共查询到20条相似文献,搜索用时 0 毫秒
1.
The Journal of Supercomputing - This study is to explore the smart city information (SCI) processing technology based on the Internet of Things (IoT) and cloud computing, promoting the construction... 相似文献
3.
The time management model for event processing in internet of things has a special and important requirement. Many events in real world applications are long-lasting events which have different time granularity with order or out-of-order. The temporal relationships among those events are often complex. An important issue of complex event processing is to extract patterns from event streams to support decision making in real-time. However, current time management model does not consider the unified solution about time granularity, time interval, time disorder, and the difference between workday calendar systems in different organizations. In this work, we analyze the preliminaries of temporal semantics of events. A tree-plan model of out-of-order durable events is proposed. A hybrid solution is correspondingly introduced. A case study is illustrated to explain the time constraints and the time optimization. Extensive experimental studies demonstrate the efficiency of our approach. 相似文献
4.
IoT (Internet of Things) real paper uses sensors and interfaces inevitably grasp the virtual digital world. For VIoT video surveillance, ChD (Change Detection) is an essential component. Time calculating the difference between the numbers of various ChD recorded in the video monitor progress span similar scene pattern. The histogram threshold is dependent on the data set in this document, and checking performed using highlight significant for video surveillance and VIoT calculation order ChD weighed. In the 21st century, heftiness is the most common and true happiness difficult, as the World Health Organization (WHO) says is a risk of personal life. In this case, the priority is set in a family environment, and controlling overweight children's heftiness reduces good tendencies. In other words, this is a good thing; a little bit of effort has been a healthy way of life, focused on helping parents in advance. This paper warned of two brilliant gadget models to promote stability and prevent overweight adolescent's reliable behavior. The separated data may be clients, engineers, and creators who enhance management in these gadgets, useful activities, and progress. In both cases, the data can be used to negotiate a free Internet safely and protect the age thing. In this work, the only convenient AI applications that rely on the phone's sensor information also appear. It also illustrates the use of similar sensors and similar calculation of abnormal side-channel attacks. 相似文献
5.
The Journal of Supercomputing - “Industry 4.0”, namely intelligent manufacturing (IM), includes intelligent production (IP) and smart factory (SF). The study aims to improve the... 相似文献
6.
The application of intelligent computing in Internet of Things (IoTs) makes IoTs systems such as telemedicine, in-vehicle IoT, and smart home more intelligent and efficient. Secure communication and secure resource sharing among intelligent terminals are essential. A secure communication channel for intelligent terminals can be established through group key agreement (GKA), thereby ensuring the security communication and resource sharing for intelligent terminals. Taking into account the confidentiality level of the shared resources of each terminal, and the different permissions of the resource sharing of each terminal, a GKA protocol for intelligent IoTs is proposed. Compared with previous work, this protocol mainly has the following advantages: (1) The hidden attribute identity authentication technology can achieve the security of identity authentication and protect personal privacy from being leaked; (2) Only intelligent terminals satisfying the threshold required of the GKA can participate in the GKA, which increases the security of group communication; (3) Low-level group terminals can obtain new permissions to participate in high-level group communication if they meet certain conditions. High-level group terminals can participate in low-level group communication through permission authentication, which increases the flexibility and security of group communication; (4) The intelligent terminals in the group can use their own attribute permission parameters to calculate the group key. They can verify the correctness of the calculated group key through a functional relationship, and does not need to exchange information with other members in the same group. Under the hardness assumption of inverse computational Diffie-Hellman problem and discrete logarithm problem, it is proven that the protocol has high security, and compared with the cited literatures, it has good advantages in terms of computational complexity, time cost and communication energy cost. 相似文献
7.
边缘是图像最基本的特征,它包含对人类视觉和机器视觉有价值的物体边缘信息,边缘是图像中特性(如像素灰度、纹理等)分布不连续处,图像周围特性有阶跃变化或屋脊变幻的那些像素的集合。由于采集、光照等原因,尿液红细胞所在的区域包含非常丰富的细节(边缘特征很明显),本文利用Sobel算法,对比Roberts算法,然后对图像进行细化,以达到对红细胞进行边缘检测的目的。 相似文献
9.
从互联网到物联网是一个必然的趋势,物联网技术必将促进科技基础设施的智能管理和数据共享.物联网技术主要利用各种传感器采集设备的各种运行状态,并且通过射频技术传到云端或者其他数据共享中心进行处理.由于涉及到无线传输,必定会涉及到数据传输的可靠性问题,如果设备的信号未能实时地到达数据共享中心,则可能影响到该设备的智能管理.鉴于此,将科学基础设施系统简化为一个非线性多态系统,建立一个初步模型,分析利用物联网技术进行科技基础设施智能管理的可靠性.对该系统建立基于多值决策图的可靠性建模流程,并分析多值决策图中计算最大节点数和最大路径数的计算复杂度.最后通过示例演示了所建立的多值决策图可靠性的计算步骤. 相似文献
10.
Multimedia Tools and Applications - Hyperspectral image(HSI) anomaly detection, as one of the hottest topics in current remote sensing information processing and image processing,has important... 相似文献
12.
One of the most common attacks is man-in-the-middle (MitM) which, due to its complex behaviour, is difficult to detect by traditional cyber-attack detection systems. MitM attacks on internet of things systems take advantage of special features of the protocols and cause system disruptions, making them invisible to legitimate elements. In this work, an intrusion detection system (IDS), where intelligent models can be deployed, is the approach to detect this type of attack considering network alterations. Therefore, this paper presents a novel method to develop the intelligent model used by the IDS, being this method based on a hybrid process. The first stage of the process implements a feature extraction method, while the second one applies different supervised classification techniques, both over a message queuing telemetry transport (MQTT) dataset compiled by authors in previous works. The contribution shows excellent performance for any compared classification methods. Likewise, the best results are obtained using the method with the highest computational cost. Thanks to this, a functional IDS will be able to prevent MQTT attacks. 相似文献
13.
针对目前因酒驾造成的交通事故频发问题,提出了一种基于物联网的车载酒驾自动检测系统。该系统利用物联网技术,以STC12C5A16AD单片机为核心,通过4路MQ-3传感器来检测车内驾驶员是否酒驾。当系统检测到酒精浓度超标时,系统发出声光报警并禁止汽车发动,同时通过GPRS模块进行车辆定位,并将信息发送给家人和当地交通部门。实验结果表明,该系统检测灵敏度和准确率高,能有效预防酒后驾车,具有很好的实用价值。 相似文献
14.
The Journal of Supercomputing - Threat problem has become more complex in the industrial environment due to the need to secure a large number of devices from attack while maintaining system... 相似文献
15.
为解决传统裂缝检测工作效率低、危险系数高、耗时较长及检测精度低等问题,提出一种大型建筑物远距离裂缝检测智能平台方案,该方案基于深度学习和图像处理建立裂缝检测算法模型,采集图像后上传至云端,以用户终端设备为载体,通过微信小程序和后端服务器的交互获取裂缝相关信息,服务器实现裂缝检测模型的实时检测,裂缝数据存储于云端。经过对算法部分的图像分类模型与图像分割模型进行测试,分类模型精确率、召回率、F值均超过92%,分割模型平均交并比MIoU超过89%,满足检测需要。经验证该方案切实可行。 相似文献
16.
With the rapid growth of massive data in the Internet of Multimedia Things, there are some problems of insufficient storage space and unbalanced load in the current methods. For the problem of massive real-time data storage, a distributed cluster storage optimization method is proposed. Considering the impact of replica cost and the generation of intermediate data on the replica layout, a replica generation and storage strategy is given with consideration of cost and storage space. In the data center, the data sensitivity and data access frequency is used as migration factors to achieve massive data migration. The improved collaborative evolution method is used to code the task scheduling particle swarm in massive data storage to obtain the optimal solution, and achieve massive real-time data distributed cluster storage for the Internet of things. The experimental results showed that the cost of data management by this method was only between 10 and 15, which showed that this method can effectively improve data access speed, reduce storage space, lower cost and better load balancing. 相似文献
17.
Research on the analysis of reinforcing bar images has been conducted to count reinforcing bars moving along a conveyor belt at a bar production plant. It is relatively easy to analyze images at the plant, where the environment and light sources can be tightly controlled. At construction sites, the characteristics of images vary greatly depending on the environment, time of image acquisition, and weather conditions. Therefore, a method for correctly segregating the reinforcing bar area is needed. In this paper, we propose an automatic reinforcing bar image analysis system based on machine learning. Our proposed system accurately separates the bar area from the background and counts the number of bars in the image. Compared with existing method, the proposed system performs better on detection of reinforcing bars. 相似文献
18.
<正>随着物联网概念的持续升温,越来越多的厂商将物联网领域纳入自己的发展蓝图。研华公司的发展规划中,物联网是重要的一项战略布局,并且致力于推动整个物联网产业的发展和深耕。在刚刚结束的2010年中国国际工业博览会工业自 相似文献
20.
设计了纺纱断线在线检测的嵌入式系统。提出了采用CCD摄像头采集图像信息,运用编解码技术和FIFO缓存实现数据的高效、稳定传输。选择内嵌ARM和DSP的达芬奇双内核构架芯片TMS320DM6446来控制系统外围设备并进行图像处理,其中ARM负责系统的控制,DSP负责有关图像处理算法的运算。该系统将图像处理技术和嵌入式技术应用在纺纱断线检测领域,实现了高实时性、高稳定性、低成本的纺纱断线检测和控制系统。 相似文献
|