首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 7 毫秒
1.
Wireless Personal Communications - With increasing population, urbanization, energy, transportation, and agricultural developments, pollution is degrading the environment with ever-increasing pace....  相似文献   

2.
Wireless Personal Communications - Object tracking is a fundamental problem in Supply Chain Management (SCM). Recent innovations eliminate the difficulties in traditional approach such as manual...  相似文献   

3.
Wireless Personal Communications - During recent years, one of the most familiar names scaling new heights and creating a benchmark in the world is the Internet of Things (IoT). It is indeed the...  相似文献   

4.
Wireless Personal Communications - This paper presents Carbon Nanotube FET (CNFET) based ultra-low-power Schmitt trigger SRAM designs which can operate at voltage levels as low as 200 mV, with high...  相似文献   

5.
Advances in hardware, software, communication, embedding computing technologies along with their decreasing costs and increasing performance have led to the emergence of the Internet of Things (IoT) paradigm. Today, several billions of Internet‐connected devices are part of the IoT ecosystem. IoT devices have become an integral part of the information and communication technology (ICT) infrastructure that supports many of our daily activities. The security of these IoT devices has been receiving a lot of attention in recent years. Another major recent trend is the amount of data that is being produced every day which has reignited interest in technologies such as machine learning and artificial intelligence. We investigate the potential of machine learning techniques in enhancing the security of IoT devices. We focus on the deployment of supervised, unsupervised learning techniques, and reinforcement learning for both host‐based and network‐based security solutions in the IoT environment. Finally, we discuss some of the challenges of machine learning techniques that need to be addressed in order to effectively implement and deploy them so that they can better protect IoT devices.  相似文献   

6.
Mobile Networks and Applications - To address the challenges of flexible device utilization, heterogeneous device interoperability, and security enhancement in smart homes, this paper proposes a...  相似文献   

7.
近年来,物联网受到了世界各国政府和研究人员的高度关注,已在物流、军事、智能家居、环境监测、安全生产等众多领域得到了广泛的应用,取得了良好的社会效益和经济效益。基于物联网技术的智能家居是为了满足用户需求,为他们提供更好的家居生活体验。  相似文献   

8.
雍蓉 《电子测试》2022,(4):49-51
智慧家居可以为日常生活提供诸多便利,从根本实现语音控制与远程控制,但由于以往在设计智慧家居时,仅通过网络将智慧家居与移动终端相互连接,这种方式的结构过于单一,连接效果并不理想,长期如此,必然会降低智慧家居对于社会大众的吸引力.基于此,本文以异构物联网为基础,首先阐述了智能家居平台的结构和功能,然后指出了基于异构物联网的...  相似文献   

9.
Wireless Personal Communications - Privacy issue has become a crucial concern in internet of things (IoT) applications ranging from home appliances to vehicular networks. RFID system has found...  相似文献   

10.
Wireless Personal Communications - Nowadays traditional techniques of living and earning are being transformed to modern smart technologies, taking their inspiration from the emerging trends....  相似文献   

11.
Wireless Personal Communications - The Internet of Things (IoT) is a concept that has attracted significant attention since the emergence of wireless technology. The knowledge diffusion of IoT...  相似文献   

12.
Mobile Networks and Applications - The concept of cloud computing relies on central large datacentres with huge amounts of computational power. The rapidly growing Internet of Things with its vast...  相似文献   

13.
作为全球领先的国际物联网平台标准化组织,oneM2M在M2M(机器对机器)和IoT(物联网)标准制定方面发挥着不可替代的作用。文章介绍oneM2M的成立过程、发起组织、业务范围和工作模式,描述包含指导委员会和技术全会在内的oneM2M组织架构,归纳oneM2M已经发布的第3版技术报告详细信息,列举oneM2M已发布技术规范最新版的编号、名称、最新版本和发布时间等信息。  相似文献   

14.
The role of investors in the growth of startups has been continuously studied. Our paper complements this stream of research by adding a new role of the investor in the Internet of Things (IoT) field, as a channel of knowledge sharing among startups. The relationship between “Internet of Things” startups located in the US and its investors leads to technology convergence as a result of knowledge sharing from investors. Using network analysis and a co-occurrence method, we find that investors in the IoT field play an intermediate role connecting startups by forming an ideal topology for knowledge sharing among them in the IoT industry. IoT startups having investors and more connections to other startups show greater technology convergence. Based on the above findings, this study argues that technology convergence occurs in the venture network as a result of investors playing the role of a channel of knowledge flow.  相似文献   

15.
16.
文章对物联网技术在智慧城市建设中的应用进行了详细的分析,阐述了物联网的几大关键性技术,同时分别对智慧交通、智能电网、智慧物流、智慧医疗、智慧家居、智慧环保几个智慧城市的成熟应用模块进行了介绍。  相似文献   

17.
物联网与SOA在智慧城市的应用研究   总被引:1,自引:0,他引:1  
分析了我国智慧城市目前的关注领域、面临挑战、建设重点和支撑技术,提出了智慧城市总体参考模型,着重分析了物联网、SOA两项重要支撑技术在智慧城市建设中的作用,并根据我国智慧城市建设的实际需求从标准化角度提出了相关建议和展望。  相似文献   

18.
物联网是动态的网络基础设施,它具有基于标准和互操作通信协议的自组织能力,其中物理的和虚拟的身份标识、物理属性、虚拟的特性和智能的接口,并与信息网络无缝整合。物联网将与媒体互联网、服务互联网和企业互联网一道,构成未来互联网。随着国民经济的快速发展和人们生活水平的日益提高,人们对住宅园区的智能化要求也越来越高。多网融合技术和Zigbee技术做为目前智能园区的指导技术,可以更好地适应园区网络高有效性和高可靠性的要求。本文在研究多网融合技术和Zigbee技术特点的基础上,结合物联网特点,综合分析物联网下的智能园区安全现状。  相似文献   

19.
The 5th generation mobile communications aims at connecting everything and future Internet of Things(IoT)will get everything smartly connected.To realize it,there exist many challenges.One key challenge is the battery problem for small devices,such as sensors or tags.Batteryless backscatter,also referred to as or battery-free backscatter,is a new potential technology to address this problem.One early and typical type of batteryless backscatter is ambient backscatter.Generally,batteryless backscatter utilizes environmental wireless signals to enable battery-free devices to communicate with each other.These devices first harvest energy from ambient wireless signals and then backscatter these signals so as to transmit their own information.This paper reviews the current studies about batteryless backscatter,including various backscatter schemes and theoretical works,and then introduces open problems for future research.  相似文献   

20.

In the century of automation, which is digitized, and more and more technology is used, automatic systems' replacement of old manual systems makes people's lives easier. Nowadays, people have made the Internet an integral part of humans' daily lives unless they are insecure. The Internet of Things (IoT) secures a platform that authorizes devices and sensors to be remotely detected, connected, and controlled over the Internet. Due to the developments in sensor technologies, the production of tiny and low-cost sensors has increased. Many sensors, such as temperature, pressure, vibration, sound, light, can be used in the IoT. As a result of the development of these sensors with new generations, the power of the IoT technology increases, and accordingly, the revolution of IoT applications are developing rapidly. Therefore, their security issues and threats are challenging topics. In this paper, the benefits and open issues, threats, limitations of IoT applications are presented. The assessment shows that the most influential factor for evaluating IoT applications is the cost that is used in 79% of all articles, then the real-time-ness that is used in 64%, and security and error are used in 57% of all reviewed articles.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号