,the number of transactions per second has minimal impact on memory requirements.The findings of this study resulted in the development of a brand-new IIoT framework based on blockchain technology. 展开更多
关键词 Blockchain internet of things(IoT) blockchain based cognitive computing Hybridized Data Driven Cognitive Computing(HD2C) Federated Learning(FL) Proof of Authority(PoA)
下载PDF
An IoT Based Secure Patient Health Monitoring System
9
作者 Kusum Yadav Ali Alharbi +1 位作者 Anurag Jain Rabie A.Ramadan 《Computers, Materials & Continua》 SCIE EI 2022年第2期3637-3652,共16页
Internet of things(IoT)field has emerged due to the rapid growth of artificial intelligence and communication technologies.The use of IoT technology in modern healthcare environments is convenient for doctors and pati... Internet of things(IoT)field has emerged due to the rapid growth of artificial intelligence and communication technologies.The use of IoT technology in modern healthcare environments is convenient for doctors and patients as it can be used in real-time monitoring of patients,proper administration of patient information,and healthcare management.However,the usage of IoT in the healthcare domain will become a nightmare if patient information is not securely maintainedwhile transferring over an insecure network or storing at the administrator end.In this manuscript,the authors have developed a secure IoT healthcare monitoring system using the Blockchainbased XOR Elliptic Curve Cryptography(BC-XORECC)technique to avoid various vulnerable attacks.Initially,thework has established an authentication process for patient details by generating tokens,keys,and tags using Length Ceaser Cipher-based PearsonHashingAlgorithm(LCC-PHA),EllipticCurve Cryptography(ECC),and Fishers Yates Shuffled Based Adelson-Velskii and Landis(FYS-AVL)tree.The authentications prevent unauthorized users from accessing or misuse the data.After that,a secure data transfer is performed using BC-XORECC,which acts faster by maintaining high data privacy and blocking the path for the attackers.Finally,the Linear Spline Kernel-Based Recurrent Neural Network(LSK-RNN)classification monitors the patient’s health status.The whole developed framework brings out a secure data transfer without data loss or data breaches and remains efficient for health care monitoring via IoT.Experimental analysis shows that the proposed framework achieves a faster encryption and decryption time,classifies the patient’s health status with an accuracy of 89%,and remains robust comparedwith the existing state-of-the-art method. 展开更多
关键词 internet of things blockchain-based XOR elliptic curve cryptography linear spline kernel-based recurrent neural network health care monitoring length Ceaser cipher-based Pearson hashing algorithm elliptic curve cryptography fishers yates shuffled based Adelson-Velskii and Landis tree
下载PDF
Optimizing Resource Management for IoT Devices in Constrained Environments
10
作者 Sadia Islam Nilima Md Khokan Bhuyan +3 位作者 Md Kamruzzaman Jahanara Akter Rakibul Hasan Fatema Tuz Johora 《Journal of Computer and Communications》 2024年第8期81-98,共18页
Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but... Embedded computing device implementation on the Internet of Things (IoT) requires careful assessment of their intrinsic resource limitations. These constraints are not limited to memory and processing capabilities but extend to the network interfaces, particularly due to the low-power radio standards that these devices typically employ. The IPv6 protocol is shown to be a strong option for guaranteeing interoperability in the IoT, mostly because of its large address space, the range of current IP-based protocols, and its intrinsic versatility. Considering these benefits, we investigate if current IP-based network management protocols can be implemented on devices with limited resources. We investigate the resource needs in particular for implementing Network Configuration Protocol (NETCONF) and Simple Network Management Protocol (SNMP) on an 8-bit AVR-based device. Our investigation reveals the specific memory and processing demands of these protocols, providing valuable insights into their practicality and efficiency in constrained IoT environments. This study underscores the potential and challenges of leveraging IPv6-based network management protocols to enhance the functionality and interoperability of IoT devices while operating within stringent resource limitations. 展开更多
关键词 internet of things Resource Constraint IPv6 Protocol IP-based Network Management Network Management Protocol Network Configuration Protocol
下载PDF
An Interoperability Cross-Block Chain Framework for Secure Transactions in IoT
11
作者 N.Anand Kumar A.Grace Selvarani P.Vivekanandan 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期1077-1090,共14页
The purpose of this research is to deal with effective block chain framework for secure transactions.The rate of effective data transactions and the interoperability of the ledger are the two major obstacles involved ... The purpose of this research is to deal with effective block chain framework for secure transactions.The rate of effective data transactions and the interoperability of the ledger are the two major obstacles involved in Blockchain and to tackle this issue,Cross-Chain based Transaction(CCT)is introduced.Traditional industries have been restructured by the introduction of Internet of Things(IoT)to become smart industries through the feature of data-driven decision-making.Still,there are a few limitations,like decentralization,security vulnerabilities,poor interoperability,as well as privacy concerns in IoTs.To overcome this limitation,Blockchain has been employed to assure a safer transaction process,especially in asset exchanges.In recent decades,scalable local ledgers implement Blockchains,simultaneously sustaining peer validations of transactions which can be at local or global levels.From the single Hyperledger-based blockchains system,the CCT takes the transaction amid various chains.In addition,the most significant factor for this registration processing strategy is the Signature to ensure security.The application of the Quantum cryptographic algorithm amplifies the proposed Hyperledger-based blockchains,to strengthen the safety of the process.The key has been determined by restricting the number of transactions that reach the global Blockchain using the quantum-based hash function and accomplished by scalable local ledgers,and peer validations of transactions at local and global levels without any issues.The rate of transaction processing for entire peers has enhanced with the ancillary aid of the proposed solution,as it includes the procedure of load distribution.Without any boosted enhancement,the recommended solution utilizes the current transaction strategy,and also,it’s aimed at scalability,resource conservation,and interoperability.The experimental results of the system have been evaluated using the metrics like block weight,ledger memory,the usage of the central processing unit,and the communication overhead. 展开更多
关键词 internet of things(IoT) scalability blockchain INTEROPERABILITY security ledger size transaction rate cross-chain based transaction(CCT) quantum cryptographic algorithm
下载PDF
Novel Block Chain Technique for Data Privacy and Access Anonymity in Smart Healthcare
12
作者 J.Priya C.Palanisamy 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期243-259,共17页
The Internet of Things (IoT) and Cloud computing are gaining popularity due to their numerous advantages, including the efficient utilization of internetand computing resources. In recent years, many more IoT applicat... The Internet of Things (IoT) and Cloud computing are gaining popularity due to their numerous advantages, including the efficient utilization of internetand computing resources. In recent years, many more IoT applications have beenextensively used. For instance, Healthcare applications execute computations utilizing the user’s private data stored on cloud servers. However, the main obstaclesfaced by the extensive acceptance and usage of these emerging technologies aresecurity and privacy. Moreover, many healthcare data management system applications have emerged, offering solutions for distinct circumstances. But still, theexisting system has issues with specific security issues, privacy-preserving rate,information loss, etc. Hence, the overall system performance is reduced significantly. A unique blockchain-based technique is proposed to improve anonymityin terms of data access and data privacy to overcome the above-mentioned issues.Initially, the registration phase is done for the device and the user. After that, theGeo-Location and IP Address values collected during registration are convertedinto Hash values using Adler 32 hashing algorithm, and the private and publickeys are generated using the key generation centre. Then the authentication is performed through login. The user then submits a request to the blockchain server,which redirects the request to the associated IoT device in order to obtain thesensed IoT data. The detected data is anonymized in the device and stored inthe cloud server using the Linear Scaling based Rider Optimization algorithmwith integrated KL Anonymity (LSR-KLA) approach. After that, the Time-stamp-based Public and Private Key Schnorr Signature (TSPP-SS) mechanismis used to permit the authorized user to access the data, and the blockchain servertracks the entire transaction. The experimental findings showed that the proposedLSR-KLA and TSPP-SS technique provides better performance in terms of higherprivacy-preserving rate, lower information loss, execution time, and Central Processing Unit (CPU) usage than the existing techniques. Thus, the proposed method allows for better data privacy in the smart healthcare network. 展开更多
关键词 Adler 32 hashing algorithm linear scaling based rider optimization algorithm with integrated KL anonymity(LSR-KLA) timestamp-based public and private key schnorr signature(TSPP-SS) blockchain internet of things(IoT) healthcare
下载PDF
Vertical Handover Decision for Mobile IoT Edge Gateway Using Multi-Criteria and Fuzzy Logic Techniques
13
作者 Amit Singh Gaur Jyoti Budakoti Chung-Horng Lung 《Advances in Internet of Things》 2020年第4期57-93,共37页
Internet of Things (IoT) is ubiquitous, including objects or devices communicating through heterogenous wireless networks. One of the major challenges in mobile IoT is an efficient vertical handover decision (VHD) tec... Internet of Things (IoT) is ubiquitous, including objects or devices communicating through heterogenous wireless networks. One of the major challenges in mobile IoT is an efficient vertical handover decision (VHD) technique between heterogenous networks for seamless connectivity with constrained resources. The conventional VHD approach is mainly based on received signal strength (RSS). The approach is inefficient for vertical handover, since it always selects the target network with the strongest signal without taking into consideration of factors such as quality of service (QoS), cost, delay, etc. In this paper, we present a hybrid approach by integrating the multi-cri- teria based VHD (MCVHD) technique and an algorithm based on fuzzy logic for efficient VHD among Wi-Fi, Radio and Satellite networks. The MCVHD provides a lightweight solution that aims to achieving seamless connectivity for mobile IoT Edge Gateway over a set of heterogeneous networks. The proposed solution is evaluated in real time using a testbed containing real IoT devices. Further, the testbed is integrated with lightweight and efficient software techniques, e.g., microservices, containers, broker, and Edge/Cloud techniques. The experimental results show that the proposed approach is suitable for an IoT environment and it outperforms the conventional RSS Quality based VHD by minimizing handover failures, unnecessary handovers, handover time and cost of service. 展开更多
关键词 internet of things (IoT) Handover Vertical Handover Decision (VHD) Tech-nique for Order Preference by Similarity to Ideal Solution (TOPSIS) Mul-ti-Criteria based VHD (MCVHD) Containers Microservice Edge Computing
下载PDF
基于物联网技术的图书馆书籍自动定位系统
14
作者 郑晓渊 姜黎 +3 位作者 贾中芝 张锋 陈强 史倩 《自动化技术与应用》 2024年第3期132-135,共4页
当前图书馆书籍自动定位系统存在误差大,实时性差等不足,为了获得更加理想的图书馆书籍自动定位结果,设计基于物联网技术的图书馆书籍自动定位系统。首先无线射频识别技术读取书籍位置信息,再传送到物联网汇聚节点进行信息融合和处理,... 当前图书馆书籍自动定位系统存在误差大,实时性差等不足,为了获得更加理想的图书馆书籍自动定位结果,设计基于物联网技术的图书馆书籍自动定位系统。首先无线射频识别技术读取书籍位置信息,再传送到物联网汇聚节点进行信息融合和处理,然后通过物联网将信息发送到控制中心,用户通过控制中心可以查询书籍位置信息,从而实现图书馆书籍的智能定位,最后对系统性能进行仿真测试,结果表明,所提系统提升了图书馆书籍信息定位的精度,加快了图书馆书籍信息定位速度,具有较好的智能化程度,实际应用价值更高。 展开更多
关键词 物联网技术 图书馆 书籍定位 系统性能测试
下载PDF
新农科视域下专业学位硕士农业物联网课程案例教学改革
15
作者 谭峰 田芳明 +2 位作者 陈争光 刘传明 富爽 《农机使用与维修》 2024年第12期124-127,共4页
农业物联网技术相关课程是电子信息类专业重要的专业主干课程。针对该类课程的特点、当前课程教学和评价方式的局限性,以培养交叉融合型新农科人才为目标,将案例教学法应用于课程的改革和实践。课堂教学基于农业物联网技术特点,依托“... 农业物联网技术相关课程是电子信息类专业重要的专业主干课程。针对该类课程的特点、当前课程教学和评价方式的局限性,以培养交叉融合型新农科人才为目标,将案例教学法应用于课程的改革和实践。课堂教学基于农业物联网技术特点,依托“物联网+案例库+人工智能+农业”的全程案例教学模式,将科研项目成果有效融合到教学案例中,通过合理评价学生在课程中的表现,有效增强了学生的学习积极性、创新性和解决工程实践问题的能力,取得了较好的教学效果,可为农业工程与信息技术专业相关课程的建设提供参考和借鉴。 展开更多
关键词 新农科 案例库 农业物联网 教学改革
下载PDF
粤港澳大湾区城市群生态系统智能化管理
16
作者 董仁才 翁辰 +4 位作者 焦亚冉 吕晨璨 孙晓萌 练岸鑫 李春明 《生态学报》 CAS CSCD 北大核心 2024年第2期476-487,共12页
开展生态系统数字化、信息化、智能化管理,全面提升粤港澳大湾区生态环境质量,是建设国际一流湾区的必然趋势。以城市群生态系统智能化管理为目标,系统整合各类生态环境相关数据资源,形成生态系统管理数据和决策支撑体系,并以此为基础... 开展生态系统数字化、信息化、智能化管理,全面提升粤港澳大湾区生态环境质量,是建设国际一流湾区的必然趋势。以城市群生态系统智能化管理为目标,系统整合各类生态环境相关数据资源,形成生态系统管理数据和决策支撑体系,并以此为基础构建生态智能管理平台。研究以生态系统要素和功能管理逻辑为核心,构建了生态系统管理业务流程:(1)精准剖析生态环境问题,确定问题发生的尺度、范围并对其进行分类和定性;(2)确立生态管理目标,制定适宜的管理策略;(3)根据现状与基线进行生态系统服务权衡,通过生态管理恢复工程提升生态系统质量;(4)通过环境物联网监测生态系统变化,及时调整和改进生态系统管理计划。针对城市群生态系统多尺度、多层次、复杂化等特点,在制定管理决策时应充分权衡管理目标和生态服务,兼顾各类生态系统服务效益;需通过示范性生态工程印证管理方案的可行性、适用性和协同性;以趋善化理念为指导思想,不断优化调整生态管理目标;同时在管理活动实施的过程中不断积累、凝练、总结所获得的反馈信息和经验。面向生态管理体制和管理能力的现代化提升需求,融合大数据、地理信息系统(GIS)、全球广域网络(Web)等信息化技术,构建粤港澳大湾区生态管理智能平台,实现多主体信息共享,打破管理决策的“黑箱”,为推进生态环境管理现代化提供可靠可行的方案。构建的生态系统管理业务流程和管理策略,将知识充分融入管理决策的制定流程,能服务于粤港澳大湾区的生态文明建设,推动可持续和高质量发展。 展开更多
关键词 粤港澳大湾区 生态系统管理 信息化 知识库 物联网 生态工程
下载PDF
新基建视域下物联网专业实验教学体系研究
17
作者 袁培燕 赵晓焱 张俊娜 《计算机仿真》 2024年第9期387-391,共5页
建立科教协同的实验教学平台,推动智能实验室建设是新基建的重点方向。物联网工程作为支撑国家战略性新兴产业发展的新工科专业,其实验教学在人才的培养过程中至关重要。然而,现有实验教学体系受资金、场地、师资力量、网络条件等因素制... 建立科教协同的实验教学平台,推动智能实验室建设是新基建的重点方向。物联网工程作为支撑国家战略性新兴产业发展的新工科专业,其实验教学在人才的培养过程中至关重要。然而,现有实验教学体系受资金、场地、师资力量、网络条件等因素制约,很难直观呈现规模化、创意化物联网实验,尤其是过程化物联网综合实验。重点研究了新基建视域下如何构建符合物联网产业需求和人才培养的实验教学过程和实验教学体系。通过对物联网专业课程结构和人才需求进行分析,结合学校人才培养定位和物联网产业链现状,讨论了现有实验教学平台的不足。同时,以物联网的技术体系结构为主线,对物联网实验教学知识点进行了梳理,提出了一种虚实结合的物联网实验教学平台建设方案。提出的实验平台能够满足基础实验、工程实训、创新创客、科研辅助及行业应用等需求。 展开更多
关键词 物联网工程 实验教学 虚拟仿真 人才需求 项目式实践
下载PDF
基于超星发现的智慧图书馆文献分析
18
作者 宋宇 《科技资讯》 2024年第15期232-234,248,共4页
智慧图书馆以物联网、大数据和云计算为基础,是传统图书馆在服务时间和服务空间上的延伸,可以为用户提供精准化和有温度的智慧服务。以超星发现系统中智慧图书馆领域的相关文献为研究对象,对文献中的学术期刊年度发文量、作者、发文机... 智慧图书馆以物联网、大数据和云计算为基础,是传统图书馆在服务时间和服务空间上的延伸,可以为用户提供精准化和有温度的智慧服务。以超星发现系统中智慧图书馆领域的相关文献为研究对象,对文献中的学术期刊年度发文量、作者、发文机构、发文杂志和关键词等信息进行统计,对智慧图书馆的研究热点进行分析,最后从人和资源两个方面对如何建设智慧图书馆提出建议。 展开更多
关键词 智慧图书馆 智慧服务 核心技术 物联网
下载PDF
智慧图书馆下的数字资源研究
19
作者 吴珍 《科技资讯》 2024年第5期205-207,共3页
主要探讨了智慧图书馆下的数字资源种类特点、构建要素、运行机制、服务模式等方面的问题,研究了智慧图书馆数字资源在智慧图书馆建设中的重要性和优势,物联网、人工智能等技术在智慧图书馆中的应用场景和效果,智慧图书馆的用户需求和体... 主要探讨了智慧图书馆下的数字资源种类特点、构建要素、运行机制、服务模式等方面的问题,研究了智慧图书馆数字资源在智慧图书馆建设中的重要性和优势,物联网、人工智能等技术在智慧图书馆中的应用场景和效果,智慧图书馆的用户需求和体验,优化服务的建议和措施,发展建议和策略。通过上述措施,可以提升智慧图书馆的服务质量和读者满意度,更好地发挥图书馆在信息社会中的作用。 展开更多
关键词 智慧图书馆 数字资源 物联网 人工智能
下载PDF
基于物联网技术支持的智能图书馆发展研究
20
作者 赵勇 《软件》 2024年第6期151-153,共3页
图书馆在现代社会文教工作中发挥着重要作用,需要不断通过技术研究、应用的方式确保其价值得到充分发挥。本文以物联网技术带给智能图书馆的发展优势为切入点,在此基础上论述其具体发展方式,包括物联网基础架构建设、智能技术在辨识和... 图书馆在现代社会文教工作中发挥着重要作用,需要不断通过技术研究、应用的方式确保其价值得到充分发挥。本文以物联网技术带给智能图书馆的发展优势为切入点,在此基础上论述其具体发展方式,包括物联网基础架构建设、智能技术在辨识和感知方面的应用等,就物联网技术下智能图书馆的未来发展进行展望,为未来文教事业发展提供参考。 展开更多
关键词 物联网技术 智能图书馆 智能辨识 智能感知
下载PDF
上一页 1 2 23 下一页 到第
使用帮助 返回顶部