期刊文献+
共找到196篇文章
< 1 2 10 >
每页显示 20 50 100
IIoT驱动下的现代建筑智能照明架构
1
作者 李乐乐 任秀秀 +1 位作者 宗轩泽 刘柯泉 《光源与照明》 2026年第1期59-61,共3页
为解决现代建筑照明系统能耗冗余、管控滞后、全生命周期经济性不足的核心问题,文章构建了一套工业物联网(industrial internet of things,IIoT)驱动的四层智能照明架构体系,利用感知层、网络层、平台层与应用层的闭环协同,实现照明系... 为解决现代建筑照明系统能耗冗余、管控滞后、全生命周期经济性不足的核心问题,文章构建了一套工业物联网(industrial internet of things,IIoT)驱动的四层智能照明架构体系,利用感知层、网络层、平台层与应用层的闭环协同,实现照明系统与人员活动、自然光照、建筑环境的动态适配。研究结果表明:相比传统荧光灯照明,IIoT智能照明架构可降低65%~70%的能耗;对比普通LED照明(仅灯具升级,无智能管控),其额外节能率达35%~40%;全生命周期(按15 a计)成本节约率稳定在28%~35%,且人员感知响应速度≤0.5 s、照度达标率超98%。研究证实,IIoT技术能有效打通照明“技术-节能-经济”的联动壁垒,为现代绿色建筑照明的升级提供可落地的技术路径与经济论证。 展开更多
关键词 iiot 智能照明 节能效率 全生命周期成本 节能机制 经济性分析
在线阅读 下载PDF
IIoT环境下基于蜣螂优化的雾工作流调度算法 被引量:1
2
作者 吴宏伟 江凌云 《计算机工程与应用》 北大核心 2025年第10期341-349,共9页
为了解决在工业物联网(industrial Internet of things,IIoT)环境下,现有的调度算法在调度工作流中对数据安全、响应时间有一定要求的任务所带来的完工时间上升、成本增加的问题,提出一种基于雾环境负载率而变化的任务调度策略,并使用... 为了解决在工业物联网(industrial Internet of things,IIoT)环境下,现有的调度算法在调度工作流中对数据安全、响应时间有一定要求的任务所带来的完工时间上升、成本增加的问题,提出一种基于雾环境负载率而变化的任务调度策略,并使用改进的蜣螂优化算法对工作流调度问题进行求解。改进的算法使用HEFT(heterogeneous earliest finish time)算法对蜣螂种群进行初始化,降低了原始算法中随机性带来的影响。同时引入了镜面反射和反向学习思想,提高了算法的搜索性能。实验结果表明,该算法相比于其他一些传统的调度算法在完工时间与成本方面都有一定的性能提升。 展开更多
关键词 工作流调度 蜣螂优化算法 HEFT算法 反向学习 调度算法 雾计算 工业物联网(iiot)
在线阅读 下载PDF
High-Throughput and Energy-Saving Blockchain for Untrusted IIoT Device Participation in Edge-to-End Collaborative Computing
3
作者 Zhang Zhen Huang Xiaowei +2 位作者 Li Chengjie Li Aihua Xiao Liqun 《China Communications》 2025年第11期132-143,共12页
The integration of blockchain and edgeto-end collaborative computing offers a solution to address the trust issues arising from untrusted IIoT devices.However,ensuring efficiency and energy-saving in applying blockcha... The integration of blockchain and edgeto-end collaborative computing offers a solution to address the trust issues arising from untrusted IIoT devices.However,ensuring efficiency and energy-saving in applying blockchain to edge-to-end collaborative computing remains a significant challenge.To tackle this,this paper proposes an innovative task-oriented blockchain architecture.The architecture comprises trusted Edge Computing(EC)servers and untrusted Industrial Internet of Things(IIoT)devices.We organize untrusted IIoT devices into several clusters,each executing a task in the form of smart contracts,and package the work logs of a task into a block.Executing a task with smart contracts within a cluster ensures the reliability of the task result.Reducing the scope of nodes involved in block consensus increases the overall throughput of the blockchain.Packaging task logs into blocks,storing and propagating blocks through corresponding Edge Computing(EC)servers reduces network load and avoids computing power competition.The paper also presents the proposed architecture’s theoretical TPS(Transactions Per Second)and failure probability calculations.Experimental results demonstrate that this architecture ensures computational security,improves TPS,and reduces resource consumption. 展开更多
关键词 blockchain technology consensus mechanism edge-to-end collaborative computing untrusted iiot devices
在线阅读 下载PDF
Unveiling CyberFortis:A Unified Security Framework for IIoT-SCADA Systems with SiamDQN-AE FusionNet and PopHydra Optimizer
4
作者 Kuncham Sreenivasa Rao Rajitha Kotoju +4 位作者 B.Ramana Reddy Taher Al-Shehari Nasser A.Alsadhan Subhav Singh Shitharth Selvarajan 《Computers, Materials & Continua》 2025年第10期1899-1916,共18页
Protecting Supervisory Control and Data Acquisition-Industrial Internet of Things(SCADA-IIoT)systems against intruders has become essential since industrial control systems now oversee critical infrastructure,and cybe... Protecting Supervisory Control and Data Acquisition-Industrial Internet of Things(SCADA-IIoT)systems against intruders has become essential since industrial control systems now oversee critical infrastructure,and cyber attackers more frequently target these systems.Due to their connection of physical assets with digital networks,SCADA-IIoT systems face substantial risks from multiple attack types,including Distributed Denial of Service(DDoS),spoofing,and more advanced intrusion methods.Previous research in this field faces challenges due to insufficient solutions,as current intrusion detection systems lack the necessary accuracy,scalability,and adaptability needed for IIoT environments.This paper introduces CyberFortis,a novel cybersecurity framework aimed at detecting and preventing cyber threats in SCADA-IIoT systems.CyberFortis presents two key innovations:Firstly,Siamese Double Deep Q-Network with Autoencoders(Siamdqn-AE)FusionNet,which enhances intrusion detection by combining deep Q-Networks with autoencoders for improved attack detection and feature extraction;and secondly,the PopHydra Optimiser,an innovative solution to compute reinforcement learning discount factors for better model performance and convergence.This method combines Siamese deep Q-Networks with autoencoders to create a system that can detect different types of attacks more effectively and adapt to new challenges.CyberFortis is better than current top attack detection systems,showing higher scores in important areas like accuracy,precision,recall,and F1-score,based on data from CICIoT 2023,UNSW-NB 15,and WUSTL-IIoT datasets.Results from the proposed framework show a 97.5%accuracy rate,indicating its potential as an effective solution for SCADA-IIoT cybersecurity against emerging threats.The research confirms that the proposed security and resilience methods are successful in protecting vital industrial control systems within their operational environments. 展开更多
关键词 Industrial Internet of Things(iiot) SCADA systems SECURITY intrusion detection system(IDS) optimization deep learning
在线阅读 下载PDF
Domain⁃Level Anonymous Cross⁃Domain Authentication Scheme for IIoT Based on Blockchain
5
作者 LIANG Yufeng SUN Lu 《Transactions of Nanjing University of Aeronautics and Astronautics》 2025年第S1期180-194,共15页
The rapid development of the industrial internet of things(IIoT)has brought huge benefits to factories equipped with IIoT technology,each of which represents an IIoT domain.More and more domains are choosing to cooper... The rapid development of the industrial internet of things(IIoT)has brought huge benefits to factories equipped with IIoT technology,each of which represents an IIoT domain.More and more domains are choosing to cooperate with each other to produce better products for greater profits.Therefore,in order to protect the security and privacy of IIoT devices in cross-domain communication,lots of cross-domain authentication schemes have been proposed.However,most schemes expose the domain to which the IIoT device belongs,or introduce a single point of failure in multi-domain cooperation,thus introducing unpredictable risks to each domain.We propose a more secure and efficient domain-level anonymous cross-domain authentication(DLCA)scheme based on alliance blockchain.The proposed scheme uses group signatures with decentralized tracing technology to provide domain-level anonymity to each IIoT device and allow the public to trace the real identity of the malicious pseudonym.In addition,DLCA takes into account the limited resource characteristics of IIoT devices to design an efficient cross-domain authentication protocol.Security analysis and performance evaluation show that the proposed scheme can be effectively used in the cross-domain authentication scenario of industrial internet of things. 展开更多
关键词 industrial internet of things(iiot) domain⁃level anonymity cross⁃domain authentication group signature
在线阅读 下载PDF
Digital Twins in the IIoT:Current Practices and Future Directions Toward Industry 5.0
6
作者 Bisni Fahad Mon Mohammad Hayajneh +3 位作者 Najah Abu Ali Farman Ullah Hikmat Ullah Shayma Alkobaisi 《Computers, Materials & Continua》 2025年第6期3675-3712,共38页
In this paper,we explore the ever-changing field ofDigital Twins(DT)in the Industrial Internet of Things(IIoT)context,emphasizing their critical role in advancing Industry 4.0 toward the frontiers of Industry 5.0.The ... In this paper,we explore the ever-changing field ofDigital Twins(DT)in the Industrial Internet of Things(IIoT)context,emphasizing their critical role in advancing Industry 4.0 toward the frontiers of Industry 5.0.The article explores the applications of DT in several industrial sectors and their smooth integration into the IIoT,focusing on the fundamentals of digital twins and emphasizing the importance of virtual-real integration.It discusses the emergence of DT,contextualizing its evolution within the framework of IIoT.The study categorizes the different types of DT,including prototypes and instances,and provides an in-depth analysis of the enabling technologies such as IoT,Artificial Intelligence(AI),Extended Reality(XR),cloud computing,and the Application Programming Interface(API).The paper demonstrates theDT advantages through the practical integration of real-world case studies,which highlights the technology’s exceptional capacity to improve traceability and fault detection within the context of the IIoT.This paper offers a focused,application-driven perspective on DTs in IIoT,specifically highlighting their role in key production phases such as designing,intelligent manufacturing,maintenance,resource management,automation,security,and safety.By emphasizing their potential to support human-centric,sustainable advancements in Industry 5.0,this study distinguishes itself from existing literature.It provides valuable insights that connect theoretical advancements with practical implementation,making it a crucial resource for researchers,practitioners,and industry professionals. 展开更多
关键词 Digital twin in industry integration of DT in iiot artificial intelligence AI-Driven DT applications
在线阅读 下载PDF
IIoT环境下基于聚类的工作流多雾协同调度算法 被引量:2
7
作者 吴宏伟 江凌云 陈海峰 《计算机工程与设计》 北大核心 2025年第1期52-59,共8页
为解决在IIoT(industrial internet of things)环境下,现有的调度算法调度工作流中通信频繁、数据传输量大的任务所带来的完工时间上升、成本增加等影响的问题,提出一种基于聚类的工作流多雾协同调度算法。通过二分K均值算法对工作流中... 为解决在IIoT(industrial internet of things)环境下,现有的调度算法调度工作流中通信频繁、数据传输量大的任务所带来的完工时间上升、成本增加等影响的问题,提出一种基于聚类的工作流多雾协同调度算法。通过二分K均值算法对工作流中的任务进行聚类,基于聚类结果,在多个雾服务器之间使用改进的免疫粒子群优化算法进行任务调度。实验结果表明,该算法相比其它一些传统的调度算法在完工时间、成本、负载均衡方面都有一定提升。 展开更多
关键词 工业物联网 聚类 工作流 二分K均值算法 多雾 免疫粒子群优化算法 调度算法
在线阅读 下载PDF
IIoT中基于GCN的无线区块链节点传输功率优化
8
作者 王维一 宋绯 +3 位作者 郑学强 焦雨涛 巨玉聪 黄世龙 《陆军工程大学学报》 2025年第6期81-87,共7页
区块链技术对保证工业物联网(Industrial Internet of Things,IIoT)的数据安全性、可信度和透明度至关重要,推动了物联网(Internet of Things,IoT)设备之间的信任和安全交互,加速了工业自动化和智能化的发展。针对区块链在IIoT中的部署... 区块链技术对保证工业物联网(Industrial Internet of Things,IIoT)的数据安全性、可信度和透明度至关重要,推动了物联网(Internet of Things,IoT)设备之间的信任和安全交互,加速了工业自动化和智能化的发展。针对区块链在IIoT中的部署优化面临网络拓扑动态复杂和无线节点能量受限等问题,提出了一种利用图卷积神经网络(graph convolutional neural network,GCN)的无线节点传输功率计算框架。通过拟合大量实验数据得到传输功率和时延之间的关系函数,引入能耗、分叉率、时延、算力等因素构建关于节点传输功率的系统效用最优化问题。经过训练后,GCN基于节点哈希算力、网络拓扑图、区块链出块间隔和区块大小等信息,可快速确定无线区块链节点最优传输功率,以提高IIoT区块链的系统能效和部署时效。实验结果表明,在复杂无线IoT环境下,所提方法能高效得到理想的无线区块链节点传输功率值,与最优值之间的平均相对偏差小于1.81%。 展开更多
关键词 工业物联网 异构网络 无线通信 无线区块链 图卷积神经网络
在线阅读 下载PDF
Edge Cloud Selection in Mobile Edge Computing(MEC)-Aided Applications for Industrial Internet of Things(IIoT)Services
9
作者 Dae-Young Kim SoYeon Lee +1 位作者 MinSeung Kim Seokhoon Kim 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2049-2060,共12页
In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to im... In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method. 展开更多
关键词 Industrial Internet of Things(iiot)network iiot service mobile edge computing(MEC) edge cloud selection MEC-aided application
在线阅读 下载PDF
A multi-point collaborative DDoS defense mechanism for IIoT environment 被引量:3
10
作者 Hongcheng Huang Peixin Ye +1 位作者 Min Hu Jun Wu 《Digital Communications and Networks》 SCIE CSCD 2023年第2期590-601,共12页
Nowadays,a large number of intelligent devices involved in the Industrial Internet of Things(IIoT)environment are posing unprecedented cybersecurity challenges.Due to the limited budget for security protection,the IIo... Nowadays,a large number of intelligent devices involved in the Industrial Internet of Things(IIoT)environment are posing unprecedented cybersecurity challenges.Due to the limited budget for security protection,the IIoT devices are vulnerable and easily compromised to launch Distributed Denial-of-Service(DDoS)attacks,resulting in disastrous results.Unfortunately,considering the particularity of the IIoT environment,most of the defense solutions in traditional networks cannot be directly applied to IIoT with acceptable security performance.Therefore,in this work,we propose a multi-point collaborative defense mechanism against DDoS attacks for IIoT.Specifically,for the single point DDoS defense,we design an edge-centric mechanism termed EdgeDefense for the detection,identification,classification,and mitigation of DDoS attacks and the generation of defense information.For the practical multi-point scenario,we propose a collaborative defense model against DDoS attacks to securely share the defense information across the network through the blockchain.Besides,a fast defense information sharing mechanism is designed to reduce the delay of defense information sharing and provide a responsive cybersecurity guarantee.The simulation results indicate that the identification and classification performance of the two machine learning models designed for EdgeDefense are better than those of the state-of-the-art baseline models,and therefore EdgeDefense can defend against DDoS attacks effectively.The results also verify that the proposed fast sharing mechanism can reduce the propagation delay of the defense information blocks effectively,thereby improving the responsiveness of the multi-point collaborative DDoS defense. 展开更多
关键词 Industrial internet of things(iiot) DDOS Deep learning Blockchain Edge computing
在线阅读 下载PDF
A multi-resource scheduling scheme of Kubernetes for IIoT 被引量:3
11
作者 ZHU Lin LI Junjiang +1 位作者 LIU Zijie ZHANG Dengyin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第3期683-692,共10页
With the rapid development of data applications in the scene of Industrial Internet of Things(IIoT),how to schedule resources in IIoT environment has become an urgent problem to be solved.Due to benefit of its strong ... With the rapid development of data applications in the scene of Industrial Internet of Things(IIoT),how to schedule resources in IIoT environment has become an urgent problem to be solved.Due to benefit of its strong scalability and compatibility,Kubernetes has been applied to resource scheduling in IIoT scenarios.However,the limited types of resources,the default scheduling scoring strategy,and the lack of delay control module limit its resource scheduling performance.To address these problems,this paper proposes a multi-resource scheduling(MRS)scheme of Kubernetes for IIoT.The MRS scheme dynamically balances resource utilization by taking both requirements of tasks and the current system state into consideration.Furthermore,the experiments demonstrate the effectiveness of the MRS scheme in terms of delay control and resource utilization. 展开更多
关键词 Industrial Internet of Things(iiot) Kubernetes resource scheduling time delay
在线阅读 下载PDF
Encryption with Image Steganography Based Data Hiding Technique in IIoT Environment 被引量:2
12
作者 Mahmoud Ragab Samah Alshehri +3 位作者 Hani A.Alhadrami Faris Kateb Ehab Bahaudien Ashary SAbdel-khalek 《Computers, Materials & Continua》 SCIE EI 2022年第7期1323-1338,共16页
Rapid advancements of the Industrial Internet of Things(IIoT)and artificial intelligence(AI)pose serious security issues by revealing secret data.Therefore,security data becomes a crucial issue in IIoT communication w... Rapid advancements of the Industrial Internet of Things(IIoT)and artificial intelligence(AI)pose serious security issues by revealing secret data.Therefore,security data becomes a crucial issue in IIoT communication where secrecy needs to be guaranteed in real time.Practically,AI techniques can be utilized to design image steganographic techniques in IIoT.In addition,encryption techniques act as an important role to save the actual information generated from the IIoT devices to avoid unauthorized access.In order to accomplish secure data transmission in IIoT environment,this study presents novel encryption with image steganography based data hiding technique(EISDHT)for IIoT environment.The proposed EIS-DHT technique involves a new quantum black widow optimization(QBWO)to competently choose the pixel values for hiding secrete data in the cover image.In addition,the multi-level discrete wavelet transform(DWT)based transformation process takes place.Besides,the secret image is divided into three R,G,and B bands which are then individually encrypted using Blowfish,Twofish,and Lorenz Hyperchaotic System.At last,the stego image gets generated by placing the encrypted images into the optimum pixel locations of the cover image.In order to validate the enhanced data hiding performance of the EIS-DHT technique,a set of simulation analyses take place and the results are inspected interms of different measures.The experimental outcomes stated the supremacy of the EIS-DHT technique over the other existing techniques and ensure maximum security. 展开更多
关键词 iiot SECURITY data hiding technique image steganography ENCRYPTION secure communication
在线阅读 下载PDF
Data Secure Storage Mechanism for IIoT Based on Blockchain 被引量:2
13
作者 Jin Wang Guoshu Huang +2 位作者 R.Simon Sherratt Ding Huang Jia Ni 《Computers, Materials & Continua》 SCIE EI 2024年第3期4029-4048,共20页
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapi... With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapid development of IIoT.Blockchain technology has immutability,decentralization,and autonomy,which can greatly improve the inherent defects of the IIoT.In the traditional blockchain,data is stored in a Merkle tree.As data continues to grow,the scale of proofs used to validate it grows,threatening the efficiency,security,and reliability of blockchain-based IIoT.Accordingly,this paper first analyzes the inefficiency of the traditional blockchain structure in verifying the integrity and correctness of data.To solve this problem,a new Vector Commitment(VC)structure,Partition Vector Commitment(PVC),is proposed by improving the traditional VC structure.Secondly,this paper uses PVC instead of the Merkle tree to store big data generated by IIoT.PVC can improve the efficiency of traditional VC in the process of commitment and opening.Finally,this paper uses PVC to build a blockchain-based IIoT data security storage mechanism and carries out a comparative analysis of experiments.This mechanism can greatly reduce communication loss and maximize the rational use of storage space,which is of great significance for maintaining the security and stability of blockchain-based IIoT. 展开更多
关键词 Blockchain iiot data storage cryptographic commitment
在线阅读 下载PDF
Machine learning-enabled MIMO-FBMC communication channel parameter estimation in IIoT: A distributed CS approach 被引量:2
14
作者 Han Wang Fida Hussain Memon +3 位作者 Xianpeng Wang Xingwang Li Ning Zhao Kapal Dev 《Digital Communications and Networks》 SCIE CSCD 2023年第2期306-312,共7页
Compressed Sensing(CS)is a Machine Learning(ML)method,which can be regarded as a single-layer unsupervised learning method.It mainly emphasizes the sparsity of the model.In this paper,we study an ML-based CS Channel E... Compressed Sensing(CS)is a Machine Learning(ML)method,which can be regarded as a single-layer unsupervised learning method.It mainly emphasizes the sparsity of the model.In this paper,we study an ML-based CS Channel Estimation(CE)method for wireless communications,which plays an important role in Industrial Internet of Things(IIoT)applications.For the sparse correlation between channels in Multiple Input Multiple Output Filter Bank MultiCarrier with Offset Quadrature Amplitude Modulation(MIMO-FBMC/OQAM)systems,a Distributed Compressed Sensing(DCS)-based CE approach is studied.A distributed sparse adaptive weak selection threshold method is proposed for CE.Firstly,the correlation between MIMO channels is utilized to represent a joint sparse model,and CE is transformed into a joint sparse signal reconstruction problem.Then,the number of correlation atoms for inner product operation is optimized by weak selection threshold,and sparse signal reconstruction is realized by sparse adaptation.The experiment results show that the proposed DCS-based method not only estimates the multipath channel components accurately but also achieves higher CE performance than classical Orthogonal Matching Pursuit(OMP)method and other traditional DCS methods in the time-frequency dual selective channels. 展开更多
关键词 iiot Machine learning Distributed compressed sensing MIMO-FBMC Channel estimation
在线阅读 下载PDF
Optimization Scheme of Trusted Task Offloading in IIoT Scenario Based on DQN 被引量:2
15
作者 Xiaojuan Wang Zikui Lu +3 位作者 Siyuan Sun Jingyue Wang Luona Song Merveille Nicolas 《Computers, Materials & Continua》 SCIE EI 2023年第1期2055-2071,共17页
With the development of the Industrial Internet of Things(IIoT),end devices(EDs)are equipped with more functions to capture information.Therefore,a large amount of data is generated at the edge of the network and need... With the development of the Industrial Internet of Things(IIoT),end devices(EDs)are equipped with more functions to capture information.Therefore,a large amount of data is generated at the edge of the network and needs to be processed.However,no matter whether these computing tasks are offloaded to traditional central clusters or mobile edge computing(MEC)devices,the data is short of security and may be changed during transmission.In view of this challenge,this paper proposes a trusted task offloading optimization scheme that can offer low latency and high bandwidth services for IIoT with data security.Blockchain technology is adopted to ensure data consistency.Meanwhile,to reduce the impact of low throughput of blockchain on task offloading performance,we design the processes of consensus and offloading as a Markov decision process(MDP)by defining states,actions,and rewards.Deep reinforcement learning(DRL)algorithm is introduced to dynamically select offloading actions.To accelerate the optimization,we design a novel reward function for the DRL algorithm according to the scale and computational complexity of the task.Experiments demonstrate that compared with methods without optimization,our mechanism performs better when it comes to the number of task offloading and throughput of blockchain. 展开更多
关键词 Task offloading blockchain industrial internet of things(iiot) deep reinforcement learning(DRL)network mobile-edge computing(MEC)
在线阅读 下载PDF
基于IIoT的西门子S7-1200 PLC线上实训教学平台设计 被引量:1
16
作者 谭波 《科技资讯》 2023年第4期212-215,共4页
该文主要论述了基于工业物联网技术,应用于西门子S7-1200 PLC实训课程教学的线上实训平台的开发。平台包含由PLC、工业互联网网关等组成的硬件平台和由多个PLC典型教学实训项目监控界面组成的软件平台。平台能够实现西门子S7-1200 PLC... 该文主要论述了基于工业物联网技术,应用于西门子S7-1200 PLC实训课程教学的线上实训平台的开发。平台包含由PLC、工业互联网网关等组成的硬件平台和由多个PLC典型教学实训项目监控界面组成的软件平台。平台能够实现西门子S7-1200 PLC的线上远程操作和多个PLC教学实训项目的线上实训。平台成功应用于PLC相关课程线上教学中,对提高学生的西门子S7-1200 PLC控制系统设计和调试的技能水平及综合应用的能力有显著作用。 展开更多
关键词 线上实训 远程操作 S7-1200 PLC iiot
在线阅读 下载PDF
Cloud control for IIoT in a cloud-edge environment 被引量:1
17
作者 YAN Ce XIA Yuanqing +1 位作者 YANG Hongjiu ZHAN Yufeng 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第4期1013-1027,共15页
The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for... The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for IIoT in cloud-edge envi-ronment with three modes of 5G.For 5G based IIoT,the time sensitive network(TSN)service is introduced in transmission network.A 5G logical TSN bridge is designed to transport TSN streams over 5G framework to achieve end-to-end configuration.For a transmission control protocol(TCP)model with nonlinear disturbance,time delay and uncertainties,a robust adaptive fuzzy sliding mode controller(AFSMC)is given with control rule parameters.IIoT workflows are made up of a series of subtasks that are linked by the dependencies between sensor datasets and task flows.IIoT workflow scheduling is a non-deterministic polynomial(NP)-hard problem in cloud-edge environment.An adaptive and non-local-convergent particle swarm optimization(ANCPSO)is designed with nonlinear inertia weight to avoid falling into local optimum,which can reduce the makespan and cost dramatically.Simulation and experiments demonstrate that ANCPSO has better performances than other classical algo-rithms. 展开更多
关键词 5G and time sensitive network(TSN) industrial Internet of Things(iiot)workflow transmission control protocol(TCP)flows control cloud edge collaboration multi-objective optimal scheduling
在线阅读 下载PDF
WebSocket协议在IIoT领域的应用优势 被引量:6
18
作者 李垚 张宇 张惠樑 《自动化应用》 2021年第1期58-60,共3页
作为网络层协议,WebSocket对比Ajax有诸多优势:支持服务器端向客户端推送功能,接入API更加容易,实时性更好。客户端与服务器建立保持型连接,可以持续传送消息。WebSocket协议数据包的首部信息量和通信量更少,减少硬件资源消耗,减轻网络... 作为网络层协议,WebSocket对比Ajax有诸多优势:支持服务器端向客户端推送功能,接入API更加容易,实时性更好。客户端与服务器建立保持型连接,可以持续传送消息。WebSocket协议数据包的首部信息量和通信量更少,减少硬件资源消耗,减轻网络负担。Web版安东系统采用WebSocket协议,实现客户端与服务器的实时数据交互,满足自动化产线数据透明的管理需求。 展开更多
关键词 WebSocket TCP 双向数据流 iiot
在线阅读 下载PDF
IIoT和云计算在智能制造业中的应用 被引量:1
19
作者 刘鹏威 《信息记录材料》 2023年第5期196-198,共3页
在过去的数十年里,物联网(internet of things,IoT)已经成为一个全新的发展范式,在无线通信和微电子技术等领域都获得了极大成就,并受到了社会重视。与传统物联网不同,工业产生的大数据随时代的发展呈指数级增长,需要实时智能处理。为... 在过去的数十年里,物联网(internet of things,IoT)已经成为一个全新的发展范式,在无线通信和微电子技术等领域都获得了极大成就,并受到了社会重视。与传统物联网不同,工业产生的大数据随时代的发展呈指数级增长,需要实时智能处理。为提高工业物联网(industrial internet of things,IIoT)系统的实时性与能源效率,引入云计算技术来分担IIoT中过重的计算任务。本文分析了IIoT及云计算对智能制造业发展产生的影响,阐述了智能传感器、设备和应用程序在提高生产力、简化业务操作中的应用,还概述了实现智能制造的安全控制和实践,为物联网和云计算在智能制造领域的发展模式提供思路。 展开更多
关键词 iiot 云计算 智能制造 人工智能 安全 应用
在线阅读 下载PDF
无线IIoT:迈向下一代工业互联 被引量:1
20
作者 Matt Maupin 《电子产品世界》 2019年第3期15-16,23,共3页
制造业、电力传输和公用事业(燃气、电、水)等工业部门的运营和环境条件总是对互连构成挑战。当存在清晰明确的网络需求时,通常使用有线连接,从而确保关键任务系统的可靠性。无线更多用于提供临时点对点连接,尤其是在有线基础设施缺乏... 制造业、电力传输和公用事业(燃气、电、水)等工业部门的运营和环境条件总是对互连构成挑战。当存在清晰明确的网络需求时,通常使用有线连接,从而确保关键任务系统的可靠性。无线更多用于提供临时点对点连接,尤其是在有线基础设施缺乏或不易实现的工业环境中。从历史上看,两种网络类型互连在一起并不常见,但互联网改变了这一切。 展开更多
关键词 无线 iiot 工业 互联
在线阅读 下载PDF
上一页 1 2 10 下一页 到第
使用帮助 返回顶部