期刊文献+
共找到27,881篇文章
< 1 2 250 >
每页显示 20 50 100
A Hybrid and Lightweight Device-to-Server Authentication Technique for the Internet of Things
1
作者 Shaha Al-Otaibi Rahim Khan +3 位作者 Hashim Ali Aftab Ahmed Khan Amir Saeed Jehad Ali 《Computers, Materials & Continua》 SCIE EI 2024年第3期3805-3823,共19页
The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective se... The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λ_(i) of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server S_(j) and members C_(i),with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs. 展开更多
关键词 internet of things AUtheNTICITY security LOCATION communication
下载PDF
Potential Benefits and Obstacles of the Use of Internet of Things in Saudi Universities: Empirical Study
2
作者 Najmah Adel Fallatah Fahad Mahmoud Ghabban +4 位作者 Omair Ameerbakhsh Ibrahim Alfadli Wael Ghazy Alheadary Salem Sulaiman Alatawi Ashwaq Hasen Al-Shehri 《Advances in Internet of Things》 2024年第1期1-20,共20页
Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of thi... Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of things (devices) that can be connected through the internet. The purpose: this paper aims to explore the concept of the Internet of Things (IoT) generally and outline the main definitions of IoT. The paper also aims to examine and discuss the obstacles and potential benefits of IoT in Saudi universities. Methodology: the researchers reviewed the previous literature and focused on several databases to use the recent studies and research related to the IoT. Then, the researchers also used quantitative methodology to examine the factors affecting the obstacles and potential benefits of IoT. The data were collected by using a questionnaire distributed online among academic staff and a total of 150 participants completed the survey. Finding: the result of this study reveals there are twelve factors that affect the potential benefits of using IoT such as reducing human errors, increasing business income and worker’s productivity. It also shows the eighteen factors which affect obstacles the IoT use, for example sensors’ cost, data privacy, and data security. These factors have the most influence on using IoT in Saudi universities. 展开更多
关键词 internet of things (IoT) M2M Factors Obstacles Potential Benefits UNIVERSITIES
下载PDF
Research on a Comprehensive Monitoring System for Tunnel Operation based on the Internet of Things and Artificial Intelligence Identification Technology
3
作者 Xingxing Wang Donglin Dai Xiangjun Fan 《Journal of Architectural Research and Development》 2024年第2期84-89,共6页
This article proposes a comprehensive monitoring system for tunnel operation to address the risks associated with tunnel operations.These risks include safety control risks,increased traffic flow,extreme weather event... This article proposes a comprehensive monitoring system for tunnel operation to address the risks associated with tunnel operations.These risks include safety control risks,increased traffic flow,extreme weather events,and movement of tectonic plates.The proposed system is based on the Internet of Things and artificial intelligence identification technology.The monitoring system will cover various aspects of tunnel operations,such as the slope of the entrance,the structural safety of the cave body,toxic and harmful gases that may appear during operation,excessively high and low-temperature humidity,poor illumination,water leakage or road water accumulation caused by extreme weather,combustion and smoke caused by fires,and more.The system will enable comprehensive monitoring and early warning of fire protection systems,accident vehicles,and overheating vehicles.This will effectively improve safety during tunnel operation. 展开更多
关键词 internet of things Artificial intelligence Operation tunnel MONITORinG
下载PDF
Construction and Application of a Quality Evaluation System for Group Elderly Care Services Based on the Internet of Things
4
作者 Xiyu Yang Jialu Li Weiming Tian 《Proceedings of Business and Economic Studies》 2024年第1期155-161,共7页
With the continuous intensification of global aging,the issue of elderly care has become an increasingly prominent social problem.The Internet of Things(IoT)technology,as an emerging field,holds broad application pros... With the continuous intensification of global aging,the issue of elderly care has become an increasingly prominent social problem.The Internet of Things(IoT)technology,as an emerging field,holds broad application prospects.This article focuses on the application of IoT technology in group elderly care services and constructs a quality evaluation system for these services based on IoT technology.Through the analysis of practical application cases,the advantages and challenges of IoT technology in group elderly care services have been examined,confirming the feasibility and effectiveness of the evaluation system. 展开更多
关键词 internet of things Group retirement Quality assessment system
下载PDF
Research on the Reform of Practical Teaching of Internet of Things Engineering in the Context of New Engineering
5
作者 Kongduo Xing Ling Pan 《Journal of Electronic Research and Application》 2024年第2期74-78,共5页
The emergence of new engineering disciplines has resulted in the growing trend of cross-discipline,and the enhancement of students’technical application ability has become the main teaching objective of engineering d... The emergence of new engineering disciplines has resulted in the growing trend of cross-discipline,and the enhancement of students’technical application ability has become the main teaching objective of engineering disciplines.For this reason,the Internet of Things(IoT)engineering program should be actively reformed,providing students with sufficient opportunities to improve their practical skills.This paper identifies the challenges within practical teaching of IoT engineering,delves into effective strategies for practical IoT teaching within the context of emerging engineering disciplines,and presents practical teaching experiences from the School of Information Engineering at Hainan University of Science and Technology as a case study.The aim is to offer guidance and insights to educators in this field. 展开更多
关键词 New engineering background internet of things engineering major Practice teaching
下载PDF
IoT Task Offloading in Edge Computing Using Non-Cooperative Game Theory for Healthcare Systems
6
作者 Dinesh Mavaluru Chettupally Anil Carie +4 位作者 Ahmed I.Alutaibi Satish Anamalamudi Bayapa Reddy Narapureddy Murali Krishna Enduri Md Ezaz Ahmed 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1487-1503,共17页
In this paper,we present a comprehensive system model for Industrial Internet of Things(IIoT)networks empowered by Non-Orthogonal Multiple Access(NOMA)and Mobile Edge Computing(MEC)technologies.The network comprises e... In this paper,we present a comprehensive system model for Industrial Internet of Things(IIoT)networks empowered by Non-Orthogonal Multiple Access(NOMA)and Mobile Edge Computing(MEC)technologies.The network comprises essential components such as base stations,edge servers,and numerous IIoT devices characterized by limited energy and computing capacities.The central challenge addressed is the optimization of resource allocation and task distribution while adhering to stringent queueing delay constraints and minimizing overall energy consumption.The system operates in discrete time slots and employs a quasi-static approach,with a specific focus on the complexities of task partitioning and the management of constrained resources within the IIoT context.This study makes valuable contributions to the field by enhancing the understanding of resourceefficient management and task allocation,particularly relevant in real-time industrial applications.Experimental results indicate that our proposed algorithmsignificantly outperforms existing approaches,reducing queue backlog by 45.32% and 17.25% compared to SMRA and ACRA while achieving a 27.31% and 74.12% improvement in Qn O.Moreover,the algorithmeffectively balances complexity and network performance,as demonstratedwhen reducing the number of devices in each group(Ng)from 200 to 50,resulting in a 97.21% reduction in complexity with only a 7.35% increase in energy consumption.This research offers a practical solution for optimizing IIoT networks in real-time industrial settings. 展开更多
关键词 internet of things edge computing ofFLOADinG NOMA
下载PDF
The Positive Significance of Confucian Civilization in Peace Building
7
作者 PU Jingxin ZHENG Hongju 《International Relations and Diplomacy》 2024年第1期18-25,共8页
The Confucian emphasis on benevolence and empathy can be applied in conflict resolution processes.When parties in conflict embrace these values,it becomes easier to find common ground,compromise,and work towards peace... The Confucian emphasis on benevolence and empathy can be applied in conflict resolution processes.When parties in conflict embrace these values,it becomes easier to find common ground,compromise,and work towards peaceful solutions.Confucian civilization,with its emphasis on ethics,harmony,and diplomacy,offers valuable contributions to peace-building efforts in the contemporary world.By promoting virtuous leadership,fostering cross-cultural understanding,and emphasizing ethical governance,Confucianism can play a positive role in achieving and maintaining global peace.Confucianism continues to exert significant influence in the contemporary world,particularly in the context of peace-building efforts.This article explores the positive significance of Confucian civilization in contributing to peace-building endeavors globally. 展开更多
关键词 Confucian civilization CONFUCIANISM benevolence peace-building HARMONY cross-cultural understanding
下载PDF
Security and Privacy in Solar Insecticidal Lamps Internet of Things:Requirements and Challenges
8
作者 Qingsong Zhao Lei Shu +3 位作者 Kailiang Li Mohamed Amine Ferrag Ximeng Liu Yanbin Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期58-73,共16页
Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the... Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT. 展开更多
关键词 CHallENGES internet of things(IoT) privacy and security security requirements solar insecticidal lamps(SIL)
下载PDF
Intelligent 3D garment system of the human body based on deep spiking neural network
9
作者 Minghua JIANG Zhangyuan TIAN +5 位作者 Chenyu YU Yankang SHI Li LIU Tao PENG Xinrong HU Feng YU 《虚拟现实与智能硬件(中英文)》 EI 2024年第1期43-55,共13页
Background Intelligent garments,a burgeoning class of wearable devices,have extensive applications in domains such as sports training and medical rehabilitation.Nonetheless,existing research in the smart wearables dom... Background Intelligent garments,a burgeoning class of wearable devices,have extensive applications in domains such as sports training and medical rehabilitation.Nonetheless,existing research in the smart wearables domain predominantly emphasizes sensor functionality and quantity,often skipping crucial aspects related to user experience and interaction.Methods To address this gap,this study introduces a novel real-time 3D interactive system based on intelligent garments.The system utilizes lightweight sensor modules to collect human motion data and introduces a dual-stream fusion network based on pulsed neural units to classify and recognize human movements,thereby achieving real-time interaction between users and sensors.Additionally,the system incorporates 3D human visualization functionality,which visualizes sensor data and recognizes human actions as 3D models in real time,providing accurate and comprehensive visual feedback to help users better understand and analyze the details and features of human motion.This system has significant potential for applications in motion detection,medical monitoring,virtual reality,and other fields.The accurate classification of human actions contributes to the development of personalized training plans and injury prevention strategies.Conclusions This study has substantial implications in the domains of intelligent garments,human motion monitoring,and digital twin visualization.The advancement of this system is expected to propel the progress of wearable technology and foster a deeper comprehension of human motion. 展开更多
关键词 intelligent garment system internet of things Human action recognition Deep learning 3D visualization
下载PDF
Machine Learning Empowered Security and Privacy Architecture for IoT Networks with the Integration of Blockchain
10
作者 Sohaib Latif M.Saad Bin Ilyas +3 位作者 Azhar Imran Hamad Ali Abosaq Abdulaziz Alzubaidi Vincent Karovic Jr. 《Intelligent Automation & Soft Computing》 2024年第2期353-379,共27页
The Internet of Things(IoT)is growing rapidly and impacting almost every aspect of our lives,fromwearables and healthcare to security,traffic management,and fleet management systems.This has generated massive volumes ... The Internet of Things(IoT)is growing rapidly and impacting almost every aspect of our lives,fromwearables and healthcare to security,traffic management,and fleet management systems.This has generated massive volumes of data and security,and data privacy risks are increasing with the advancement of technology and network connections.Traditional access control solutions are inadequate for establishing access control in IoT systems to provide data protection owing to their vulnerability to single-point OF failure.Additionally,conventional privacy preservation methods have high latency costs and overhead for resource-constrained devices.Previous machine learning approaches were also unable to detect denial-of-service(DoS)attacks.This study introduced a novel decentralized and secure framework for blockchain integration.To avoid single-point OF failure,an accredited access control scheme is incorporated,combining blockchain with local peers to record each transaction and verify the signature to access.Blockchain-based attribute-based cryptography is implemented to protect data storage privacy by generating threshold parameters,managing keys,and revoking users on the blockchain.An innovative contract-based DOS attack mitigation method is also incorporated to effectively validate devices with intelligent contracts as trusted or untrusted,preventing the server from becoming overwhelmed.The proposed framework effectively controls access,safeguards data privacy,and reduces the risk of cyberattacks.The results depict that the suggested framework outperforms the results in terms of accuracy,precision,sensitivity,recall,and F-measure at 96.9%,98.43%,98.8%,98.43%,and 98.4%,respectively. 展开更多
关键词 Machine learning internet of things blockchain data privacy SECURITY industry 4.0
下载PDF
United States Healthcare Data Breaches: Insights for NIST SP 800-66 Revision 2 from a Review of the NIST SP 800-66 Revision 1
11
作者 Mohammed Mohammed Raoof 《Journal of Information Security》 2024年第2期232-244,共13页
Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publicati... Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publication base as an effective solution. The NIST Special Publication 800-66 Revision 1 was an essential standard in US healthcare, which was withdrawn in February 2024 and superseded by SP 800-66 Revision 2. This review investigates the academic papers concerning the application of the NIST SP 800-66 Revision 1 standard in the US healthcare literature. A systematic review method was used in this study to determine current knowledge gaps of the SP 800-66 Revision 1. Some limitations were employed in the search to enforce validity. A total of eleven articles were found eligible for the study. Consequently, this study suggests the necessity for additional academic papers pertaining to SP 800-66 Revision 2 in the US healthcare literature. In turn, it will enhance awareness of safeguarding electronic protected health information (ePHI), help to mitigate potential future risks, and eventually reduce breaches. 展开更多
关键词 SP 800-66 Revision 1 SP 800-66 Revision 2 HIPAA Compliance Security Breaches Risk Management Framework (RMF) internet of things (IoT) Artificial intelligence (AI)
下载PDF
A Workable Solution for Reducing the Large Number of Vehicle and Pedestrian Accidents Occurring on a Yellow Light
12
作者 Pranav Gupta Silki Arora 《Journal of Transportation Technologies》 2024年第1期82-87,共6页
Traffic intersections are incredibly dangerous for drivers and pedestrians. Statistics from both Canada and the U.S. show a high number of fatalities and serious injuries related to crashes at intersections. In Canada... Traffic intersections are incredibly dangerous for drivers and pedestrians. Statistics from both Canada and the U.S. show a high number of fatalities and serious injuries related to crashes at intersections. In Canada, during 2019, the National Collision Database shows that 28% of traffic fatalities and 42% of serious injuries occurred at intersections. Likewise, the U.S. National Highway Traffic Administration (NHTSA) found that about 40% of the estimated 5,811,000 accidents in the U.S. during the year studied were intersection-related crashes. In fact, a major survey by the car insurance industry found that nearly 85% of drivers could not identify the correct action to take when approaching a yellow traffic light at an intersection. One major reason for these accidents is the “yellow light dilemma,” the ambiguous situation where a driver should stop or proceed forward when unexpectedly faced with a yellow light. This situation is even further exacerbated by the tendency of aggressive drivers to inappropriately speed up on the yellow just to get through the traffic light. A survey of Canadian drivers conducted by the Traffic Injury Research Foundation found that 9% of drivers admitted to speeding up to get through a traffic light. Another reason for these accidents is the increased danger of making a left-hand turn on yellow. According to the National Highway Traffic Safety Association (NHTSA), left turns occur in approximately 22.2% of collisions—as opposed to just 1.2% for right turns. Moreover, a study by CNN found left turns are three times as likely to kill pedestrians than right turns. The reason left turns are so much more likely to cause an accident is because they take a driver against traffic and in the path of oncoming cars. Additionally, most of these left turns occur at the driver’s discretion—as opposed to the distressingly brief left-hand arrow at busy intersections. Drive Safe Now proposes a workable solution for reducing the number of accidents occurring during a yellow light at intersections. We believe this fairly simple solution will save lives, prevent injuries, reduce damage to public and private property, and decrease insurance costs. 展开更多
关键词 Traffic Accidents Yellow Light Traffic Light Signals inTERSECTION Crashes Collision Traffic Fatalities Traffic injuries Vehicles SAFETY Speed Limit Driving PEDESTRIANS Bicyclists MOTORCYCLISTS Caution Line Yellow Light Dilemma Left Hand Turn on Yellow Distance Smart Road Technology Signs Signage Autonomous Vehicles AVs Road Safety IoT internet of things infrastructure Accident Reduction Driving Habits Stop Line Red Light Jumping Pedestrian Safety Caution Light Stopping at intersection Safety at intersections
下载PDF
Multidiscipline Applications of Triboelectric Nanogenerators for the Intelligent Era of Internet of Things
13
作者 Xiaole Cao Yao Xiong +3 位作者 Jia Sun Xiaoyin Xie Qijun Sun Zhong Lin Wang 《Nano-Micro Letters》 SCIE EI CAS CSCD 2023年第1期252-292,共41页
In the era of 5G and the Internet of things(IoTs),vari-ous human-computer interaction systems based on the integration of triboelectric nanogenerators(TENGs)and IoTs technologies dem-onstrate the feasibility of sustai... In the era of 5G and the Internet of things(IoTs),vari-ous human-computer interaction systems based on the integration of triboelectric nanogenerators(TENGs)and IoTs technologies dem-onstrate the feasibility of sustainable and self-powered functional systems.The rapid development of intelligent applications of IoTs based on TENGs mainly relies on supplying the harvested mechanical energy from surroundings and implementing active sensing,which have greatly changed the way of human production and daily life.This review mainly introduced the TENG applications in multidisci-pline scenarios of IoTs,including smart agriculture,smart industry,smart city,emergency monitoring,and machine learning-assisted artificial intelligence applications.The challenges and future research directions of TENG toward IoTs have also been proposed.The exten-sive developments and applications of TENG will push forward the IoTs into an energy autonomy fashion. 展开更多
关键词 Triboelectric nanogenerator Self-powered sensor internet of things Artificial intelligence Machine learning
下载PDF
Machine Learning-Enabled Communication Approach for the Internet of Medical Things
14
作者 Rahim Khan Abdullah Ghani +3 位作者 Samia Allaoua Chelloug Mohammed Amin Aamir Saeed Jason Teo 《Computers, Materials & Continua》 SCIE EI 2023年第8期1569-1584,共16页
The Internet ofMedical Things(IoMT)is mainly concernedwith the efficient utilisation of wearable devices in the healthcare domain to manage various processes automatically,whereas machine learning approaches enable th... The Internet ofMedical Things(IoMT)is mainly concernedwith the efficient utilisation of wearable devices in the healthcare domain to manage various processes automatically,whereas machine learning approaches enable these smart systems to make informed decisions.Generally,broadcasting is used for the transmission of frames,whereas congestion,energy efficiency,and excessive load are among the common issues associated with existing approaches.In this paper,a machine learning-enabled shortest path identification scheme is presented to ensure reliable transmission of frames,especially with the minimum possible communication overheads in the IoMT network.For this purpose,the proposed scheme utilises a well-known technique,i.e.,Kruskal’s algorithm,to find an optimal path from source to destination wearable devices.Additionally,other evaluation metrics are used to find a reliable and shortest possible communication path between the two interested parties.Apart from that,every device is bound to hold a supplementary path,preferably a second optimised path,for situations where the current communication path is no longer available,either due to device failure or heavy traffic.Furthermore,the machine learning approach helps enable these devices to update their routing tables simultaneously,and an optimal path could be replaced if a better one is available.The proposed mechanism has been tested using a smart environment developed for the healthcare domain using IoMT networks.Simulation results show that the proposed machine learning-oriented approach performs better than existing approaches where the proposed scheme has achieved the minimum possible ratios,i.e.,17%and 23%,in terms of end to end delay and packet losses,respectively.Moreover,the proposed scheme has achieved an approximately 21%improvement in the average throughput compared to the existing schemes. 展开更多
关键词 Machine learning internet of Medical things healthcare load balancing COMMUNICATION
下载PDF
Efficient Certificateless Authenticated Key Agreement for Blockchain-Enabled Internet of Medical Things
15
作者 Chaoyang Li Yanbu Guo +4 位作者 Mianxiong Dong Gang Xu Xiu-Bo Chen Jian Li Kaoru Ota 《Computers, Materials & Continua》 SCIE EI 2023年第4期2043-2059,共17页
Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between differe... Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between different medical institutions and improved the utilization of medical data.However,some problems in the information transfer process between wireless medical devices and mobile medical apps,such as information leakage and privacy disclosure.This paper first designs a cross-device key agreement model for blockchain-enabled IoMT.This model can establish a key agreement mechanism for secure medical data sharing.Meanwhile,a certificateless authenticated key agreement(KA)protocol has been proposed to strengthen the information transfer security in the cross-device key agreement model.The proposed KA protocol only requires one exchange of messages between the two parties,which can improve the protocol execution efficiency.Then,any unauthorized tampering of the transmitted signed message sent by the sender can be detected by the receiver,so this can guarantee the success of the establishment of a session key between the strange entities.The blockchain ledger can ensure that the medical data cannot be tampered with,and the certificateless mechanism can weaken the key escrow problem.Moreover,the security proof and performance analysis are given,which show that the proposed model and KA protocol are more secure and efficient than other schemes in similar literature. 展开更多
关键词 CERTIFICATELESS key agreement authentication blockchain internet of medical things
下载PDF
Optimization of the Internet of Remote Things Data Acquisition Based on Satellite UAV Integrated Network
16
作者 Yuanyuan Yao Dengyang Dong +3 位作者 Sai Huang Chunyu Pan Shuo Chen Xuehua Li 《China Communications》 SCIE CSCD 2023年第7期15-28,共14页
In order to achieve dependable and efficient data acquisition and transmission in the Internet of Remote Things(IoRT),we investigate the optimization scheme of IoRT data acquisition under the unmanned aerial vehicle(U... In order to achieve dependable and efficient data acquisition and transmission in the Internet of Remote Things(IoRT),we investigate the optimization scheme of IoRT data acquisition under the unmanned aerial vehicle(UAV)-low earth orbit(LEO)satellite integrated space-air-ground network,in which the UAV acquires data from massive Internet of Things(IoT)devices in special scenarios.To combine with the actual scenario,we consider two different data types,that is,delay-sensitive data and delay-tolerant data,the transmission mode is accordingly divided into two types.For delay-sensitive data,the data will be transmitted via the LEO satellite relay to the data center(DC)in real-time.For delay-tolerant data,the UAV will store and carry the data until the acquisition is completed,and then return to DC.Due to nonconvexity and complexity of the formulated problem,a multi-dimensional optimization Rate Demand based Joint Optimization(RDJO)algorithm is proposed.The algorithm first uses successive convex approximation(SCA)technology to solve the non-convexity,and then based on the block coordinate descent(BCD)method,the data acquisition efficiency is maximized by jointly optimizing UAV deployment,the bandwidth allocation of IoRT devices,and the transmission power of the UAV.Finally,the proposed RDJO algorithm is compared with the conventional algorithms.Simulation consequences demonstrate that the efficiency of IoRT data acquisition can be greatly improved by multi-parameter optimization of the bandwidth allocation,UAV deployment and the transmission power. 展开更多
关键词 internet of Remote things dataacquisi-tion unmanned aerial vehicle LEO satellite
下载PDF
Thermoelectric energy harvesting for internet of things devices using machine learning:A review
17
作者 Tereza Kucova Michal Prauzek +3 位作者 Jaromir Konecny Darius Andriukaitis Mindaugas Zilys Radek Martinek 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第3期680-700,共21页
Initiatives to minimise battery use,address sustainability,and reduce regular maintenance have driven the challenge to use alternative power sources to supply energy to devices deployed in Internet of Things(IoT)netwo... Initiatives to minimise battery use,address sustainability,and reduce regular maintenance have driven the challenge to use alternative power sources to supply energy to devices deployed in Internet of Things(IoT)networks.As a key pillar of fifth generation(5G)and beyond 5G networks,IoT is estimated to reach 42 billion devices by the year 2025.Thermoelectric generators(TEGs)are solid state energy harvesters which reliably and renewably convert thermal energy into electrical energy.These devices are able to recover lost thermal energy,produce energy in extreme environments,generate electric power in remote areas,and power micro‐sensors.Applying the state of the art,the authorspresent a comprehensive review of machine learning(ML)approaches applied in combination with TEG‐powered IoT devices to manage and predict available energy.The application areas of TEG‐driven IoT devices that exploit as a heat source the temperature differences found in the environment,biological structures,machines,and other technologies are summarised.Based on detailed research of the state of the art in TEG‐powered devices,the authors investigated the research challenges,applied algorithms and application areas of this technology.The aims of the research were to devise new energy prediction and energy management systems based on ML methods,create supervised algorithms which better estimate incoming energy,and develop unsupervised and semi‐supervised ap-proaches which provide adaptive and dynamic operation.The review results indicate that TEGs are a suitable energy harvesting technology for low‐power applications through their scalability,usability in ubiquitous temperature difference scenarios,and long oper-ating lifetime.However,TEGs also have low energy efficiency(around 10%)and require a relatively constant heat source. 展开更多
关键词 adaptive systems intelligent embedded systems internet of things machine learning SENSORS
下载PDF
Minimizing Age of Information in the Uplink Multi-User Networks via Dynamic Bandwidth Allocation
18
作者 Zeyuan Zhu Xinrong Guan +2 位作者 Baoquan Yu Tian Yu Yueming Cai 《China Communications》 SCIE CSCD 2023年第4期287-301,共15页
Improving the information freshness is critical for the monitoring and controlling applications in the cellular Internet of Things(IoT).In this paper,we are interested in optimizing the bandwidth allocation dynamicall... Improving the information freshness is critical for the monitoring and controlling applications in the cellular Internet of Things(IoT).In this paper,we are interested in optimizing the bandwidth allocation dynamically to improve the information freshness of the short packet based uplink status updates,which is characterized by a recently proposed metric,age of information(Ao I).We first design a status update scheme with channel distribution information(CDI).By relaxing the hard bandwidth constraint and introducing a Lagrangian multiplier,we first decouple the multi-MTCD bandwidth allocation problem into a single MTCD Markov decision process(MDP).Under the MDP framework,after variable substitution,we obtain the single-MTCD status update scheme by solving a linear programming problem.Then,we adjust the Lagrangian multiplier to make the obtained scheme satisfy the relaxed bandwidth constraint.Finally,a greedy policy is built on the proposed scheme to adjust the bandwidth allocation in each slot to satisfy the hard bandwidth constraint.In the unknown environment without CDI,we further design a bandwidth allocation scheme which only maximizes the expected sum Ao I drop within each time slot.Simulation results show that in terms of AoI,the proposed schemes outperform the benchmark schemes. 展开更多
关键词 internet of things age of information short packet communications bandwidth allocation
下载PDF
Smart object recommendation based on topic learning and joint features in the social internet of things
19
作者 Hongfei Zhang Li Zhu +4 位作者 Tao Dai Liwen Zhang Xi Feng Li Zhang Kaiqi Zhang 《Digital Communications and Networks》 SCIE CSCD 2023年第1期22-32,共11页
With the extensive integration of the Internet,social networks and the internet of things,the social internet of things has increasingly become a significant research issue.In the social internet of things application... With the extensive integration of the Internet,social networks and the internet of things,the social internet of things has increasingly become a significant research issue.In the social internet of things application scenario,one of the greatest challenges is how to accurately recommend or match smart objects for users with massive resources.Although a variety of recommendation algorithms have been employed in this field,they ignore the massive text resources in the social internet of things,which can effectively improve the effect of recommendation.In this paper,a smart object recommendation approach named object recommendation based on topic learning and joint features is proposed.The proposed approach extracts and calculates topics and service relevant features of texts related to smart objects and introduces the“thing-thing”relationship information in the internet of things to improve the effect of recommendation.Experiments show that the proposed approach enables higher accuracy compared to the existing recommendation methods. 展开更多
关键词 Social internet of things Smart object recommendation Topics Features Thing-thing relationship
下载PDF
Improvements in Weather Forecasting Technique Using Cognitive Internet of Things
20
作者 Kaushlendra Yadav Anuj Singh Arvind Kumar Tiwari 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3767-3782,共16页
Forecasting the weather is a challenging task for human beings because of the unpredictable nature of the climate.However,effective forecasting is vital for the general growth of a country due to the significance of w... Forecasting the weather is a challenging task for human beings because of the unpredictable nature of the climate.However,effective forecasting is vital for the general growth of a country due to the significance of weather forecasting in science and technology.The primary motivation behind this work is to achieve a higher level of forecasting accuracy to avoid any damage.Currently,most weather forecasting work is based on initially observed numerical weather data that cannot fully cover the changing essence of the atmosphere.In this work,sensors are used to collect real-time data for a particular location to capture the varying nature of the atmosphere.Our solution can give the anticipated results with the least amount of human engagement by combining human intelligence and machine learning with the help of the cognitive Internet of Things.The Authors identified weatherrelated parameters such as temperature,humidity,wind speed,and rainfall and then applied cognitive data collection methods to train and validate their findings.In addition,the Authors have examined the efficacy of various machine learning algorithms by using them on both data sets i.e.,pre-recorded metrological data sets and live sensor data sets collected from multiple locations.The Authors noticed that the results were superior on the sensor data.The Authors developed ensemble learning model using stacked method that achieved 99.25%accuracy,99%recall,99%precision,and 99%F1-score for Sensor data.It also achieved 85%accuracy,86%recall,85%precision,and 86%F1 score for Australian rainfall data. 展开更多
关键词 internet of things machine learning weather forecast cognitive computing PREDICTORS
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部