期刊文献+
共找到124,875篇文章
< 1 2 250 >
每页显示 20 50 100
基于IoT技术的寒地黑土质量信息监测系统
1
作者 葛宜元 孙道起 +4 位作者 孟庆祥 王囡囡 高士军 苏安双 王淼 《农机化研究》 北大核心 2026年第1期226-232,267,共8页
寒地黑土是我国东北地区的重要农业资源,土壤质量和环境状况直接影响粮食产量和质量。为有效监测和管理寒地黑土质量和环境变化情况,构建了一种基于物联网(IoT)技术的寒地黑土质量信息监测系统。该系统通过传感器采集土壤湿度、温度、p... 寒地黑土是我国东北地区的重要农业资源,土壤质量和环境状况直接影响粮食产量和质量。为有效监测和管理寒地黑土质量和环境变化情况,构建了一种基于物联网(IoT)技术的寒地黑土质量信息监测系统。该系统通过传感器采集土壤湿度、温度、pH值和氮磷钾等养分数据,并利用无线网络传输至数据处理中心,进行数据存储、分析和可视化展示。设计地力评价模块,根据寒地作物种植需求,选择适合寒地黑土的地力评价因子,以选定的评价指标为基本对象,通过选取层次分析法进行指标权重分析,利用模糊综合评价法进行隶属度计算以进行寒地黑土信息评价;系统可实现土壤质量信息的实时监测,数据查询、分析、评价和下载。验证试验结果表明,该系统在寒地环境中数据测量稳定,土壤温度测量精度达到±0.3℃,湿度为±0.26%RH,pH值为±0.03,系统阈值报警响应时间平均为15 s。该系统实现了寒地黑土质量信息的中长期稳定监测,对地力的评价符合农业部标准,可为肥料施用等农田管理提供科学合理的建议,进而提高管理效率,实现作物增产增收。 展开更多
关键词 寒地黑土 质量监测 MCGS iot技术 可视化 地力评价
在线阅读 下载PDF
面向低轨卫星的NB-IoT资源切片动态管理方法
2
作者 洪涛 李治 +2 位作者 倪一天 丁晓进 张更新 《南京邮电大学学报(自然科学版)》 北大核心 2026年第1期66-75,共10页
针对低轨卫星高动态场景下多服务质量(Quality of Service,QoS)时变物联业务资源调度问题,提出了一种基于Lyapunov优化的窄带物联网(Narrow Band Internet of Things,NB-IoT)多业务资源切片动态管理方法。该方法综合考虑多物联业务QoS... 针对低轨卫星高动态场景下多服务质量(Quality of Service,QoS)时变物联业务资源调度问题,提出了一种基于Lyapunov优化的窄带物联网(Narrow Band Internet of Things,NB-IoT)多业务资源切片动态管理方法。该方法综合考虑多物联业务QoS需求、不同QoS业务队列状态以及切片大小的动态划分,构建了资源切片动态管理的资源调度优化问题。基于Lyapunov优化理论将非凸的多时隙动态资源切片划分问题转化为单时隙多QoS业务资源切片配置问题,从而在动态业务场景下实现资源切片与多QoS业务队列之间的动态适配。仿真结果表明,与传统NB-IoT上行资源调度方法相比,所提方法在低轨高动态场景下能够显著提升时延确定性业务的QoS保障和吞吐量。 展开更多
关键词 低轨卫星物联网 窄带物联网 资源调度 李雅普诺夫优化 吞吐量
在线阅读 下载PDF
基于GIS+IoT的历史建筑智能监测预警平台设计与实现
3
作者 赵小阳 张秀英 +1 位作者 邱镛康 付乐宜 《工程勘察》 2026年第1期50-56,70,共8页
广州是我国第一批国家历史文化名城。名城保护领域对科学性的要求促使很多时空信息技术得以应用。历史建筑是名城保护的物质空间载体,本文以广州市H区为试点,在历史建筑关键部位布设摄像头、位移传感器、烟火传感器等物联感知设备,设计... 广州是我国第一批国家历史文化名城。名城保护领域对科学性的要求促使很多时空信息技术得以应用。历史建筑是名城保护的物质空间载体,本文以广州市H区为试点,在历史建筑关键部位布设摄像头、位移传感器、烟火传感器等物联感知设备,设计并研发历史建筑智能监测预警平台,实现24 h不间断的人员闯入、位移监测、烟火识别等风险监测,提出三级预警参数与机制,将疑似异常信息分类分级研判并分通道予以预警报告,在试点区取得较好的应用效果。实践表明,该方法可提供历史建筑“AI+物联网+互联网+”融合的“现状上图一体化、人工巡查智能化、风险预警智慧化”的监管保护新模式,运用科技手段实现历史文化遗产实时安全监测,显著降低人工巡查巡检工作量,对历史文化遗产保护和城市安全管理具有借鉴意义。 展开更多
关键词 文化遗产 历史建筑 物联感知 安全监测 监测预警 AI预警
原文传递
基于NB-IoT的智慧路灯系统设计
4
作者 付瑞玲 李佳琦 +2 位作者 靳亚鹏 宋姿含 张楠 《黄河科技学院学报》 2026年第2期47-53,共7页
作为智慧城市基础设施的重要组成部分,智慧路灯正以其独特的创新应用和广阔的前景,引领着城市照明与管理的新一轮变革。设计了一个基于NB-IoT的智慧路灯系统,主要有主控、传感器、声光报警、无线通信、按键和显示6个模块;系统根据环境... 作为智慧城市基础设施的重要组成部分,智慧路灯正以其独特的创新应用和广阔的前景,引领着城市照明与管理的新一轮变革。设计了一个基于NB-IoT的智慧路灯系统,主要有主控、传感器、声光报警、无线通信、按键和显示6个模块;系统根据环境光线强度、路灯亮度以及人或车的经过情况,控制声光报警电路、灯光调节等,同时利用通信模块NB-IoT将数据传输至云平台。系统有手动、自动和定时3种模式。系统构建起一个互联互通、高效协同的智慧路灯体系,为智慧城市建设贡献重要组成部分。 展开更多
关键词 光线传感器 NB-iot 智慧路灯
在线阅读 下载PDF
一种用于移动IoT的0.79~2.70μW高SNDR电平交叉噪声整形SAR ADC
5
作者 牟峻萱 徐卫林 +2 位作者 莫培思 曾志伟 韦保林 《半导体技术》 北大核心 2026年第3期256-262,288,共8页
为解决传统电平交叉模数转换器(LC ADC)精度较低和噪声整形逐次逼近寄存器(NS SAR)ADC功耗较大的问题,提出了一种应用于移动物联网(IoT)随机稀疏信号采集的LC-NS SAR ADC。在NS SAR ADC前端插入8 bit的LC ADC作为输入信号活跃度的预检... 为解决传统电平交叉模数转换器(LC ADC)精度较低和噪声整形逐次逼近寄存器(NS SAR)ADC功耗较大的问题,提出了一种应用于移动物联网(IoT)随机稀疏信号采集的LC-NS SAR ADC。在NS SAR ADC前端插入8 bit的LC ADC作为输入信号活跃度的预检测电路,在电平交叉发生后开启NS SAR ADC的转换。二阶无源噪声整形电路积分过程只在事件触发后发生,从而能够根据输入信号的活跃度动态调节整体功耗。在1.8 V 180 nm CMOS工艺、采样率为40 kS/s、过采样率(OSR)为20、带宽为1 kHz下对该ADC进行仿真验证,结果表明信噪失真比(SNDR)达到87 dB,电路功耗为2.70μW,心电图信号输入时功耗仅为0.79μW,相较于传统等间隔奈奎斯特采样ADC,采样点减少了73%,在处理生物医学信号时实现了约5∶1的数据压缩比,Schreier品质因数(FoMs)和Walden品质因数(FoMw)分别为172.6 dB和67.0 fJ/conv.step。 展开更多
关键词 低功耗 电平交叉模数转换器(LC ADC) 事件驱动 物联网(iot)应用 噪声整形
原文传递
IRS辅助C-IoT系统的保密率设计
6
作者 孙振兴 胥子昂 +2 位作者 南春萍 李雪峰 许红 《计算机技术与发展》 2026年第2期10-15,共6页
针对智能反射面(Intelligent Reflecting Surface,IRS)辅助的含窃听者的认知物联网(Cognitive Internet of Things,C-IoT)通信系统,提出了一种基于联合波束成型的保密率优化方案。在系统模型中,考虑了一个由发射机、主用户、次用户、窃... 针对智能反射面(Intelligent Reflecting Surface,IRS)辅助的含窃听者的认知物联网(Cognitive Internet of Things,C-IoT)通信系统,提出了一种基于联合波束成型的保密率优化方案。在系统模型中,考虑了一个由发射机、主用户、次用户、窃听者和智能反射面组成的多输入单输出通信场景。基于该模型,构建保密率优化问题,即在发射机总功率约束、主用户端干扰功率约束以及智能反射面单位模约束的条件下,通过联合优化主被动波束成型,最大化系统的保密率(Secrecy Rate,SR)。在实现过程中,由于公式化的问题非凸,因此使用交替优化的方法将原始问题分解为两个子问题进行优化,即发射机波束成型矩阵的优化以及IRS相移矩阵优化。针对发射机波束成型的矩阵优化,使用半定松弛法与逐次凸逼近法。接着,使用丁克尔巴赫法与逐次凸逼近的方法对IRS的相移矩阵进行优化。仿真结果表明,在含有窃听者的多输入单输出系统中,引入智能反射面实现主被动波束成型的优化有效提高了系统的保密率。 展开更多
关键词 智能反射面 认知物联网 多输入单输出 波束成型 保密率
在线阅读 下载PDF
一种结合IoT的无人化车载EOL老化测试生产方案
7
作者 金希栓 何龙胜 +1 位作者 汪洋 许雨舟 《汽车制造业》 2026年第1期67-68,73,共3页
针对传统主机厂依赖“一次合格”检测原则,导致难以全面管控测试过程风险的问题,本文提出了一种基于物联网(IoT)的无人化车载EOL老化测试方案。该方案通过在总装电检流程中集成测试App,建立专用测试场地,并依托IoT系统实现测试数据的自... 针对传统主机厂依赖“一次合格”检测原则,导致难以全面管控测试过程风险的问题,本文提出了一种基于物联网(IoT)的无人化车载EOL老化测试方案。该方案通过在总装电检流程中集成测试App,建立专用测试场地,并依托IoT系统实现测试数据的自动上传与智能判断,显著提升了车辆出厂质量。实际应用表明,该体系在试制车型应用中使问题率由9.3%降至5.25%。 展开更多
关键词 EOL老化测试 iot 自动化 APP
在线阅读 下载PDF
基于并行Transformer-LSTM的IoT时间序列异常检测方法
8
作者 毋丽丽 王健 +2 位作者 冯丽萍 高天 刘文远 《燕山大学学报》 北大核心 2026年第1期85-94,共10页
针对物联网复杂时间序列的异常检测问题,本研究提出了一种基于Transformer和长短期记忆网络(Long Short-Term Memory,LSTM)优化的并行Transformer-LSTM混合模型。利用沙普利加解释值对特征重要性进行评估,进而筛选出关键特征,同时采用... 针对物联网复杂时间序列的异常检测问题,本研究提出了一种基于Transformer和长短期记忆网络(Long Short-Term Memory,LSTM)优化的并行Transformer-LSTM混合模型。利用沙普利加解释值对特征重要性进行评估,进而筛选出关键特征,同时采用滑动切片技术对时间序列数据进行重构,以增强模型对时域特征的捕捉能力。此外,引入集成层对不同特征进行整合并自动调整其权重,从而优化异常检测性能。实验部分使用均方误差和二元交叉熵作为损失函数,分别对LSTM、串联Transformer-LSTM模型及并行Transformer-LSTM模型进行训练,最终通过加权方式获取异常分值。实验结果表明,所提出的模型在真实数据集上表现出色,与现有方法相比,在准确率、精确度、召回率等关键指标上均有显著提升。进一步的消融实验验证了模型各组成部分的有效性,即使在异常率仅为1%的Fridge数据集,检测准确率仍可以达到99.93%,充分证明了该模型在复杂时间序列异常检测任务中的优越性能。 展开更多
关键词 物联网 异常检测 TRANSFORMER LSTM
在线阅读 下载PDF
基于BIM+IoT融合的预制拼装叠合车站数字孪生技术
9
作者 乐玲 路林海 +3 位作者 李晓军 吕艳云 寇鑫雨 凌加鑫 《城市轨道交通研究》 北大核心 2026年第3期59-65,74,共8页
[目的]相比于传统混凝土施工,在城市轨道交通车站建造中应用基于数字孪生技术的预制拼装施工,可以有效保证构件生产质量,减少环境污染和资源消耗,为此,应对适合预制拼装车站施工的数字孪生技术进行深入研究。[方法]首先提出了BIM(建筑... [目的]相比于传统混凝土施工,在城市轨道交通车站建造中应用基于数字孪生技术的预制拼装施工,可以有效保证构件生产质量,减少环境污染和资源消耗,为此,应对适合预制拼装车站施工的数字孪生技术进行深入研究。[方法]首先提出了BIM(建筑信息模型)、IoT(物联网)等数字孪生技术应用在车站建造中的总体架构,即“4横+4纵+N平台”架构。其次提出了BIM的建模流程和思路,通过数模分离、轻量化处理、数模关联等方法,将建立好的BIM数据导入平台中,并建立了IoT监测数据上传BIM平台的技术流程。最后以济南城市轨道交通8号线一期工程某地下预制拼装叠合车站为案例,对基于BIM+IoT融合的预制拼装叠合车站数字孪生技术进行了应用效果分析。[结果及结论]所提的数字孪生技术在案例车站的应用效果良好,实现了施工进度查询、结构安全监测、质量管理控制、工艺辅助设计等设计目标,实现了构件全生命周期的数据管理交互共享。 展开更多
关键词 城市轨道交通 预制拼装叠合车站 建筑信息模型 物联网 数字孪生技术
在线阅读 下载PDF
基于NB-IoT通信的铁路供配电系统故障数据识别技术研究
10
作者 徐杨 《通信电源技术》 2026年第1期228-230,共3页
为提高铁路供配电系统故障检测的及时性和精准性,基于窄带物联网(Narrow Band Internet of Things,NB-IoT)通信技术,提出了铁路供配电系统故障数据识别技术,并构建了完整的数据采集、传输和识别模型系统。研究结果表明,该技术在故障识... 为提高铁路供配电系统故障检测的及时性和精准性,基于窄带物联网(Narrow Band Internet of Things,NB-IoT)通信技术,提出了铁路供配电系统故障数据识别技术,并构建了完整的数据采集、传输和识别模型系统。研究结果表明,该技术在故障识别准确性和响应速度上表现突出,为复杂环境下铁路供配电系统的稳定运行提供了有效支持。 展开更多
关键词 铁路供配电 窄带物联网(NB-iot)通信 故障数据识别
在线阅读 下载PDF
Energy Aware Task Scheduling of IoT Application Using a Hybrid Metaheuristic Algorithm in Cloud Computing
11
作者 Ahmed Awad Mohamed Eslam Abdelhakim Seyam +4 位作者 Ahmed R.Elsaeed Laith Abualigah Aseel Smerat Ahmed M.AbdelMouty Hosam E.Refaat 《Computers, Materials & Continua》 2026年第3期1786-1803,共18页
In recent years,fog computing has become an important environment for dealing with the Internet of Things.Fog computing was developed to handle large-scale big data by scheduling tasks via cloud computing.Task schedul... In recent years,fog computing has become an important environment for dealing with the Internet of Things.Fog computing was developed to handle large-scale big data by scheduling tasks via cloud computing.Task scheduling is crucial for efficiently handling IoT user requests,thereby improving system performance,cost,and energy consumption across nodes in cloud computing.With the large amount of data and user requests,achieving the optimal solution to the task scheduling problem is challenging,particularly in terms of cost and energy efficiency.In this paper,we develop novel strategies to save energy consumption across nodes in fog computing when users execute tasks through the least-cost paths.Task scheduling is developed using modified artificial ecosystem optimization(AEO),combined with negative swarm operators,Salp Swarm Algorithm(SSA),in order to competitively optimize their capabilities during the exploitation phase of the optimal search process.In addition,the proposed strategy,Enhancement Artificial Ecosystem Optimization Salp Swarm Algorithm(EAEOSSA),attempts to find the most suitable solution.The optimization that combines cost and energy for multi-objective task scheduling optimization problems.The backpack problem is also added to improve both cost and energy in the iFogSim implementation as well.A comparison was made between the proposed strategy and other strategies in terms of time,cost,energy,and productivity.Experimental results showed that the proposed strategy improved energy consumption,cost,and time over other algorithms.Simulation results demonstrate that the proposed algorithm increases the average cost,average energy consumption,and mean service time in most scenarios,with average reductions of up to 21.15%in cost and 25.8%in energy consumption. 展开更多
关键词 Energy-efficient tasks internet of things(iot) cloud fog computing artificial ecosystem-based optimization salp swarm algorithm cloud computing
在线阅读 下载PDF
Quantum Inspired Adaptive Resource Management Algorithm for Scalable and Energy Efficient Fog Computing in Internet of Things(IoT)
12
作者 Sonia Khan Naqash Younas +3 位作者 Musaed Alhussein Wahib Jamal Khan Muhammad Shahid Anwar Khursheed Aurangzeb 《Computer Modeling in Engineering & Sciences》 2025年第3期2641-2660,共20页
Effective resource management in the Internet of Things and fog computing is essential for efficient and scalable networks.However,existing methods often fail in dynamic and high-demand environments,leading to resourc... Effective resource management in the Internet of Things and fog computing is essential for efficient and scalable networks.However,existing methods often fail in dynamic and high-demand environments,leading to resource bottlenecks and increased energy consumption.This study aims to address these limitations by proposing the Quantum Inspired Adaptive Resource Management(QIARM)model,which introduces novel algorithms inspired by quantum principles for enhanced resource allocation.QIARM employs a quantum superposition-inspired technique for multi-state resource representation and an adaptive learning component to adjust resources in real time dynamically.In addition,an energy-aware scheduling module minimizes power consumption by selecting optimal configurations based on energy metrics.The simulation was carried out in a 360-minute environment with eight distinct scenarios.This study introduces a novel quantum-inspired resource management framework that achieves up to 98%task offload success and reduces energy consumption by 20%,addressing critical challenges of scalability and efficiency in dynamic fog computing environments. 展开更多
关键词 Quantum computing resource management energy efficiency fog computing internet of Things
在线阅读 下载PDF
An IoT-Based Predictive Maintenance Framework Using a Hybrid Deep Learning Model for Smart Industrial Systems
13
作者 Atheer Aleran Hanan Almukhalfi +3 位作者 Ayman Noor Reyadh Alluhaibi Abdulrahman Hafez Talal H.Noor 《Computers, Materials & Continua》 2026年第3期2163-2183,共21页
Modern industrial environments require uninterrupted machinery operation to maintain productivity standards while ensuring safety and minimizing costs.Conventional maintenance methods,such as reactive maintenance(i.e.... Modern industrial environments require uninterrupted machinery operation to maintain productivity standards while ensuring safety and minimizing costs.Conventional maintenance methods,such as reactive maintenance(i.e.,run to failure)or time-based preventive maintenance(i.e.,scheduled servicing),prove ineffective for complex systems with many Internet of Things(IoT)devices and sensors because they fall short in detecting faults at early stages when it is most crucial.This paper presents a predictive maintenance framework based on a hybrid deep learning model that integrates the capabilities of Long Short-Term Memory(LSTM)Networks and Convolutional Neural Networks(CNNs).The framework integrates spatial feature extraction and temporal sequence modeling to accurately classify the health state of industrial equipment into three categories,including Normal,Require Maintenance,and Failed.The framework uses a modular pipeline that includes IoT-enabled data collection along with secure transmission methods to manage cloud storage and provide real-time fault classification.The FD004 subset of the NASA C-MAPSS dataset,containing multivariate sensor readings from aircraft engines,serves as the training and evaluation data for the model.Experimental results show that the LSTM-CNN model outperforms baseline models such as LSTM-SVM and LSTM-RNN,achieving an overall average accuracy of 86.66%,precision of 86.00%,recall of 86.33%,and F1-score of 86.33%.Contrary to the previous LSTM-CNN-based predictive maintenance models that either provide a binary classification or rely on synthetically balanced data,our paper provides a three-class maintenance state(i.e.,Normal,Require Maintenance,and Failed)along with threshold-based labeling that retains the true nature of the degradation.In addition,our work also provides an IoT-to-cloud-based modular architecture for deployment.It offers Computerized Maintenance Management System(CMMS)integration,making our proposed solution not only technically sound but also practical and innovative.The solution achieves real-world industrial deployment readiness through its reliable performance alongside its scalable system design. 展开更多
关键词 Predictive maintenance internet of Things(iot) smart industrial systems LSTM-CNN hybrid model deep learning remaining useful life(RUL) industrial fault diagnosis
在线阅读 下载PDF
ANNDRA-IoT:A Deep Learning Approach for Optimal Resource Allocation in Internet of Things Environments
14
作者 Abdullah M.Alqahtani Kamran Ahmad Awan +1 位作者 Abdulaziz Almaleh Osama Aletri 《Computer Modeling in Engineering & Sciences》 2025年第3期3155-3179,共25页
Efficient resource management within Internet of Things(IoT)environments remains a pressing challenge due to the increasing number of devices and their diverse functionalities.This study introduces a neural network-ba... Efficient resource management within Internet of Things(IoT)environments remains a pressing challenge due to the increasing number of devices and their diverse functionalities.This study introduces a neural network-based model that uses Long-Short-Term Memory(LSTM)to optimize resource allocation under dynam-ically changing conditions.Designed to monitor the workload on individual IoT nodes,the model incorporates long-term data dependencies,enabling adaptive resource distribution in real time.The training process utilizes Min-Max normalization and grid search for hyperparameter tuning,ensuring high resource utilization and consistent performance.The simulation results demonstrate the effectiveness of the proposed method,outperforming the state-of-the-art approaches,including Dynamic and Efficient Enhanced Load-Balancing(DEELB),Optimized Scheduling and Collaborative Active Resource-management(OSCAR),Convolutional Neural Network with Monarch Butterfly Optimization(CNN-MBO),and Autonomic Workload Prediction and Resource Allocation for Fog(AWPR-FOG).For example,in scenarios with low system utilization,the model achieved a resource utilization efficiency of 95%while maintaining a latency of just 15 ms,significantly exceeding the performance of comparative methods. 展开更多
关键词 internet of things resource optimization deep learning optimal resource allocation neural network EFFICIENCY
在线阅读 下载PDF
Towards Decentralized IoT Security: Optimized Detection of Zero-Day Multi-Class Cyber-Attacks Using Deep Federated Learning
15
作者 Misbah Anwer Ghufran Ahmed +3 位作者 Maha Abdelhaq Raed Alsaqour Shahid Hussain Adnan Akhunzada 《Computers, Materials & Continua》 2026年第1期744-758,共15页
The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)an... The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)and Deep Learning(DL)techniques have demonstrated promising early detection capabilities.However,their effectiveness is limited when handling the vast volumes of IoT-generated data due to scalability constraints,high computational costs,and the costly time-intensive process of data labeling.To address these challenges,this study proposes a Federated Learning(FL)framework that leverages collaborative and hybrid supervised learning to enhance cyber threat detection in IoT networks.By employing Deep Neural Networks(DNNs)and decentralized model training,the approach reduces computational complexity while improving detection accuracy.The proposed model demonstrates robust performance,achieving accuracies of 94.34%,99.95%,and 87.94%on the publicly available kitsune,Bot-IoT,and UNSW-NB15 datasets,respectively.Furthermore,its ability to detect zero-day attacks is validated through evaluations on two additional benchmark datasets,TON-IoT and IoT-23,using a Deep Federated Learning(DFL)framework,underscoring the generalization and effectiveness of the model in heterogeneous and decentralized IoT environments.Experimental results demonstrate superior performance over existing methods,establishing the proposed framework as an efficient and scalable solution for IoT security. 展开更多
关键词 Cyber-attack intrusion detection system(IDS) deep federated learning(DFL) zero-day attack distributed denial of services(DDoS) MULTI-CLASS internet of Things(iot)
在线阅读 下载PDF
面向智慧城市的BIM-GIS-IoT一体化运维管理平台研究
16
作者 欧畅 梁洁华 《消费电子》 2026年第3期131-133,共3页
建筑信息模型(Building Information Modeling,BIM)、地理信息系统(Geographic Information System,GIS)与物联网(Internet of Things,IoT)技术的发展,为构建面向智慧城市的一体化运维管理平台提供了技术基础。文章围绕智慧城市治理需求... 建筑信息模型(Building Information Modeling,BIM)、地理信息系统(Geographic Information System,GIS)与物联网(Internet of Things,IoT)技术的发展,为构建面向智慧城市的一体化运维管理平台提供了技术基础。文章围绕智慧城市治理需求,提出BIM-GIS-IoT三维融合的运维管理平台架构,重点研究多源异构数据集成与模型融合、IoT实时监测、三维可视化展示、设施健康诊断与预测性运维等关键技术,以提升城市基础设施的运维效率、风险预警能力与决策科学性,为智慧城市建设提供新的技术路径与管理模式。 展开更多
关键词 BIM GIS iot 智慧城市 运维管理平台
在线阅读 下载PDF
An Efficient Certificateless Authentication Scheme with Enhanced Security for NDN-IoT Environments
17
作者 Feihong Xu Jianbo Wu +3 位作者 Qing An Fei Zhu Zhaoyang Han Saru Kumari 《Computers, Materials & Continua》 2026年第4期1788-1801,共14页
The large-scale deployment of Internet of Things(IoT)technology across various aspects of daily life has significantly propelled the intelligent development of society.Among them,the integration of IoT and named data ... The large-scale deployment of Internet of Things(IoT)technology across various aspects of daily life has significantly propelled the intelligent development of society.Among them,the integration of IoT and named data networks(NDNs)reduces network complexity and provides practical directions for content-oriented network design.However,ensuring data integrity in NDN-IoT applications remains a challenging issue.Very recently,Wang et al.(Entropy,27(5),471(2025))designed a certificateless aggregate signature(CLAS)scheme for NDN-IoT environments.Wang et al.stated that their construction was provably secure under various types of security attacks.Using theoretical analysis methods,in this work,we reveal that their CLAS design fails to meet unforgeability,a core security requirement for CLAS schemes.In particular,we demonstrate that their scheme is vulnerable to amalicious public-key replacement attack,enabling an adversary to produce authentic signatures for arbitrary fraudulent messages.Therefore,Wang et al.’s design cannot achieve its goal.To address the issue,we systematically examine the root causes behind the vulnerability and propose a security-enhanced CLAS construction for NDN-IoT environments.We prove the security ofour improveddesignunder the standard security assumptionandalsoanalyze its practicalperformanceby comparing the computational and communication costs with several related works.The comparison results show the practicality of our design. 展开更多
关键词 iot certificateless signature public-key replacement attack data integrity AGGREGATION
在线阅读 下载PDF
Event Detection on Monitoring Internet of Things Services by Fusing Multiple Observations
18
作者 Mao Yanfang Zhang Yang +2 位作者 Cheng Bo Zhao Shuai Chen Junliang 《China Communications》 2026年第1期234-254,共21页
Ensuring an information fabric safe is critical and mandatory.For its related Internet of Things(IoT)service system running on the open Internet,existing host-based monitoring methods may fail due to only inspecting s... Ensuring an information fabric safe is critical and mandatory.For its related Internet of Things(IoT)service system running on the open Internet,existing host-based monitoring methods may fail due to only inspecting software,and the physical system may not be able to be protected.In this paper,a nonintrusive virtual machine(VM)-based runtime protection framework is provided to protect the physical system with the isolated IoT services as a controlling means.Compared with existing solutions,the framework gets inconsistent and untrusted observation knowledge from multiple observation sources,and enforces property policies concurrently and incrementally in a competing-game way to avoid compositional problems.In addition,the monitoring is implemented without any modification to the protected system.Experiments are conducted to validate the proposed techniques. 展开更多
关键词 anomaly knowledge checking iot service runtime monitoring
在线阅读 下载PDF
IOTA-Based Authentication for IoT Devices in Satellite Networks
19
作者 D.Bernal O.Ledesma +1 位作者 P.Lamo J.Bermejo 《Computers, Materials & Continua》 2026年第1期1885-1923,共39页
This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the fi... This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the first proposal to integrate IOTA’s Directed Acyclic Graph(DAG)-based identity framework into satellite IoT environments,enabling lightweight and distributed authentication under intermittent connectivity.The system leverages Decentralized Identifiers(DIDs)and Verifiable Credentials(VCs)over the Tangle,eliminating the need for mining and sequential blocks.An identity management workflow is implemented that supports the creation,validation,deactivation,and reactivation of IoT devices,and is experimentally validated on the Shimmer Testnet.Three metrics are defined and measured:resolution time,deactivation time,and reactivation time.To improve robustness,an algorithmic optimization is introduced that minimizes communication overhead and reduces latency during deactivation.The experimental results are compared with orbital simulations of satellite revisit times to assess operational feasibility.Unlike blockchain-based approaches,which typically suffer from high confirmation delays and scalability constraints,the proposed DAG architecture provides fast,cost-free operations suitable for resource-constrained IoT devices.The results show that authentication can be efficiently performed within satellite connectivity windows,positioning IOTA Identity as a viable solution for secure and scalable IoT authentication in LEO satellite networks. 展开更多
关键词 Satellite iot decentralized authentication directed acyclic graph iotA identity verifiable credentials
在线阅读 下载PDF
Impact of Data Processing Techniques on AI Models for Attack-Based Imbalanced and Encrypted Traffic within IoT Environments
20
作者 Yeasul Kim Chaeeun Won Hwankuk Kim 《Computers, Materials & Continua》 2026年第1期247-274,共28页
With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comp... With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices,spanning a range of devices from non-encrypted ones to fully encrypted ones.Given the limited visibility into payloads in this context,this study investigates AI-based attack detection methods that leverage encrypted traffic metadata,eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices.Using the UNSW-NB15 and CICIoT-2023 dataset,encrypted and unencrypted traffic were categorized according to security protocol,and AI-based intrusion detection experiments were conducted for each traffic type based on metadata.To mitigate the problem of class imbalance,eight different data sampling techniques were applied.The effectiveness of these sampling techniques was then comparatively analyzed using two ensemble models and three Deep Learning(DL)models from various perspectives.The experimental results confirmed that metadata-based attack detection is feasible using only encrypted traffic.In the UNSW-NB15 dataset,the f1-score of encrypted traffic was approximately 0.98,which is 4.3%higher than that of unencrypted traffic(approximately 0.94).In addition,analysis of the encrypted traffic in the CICIoT-2023 dataset using the same method showed a significantly lower f1-score of roughly 0.43,indicating that the quality of the dataset and the preprocessing approach have a substantial impact on detection performance.Furthermore,when data sampling techniques were applied to encrypted traffic,the recall in the UNSWNB15(Encrypted)dataset improved by up to 23.0%,and in the CICIoT-2023(Encrypted)dataset by 20.26%,showing a similar level of improvement.Notably,in CICIoT-2023,f1-score and Receiver Operation Characteristic-Area Under the Curve(ROC-AUC)increased by 59.0%and 55.94%,respectively.These results suggest that data sampling can have a positive effect even in encrypted environments.However,the extent of the improvement may vary depending on data quality,model architecture,and sampling strategy. 展开更多
关键词 Encrypted traffic attack detection data sampling technique AI-based detection iot environment
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部