期刊文献+
共找到1,747篇文章
< 1 2 88 >
每页显示 20 50 100
MADCR:Mobility Aware Dynamic Clustering-Based Routing Protocol in Internet of Vehicles 被引量:4
1
作者 Sankar Sennan Somula Ramasubbareddy +3 位作者 Sathiyabhama Balasubramaniyam Anand Nayyar Chaker Abdelaziz Kerrache Muhammad Bilal 《China Communications》 SCIE CSCD 2021年第7期69-85,共17页
Internet of Vehicles(IoV)is an evolution of the Internet of Things(IoT)to improve the capabilities of vehicular ad-hoc networks(VANETs)in intelligence transport systems.The network topology in IoV paradigm is highly d... Internet of Vehicles(IoV)is an evolution of the Internet of Things(IoT)to improve the capabilities of vehicular ad-hoc networks(VANETs)in intelligence transport systems.The network topology in IoV paradigm is highly dynamic.Clustering is one of the promising solutions to maintain the route stability in the dynamic network.However,existing algorithms consume a considerable amount of time in the cluster head(CH)selection process.Thus,this study proposes a mobility aware dynamic clustering-based routing(MADCR)protocol in IoV to maximize the lifespan of networks and reduce the end-to-end delay of vehicles.The MADCR protocol consists of cluster formation and CH selection processes.A cluster is formed on the basis of Euclidean distance.The CH is then chosen using the mayfly optimization algorithm(MOA).The CH subsequently receives vehicle data and forwards such data to the Road Side Unit(RSU).The performance of the MADCR protocol is compared with that ofAnt Colony Optimization(ACO),Comprehensive Learning Particle Swarm Optimization(CLPSO),and Clustering Algorithm for Internet of Vehicles based on Dragonfly Optimizer(CAVDO).The proposed MADCR protocol decreases the end-toend delay by 5–80 ms and increases the packet delivery ratio by 5%–15%. 展开更多
关键词 clustering protocol internet of things internet of vehicles optimization algorithm Mayfly algorithm
下载PDF
Implementation of Machine-to-Machine Solutions Using MQTT Protocol in Internet of Things (IoT) Environment to Improve Automation Process for Electrical Distribution Substations in Colombia 被引量:1
2
作者 Hermes Eslava Luis Alejandro Rojas Ramón Pereira 《Journal of Power and Energy Engineering》 2015年第4期92-96,共5页
In order to incorporate smart elements into distribution networks at ITELCA laboratories in Bogotá-Colombia, a Machine-to-Machine-based solution has been developed. This solution aids in the process of low-cost e... In order to incorporate smart elements into distribution networks at ITELCA laboratories in Bogotá-Colombia, a Machine-to-Machine-based solution has been developed. This solution aids in the process of low-cost electrical fault location, which contributes to improving quality of service, particularly by shortening interruption time spans in mid-voltage grids. The implementation makes use of MQTT protocol with an intensive use of Internet of things (IoT) environment which guarantees the following properties within the automation process: Advanced reports and statistics, remote command execution on one or more units (groups of units), detailed monitoring of remote units and custom alarm mechanism and firmware upgrade on one or more units (groups of units). This kind of implementation is the first one in Colombia and it is able to automatically recover from an N-1 fault. 展开更多
关键词 MACHINE to MACHINE Quality of Service Distribution Grids MQTT protocol internet of THINGS (IoT) ENVIRONMENT ELECTRICAL Energy
下载PDF
Testing and Analysis of VoIPv6 (Voice over Internet Protocol V6) Performance Using FreeBSD
3
作者 Asaad A. Abusin M. D. Jahangir Alam Junaidi Abdullah 《International Journal of Communications, Network and System Sciences》 2012年第5期298-302,共5页
This study focuses on testing and quality measurement and analysis of VoIPv6 performance. A client, server codes were developed using FreeBSD. This is a step before analyzing the Architectures of VoIPv6 in the current... This study focuses on testing and quality measurement and analysis of VoIPv6 performance. A client, server codes were developed using FreeBSD. This is a step before analyzing the Architectures of VoIPv6 in the current internet in order for it to cope with IPv6 traffic transmission requirements in general and specifically voice traffic, which is being attracting the efforts of research, bodes currently. These tests were conducted in the application level without looking into the network level of the network. VoIPv6 performance tests were conducted in the current tunneled and native IPv6 aiming for better end-to-end VoIPv6 performance. The results obtained in this study were shown in deferent codec's for different bit rates in Kilo bits per second, which act as an indicator for the better performance of G.711 compared with the rest of the tested codes. 展开更多
关键词 VoIPv6 (Voice OVER internet protocol V6) PERFORMANCE VOICE OVER internet protocol V6 PERFORMANCE Testing VOICE OVER internet protocol V6 PERFORMANCE Analysis VoIPv6 Quality Testing in the Application Level
下载PDF
Performance Evaluation of an Internet Protocol Security (IPSec) Based Multiprotocol Label Switching (MPLS) Virtual Private Network
4
作者 Conrad K. Simatimbe Smart Charles Lubobya 《Journal of Computer and Communications》 2020年第9期100-108,共9页
This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in d... This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in data networks has been increasing owing to the high cyber attacks and potential risks associated with networks spread over distant geographical locations. The MPLS networks ride on the public network backbone that is porous and highly susceptible to attacks and so the need for reliable security mechanisms to be part of the deployment plan. The evaluation criteria concentrated on Voice over Internet Protocol (VoIP) and Video conferencing with keen interest in jitter, end to end delivery and general data flow. This study used both structured questionnaire and observation methods. The structured questionnaire was administered to a group of 70 VPN users in a company. This provided the study with precise responses. The observation method was used in data simulations using OPNET Version 14.5 Simulation software. The results show that the IPSec features increase the size of data packets by approximately 9.98% translating into approximately 90.02% effectiveness. The tests showed that the performance metrics are all well within the recommended standards. The IPSec Based MPLS Virtual private network is more stable and secure than one without IPSec. 展开更多
关键词 Multiprotocol Label Switching internet protocol Security Virtual Private Network Video Conferencing Voice over internet protocol JITTER End to End Delay
下载PDF
Internet of Lamps for Future Ubiquitous Communications:Integrated Sensing,Hybrid Interconnection,and Intelligent Illumination
5
作者 Fubin Wang Xuan Huang +3 位作者 Fang Yang Hui Yang Jun Wang Jian Song 《China Communications》 SCIE CSCD 2022年第3期132-144,共13页
The ubiquitous deployment and restricted consumption are the requirements restricting the development of Internet of Things.Thus,a promising technology named Internet of Lamps(Io L)is discussed in this paper to addres... The ubiquitous deployment and restricted consumption are the requirements restricting the development of Internet of Things.Thus,a promising technology named Internet of Lamps(Io L)is discussed in this paper to address these challenges.Compared with other communication networks,the remarkable advantage of Io L is that it can make full use of the existing lighting networks with sufficient power supply.The lamps can be connected to the Internet through wired power line communication and/or wireless communication,while the integration of integrated sensing,hybrid interconnection,and intelligent illumination is realized.In this paper,the Io L is discussed from three aspects including sensing layer,network layer,and application layer,realizing the comprehensive upgrade based on the conventional communication and illumination systems.Meanwhile,several novel technologies of Io L are discussed based on the requirements of sensing,communication,and control,which have put forward practical solutions to the issues faced by Io L.Moreover,the challenges and opportunities for Io L are highlighted from various parts of the system structure,so as to provide future insights and potential trends for researchers in this field. 展开更多
关键词 internet of Lamps(IoL) integrated sensing hybrid interconnection intelligent illumination
下载PDF
LOA-RPL:Novel Energy-Efficient Routing Protocol for the Internet of Things Using Lion Optimization Algorithm to Maximize Network Lifetime
6
作者 Sankar Sennan Somula Ramasubbareddy +2 位作者 Anand Nayyar Yunyoung Nam Mohamed Abouhawwash 《Computers, Materials & Continua》 SCIE EI 2021年第10期351-371,共21页
Energy conservation is a significant task in the Internet of Things(IoT)because IoT involves highly resource-constrained devices.Clustering is an effective technique for saving energy by reducing duplicate data.In a c... Energy conservation is a significant task in the Internet of Things(IoT)because IoT involves highly resource-constrained devices.Clustering is an effective technique for saving energy by reducing duplicate data.In a clustering protocol,the selection of a cluster head(CH)plays a key role in prolonging the lifetime of a network.However,most cluster-based protocols,including routing protocols for low-power and lossy networks(RPLs),have used fuzzy logic and probabilistic approaches to select the CH node.Consequently,early battery depletion is produced near the sink.To overcome this issue,a lion optimization algorithm(LOA)for selecting CH in RPL is proposed in this study.LOA-RPL comprises three processes:cluster formation,CH selection,and route establishment.A cluster is formed using the Euclidean distance.CH selection is performed using LOA.Route establishment is implemented using residual energy information.An extensive simulation is conducted in the network simulator ns-3 on various parameters,such as network lifetime,power consumption,packet delivery ratio(PDR),and throughput.The performance of LOA-RPL is also compared with those of RPL,fuzzy rule-based energyefficient clustering and immune-inspired routing(FEEC-IIR),and the routing scheme for IoT that uses shuffled frog-leaping optimization algorithm(RISARPL).The performance evaluation metrics used in this study are network lifetime,power consumption,PDR,and throughput.The proposed LOARPL increases network lifetime by 20%and PDR by 5%–10%compared with RPL,FEEC-IIR,and RISA-RPL.LOA-RPL is also highly energy-efficient compared with other similar routing protocols. 展开更多
关键词 internet of things cluster head clustering protocol optimization algorithm lion optimization algorithm network lifetime routing protocol wireless sensor networks energy consumption low-power and lossy networks
下载PDF
ICMPTend: Internet Control Message Protocol Covert Tunnel Attack Intent Detector
7
作者 Tengfei Tu Wei Yin +4 位作者 Hua Zhang Xingyu Zeng Xiaoxiang Deng Yuchen Zhou Xu Liu 《Computers, Materials & Continua》 SCIE EI 2022年第5期2315-2331,共17页
The Internet Control Message Protocol(ICMP)covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission.Its concealment is stronger and it is not eas... The Internet Control Message Protocol(ICMP)covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission.Its concealment is stronger and it is not easy to be discovered.Most detection methods are detecting the existence of channels instead of clarifying specific attack intentions.In this paper,we propose an ICMP covert tunnel attack intent detection framework ICMPTend,which includes five steps:data collection,feature dictionary construction,data preprocessing,model construction,and attack intent prediction.ICMPTend can detect a variety of attack intentions,such as shell attacks,sensitive directory access,communication protocol traffic theft,filling tunnel reserved words,and other common network attacks.We extract features from five types of attack intent found in ICMP channels.We build a multi-dimensional dictionary of malicious features,including shell attacks,sensitive directory access,communication protocol traffic theft,filling tunnel reserved words,and other common network attack keywords.For the high-dimensional and independent characteristics of ICMP traffic,we use a support vector machine(SVM)as a multi-class classifier.The experimental results show that the average accuracy of ICMPTend is 92%,training ICMPTend only takes 55 s,and the prediction time is only 2 s,which can effectively identify the attack intention of ICMP. 展开更多
关键词 internet control message protocol support vector machine covert tunnel network analysis
下载PDF
A survey on communication protocols and performance evaluations for Internet of Things
8
作者 Cüneyt Bayılmış MAli Ebleme +2 位作者 ÜnalÇavuşoğlu Kerem Küçük Abdullah Sevin 《Digital Communications and Networks》 SCIE CSCD 2022年第6期1094-1104,共11页
The Internet of Things (IoT) is a large-scale network of devices capable of sensing, data processing, and communicating with each other through different communication protocols. In today's technology ecosystem, I... The Internet of Things (IoT) is a large-scale network of devices capable of sensing, data processing, and communicating with each other through different communication protocols. In today's technology ecosystem, IoT interacts with many application areas such as smart city, smart building, security, traffic, remote monitoring, health, energy, disaster, agriculture, industry. The IoT network in these scenarios comprises tiny devices, gateways, and cloud platforms. An IoT network is able to keep these fundamental components in transmission under many conditions with lightweight communication protocols taking into account the limited hardware features (memory, processor, energy, etc.) of tiny devices. These lightweight communication protocols affect the network traffic, reliability, bandwidth, and energy consumption of the IoT application. Therefore, determining the most proper communication protocol for application developers emerges as an important engineering problem. This paper presents a straightforward overview of the lightweight communication protocols, technological advancements in application layer for the IoT ecosystem. The survey then analyzes various recent lightweight communication protocols and reviews their strengths and limitations. In addition, the paper explains the experimental comparison of Constrained Applications Protocol (CoAP), Message Queuing Telemetry (MQTT), and WebSocket protocols, more convenient for tiny IoT devices. Finally, we discuss future research directions of communication protocols for IoT. 展开更多
关键词 internet of Things IoT application layer protocols IoT communicati on pr otocols Performance evaluation
下载PDF
Analysis and Application of Covert Channels of Internet Control Message Protocol
9
作者 ZHOU Xueguang ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1857-1861,共5页
Based on the analysis of the covert channel’s working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert channel’s... Based on the analysis of the covert channel’s working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert channel’s algorithms of the IPv4 and IPv6 are presented, which enable automatic channeling upon IPv4/v6 nodes with non-IPv4-compatible address, and the key transmission is achieved by using this channel in the embedded Internet terminal. The result shows that the covert channel’s algorithm, which we implemented if, set correct, the messages of this covert channel might go through the gateway and enter the local area network. 展开更多
关键词 ICMP 因特网 通信协议 信息安全 EIT
下载PDF
Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks
10
作者 Shadi Al-Sarawi Mohammed Anbar +2 位作者 Basim Ahmad Alabsi Mohammad Adnan Aladaileh Shaza Dawood Ahmed Rihan 《Computers, Materials & Continua》 SCIE EI 2023年第10期491-515,共25页
The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(... The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(IPv6)in the IoT.However,RPL is vulnerable to various attacks,including the sinkhole attack,which disrupts the network by manipulating routing information.This paper proposes the Unweighted Voting Method(UVM)for sinkhole node identification,utilizing three key behavioral indicators:DODAG Information Object(DIO)Transaction Frequency,Rank Harmony,and Power Consumption.These indicators have been carefully selected based on their contribution to sinkhole attack detection and other relevant features used in previous research.The UVM method employs an unweighted voting mechanism,where each voter or rule holds equal weight in detecting the presence of a sinkhole attack based on the proposed indicators.The effectiveness of the UVM method is evaluated using the COOJA simulator and compared with existing approaches.Notably,the proposed approach fulfills power consumption requirements for constrained nodes without increasing consumption due to the deployment design.In terms of detection accuracy,simulation results demonstrate a high detection rate ranging from 90%to 100%,with a low false-positive rate of 0%to 0.2%.Consequently,the proposed approach surpasses Ensemble Learning Intrusion Detection Systems by leveraging three indicators and three supporting rules. 展开更多
关键词 internet of Things IPv6 over low power wireless personal area networks Routing protocol for Low-Power and Lossy Networks internet protocol Version 6 distributed denial of service wireless sensor networks
下载PDF
Optimized Tuning of LOADng Routing Protocol Parameters for IoT
11
作者 Divya Sharma Sanjay Jain Vivek Maik 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期1549-1561,共13页
Interconnected devices and intelligent applications have slashed human intervention in the Internet of Things(IoT),making it possible to accomplish tasks with less human interaction.However,it faces many problems,incl... Interconnected devices and intelligent applications have slashed human intervention in the Internet of Things(IoT),making it possible to accomplish tasks with less human interaction.However,it faces many problems,including lower capacity links,energy utilization,enhancement of resources and limited resources due to its openness,heterogeneity,limited resources and extensiveness.It is challenging to route packets in such a constrained environment.In an IoT network constrained by limited resources,minimal routing control overhead is required without packet loss.Such constrained environments can be improved through the optimal routing protocol.It is challenging to route packets in such a constrained environment.Thus,this work is motivated to present an efficient routing protocol for enhancing the lifetime of the IoT network.Lightweight On-demand Ad hoc Distance-vector Routing Protocol—Next Generation(LOADng)protocol is an extended version of the Ad Hoc On-Demand Distance Vector(AODV)protocol.Unlike AODV,LOADng is a lighter version that forbids the intermediate nodes on the route to send a route reply(RREP)for the route request(RREQ),which originated from the source.A resource-constrained IoT network demands minimal routing control overhead and faster packet delivery.So,in this paper,the parameters of the LOADng routing protocol are optimized using the black widow optimization(BWO)algorithm to reduce the control overhead and delay.Furthermore,the performance of the proposed model is analyzed with the default LOADng in terms of delay,delivery ratio and overhead.Obtained results show that the LOADng-BWO protocol outperforms the conventional LOADng protocol. 展开更多
关键词 internet of things optimization algorithm routing protocol LOADng
下载PDF
Internet Print Protocol——Internet也可共享打印机
12
作者 谢静 《在线》 2004年第3期49-51,共3页
在公司的局域网环境下办公,基于“网上邻居”的打印机共享解决方案应该每一个朋友都接触过。可是这种打印机的共享只能在“局域网”中实现,如果你想共享在Internet上的打印机,难道还必须通过VPN设备连接到公司网络再进行打印?答案是... 在公司的局域网环境下办公,基于“网上邻居”的打印机共享解决方案应该每一个朋友都接触过。可是这种打印机的共享只能在“局域网”中实现,如果你想共享在Internet上的打印机,难道还必须通过VPN设备连接到公司网络再进行打印?答案是否定的。 展开更多
关键词 internet PRINT protocol internet打印服务器 远程管理 客户端配置 服务器配置 IPP共享打印
下载PDF
CARINA:一种高效的解决IoT互操作性的应用层协议转换方案
13
作者 王丽娜 赖坤豪 杨康 《计算机科学》 CSCD 北大核心 2024年第2期278-285,共8页
为了解决物联网设备众多、协议众多,以及协议架构和应用场景不同引发的物联网设备互操作性问题,针对应用层使用广泛的HTTP等4种协议,提出了一种基于协议包解析和关键方法映射的高效可扩展的应用层协议转换方案。考虑到4种协议的基础架... 为了解决物联网设备众多、协议众多,以及协议架构和应用场景不同引发的物联网设备互操作性问题,针对应用层使用广泛的HTTP等4种协议,提出了一种基于协议包解析和关键方法映射的高效可扩展的应用层协议转换方案。考虑到4种协议的基础架构、消息格式、通信模式以及应用场景具有较大差异,该方案通过对协议原始数据包进行解析和关键信息提取,然后统一以键值对的形式进行信息存储,解决了不同协议信息存储的统一性问题。通过构造关键方法映射表,将不同协议的方法进行映射,实现了不同协议之间的互联。实验结果表明,基于所提方案实现的协议转换系统能很好地完成4种协议之间的消息转换。相比同类型的Ponte方法,在相同实验条件下,所提方案的转换速度都优于Ponte,甚至在某些情况下表现出了将近10倍的速度差距,同时支持多出一倍的转换类型。实验结果验证了所提方法在可扩展性和转换时间等效率方面相比同类型的协议转换算法具有显著提升。 展开更多
关键词 物联网 应用层协议 协议转换 互操作性
下载PDF
基于字合成运算的标签组群组共存证明协议
14
作者 黄源 彭迪 《计算机应用与软件》 北大核心 2024年第1期315-321,327,共8页
针对现有的大多数证明协议无法同时证明多标签同时存在缺陷,提出一种具有可扩展性的电子标签组证明协议。协议采用按位运算设计实现的字合成运算对信息加密,字合成运算可使得协议达到超轻量级计算;同时字合成运算实现中巧妙运用参数自... 针对现有的大多数证明协议无法同时证明多标签同时存在缺陷,提出一种具有可扩展性的电子标签组证明协议。协议采用按位运算设计实现的字合成运算对信息加密,字合成运算可使得协议达到超轻量级计算;同时字合成运算实现中巧妙运用参数自身具备的汉明重量,可减少参量引入;协议基于先验证再响应机制,可抵抗假冒攻击等。对协议进行不同角度分析,表明协议能够提供较高的安全性能,同时能够适用于现有低成本被动式电子标签系统中。 展开更多
关键词 物联网 射频识别系统 标签组 群组证明协议 可扩展性 字合成运算
下载PDF
基于微服务和物联网的配电网智能计量架构
15
作者 郑晓斌 陈忠士 邹泽昌 《成都工业学院学报》 2024年第1期36-41,共6页
为实现电力系统向智能电网模式的演进,依赖于配电网(DN)的自动化,需要新的基础设施、技术和应用。提出一种基于微服务和物联网(IoT)的配电网自动化的智能计量设施,支持各种有助于实现配电网自动化和管理的服务。首先,在测量基础设施中... 为实现电力系统向智能电网模式的演进,依赖于配电网(DN)的自动化,需要新的基础设施、技术和应用。提出一种基于微服务和物联网(IoT)的配电网自动化的智能计量设施,支持各种有助于实现配电网自动化和管理的服务。首先,在测量基础设施中对特定硬件、设备和底层协议进行抽线;然后,利用消息队列遥测传输(MQTT)作为以事件为导向的发布/订阅协议来实现,同时支持发布/订阅和请求/响应机制来实现;最后,使用以大数据为导向的可群集软件模块来实现可扩展性。分布式状态估计(SE)和网络拓扑重构算法验证了智能计量设施支持交互和协同操作。 展开更多
关键词 智能电网 物联网 微服务 底层协议 大数据 网络拓扑
下载PDF
基于多协议融合的弱电机房一体化管控及其策略研究
16
作者 蒋达央 《常州信息职业技术学院学报》 2024年第1期25-28,共4页
随着高校信息化建设和应用的深入,弱电机房及其内部的智能化设备数量与日俱增。设备的安全运行状态监测和机房环境监测报警成为学校信息化运维管理工作中的重要内容。不同类型监测设备、管控设备之间的通信协议严重影响了运维管理效率... 随着高校信息化建设和应用的深入,弱电机房及其内部的智能化设备数量与日俱增。设备的安全运行状态监测和机房环境监测报警成为学校信息化运维管理工作中的重要内容。不同类型监测设备、管控设备之间的通信协议严重影响了运维管理效率和质量。通过构建多协议融合一体化管控平台,可实现数据传输、协议转换、数据分析预警、智能管控一体化,加强不同系统间设备的互联互通,提升管理效率和水平。 展开更多
关键词 多协议融合 边缘计算 协议转换 物联网
下载PDF
基于物联网远程监控的太阳能定向跟踪系统设计
17
作者 彭可 胡有章 +4 位作者 刘宏胜 张志成 贺劢勍 宋雨情 崔焱 《电工技术》 2024年第6期17-22,共6页
设计了一种基于物联网远程监控的太阳能定向跟踪系统,分别对太阳能定向跟踪系统本体和远程监控系统进行了设计与开发,采用离线和实时控制两种方式,通过监控数据计算当前的太阳高度角和方位角,调整光伏板的倾角,从而提高太阳能光伏板的... 设计了一种基于物联网远程监控的太阳能定向跟踪系统,分别对太阳能定向跟踪系统本体和远程监控系统进行了设计与开发,采用离线和实时控制两种方式,通过监控数据计算当前的太阳高度角和方位角,调整光伏板的倾角,从而提高太阳能光伏板的发电率。对该装置设备层的太阳能定向跟踪系统本体采用框架式结构设计,并通过模糊PID算法对跟踪装置电机进行调控;对应用层的远程监控系统采用B/S架构设计,使用MQTT协议与云平台进行数据交互,用户可直接通过浏览器访问监控系统,实现太阳能定向跟踪系统的远程状态检测、实时控制、数据管理等功能。经测试,用户能通过该监控系统控制和监控太阳能定向跟踪系统的运行,满足太阳能定向跟踪系统远程监控的要求,系统具有较高的实用性。 展开更多
关键词 物联网远程监控 太阳能定向跟踪系统 模糊PID算法 B/S架构 MQTT协议
下载PDF
基于嵌入式Internet的工业控制 被引量:45
18
作者 陶波 丁汉 熊有伦 《测控技术》 CSCD 2001年第8期5-9,共5页
嵌入式Internet技术正在改变传统设备的功能结构。基于嵌入式Internet传感器———IP传感器 (In ternetProtocolSensor)从根本上改变了设备信息上网的方式 ,实现了现场设备到Internet的直接通信 ,这种方式必将带来控制网络新的变革。本... 嵌入式Internet技术正在改变传统设备的功能结构。基于嵌入式Internet传感器———IP传感器 (In ternetProtocolSensor)从根本上改变了设备信息上网的方式 ,实现了现场设备到Internet的直接通信 ,这种方式必将带来控制网络新的变革。本文综述了现场总线控制网络、以太网和现场总线混合控制网络 ,提出了基于嵌入式Internet的控制网络模型 ,并从开放性、互连性、分散性的角度探讨了控制网络与Internet集成的发展趋势 。 展开更多
关键词 工业控制 嵌入式internet 远程监控 现场总线 传感器
下载PDF
IN与Internet互连的业务和体系结构及其协议 被引量:2
19
作者 朱晓民 廖建新 陈俊亮 《电子学报》 EI CAS CSCD 北大核心 2001年第2期225-232,共8页
因特网和智能网都是目前发展势头强劲 ,潜力巨大的技术 ,将两者有机结合起来将对网络和业务的发展起到积极的推动作用 .文中列举了与IN/Internet互连相关的标准化组织及其研究计划 ,然后在讨论IETF和ITU T提出的互连方案的基础上给出北... 因特网和智能网都是目前发展势头强劲 ,潜力巨大的技术 ,将两者有机结合起来将对网络和业务的发展起到积极的推动作用 .文中列举了与IN/Internet互连相关的标准化组织及其研究计划 ,然后在讨论IETF和ITU T提出的互连方案的基础上给出北京邮电大学国家重点实验室的实现方案 . 展开更多
关键词 智能网 因特网 IP电话 体系结构 通信协议 网络互连
下载PDF
一种Internet的网络用户行为分析方法的研究 被引量:22
20
作者 马力 焦李成 董富强 《微电子学与计算机》 CSCD 北大核心 2005年第7期124-126,共3页
文章在系统研究Internet的用户行为特征的基础上,从监测和分析的角度,给出了因特网用户行为的一种分类方式及表示方式。讨论了正常行为聚类研究的常用方法和异常行为的监测方法,设计了分布式的网络用户行为分析模型的体系结构,为网络用... 文章在系统研究Internet的用户行为特征的基础上,从监测和分析的角度,给出了因特网用户行为的一种分类方式及表示方式。讨论了正常行为聚类研究的常用方法和异常行为的监测方法,设计了分布式的网络用户行为分析模型的体系结构,为网络用户行为的自动发现提出了一种有效的解决途径。 展开更多
关键词 网络用户行为 行为分析模型 聚类 IP地址 WEB
下载PDF
上一页 1 2 88 下一页 到第
使用帮助 返回顶部