期刊文献+
共找到119,468篇文章
< 1 2 250 >
每页显示 20 50 100
Anomaly Detection Method of Power Internet of Things Terminals in Zero-Trust Environment
1
作者 Sun Pengzhan Ren Yinlin +2 位作者 Shao Sujie Yang Chao Qiu Xuesong 《China Communications》 2026年第1期290-305,共16页
With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT termi... With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT terminals have security risks and vulnerabilities,and limited resources make it impossible to deploy costly security protection methods on the terminal.In order to cope with these problems,this paper proposes a lightweight trust evaluation model TCL,which combines three network models,TCN,CNN,and LSTM,with stronger feature extraction capability and can score the reliability of the device by periodically analyzing the traffic behavior and activity logs generated by the terminal device,and the trust evaluation of the terminal’s continuous behavior can be achieved by combining the scores of different periods.After experiments,it is proved that TCL can effectively use the traffic behaviors and activity logs of terminal devices for trust evaluation and achieves F1-score of 95.763,94.456,99.923,and 99.195 on HDFS,BGL,N-BaIoT,and KDD99 datasets,respectively,and the size of TCL is only 91KB,which can achieve similar or better performance than CNN-LSTM,RobustLog and other methods with less computational resources and storage space. 展开更多
关键词 anomaly detection distributed machine learning power internet of Things zero trust
在线阅读 下载PDF
Scalable and Resilient AI Framework for Malware Detection in Software-Defined Internet of Things
2
作者 Maha Abdelhaq Ahmad Sami Al-Shamayleh +2 位作者 Adnan Akhunzada Nikola Ivkovi´c Toobah Hasan 《Computers, Materials & Continua》 2026年第4期1307-1321,共15页
The rapid expansion of the Internet of Things(IoT)and Edge Artificial Intelligence(AI)has redefined automation and connectivity acrossmodern networks.However,the heterogeneity and limited resources of IoT devices expo... The rapid expansion of the Internet of Things(IoT)and Edge Artificial Intelligence(AI)has redefined automation and connectivity acrossmodern networks.However,the heterogeneity and limited resources of IoT devices expose them to increasingly sophisticated and persistentmalware attacks.These adaptive and stealthy threats can evade conventional detection,establish remote control,propagate across devices,exfiltrate sensitive data,and compromise network integrity.This study presents a Software-Defined Internet of Things(SD-IoT)control-plane-based,AI-driven framework that integrates Gated Recurrent Units(GRU)and Long Short-TermMemory(LSTM)networks for efficient detection of evolving multi-vector,malware-driven botnet attacks.The proposed CUDA-enabled hybrid deep learning(DL)framework performs centralized real-time detection without adding computational overhead to IoT nodes.A feature selection strategy combining variable clustering,attribute evaluation,one-R attribute evaluation,correlation analysis,and principal component analysis(PCA)enhances detection accuracy and reduces complexity.The framework is rigorously evaluated using the N_BaIoT dataset under k-fold cross-validation.Experimental results achieve 99.96%detection accuracy,a false positive rate(FPR)of 0.0035%,and a detection latency of 0.18 ms,confirming its high efficiency and scalability.The findings demonstrate the framework’s potential as a robust and intelligent security solution for next-generation IoT ecosystems. 展开更多
关键词 AI-driven malware analysis advanced persistent malware(APM) AI-poweredmalware detection deep learning(DL) malware-driven botnets software-defined internet of things(SD-IoT)
在线阅读 下载PDF
Robust and Efficient Federated Learning for Machinery Fault Diagnosis in Internet of Things
3
作者 Zhen Wu Hao Liu +4 位作者 Linlin Zhang Zehui Zhang Jie Wu Haibin He Bin Zhou 《Computers, Materials & Continua》 2026年第4期1051-1069,共19页
Recently,Internet ofThings(IoT)has been increasingly integrated into the automotive sector,enabling the development of diverse applications such as the Internet of Vehicles(IoV)and intelligent connected vehicles.Lever... Recently,Internet ofThings(IoT)has been increasingly integrated into the automotive sector,enabling the development of diverse applications such as the Internet of Vehicles(IoV)and intelligent connected vehicles.Leveraging IoVtechnologies,operational data fromcore vehicle components can be collected and analyzed to construct fault diagnosis models,thereby enhancing vehicle safety.However,automakers often struggle to acquire sufficient fault data to support effective model training.To address this challenge,a robust and efficient federated learning method(REFL)is constructed for machinery fault diagnosis in collaborative IoV,which can organize multiple companies to collaboratively develop a comprehensive fault diagnosis model while keeping their data locally.In the REFL,the gradient-based adversary algorithm is first introduced to the fault diagnosis field to enhance the deep learning model robustness.Moreover,the adaptive gradient processing process is designed to improve the model training speed and ensure the model accuracy under unbalance data scenarios.The proposed REFL is evaluated on non-independent and identically distributed(non-IID)real-world machinery fault dataset.Experiment results demonstrate that the REFL can achieve better performance than traditional learning methods and are promising for real industrial fault diagnosis. 展开更多
关键词 Federated learning adversary algorithm internet of Vehicles(IoV) fault diagnosis
在线阅读 下载PDF
A Multi-Objective Deep Reinforcement Learning Algorithm for Computation Offloading in Internet of Vehicles
4
作者 Junjun Ren Guoqiang Chen +1 位作者 Zheng-Yi Chai Dong Yuan 《Computers, Materials & Continua》 2026年第1期2111-2136,共26页
Vehicle Edge Computing(VEC)and Cloud Computing(CC)significantly enhance the processing efficiency of delay-sensitive and computation-intensive applications by offloading compute-intensive tasks from resource-constrain... Vehicle Edge Computing(VEC)and Cloud Computing(CC)significantly enhance the processing efficiency of delay-sensitive and computation-intensive applications by offloading compute-intensive tasks from resource-constrained onboard devices to nearby Roadside Unit(RSU),thereby achieving lower delay and energy consumption.However,due to the limited storage capacity and energy budget of RSUs,it is challenging to meet the demands of the highly dynamic Internet of Vehicles(IoV)environment.Therefore,determining reasonable service caching and computation offloading strategies is crucial.To address this,this paper proposes a joint service caching scheme for cloud-edge collaborative IoV computation offloading.By modeling the dynamic optimization problem using Markov Decision Processes(MDP),the scheme jointly optimizes task delay,energy consumption,load balancing,and privacy entropy to achieve better quality of service.Additionally,a dynamic adaptive multi-objective deep reinforcement learning algorithm is proposed.Each Double Deep Q-Network(DDQN)agent obtains rewards for different objectives based on distinct reward functions and dynamically updates the objective weights by learning the value changes between objectives using Radial Basis Function Networks(RBFN),thereby efficiently approximating the Pareto-optimal decisions for multiple objectives.Extensive experiments demonstrate that the proposed algorithm can better coordinate the three-tier computing resources of cloud,edge,and vehicles.Compared to existing algorithms,the proposed method reduces task delay and energy consumption by 10.64%and 5.1%,respectively. 展开更多
关键词 Deep reinforcement learning internet of vehicles multi-objective optimization cloud-edge computing computation offloading service caching
在线阅读 下载PDF
Theory and Key Technologies in Space Internet Networking
5
作者 Jiangzhou Wang Jiandong Li Di Zhou 《Engineering》 2025年第11期1-2,共2页
The rapid evolution of satellite constellation projects(e.g.,SpaceX)and the standardization of 3rd Generation Partnership Project(3GPP)non-terrestrial networks(NTNs)have positioned satellite Internet networking(SIN)as... The rapid evolution of satellite constellation projects(e.g.,SpaceX)and the standardization of 3rd Generation Partnership Project(3GPP)non-terrestrial networks(NTNs)have positioned satellite Internet networking(SIN)as a cornerstone of future communication systems.The demand for ubiquitous connectivity,resilient infrastructures,and intelligent network services has never been greater,driven by applications ranging from global broadband access to emergency response and space-air-ground integration. 展开更多
关键词 emergency response rd generation partnership project gpp non terrestrial communication systemsthe global broadband access intelligent network services satellite internet networking sin satellite constellation projects egspacex space internet networking
在线阅读 下载PDF
Hypertext及Internet上使用超文本的查询工具
6
作者 苏莉 沙迎杰 《图书馆学研究》 CSSCI 1998年第5期72-73,共2页
本文简要介绍了超文本的定义、发展由来、特点及使用超文本的两种查询工具(HytelnetWWW)。
关键词 hypertext 查询工具 超文本 internet 图书馆
在线阅读 下载PDF
Association between the subclinical level of problematic internet use and habenula volume:a look at mediation effect of neuroticism
7
作者 Halwa Zakia Yusuke Kyuragi +6 位作者 Qi Dai Naoya Oishi Yuzuki Ishikawa Lichang Yao Morio Aki Toshiya Murai Hironobu Fujiwara 《General Psychiatry》 2025年第1期26-34,共9页
Background Ongoing debates question the harm of internet use with the evolving technology,as many individuals transition from regular to problematic internet use(PIU).The habenula(Hb),located between the thalamus and ... Background Ongoing debates question the harm of internet use with the evolving technology,as many individuals transition from regular to problematic internet use(PIU).The habenula(Hb),located between the thalamus and the third ventricle,is implicated in various psychiatric disorders.In addition,personality features have been suggested to play a role in the pathophysiology of PIU.Aims This study aimed to investigate Hb volumetry in individuals with subclinical PIU and the mediating effect of personality traits on this relationship.Methods 110 healthy adults in this cross-sectional study underwent structural magnetic resonance imaging.Hb segmentation was performed using a deep learning technique.The Internet Addiction Test(IAT)and the NEO Five-Factor Inventory were used to assess the PIU level and personality,respectively.Partial Spearman's correlation analyses were performed to explore the reiationships between Hb volumetry,IAT and NEO.Multiple regression analysis was applied to identify personality traits that predict IAT scores.The significant trait was then treated as a mediator between Hb volume and IAT correlation in mediation analysis with a bootstrap value of 5000.Results Relative Hb volume was negatively correlated with IAT scores(partial rho=-0.142,p=0.009).The IAT score was positively correlated with neuroticism(partial rho=0.430,p<0.001)and negatively correlated with extraversion,agreeableness and conscientiousness(partial rho=-0.213,p<0.001;partial rho=-0.279,p<0.001;and partial rho=-0.327,p<0.001).There was a significant indirect effect of Hb volume on this model(β=-0.061,p=0.048,boot 95%confidence interval:-0.149 to-0.001).Conclusions This study uncovered a crucial link between reduced Hb volume and heightened PIU.Our findings highlight neuroticism as a key risk factor for developing PIU.Moreover,neuroticism was shown to mediate the relationship between Hb volume and PIU tendency,offering valuable insight into the complexities of this interaction. 展开更多
关键词 internet use piu hb volumetry Mediation Effect Habenula Volume NEUROTICISM personality traits Subclinical Level Problematic internet Use
暂未订购
Research on Strategies of Energy Internet to Help Smart City Sustainable Development
8
作者 Cui Wang Rong Zheng +1 位作者 Xin Zhou Letian Rong 《Proceedings of Business and Economic Studies》 2025年第2期209-214,共6页
Driven by the wave of informatization and intelligence,the smart city has become a new trend of global urban development.The intelligent transformation of energy systems is of great importance to a smart city.The Inte... Driven by the wave of informatization and intelligence,the smart city has become a new trend of global urban development.The intelligent transformation of energy systems is of great importance to a smart city.The Internet helps the sustainable development of smart cities by optimizing resource allocation,improving utilization efficiency,and promoting market competition.This study analyzes the current situation and problems of energy Internet supporting smart cities and finds that policy environment,technology maturity,market demand,and industrial chain integration have a significant positive impact on its development.Based on this,relevant strategies are proposed to provide theoretical and practical guidance for the integrated development of smart cities and the energy Internet. 展开更多
关键词 Energy internet Smart city Sustainable development
在线阅读 下载PDF
SA-WGAN Based Data Enhancement Method for Industrial Internet Intrusion Detection
9
作者 Yuan Feng Yajie Si +2 位作者 Jianwei Zhang Zengyu Cai Hongying Zhao 《Computers, Materials & Continua》 2025年第9期4431-4449,共19页
With the rapid development of the industrial Internet,the network security environment has become increasingly complex and variable.Intrusion detection,a core technology for ensuring the security of industrial control... With the rapid development of the industrial Internet,the network security environment has become increasingly complex and variable.Intrusion detection,a core technology for ensuring the security of industrial control systems,faces the challenge of unbalanced data samples,particularly the low detection rates for minority class attack samples.Therefore,this paper proposes a data enhancement method for intrusion detection in the industrial Internet based on a Self-Attention Wasserstein Generative Adversarial Network(SA-WGAN)to address the low detection rates of minority class attack samples in unbalanced intrusion detection scenarios.The proposed method integrates a selfattention mechanism with a Wasserstein Generative Adversarial Network(WGAN).The self-attention mechanism automatically learns important features from the input data and assigns different weights to emphasize the key features related to intrusion behaviors,providing strong guidance for subsequent data generation.The WGAN generates new data samples through adversarial training to expand the original dataset.In the SA-WGAN framework,the WGAN directs the data generation process based on the key features extracted by the self-attention mechanism,ensuring that the generated samples exhibit both diversity and similarity to real data.Experimental results demonstrate that the SA-WGAN-based data enhancement method significantly improves detection performance for attack samples from minority classes,addresses issues of insufficient data and category imbalance,and enhances the generalization ability and overall performance of the intrusion detection model. 展开更多
关键词 Data enhancement intrusion detection industrial internet WGAN
在线阅读 下载PDF
A Novel Clustered Distributed Federated Learning Architecture for Tactile Internet of Things Applications in 6G Environment
10
作者 Omar Alnajar Ahmed Barnawi 《Computer Modeling in Engineering & Sciences》 2025年第6期3861-3897,共37页
The Tactile Internet of Things(TIoT)promises transformative applications—ranging from remote surgery to industrial robotics—by incorporating haptic feedback into traditional IoT systems.Yet TIoT’s stringent require... The Tactile Internet of Things(TIoT)promises transformative applications—ranging from remote surgery to industrial robotics—by incorporating haptic feedback into traditional IoT systems.Yet TIoT’s stringent requirements for ultra-low latency,high reliability,and robust privacy present significant challenges.Conventional centralized Federated Learning(FL)architectures struggle with latency and privacy constraints,while fully distributed FL(DFL)faces scalability and non-IID data issues as client populations expand and datasets become increasingly heterogeneous.To address these limitations,we propose a Clustered Distributed Federated Learning(CDFL)architecture tailored for a 6G-enabled TIoT environment.Clients are grouped into clusters based on data similarity and/or geographical proximity,enabling local intra-cluster aggregation before inter-cluster model sharing.This hierarchical,peer-to-peer approach reduces communication overhead,mitigates non-IID effects,and eliminates single points of failure.By offloading aggregation to the network edge and leveraging dynamic clustering,CDFL enhances both computational and communication efficiency.Extensive analysis and simulation demonstrate that CDFL outperforms both centralized FL and DFL as the number of clients grows.Specifically,CDFL demonstrates up to a 30%reduction in training time under highly heterogeneous data distributions,indicating faster convergence.It also reduces communication overhead by approximately 40%compared to DFL.These improvements and enhanced network performance metrics highlight CDFL’s effectiveness for practical TIoT deployments.These results validate CDFL as a scalable,privacy-preserving solution for next-generation TIoT applications. 展开更多
关键词 Distributed federated learning Tactile internet of Things CLUSTERING PEER-TO-PEER
在线阅读 下载PDF
中国的全面参与,完美补齐实物互联网Physical Internet全球版图
11
作者 《物流技术与应用》 2025年第7期94-96,共3页
实物互联网physical internet(PI)被看作是“下一代”供应链,也被视为继数字互联网、能源互联网之后的第三个万物互联网的网络,三个网分别实现了信息传输、能源互通和实物的移动。实物互联网(PI)正在成为国际上最具战略意义的重要发展... 实物互联网physical internet(PI)被看作是“下一代”供应链,也被视为继数字互联网、能源互联网之后的第三个万物互联网的网络,三个网分别实现了信息传输、能源互通和实物的移动。实物互联网(PI)正在成为国际上最具战略意义的重要发展趋势之一。 展开更多
关键词 Physical internet 实物互联网 供应链
在线阅读 下载PDF
DDoS Attack Tracking Using Multi-Round Iterative Viterbi Algorithm in Satellite Internet
12
作者 Guo Wei Xu Jin +2 位作者 Pei Yukui Yin Liuguo Feng Wei 《China Communications》 2025年第3期148-163,共16页
Satellite Internet(SI)provides broadband access as a critical information infrastructure in 6G.However,with the integration of the terrestrial Internet,the influx of massive terrestrial traffic will bring significant ... Satellite Internet(SI)provides broadband access as a critical information infrastructure in 6G.However,with the integration of the terrestrial Internet,the influx of massive terrestrial traffic will bring significant threats to SI,among which DDoS attack will intensify the erosion of limited bandwidth resources.Therefore,this paper proposes a DDoS attack tracking scheme using a multi-round iterative Viterbi algorithm to achieve high-accuracy attack path reconstruction and fast internal source locking,protecting SI from the source.Firstly,to reduce communication overhead,the logarithmic representation of the traffic volume is added to the digests after modeling SI,generating the lightweight deviation degree to construct the observation probability matrix for the Viterbi algorithm.Secondly,the path node matrix is expanded to multi-index matrices in the Viterbi algorithm to store index information for all probability values,deriving the path with non-repeatability and maximum probability.Finally,multiple rounds of iterative Viterbi tracking are performed locally to track DDoS attack based on trimming tracking results.Simulation and experimental results show that the scheme can achieve 96.8%tracking accuracy of external and internal DDoS attack at 2.5 seconds,with the communication overhead at 268KB/s,effectively protecting the limited bandwidth resources of SI. 展开更多
关键词 DDoS tracking iterative Viterbi algorithm satellite internet 6G
在线阅读 下载PDF
Cost and Time Optimization of Cloud Services in Arduino-Based Internet of Things Systems for Energy Applications
13
作者 Reza Nadimi Maryam Hashemi Koji Tokimatsu 《Journal on Internet of Things》 2025年第1期49-69,共21页
Existing Internet of Things(IoT)systems that rely on Amazon Web Services(AWS)often encounter inefficiencies in data retrieval and high operational costs,especially when using DynamoDB for large-scale sensor data.These... Existing Internet of Things(IoT)systems that rely on Amazon Web Services(AWS)often encounter inefficiencies in data retrieval and high operational costs,especially when using DynamoDB for large-scale sensor data.These limitations hinder the scalability and responsiveness of applications such as remote energy monitoring systems.This research focuses on designing and developing an Arduino-based IoT system aimed at optimizing data transmission costs by concentrating on these services.The proposed method employs AWS Lambda functions with Amazon Relational Database Service(RDS)to facilitate the transmission of data collected from temperature and humidity sensors to the RDS database.In contrast,the conventional method utilizes AmazonDynamoDB for storing the same sensor data.Data were collected from 01 April 2022,to 26 August 2022,in Tokyo,Japan,focusing on temperature and relative humiditywitha resolutionof oneminute.The efficiency of the twomethods—conventional andproposed—was assessed in terms of both time and cost metrics,with a particular focus on data retrieval.The conventional method exhibited linear time complexity,leading to longer data retrieval times as the dataset grew,mainly due to DynamoDB’s pagination requirements and the parsing of payload data during the reading process.In contrast,the proposed method significantly reduced retrieval times for larger datasets by parsing payload data before writing it to the RDS database.Cost analysis revealed a savings of$1.56 per month with the adoption of the proposed approach for a 20-gigabyte database. 展开更多
关键词 Arduino-based internet of things internet of things-based solar energy system Amazon web service Amazon web service data retrieval Amazon web service lambda Amazon relational database service DynamoDB
在线阅读 下载PDF
Assessing the capacity value of demand flexibility from aggregated small Internet data centers in power distribution systems
14
作者 Bo Zeng Xinzhu Xu Fulin Yang 《Global Energy Interconnection》 2025年第3期460-473,共14页
With the advent of the digital economy,there has been a rapid proliferation of small-scale Internet data centers(SIDCs).By leveraging their spatiotemporal load regulation potential through data workload balancing,aggr... With the advent of the digital economy,there has been a rapid proliferation of small-scale Internet data centers(SIDCs).By leveraging their spatiotemporal load regulation potential through data workload balancing,aggregated SIDCs have emerged as promising demand response(DR)resources for future power distribution systems.This paper presents an innovative framework for assessing capacity value(CV)by aggregating SIDCs participating in DR programs(SIDC-DR).Initially,we delineate the concept of CV tailored for aggregated SIDC scenarios and establish a metric for the assessment.Considering the effects of the data load dynamics,equipment constraints,and user behavior,we developed a sophisticated DR model for aggregated SIDCs using a data network aggregation method.Unlike existing studies,the proposed model captures the uncertainties associated with end tenant decisions to opt into an SIDC-DR program by utilizing a novel uncertainty modeling approach called Z-number formulation.This approach accounts for both the uncertainty in user participation intentions and the reliability of basic information during the DR process,enabling high-resolution profiling of the SIDC-DR potential in the CV evaluation.Simulation results from numerical studies conducted on a modified IEEE-33 node distribution system confirmed the effectiveness of the proposed approach and highlighted the potential benefits of SIDC-DR utilization in the efficient operation of future power systems. 展开更多
关键词 Aggregated Small internet data center Demand response Capacity value Z-number
在线阅读 下载PDF
Enterprise Digital Planning and Architecture Based on the Industrial Internet Platform
15
作者 Li Wang Xiong Li +2 位作者 Juan Zhang Ming Luo Mengwei Liu 《Journal of Electronic Research and Application》 2025年第3期137-143,共7页
Under the current background of an information society,the digital transformation of enterprises has become a necessary means to enhance the competitiveness of enterprises.This article is based on the industrial Inter... Under the current background of an information society,the digital transformation of enterprises has become a necessary means to enhance the competitiveness of enterprises.This article is based on the industrial Internet platform,the digital planning and architecture of enterprises research.First,we analyze the current challenges of digital transformation and the development opportunities brought by the industrial Internet.Then,we propose a digital planning method based on the industrial Internet platform,which takes the full connectivity of people,machine and things and intelligent decision making as the core,takes data collection,processing,analysis and application as the main line,and finally forms the top-level design of the digital transformation of enterprises.At the same time,we also built an industrial Internet platform architecture model,including the previous end perception layer,network transmission layer,platform service layer,and application innovation layer for four levels,to support enterprises in innovative applications and decision support under the industrial Internet environment.Research shows that this kind of enterprise digital planning and architecture based on an industrial Internet platform can effectively promote enterprises to achieve business model innovation,system innovation,and strengthen the flexibility and agility of enterprises to respond to market changes.The results of this research not only have important theoretical and practical significance for guiding enterprises to carry out digital planning and build an industrial Internet platform,but also provide useful reference for relevant policy formulation. 展开更多
关键词 Industrial internet platform Enterprise digital planning Architecture model Innovative application AGILITY
在线阅读 下载PDF
New Method of Multi-Source Heterogeneous Data Signal Processing of Power Internet of Things Based on Compressive Sensing
16
作者 Li Yongjie Shen Jing +3 位作者 Zang Huaping Hou Huanpeng Yang Yimu Yao Haoyu 《China Communications》 2025年第11期242-255,共14页
In the heterogeneous power internet of things(IoT)environment,data signals are acquired to support different business systems to realize advanced intelligent applications,with massive,multi-source,heterogeneous and ot... In the heterogeneous power internet of things(IoT)environment,data signals are acquired to support different business systems to realize advanced intelligent applications,with massive,multi-source,heterogeneous and other characteristics.Reliable perception of information and efficient transmission of energy in multi-source heterogeneous environments are crucial issues.Compressive sensing(CS),as an effective method of signal compression and transmission,can accurately recover the original signal only by very few sampling.In this paper,we study a new method of multi-source heterogeneous data signal reconstruction of power IoT based on compressive sensing technology.Based on the traditional compressive sensing technology to directly recover multi-source heterogeneous signals,we fully use the interference subspace information to design the measurement matrix,which directly and effectively eliminates the interference while making the measurement.The measure matrix is optimized by minimizing the average cross-coherence of the matrix,and the reconstruction performance of the new method is further improved.Finally,the effectiveness of the new method with different parameter settings under different multi-source heterogeneous data signal cases is verified by using orthogonal matching pursuit(OMP)and sparsity adaptive matching pursuit(SAMP)for considering the actual environment with prior information utilization of signal sparsity and no prior information utilization of signal sparsity. 展开更多
关键词 compressive sensing heterogeneous power internet of things multi-source heterogeneous signal reconstruction
在线阅读 下载PDF
Age-Optimal Cached Distribution in the Satellite-Integrated Internet of Things via Cross-Slot Directed Graph
17
作者 Hu Zhouyong Li Yue +1 位作者 Zhang Hanxu Yang Zhihua 《China Communications》 2025年第6期300-318,共19页
In the Satellite-integrated Internet of Things(S-IoT),data freshness in the time-sensitive scenarios could not be guaranteed over the timevarying topology with current distribution strategies aiming to reduce the tran... In the Satellite-integrated Internet of Things(S-IoT),data freshness in the time-sensitive scenarios could not be guaranteed over the timevarying topology with current distribution strategies aiming to reduce the transmission delay.To address this problem,in this paper,we propose an age-optimal caching distribution mechanism for the high-timeliness data collection in S-IoT by adopting a freshness metric,as called age of information(AoI)through the caching-based single-source multidestinations(SSMDs)transmission,namely Multi-AoI,with a well-designed cross-slot directed graph(CSG).With the proposed CSG,we make optimizations on the locations of cache nodes by solving a nonlinear integer programming problem on minimizing Multi-AoI.In particular,we put up forward three specific algorithms respectively for improving the Multi-AoI,i.e.,the minimum queuing delay algorithm(MQDA)based on node deviation from average level,the minimum propagation delay algorithm(MPDA)based on the node propagation delay reduction,and a delay balanced algorithm(DBA)based on node deviation from average level and propagation delay reduction.The simulation results show that the proposed mechanism can effectively improve the freshness of information compared with the random selection algorithm. 展开更多
关键词 age of information cached distribution satellite-integrated internet of things time-varying graph
在线阅读 下载PDF
Toward zero trust in 5G Industrial Internet collaboration systems
18
作者 Han Zhang Ziyan Zhang Liquan Chen 《Digital Communications and Networks》 2025年第2期547-555,共9页
With the introduction of 5G,users and devices can access the industrial network from anywhere in the world.Therefore,traditional perimeter-based security technologies for industrial networks can no longer work well.To... With the introduction of 5G,users and devices can access the industrial network from anywhere in the world.Therefore,traditional perimeter-based security technologies for industrial networks can no longer work well.To solve this problem,a new security model called Zero Trust(ZT)is desired,which believes in“never trust and always verify”.Every time the asset in the industrial network is accessed,the subject is authenticated and its trustworthiness is assessed.In this way,the asset in industrial network can be well protected,whether the subject is in the internal network or the external network.However,in order to construct the zero trust model in the 5G Industrial Internet collaboration system,there are still many problems to be solved.In this paper,we first introduce the security issues in the 5G Industrial Internet collaboration system,and illustrate the zero trust architecture.Then,we analyze the gap between existing security techniques and the zero trust architecture.Finally,we discuss several potential security techniques that can be used to implement the zero trust model.The purpose of this paper is to point out the further direction for the realization of the Zero Trust Architecture(ZTA)in the 5G Industrial Internet collaboration system. 展开更多
关键词 Zero trust 5G Industrial internet collaboration system Trust assessment Access control AUTHENTICATION
在线阅读 下载PDF
Exploration of Strategies for Ideological and Political Education by Counselors in College and Universities of Xinjiang under the Mobile Internet Environment
19
作者 Junhui WANG Xufeng YU +2 位作者 Lei ZHANG Ling CHU Rehanguli Xiukuer 《Asian Agricultural Research》 2025年第6期51-53,共3页
The present paper explores the ideological and political education work of university counselors in Xinjiang under the mobile Internet environment.It elaborates on the significant value of this work in adapting to con... The present paper explores the ideological and political education work of university counselors in Xinjiang under the mobile Internet environment.It elaborates on the significant value of this work in adapting to contemporary development trends,promoting cultural integration,and safeguarding regional stability.The study analyzes various challenges encountered,including difficulties in information screening,limitations in online communication,and insufficient digital literacy.Corresponding countermeasures are proposed with the aim of enhancing the effectiveness of ideological and political education in Xinjiang s higher education institutions,fostering healthy student development,and facilitating regional progress. 展开更多
关键词 Mobile internet Counselors in colleges and universities Ideological and political education
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部