期刊文献+
共找到39,288篇文章
< 1 2 250 >
每页显示 20 50 100
China contributes to IEC's specification on industrial internet system
1
《China Standardization》 2022年第6期17-17,共1页
On October 18, the International Electrotechnical Commission(IEC) published IEC PAS 63441:2022, Functional architecture of industrial internet system for industrial automation applications, which is the first internat... On October 18, the International Electrotechnical Commission(IEC) published IEC PAS 63441:2022, Functional architecture of industrial internet system for industrial automation applications, which is the first international specification in this field.Laying the cornerstone of industrial internet, IEC PAS 63441:2022 normalizes the models, structures. 展开更多
关键词 internet IEC system
原文传递
Tata Communications携手Internet Systems Consortium进行IPv6域名系统托管
2
《电脑与电信》 2008年第10期15-15,共1页
加州红木城和印度孟买2008年10月14日电/新华美通/-通信新世界领域的领先供应商Tata Communications和非营利性公益企业Internet Systems Consortium.Inc.(ISCl今天宣布,双方将合作为企业和服务供应商提供业界最佳的域名系统(DN... 加州红木城和印度孟买2008年10月14日电/新华美通/-通信新世界领域的领先供应商Tata Communications和非营利性公益企业Internet Systems Consortium.Inc.(ISCl今天宣布,双方将合作为企业和服务供应商提供业界最佳的域名系统(DNS)托管服务。DNS能够提供互联网必须的功能。 展开更多
关键词 internet systems 域名系统 IPv6 托管 服务供应商 非营利性 INC
在线阅读 下载PDF
Research on Internet-based Agricultural Environment Monitoring Systems
3
作者 Qi'ang HU Aichuan LI +1 位作者 Pengyu QU Rui LIU 《Agricultural Biotechnology》 2025年第5期69-73,76,共6页
This paper investigated the research status and development trends of agricultural environment monitoring systems primarily based on the internet.The issues encountered during system implementation and their correspon... This paper investigated the research status and development trends of agricultural environment monitoring systems primarily based on the internet.The issues encountered during system implementation and their corresponding solutions were analyzed by reviewing relevant domestic and international literature.Through this study,it is understood that advancements in sensor technology have significantly facilitated the collection of agricultural environmental data and real-time data processing.However,inconsistencies in data from sensors with different standards lead to incompatibility of information,thereby restricting comprehensive data utilization.Furthermore,the lack of intelligent analysis technology and the limitations of algorithms have hindered the full utilization of agricultural environmental data mining and intelligent decision support systems,severely impacting the precision management of agricultural production.Therefore,subsequent research will strengthen international technical cooperation and exchanges,promote collaborative innovation in various fields,and facilitate the introduction of new technologies such as Big Data and Cloud Computing.Establishing unified data interfaces and developing adaptive algorithm models represent beneficial attempts to break through bottlenecks and promote sustainable agricultural development.Therefore,this study provides a reference for exploring the application prospects of the internet in agricultural production,while also emphasizing the feasibility and importance of in-depth research and application of the internet to advance sustainable agricultural development. 展开更多
关键词 internet Agricultural environment SENSORS
在线阅读 下载PDF
Cost and Time Optimization of Cloud Services in Arduino-Based Internet of Things Systems for Energy Applications
4
作者 Reza Nadimi Maryam Hashemi Koji Tokimatsu 《Journal on Internet of Things》 2025年第1期49-69,共21页
Existing Internet of Things(IoT)systems that rely on Amazon Web Services(AWS)often encounter inefficiencies in data retrieval and high operational costs,especially when using DynamoDB for large-scale sensor data.These... Existing Internet of Things(IoT)systems that rely on Amazon Web Services(AWS)often encounter inefficiencies in data retrieval and high operational costs,especially when using DynamoDB for large-scale sensor data.These limitations hinder the scalability and responsiveness of applications such as remote energy monitoring systems.This research focuses on designing and developing an Arduino-based IoT system aimed at optimizing data transmission costs by concentrating on these services.The proposed method employs AWS Lambda functions with Amazon Relational Database Service(RDS)to facilitate the transmission of data collected from temperature and humidity sensors to the RDS database.In contrast,the conventional method utilizes AmazonDynamoDB for storing the same sensor data.Data were collected from 01 April 2022,to 26 August 2022,in Tokyo,Japan,focusing on temperature and relative humiditywitha resolutionof oneminute.The efficiency of the twomethods—conventional andproposed—was assessed in terms of both time and cost metrics,with a particular focus on data retrieval.The conventional method exhibited linear time complexity,leading to longer data retrieval times as the dataset grew,mainly due to DynamoDB’s pagination requirements and the parsing of payload data during the reading process.In contrast,the proposed method significantly reduced retrieval times for larger datasets by parsing payload data before writing it to the RDS database.Cost analysis revealed a savings of$1.56 per month with the adoption of the proposed approach for a 20-gigabyte database. 展开更多
关键词 Arduino-based internet of things internet of things-based solar energy system Amazon web service Amazon web service data retrieval Amazon web service lambda Amazon relational database service DynamoDB
在线阅读 下载PDF
Optimizing System Latency for Blockchain-Encrypted Edge Computing in Internet of Vehicles
5
作者 Cui Zhang Maoxin Ji +2 位作者 Qiong Wu Pingyi Fan Qiang Fan 《Computers, Materials & Continua》 2025年第5期3519-3536,共18页
As Internet of Vehicles(IoV)technology continues to advance,edge computing has become an important tool for assisting vehicles in handling complex tasks.However,the process of offloading tasks to edge servers may expo... As Internet of Vehicles(IoV)technology continues to advance,edge computing has become an important tool for assisting vehicles in handling complex tasks.However,the process of offloading tasks to edge servers may expose vehicles to malicious external attacks,resulting in information loss or even tampering,thereby creating serious security vulnerabilities.Blockchain technology can maintain a shared ledger among servers.In the Raft consensus mechanism,as long as more than half of the nodes remain operational,the system will not collapse,effectively maintaining the system’s robustness and security.To protect vehicle information,we propose a security framework that integrates the Raft consensus mechanism from blockchain technology with edge computing.To address the additional latency introduced by blockchain,we derived a theoretical formula for system delay and proposed a convex optimization solution to minimize the system latency,ensuring that the system meets the requirements for low latency and high reliability.Simulation results demonstrate that the optimized data extraction rate significantly reduces systemdelay,with relatively stable variations in latency.Moreover,the proposed optimization solution based on this model can provide valuable insights for enhancing security and efficiency in future network environments,such as 5G and next-generation smart city systems. 展开更多
关键词 Blockchain edge computing internet of vehicles latency optimization
在线阅读 下载PDF
Real-time Meteorological Data Collection Emergency System of Internet of Things Platform
6
作者 Tianwen SONG Zhi LI Hui LIANG 《Meteorological and Environmental Research》 2025年第1期1-5,共5页
With the development of Internet of things technology,the real-time collection and transmission of meteorological data has become particularly important.Especially in response to emergencies such as natural disasters,... With the development of Internet of things technology,the real-time collection and transmission of meteorological data has become particularly important.Especially in response to emergencies such as natural disasters,it is very important to improve the efficiency of decision-making by quickly obtaining accurate meteorological observation data.However,the traditional method of meteorological data collection and transmission has a large delay in data acquisition due to the conversion of public network and internal network,which affects the timeliness of emergency decision-making.This paper proposes a solution based on the Internet of things platform combined with MQTT protocol,which aims to realize the efficient and reliable real-time collection and transmission of meteorological data,shorten the data acquisition time,improve the emergency response speed,and meet the needs of temporary observation. 展开更多
关键词 internet of things Meteorological data MQTT
在线阅读 下载PDF
Design of Campus IT Operation and Maintenance System Combining Artificial Intelligence and Internet of Things
7
作者 Hanpu Yu 《信息工程期刊(中英文版)》 2025年第2期11-20,共10页
The integration of Artificial Intelligence (AI) and Internet of Things (IoT), known as AIoT, presents a transformative framework for modernizing campus IT operation and maintenance. This paper details the design of a ... The integration of Artificial Intelligence (AI) and Internet of Things (IoT), known as AIoT, presents a transformative framework for modernizing campus IT operation and maintenance. This paper details the design of a hierarchical AIoT architecture that leverages edge computing for real-time decision-making and cloud analytics for long-term optimization, achieving a higher system availability while reducing data transmission costs. The proposed system addresses critical challenges in traditional campus management such as energy inefficiency, reactive maintenance, and resource underutilization through intelligent applications like predictive resource allocation and environmental control. Furthermore, the design incorporates a robust, AI-driven cybersecurity framework and intelligent data processing paradigms, such as federated learning, which enhance maintenance efficiency and reduce false alarms. The transition to an AIoT-enabled campus is not merely a technological upgrade but a strategic shift towards a predictive, efficient, and sustainable operational model, fundamentally enhancing the management of university infrastructures. 展开更多
关键词 Artificial Intelligence internet of Things(IoT) AI-driven Information Technology CYBERSECURITY
在线阅读 下载PDF
Assessing the capacity value of demand flexibility from aggregated small Internet data centers in power distribution systems
8
作者 Bo Zeng Xinzhu Xu Fulin Yang 《Global Energy Interconnection》 2025年第3期460-473,共14页
With the advent of the digital economy,there has been a rapid proliferation of small-scale Internet data centers(SIDCs).By leveraging their spatiotemporal load regulation potential through data workload balancing,aggr... With the advent of the digital economy,there has been a rapid proliferation of small-scale Internet data centers(SIDCs).By leveraging their spatiotemporal load regulation potential through data workload balancing,aggregated SIDCs have emerged as promising demand response(DR)resources for future power distribution systems.This paper presents an innovative framework for assessing capacity value(CV)by aggregating SIDCs participating in DR programs(SIDC-DR).Initially,we delineate the concept of CV tailored for aggregated SIDC scenarios and establish a metric for the assessment.Considering the effects of the data load dynamics,equipment constraints,and user behavior,we developed a sophisticated DR model for aggregated SIDCs using a data network aggregation method.Unlike existing studies,the proposed model captures the uncertainties associated with end tenant decisions to opt into an SIDC-DR program by utilizing a novel uncertainty modeling approach called Z-number formulation.This approach accounts for both the uncertainty in user participation intentions and the reliability of basic information during the DR process,enabling high-resolution profiling of the SIDC-DR potential in the CV evaluation.Simulation results from numerical studies conducted on a modified IEEE-33 node distribution system confirmed the effectiveness of the proposed approach and highlighted the potential benefits of SIDC-DR utilization in the efficient operation of future power systems. 展开更多
关键词 Aggregated Small internet data center Demand response Capacity value Z-number
在线阅读 下载PDF
Toward zero trust in 5G Industrial Internet collaboration systems
9
作者 Han Zhang Ziyan Zhang Liquan Chen 《Digital Communications and Networks》 2025年第2期547-555,共9页
With the introduction of 5G,users and devices can access the industrial network from anywhere in the world.Therefore,traditional perimeter-based security technologies for industrial networks can no longer work well.To... With the introduction of 5G,users and devices can access the industrial network from anywhere in the world.Therefore,traditional perimeter-based security technologies for industrial networks can no longer work well.To solve this problem,a new security model called Zero Trust(ZT)is desired,which believes in“never trust and always verify”.Every time the asset in the industrial network is accessed,the subject is authenticated and its trustworthiness is assessed.In this way,the asset in industrial network can be well protected,whether the subject is in the internal network or the external network.However,in order to construct the zero trust model in the 5G Industrial Internet collaboration system,there are still many problems to be solved.In this paper,we first introduce the security issues in the 5G Industrial Internet collaboration system,and illustrate the zero trust architecture.Then,we analyze the gap between existing security techniques and the zero trust architecture.Finally,we discuss several potential security techniques that can be used to implement the zero trust model.The purpose of this paper is to point out the further direction for the realization of the Zero Trust Architecture(ZTA)in the 5G Industrial Internet collaboration system. 展开更多
关键词 Zero trust 5G Industrial internet collaboration system Trust assessment Access control AUTHENTICATION
在线阅读 下载PDF
Computational Offloading and Resource Allocation for Internet of Vehicles Based on UAV-Assisted Mobile Edge Computing System
10
作者 Fang Yujie Li Meng +3 位作者 Si Pengbo Yang Ruizhe Sun Enchang Zhang Yanhua 《China Communications》 2025年第9期333-351,共19页
As an essential element of intelligent trans-port systems,Internet of vehicles(IoV)has brought an immersive user experience recently.Meanwhile,the emergence of mobile edge computing(MEC)has enhanced the computational ... As an essential element of intelligent trans-port systems,Internet of vehicles(IoV)has brought an immersive user experience recently.Meanwhile,the emergence of mobile edge computing(MEC)has enhanced the computational capability of the vehicle which reduces task processing latency and power con-sumption effectively and meets the quality of service requirements of vehicle users.However,there are still some problems in the MEC-assisted IoV system such as poor connectivity and high cost.Unmanned aerial vehicles(UAVs)equipped with MEC servers have become a promising approach for providing com-munication and computing services to mobile vehi-cles.Hence,in this article,an optimal framework for the UAV-assisted MEC system for IoV to minimize the average system cost is presented.Through joint consideration of computational offloading decisions and computational resource allocation,the optimiza-tion problem of our proposed architecture is presented to reduce system energy consumption and delay.For purpose of tackling this issue,the original non-convex issue is converted into a convex issue and the alternat-ing direction method of multipliers-based distributed optimal scheme is developed.The simulation results illustrate that the presented scheme can enhance the system performance dramatically with regard to other schemes,and the convergence of the proposed scheme is also significant. 展开更多
关键词 computational offloading internet of Vehicles mobile edge computing resource optimization unmanned aerial vehicle
在线阅读 下载PDF
Overcoming Dynamic Connectivity in Internet of Vehicles:A DAG Lattice Blockchain with Reputation-Based Incentive
11
作者 Xiaodong Zhang Wenhan Hou +2 位作者 Juanjuan Wang Leixiao Li Pengfei Yue 《Computers, Materials & Continua》 2026年第2期1803-1822,共20页
Blockchain offers a promising solution to the security challenges faced by the Internet of Vehicles(IoV).However,due to the dynamic connectivity of IoV,blockchain based on a single-chain structure or Directed Acyclic ... Blockchain offers a promising solution to the security challenges faced by the Internet of Vehicles(IoV).However,due to the dynamic connectivity of IoV,blockchain based on a single-chain structure or Directed Acyclic Graph(DAG)structure often suffer from performance limitations.The DAG lattice structure is a novel blockchain model in which each node maintains its own account chain,and only the node itself is allowed to update it.This feature makes the DAG lattice structure particularly suitable for addressing the challenges in dynamically connected IoV environment.In this paper,we propose a blockchain architecture based on the DAG lattice structure,specifically designed for dynamically connected IoV.In the proposed system,nodes must obtain authorization from a trusted authority before joining,forming a permissioned blockchain.Each node is assigned an individual account chain,allowing vehicles with limited storage capacity to participate in the blockchain by storing transactions only from nearby vehicles’account chains.Every transmitted message is treated as a transaction and added to the blockchain,enablingmore efficient data transmission in a dynamic network environment.Areputation-based incentivemechanism is introduced to encourage nodes to behave normally.Experimental results demonstrate that the proposed architecture achieves better performance compared with traditional single-chain and DAG-based approaches in terms of average transmission delay and storage cost. 展开更多
关键词 Blockchain internet of vehicles dynamic connectivity DAG lattice INCENTIVE
在线阅读 下载PDF
FSL-TM:Review on the Integration of Federated Split Learning with TinyML in the Internet of Vehicles
12
作者 Meenakshi Aggarwal Vikas Khullar Nitin Goyal 《Computers, Materials & Continua》 2026年第2期290-320,共31页
The Internet of Vehicles,or IoV,is expected to lessen pollution,ease traffic,and increase road safety.IoV entities’interconnectedness,however,raises the possibility of cyberattacks,which can have detrimental effects.... The Internet of Vehicles,or IoV,is expected to lessen pollution,ease traffic,and increase road safety.IoV entities’interconnectedness,however,raises the possibility of cyberattacks,which can have detrimental effects.IoV systems typically send massive volumes of raw data to central servers,which may raise privacy issues.Additionally,model training on IoV devices with limited resources normally leads to slower training times and reduced service quality.We discuss a privacy-preserving Federated Split Learning with Tiny Machine Learning(TinyML)approach,which operates on IoV edge devices without sharing sensitive raw data.Specifically,we focus on integrating split learning(SL)with federated learning(FL)and TinyML models.FL is a decentralisedmachine learning(ML)technique that enables numerous edge devices to train a standard model while retaining data locally collectively.The article intends to thoroughly discuss the architecture and challenges associated with the increasing prevalence of SL in the IoV domain,coupled with FL and TinyML.The approach starts with the IoV learning framework,which includes edge computing,FL,SL,and TinyML,and then proceeds to discuss how these technologies might be integrated.We elucidate the comprehensive operational principles of Federated and split learning by examining and addressingmany challenges.We subsequently examine the integration of SL with FL and various applications of TinyML.Finally,exploring the potential integration of FL and SL with TinyML in the IoV domain is referred to as FSL-TM.It is a superior method for preserving privacy as it conducts model training on individual devices or edge nodes,thereby obviating the necessity for centralised data aggregation,which presents considerable privacy threats.The insights provided aim to help both researchers and practitioners understand the complicated terrain of FL and SL,hence facilitating advancement in this swiftly progressing domain. 展开更多
关键词 Machine learning federated learning split learning TinyML internet of vehicles
在线阅读 下载PDF
MWaOA:A Bio-Inspired Metaheuristic Algorithm for Resource Allocation in Internet of Things
13
作者 Rekha Phadke Abdul Lateef Haroon Phulara Shaik +3 位作者 Dayanidhi Mohapatra Doaa Sami Khafaga Eman Abdullah Aldakheel N.Sathyanarayana 《Computers, Materials & Continua》 2026年第2期1285-1310,共26页
Recently,the Internet of Things(IoT)technology has been utilized in a wide range of services and applications which significantly transforms digital ecosystems through seamless interconnectivity between various smart ... Recently,the Internet of Things(IoT)technology has been utilized in a wide range of services and applications which significantly transforms digital ecosystems through seamless interconnectivity between various smart devices.Furthermore,the IoT plays a key role in multiple domains,including industrial automation,smart homes,and intelligent transportation systems.However,an increasing number of connected devices presents significant challenges related to efficient resource allocation and system responsiveness.To address these issue,this research proposes a Modified Walrus Optimization Algorithm(MWaOA)for effective resource management in smart IoT systems.In the proposed MWaOA,a crowding process is incorporated to maintain diversity and avoid premature convergence thereby enhancing the global search capability.During resource allocation,the MWaOA prevents early convergence,which aids in achieving a better balance between the exploration and exploitation phases during optimization.Empirical evaluations show that the MWaOA reduces energy consumption by approximately 4% to 34%and minimizes the response time by 6% to 33% across different service arrival rates.Compared to traditional optimization algorithms,MWaOA reduces energy consumption by 5% to 30%and minimizes the response time by 4% to 28% across different simulation epochs.The proposed MWaOA provides adaptive and robust resource allocation,thereby minimizing transmission cost while considering network constraints and real-time performance parameters. 展开更多
关键词 Delay GATEWAY internet of things resource allocation resource management walrus optimization algorithm
在线阅读 下载PDF
GSLDWOA: A Feature Selection Algorithm for Intrusion Detection Systems in IIoT
14
作者 Wanwei Huang Huicong Yu +3 位作者 Jiawei Ren Kun Wang Yanbu Guo Lifeng Jin 《Computers, Materials & Continua》 2026年第1期2006-2029,共24页
Existing feature selection methods for intrusion detection systems in the Industrial Internet of Things often suffer from local optimality and high computational complexity.These challenges hinder traditional IDS from... Existing feature selection methods for intrusion detection systems in the Industrial Internet of Things often suffer from local optimality and high computational complexity.These challenges hinder traditional IDS from effectively extracting features while maintaining detection accuracy.This paper proposes an industrial Internet ofThings intrusion detection feature selection algorithm based on an improved whale optimization algorithm(GSLDWOA).The aim is to address the problems that feature selection algorithms under high-dimensional data are prone to,such as local optimality,long detection time,and reduced accuracy.First,the initial population’s diversity is increased using the Gaussian Mutation mechanism.Then,Non-linear Shrinking Factor balances global exploration and local development,avoiding premature convergence.Lastly,Variable-step Levy Flight operator and Dynamic Differential Evolution strategy are introduced to improve the algorithm’s search efficiency and convergence accuracy in highdimensional feature space.Experiments on the NSL-KDD and WUSTL-IIoT-2021 datasets demonstrate that the feature subset selected by GSLDWOA significantly improves detection performance.Compared to the traditional WOA algorithm,the detection rate and F1-score increased by 3.68%and 4.12%.On the WUSTL-IIoT-2021 dataset,accuracy,recall,and F1-score all exceed 99.9%. 展开更多
关键词 Industrial internet of Things intrusion detection system feature selection whale optimization algorithm Gaussian mutation
在线阅读 下载PDF
Lightweight Hash-Based Post-Quantum Signature Scheme for Industrial Internet of Things
15
作者 Chia-Hui Liu 《Computers, Materials & Continua》 2026年第2期1041-1058,共18页
TheIndustrial Internet of Things(IIoT)has emerged as a cornerstone of Industry 4.0,enabling large-scale automation and data-driven decision-making across factories,supply chains,and critical infrastructures.However,th... TheIndustrial Internet of Things(IIoT)has emerged as a cornerstone of Industry 4.0,enabling large-scale automation and data-driven decision-making across factories,supply chains,and critical infrastructures.However,the massive interconnection of resource-constrained devices also amplifies the risks of eavesdropping,data tampering,and device impersonation.While digital signatures are indispensable for ensuring authenticity and non-repudiation,conventional schemes such as RSA and ECCare vulnerable to quantumalgorithms,jeopardizing long-termtrust in IIoT deployments.This study proposes a lightweight,stateless,hash-based signature scheme that achieves post-quantum security while addressing the stringent efficiency demands of IIoT.The design introduces two key optimizations:(1)Forest ofRandomSubsets(FORS)onDemand,where subset secret keys are generated dynamically via a PseudoRandom Function(PRF),thereby minimizing storage overhead and eliminating key-reuse risks;and(2)Winternitz One-Time Signature Plus(WOTS+)partial hash-chain caching,which precomputes intermediate hash values at edge gateways,reducing device-side computations,latency,and energy consumption.The architecture integrates a multi-layerMerkle authentication tree(Merkle tree)and role-based delegation across sensors,gateways,and a Signature Authority Center(SAC),supporting scalable cross-site deployment and key rotation.Froma theoretical perspective,we establish a formal(Existential Unforgeability under Chosen Message Attack)EUF-CMA security proof using a game-based reduction framework.The proof demonstrates that any successful forgerymust reduce to breaking the underlying assumptions of PRF indistinguishability,(second)preimage resistance,or collision resistance,thus quantifying adversarial advantage and ensuring unforgeability.On the implementation side,our design achieves a balanced trade-off between postquantum security and lightweight performance,offering concrete deployment guidelines for real-time industrial systems.In summary,the proposed method contributes both practical system design and formal security guarantees,providing IIoT with a deployable signature substrate that enhances resilience against quantum-era threats and supports future extensions such as device attestation,group signatures,and anomaly detection. 展开更多
关键词 Industrial internet of Things(IIoT) post-quantum cryptography hash-based signatures SPHINCS+
在线阅读 下载PDF
Robust and Efficient Federated Learning for Machinery Fault Diagnosis in Internet of Things
16
作者 Zhen Wu Hao Liu +4 位作者 Linlin Zhang Zehui Zhang Jie Wu Haibin He Bin Zhou 《Computers, Materials & Continua》 2026年第4期1051-1069,共19页
Recently,Internet ofThings(IoT)has been increasingly integrated into the automotive sector,enabling the development of diverse applications such as the Internet of Vehicles(IoV)and intelligent connected vehicles.Lever... Recently,Internet ofThings(IoT)has been increasingly integrated into the automotive sector,enabling the development of diverse applications such as the Internet of Vehicles(IoV)and intelligent connected vehicles.Leveraging IoVtechnologies,operational data fromcore vehicle components can be collected and analyzed to construct fault diagnosis models,thereby enhancing vehicle safety.However,automakers often struggle to acquire sufficient fault data to support effective model training.To address this challenge,a robust and efficient federated learning method(REFL)is constructed for machinery fault diagnosis in collaborative IoV,which can organize multiple companies to collaboratively develop a comprehensive fault diagnosis model while keeping their data locally.In the REFL,the gradient-based adversary algorithm is first introduced to the fault diagnosis field to enhance the deep learning model robustness.Moreover,the adaptive gradient processing process is designed to improve the model training speed and ensure the model accuracy under unbalance data scenarios.The proposed REFL is evaluated on non-independent and identically distributed(non-IID)real-world machinery fault dataset.Experiment results demonstrate that the REFL can achieve better performance than traditional learning methods and are promising for real industrial fault diagnosis. 展开更多
关键词 Federated learning adversary algorithm internet of Vehicles(IoV) fault diagnosis
在线阅读 下载PDF
A Multi-Objective Deep Reinforcement Learning Algorithm for Computation Offloading in Internet of Vehicles
17
作者 Junjun Ren Guoqiang Chen +1 位作者 Zheng-Yi Chai Dong Yuan 《Computers, Materials & Continua》 2026年第1期2111-2136,共26页
Vehicle Edge Computing(VEC)and Cloud Computing(CC)significantly enhance the processing efficiency of delay-sensitive and computation-intensive applications by offloading compute-intensive tasks from resource-constrain... Vehicle Edge Computing(VEC)and Cloud Computing(CC)significantly enhance the processing efficiency of delay-sensitive and computation-intensive applications by offloading compute-intensive tasks from resource-constrained onboard devices to nearby Roadside Unit(RSU),thereby achieving lower delay and energy consumption.However,due to the limited storage capacity and energy budget of RSUs,it is challenging to meet the demands of the highly dynamic Internet of Vehicles(IoV)environment.Therefore,determining reasonable service caching and computation offloading strategies is crucial.To address this,this paper proposes a joint service caching scheme for cloud-edge collaborative IoV computation offloading.By modeling the dynamic optimization problem using Markov Decision Processes(MDP),the scheme jointly optimizes task delay,energy consumption,load balancing,and privacy entropy to achieve better quality of service.Additionally,a dynamic adaptive multi-objective deep reinforcement learning algorithm is proposed.Each Double Deep Q-Network(DDQN)agent obtains rewards for different objectives based on distinct reward functions and dynamically updates the objective weights by learning the value changes between objectives using Radial Basis Function Networks(RBFN),thereby efficiently approximating the Pareto-optimal decisions for multiple objectives.Extensive experiments demonstrate that the proposed algorithm can better coordinate the three-tier computing resources of cloud,edge,and vehicles.Compared to existing algorithms,the proposed method reduces task delay and energy consumption by 10.64%and 5.1%,respectively. 展开更多
关键词 Deep reinforcement learning internet of vehicles multi-objective optimization cloud-edge computing computation offloading service caching
在线阅读 下载PDF
Anomaly Detection Method of Power Internet of Things Terminals in Zero-Trust Environment
18
作者 Sun Pengzhan Ren Yinlin +2 位作者 Shao Sujie Yang Chao Qiu Xuesong 《China Communications》 2026年第1期290-305,共16页
With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT termi... With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT terminals have security risks and vulnerabilities,and limited resources make it impossible to deploy costly security protection methods on the terminal.In order to cope with these problems,this paper proposes a lightweight trust evaluation model TCL,which combines three network models,TCN,CNN,and LSTM,with stronger feature extraction capability and can score the reliability of the device by periodically analyzing the traffic behavior and activity logs generated by the terminal device,and the trust evaluation of the terminal’s continuous behavior can be achieved by combining the scores of different periods.After experiments,it is proved that TCL can effectively use the traffic behaviors and activity logs of terminal devices for trust evaluation and achieves F1-score of 95.763,94.456,99.923,and 99.195 on HDFS,BGL,N-BaIoT,and KDD99 datasets,respectively,and the size of TCL is only 91KB,which can achieve similar or better performance than CNN-LSTM,RobustLog and other methods with less computational resources and storage space. 展开更多
关键词 anomaly detection distributed machine learning power internet of Things zero trust
在线阅读 下载PDF
Cybersecurity Opportunities and Risks of Artificial Intelligence in Industrial Control Systems:A Survey
19
作者 Ka-Kyung Kim Joon-Seok Kim +1 位作者 Dong-Hyuk Shin Ieck-Chae Euom 《Computer Modeling in Engineering & Sciences》 2026年第2期186-233,共48页
As attack techniques evolve and data volumes increase,the integration of artificial intelligence-based security solutions into industrial control systems has become increasingly essential.Artificial intelligence holds... As attack techniques evolve and data volumes increase,the integration of artificial intelligence-based security solutions into industrial control systems has become increasingly essential.Artificial intelligence holds significant potential to improve the operational efficiency and cybersecurity of these systems.However,its dependence on cyber-based infrastructures expands the attack surface and introduces the risk that adversarial manipulations of artificial intelligence models may cause physical harm.To address these concerns,this study presents a comprehensive review of artificial intelligence-driven threat detection methods and adversarial attacks targeting artificial intelligence within industrial control environments,examining both their benefits and associated risks.A systematic literature review was conducted across major scientific databases,including IEEE,Elsevier,Springer Nature,ACM,MDPI,and Wiley,covering peer-reviewed journal and conference papers published between 2017 and 2026.Studies were selected based on predefined inclusion and exclusion criteria following a structured screening process.Based on an analysis of 101 selected studies,this survey categorizes artificial intelligence-based threat detection approaches across the physical,control,and application layers of industrial control systems and examines poisoning,evasion,and extraction attacks targeting industrial artificial intelligence.The findings identify key research trends,highlight unresolved security challenges,and discuss implications for the secure deployment of artificial intelligence-enabled cybersecurity solutions in industrial control systems. 展开更多
关键词 Industrial control system industrial internet of Things cyber-physical systems artificial intelligence machine learning adversarial attacks CYBERSECURITY cyber threat SURVEY
在线阅读 下载PDF
Scalable and Resilient AI Framework for Malware Detection in Software-Defined Internet of Things
20
作者 Maha Abdelhaq Ahmad Sami Al-Shamayleh +2 位作者 Adnan Akhunzada Nikola Ivkovi´c Toobah Hasan 《Computers, Materials & Continua》 2026年第4期1307-1321,共15页
The rapid expansion of the Internet of Things(IoT)and Edge Artificial Intelligence(AI)has redefined automation and connectivity acrossmodern networks.However,the heterogeneity and limited resources of IoT devices expo... The rapid expansion of the Internet of Things(IoT)and Edge Artificial Intelligence(AI)has redefined automation and connectivity acrossmodern networks.However,the heterogeneity and limited resources of IoT devices expose them to increasingly sophisticated and persistentmalware attacks.These adaptive and stealthy threats can evade conventional detection,establish remote control,propagate across devices,exfiltrate sensitive data,and compromise network integrity.This study presents a Software-Defined Internet of Things(SD-IoT)control-plane-based,AI-driven framework that integrates Gated Recurrent Units(GRU)and Long Short-TermMemory(LSTM)networks for efficient detection of evolving multi-vector,malware-driven botnet attacks.The proposed CUDA-enabled hybrid deep learning(DL)framework performs centralized real-time detection without adding computational overhead to IoT nodes.A feature selection strategy combining variable clustering,attribute evaluation,one-R attribute evaluation,correlation analysis,and principal component analysis(PCA)enhances detection accuracy and reduces complexity.The framework is rigorously evaluated using the N_BaIoT dataset under k-fold cross-validation.Experimental results achieve 99.96%detection accuracy,a false positive rate(FPR)of 0.0035%,and a detection latency of 0.18 ms,confirming its high efficiency and scalability.The findings demonstrate the framework’s potential as a robust and intelligent security solution for next-generation IoT ecosystems. 展开更多
关键词 AI-driven malware analysis advanced persistent malware(APM) AI-poweredmalware detection deep learning(DL) malware-driven botnets software-defined internet of things(SD-IoT)
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部