期刊文献+
共找到38,715篇文章
< 1 2 250 >
每页显示 20 50 100
Theories and Key Technologies for New-generation Internet System
1
作者 Zhang Hongke, Dong Ping, Yang Dong (Next Generation Internet Research Center, School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 100044, China) 《ZTE Communications》 2008年第1期18-22,共5页
There exist serious problems in the trustworthiness (security, reliability, controllability and manageability) of the Internet. In order to solve these problems, a new-generation network architecture model, based on t... There exist serious problems in the trustworthiness (security, reliability, controllability and manageability) of the Internet. In order to solve these problems, a new-generation network architecture model, based on the research of the basic theories of new-generation Internet system, is proposed. The solution creates a switching routing model and theory for the new-generation Internet system, and defines the access identifier, generalized switching routing identifier and their mapping principles. It also establishes a pervasive service system architecture and theory, defines the service identifier, connection identifier and their mapping principles. This paper discusses key technologies for the new-generation Internet system, such as access control and management, trusted routing and Quality of Service (QoS), multi-streaming, and network monitoring and management. 展开更多
关键词 Theories and Key Technologies for New-generation internet system ZTE
下载PDF
China contributes to IEC's specification on industrial internet system
2
《China Standardization》 2022年第6期17-17,共1页
On October 18, the International Electrotechnical Commission(IEC) published IEC PAS 63441:2022, Functional architecture of industrial internet system for industrial automation applications, which is the first internat... On October 18, the International Electrotechnical Commission(IEC) published IEC PAS 63441:2022, Functional architecture of industrial internet system for industrial automation applications, which is the first international specification in this field.Laying the cornerstone of industrial internet, IEC PAS 63441:2022 normalizes the models, structures. 展开更多
关键词 internet IEC system
下载PDF
Tata Communications携手Internet Systems Consortium进行IPv6域名系统托管
3
《电脑与电信》 2008年第10期15-15,共1页
加州红木城和印度孟买2008年10月14日电/新华美通/-通信新世界领域的领先供应商Tata Communications和非营利性公益企业Internet Systems Consortium.Inc.(ISCl今天宣布,双方将合作为企业和服务供应商提供业界最佳的域名系统(DN... 加州红木城和印度孟买2008年10月14日电/新华美通/-通信新世界领域的领先供应商Tata Communications和非营利性公益企业Internet Systems Consortium.Inc.(ISCl今天宣布,双方将合作为企业和服务供应商提供业界最佳的域名系统(DNS)托管服务。DNS能够提供互联网必须的功能。 展开更多
关键词 internet systems 域名系统 IPv6 托管 服务供应商 非营利性 INC
下载PDF
Deep Transfer Learning Techniques in Intrusion Detection System-Internet of Vehicles: A State-of-the-Art Review
4
作者 Wufei Wu Javad Hassannataj Joloudari +8 位作者 Senthil Kumar Jagatheesaperumal Kandala N.V.P.SRajesh Silvia Gaftandzhieva Sadiq Hussain Rahimullah Rabih Najibullah Haqjoo Mobeen Nazar Hamed Vahdat-Nejad Rositsa Doneva 《Computers, Materials & Continua》 SCIE EI 2024年第8期2785-2813,共29页
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accide... The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks. 展开更多
关键词 Cyber-attacks internet of things internet of vehicles intrusion detection system
下载PDF
DTAIS:Distributed trusted active identity resolution systems for the Industrial Internet
5
作者 Tao Huang Renchao Xie +7 位作者 Yuzheng Ren F.Richard Yu Zhuang Zou Lu Han Yunjie Liu Demin Cheng Yinan Li Tian Liu 《Digital Communications and Networks》 SCIE CSCD 2024年第4期853-862,共10页
In recent years,the Industrial Internet and Industry 4.0 came into being.With the development of modern industrial intelligent manufacturing technology,digital twins,Web3 and many other digital entity applications are... In recent years,the Industrial Internet and Industry 4.0 came into being.With the development of modern industrial intelligent manufacturing technology,digital twins,Web3 and many other digital entity applications are also proposed.These applications apply architectures such as distributed learning,resource sharing,and arithmetic trading,which make high demands on identity authentication,asset authentication,resource addressing,and service location.Therefore,an efficient,secure,and trustworthy Industrial Internet identity resolution system is needed.However,most of the traditional identity resolution systems follow DNS architecture or tree structure,which has the risk of a single point of failure and DDoS attack.And they cannot guarantee the security and privacy of digital identity,personal assets,and device information.So we consider a decentralized approach for identity management,identity authentication,and asset verification.In this paper,we propose a distributed trusted active identity resolution system based on the inter-planetary file system(IPFS)and non-fungible token(NFT),which can provide distributed identity resolution services.And we have designed the system architecture,identity service process,load balancing strategy and smart contract service.In addition,we use Jmeter to verify the performance of the system,and the results show that the system has good high concurrent performance and robustness. 展开更多
关键词 Industrial internet NFT IPFS TRUST Identity resolution system
下载PDF
A digital twins enabled underwater intelligent internet vehicle path planning system via reinforcement learning and edge computing
6
作者 Jiachen Yang Meng Xi +2 位作者 Jiabao Wen Yang Li Houbing Herbert Song 《Digital Communications and Networks》 SCIE CSCD 2024年第2期282-291,共10页
The Autonomous Underwater Glider(AUG)is a kind of prevailing underwater intelligent internet vehicle and occupies a dominant position in industrial applications,in which path planning is an essential problem.Due to th... The Autonomous Underwater Glider(AUG)is a kind of prevailing underwater intelligent internet vehicle and occupies a dominant position in industrial applications,in which path planning is an essential problem.Due to the complexity and variability of the ocean,accurate environment modeling and flexible path planning algorithms are pivotal challenges.The traditional models mainly utilize mathematical functions,which are not complete and reliable.Most existing path planning algorithms depend on the environment and lack flexibility.To overcome these challenges,we propose a path planning system for underwater intelligent internet vehicles.It applies digital twins and sensor data to map the real ocean environment to a virtual digital space,which provides a comprehensive and reliable environment for path simulation.We design a value-based reinforcement learning path planning algorithm and explore the optimal network structure parameters.The path simulation is controlled by a closed-loop model integrated into the terminal vehicle through edge computing.The integration of state input enriches the learning of neural networks and helps to improve generalization and flexibility.The task-related reward function promotes the rapid convergence of the training.The experimental results prove that our reinforcement learning based path planning algorithm has great flexibility and can effectively adapt to a variety of different ocean conditions. 展开更多
关键词 Digital twins Reinforcement learning Edge computing Underwater intelligent internet vehicle Path planning
下载PDF
Federated Learning on Internet of Things:Extensive and Systematic Review
7
作者 Meenakshi Aggarwal Vikas Khullar +4 位作者 Sunita Rani Thomas AndréProla Shyama Barna Bhattacharjee Sarowar Morshed Shawon Nitin Goyal 《Computers, Materials & Continua》 SCIE EI 2024年第5期1795-1834,共40页
The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and ... The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and needs to be explored in various areas to understand the key challenges for deployment in real-world scenarios.The paper systematically reviewed the available literature using the PRISMA guiding principle.The study aims to provide a detailed overview of the increasing use of FL in IoT networks,including the architecture and challenges.A systematic review approach is used to collect,categorize and analyze FL-IoT-based articles.Asearch was performed in the IEEE,Elsevier,Arxiv,ACM,and WOS databases and 92 articles were finally examined.Inclusion measures were published in English and with the keywords“FL”and“IoT”.The methodology begins with an overview of recent advances in FL and the IoT,followed by a discussion of how these two technologies can be integrated.To be more specific,we examine and evaluate the capabilities of FL by talking about communication protocols,frameworks and architecture.We then present a comprehensive analysis of the use of FL in a number of key IoT applications,including smart healthcare,smart transportation,smart cities,smart industry,smart finance,and smart agriculture.The key findings from this analysis of FL IoT services and applications are also presented.Finally,we performed a comparative analysis with FL IID(independent and identical data)and non-ID,traditional centralized deep learning(DL)approaches.We concluded that FL has better performance,especially in terms of privacy protection and resource utilization.FL is excellent for preserving privacy becausemodel training takes place on individual devices or edge nodes,eliminating the need for centralized data aggregation,which poses significant privacy risks.To facilitate development in this rapidly evolving field,the insights presented are intended to help practitioners and researchers navigate the complex terrain of FL and IoT. 展开更多
关键词 internet of Things federated learning PRISMA framework of FL applications of FL data privacy COMMUNICATION
下载PDF
Research on a Comprehensive Monitoring System for Tunnel Operation based on the Internet of Things and Artificial Intelligence Identification Technology
8
作者 Xingxing Wang Donglin Dai Xiangjun Fan 《Journal of Architectural Research and Development》 2024年第2期84-89,共6页
This article proposes a comprehensive monitoring system for tunnel operation to address the risks associated with tunnel operations.These risks include safety control risks,increased traffic flow,extreme weather event... This article proposes a comprehensive monitoring system for tunnel operation to address the risks associated with tunnel operations.These risks include safety control risks,increased traffic flow,extreme weather events,and movement of tectonic plates.The proposed system is based on the Internet of Things and artificial intelligence identification technology.The monitoring system will cover various aspects of tunnel operations,such as the slope of the entrance,the structural safety of the cave body,toxic and harmful gases that may appear during operation,excessively high and low-temperature humidity,poor illumination,water leakage or road water accumulation caused by extreme weather,combustion and smoke caused by fires,and more.The system will enable comprehensive monitoring and early warning of fire protection systems,accident vehicles,and overheating vehicles.This will effectively improve safety during tunnel operation. 展开更多
关键词 internet of Things Artificial intelligence Operation tunnel MONITORING
下载PDF
Street Lamp Status Warning System Based on Internet of Things Technology
9
作者 Hanli Wang Yuanzhi Liu Yilin Wu 《Journal of Electronic Research and Application》 2024年第4期154-160,共7页
This paper proposes a street light warning system based on Internet of Things(IoT)technology,which uses cameras to detect moving targets such as vehicles and pedestrians around the system and adjust the brightness of ... This paper proposes a street light warning system based on Internet of Things(IoT)technology,which uses cameras to detect moving targets such as vehicles and pedestrians around the system and adjust the brightness of street lights according to road conditions to reduce unnecessary power waste.The system has a mature self-fault detection mechanism and is equipped with a wireless communication device for data exchange and timely communication with the host computer terminal.The intelligent street lamp system in this paper can be used to reduce the occurrence of pedestrian and vehicle accidents at intersections,and at the same time reduce the consumption of manpower and material resources for street lamp troubleshooting,to achieve energy conservation and emission reduction. 展开更多
关键词 internet of Things Early warning system Intelligent transportation
下载PDF
Construction and Application of a Quality Evaluation System for Group Elderly Care Services Based on the Internet of Things
10
作者 Xiyu Yang Jialu Li Weiming Tian 《Proceedings of Business and Economic Studies》 2024年第1期155-161,共7页
With the continuous intensification of global aging,the issue of elderly care has become an increasingly prominent social problem.The Internet of Things(IoT)technology,as an emerging field,holds broad application pros... With the continuous intensification of global aging,the issue of elderly care has become an increasingly prominent social problem.The Internet of Things(IoT)technology,as an emerging field,holds broad application prospects.This article focuses on the application of IoT technology in group elderly care services and constructs a quality evaluation system for these services based on IoT technology.Through the analysis of practical application cases,the advantages and challenges of IoT technology in group elderly care services have been examined,confirming the feasibility and effectiveness of the evaluation system. 展开更多
关键词 internet of Things Group retirement Quality assessment system
下载PDF
Call for Papers——Feature Topic Vol.22,No.2,2025 Efficient Cooperative Transmission over Satellite Internet for 6G
11
《China Communications》 2025年第1期I0002-I0002,共1页
Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enh... Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enhance the range of network information services accessible to humans.With the transition of terrestrial mobile communication networks from the 5G era,which provides access to information anywhere,to the 6G era,which seeks to connect everything,the construction of satellite Internet,which promises a"network reaching everywhere and service is ubiquitous",has become the consensus of the industry's development and the focus of global scientific and technological innovation. 展开更多
关键词 internet SERVICES service
下载PDF
An Energy Management System with Mobile Energy Station Based Wireless Energy Transfer:System Design and Prototype Implementation
12
作者 Yan Kang Li Jinhui +3 位作者 Fan Xinyu Hu Jie Yu Qin Yang Kun 《China Communications》 2025年第1期89-101,共13页
In indoor environments,various batterypowered Internet of Things(IoT)devices,such as remote controllers and electronic tags on high-level shelves,require efficient energy management.However,manually monitoring remaini... In indoor environments,various batterypowered Internet of Things(IoT)devices,such as remote controllers and electronic tags on high-level shelves,require efficient energy management.However,manually monitoring remaining energy levels and battery replacement is both inadequate and costly.This paper introduces an energy management system for indoor IoT,which includes a mobile energy station(ES)for enabling on-demand wireless energy transfer(WET)in radio frequency(RF),some energy receivers(ERs),and a cloud server.By implementing a two-stage positioning system and embedding energy receivers into traditional IoT devices,we robustly manage their energy storage.The experimental results demonstrate that the energy receiver can harvest a minimum power of 58 mW. 展开更多
关键词 angle of arrival(AOA) internet of Things(IoT) mobile station PROTOTYPE wireless energy transfer(WET)
下载PDF
利用RealSystem在Internet上提供多媒体服务 被引量:1
13
作者 任晓霞 杨道良 《计算机应用》 CSCD 1999年第12期34-37,共4页
本文介绍了一种在Internet 上提供多媒体服务的方法。文章首先简要地描述了RealSystem 的组成及工作原理。然后结合实例详细论述RealServer 配置管理,并说明如何使RealServer 与Web 服务器... 本文介绍了一种在Internet 上提供多媒体服务的方法。文章首先简要地描述了RealSystem 的组成及工作原理。然后结合实例详细论述RealServer 配置管理,并说明如何使RealServer 与Web 服务器协同工作。最后指出了这种方法可能的应用前景。 展开更多
关键词 服务器 多媒体服务 internet REALsystem
下载PDF
Internet addiction and problematic Internet use: A systematic review of clinical research 被引量:17
14
作者 Daria J Kuss Olatz Lopez-Fernandez 《World Journal of Psychiatry》 SCIE 2016年第1期143-176,共34页
AIM: To provide a comprehensive overview of clinical studies on the clinical picture of Internet-use related addictions from a holistic perspective. A literature search was conducted using the database Web of Science.... AIM: To provide a comprehensive overview of clinical studies on the clinical picture of Internet-use related addictions from a holistic perspective. A literature search was conducted using the database Web of Science.METHODS: Over the last 15 years, the number of Internet users has increased by 1000%, and at the same time, research on addictive Internet use has proliferated. Internet addiction has not yet been understood very well, and research on its etiology and natural history is still in its infancy. In 2013, the American Psychiatric Association included Internet Gaming Disorder in the appendix of the updated version of the Diagnostic and Statistical Manual for Mental Disorders(DSM-5) as condition that requires further research prior to official inclusion in the main manual, with important repercussions for research and treatment. To date, reviews have focused on clinical and treatment studies of Internet addiction and Internet Gaming Disorder. This arguably limits the analysis to a specific diagnosis of a potential disorder that has not yet been officially recognised in the Western world, rather than a comprehensive and inclusive investigation of Internet-use related addictions(including problematic Internet use) more generally. RESULTS: The systematic literature review identified a total of 46 relevant studies. The included studies used clinical samples, and focused on characteristics of treatment seekers and online addiction treatment. Four main types of clinical research studies were identified, namely research involving(1) treatment seeker characteristics;(2) psychopharmacotherapy;(3) psychological therapy; and(4) combined treatment. CONCLUSION: A consensus regarding diagnostic criteria and measures is needed to improve reliability across studies and to develop effective and efficient treatment approaches for treatment seekers. 展开更多
关键词 internet ADDICTION PROBLEMATIC internet use Gaming ADDICTION internet Gaming DISORDER Clinical studies TREATMENT seekers TREATMENT Therapy
下载PDF
Internet based environmental monitoring information system and its application in Yili Prefecture 被引量:7
15
作者 Deng Xiang-zheng Liu Ji-yuan +1 位作者 Zhuang Da-fang Zhan Jin-yan 《Journal of Geographical Sciences》 SCIE CSCD 2002年第2期40-47,共8页
With the development of Internet technologies, Internet Based Information System (IBIS) arises with more advantages: Firstly, it is convenient for users to use owing to the introduction of Internet technologies. Secon... With the development of Internet technologies, Internet Based Information System (IBIS) arises with more advantages: Firstly, it is convenient for users to use owing to the introduction of Internet technologies. Secondly, it benefits greatly the data dissemination and data sharing based on Internet. The most important but not the last is that we can establish the information service network supported by its technologies and the facilities of information highway. So, it would be significant to design IBIS to realize the data collection, sharing and dissemination on Internet. There are many factors affecting regional environment. So it is not easy to realize the integrated environmental monitoring. Given this, we designed the Internet based environmental monitoring information system. By the virtue of the Internet based environmental monitoring information system, the management and storage of environmental monitoring data would be easier, which lays the foundation to actualize the environmental monitoring efficiently. 展开更多
关键词 environmental monitoring GIS information system internet Web GIS Yili Prefecture
下载PDF
Research on Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing 被引量:5
16
作者 Weijin Jiang Yang Wang +3 位作者 Yirong Jiang Jiahui Chen Yuhui Xu Lina Tan 《China Communications》 SCIE CSCD 2019年第7期174-194,共21页
This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the per... This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the perspective of blocking attacks. On this basis, the host protection mobile agent protection technology is selected, and a method to enhance the security protection of mobile agents (referred to as IEOP method) is proposed. The method first encrypts the mobile agent code using the encryption function, and then encapsulates the encrypted mobile agent with the improved EOP protocol IEOP, and then traces the suspicious execution result. Experiments show that using this method can block most malicious attacks on mobile agents, and can protect the integrity and confidentiality of mobile agents, but the increment of mobile agent tour time is not large. 展开更多
关键词 MOBILE internet CLOUD COMPUTING MOBILE agent system SUBJECTIVE TRUST dynamic TRUST management
下载PDF
Prevalence of internet addiction among college students in the Indian setting:a systematic review and meta-analysis 被引量:3
17
作者 Jaison Joseph Abin Varghese +6 位作者 Vijay VR Manju Dhandapani Sandeep Grover Suresh Sharma Deepika Khakha Sucheta Mann Biji P Varkey 《General Psychiatry》 CSCD 2021年第4期1-12,I0001-I0009,共21页
Background The internet is an integral part of everyone’s life.College going adolescents are highly vulnerable to the misuse of the internet.Aims To estimate the pooled prevalence of internet addiction(IA)among colle... Background The internet is an integral part of everyone’s life.College going adolescents are highly vulnerable to the misuse of the internet.Aims To estimate the pooled prevalence of internet addiction(IA)among college students in India.Methods Literature databases(PubMed,Web of Science,Scopus,EMBASE,PsycINFO and Google Scholar)were searched for studies assessing IA using the Young Internet Addiction Test(Y-IAT)among adolescents from India,published in the English language up to December 2020.We included studies from 2010 to 2020 as this is the marked era of momentum in wireless internet connectivity in India.The methodological quality of each study was scored,and data were extracted from the published reports.Pooled prevalence was estimated using the fixed-effects model.Publication bias was evaluated using Egger’s test and visual inspection of the symmetry in funnel plots.Results Fifty studies conducted in 19 states of India estimated the prevalence of IA and the overall prevalence of IA as 19.9%(95%CI:19.3%to 20.5%)and 40.7%(95%CI:38.7%to 42.8%)based on the Y-IAT cut-off scores of 50 and 40,respectively.The estimated prevalence of severe IA was significantly higher in the Y-IAT cut-off points of 70 than 80(12.7%(95%CI:11.2%to 14.3%)vs 4.6%(95%CI:4.1%to 5.2%)).The sampling method and quality of included studies had a significant effect on the estimation of prevalence in which studies using non-probability sampling and low risk of bias(total quality score≥7)reported lower prevalence.The overall quality of evidence was rated as‘moderate’based on the Grading of Recommendations Assessment,Development and Evaluation criteria.Conclusions Our nationally representative data suggest that about 20%to 40%of college students in India are at risk for IA.There is a need for further research in the reconsideration of Y-IAT cut-off points among Indian college students. 展开更多
关键词 internet Google EVERYONE
下载PDF
A Formal Testing Model for Operating Room Control System Using Internet of Things 被引量:3
18
作者 Moez Krichen Seifeddine Mechti +4 位作者 Roobaea Alroobaea Elyes Said Parminder Singh Osamah Ibrahim Khalaf Mehedi Masud 《Computers, Materials & Continua》 SCIE EI 2021年第3期2997-3011,共15页
Technological advances in recent years have significantly changed the way an operating room works.This work aims to create a platformto solve the problems of operating room occupancy and prepare the rooms with an envi... Technological advances in recent years have significantly changed the way an operating room works.This work aims to create a platformto solve the problems of operating room occupancy and prepare the rooms with an environment that is favorable for all operations.Using this system,a doctor can control all operation rooms,especially before an operation,and monitor their temperature and humidity to prepare for the operation.Also,in the event of a problem,an alert is sent to the nurse responsible for the room and medical stuff so that the problem can be resolved.The platformis tested using a Raspberry PI card and sensors.The sensors are connected to a cloud layer that collects and analyzes the temperature and humidity values obtained from the environment during an operation.The result of experimentations is visualized through a web application and an Android application.The platform also considers the security aspects such as authorization to access application functionalities for the Web and the mobile applications.We can also test and evaluate the system’s existing problems and vulnerabilities using the IEEE and owasp IoT standards.Finally,the proposed framework is extended with a model based testing technique that may be adopted for validating the security aspects. 展开更多
关键词 Communication internet of Things control rooms SENSORS CLOUD ROBOT
下载PDF
A Systematic Review on the Internet of Medical Things:Techniques,Open Issues,and Future Directions 被引量:3
19
作者 Apurva Sonavane Aditya Khamparia Deepak Gupta 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第11期1525-1550,共26页
IoT usage in healthcare is one of the fastest growing domains all over the world which applies to every age group.Internet of Medical Things(IoMT)bridges the gap between the medical and IoT field where medical devices... IoT usage in healthcare is one of the fastest growing domains all over the world which applies to every age group.Internet of Medical Things(IoMT)bridges the gap between the medical and IoT field where medical devices communicate with each other through a wireless communication network.Advancement in IoMT makes human lives easy and better.This paper provides a comprehensive detailed literature survey to investigate different IoMT-driven applications,methodologies,and techniques to ensure the sustainability of IoMT-driven systems.The limitations of existing IoMTframeworks are also analyzed concerning their applicability in real-time driven systems or applications.In addition to this,various issues(gaps),challenges,and needs in the context of such systems are highlighted.The purpose of this paper is to interpret a rigorous review concept related to IoMT and present significant contributions in the field across the research fraternity.Lastly,this paper discusses the opportunities and prospects of IoMT and discusses various open research problems. 展开更多
关键词 internet ofMedical Things(IoMT) healthcare systems sensors PREPROCESSING RFID remote monitoring devices networks
下载PDF
Architecture design and demand analysis on application layer of standard system for ubiquitous power Internet of Things 被引量:4
20
作者 Jing Zhang Yunying Ye +1 位作者 Chunjin Hu Bin Li 《Global Energy Interconnection》 EI CAS CSCD 2021年第3期304-314,共11页
The ubiquitous power Internet of Things(UPIoT)is an intelligent service system with comprehensive state perception,efficient processing,and flexible application of information.It focuses on each link of the power syst... The ubiquitous power Internet of Things(UPIoT)is an intelligent service system with comprehensive state perception,efficient processing,and flexible application of information.It focuses on each link of the power system and makes full use of the mobile internet,artificial intelligence,and other advanced information and communication technologies in order to realize the inter-human interaction of all things in all links of the power system.This article systematically presents to the national and international organizations and agencies in charge of UPIoT layer standardization the status quo of the research on the Internet of Things(IoT)-related industry standards system.It briefly describes the generic standard classification methods,layered architecture,conceptual model,and system tables in the UPIoT application layer.Based on the principles of inheritance,innovation,and practicability,this study divides the application layer into customer service,power grid operation,integrated energy,and enterprise operation,emerging business and analyzes the standard requirements of these five fields.This study also proposes a standard plan.Finally,it summarizes the research report and provides suggestions for a follow-up work. 展开更多
关键词 Ubiquitous power internet of Things(UPIoT) Application layer Standard system Architecture design Demand analysis
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部