The high-speed railway construction involves multiple professional fields,such as railway design,construction,and supervision.This paper architects the"BIM+"project refined management platform,designs the pl...The high-speed railway construction involves multiple professional fields,such as railway design,construction,and supervision.This paper architects the"BIM+"project refined management platform,designs the platform's logical architecture,physical architecture,and solves several key technology difficulties.This"BIM+"platform has been applied on the Jingxiong Bridge Project and achieved all-round,whole-process and multi-management of high-speed railway engineering construction.It significantly improves the level of construction management,and plays a role in promoting the development of high-speed railway construction informatization.展开更多
To achieve information integration, process integration and application integration of enterprise, an enterprise integration platform (EIP) based on service-oriented architecture (SOA) is built. The enterprise int...To achieve information integration, process integration and application integration of enterprise, an enterprise integration platform (EIP) based on service-oriented architecture (SOA) is built. The enterprise integration model depending on encapsulating the business processes as well as the enterprise applications by the neutral and standard web services is presented. The problem how to discover the existed enterprise resources and share them was resolved depending on the mechanism of publishing and discovering the services. The EIP is integrated closely with product lifecycle management (PLM) system so that the process integration as well as orchestration of the business process services is implemented by encapsulating the workflow engine of PLM system. Not only process integration and application integration, but also information integration based on the bill of material (BOM) conversion driven by process are achieved. Finally, an interpretive, qualitative case study on EIP is conducted for this research.展开更多
Driven by the visions of the Internet of Things(IoT),Artificial Intelligence(AI),and 5G communications,the Internet of Cultural Things(IoCT)realize the comprehensive interconnection among cultural products,cultural se...Driven by the visions of the Internet of Things(IoT),Artificial Intelligence(AI),and 5G communications,the Internet of Cultural Things(IoCT)realize the comprehensive interconnection among cultural products,cultural services,cultural resources,and cultural platforms,bringing individuals with richer humanistic experience,increasing economic benefits for the cultural sector,and promoting the development of cultural heritage protection and education.At present,IoCT has received widespread attention in both industry and academia.To explore new research opportunities and assist users in constructing suitable IoCT systems for specific applications,this survey provides a comprehensive overview of the IoCT components and key technologies.A comparison study of representative IoCT systems is presented according to their applicability.A general platform architecture of IoCT is proposed to link cultural objects with the internet and human.Finally,open issues for research challenges and future opportunities of IoCT are also studied in this paper.展开更多
In the age of information explosion,big data has brought challenges but also great opportunities that support a wide range of applications for people in all walks of life.Faced with the continuous and intense competit...In the age of information explosion,big data has brought challenges but also great opportunities that support a wide range of applications for people in all walks of life.Faced with the continuous and intense competition from OTT service providers,traditional telecommunications service providers have been forced to undergo enterprise transformation.Fortunately,these providers have natural and unique advantages in terms of both data sources and data scale,all of which give them a competitive advantage.Multiple foreign mainstream telecom operators have already applied big data for their own growth,from internal business to external applications.Armed with big data,domestic telecom companies are also innovating business models.This paper will introduce three aspects of big data in the telecommunications industry.First,the unique characteristics and advantages of communications industry big data are discussed.Second,the development of the big data platform architecture is introduced in detail,which incorporates ve crucial sub-systems.We highlight the data collection and data processing systems.Finally,three internal or external application areas based on big data analysis are discussed,namely basic business,network construction,and intelligent tracing.Our work sheds light on how to deal with big data for telecommunications enterprise development.展开更多
For healthcare organizations, there is increasing needs to share data among applications to deliver qualitypatient care. It is a key for successful diagnosis and treatment to view accurate and up-to-date patient data ...For healthcare organizations, there is increasing needs to share data among applications to deliver qualitypatient care. It is a key for successful diagnosis and treatment to view accurate and up-to-date patient data in a single information dashboard in real time. But the fact is that many hospitals and healthcare providers today are struggling with legacy system or internally developed systems that cannot easily scale to support new interfaces; the plethora of inflexible point-to-point interfaces make changing in one system deleteriously impact other systems; some systems could not support information sharing; and the standards followed by different systems are not compatible to each other. This is making it increasingly difficult to meet the rapidly changing and demanding of healthcare service.展开更多
With the large scale adoption of Internet of Things(IoT)applications in people’s lives and industrial manufacturing processes,IoT security has become an important problem today.IoT security significantly relies on th...With the large scale adoption of Internet of Things(IoT)applications in people’s lives and industrial manufacturing processes,IoT security has become an important problem today.IoT security significantly relies on the security of the underlying hardware chip,which often contains critical information,such as encryption key.To understand existing IoT chip security,this study analyzes the security of an IoT security chip that has obtained an Arm Platform Security Architecture(PSA)Level 2 certification.Our analysis shows that the chip leaks part of the encryption key and presents a considerable security risk.Specifically,we use commodity equipment to collect electromagnetic traces of the chip.Using a statistical T-test,we find that the target chip has physical leakage during the AES encryption process.We further use correlation analysis to locate the detailed encryption interval in the collected electromagnetic trace for the Advanced Encryption Standard(AES)encryption operation.On the basis of the intermediate value correlation analysis,we recover half of the 16-byte AES encryption key.We repeat the process for three different tests;in all the tests,we obtain the same result,and we recover around 8 bytes of the 16-byte AES encryption key.Therefore,experimental results indicate that despite the Arm PSA Level 2 certification,the target security chip still suffers from physical leakage.Upper layer application developers should impose strong security mechanisms in addition to those of the chip itself to ensure IoT application security.展开更多
基金supported by China State Railway Group Co.,Ltd.Science and Technology Research and Development Plan(K2021G025).
文摘The high-speed railway construction involves multiple professional fields,such as railway design,construction,and supervision.This paper architects the"BIM+"project refined management platform,designs the platform's logical architecture,physical architecture,and solves several key technology difficulties.This"BIM+"platform has been applied on the Jingxiong Bridge Project and achieved all-round,whole-process and multi-management of high-speed railway engineering construction.It significantly improves the level of construction management,and plays a role in promoting the development of high-speed railway construction informatization.
基金National Defense Basic Research Foundation of China(No.D0420060521)
文摘To achieve information integration, process integration and application integration of enterprise, an enterprise integration platform (EIP) based on service-oriented architecture (SOA) is built. The enterprise integration model depending on encapsulating the business processes as well as the enterprise applications by the neutral and standard web services is presented. The problem how to discover the existed enterprise resources and share them was resolved depending on the mechanism of publishing and discovering the services. The EIP is integrated closely with product lifecycle management (PLM) system so that the process integration as well as orchestration of the business process services is implemented by encapsulating the workflow engine of PLM system. Not only process integration and application integration, but also information integration based on the bill of material (BOM) conversion driven by process are achieved. Finally, an interpretive, qualitative case study on EIP is conducted for this research.
基金supported by National Natural Science Foundation of China(62172155)The National Key Research and Development Program of China(2019YFB1405702)。
文摘Driven by the visions of the Internet of Things(IoT),Artificial Intelligence(AI),and 5G communications,the Internet of Cultural Things(IoCT)realize the comprehensive interconnection among cultural products,cultural services,cultural resources,and cultural platforms,bringing individuals with richer humanistic experience,increasing economic benefits for the cultural sector,and promoting the development of cultural heritage protection and education.At present,IoCT has received widespread attention in both industry and academia.To explore new research opportunities and assist users in constructing suitable IoCT systems for specific applications,this survey provides a comprehensive overview of the IoCT components and key technologies.A comparison study of representative IoCT systems is presented according to their applicability.A general platform architecture of IoCT is proposed to link cultural objects with the internet and human.Finally,open issues for research challenges and future opportunities of IoCT are also studied in this paper.
基金supported partially by Key Program of National Natural Science Foundation of China(No.61631018)the Funda-mental Research Funds for the Central Universities and Huawei Technology Innovative Research on Wireless Big Data.
文摘In the age of information explosion,big data has brought challenges but also great opportunities that support a wide range of applications for people in all walks of life.Faced with the continuous and intense competition from OTT service providers,traditional telecommunications service providers have been forced to undergo enterprise transformation.Fortunately,these providers have natural and unique advantages in terms of both data sources and data scale,all of which give them a competitive advantage.Multiple foreign mainstream telecom operators have already applied big data for their own growth,from internal business to external applications.Armed with big data,domestic telecom companies are also innovating business models.This paper will introduce three aspects of big data in the telecommunications industry.First,the unique characteristics and advantages of communications industry big data are discussed.Second,the development of the big data platform architecture is introduced in detail,which incorporates ve crucial sub-systems.We highlight the data collection and data processing systems.Finally,three internal or external application areas based on big data analysis are discussed,namely basic business,network construction,and intelligent tracing.Our work sheds light on how to deal with big data for telecommunications enterprise development.
文摘For healthcare organizations, there is increasing needs to share data among applications to deliver qualitypatient care. It is a key for successful diagnosis and treatment to view accurate and up-to-date patient data in a single information dashboard in real time. But the fact is that many hospitals and healthcare providers today are struggling with legacy system or internally developed systems that cannot easily scale to support new interfaces; the plethora of inflexible point-to-point interfaces make changing in one system deleteriously impact other systems; some systems could not support information sharing; and the standards followed by different systems are not compatible to each other. This is making it increasingly difficult to meet the rapidly changing and demanding of healthcare service.
基金This work was partially supported by the National Natural Science Foundation of China(Nos.61872243 and U1713212)Guangdong Basic and Applied Basic Research Foundation(No.2020A1515011489)+1 种基金the Natural Science Foundation of Guangdong Province-Outstanding Youth Program(No.2019B151502018)Shenzhen Science and Technology Innovation Commission(No.R2020A045).
文摘With the large scale adoption of Internet of Things(IoT)applications in people’s lives and industrial manufacturing processes,IoT security has become an important problem today.IoT security significantly relies on the security of the underlying hardware chip,which often contains critical information,such as encryption key.To understand existing IoT chip security,this study analyzes the security of an IoT security chip that has obtained an Arm Platform Security Architecture(PSA)Level 2 certification.Our analysis shows that the chip leaks part of the encryption key and presents a considerable security risk.Specifically,we use commodity equipment to collect electromagnetic traces of the chip.Using a statistical T-test,we find that the target chip has physical leakage during the AES encryption process.We further use correlation analysis to locate the detailed encryption interval in the collected electromagnetic trace for the Advanced Encryption Standard(AES)encryption operation.On the basis of the intermediate value correlation analysis,we recover half of the 16-byte AES encryption key.We repeat the process for three different tests;in all the tests,we obtain the same result,and we recover around 8 bytes of the 16-byte AES encryption key.Therefore,experimental results indicate that despite the Arm PSA Level 2 certification,the target security chip still suffers from physical leakage.Upper layer application developers should impose strong security mechanisms in addition to those of the chip itself to ensure IoT application security.