期刊文献+
共找到25,819篇文章
< 1 2 250 >
每页显示 20 50 100
Research and Monitoring of Metro Tunnel Deformation based on the Technology of the Internet of Things
1
作者 Xiaowei Du Yongtao Gao 《International Journal of Technology Management》 2013年第1期11-13,共3页
After a long subway tunnel operators will produce cross-sectional deformation. Articles designed vehicle laser ranging device tbr continuous measurement of tunnel wall to test their defomaed state. The paper also desc... After a long subway tunnel operators will produce cross-sectional deformation. Articles designed vehicle laser ranging device tbr continuous measurement of tunnel wall to test their defomaed state. The paper also describes the tunnel cross-section deltbrmation measurement method, contour titting principles and error analysis and networking technology for wireless data transmission methods. The detection system is designed to achieve a tunnel section of the structural safety testing and deformation that may occur timely disaster warning, the safe operation of the subway tunnel to provide effective protection. 展开更多
关键词 internet of things technology sectional defom^ation laser rangefinder
下载PDF
Research on a Comprehensive Monitoring System for Tunnel Operation based on the Internet of Things and Artificial Intelligence Identification Technology
2
作者 Xingxing Wang Donglin Dai Xiangjun Fan 《Journal of Architectural Research and Development》 2024年第2期84-89,共6页
This article proposes a comprehensive monitoring system for tunnel operation to address the risks associated with tunnel operations.These risks include safety control risks,increased traffic flow,extreme weather event... This article proposes a comprehensive monitoring system for tunnel operation to address the risks associated with tunnel operations.These risks include safety control risks,increased traffic flow,extreme weather events,and movement of tectonic plates.The proposed system is based on the Internet of Things and artificial intelligence identification technology.The monitoring system will cover various aspects of tunnel operations,such as the slope of the entrance,the structural safety of the cave body,toxic and harmful gases that may appear during operation,excessively high and low-temperature humidity,poor illumination,water leakage or road water accumulation caused by extreme weather,combustion and smoke caused by fires,and more.The system will enable comprehensive monitoring and early warning of fire protection systems,accident vehicles,and overheating vehicles.This will effectively improve safety during tunnel operation. 展开更多
关键词 internet of things Artificial intelligence Operation tunnel MONITORING
下载PDF
Securing the Internet of Health Things with Certificateless Anonymous Authentication Scheme
3
作者 Nisreen Innab 《Computers, Materials & Continua》 SCIE EI 2024年第8期2237-2258,共22页
Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible t... Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes. 展开更多
关键词 internet of things internet of health things security authentication hyperelliptic curve cryptography
下载PDF
A Hybrid and Lightweight Device-to-Server Authentication Technique for the Internet of Things
4
作者 Shaha Al-Otaibi Rahim Khan +3 位作者 Hashim Ali Aftab Ahmed Khan Amir Saeed Jehad Ali 《Computers, Materials & Continua》 SCIE EI 2024年第3期3805-3823,共19页
The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective se... The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λ_(i) of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server S_(j) and members C_(i),with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs. 展开更多
关键词 internet of things AUtheNTICITY security LOCATION communication
下载PDF
Internet of Things Authentication Protocols: Comparative Study
5
作者 Souhayla Dargaoui Mourade Azrour +3 位作者 Ahmad ElAllaoui Azidine Guezzaz Abdulatif Alabdulatif Abdullah Alnajim 《Computers, Materials & Continua》 SCIE EI 2024年第4期65-91,共27页
Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is ... Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still thebiggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services providedby an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures,data, and devices. Authentication, as the first line of defense against security threats, becomes the priority ofeveryone. It can either grant or deny users access to resources according to their legitimacy. As a result, studyingand researching authentication issues within IoT is extremely important. As a result, studying and researchingauthentication issues within IoT is extremely important. This article presents a comparative study of recent researchin IoT security;it provides an analysis of recent authentication protocols from2019 to 2023 that cover several areaswithin IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security researchsummary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. Itillustrates that the resistance of protocols against attacks, and their computational and communication cost arelinked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemesand provides some future research directions. 展开更多
关键词 ATTACKS CRYPTOGRAPHY internet of things SECURITY AUtheNTICATION
下载PDF
Behaviour recognition based on the integration of multigranular motion features in the Internet of Things
6
作者 Lizong Zhang Yiming Wang +3 位作者 Ke Yan Yi Su Nawaf Alharbe Shuxin Feng 《Digital Communications and Networks》 SCIE CSCD 2024年第3期666-675,共10页
With the adoption of cutting-edge communication technologies such as 5G/6G systems and the extensive development of devices,crowdsensing systems in the Internet of Things(IoT)are now conducting complicated video analy... With the adoption of cutting-edge communication technologies such as 5G/6G systems and the extensive development of devices,crowdsensing systems in the Internet of Things(IoT)are now conducting complicated video analysis tasks such as behaviour recognition.These applications have dramatically increased the diversity of IoT systems.Specifically,behaviour recognition in videos usually requires a combinatorial analysis of the spatial information about objects and information about their dynamic actions in the temporal dimension.Behaviour recognition may even rely more on the modeling of temporal information containing short-range and long-range motions,in contrast to computer vision tasks involving images that focus on understanding spatial information.However,current solutions fail to jointly and comprehensively analyse short-range motions between adjacent frames and long-range temporal aggregations at large scales in videos.In this paper,we propose a novel behaviour recognition method based on the integration of multigranular(IMG)motion features,which can provide support for deploying video analysis in multimedia IoT crowdsensing systems.In particular,we achieve reliable motion information modeling by integrating a channel attention-based short-term motion feature enhancement module(CSEM)and a cascaded long-term motion feature integration module(CLIM).We evaluate our model on several action recognition benchmarks,such as HMDB51,Something-Something and UCF101.The experimental results demonstrate that our approach outperforms the previous state-of-the-art methods,which confirms its effective-ness and efficiency. 展开更多
关键词 Behaviour recognition Motion features Attention mechanism internet of things Crowdsensing
下载PDF
Vector Dominance with Threshold Searchable Encryption (VDTSE) for the Internet of Things
7
作者 Jingjing Nie Zhenhua Chen 《Computers, Materials & Continua》 SCIE EI 2024年第6期4763-4779,共17页
The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which ... The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which is essential in smart healthcare.However,Personal Health Records(PHRs)are normally kept in public cloud servers controlled by IoMT service providers,so privacy and security incidents may be frequent.Fortunately,Searchable Encryption(SE),which can be used to execute queries on encrypted data,can address the issue above.Nevertheless,most existing SE schemes cannot solve the vector dominance threshold problem.In response to this,we present a SE scheme called Vector Dominance with Threshold Searchable Encryption(VDTSE)in this study.We use a Lagrangian polynomial technique and convert the vector dominance threshold problem into a constraint that the number of two equal-length vectors’corresponding bits excluding wildcards is not less than a threshold t.Then,we solve the problem using the proposed technique modified in Hidden Vector Encryption(HVE).This technique makes the trapdoor size linear to the number of attributes and thus much smaller than that of other similar SE schemes.A rigorous experimental analysis of a specific application for privacy-preserving diabetes demonstrates the feasibility of the proposed VDTSE scheme. 展开更多
关键词 internet of things(IoT) internet of Medical things(IoMT) vector dominance with threshold searchable encryption(VDTSE) threshold comparison electronic healthcare
下载PDF
Artificial intelligence in physiological characteristics recognition for internet of things authentication
8
作者 Zhimin Zhang Huansheng Ning +2 位作者 Fadi Farha Jianguo Ding Kim-Kwang Raymond Choo 《Digital Communications and Networks》 SCIE CSCD 2024年第3期740-755,共16页
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)systems.However,conventional mode-based authentication methods(e.g.,passwords and sm... Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)systems.However,conventional mode-based authentication methods(e.g.,passwords and smart cards)may be vulnerable to a broad range of attacks(e.g.,eavesdropping and side-channel attacks).Hence,there have been attempts to design biometric-based authentication solutions,which rely on physiological and behavioral characteristics.Behavioral characteristics need continuous monitoring and specific environmental settings,which can be challenging to implement in practice.However,we can also leverage Artificial Intelligence(AI)in the extraction and classification of physiological characteristics from IoT devices processing to facilitate authentication.Thus,we review the literature on the use of AI in physiological characteristics recognition pub-lished after 2015.We use the three-layer architecture of the IoT(i.e.,sensing layer,feature layer,and algorithm layer)to guide the discussion of existing approaches and their limitations.We also identify a number of future research opportunities,which will hopefully guide the design of next generation solutions. 展开更多
关键词 Physiological characteristics recognition Artificial intelligence internet of things Biological-driven authentication
下载PDF
Privacy-Preserving Information Fusion Technique for Device to Server-Enabled Communication in the Internet of Things:A Hybrid Approach
9
作者 Amal Al-Rasheed Rahim Khan +3 位作者 Tahani Alsaed Mahwish Kundi Mohamad Hanif Md.Saad Mahidur R.Sarker 《Computers, Materials & Continua》 SCIE EI 2024年第7期1305-1323,共19页
Due to the overwhelming characteristics of the Internet of Things(IoT)and its adoption in approximately every aspect of our lives,the concept of individual devices’privacy has gained prominent attention from both cus... Due to the overwhelming characteristics of the Internet of Things(IoT)and its adoption in approximately every aspect of our lives,the concept of individual devices’privacy has gained prominent attention from both customers,i.e.,people,and industries as wearable devices collect sensitive information about patients(both admitted and outdoor)in smart healthcare infrastructures.In addition to privacy,outliers or noise are among the crucial issues,which are directly correlated with IoT infrastructures,as most member devices are resource-limited and could generate or transmit false data that is required to be refined before processing,i.e.,transmitting.Therefore,the development of privacy-preserving information fusion techniques is highly encouraged,especially those designed for smart IoT-enabled domains.In this paper,we are going to present an effective hybrid approach that can refine raw data values captured by the respectivemember device before transmission while preserving its privacy through the utilization of the differential privacy technique in IoT infrastructures.Sliding window,i.e.,δi based dynamic programming methodology,is implemented at the device level to ensure precise and accurate detection of outliers or noisy data,and refine it prior to activation of the respective transmission activity.Additionally,an appropriate privacy budget has been selected,which is enough to ensure the privacy of every individualmodule,i.e.,a wearable device such as a smartwatch attached to the patient’s body.In contrast,the end module,i.e.,the server in this case,can extract important information with approximately the maximum level of accuracy.Moreover,refined data has been processed by adding an appropriate nose through the Laplace mechanism to make it useless or meaningless for the adversary modules in the IoT.The proposed hybrid approach is trusted from both the device’s privacy and the integrity of the transmitted information perspectives.Simulation and analytical results have proved that the proposed privacy-preserving information fusion technique for wearable devices is an ideal solution for resource-constrained infrastructures such as IoT and the Internet ofMedical Things,where both device privacy and information integrity are important.Finally,the proposed hybrid approach is proven against well-known intruder attacks,especially those related to the privacy of the respective device in IoT infrastructures. 展开更多
关键词 internet of things information fusion differential privacy dynamic programming Laplace function
下载PDF
Potential Benefits and Obstacles of the Use of Internet of Things in Saudi Universities: Empirical Study
10
作者 Najmah Adel Fallatah Fahad Mahmoud Ghabban +4 位作者 Omair Ameerbakhsh Ibrahim Alfadli Wael Ghazy Alheadary Salem Sulaiman Alatawi Ashwaq Hasen Al-Shehri 《Advances in Internet of Things》 2024年第1期1-20,共20页
Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of thi... Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of things (devices) that can be connected through the internet. The purpose: this paper aims to explore the concept of the Internet of Things (IoT) generally and outline the main definitions of IoT. The paper also aims to examine and discuss the obstacles and potential benefits of IoT in Saudi universities. Methodology: the researchers reviewed the previous literature and focused on several databases to use the recent studies and research related to the IoT. Then, the researchers also used quantitative methodology to examine the factors affecting the obstacles and potential benefits of IoT. The data were collected by using a questionnaire distributed online among academic staff and a total of 150 participants completed the survey. Finding: the result of this study reveals there are twelve factors that affect the potential benefits of using IoT such as reducing human errors, increasing business income and worker’s productivity. It also shows the eighteen factors which affect obstacles the IoT use, for example sensors’ cost, data privacy, and data security. These factors have the most influence on using IoT in Saudi universities. 展开更多
关键词 internet of things (IoT) M2M Factors Obstacles Potential Benefits UNIVERSITIES
下载PDF
Construction and Application of a Quality Evaluation System for Group Elderly Care Services Based on the Internet of Things
11
作者 Xiyu Yang Jialu Li Weiming Tian 《Proceedings of Business and Economic Studies》 2024年第1期155-161,共7页
With the continuous intensification of global aging,the issue of elderly care has become an increasingly prominent social problem.The Internet of Things(IoT)technology,as an emerging field,holds broad application pros... With the continuous intensification of global aging,the issue of elderly care has become an increasingly prominent social problem.The Internet of Things(IoT)technology,as an emerging field,holds broad application prospects.This article focuses on the application of IoT technology in group elderly care services and constructs a quality evaluation system for these services based on IoT technology.Through the analysis of practical application cases,the advantages and challenges of IoT technology in group elderly care services have been examined,confirming the feasibility and effectiveness of the evaluation system. 展开更多
关键词 internet of things Group retirement Quality assessment system
下载PDF
Research on the Reform of Practical Teaching of Internet of Things Engineering in the Context of New Engineering
12
作者 Kongduo Xing Ling Pan 《Journal of Electronic Research and Application》 2024年第2期74-78,共5页
The emergence of new engineering disciplines has resulted in the growing trend of cross-discipline,and the enhancement of students’technical application ability has become the main teaching objective of engineering d... The emergence of new engineering disciplines has resulted in the growing trend of cross-discipline,and the enhancement of students’technical application ability has become the main teaching objective of engineering disciplines.For this reason,the Internet of Things(IoT)engineering program should be actively reformed,providing students with sufficient opportunities to improve their practical skills.This paper identifies the challenges within practical teaching of IoT engineering,delves into effective strategies for practical IoT teaching within the context of emerging engineering disciplines,and presents practical teaching experiences from the School of Information Engineering at Hainan University of Science and Technology as a case study.The aim is to offer guidance and insights to educators in this field. 展开更多
关键词 New engineering background internet of things engineering major Practice teaching
下载PDF
Deep Transfer Learning Techniques in Intrusion Detection System-Internet of Vehicles: A State-of-the-Art Review
13
作者 Wufei Wu Javad Hassannataj Joloudari +8 位作者 Senthil Kumar Jagatheesaperumal Kandala N.V.P.SRajesh Silvia Gaftandzhieva Sadiq Hussain Rahimullah Rabih Najibullah Haqjoo Mobeen Nazar Hamed Vahdat-Nejad Rositsa Doneva 《Computers, Materials & Continua》 SCIE EI 2024年第8期2785-2813,共29页
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accide... The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks. 展开更多
关键词 Cyber-attacks internet of things internet of vehicles intrusion detection system
下载PDF
Research on the Construction of Group Elderly Care Service Platform Based on IoT Technology
14
作者 Jialu Li Jianan Weng Weiming Tian 《Journal of Electronic Research and Application》 2024年第2期68-73,共6页
Internet of Things(IoT)technology is widely used in various fields,and its application in elderly care services has been highlighted in recent years.This study aims to explore how IoT technology can improve the effici... Internet of Things(IoT)technology is widely used in various fields,and its application in elderly care services has been highlighted in recent years.This study aims to explore how IoT technology can improve the efficiency of group-based elderly care services.The concept,characteristics,and current application status of IoT technology in elderly care services were introduced.Secondly,the characteristics and needs of group elderly care services were analyzed,including advantages and challenges,as well as the expectations and needs of the elderly for elderly care services.The evaluation methods and future development directions of IoT technology in improving the efficiency of group elderly care services were discussed,including data collection and analysis methods,selection and measurement of efficiency evaluation indicators,challenges,and development directions. 展开更多
关键词 internet of things technology Group-based elderly care services Efficiency improvement
下载PDF
Street Lamp Status Warning System Based on Internet of Things Technology
15
作者 Hanli Wang Yuanzhi Liu Yilin Wu 《Journal of Electronic Research and Application》 2024年第4期154-160,共7页
This paper proposes a street light warning system based on Internet of Things(IoT)technology,which uses cameras to detect moving targets such as vehicles and pedestrians around the system and adjust the brightness of ... This paper proposes a street light warning system based on Internet of Things(IoT)technology,which uses cameras to detect moving targets such as vehicles and pedestrians around the system and adjust the brightness of street lights according to road conditions to reduce unnecessary power waste.The system has a mature self-fault detection mechanism and is equipped with a wireless communication device for data exchange and timely communication with the host computer terminal.The intelligent street lamp system in this paper can be used to reduce the occurrence of pedestrian and vehicle accidents at intersections,and at the same time reduce the consumption of manpower and material resources for street lamp troubleshooting,to achieve energy conservation and emission reduction. 展开更多
关键词 internet of things Early warning system Intelligent transportation
下载PDF
Multidiscipline Applications of Triboelectric Nanogenerators for the Intelligent Era of Internet of Things 被引量:4
16
作者 Xiaole Cao Yao Xiong +3 位作者 Jia Sun Xiaoyin Xie Qijun Sun Zhong Lin Wang 《Nano-Micro Letters》 SCIE EI CAS CSCD 2023年第1期252-292,共41页
In the era of 5G and the Internet of things(IoTs),vari-ous human-computer interaction systems based on the integration of triboelectric nanogenerators(TENGs)and IoTs technologies dem-onstrate the feasibility of sustai... In the era of 5G and the Internet of things(IoTs),vari-ous human-computer interaction systems based on the integration of triboelectric nanogenerators(TENGs)and IoTs technologies dem-onstrate the feasibility of sustainable and self-powered functional systems.The rapid development of intelligent applications of IoTs based on TENGs mainly relies on supplying the harvested mechanical energy from surroundings and implementing active sensing,which have greatly changed the way of human production and daily life.This review mainly introduced the TENG applications in multidisci-pline scenarios of IoTs,including smart agriculture,smart industry,smart city,emergency monitoring,and machine learning-assisted artificial intelligence applications.The challenges and future research directions of TENG toward IoTs have also been proposed.The exten-sive developments and applications of TENG will push forward the IoTs into an energy autonomy fashion. 展开更多
关键词 Triboelectric nanogenerator Self-powered sensor internet of things Artificial intelligence Machine learning
下载PDF
Smart object recommendation based on topic learning and joint features in the social internet of things 被引量:1
17
作者 Hongfei Zhang Li Zhu +4 位作者 Tao Dai Liwen Zhang Xi Feng Li Zhang Kaiqi Zhang 《Digital Communications and Networks》 SCIE CSCD 2023年第1期22-32,共11页
With the extensive integration of the Internet,social networks and the internet of things,the social internet of things has increasingly become a significant research issue.In the social internet of things application... With the extensive integration of the Internet,social networks and the internet of things,the social internet of things has increasingly become a significant research issue.In the social internet of things application scenario,one of the greatest challenges is how to accurately recommend or match smart objects for users with massive resources.Although a variety of recommendation algorithms have been employed in this field,they ignore the massive text resources in the social internet of things,which can effectively improve the effect of recommendation.In this paper,a smart object recommendation approach named object recommendation based on topic learning and joint features is proposed.The proposed approach extracts and calculates topics and service relevant features of texts related to smart objects and introduces the“thing-thing”relationship information in the internet of things to improve the effect of recommendation.Experiments show that the proposed approach enables higher accuracy compared to the existing recommendation methods. 展开更多
关键词 Social internet of things Smart object recommendation Topics Features Thing-thing relationship
下载PDF
Technologies Behind the Smart Grid and Internet of Things: A System Survey 被引量:1
18
作者 Kuldeep Sharma Arun Malik +3 位作者 Isha Batra A.S.M.Sanwar Hosen Md Abdul Latif Sarker Dong Seog Han 《Computers, Materials & Continua》 SCIE EI 2023年第6期5049-5072,共24页
Electric smart grids enable a bidirectional flow of electricity and information among power system assets.For proper monitoring and con-trolling of power quality,reliability,scalability and flexibility,there is a need... Electric smart grids enable a bidirectional flow of electricity and information among power system assets.For proper monitoring and con-trolling of power quality,reliability,scalability and flexibility,there is a need for an environmentally friendly system that is transparent,sustainable,cost-saving,energy-efficient,agile and secure.This paper provides an overview of the emerging technologies behind smart grids and the internet of things.The dependent variables are identified by analyzing the electricity consumption patterns for optimal utilization and planning preventive maintenance of their legacy assets like power distribution transformers with real-time parameters to ensure an uninterrupted and reliable power supply.In addition,the paper sorts out challenges in the traditional or legacy electricity grid,power generation,transmission,distribution,and revenue management challenges such as reduc-ing aggregate technical and commercial loss by reforming the existing manual or semi-automatic techniques to fully smart or automatic systems.This article represents a concise review of research works in creating components of the smart grid like smart metering infrastructure for postpaid as well as in prepaid mode,internal structure comparison of advanced metering methods in present scenarios,and communication systems. 展开更多
关键词 Electricity consumption BIDIRECTIONAL advanced meter infrastructure energy internet of things smart grid smart meter
下载PDF
Time to forge ahead:The Internet of Things for healthcare 被引量:1
19
作者 Denzil Furtado Andre F.Gygax +1 位作者 Chien Aun Chan Ashley I.Bush 《Digital Communications and Networks》 SCIE CSCD 2023年第1期223-235,共13页
Situated at the intersection of technology and medicine,the Internet of Things(IoT)holds the promise of addressing some of healthcare's most pressing challenges,from medical error,to chronic drug shortages,to over... Situated at the intersection of technology and medicine,the Internet of Things(IoT)holds the promise of addressing some of healthcare's most pressing challenges,from medical error,to chronic drug shortages,to overburdened hospital systems,to dealing with the COVID-19 pandemic.However,despite considerable recent technological advances,the pace of successful implementation of promising IoT healthcare initiatives has been slow.To inspire more productive collaboration,we present here a simple—but surprisingly underrated—problemoriented approach to developing healthcare technologies.To further assist in this effort,we reviewed the various commercial,regulatory,social/cultural,and technological factors in the development of the IoT.We propose that fog computing—a technological paradigm wherein the burden of computing is shifted from a centralized cloud server closer to the data source—offers the greatest promise for building a robust and scalable healthcare IoT ecosystem.To this end,we explore the key enabling technologies that underpin the fog architecture,from the sensing layer all the way up to the cloud.It is our hope that ongoing advances in sensing,communications,cryptography,storage,machine learning,and artificial intelligence will be leveraged in meaningful ways to generate unprecedented medical intelligence and thus drive improvements in the health of many people. 展开更多
关键词 internet of things Healthcare Information Fog computing Artificial intelligence Machine learning Big data COVID-19 pandemic
下载PDF
Efficient Certificateless Authenticated Key Agreement for Blockchain-Enabled Internet of Medical Things
20
作者 Chaoyang Li Yanbu Guo +4 位作者 Mianxiong Dong Gang Xu Xiu-Bo Chen Jian Li Kaoru Ota 《Computers, Materials & Continua》 SCIE EI 2023年第4期2043-2059,共17页
Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between differe... Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between different medical institutions and improved the utilization of medical data.However,some problems in the information transfer process between wireless medical devices and mobile medical apps,such as information leakage and privacy disclosure.This paper first designs a cross-device key agreement model for blockchain-enabled IoMT.This model can establish a key agreement mechanism for secure medical data sharing.Meanwhile,a certificateless authenticated key agreement(KA)protocol has been proposed to strengthen the information transfer security in the cross-device key agreement model.The proposed KA protocol only requires one exchange of messages between the two parties,which can improve the protocol execution efficiency.Then,any unauthorized tampering of the transmitted signed message sent by the sender can be detected by the receiver,so this can guarantee the success of the establishment of a session key between the strange entities.The blockchain ledger can ensure that the medical data cannot be tampered with,and the certificateless mechanism can weaken the key escrow problem.Moreover,the security proof and performance analysis are given,which show that the proposed model and KA protocol are more secure and efficient than other schemes in similar literature. 展开更多
关键词 CERTIFICATELESS key agreement authentication blockchain internet of medical things
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部