期刊文献+
共找到6,974篇文章
< 1 2 250 >
每页显示 20 50 100
IoT安全课程的“实战化”教材建设
1
作者 王奕森 娄睿 +1 位作者 井靖 段坷 《计算机教育》 2024年第1期209-214,共6页
针对当前网络空间安全教学内容正向多逆向少、理论多实践少、案例旧复现难的现状,以IoT安全课程教材建设为例,提出采用理论知识加实践指导、传统纸质加视频教程、实践操作加硬件在环的方式打造新型立体化教材,以覆盖IoT安全中的固件安... 针对当前网络空间安全教学内容正向多逆向少、理论多实践少、案例旧复现难的现状,以IoT安全课程教材建设为例,提出采用理论知识加实践指导、传统纸质加视频教程、实践操作加硬件在环的方式打造新型立体化教材,以覆盖IoT安全中的固件安全、硬件安全以及无线电安全等全链条知识,并阐述物联网安全“实战化”教材规划和建设内容。 展开更多
关键词 实战化 立体化教材 iot安全 硬件在环
下载PDF
基于NB-IoT的地下管廊环境监测系统设计
2
作者 郑慧君 彭勇 +2 位作者 梁月华 杜铭俊 胡文德 《科学技术创新》 2024年第5期82-85,共4页
城市地下管廊内布设了大量的管线,如燃气管道、网络通讯线路、电力线路等,由于地下环境复杂多变,存在着气体泄漏、爆炸、火灾等安全风险。针对这些问题,提出一种基于窄带物联网技术(Narrow Band Internet of Things,NB-IoT)的地下管廊... 城市地下管廊内布设了大量的管线,如燃气管道、网络通讯线路、电力线路等,由于地下环境复杂多变,存在着气体泄漏、爆炸、火灾等安全风险。针对这些问题,提出一种基于窄带物联网技术(Narrow Band Internet of Things,NB-IoT)的地下管廊环境监测系统。该系统采用先进的传感器技术、NB-IoT技术、软件技术,系统主要分为数据采集模块、物联网云平台、远程监测系统三部分。数据采集模块以STM32作为主控单元连接各个传感器,采集温度、湿度、水位、可燃气体等数据,经过处理后利用NB-IoT网络上传到物联网云平台,远程监测系统调用物联网云平台的数据接口进行远程显示与预警。实验结果表明,系统在降低系统总体功耗的同时,能够实时、稳定地进行地下管廊环境监测,提前预防可能存在的风险。 展开更多
关键词 环境监测 NB-iot 低功耗
下载PDF
基于NB-IoT技术的天然气管道泄漏监测系统
3
作者 路敬祎 王志桥 +1 位作者 彭朝霞 钱颖 《化工自动化及仪表》 CAS 2024年第2期222-226,共5页
为了对天然气管道运行情况进行实时监测,在发生泄漏时能够及时做出反应,设计了基于NBIoT技术的天然气管道泄漏监测系统。系统利用压力变送器、DHT11温湿度传感器和GPS/北斗定位系统分别对管道的内部压力、设备周围的温湿度和经纬度位置... 为了对天然气管道运行情况进行实时监测,在发生泄漏时能够及时做出反应,设计了基于NBIoT技术的天然气管道泄漏监测系统。系统利用压力变送器、DHT11温湿度传感器和GPS/北斗定位系统分别对管道的内部压力、设备周围的温湿度和经纬度位置进行采集,将采集的数据通过STM32控制NBIoT物联网模块上传至OneNET物联网云平台,最终通过云平台对天然气管道进行实时监测。实验表明:该系统能够对天然气管道的数据进行实时上传,能够通过云平台进行天然气管道状态的实时监测。 展开更多
关键词 NB-iot技术 物联网 云平台 天然气 管道泄漏监测
下载PDF
Enhancing IoT Data Security with Lightweight Blockchain and Okamoto Uchiyama Homomorphic Encryption
4
作者 Mohanad A.Mohammed Hala B.Abdul Wahab 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1731-1748,共18页
Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system challenges.Concurrently,the Internet of Things(IoT)has revol... Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system challenges.Concurrently,the Internet of Things(IoT)has revolutionized the Fourth Industrial Revolution by enabling interconnected devices to offer innovative services,ultimately enhancing human lives.This paper presents a new approach utilizing lightweight blockchain technology,effectively reducing the computational burden typically associated with conventional blockchain systems.By integrating this lightweight blockchain with IoT systems,substantial reductions in implementation time and computational complexity can be achieved.Moreover,the paper proposes the utilization of the Okamoto Uchiyama encryption algorithm,renowned for its homomorphic characteristics,to reinforce the privacy and security of IoT-generated data.The integration of homomorphic encryption and blockchain technology establishes a secure and decentralized platformfor storing and analyzing sensitive data of the supply chain data.This platformfacilitates the development of some business models and empowers decentralized applications to perform computations on encrypted data while maintaining data privacy.The results validate the robust security of the proposed system,comparable to standard blockchain implementations,leveraging the distinctive homomorphic attributes of the Okamoto Uchiyama algorithm and the lightweight blockchain paradigm. 展开更多
关键词 Blockchain iot integration of iot and blockchain consensus algorithm Okamoto Uchiyama homomorphic encryption lightweight blockchain
下载PDF
基于NB-IoT技术的环境监测系统优化设计
5
作者 苏兴龙 《粘接》 CAS 2024年第3期185-188,共4页
为进一步提升工业生产过程的安全系数,提出一种基于窄带物联网NB-IoT的环境监测系统。其中,以NB-IoT技术作为系统的主要通信,以传感器为主要的环境数据采集工具,以改进的BP神经网络作为预测方法进行环境风险预测。实验结果表明,与传统... 为进一步提升工业生产过程的安全系数,提出一种基于窄带物联网NB-IoT的环境监测系统。其中,以NB-IoT技术作为系统的主要通信,以传感器为主要的环境数据采集工具,以改进的BP神经网络作为预测方法进行环境风险预测。实验结果表明,与传统的BP神经网络相比,经过粒子群算法PSO优化的BP神经网络具有更高的预测精度,且稳定性较好,将其应用于环境风险的预测时误差始终保持在1%的误差范围内。设计的基于NB-IoT的环境监测系统能够进行准确的数据采集和风险预测,能够进一步保障生产安全,可行性较高。 展开更多
关键词 环境监测 NB-iot技术 BP神经网络 PSO算法
下载PDF
基于NB-IoT的无线抄表系统设计与实现
6
作者 段英宏 闫魁 +2 位作者 王鑫蕊 张立松 周檀君 《工业控制计算机》 2024年第2期27-28,31,共3页
为了便于管理人员及时准确地采集到用户电能消耗数据,提高工作效率,基于嵌入式与NB-IoT物联网技术,设计出一种无线抄表系统,能够实时采集和监测用户用电情况。该系统以低功耗的STM32系列微控制器作为主控芯片,利用RS485接口的Modbus-RT... 为了便于管理人员及时准确地采集到用户电能消耗数据,提高工作效率,基于嵌入式与NB-IoT物联网技术,设计出一种无线抄表系统,能够实时采集和监测用户用电情况。该系统以低功耗的STM32系列微控制器作为主控芯片,利用RS485接口的Modbus-RTU通信协议采集电能信息;运用RFID无线射频识别技术进行Mifare卡识别,读取用户信息。基于BC35-G通信模块结合UART串口及AT指令,建立起主控芯片与华为云平台的联系,利用4G网络传输的MQTT通信协议将采集到的数据上传至华为云平台,提高了数据传输的实时性和可靠性,为实现及时准确地采集用户电能消耗数据,提供了解决方案。 展开更多
关键词 华为云 BC35-G MQTT STM32F103 NB-iot
下载PDF
IoT感知的业务微流程建模
7
作者 王潇璇 王桂玲 《郑州大学学报(理学版)》 CAS 北大核心 2024年第2期26-33,共8页
基于物联大数据赋能的业务流程能够更快更准地感知物理世界并及时做出响应的需求突现,提出一种物联网(Internet of Things,IoT)感知的业务微流程建模方法。首先,以单个IoT对象为中心建模,融合MAPE-K(monitor,analysis,plan,execution an... 基于物联大数据赋能的业务流程能够更快更准地感知物理世界并及时做出响应的需求突现,提出一种物联网(Internet of Things,IoT)感知的业务微流程建模方法。首先,以单个IoT对象为中心建模,融合MAPE-K(monitor,analysis,plan,execution and knowledge base,MAPE-K)模型思想,将IoT对象实例生命周期的行为状态与微流程实例状态一一映射,实现对单个IoT对象的环形自动监控和调节;其次,基于从IoT传感设备获取的数据,定义基于SASE+语言的业务规则,提取对业务流程有意义的业务事件,避免了无关事件对宏流程的干扰;最后,通过设计一个微流程建模工具原型系统,结合真实案例分析,验证了提出建模方法的有效性,实现了业务流程与IoT实时流式感知数据的结合,并显著减少了宏流程需要处理的业务事件数量。 展开更多
关键词 iot流式感知数据 业务规则 环形自动监控调节 微流程
下载PDF
面向IoT安全的MITM攻击防御机制研究
8
作者 潘琛 周高超 张德喜 《许昌学院学报》 CAS 2024年第2期113-117,共5页
隐蔽性强及攻击方式灵活的中间人(Man-in-the-Middle Attack,MITM)攻击是当前物联网(Internet of Things,IoT)智能家居安全面临的最大安全隐患之一.从攻击与防御两个角度提出了基于上下文感知融合的物联网设备配对模型和基于熵的异构物... 隐蔽性强及攻击方式灵活的中间人(Man-in-the-Middle Attack,MITM)攻击是当前物联网(Internet of Things,IoT)智能家居安全面临的最大安全隐患之一.从攻击与防御两个角度提出了基于上下文感知融合的物联网设备配对模型和基于熵的异构物联设备指纹生成机制,以对抗型思维并行开展监测与防御方案研究,实现了对隐藏安全威胁的感知与过滤,通过相似度阈值分析测试与评估模型的建立完成了设备安全性验证,具有较好的效果与优势. 展开更多
关键词 iot智能家居安全 MITM 上下文感知 安全威胁感知与过滤
下载PDF
基于事件关联的IoT服务即时推荐方法研究
9
作者 巩会龙 王菁 +3 位作者 郭陈虹 郭浩浩 丁美至 杨诗怡 《计算机与数字工程》 2024年第1期28-34,共7页
由于用户需求及环境的不确定性,服务组合业务流程可能需要在运行时进行动态调整,因此为用户推荐更加满足即时需求的IoT服务成为当前亟待解决的关键问题之一。就如何提高业务流程中IoT服务推荐的即时性与准确率问题,提出了一种考虑时间... 由于用户需求及环境的不确定性,服务组合业务流程可能需要在运行时进行动态调整,因此为用户推荐更加满足即时需求的IoT服务成为当前亟待解决的关键问题之一。就如何提高业务流程中IoT服务推荐的即时性与准确率问题,提出了一种考虑时间延时性的IoT服务即时推荐方法,基于改进的CM-SPADE算法挖掘出带有延时属性的事件频繁关联模式,为用户更准确地推荐符合时间约束的IoT服务,以更好地适应业务流程的变化。实验结果表明,所提出的考虑时间约束的IoT服务推荐方法在提高服务推荐准确度方面表现出较好的性能。 展开更多
关键词 服务组合 时间约束 频繁关联模式 iot服务推荐
下载PDF
基于NB-IoT的UPS智能在线监测系统的设计
10
作者 宋汝浩 李成 +3 位作者 张泽 李科遥 马锦毅 朱代先 《计算机测量与控制》 2024年第3期57-62,70,共7页
针对UPS机房在运行过程中无人监守,工作人员无法及时排查故障的问题,设计并实现了一套基于ARM和NB-IoT的UPS智能在线监测系统,由检测终端、云服务器和监管中心组成;检测终端使用各类传感器和检测电路获取多个UPS设备的输入输出电压和电... 针对UPS机房在运行过程中无人监守,工作人员无法及时排查故障的问题,设计并实现了一套基于ARM和NB-IoT的UPS智能在线监测系统,由检测终端、云服务器和监管中心组成;检测终端使用各类传感器和检测电路获取多个UPS设备的输入输出电压和电流、负载率、蓄电池电量等数据以及机房温湿度环境参数,通过无线模块发送给云服务器,监管中心从云服务器获取数据,用户可以登录监管中心远程查询UPS的工作数据;经测试,系统能够实现对UPS各项数据的采集和无线传输,可以通过监管中心实时查询UPS工作状态以及下发指令,能达到实时监控的效果;具有数据测量准确,实时性响应良好等特点,减少了管理人员的工作量,提高了UPS的管理效率。 展开更多
关键词 UPS ARM NB-iot 监管 服务器
下载PDF
基于NB-IoT的智慧路灯控制器设计
11
作者 杨立宏 袁夫全 《现代信息科技》 2024年第2期177-181,共5页
随着智慧城市建设步伐的加快,各大城市必然要对城市路灯照明系统进行节能化和智能化升级。文章针对传统路灯能耗大、人力维护成本高、智能化程度低等问题,设计一种基于NB-IoT的智慧路灯控制器。单灯控制器以微控制器STM32为控制核心,通... 随着智慧城市建设步伐的加快,各大城市必然要对城市路灯照明系统进行节能化和智能化升级。文章针对传统路灯能耗大、人力维护成本高、智能化程度低等问题,设计一种基于NB-IoT的智慧路灯控制器。单灯控制器以微控制器STM32为控制核心,通过NB-IoT通信模组实现路灯与控制中心的组网,从而实现路灯的远程开关及调光控制、路灯数据采集、故障定位等功能。该路灯控制器以实际LED路灯进行测试验证,基于NB-IoT路灯控制器能够满足路灯照明系统的节能化和智能化以及集中管理的需求。 展开更多
关键词 NB-iot 智慧路灯 调光控制 数据采集 故障定位
下载PDF
A Cloud-Fog Enabled and Privacy-Preserving IoT Data Market Platform Based on Blockchain
12
作者 Yurong Luo Wei You +3 位作者 Chao Shang Xiongpeng Ren Jin Cao Hui Li 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期2237-2260,共24页
The dynamic landscape of the Internet of Things(IoT)is set to revolutionize the pace of interaction among entities,ushering in a proliferation of applications characterized by heightened quality and diversity.Among th... The dynamic landscape of the Internet of Things(IoT)is set to revolutionize the pace of interaction among entities,ushering in a proliferation of applications characterized by heightened quality and diversity.Among the pivotal applications within the realm of IoT,as a significant example,the Smart Grid(SG)evolves into intricate networks of energy deployment marked by data integration.This evolution concurrently entails data interchange with other IoT entities.However,there are also several challenges including data-sharing overheads and the intricate establishment of trusted centers in the IoT ecosystem.In this paper,we introduce a hierarchical secure data-sharing platform empowered by cloud-fog integration.Furthermore,we propose a novel non-interactive zero-knowledge proof-based group authentication and key agreement protocol that supports one-to-many sharing sets of IoT data,especially SG data.The security formal verification tool shows that the proposed scheme can achieve mutual authentication and secure data sharing while protecting the privacy of data providers.Compared with previous IoT data sharing schemes,the proposed scheme has advantages in both computational and transmission efficiency,and has more superiority with the increasing volume of shared data or increasing number of participants. 展开更多
关键词 iot data sharing zero-knowledge proof authentication privacy preserving blockchain
下载PDF
A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
13
作者 Sunil Kumar Dilip Kumar +3 位作者 Ramraj Dangi Gaurav Choudhary Nicola Dragoni Ilsun You 《Computers, Materials & Continua》 SCIE EI 2024年第1期31-63,共33页
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There ... The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There are several hurdles to overcome when putting IoT into practice,from managing server infrastructure to coordinating the use of tiny sensors.When it comes to deploying IoT,everyone agrees that security is the biggest issue.This is due to the fact that a large number of IoT devices exist in the physicalworld and thatmany of themhave constrained resources such as electricity,memory,processing power,and square footage.This research intends to analyse resource-constrained IoT devices,including RFID tags,sensors,and smart cards,and the issues involved with protecting them in such restricted circumstances.Using lightweight cryptography,the information sent between these gadgets may be secured.In order to provide a holistic picture,this research evaluates and contrasts well-known algorithms based on their implementation cost,hardware/software efficiency,and attack resistance features.We also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio. 展开更多
关键词 iot a sensor device LIGHTWEIGHT CRYPTOGRAPHY block cipher smart card security and privacy
下载PDF
A Secure Device Management Scheme with Audio-Based Location Distinction in IoT
14
作者 Haifeng Lin Xiangfeng Liu +5 位作者 Chen Chen Zhibo Liu Dexin Zhao Yiwen Zhang Weizhuang Li Mingsheng Cao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期939-956,共18页
Identifying a device and detecting a change in its position is critical for secure devices management in the Internet of Things(IoT).In this paper,a device management system is proposed to track the devices by using a... Identifying a device and detecting a change in its position is critical for secure devices management in the Internet of Things(IoT).In this paper,a device management system is proposed to track the devices by using audio-based location distinction techniques.In the proposed scheme,traditional cryptographic techniques,such as symmetric encryption algorithm,RSA-based signcryption scheme,and audio-based secure transmission,are utilized to provide authentication,non-repudiation,and confidentiality in the information interaction of the management system.Moreover,an audio-based location distinction method is designed to detect the position change of the devices.Specifically,the audio frequency response(AFR)of several frequency points is utilized as a device signature.The device signature has the features as follows.(1)Hardware Signature:different pairs of speaker and microphone have different signatures;(2)Distance Signature:in the same direction,the signatures are different at different distances;and(3)Direction Signature:at the same distance,the signatures are different in different directions.Based on the features above,amovement detection algorithmfor device identification and location distinction is designed.Moreover,a secure communication protocol is also proposed by using traditional cryptographic techniques to provide integrity,authentication,and non-repudiation in the process of information interaction between devices,Access Points(APs),and Severs.Extensive experiments are conducted to evaluate the performance of the proposed method.The experimental results show that the proposedmethod has a good performance in accuracy and energy consumption. 展开更多
关键词 Acoustic hardware fingerprinting device management iot location distinction
下载PDF
Traffic-Aware Fuzzy Classification Model to Perform IoT Data Traffic Sourcing with the Edge Computing
15
作者 Huixiang Xu 《Computers, Materials & Continua》 SCIE EI 2024年第2期2309-2335,共27页
The Internet of Things(IoT)has revolutionized how we interact with and gather data from our surrounding environment.IoT devices with various sensors and actuators generate vast amounts of data that can be harnessed to... The Internet of Things(IoT)has revolutionized how we interact with and gather data from our surrounding environment.IoT devices with various sensors and actuators generate vast amounts of data that can be harnessed to derive valuable insights.The rapid proliferation of Internet of Things(IoT)devices has ushered in an era of unprecedented data generation and connectivity.These IoT devices,equipped with many sensors and actuators,continuously produce vast volumes of data.However,the conventional approach of transmitting all this data to centralized cloud infrastructures for processing and analysis poses significant challenges.However,transmitting all this data to a centralized cloud infrastructure for processing and analysis can be inefficient and impractical due to bandwidth limitations,network latency,and scalability issues.This paper proposed a Self-Learning Internet Traffic Fuzzy Classifier(SLItFC)for traffic data analysis.The proposed techniques effectively utilize clustering and classification procedures to improve classification accuracy in analyzing network traffic data.SLItFC addresses the intricate task of efficiently managing and analyzing IoT data traffic at the edge.It employs a sophisticated combination of fuzzy clustering and self-learning techniques,allowing it to adapt and improve its classification accuracy over time.This adaptability is a crucial feature,given the dynamic nature of IoT environments where data patterns and traffic characteristics can evolve rapidly.With the implementation of the fuzzy classifier,the accuracy of the clustering process is improvised with the reduction of the computational time.SLItFC can reduce computational time while maintaining high classification accuracy.This efficiency is paramount in edge computing,where resource constraints demand streamlined data processing.Additionally,SLItFC’s performance advantages make it a compelling choice for organizations seeking to harness the potential of IoT data for real-time insights and decision-making.With the Self-Learning process,the SLItFC model monitors the network traffic data acquired from the IoT Devices.The Sugeno fuzzy model is implemented within the edge computing environment for improved classification accuracy.Simulation analysis stated that the proposed SLItFC achieves 94.5%classification accuracy with reduced classification time. 展开更多
关键词 Internet of Things(iot) edge computing traffic data SELF-LEARNING fuzzy-learning
下载PDF
Efficient and Secure IoT Based Smart Home Automation Using Multi-Model Learning and Blockchain Technology
16
作者 Nazik Alturki Raed Alharthi +5 位作者 Muhammad Umer Oumaima Saidani Amal Alshardan Reemah M.Alhebshi Shtwai Alsubai Ali Kashif Bashir 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期3387-3415,共29页
The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the d... The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device itself.Current home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical features.This paper proposes a smart home system based on ensemble learning of random forest(RF)and convolutional neural networks(CNN)for programmed decision-making tasks,such as categorizing gadgets as“OFF”or“ON”based on their normal routine in homes.We have integrated emerging blockchain technology to provide secure,decentralized,and trustworthy authentication and recognition of IoT devices.Our system consists of a 5V relay circuit,various sensors,and a Raspberry Pi server and database for managing devices.We have also developed an Android app that communicates with the server interface through an HTTP web interface and an Apache server.The feasibility and efficacy of the proposed smart home automation system have been evaluated in both laboratory and real-time settings.It is essential to use inexpensive,scalable,and readily available components and technologies in smart home automation systems.Additionally,we must incorporate a comprehensive security and privacy-centric design that emphasizes risk assessments,such as cyberattacks,hardware security,and other cyber threats.The trial results support the proposed system and demonstrate its potential for use in everyday life. 展开更多
关键词 Blockchain Internet of Things(iot) smart home automation CYBERSECURITY
下载PDF
IoT Smart Devices Risk Assessment Model Using Fuzzy Logic and PSO
17
作者 Ashraf S.Mashaleh Noor Farizah Binti Ibrahim +2 位作者 Mohammad Alauthman Mohammad Almseidin Amjad Gawanmeh 《Computers, Materials & Continua》 SCIE EI 2024年第2期2245-2267,共23页
Increasing Internet of Things(IoT)device connectivity makes botnet attacks more dangerous,carrying catastrophic hazards.As IoT botnets evolve,their dynamic and multifaceted nature hampers conventional detection method... Increasing Internet of Things(IoT)device connectivity makes botnet attacks more dangerous,carrying catastrophic hazards.As IoT botnets evolve,their dynamic and multifaceted nature hampers conventional detection methods.This paper proposes a risk assessment framework based on fuzzy logic and Particle Swarm Optimization(PSO)to address the risks associated with IoT botnets.Fuzzy logic addresses IoT threat uncertainties and ambiguities methodically.Fuzzy component settings are optimized using PSO to improve accuracy.The methodology allows for more complex thinking by transitioning from binary to continuous assessment.Instead of expert inputs,PSO data-driven tunes rules and membership functions.This study presents a complete IoT botnet risk assessment system.The methodology helps security teams allocate resources by categorizing threats as high,medium,or low severity.This study shows how CICIoT2023 can assess cyber risks.Our research has implications beyond detection,as it provides a proactive approach to risk management and promotes the development of more secure IoT environments. 展开更多
关键词 iot botnet detection risk assessment fuzzy logic particle swarm optimization(PSO) CYBERSECURITY interconnected devices
下载PDF
Design Framework of Unsourced Multiple Access for 6G Massive IoT
18
作者 Chunlin Yan Siying Lyu +2 位作者 Sen Wang Yuhong Huang Xiaodong Xu 《China Communications》 SCIE CSCD 2024年第1期1-12,共12页
In this paper,ambient IoT is used as a typical use case of massive connections for the sixth generation(6G)mobile communications where we derive the performance requirements to facilitate the evaluation of technical s... In this paper,ambient IoT is used as a typical use case of massive connections for the sixth generation(6G)mobile communications where we derive the performance requirements to facilitate the evaluation of technical solutions.A rather complete design of unsourced multiple access is proposed in which two key parts:a compressed sensing module for active user detection,and a sparse interleaver-division multiple access(SIDMA)module are simulated side by side on a same platform at balanced signal to noise ratio(SNR)operating points.With a proper combination of compressed sensing matrix,a convolutional encoder,receiver algorithms,the simulated performance results appear superior to the state-of-the-art benchmark,yet with relatively less complicated processing. 展开更多
关键词 channel coding compressed sensing massive Internet-of-Things(iot) sparse interleaverdivision multiple access(SIDMA) the sixth generation(6G)mobile communications unsourced multiple access
下载PDF
一种基于NB-IoT的智能井盖监测系统设计
19
作者 彭勇 陈俞强 +2 位作者 王石 郑俊杰 胡文德 《微型电脑应用》 2024年第3期26-28,36,共4页
针对城市井盖保有量大、安全事故频发、人工巡检困难、管理组织混乱等问题,提出一种基于窄带物联网(NB-IoT)技术的窨井盖自动监测系统。该系统以STM32作为主控模块,包含倾角、水位等传感器,实现对井盖状态以及井内重点数据的采集,配合... 针对城市井盖保有量大、安全事故频发、人工巡检困难、管理组织混乱等问题,提出一种基于窄带物联网(NB-IoT)技术的窨井盖自动监测系统。该系统以STM32作为主控模块,包含倾角、水位等传感器,实现对井盖状态以及井内重点数据的采集,配合云端服务器和客户端完成井盖数据远程可视化显示。结果表明,所提系统可以实现故障井盖自动报警、精确定位,降低人工巡检的难度,让城市井盖管理更加智能化,让故障检修更加便捷化,提高城市管理的智能化水平。 展开更多
关键词 物联网 低功耗 窄带物联网 STM32单片机
下载PDF
基于BIM+GIS+IoT技术的水利工程数字孪生工地建设管理系统研究与应用
20
作者 梁爱萍 张发清 +2 位作者 蔡运忠 董良泼 胡锦 《水利技术监督》 2024年第2期39-43,共5页
文章旨在探究基于BIM、GIS和IoT技术的水利工程数字孪生工地建设管理系统的实现与应用。通过综合分析这些技术在水利工程中的实际应用,并结合系统的开发需求,设计了系统框架。工程相关数据经过加工处理后接入系统,结合数据底板和可视化... 文章旨在探究基于BIM、GIS和IoT技术的水利工程数字孪生工地建设管理系统的实现与应用。通过综合分析这些技术在水利工程中的实际应用,并结合系统的开发需求,设计了系统框架。工程相关数据经过加工处理后接入系统,结合数据底板和可视化引擎实现工程各要素的全面数字化映射。经由实际案例应用,验证了该系统能够提升水利工程建设管理的效率和质量。研究在推动水利工程领域的数字化发展方面发挥着积极的推动作用。 展开更多
关键词 工地建设管理系统 数字孪生 BIM GIS iot 水利工程
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部