Internet of Vehicles(IoV)applications integrating with edge com-puting will significantly drive the growth of IoV.However,the contradiction between the high-speed mobility of vehicles,the delay sensitivity of corre-sp...Internet of Vehicles(IoV)applications integrating with edge com-puting will significantly drive the growth of IoV.However,the contradiction between the high-speed mobility of vehicles,the delay sensitivity of corre-sponding IoV applications and the limited coverage and resource capacity of distributed edge servers will pose challenges to the service continuity and stability of IoV applications.IoV application migration is a promising solution that can be supported by application containerization,a technology for seamless cross-edge-server application migration without user perception.Therefore,this paper proposes the container-based IoV edge application migration mechanism,consisting of three parts.The first is the migration trigger determination algorithm for cross-border migration and service degra-dation migration,respectively,based on trajectory prediction and traffic awareness to improve the determination accuracy.The second is the migration target decision calculation model for minimizing the average migration time and maximizing the average service time to reduce migration times and improve the stability and adaptability of migration decisions.The third is the migration decision algorithm based on the improved artificial bee colony algorithm to avoid local optimal migration decisions.Simulation results show that the proposed migration mechanism can reduce migration times,reduce average migration time,improve average service time and enhance the stability and adaptability of IoV application services.展开更多
In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to im...In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method.展开更多
Internet of Things(IoT)support for smart city systems improves ser-vice scales by ignoring various user congestion.People are looking for different security features for reliable and robust applications.Here,the Perma...Internet of Things(IoT)support for smart city systems improves ser-vice scales by ignoring various user congestion.People are looking for different security features for reliable and robust applications.Here,the Permanent Denial of Service(PDoS)problem arises from improper user identification.This article introduces the Service-Reliant Application Authentication(SRAA)to prevent PDoS attacks in a smart area of the city.In this authentication method,the security of the application is ensured through the distribution of guarded access.The supervised access distribution uses user interface features and sync with the user device.Abnormality in linking user device,application,and authentication is seen in Back Propagation(BP)readings.BP learning reduces given weights based on abnormalities trained during the access distribution process.The oddity is reflected in the sequence from previous training sessions to ensure consistent syn-chronization of distributed services.From PDoS,the web device displays a few unattended loads on the service,which reduces service failure.The effectiveness of the proposed verification method is verified using delays to verify metric accu-racy,false standard,sync failure,and bit rate.展开更多
The ubiquitous power Internet of Things(UPIoT)is an intelligent service system with comprehensive state perception,efficient processing,and flexible application of information.It focuses on each link of the power syst...The ubiquitous power Internet of Things(UPIoT)is an intelligent service system with comprehensive state perception,efficient processing,and flexible application of information.It focuses on each link of the power system and makes full use of the mobile internet,artificial intelligence,and other advanced information and communication technologies in order to realize the inter-human interaction of all things in all links of the power system.This article systematically presents to the national and international organizations and agencies in charge of UPIoT layer standardization the status quo of the research on the Internet of Things(IoT)-related industry standards system.It briefly describes the generic standard classification methods,layered architecture,conceptual model,and system tables in the UPIoT application layer.Based on the principles of inheritance,innovation,and practicability,this study divides the application layer into customer service,power grid operation,integrated energy,and enterprise operation,emerging business and analyzes the standard requirements of these five fields.This study also proposes a standard plan.Finally,it summarizes the research report and provides suggestions for a follow-up work.展开更多
This paper aims to realize the extensive application of Internet of things technology in urban waterlogging prevention management system, and has analyzed the security requirement and security architecture of Internet...This paper aims to realize the extensive application of Internet of things technology in urban waterlogging prevention management system, and has analyzed the security requirement and security architecture of Internet of things technology, and discussed the demand of urban waterlogging prevention management system in combination with the key technology of Internet of things technology, to do the overall design and functional design well during designing of urban waterlogging prevention management system. Finally, the application process of the Internet of things technology in Chongqing waterlogging prevention management system is summarized. The application result shows that the flood control and drainage function of Chongqing is gradually improved with smooth drainage facilities;the inspection and maintenance management is gradually standardized;operation monitoring and early warning management is fully strengthened. There is visual management for emergency command and dispatch, and at the same time, the drainage pipe network assessment management can be conducted correctly.展开更多
The Internet has stepped into Web 2.0 era. Web 2.0 application technologies and services are rapidly developing, accompanied by the innovation and revolution of business models. This article analyzes the development o...The Internet has stepped into Web 2.0 era. Web 2.0 application technologies and services are rapidly developing, accompanied by the innovation and revolution of business models. This article analyzes the development of Web 2.0 technologies and their promotion role in the development of Internet services, discusses the implementation of Web 2.0 core concepts (including user participation, resource sharing and platform) by the multiple Internet application technologies, and gives the development trends of Internet application technologies.展开更多
The application of internet in the industrial field has become an inevitable trend in modern society.In the actual operation,there are possible safety risks.To ensure the system’s proper operation,technicians are req...The application of internet in the industrial field has become an inevitable trend in modern society.In the actual operation,there are possible safety risks.To ensure the system’s proper operation,technicians are required to resolve the issues.In this context,the author thoroughly integrated with the present industrial development situation,examined the use of 5G technology in industrial internet security,and desired to leverage the advantageous benefits of 5G technology to boost industrial development.Due to the numerous benefits of 5G technology in security applications,we conducted an in-depth investigation and described it from the perspectives of relevant concepts,security,and security application guarantee measures,with the goal of achieving the goal of safe industrial internet operation.展开更多
Home is a place for people to relax and to feel secure.However,there are some external factors,such as temperature and humidity,making living conditions uncomfortable.With the development of Internet of Things(IoT)tec...Home is a place for people to relax and to feel secure.However,there are some external factors,such as temperature and humidity,making living conditions uncomfortable.With the development of Internet of Things(IoT)technology,the research issue of smart home becomes more important.The purpose of this study is to explore the application of IoT technology in indoor air monitoring and control,combined with the analysis of outdoor air quality data.This study develops a prototype system and tests and evaluates the performance of the system through user trial reports.The results show that(1)Air comparison of indoor and outdoor are practical for users,(2)Through the transmission of Bluetooth,restrictions on the practicality should be achieved through the WiFi remote monitoring effect,(3)It can receive multiple sensors at the same time,to achieve multiple indoor space monitoring effects,(4)It can be combined with other home appliances,if the integration of home appliances control will be more practical,(5)The current database is only a record,has not developed other applications,and in the future can develop predictive applications.We hope that through this study,we will provide some suggestions for the application of innovative technology in smart home.展开更多
The industrial Internet has germinated with the integration of the traditional industry and information technologies.An identifier is the identification of an object in the industrial Internet.The identifier technolog...The industrial Internet has germinated with the integration of the traditional industry and information technologies.An identifier is the identification of an object in the industrial Internet.The identifier technology is a method to validate the identification of an object and trace it.The identifier is a bridge to connect information islands in the industry,as well as the data basis for building a technology application ecosystem based on identifier resolution.We propose three practical applications and application scenarios of the industrial Internet identifier in this paper.Future applications of identifier resolution in the industrial Internet field are also presented.展开更多
With the use of multimedia which combines the use o f text, sound, images, motion video and animation, it is more efficient for studen ts to learn mould design interactively. A program is created using several multi m...With the use of multimedia which combines the use o f text, sound, images, motion video and animation, it is more efficient for studen ts to learn mould design interactively. A program is created using several multi media software to simulate the mechanism of moulding processes in order to let s tudents understand the concept of mould design. In addition, students can even access the program through the Internet. Therefore, the software is defined as Multimedia and Internet Technology (MIT) program. The MIT program consists of four sections: (i) simulation of mould mechanisms, ( ii) cooling system, (iii) material information and (iv) games for tutorials. Sec tion One covers the basic operations of different types of moulds such as two-p late mould, three-plate mould, split mould, side-core mould and mould with und ercuts. Section Two introduces different types of cooling systems such as bubble r, baffle, cooling circuits, etc. Section Three provides some useful material in formation for mould design. Section Four contains games of matching mould compon ents, mould design problem finding and multiple choice questions to test student s how much they understand mould design concept. Multimedia is highly effective particularly in teaching and learning. It changes the nature of learning itself. It makes reading dynamic by giving words an impo rtant new dimension. It allows students to see, hear and do simultaneously, thus significantly reducing average learning time. Furthermore, through cooperative learning on Internet, students can access the program, share data or search info rmation anytime anywhere. Therefore, Multimedia and Internet Technology is one o f the vital aspects to speed up the realization of information age in society.展开更多
Nanjing Automation Research Institute (NARI) is a specialized institute that engages in the researches of automation of electric mper system and its application. The paper introduces the architecture of NARI Intranet ...Nanjing Automation Research Institute (NARI) is a specialized institute that engages in the researches of automation of electric mper system and its application. The paper introduces the architecture of NARI Intranet as well as the techniques and application development on the Intranet. The first stage network of NARI and the building and the second stage network are both introduced. We lay emphasis on the system softWare used in NAm intranet, network management software developed by ourselves according to the characteristic of NARI network users, technique characteristics of application system on this platform and its running status. The paper also discusses the further development of NARI network application.展开更多
Networked customization is an important way for enterprises to satisfy customers?individual requirements. From this point of view, the study on networked customization process and application is started with analyzing...Networked customization is an important way for enterprises to satisfy customers?individual requirements. From this point of view, the study on networked customization process and application is started with analyzing the customization process in detail, in which the customization process is divided into 6 stages including information capture, need submission, need affirmation, need interaction, creating customization orders and customization production. A general customization process chart for common products is presented, which describes the communication between customers and enterprises in the entire customization process. The method of analyzing customization process is presented. The product customization subsystem in the system of ceramic product marketing and customization of Chongqing CHN & CHN Ceramics Co. Ltd. is introduced to explicate the process of customization via Internet.展开更多
基金supported in part by the National Natural Science Foundation of China under Grant 62071070.
文摘Internet of Vehicles(IoV)applications integrating with edge com-puting will significantly drive the growth of IoV.However,the contradiction between the high-speed mobility of vehicles,the delay sensitivity of corre-sponding IoV applications and the limited coverage and resource capacity of distributed edge servers will pose challenges to the service continuity and stability of IoV applications.IoV application migration is a promising solution that can be supported by application containerization,a technology for seamless cross-edge-server application migration without user perception.Therefore,this paper proposes the container-based IoV edge application migration mechanism,consisting of three parts.The first is the migration trigger determination algorithm for cross-border migration and service degra-dation migration,respectively,based on trajectory prediction and traffic awareness to improve the determination accuracy.The second is the migration target decision calculation model for minimizing the average migration time and maximizing the average service time to reduce migration times and improve the stability and adaptability of migration decisions.The third is the migration decision algorithm based on the improved artificial bee colony algorithm to avoid local optimal migration decisions.Simulation results show that the proposed migration mechanism can reduce migration times,reduce average migration time,improve average service time and enhance the stability and adaptability of IoV application services.
基金supported by the National Research Foundation of Korea (NRF) grant funded by the Korea Government (MSIT) (No.2021R1C1C1013133)supported by the Institute of Information and Communications Technology Planning and Evaluation (IITP)grant funded by the Korea Government (MSIT) (RS-2022-00167197,Development of Intelligent 5G/6G Infrastructure Technology for The Smart City)supported by the Soonchunhyang University Research Fund.
文摘In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method.
文摘Internet of Things(IoT)support for smart city systems improves ser-vice scales by ignoring various user congestion.People are looking for different security features for reliable and robust applications.Here,the Permanent Denial of Service(PDoS)problem arises from improper user identification.This article introduces the Service-Reliant Application Authentication(SRAA)to prevent PDoS attacks in a smart area of the city.In this authentication method,the security of the application is ensured through the distribution of guarded access.The supervised access distribution uses user interface features and sync with the user device.Abnormality in linking user device,application,and authentication is seen in Back Propagation(BP)readings.BP learning reduces given weights based on abnormalities trained during the access distribution process.The oddity is reflected in the sequence from previous training sessions to ensure consistent syn-chronization of distributed services.From PDoS,the web device displays a few unattended loads on the service,which reduces service failure.The effectiveness of the proposed verification method is verified using delays to verify metric accu-racy,false standard,sync failure,and bit rate.
基金supported by Science and Technology Foundation of State Grid Corporation of China(Ubiquitous Power Internet of Things Technical Standard System)5442HL 190008National Key Research and Development Program of China(2020YFB0905900)。
文摘The ubiquitous power Internet of Things(UPIoT)is an intelligent service system with comprehensive state perception,efficient processing,and flexible application of information.It focuses on each link of the power system and makes full use of the mobile internet,artificial intelligence,and other advanced information and communication technologies in order to realize the inter-human interaction of all things in all links of the power system.This article systematically presents to the national and international organizations and agencies in charge of UPIoT layer standardization the status quo of the research on the Internet of Things(IoT)-related industry standards system.It briefly describes the generic standard classification methods,layered architecture,conceptual model,and system tables in the UPIoT application layer.Based on the principles of inheritance,innovation,and practicability,this study divides the application layer into customer service,power grid operation,integrated energy,and enterprise operation,emerging business and analyzes the standard requirements of these five fields.This study also proposes a standard plan.Finally,it summarizes the research report and provides suggestions for a follow-up work.
文摘This paper aims to realize the extensive application of Internet of things technology in urban waterlogging prevention management system, and has analyzed the security requirement and security architecture of Internet of things technology, and discussed the demand of urban waterlogging prevention management system in combination with the key technology of Internet of things technology, to do the overall design and functional design well during designing of urban waterlogging prevention management system. Finally, the application process of the Internet of things technology in Chongqing waterlogging prevention management system is summarized. The application result shows that the flood control and drainage function of Chongqing is gradually improved with smooth drainage facilities;the inspection and maintenance management is gradually standardized;operation monitoring and early warning management is fully strengthened. There is visual management for emergency command and dispatch, and at the same time, the drainage pipe network assessment management can be conducted correctly.
文摘The Internet has stepped into Web 2.0 era. Web 2.0 application technologies and services are rapidly developing, accompanied by the innovation and revolution of business models. This article analyzes the development of Web 2.0 technologies and their promotion role in the development of Internet services, discusses the implementation of Web 2.0 core concepts (including user participation, resource sharing and platform) by the multiple Internet application technologies, and gives the development trends of Internet application technologies.
文摘The application of internet in the industrial field has become an inevitable trend in modern society.In the actual operation,there are possible safety risks.To ensure the system’s proper operation,technicians are required to resolve the issues.In this context,the author thoroughly integrated with the present industrial development situation,examined the use of 5G technology in industrial internet security,and desired to leverage the advantageous benefits of 5G technology to boost industrial development.Due to the numerous benefits of 5G technology in security applications,we conducted an in-depth investigation and described it from the perspectives of relevant concepts,security,and security application guarantee measures,with the goal of achieving the goal of safe industrial internet operation.
文摘Home is a place for people to relax and to feel secure.However,there are some external factors,such as temperature and humidity,making living conditions uncomfortable.With the development of Internet of Things(IoT)technology,the research issue of smart home becomes more important.The purpose of this study is to explore the application of IoT technology in indoor air monitoring and control,combined with the analysis of outdoor air quality data.This study develops a prototype system and tests and evaluates the performance of the system through user trial reports.The results show that(1)Air comparison of indoor and outdoor are practical for users,(2)Through the transmission of Bluetooth,restrictions on the practicality should be achieved through the WiFi remote monitoring effect,(3)It can receive multiple sensors at the same time,to achieve multiple indoor space monitoring effects,(4)It can be combined with other home appliances,if the integration of home appliances control will be more practical,(5)The current database is only a record,has not developed other applications,and in the future can develop predictive applications.We hope that through this study,we will provide some suggestions for the application of innovative technology in smart home.
文摘The industrial Internet has germinated with the integration of the traditional industry and information technologies.An identifier is the identification of an object in the industrial Internet.The identifier technology is a method to validate the identification of an object and trace it.The identifier is a bridge to connect information islands in the industry,as well as the data basis for building a technology application ecosystem based on identifier resolution.We propose three practical applications and application scenarios of the industrial Internet identifier in this paper.Future applications of identifier resolution in the industrial Internet field are also presented.
文摘With the use of multimedia which combines the use o f text, sound, images, motion video and animation, it is more efficient for studen ts to learn mould design interactively. A program is created using several multi media software to simulate the mechanism of moulding processes in order to let s tudents understand the concept of mould design. In addition, students can even access the program through the Internet. Therefore, the software is defined as Multimedia and Internet Technology (MIT) program. The MIT program consists of four sections: (i) simulation of mould mechanisms, ( ii) cooling system, (iii) material information and (iv) games for tutorials. Sec tion One covers the basic operations of different types of moulds such as two-p late mould, three-plate mould, split mould, side-core mould and mould with und ercuts. Section Two introduces different types of cooling systems such as bubble r, baffle, cooling circuits, etc. Section Three provides some useful material in formation for mould design. Section Four contains games of matching mould compon ents, mould design problem finding and multiple choice questions to test student s how much they understand mould design concept. Multimedia is highly effective particularly in teaching and learning. It changes the nature of learning itself. It makes reading dynamic by giving words an impo rtant new dimension. It allows students to see, hear and do simultaneously, thus significantly reducing average learning time. Furthermore, through cooperative learning on Internet, students can access the program, share data or search info rmation anytime anywhere. Therefore, Multimedia and Internet Technology is one o f the vital aspects to speed up the realization of information age in society.
文摘Nanjing Automation Research Institute (NARI) is a specialized institute that engages in the researches of automation of electric mper system and its application. The paper introduces the architecture of NARI Intranet as well as the techniques and application development on the Intranet. The first stage network of NARI and the building and the second stage network are both introduced. We lay emphasis on the system softWare used in NAm intranet, network management software developed by ourselves according to the characteristic of NARI network users, technique characteristics of application system on this platform and its running status. The paper also discusses the further development of NARI network application.
基金Funded by the National Natural Science Foundation of China (No. 5017114) the National-Technology Development Program for CIMS China (No. 2001AA414630)
文摘Networked customization is an important way for enterprises to satisfy customers?individual requirements. From this point of view, the study on networked customization process and application is started with analyzing the customization process in detail, in which the customization process is divided into 6 stages including information capture, need submission, need affirmation, need interaction, creating customization orders and customization production. A general customization process chart for common products is presented, which describes the communication between customers and enterprises in the entire customization process. The method of analyzing customization process is presented. The product customization subsystem in the system of ceramic product marketing and customization of Chongqing CHN & CHN Ceramics Co. Ltd. is introduced to explicate the process of customization via Internet.