期刊文献+
共找到25篇文章
< 1 2 >
每页显示 20 50 100
Understanding Credit Risk in Internet Consumer Finance:An Empirical Analysis with a Focus on the Young Generation
1
作者 Xiaodan Wang 《Proceedings of Business and Economic Studies》 2023年第6期81-91,共11页
In recent years,internet finance has garnered increasing attention from the public.Online lending,emerging within the framework of Internet finance as a pivotal component,has witnessed substantial growth.While online ... In recent years,internet finance has garnered increasing attention from the public.Online lending,emerging within the framework of Internet finance as a pivotal component,has witnessed substantial growth.While online credit,within the realm of Internet finance,presents numerous advantages over traditional lending,it concurrently exposes a plethora of credit risk issues.This study aims to facilitate the effective utilization of online credit tools by the young generation within the context of Internet finance.Additionally,it seeks to ensure the overall stability of the Internet finance environment and mitigate risks for the youth.Given the significance of understanding credit risk management for college students in the age of internet finance,this paper adopts the logistic model to evaluate credit risk in internet consumer finance and provides pertinent recommendations from the perspective of the young generation. 展开更多
关键词 Young generation Credit risk in internet consumer finance Influencing factors Logistic model
下载PDF
Consortium Chain Consensus Vulnerability and Chain Generation Mechanism
2
作者 Rui Qiao hi Dong 《Computers, Materials & Continua》 SCIE EI 2023年第11期2505-2527,共23页
Effectively identifying and preventing the threat of Byzantine nodes to the security of distributed systems is a challenge in applying consortium chains.Therefore,this paper proposes a new consortium chain generation ... Effectively identifying and preventing the threat of Byzantine nodes to the security of distributed systems is a challenge in applying consortium chains.Therefore,this paper proposes a new consortium chain generation model,deeply analyzes the vulnerability of the consortium chain consensus based on the behavior of the nodes,and points out the effects of Byzantine node proportion and node state verification on the consensus process and system security.Furthermore,the normalized verification node aggregation index that represents the consensus ability of the consortium organization and the trust evaluation function of the verification node set is derived.When either of the two is lower than the threshold,the consortium institution or the verification node set members are dynamically adjusted.On this basis,an innovative consortium chain generation mechanism based on the Asynchronous Binary Byzantine Consensus Mechanism(ABBCM)is proposed.Based on the extended consortium chain consensus mechanism,a certain consensus value set can be combined into multiple proposals,which can realize crossdomain asynchronous message passing between multi-consortium chains without reducing the system’s security.In addition,experiments are carried out under four classical Byzantine Attack(BA)behaviors,BA1 to BA4.The results show that the proposed method can obtain better delay than the classical random Byzantine consensus algorithm Coin,effectively improving the consensus efficiency based on asynchronous message passing in the consortium chain and thus meeting the throughput of most Internet of Things(IoT)applications. 展开更多
关键词 Consortium chain BYZANTINE CONSENSUS generation mechanism internet of Things consensus vulnerability
下载PDF
Remote Sensing Image Encryption Using Optimal Key Generation-Based Chaotic Encryption
3
作者 Mesfer Al Duhayyim Fatma S.Alrayes +5 位作者 Saud S.Alotaibi Sana Alazwari Nasser Allheeib Ayman Yafoz Raed Alsini Amira Sayed A.Aziz 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3209-3223,共15页
The Internet of Things(IoT)offers a new era of connectivity,which goes beyond laptops and smart connected devices for connected vehicles,smart homes,smart cities,and connected healthcare.The massive quantity of data g... The Internet of Things(IoT)offers a new era of connectivity,which goes beyond laptops and smart connected devices for connected vehicles,smart homes,smart cities,and connected healthcare.The massive quantity of data gathered from numerous IoT devices poses security and privacy concerns for users.With the increasing use of multimedia in communications,the content security of remote-sensing images attracted much attention in academia and industry.Image encryption is important for securing remote sensing images in the IoT environment.Recently,researchers have introduced plenty of algorithms for encrypting images.This study introduces an Improved Sine Cosine Algorithm with Chaotic Encryption based Remote Sensing Image Encryption(ISCACE-RSI)technique in IoT Environment.The proposed model follows a three-stage process,namely pre-processing,encryption,and optimal key generation.The remote sensing images were preprocessed at the initial stage to enhance the image quality.Next,the ISCACERSI technique exploits the double-layer remote sensing image encryption(DLRSIE)algorithm for encrypting the images.The DLRSIE methodology incorporates the design of Chaotic Maps and deoxyribonucleic acid(DNA)Strand Displacement(DNASD)approach.The chaotic map is employed for generating pseudorandom sequences and implementing routine scrambling and diffusion processes on the plaintext images.Then,the study presents three DNASD-related encryption rules based on the variety of DNASD,and those rules are applied for encrypting the images at the DNA sequence level.For an optimal key generation of the DLRSIE technique,the ISCA is applied with an objective function of the maximization of peak signal to noise ratio(PSNR).To examine the performance of the ISCACE-RSI model,a detailed set of simulations were conducted.The comparative study reported the better performance of the ISCACE-RSI model over other existing approaches. 展开更多
关键词 Remote sensing internet of things image encryption SECURITY optimal key generation
下载PDF
Development of IPv6 Capabilities for Next Generation Internet
4
作者 Ling Miao, Qin Hao (Data Division of ZTE Corporation, Nanjing 210012, China) 《ZTE Communications》 2005年第3期2-5,共4页
The IPv6-powered Internet will cover not only its data communication market, but also the voice-service-dominant fixed-line and mobile markets. The fresh markets of video communication for recreational/educational pur... The IPv6-powered Internet will cover not only its data communication market, but also the voice-service-dominant fixed-line and mobile markets. The fresh markets of video communication for recreational/educational purposes and information household appliance networking are also on the horizon. In other words, IPv6 means new revenue resources for telecom carriers. 展开更多
关键词 IETF RFC Development of IPv6 Capabilities for Next generation internet VPN IPSEC
下载PDF
ZTE's Solution to China Next Generation Internet (CNGI)
5
作者 Gu Zhongyu, Liu Jumei (Data Division of ZTE Corporation, Nanjing 210012, China) 《ZTE Communications》 2005年第3期37-40,共4页
Today IPv6 is the hottest topic worldwide. Many countries are positively impelling the research and application of the Next Generation Internet (NGI). China launched a large scale IPv6 backbone network project: China ... Today IPv6 is the hottest topic worldwide. Many countries are positively impelling the research and application of the Next Generation Internet (NGI). China launched a large scale IPv6 backbone network project: China Next Generation Internet (CNGI). This article introduces the birth of IPv6 and CNGI, then discusses ZTE's solution to CNGI in detail. 展开更多
关键词 CNGI IP ZTE’s Solution to China Next generation internet CPN
下载PDF
Improved Channel Reciprocity for Secure Communication in Next Generation Wireless Systems 被引量:2
6
作者 Imtisal Qadeer Muhammad Khurram Ehsan 《Computers, Materials & Continua》 SCIE EI 2021年第5期2619-2630,共12页
To secure the wireless connection between devices with low computational power has been a challenging problem due to heterogeneity in operating devices,device to device communication in Internet of Things(IoTs)and 5G ... To secure the wireless connection between devices with low computational power has been a challenging problem due to heterogeneity in operating devices,device to device communication in Internet of Things(IoTs)and 5G wireless systems.Physical layer key generation(PLKG)tackles this secrecy problem by introducing private keys among two connecting devices through wireless medium.In this paper,relative calibration is used as a method to enhance channel reciprocity which in turn increases the performance of the key generation process.Channel reciprocity based key generation is emerged as better PLKG methodology to obtain secure wireless connection in IoTs and 5G systems.Circulant deconvolution is proposed as a promising technique for relative calibration to ensure channel reciprocity in comparison to existing techniques Total Least Square(TLS)and Structured Total Least Square(STLS).The proposed deconvolution technique replicates the performance of the STLS by exploiting the possibility of higher information reuse and its lesser computational complexity leads to less processing time in comparison to the STLS.The presented idea is validated by observing the relation between signalto-noise ratio(SNR)and the correlation coefficient of the corresponding channel measurements between communicating parties. 展开更多
关键词 Channel measurements physical layer key generation channel reciprocity internet of things DECONVOLUTION
下载PDF
IoT Based Approach in a Power System Network for Optimizing Distributed Generation Parameters
7
作者 P.Shanmugapriya J.Baskaran +1 位作者 C.Nayanatara D.P.Kothari 《Computer Modeling in Engineering & Sciences》 SCIE EI 2019年第6期541-558,共18页
The objective of this paper is to provide a robust Virtual Power Plant(VPP)network collaborated with Internet of Things(IoT)which uses a conceptual model to integrate each device in the grid.Based on the functionality... The objective of this paper is to provide a robust Virtual Power Plant(VPP)network collaborated with Internet of Things(IoT)which uses a conceptual model to integrate each device in the grid.Based on the functionality all the devices which are purely distributed within the grid are networked initially from residential units to substations and up to service data and demand centres.To ensure the trapping of the available power and the efficient transfer of Distributed Generation(DG)power to the grid Distribution Active Control(DAC)strategy is used.Synchronized optimization of DG parameter which includes DG size,location and type are adopted using Dispatch strategy.The case studies are optimized by rescheduling the generation and with load curtailment.Maximized Customer Benefit(MCB)is taken as an objective function and a straight forward solution is given by heuristic search techniques.This method was vindicated in a practical Indian Utility system.This control proposes better performances,ensures reliability and efficiency even under parameter variations along with disturbances which is justified using IEEE 118 bus system and real time Indian utility 63 bus system.Results reveal that the proposed technique proves advantages of low computational intricacy. 展开更多
关键词 CUSTOMER BENEFIT distributed generation internet of THINGS VIRTUAL power PLANT distribution active control
下载PDF
Encryption with User Authentication Model for Internet of Medical Things Environment
8
作者 K.S.Riya R.Surendran +1 位作者 Carlos Andrés Tavera Romero M.Sadish Sendil 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期507-520,共14页
Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restric... Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restricted processing abilities,storage,and energy constraints of the sensors.Therefore,it leads to infeasibility of developing traditional cryptographic solutions to the IoMT sensors.In order to ensure security on sensitive medical data,effective encryption and authentication techniques need to be designed to assure security of the patients and healthcare service providers.In this view,this study designs an effective metaheuristic optimization based encryption with user authentication(EMOE-UA)technique for IoMT environment.This work proposes an EMOE-UA technique aims to accomplish mutual authentication for addressing the security issues and reducing the computational complexity.Moreover,the EMOE-UA technique employs optimal multikey homomorphic encryption(OMKHE)technique to encrypt the IoMT data.Furthermore,the improved social spider optimization algorithm(ISSOA)was employed for the optimal multikey generation of the MKHE technique.The experimental result analysis of the EMOE-UA technique takes place using benchmark data and the results are examined under various aspects.The simulation results reported the considerably better performance of the EMOE-UA technique over the existing techniques. 展开更多
关键词 User authentication SECURITY PRIVACY internet of medical things homomorphic encryption optimal key generation
下载PDF
New paradigms of water-enabled electrical energy generation
9
作者 Zhengtong Li Tao Yang +7 位作者 Jia-Han Zhang Taotao Meng Saad Melhi Jungmok You Miharu Eguchi Likun Pan Yusuke Yamauchi Xingtao Xu 《SusMat》 SCIE EI 2024年第3期73-103,共31页
Nanotechnology-inspired small-sized water-enabled electricity generation(WEG)has sparked widespread research interest,especially when applied as an electricity source for off-grid low-power electronic equipment and sy... Nanotechnology-inspired small-sized water-enabled electricity generation(WEG)has sparked widespread research interest,especially when applied as an electricity source for off-grid low-power electronic equipment and systems.Currently,WEG encompasses a wide range of physical phenomena,generator structures,and power generation environments.However,a systematic framework to clearly describe the connections and differences between these technologies is unavailable.In this review,a comprehensive overview of generator technologies and the typical mechanisms for harvesting water energy is provided.Considering the different roles of water inWEG processes,the related technologies are presented as two different scenarios.Moreover,a detailed analysis of the electrical potential formation in each WEG process is presented,and their similarities and differences are elucidated.Furthermore,a comprehensive compilation of advanced generator architectures and system designs based on hydrological cycle processes is presented,along with their respective energy efficiencies.These nanotechnology-inspired small-sized WEG devices show considerable potential for applications in the Internet of Things ecosystem(i.e.,microelectronic devices,integrated circuits,and smart clothing).Finally,the prospects and future challenges of WEG devices are also summarized. 展开更多
关键词 electricity generation mechanisms internet of Things multi-angle generator systems smallsized generators water-enabled electricity generation
原文传递
Towards next generation Internet of Energy system: Framework and trends
10
作者 Muqit Farhan Tanzim N.Reza +11 位作者 Faisal R.Badal Md.R.Islam S M Muyeen Z.Tasneem Md.Mehedi Hasan Md.F.Ali Md.H.Ahamed S.H.Abhi Md.Manirul Islam Subrata K.Sarker Sajal K.Das Prangon Das 《Energy and AI》 2023年第4期660-681,共22页
The quickening propensity of growth within the areas of information and communications technology and en-ergy networks has triggered the emergence of a central idea termed as Internet of Energy(IoE).Such a concept rel... The quickening propensity of growth within the areas of information and communications technology and en-ergy networks has triggered the emergence of a central idea termed as Internet of Energy(IoE).Such a concept relates the internet of things,which is the term used in describing the usage of sophisticated digital control devices with the capability of transmitting data via IT systems.The concept of an interconnected energy network is being formed in the upcoming days through upgrades in the field of intelligent energy systems to control real-time energy optimization and management.The energy industry has had a sustained expansion,reaching the IoE milestone and continuing to this cutting-edge power system,which is the next generation of IoE.A directional pathway from the traditional power system to the IoE has been conducted in this research work by addressing the importance of integrating the smart transmission and communication infrastructure,smart metering,pricing and energy management scheme.A detailed investigation of the IoE with respect to technical angles,such as communication architecture,IoE on the supply&demand side,and IoE protocol based on fundamental elements and essential technologies has been carried out to indicate the blueprint and jurisdiction complexity.The inte-gration,security and energy management challenges may deviate the performance of the IoE technology that has been focused with proper control issues and solutions.Finally,a directional framework to establish the next-generation IoE system has been constructed with future scopes to insure higher resiliency,cyber-security and stability. 展开更多
关键词 internet of Energy IOT MICROGRID Smart grid Virtual power plant Next generation power system
原文传递
DDoS Detection for 6G Internet of Things: Spatial-Temporal Trust Model and New Architecture 被引量:1
11
作者 Yinglun Ma Xu Chen +1 位作者 Wei Feng Ning Ge 《China Communications》 SCIE CSCD 2022年第5期141-149,共9页
With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originatin... With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originating from IoT devices.In this paper we propose an innovative trust model for IoT devices to prevent potential DDoS attacks by evaluating their trustworthiness,which can be deployed in the access network of 6G IoT.Based on historical communication behaviors,this model combines spatial trust and temporal trust values to comprehensively characterize the normal behavior patterns of IoT devices,thereby effectively distinguishing attack traffic.Experimental results show that the proposed method can efficiently distinguish normal traffic from DDoS traffic.Compared with the benchmark methods,our method has advantages in terms of both accuracy and efficiency in identifying attack flows. 展开更多
关键词 sixth generation(6G)network internet of things(IoT) trust model distributed denial of service(DDoS)
下载PDF
Wind Driven Optimization-Based Medical Image Encryption for Blockchain-Enabled Internet of Things Environment
12
作者 C.S.S.Anupama Raed Alsini +4 位作者 N.Supriya E.Laxmi Lydia Seifedine Kadry Sang-Soo Yeo Yongsung Kim 《Computers, Materials & Continua》 SCIE EI 2022年第11期3219-3233,共15页
Internet of Things(IoT)and blockchain receive significant interest owing to their applicability in different application areas such as healthcare,finance,transportation,etc.Medical image security and privacy become a ... Internet of Things(IoT)and blockchain receive significant interest owing to their applicability in different application areas such as healthcare,finance,transportation,etc.Medical image security and privacy become a critical part of the healthcare sector where digital images and related patient details are communicated over the public networks.This paper presents a new wind driven optimization algorithm based medical image encryption(WDOA-MIE)technique for blockchain enabled IoT environments.The WDOA-MIE model involves three major processes namely data collection,image encryption,optimal key generation,and data transmission.Initially,the medical images were captured from the patient using IoT devices.Then,the captured images are encrypted using signcryption technique.In addition,for improving the performance of the signcryption technique,the optimal key generation procedure was applied by WDOA algorithm.The goal of the WDOA-MIE algorithm is to derive a fitness function dependent upon peak signal to noise ratio(PSNR).Upon successful encryption of images,the IoT devices transmit to the closest server for storing it in the blockchain securely.The performance of the presented method was analyzed utilizing the benchmark medical image dataset.The security and the performance analysis determine that the presented technique offers better security with maximum PSNR of 60.7036 dB. 展开更多
关键词 internet of things image security medical images ENCRYPTION optimal key generation blockchain
下载PDF
Automated Service Search Model for the Social Internet of Things
13
作者 Farhan Amin Seong Oun Hwang 《Computers, Materials & Continua》 SCIE EI 2022年第9期5871-5888,共18页
The social internet of things(SIoT)is one of the emerging paradigms that was proposed to solve the problems of network service discovery,navigability,and service composition.The SIoT aims to socialize the IoT devices ... The social internet of things(SIoT)is one of the emerging paradigms that was proposed to solve the problems of network service discovery,navigability,and service composition.The SIoT aims to socialize the IoT devices and shape the interconnection between them into social interaction just like human beings.In IoT,an object can offer multiple services and different objects can offer the same services with different parameters and interest factors.The proliferation of offered services led to difficulties during service customization and service filtering.This problem is known as service explosion.The selection of suitable service that fits the requirements of applications and objects is a challenging task.To address these issues,we propose an efficient automated query-based service search model based on the local network navigability concept for the SIoT.In the proposed model,objects can use information from their friends or friends of their friends while searching for the desired services,rather than exploring a global network.We employ a centrality metric that computes the degree of importance for each object in the social IoT that helps in selecting neighboring objects with high centrality scores.The distributed nature of our navigation model results in high scalability and short navigation times.We verified the efficacy of our model on a real-world SIoT-related dataset.The experimental results confirm the validity of our model in terms of scalability,navigability,and the desired objects that provide services are determined quickly via the shortest path,which in return improves the service search process in the SIoT. 展开更多
关键词 Social internet of things service discovery local navigability object discovery query generation model
下载PDF
A Sociolinguistic Interpretation on Internet Catchwords
14
作者 谢梦雨 《海外英语》 2019年第11期264-265,共2页
Nowadays,influenced by the spreading Internet wave,a mass of Internet catchwords are emerging and coming into fashion.This paper,in the perspective of sociolinguistics,describes the formation features of Internet catc... Nowadays,influenced by the spreading Internet wave,a mass of Internet catchwords are emerging and coming into fashion.This paper,in the perspective of sociolinguistics,describes the formation features of Internet catchwords with exemplars of沙雕(傻屌),表脸,尬聊,厉害了Word哥,盘他…and analyzes the generation causes of them to help readers have a better understand of Internet catchwords.Through analyzing these words,we can conclude that there are more and more Internet catchwords emerging with netizens'increasing language demands. 展开更多
关键词 internet CATCHWORDS features generation CAUSES SOCIOLINGUISTICS
下载PDF
Secure and Efficient Data Transmission Scheme Based on Physical Mechanism
15
作者 Ping Zhang Haoran Zhu +3 位作者 Wenjun Li Osama Alfarraj Amr Tolba Gwang-jun Kim 《Computers, Materials & Continua》 SCIE EI 2023年第5期3589-3605,共17页
Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply,which are not suitable for traditional security technology.The security technology based o... Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply,which are not suitable for traditional security technology.The security technology based on the physicalmechanism has attracted extensive attention.How to improve the key generation rate has always been one of the urgent problems to be solved in the security technology based on the physical mechanism.In this paper,superlattice technology is introduced to the security field of Internet of things,and a high-speed symmetric key generation scheme based on superlattice for Internet of things is proposed.In order to ensure the efficiency and privacy of data transmission,we also combine the superlattice symmetric key and compressive sensing technology to build a lightweight data transmission scheme that supports data compression and data encryption at the same time.Theoretical analysis and experimental evaluation results show that the proposed scheme is superior to the most closely related work. 展开更多
关键词 Data transmission key generation data privacy compressive sensing internet of Things(IoT)
下载PDF
基于我国下一代互联网的广播影视资料内容存取系统
16
作者 刘守训 《有线电视技术》 2009年第3期93-95,98,共4页
为了适应下一代互联网技术发展的要求,需要构建面向未来的广播影视资料管理、存取与分发系统,使得资源共享机制更加高效、安全、便捷。本文介绍了中国传媒大学开发的基于IPv6的广播影视资料P2P内容存取中间件系统。
关键词 CNGI(China NEXT generation internet) 中间件系统 广播影视资料 P2P
下载PDF
基于NGN的网络融合技术研究 被引量:7
17
作者 焦彦平 李唱 李建华 《装备学院学报》 2014年第1期69-72,共4页
随着我军现代化进程的不断推进,靶场信息化水平大力提升,各个网络正在逐步有机融合。通过分析下一代网络(next generation network,NGN)的4层体系结构及其关键技术,结合我军网络的特点,论证靶场网络转向NGN体系的必然性及其可行性;给出... 随着我军现代化进程的不断推进,靶场信息化水平大力提升,各个网络正在逐步有机融合。通过分析下一代网络(next generation network,NGN)的4层体系结构及其关键技术,结合我军网络的特点,论证靶场网络转向NGN体系的必然性及其可行性;给出了一种基于NGN的网络融合体系结构,并在此之上介绍了其可提供的业务功能及QoS(quality of service)部署。 展开更多
关键词 下一代网络 软交换 互联网协议 网络融合 服务质量 NEXT generation network (NGN ) internet protocol (IP) quality of service( QoS )
下载PDF
Model of decentralized cross-chain energy trading for power systems 被引量:3
18
作者 Shaomin Zhang Cong Hou 《Global Energy Interconnection》 EI CAS CSCD 2021年第3期324-334,共11页
With the development of the energy Internet, more distributed generators are connected to the power grid, resulting in numerous heterogeneous energy networks. However, different energy networks cannot perform efficien... With the development of the energy Internet, more distributed generators are connected to the power grid, resulting in numerous heterogeneous energy networks. However, different energy networks cannot perform efficient energy trading in the centralized management mode, this deeply affecting the complementary ability of heterogeneous energy, resulting in the islanded energy phenomenon. In this model, the same energy on the chain is traded within the chain, and the heterogeneous energy on different chains is traded across chains. To trade energy between heterogeneous energy networks more efficiently, the blockchain-based cross-chain model is proposed based on the existing infrastructure. Heterogeneous energy nodes are assigned to different energy sub-chains and cross-chain energy transactions are performed through a relay-chain, which utilizes the improved Boneh–Lynn–Shacham signature scheme consensus algorithm based on the proof-of-stake and practical Byzantine fault tolerance. The experimental simulations on energy trading efficiency, throughput, and security, show its superiority over existing systems. Further, the simulation results provide a reference for the application of cross-chain technology in energy interconnection. 展开更多
关键词 Energy internet Blockchain Cross-chain transaction Distributed generation Consensus algorithm
下载PDF
一种基于云平台的下一代互联网新型迁移模型
19
作者 黄灿灿 朱永庆 《信息通信技术》 2013年第3期41-44,共4页
分析现有接入网络在向IPv6迁移过程中所遇到的各种问题,设计一种新型的基于云平台的下一代互联网迁移模型。该模型通过在城域网边缘部署云计算平台给用户提供虚拟双栈主机,从根本上解决现有接入网络中海量设备以及千万级CPE改造升级所... 分析现有接入网络在向IPv6迁移过程中所遇到的各种问题,设计一种新型的基于云平台的下一代互联网迁移模型。该模型通过在城域网边缘部署云计算平台给用户提供虚拟双栈主机,从根本上解决现有接入网络中海量设备以及千万级CPE改造升级所产生的问题,同时,优化了城域网P2P流量模型,极大地减缓了接入网压力。 展开更多
关键词 下一代互联网 云计算 虚拟化 隧道技术 协议转换技术
下载PDF
Artificial Intelligence Integration with Energy Sources (Renewable and Non-renewable) 被引量:1
20
作者 Bahman Zohuri Farahnaz Behgounia Ziba Zibandeh Nezam 《Journal of Energy and Power Engineering》 2020年第6期193-210,共18页
In the past decade or so,AI(artificial intelligence)technology has been growing with such a mesmerizing speed that today its presence in almost any industry that deals with any huge sheer volume of data is taking adva... In the past decade or so,AI(artificial intelligence)technology has been growing with such a mesmerizing speed that today its presence in almost any industry that deals with any huge sheer volume of data is taking advantage of AI by integrating it into their day-to-day operation.Meanwhile,seven billion people worldwide shape the world’s energy system and directly impact the fundamental drivers of energy,both renewable and non-renewable sources,to meet the demand for electricity from them.These energy sources can be reached from nature such as solar,wind,etc.,and human-made such as NPPs(nuclear power plants)in the form of either fission as an old technology since the Manhattan project and in the near future as fusion in the form of magnetic or inertial confinements.Meanwhile,AI controlling nuclear reactors are about to happen.The basic idea is to apply AI with its two subset components as ML(machine learning),and DL(deep learning)techniques to go through the mountains of data that come from a reactor,spot patterns in it,and calling them to the unit’s human attention operators is not invadable either.Designers of such nuclear reactors will combine simulation and real-world data,comparing scenarios from each to develop“confidence[in]what they can predict and what is the range of uncertainty of their prediction”.Adding that,in the end,the operator will make the final decisions in order to keep these power plants safe while they are in operation and how to secure them against cyber-attack natural or human-made disasters.In this short communication article,we would like to see how we can prove some of these concepts;then a NPP manufacturer can pick it up and use it in their designs of a new generation of these reactors. 展开更多
关键词 AI ML DL RENEWABLE and nonrenewable source of energy fusion and FISSION reactors SMRs (small modular reactors) and generation four system IoT (internet of things) dynamic site RETURN on INVESTMENT total cost of OWNERSHIP
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部