期刊文献+
共找到5,955篇文章
< 1 2 250 >
每页显示 20 50 100
Multi-source heterogeneous data access management framework and key technologies for electric power Internet of Things
1
作者 Pengtian Guo Kai Xiao +1 位作者 Xiaohui Wang Daoxing Li 《Global Energy Interconnection》 EI CSCD 2024年第1期94-105,共12页
The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initiall... The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT. 展开更多
关键词 Power internet of Things Object model High concurrency access Zero trust mechanism Multi-source heterogeneous data
下载PDF
Federated Learning on Internet of Things:Extensive and Systematic Review
2
作者 Meenakshi Aggarwal Vikas Khullar +4 位作者 Sunita Rani Thomas AndréProla Shyama Barna Bhattacharjee Sarowar Morshed Shawon Nitin Goyal 《Computers, Materials & Continua》 SCIE EI 2024年第5期1795-1834,共40页
The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and ... The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and needs to be explored in various areas to understand the key challenges for deployment in real-world scenarios.The paper systematically reviewed the available literature using the PRISMA guiding principle.The study aims to provide a detailed overview of the increasing use of FL in IoT networks,including the architecture and challenges.A systematic review approach is used to collect,categorize and analyze FL-IoT-based articles.Asearch was performed in the IEEE,Elsevier,Arxiv,ACM,and WOS databases and 92 articles were finally examined.Inclusion measures were published in English and with the keywords“FL”and“IoT”.The methodology begins with an overview of recent advances in FL and the IoT,followed by a discussion of how these two technologies can be integrated.To be more specific,we examine and evaluate the capabilities of FL by talking about communication protocols,frameworks and architecture.We then present a comprehensive analysis of the use of FL in a number of key IoT applications,including smart healthcare,smart transportation,smart cities,smart industry,smart finance,and smart agriculture.The key findings from this analysis of FL IoT services and applications are also presented.Finally,we performed a comparative analysis with FL IID(independent and identical data)and non-ID,traditional centralized deep learning(DL)approaches.We concluded that FL has better performance,especially in terms of privacy protection and resource utilization.FL is excellent for preserving privacy becausemodel training takes place on individual devices or edge nodes,eliminating the need for centralized data aggregation,which poses significant privacy risks.To facilitate development in this rapidly evolving field,the insights presented are intended to help practitioners and researchers navigate the complex terrain of FL and IoT. 展开更多
关键词 internet of Things federated learning PRISMA framework of FL applications of FL data privacy COMMUNICATION
下载PDF
Federated Learning with Blockchain for Privacy-Preserving Data Sharing in Internet of Vehicles
3
作者 Wenxian Jiang Mengjuan Chen Jun Tao 《China Communications》 SCIE CSCD 2023年第3期69-85,共17页
Data sharing technology in Internet of Vehicles(Io V)has attracted great research interest with the goal of realizing intelligent transportation and traffic management.Meanwhile,the main concerns have been raised abou... Data sharing technology in Internet of Vehicles(Io V)has attracted great research interest with the goal of realizing intelligent transportation and traffic management.Meanwhile,the main concerns have been raised about the security and privacy of vehicle data.The mobility and real-time characteristics of vehicle data make data sharing more difficult in Io V.The emergence of blockchain and federated learning brings new directions.In this paper,a data-sharing model that combines blockchain and federated learning is proposed to solve the security and privacy problems of data sharing in Io V.First,we use federated learning to share data instead of exposing actual data and propose an adaptive differential privacy scheme to further balance the privacy and availability of data.Then,we integrate the verification scheme into the consensus process,so that the consensus computation can filter out low-quality models.Experimental data shows that our data-sharing model can better balance the relationship between data availability and privacy,and also has enhanced security. 展开更多
关键词 blockchain federated learning PRIVACY data sharing internet of Vehicles
下载PDF
A Novel Secure Data Transmission Scheme in Industrial Internet of Things 被引量:24
4
作者 Hongwen Hui Chengcheng Zhou +1 位作者 Shenggang Xu Fuhong Lin 《China Communications》 SCIE CSCD 2020年第1期73-88,共16页
The industrial Internet of Things(IoT)is a trend of factory development and a basic condition of intelligent factory.It is very important to ensure the security of data transmission in industrial IoT.Applying a new ch... The industrial Internet of Things(IoT)is a trend of factory development and a basic condition of intelligent factory.It is very important to ensure the security of data transmission in industrial IoT.Applying a new chaotic secure communication scheme to address the security problem of data transmission is the main contribution of this paper.The scheme is proposed and studied based on the synchronization of different-structure fractional-order chaotic systems with different order.The Lyapunov stability theory is used to prove the synchronization between the fractional-order drive system and the response system.The encryption and decryption process of the main data signals is implemented by using the n-shift encryption principle.We calculate and analyze the key space of the scheme.Numerical simulations are introduced to show the effectiveness of theoretical approach we proposed. 展开更多
关键词 industrial internet of Things data transmission secure communication fractional-order chaotic systems
下载PDF
Hierarchical Data Aggregation with Data Offloading Scheme for Fog Enabled IoT Environment
5
作者 P.Nalayini R.Arun Prakash 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2033-2047,共15页
Fog computing is a promising technology that has been emerged to handle the growth of smart devices as well as the popularity of latency-sensitive and location-awareness Internet of Things(IoT)services.After the emerg... Fog computing is a promising technology that has been emerged to handle the growth of smart devices as well as the popularity of latency-sensitive and location-awareness Internet of Things(IoT)services.After the emergence of IoT-based services,the industry of internet-based devices has grown.The number of these devices has raised from millions to billions,and it is expected to increase further in the near future.Thus,additional challenges will be added to the traditional centralized cloud-based architecture as it will not be able to handle that growth and to support all connected devices in real-time without affecting the user experience.Conventional data aggregation models for Fog enabled IoT environ-ments possess high computational complexity and communication cost.There-fore,in order to resolve the issues and improve the lifetime of the network,this study develops an effective hierarchical data aggregation with chaotic barnacles mating optimizer(HDAG-CBMO)technique.The HDAG-CBMO technique derives afitness function from many relational matrices,like residual energy,average distance to neighbors,and centroid degree of target area.Besides,a chaotic theory based population initialization technique is derived for the optimal initial position of barnacles.Moreover,a learning based data offloading method has been developed for reducing the response time to IoT user requests.A wide range of simulation analyses demonstrated that the HDAG-CBMO technique has resulted in balanced energy utilization and prolonged lifetime of the Fog assisted IoT networks. 展开更多
关键词 internet of things fog computing barnacles mating optimizer data offloading data aggregation
下载PDF
A Federated Bidirectional Connection Broad Learning Scheme for Secure Data Sharing in Internet of Vehicles 被引量:3
6
作者 Xiaoming Yuan Jiahui Chen +2 位作者 Ning Zhang Xiaojie Fang Didi Liu 《China Communications》 SCIE CSCD 2021年第7期117-133,共17页
Data sharing in Internet of Vehicles(IoV)makes it possible to provide personalized services for users by service providers in Intelligent Transportation Systems(ITS).As IoV is a multi-user mobile scenario,the reliabil... Data sharing in Internet of Vehicles(IoV)makes it possible to provide personalized services for users by service providers in Intelligent Transportation Systems(ITS).As IoV is a multi-user mobile scenario,the reliability and efficiency of data sharing need to be further enhanced.Federated learning allows the server to exchange parameters without obtaining private data from clients so that the privacy is protected.Broad learning system is a novel artificial intelligence technology that can improve training efficiency of data set.Thus,we propose a federated bidirectional connection broad learning scheme(FeBBLS)to solve the data sharing issues.Firstly,we adopt the bidirectional connection broad learning system(BiBLS)model to train data set in vehicular nodes.The server aggregates the collected parameters of BiBLS from vehicular nodes through the federated broad learning system(FedBLS)algorithm.Moreover,we propose a clustering FedBLS algorithm to offload the data sharing into clusters for improving the aggregation capability of the model.Some simulation results show our scheme can improve the efficiency and prediction accuracy of data sharing and protect the privacy of data sharing. 展开更多
关键词 federated learning broad learning system deep learning internet of Vehicles data privacy
下载PDF
An Efficient SDFRM Security System for Blockchain Based Internet of Things
7
作者 Vivekraj Mannayee Thirumalai Ramanathan 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期1545-1563,共19页
Blockchain has recently sparked interest in both the technological and businessfirms.The Internet of Things's(IoT)core principle emerged due to the connectivity of several new technologies,including wireless techno... Blockchain has recently sparked interest in both the technological and businessfirms.The Internet of Things's(IoT)core principle emerged due to the connectivity of several new technologies,including wireless technology,the Inter-net,embedded automation systems,and micro-electromechanical devices.Manu-facturing environments and operations have been successfully converted by implementing recent advanced technology like Cloud Computing(CC),Cyber-Physical System(CSP),Information and Communication Technologies(ICT)and Enterprise Model,and other technological innovations into the fourth indus-trial revolution referred to as Industry 4.0.Data management is defined as the pro-cess of accumulation in order to make better business decisions,and process,secure and store information about a company.In the incipient model,there are interconnected contrivances and Machine-to-Machine(M2M)interactions,and transaction data are stored on the Blockchain.Security is a challenging aspect that must be punctiliously considered during the design and development phases of a CSP.In this research article,we proposed a Secure and Distributed Framework for Resource Management(SDFRM)in Industry 4.0 environments within a distribu-ted and collaborative Industry 4.0 system,the dynamic and trust-based Distributed Management Framework(DMF)of shared resource access.Such issues are focused by taking into account of the traditional characteristics of IoT/Industrial Internet of Things’(IIoT)-predicated environments,an SDFRM in Industry 4.0 environments within a distributed and collaborative Industry 4.0 system.Also,to ensure strong privacy over the procedures associated with Access Control(AC),a privacy-preserving method is proposed and integrated into the DMF.The proposed DMF,based on blockchain technology and peer-to-peer networks,allows dynamic access management and system governance without using third parties who could be attacked.We worked hard to design and implement the pro-posal to demonstrate its viability and evaluate its performance.Our proposal out-performs the Multichain Blockchain in terms of successful storage transactions with an achieved average throughput of 98.15%. 展开更多
关键词 internet of things blockchain data privacy security system distributed management IIoT
下载PDF
Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things
8
作者 Ahmad O.Aseeri Sajjad Hussain Chauhdary +2 位作者 Mohammed Saeed Alkatheiri Mohammed A.Alqarni Yu Zhuang 《Computers, Materials & Continua》 SCIE EI 2023年第4期1901-1918,共18页
IoT devices rely on authentication mechanisms to render secure message exchange.During data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted... IoT devices rely on authentication mechanisms to render secure message exchange.During data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT devices.The application of physical unclonable functions(PUFs)ensures secure data transmission among the internet of things(IoT)devices in a simplified network with an efficient time-stamped agreement.This paper proposes a secure,lightweight,cost-efficient reinforcement machine learning framework(SLCR-MLF)to achieve decentralization and security,thus enabling scalability,data integrity,and optimized processing time in IoT devices.PUF has been integrated into SLCR-MLF to improve the security of the cluster head node in the IoT platform during transmission by providing the authentication service for device-to-device communication.An IoT network gathers information of interest from multiple cluster members selected by the proposed framework.In addition,the software-defined secured(SDS)technique is integrated with SLCR-MLF to improve data integrity and optimize processing time in the IoT platform.Simulation analysis shows that the proposed framework outperforms conventional methods regarding the network’s lifetime,energy,secured data retrieval rate,and performance ratio.By enabling the proposed framework,number of residual nodes is reduced to 16%,energy consumption is reduced by up to 50%,almost 30%improvement in data retrieval rate,and network lifetime is improved by up to 1000 msec. 展开更多
关键词 Cyber-physical systems security data aggregation internet of Things physical unclonable function swarm intelligences
下载PDF
SDN-Enabled Content Dissemination Scheme for the Internet of Vehicles
9
作者 Abida Sharif Muhammad Imran Sharif +5 位作者 Muhammad Attique Khan Nisar Ali Abdullah Alqahtani Majed Alhaisoni Ye Jin Kim Byoungchol Chang 《Computers, Materials & Continua》 SCIE EI 2023年第5期2383-2396,共14页
The content-centric networking(CCN)architecture allows access to the content through name,instead of the physical location where the content is stored,which makes it a more robust and flexible content-based architectu... The content-centric networking(CCN)architecture allows access to the content through name,instead of the physical location where the content is stored,which makes it a more robust and flexible content-based architecture.Nevertheless,in CCN,the broadcast nature of vehicles on the Internet of Vehicles(IoV)results in latency and network congestion.The IoVbased content distribution is an emerging concept in which all the vehicles are connected via the internet.Due to the high mobility of vehicles,however,IoV applications have different network requirements that differ from those of many other networks,posing new challenges.Considering this,a novel strategy mediator framework is presented in this paper for managing the network resources efficiently.Software-defined network(SDN)controller is deployed for improving the routing flexibility and facilitating in the interinteroperability of heterogeneous devices within the network.Due to the limited memory of edge devices,the delectable bloom filters are used for caching and storage.Finally,the proposed scheme is compared with the existing variants for validating its effectiveness. 展开更多
关键词 internet of vehicles(IOV) content dissemination multi mediator data traffic management
下载PDF
Time to forge ahead:The Internet of Things for healthcare
10
作者 Denzil Furtado Andre F.Gygax +1 位作者 Chien Aun Chan Ashley I.Bush 《Digital Communications and Networks》 SCIE CSCD 2023年第1期223-235,共13页
Situated at the intersection of technology and medicine,the Internet of Things(IoT)holds the promise of addressing some of healthcare's most pressing challenges,from medical error,to chronic drug shortages,to over... Situated at the intersection of technology and medicine,the Internet of Things(IoT)holds the promise of addressing some of healthcare's most pressing challenges,from medical error,to chronic drug shortages,to overburdened hospital systems,to dealing with the COVID-19 pandemic.However,despite considerable recent technological advances,the pace of successful implementation of promising IoT healthcare initiatives has been slow.To inspire more productive collaboration,we present here a simple—but surprisingly underrated—problemoriented approach to developing healthcare technologies.To further assist in this effort,we reviewed the various commercial,regulatory,social/cultural,and technological factors in the development of the IoT.We propose that fog computing—a technological paradigm wherein the burden of computing is shifted from a centralized cloud server closer to the data source—offers the greatest promise for building a robust and scalable healthcare IoT ecosystem.To this end,we explore the key enabling technologies that underpin the fog architecture,from the sensing layer all the way up to the cloud.It is our hope that ongoing advances in sensing,communications,cryptography,storage,machine learning,and artificial intelligence will be leveraged in meaningful ways to generate unprecedented medical intelligence and thus drive improvements in the health of many people. 展开更多
关键词 internet of Things Healthcare Information Fog computing Artificial intelligence Machine learning Big data COVID-19 pandemic
下载PDF
Data Security Storage Model of the Internet of Things Based on Blockchain 被引量:3
11
作者 Pingshui Wang Willy Susilo 《Computer Systems Science & Engineering》 SCIE EI 2021年第1期213-224,共12页
With the development of information technology,the Internet of Things(IoT)has gradually become the third wave of the worldwide information industry revolution after the computer and the Internet.The application of the... With the development of information technology,the Internet of Things(IoT)has gradually become the third wave of the worldwide information industry revolution after the computer and the Internet.The application of the IoT has brought great convenience to people’s production and life.However,the potential information security problems in various IoT applications are gradually exposed and people pay more attention to them.The traditional centralized data storage and management model of the IoT is easy to cause transmission delay,single point of failure,privacy disclosure and other problems,and eventually leads to unpredictable behavior of the system.Blockchain technology can effectively improve the operation and data security status of the IoT.Referring to the storage model of the Fabric blockchain project,this paper designs a data security storage model suitable for the IoT system.The simulation results show that the model is not only effective and extensible,but also can better protect the data security of the Internet of Things. 展开更多
关键词 internet of Things(IoT) blockchain data security digital signatures ENCRYPTION MODEL
下载PDF
On the design of an AI-driven secure communication scheme for internet of medical things environment
12
作者 Neha Garg Rajat Petwal +3 位作者 Mohammad Wazid D.P.Singh Ashok Kumar Das Joel J.P.C.Rodrigues 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1080-1089,共10页
The Internet of Medical Things(IoMT)is a collection of smart healthcare devices,hardware infrastructure,and related software applications,that facilitate the connection of healthcare information technology system via ... The Internet of Medical Things(IoMT)is a collection of smart healthcare devices,hardware infrastructure,and related software applications,that facilitate the connection of healthcare information technology system via the Internet.It is also called IoT in healthcare,facilitating secure communication of remote healthcare devices over the Internet for quick and flexible analysis of healthcare data.In other words,IoMT is an amalgam of medical devices and applications,which improves overall healthcare outcomes.However,this system is prone to securityand privacy-related attacks on healthcare data.Therefore,providing a robust security mechanism to prevent the attacks and vulnerability of IoMT is essential.To mitigate this,we proposed a new Artificial-Intelligence envisioned secure communication scheme for IoMT.The discussed network and threat models provide details of the associated network arrangement of the IoMT devices and attacks relevant to IoMT.Furthermore,we provide the security analysis of the proposed scheme to show its security against different possible attacks.Moreover,a comparative study of the proposed scheme with other similar schemes is presented.Our results show that the proposed scheme outperforms other similar schemes in terms of communication and computation costs,and security and functionality attributes.Finally,we provide a pragmatic study of the proposed scheme to observe its impact on various network performance parameters. 展开更多
关键词 internet of Medical Things(IoMT) Security Authentication and key agreement Artificial Intelligence(AI) Big data analytics
下载PDF
Achieving Fine-Grained and Flexible Access Control on Blockchain-Based Data Sharing for the Internet of Things 被引量:1
13
作者 Ruimiao Wang Xiaodong Wang +2 位作者 Wenti Yang Shuai Yuan Zhitao Guan 《China Communications》 SCIE CSCD 2022年第6期22-34,共13页
The traditional centralized data sharing systems have potential risks such as single point of failures and excessive working load on the central node.As a distributed and collaborative alternative,approaches based upo... The traditional centralized data sharing systems have potential risks such as single point of failures and excessive working load on the central node.As a distributed and collaborative alternative,approaches based upon blockchain have been explored recently for Internet of Things(IoTs).However,the access from a legitimate user may be denied without the pre-defined policy and data update on the blockchain could be costly to the owners.In this paper,we first address these issues by incorporating the Accountable Subgroup Multi-Signature(ASM)algorithm into the Attribute-based Access Control(ABAC)method with Policy Smart Contract,to provide a finegrained and flexible solution.Next,we propose a policy-based Chameleon Hash algorithm that allows the data to be updated in a reliable and convenient way by the authorized users.Finally,we evaluate our work by comparing its performance with the benchmarks.The results demonstrate significant improvement on the effectiveness and efficiency. 展开更多
关键词 blockchain access control smart contract MULTI-SIGNATURE chameleon-hash data sharing internet of Things
下载PDF
A Trusted NUMFabric Algorithm for Congestion Price Calculation at the Internet-of-Things Datacenter 被引量:1
14
作者 Shan Chun Xiaolong Chen +1 位作者 Guoqiang Deng Hao Liu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第3期1203-1216,共14页
The important issues of network TCP congestion control are how to compute the link price according to the link status and regulate the data sending rate based on link congestion pricing feedback information.However,it... The important issues of network TCP congestion control are how to compute the link price according to the link status and regulate the data sending rate based on link congestion pricing feedback information.However,it is difficult to predict the congestion state of the link-end accurately at the source.In this paper,we presented an improved NUMFabric algorithm for calculating the overall congestion price.In the proposed scheme,the whole network structure had been obtained by the central control server in the Software Defined Network,and a kind of dual-hierarchy algorithm for calculating overall network congestion price had been demonstrated.In this scheme,the first hierarchy algorithm was set up in a central control server like Opendaylight and the guiding parameter B is obtained based on the intelligent data of global link state information.Based on the historical data,the congestion state of the network and the guiding parameter B is accurately predicted by the machine learning algorithm.The second hierarchy algorithm was installed in the Openflow link and the link price was calculated based on guiding parameter B given by the first algorithm.We evaluate this evolved NUMFabric algorithm in NS3,which demonstrated that the proposed NUMFabric algorithm could efficiently increase the link bandwidth utilization of cloud computing IoT datacenters. 展开更多
关键词 internet of Things cloud computing intelligent data aggregation distributed optimization trusted network calculation
下载PDF
Machine leaming for internet of things data analysis: a survey 被引量:13
15
作者 Mohammad Saeid Mahdavinejad Mohammadreza Rezvan +3 位作者 Mohammadamin Barekatain Peyman Adibi Payam Barnaghi Amit P. Sheth 《Digital Communications and Networks》 SCIE 2018年第3期161-175,共15页
关键词 通信技术 硬件 发展现状 创新
下载PDF
A General Framework for Intelligent IoT Data Acquisition and Sharing in an Untrusted Environment Based on Blockchain
16
作者 Lu Yin Xue Yongtao +4 位作者 Li Qingyuan Wu Luocheng Li Taosen Yang Peipei Zhu Hongbo 《China Communications》 SCIE CSCD 2024年第3期137-148,共12页
Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The m... Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The main challenge at this stage is to integrate the blockchain from the resourceconstrained Io T devices and ensure the data of Io T system is credible. We provide a general framework for intelligent Io T data acquisition and sharing in an untrusted environment based on the blockchain, where gateways become Oracles. A distributed Oracle network based on Byzantine Fault Tolerant algorithm is used to provide trusted data for the blockchain to make intelligent Io T data trustworthy. An aggregation contract is deployed to collect data from various Oracle and share the credible data to all on-chain users. We also propose a gateway data aggregation scheme based on the REST API event publishing/subscribing mechanism which uses SQL to achieve flexible data aggregation. The experimental results show that the proposed scheme can alleviate the problem of limited performance of Io T equipment, make data reliable, and meet the diverse data needs on the chain. 展开更多
关键词 blockchain data sharing internet of Things ORACLE
下载PDF
Traffic-Aware Fuzzy Classification Model to Perform IoT Data Traffic Sourcing with the Edge Computing
17
作者 Huixiang Xu 《Computers, Materials & Continua》 SCIE EI 2024年第2期2309-2335,共27页
The Internet of Things(IoT)has revolutionized how we interact with and gather data from our surrounding environment.IoT devices with various sensors and actuators generate vast amounts of data that can be harnessed to... The Internet of Things(IoT)has revolutionized how we interact with and gather data from our surrounding environment.IoT devices with various sensors and actuators generate vast amounts of data that can be harnessed to derive valuable insights.The rapid proliferation of Internet of Things(IoT)devices has ushered in an era of unprecedented data generation and connectivity.These IoT devices,equipped with many sensors and actuators,continuously produce vast volumes of data.However,the conventional approach of transmitting all this data to centralized cloud infrastructures for processing and analysis poses significant challenges.However,transmitting all this data to a centralized cloud infrastructure for processing and analysis can be inefficient and impractical due to bandwidth limitations,network latency,and scalability issues.This paper proposed a Self-Learning Internet Traffic Fuzzy Classifier(SLItFC)for traffic data analysis.The proposed techniques effectively utilize clustering and classification procedures to improve classification accuracy in analyzing network traffic data.SLItFC addresses the intricate task of efficiently managing and analyzing IoT data traffic at the edge.It employs a sophisticated combination of fuzzy clustering and self-learning techniques,allowing it to adapt and improve its classification accuracy over time.This adaptability is a crucial feature,given the dynamic nature of IoT environments where data patterns and traffic characteristics can evolve rapidly.With the implementation of the fuzzy classifier,the accuracy of the clustering process is improvised with the reduction of the computational time.SLItFC can reduce computational time while maintaining high classification accuracy.This efficiency is paramount in edge computing,where resource constraints demand streamlined data processing.Additionally,SLItFC’s performance advantages make it a compelling choice for organizations seeking to harness the potential of IoT data for real-time insights and decision-making.With the Self-Learning process,the SLItFC model monitors the network traffic data acquired from the IoT Devices.The Sugeno fuzzy model is implemented within the edge computing environment for improved classification accuracy.Simulation analysis stated that the proposed SLItFC achieves 94.5%classification accuracy with reduced classification time. 展开更多
关键词 internet of Things(IoT) edge computing traffic data SELF-LEARNING fuzzy-learning
下载PDF
Application of Big Data in Agricultural Informationization in Shandong Province under the Background of "Internet +" 被引量:1
18
作者 Xinling GAN Yong LI 《Asian Agricultural Research》 2019年第4期1-3,共3页
This paper explains the basic concepts of " Internet + " and big data,analyzes the main problems in the application of big data technology in agricultural informationization of Shandong Province,summarizes c... This paper explains the basic concepts of " Internet + " and big data,analyzes the main problems in the application of big data technology in agricultural informationization of Shandong Province,summarizes corresponding solutions from the aspects of government guidance,financial input,open sharing of agricultural big data,big data storage and processing,data mining,etc.,and prospects the application trend of big data technology in agricultural informationization to achieve the connotative development of agriculture in Shandong Province. 展开更多
关键词 AGRICULTURAL informationization 'internet +' BIG data
下载PDF
A Novel Intrusion Detection Model of Unknown Attacks Using Convolutional Neural Networks
19
作者 Abdullah Alsaleh 《Computer Systems Science & Engineering》 2024年第2期431-449,共19页
With the increasing number of connected devices in the Internet of Things(IoT)era,the number of intrusions is also increasing.An intrusion detection system(IDS)is a secondary intelligent system for monitoring,detectin... With the increasing number of connected devices in the Internet of Things(IoT)era,the number of intrusions is also increasing.An intrusion detection system(IDS)is a secondary intelligent system for monitoring,detecting and alerting against malicious activity.IDS is important in developing advanced security models.This study reviews the importance of various techniques,tools,and methods used in IoT detection and/or prevention systems.Specifically,it focuses on machine learning(ML)and deep learning(DL)techniques for IDS.This paper proposes an accurate intrusion detection model to detect traditional and new attacks on the Internet of Vehicles.To speed up the detection of recent attacks,the proposed network architecture developed at the data processing layer is incorporated with a convolutional neural network(CNN),which performs better than a support vector machine(SVM).Processing data are enhanced using the synthetic minority oversampling technique to ensure learning accuracy.The nearest class mean classifier is applied during the testing phase to identify new attacks.Experimental results using the AWID dataset,which is one of the most common open intrusion detection datasets,revealed a higher detection accuracy(94%)compared to SVM and random forest methods. 展开更多
关键词 internet of Vehicles intrusion detection machine learning unknown attacks data processing layer
下载PDF
Research on the Application of Energy Internet Big Data in Integrated Energy Market
20
作者 Wenyu Zhou 《Energy and Power Engineering》 2017年第4期328-335,共8页
Energy Internet is deeply integrated by Internet concept, information technology and energy industry, and Energy Internet Big Data are one of core technologies that achieve energy-information-economic interconnection ... Energy Internet is deeply integrated by Internet concept, information technology and energy industry, and Energy Internet Big Data are one of core technologies that achieve energy-information-economic interconnection and improve the development and evolution of Energy Internet. This paper describes the concept and characteristics of Energy Internet Big Data, and feasibility of applying Energy Internet Big Data to integrated energy market. On this basis, as for integrated energy market and multi-subjects of Energy Internet, typical application and technical system based on Energy Internet Big Data in integrated energy market is put forward, which provides a reference for the analysis and decision of integrated energy market in Energy Internet. 展开更多
关键词 ENERGY internet ENERGY internet BIG data INTEGRATED ENERGY Market data MINING
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部