共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
从Internet发展历史及应用环境变化的角度讨论IoT(Internet of Things)提出背景、内涵、组成结构和体系结构等关键问题。在分析对IoT的典型定义的基础上,笔者认为“ITU把IoT作为Internet平台在应用领域实现人、机、和智能化物理对象(SPO)信息全方位互通和实践普适计算理念的下一代Internet及其应用系统的概括”是对IoT更为合理的广义定义。以该定义为基础,全面地分析了“由多个用户域网(CPN)通过骨干通信子网互联”的基本组成结构,讨论了两类SPO CPN的基本组成结构及其支撑技术;指出SPO的引入主要影响CPN资源网络中的接入部分,属于应用系统的范畴,对Internet基本技术影响甚微。笔者不赞同以欧盟为代表的把IoT定义为联物专用网的狭义定义,指出其IoT模型和体系结构研究混淆了网络平台与应用系统,实质上是网络应用系统模型和体系结构。 相似文献
3.
"2002年,物联网的概念由AUTO-ID中国实验室引入中国,当时知道这个概念的人局限在为数不多的业内专家。在物联网广受大众追捧的今天,闵昊教授对物联网却持有理性而冷静的态度:同其他产业一样,物联网要在明晰的商业模式下,由市场驱动要在应用中体现出其价值进而获得发展。同时,闵昊教授还对物联网和RFID产业的发展给出了中肯客观的建议。 相似文献
4.
Antonio J. Jara María Concepción Parra Antonio F. Skarmeta 《Personal and Ubiquitous Computing》2014,18(4):997-1011
Internet of things extends the capabilities to identify products with new technologies such as near field communication, radio-frequency identification, quick response code and with existing identification technologies such as barcode. Identification allows to retrieve extended information and knowledge of the products. Thereby, customers are able to retrieve and share knowledge among the different products. This work presents the participative marketing as the evolution from the social media marketing toward the active participation from the prosumers and the empowerment of the marketing with the collective intelligence. Thereby, participative marketing enables new interaction and participation models based on the ubiquitous identification. This has been evaluated in a social platform, which integrates the knowledge and experiences from the customers, and in a mobile platform, which interacts with the products through the mentioned identification technologies. 相似文献
5.
Diego Mendez Mena Ioannis Papapanagiotou Baijian Yang 《Information Security Journal: A Global Perspective》2018,27(3):162-182
The Internet of things (IoT) is intended for ubiquitous connectivity among different entities or “things”. While it provides effective and efficient solutions to many real world challenges, the security aspect of it has always been questioned. The situation is further exacerbated by the number of connected devices growing exponentially. As a result, security and privacy has emerged as a significant challenge for the IoT. In this paper, we aim to provide a thorough survey on IoT security and privacy challenges from the perspective of technologies and architecture used. This work focuses on IoT intrinsic vulnerabilities and their implications to the fundamental information security challenges in confidentiality, integrity, and availability. The approach of this survey is to summarize and synthesize published work in IoT; relate it to the security conjuncture of the field; and project future research directions. 相似文献
6.
Given a real world graph, how can we find a large subgraph whose partition quality is much better than the original? How can we use a partition of that subgraph to discover a high quality global partition? Although graph partitioning especially with balanced sizes has received attentions in various applications, it is known NP-hard, and also known that there is no good cut at a large scale for real graphs. In this paper, we propose a novel approach for graph partitioning. Our first focus is on finding a large subgraph with high quality partitions, in terms of conductance. Despite the difficulty of the task for the whole graph, we observe that there is a large connected subgraph whose partition quality is much better than the original. Our proposed method MTP finds such a subgraph by removing “hub” nodes with large degrees, and taking the remaining giant connected component. Further, we extend MTP to gb MTP (Global Balanced MTP) for discovering a global balanced partition. gb MTP attaches the excluded nodes in MTP to the partition found by MTP in a greedy way. In experiments, we demonstrate that MTP finds a subgraph of a large size with low conductance graph partitions, compared with competing methods. We also show that the competitors cannot find connected subgraphs while our method does, by construction. This improvement in partition quality for the subgraph is especially noticeable for large scale cuts—for a balanced partition, down to 14 % of the original conductance with the subgraph size 70 % of the total. As a result, the found subgraph has clear partitions at almost all scales compared with the original. Moreover, gb MTP generally discovers global balanced partitions whose conductance are lower than those found by METIS, the state-of-the-art graph partitioning method. 相似文献
7.
8.
Lee Humphreys Thilo Von Pape Veronika Karnowski 《Journal of Computer-Mediated Communication》2013,18(4):491-507
Technological convergence has led to the ability to access the internet from a variety of mobile devices. Drawing on the Mobile Phone Appropriation Model (Wirth, von Pape & Karnowski, 2008), we sought to understand how people conceptualize and use the mobile internet by conducting semistructured interviews with 21 mobile internet users, half American and half German in order to explore cross-cultural differences. Findings suggest little cross-cultural difference in use and understanding of the mobile Internet. Users do not perceive the act of “going online” as a significant step, even if it is on a mobile device. They do, however, distinguish between different ways of consuming information online (extractive and immersive), relating them to different situations and devices. 相似文献
9.
Mitsuru Kodama 《Creativity & Innovation Management》2001,10(2):75-87
This paper describes strategic community management that can be implemented by large established companies through the creation of a variety of strategic business communities. The paper focuses in particular on the case of NTT DoCoMo, Inc., Japan’s largest mobile telecommunications carrier, which has utilized strategic community management principles in their efforts to cultivate and expand the mobile Internet market in Japan over roughly the past two years. This paper also deals with the development of an emerging mobile Internet market spawned by the creation of strategic communities supported by strategic communities which consist of informal in‐house organizations and diverse strategic heterogeneous alliances with outside firms including customers, and elucidates strategic community management as an effective methodology aimed at strategic innovation conducted by major enterprises. 相似文献
10.
11.
12.
从信息安全的机密性、完整性和可用性等三个基本属性出发,分析了物联网安全需求和面临的安全问题,提出了物联网安全的系统架构,并对一些安全关键技术进行了深入研究,希望为建立物联网可靠的信息安全体系提供参考依据。 相似文献
13.
14.
交通物联网的发展现状及趋势研究 总被引:1,自引:0,他引:1
针对交通物联网(即物联网在交通运输行业中的应用)发展的现状和趋势进行了研究, 在分析了国外IntelliDrive、eSafety和Smartway等项目以及国内主要交通物联网系统的基础上, 从安全性、环保型、移动性三个方面讨论了国内外交通物联网发展的异同点, 并进一步探讨了交通物联网未来的发展和应用前景, 即在充分利用车路协同技术来提高交通安全水平的同时, 加快交通物联网与云计算的结合, 构建交通运输云, 在统一的交通物联网标准体系和适宜的交通物联网运营模式下, 建立起综合开放的交通运输信息系统。 相似文献
15.
物联网技术的研究综述 总被引:1,自引:0,他引:1
物联网打破了将物理基础设施和IT基础设施分开的传统思维,是信息领域一次重大的发展和变革机遇。物联网涉及众多领域,当前国内外的研究和开发都还处于起步阶段。对物联网研究的现实基础以及关键问题展开了讨论,介绍了物联网的四种具有代表性的定义和三种关键性的基本特征;分析了基于RFID的物联网应用架构、基于泛在传感网的物联网应用架构和基于M2M的物联网应用架构;给出了大致被公认为的四个层次的物联网关键技术框架;最后描述了物联网的典型应用领域。 相似文献
16.
17.
《International journal of human-computer interaction》2013,29(3):269-292
The mobile Internet, which gives access to the World Wide Web through a mobile device, has been gaining in popularity. The mobile Internet differs from the traditional stationary Internet in that it can be used in a wider variety of contexts. However, no studies have identified the contexts in which mobile Internet services are used most frequently, or determined which contexts exert significant influence on a user's choice of mobile service. This article proposes a framework of use contexts that reflects the characteristics of the mobile Internet. To explore these contexts, a research method was devised and a longitudinal monitoring study was conducted. The results indicate that mobile Internet use is heavily clustered around a few key contexts, rather than dispersed widely over diverse contexts. Further, participants in the monitoring study were found to concentrate their use on a few mobile services, rather than on exploring diverse services. Perhaps most interestingly, some contextual factors were found to correlate closely with the selection of specific mobile Internet services. On the basis of these results, the article concludes with implications for developers of mobile Internet services. 相似文献
18.
继计算机、互联网之后,物联网技术带来了第三次世界范围内的信息产业浪潮,越来越成为全球关注的焦点,将给人们的生产和生活方式带来深刻的变革。物联网在带来诸多便利的同时,也给信息技术领域带来新的挑战。本文介绍了物联网的概念、基本特征、关键技术,并讨论了物联网技术在应用的过程中必须解决的问题。 相似文献
19.
物联网与云计算是目前信息技术的研究热点,探讨数据挖掘在其中扮演的角色,以及与这2项技术相结合的方式.分析了数据挖掘在物联网中的地位和作用,指出了云计算是物联网的基石,剖析了分布式数据挖掘与并行数据挖掘的异同,说明了物联网中数据挖掘服务的提供方式. 相似文献
20.
李振 《网络安全技术与应用》2014,(9):107-107
随着通信应用网络的不断发展,物联网成为了新兴的应用网络,其核心技术主要是分布到RFID、嵌入式软件以及传榆数据和传感器的计算领域上.其中嵌入式技术属于关键部分,相当于人的大脑和中枢神经,直接对物联网中的信息进行传输与处理.本文分别对物联网和嵌入式技术进行阐述,并分析了两者的区别与联系. 相似文献