The high-speed railway construction involves multiple professional fields,such as railway design,construction,and supervision.This paper architects the"BIM+"project refined management platform,designs the pl...The high-speed railway construction involves multiple professional fields,such as railway design,construction,and supervision.This paper architects the"BIM+"project refined management platform,designs the platform's logical architecture,physical architecture,and solves several key technology difficulties.This"BIM+"platform has been applied on the Jingxiong Bridge Project and achieved all-round,whole-process and multi-management of high-speed railway engineering construction.It significantly improves the level of construction management,and plays a role in promoting the development of high-speed railway construction informatization.展开更多
A big scale data poses a great challenge to data storage, management and data analysis. This article analyzes the basic concepts of large data, and mainly used on large data makes the simple contrast. And paper put fo...A big scale data poses a great challenge to data storage, management and data analysis. This article analyzes the basic concepts of large data, and mainly used on large data makes the simple contrast. And paper put forward a platform of regional characteristics based on electronic business information publishing system. Finally the paper gives general model and the realization of the platform structure, key technology and process. The platform uses conversion technology of StrutsCX framework based on J2EE platform and the XSLT parsing template of XML document tree that generates and provide automation platform construction features site for the user, it can quickly set up a tourism industry application component with plug-in manner.展开更多
Driven by the visions of the Internet of Things(IoT),Artificial Intelligence(AI),and 5G communications,the Internet of Cultural Things(IoCT)realize the comprehensive interconnection among cultural products,cultural se...Driven by the visions of the Internet of Things(IoT),Artificial Intelligence(AI),and 5G communications,the Internet of Cultural Things(IoCT)realize the comprehensive interconnection among cultural products,cultural services,cultural resources,and cultural platforms,bringing individuals with richer humanistic experience,increasing economic benefits for the cultural sector,and promoting the development of cultural heritage protection and education.At present,IoCT has received widespread attention in both industry and academia.To explore new research opportunities and assist users in constructing suitable IoCT systems for specific applications,this survey provides a comprehensive overview of the IoCT components and key technologies.A comparison study of representative IoCT systems is presented according to their applicability.A general platform architecture of IoCT is proposed to link cultural objects with the internet and human.Finally,open issues for research challenges and future opportunities of IoCT are also studied in this paper.展开更多
In the age of information explosion,big data has brought challenges but also great opportunities that support a wide range of applications for people in all walks of life.Faced with the continuous and intense competit...In the age of information explosion,big data has brought challenges but also great opportunities that support a wide range of applications for people in all walks of life.Faced with the continuous and intense competition from OTT service providers,traditional telecommunications service providers have been forced to undergo enterprise transformation.Fortunately,these providers have natural and unique advantages in terms of both data sources and data scale,all of which give them a competitive advantage.Multiple foreign mainstream telecom operators have already applied big data for their own growth,from internal business to external applications.Armed with big data,domestic telecom companies are also innovating business models.This paper will introduce three aspects of big data in the telecommunications industry.First,the unique characteristics and advantages of communications industry big data are discussed.Second,the development of the big data platform architecture is introduced in detail,which incorporates ve crucial sub-systems.We highlight the data collection and data processing systems.Finally,three internal or external application areas based on big data analysis are discussed,namely basic business,network construction,and intelligent tracing.Our work sheds light on how to deal with big data for telecommunications enterprise development.展开更多
With the large scale adoption of Internet of Things(IoT)applications in people’s lives and industrial manufacturing processes,IoT security has become an important problem today.IoT security significantly relies on th...With the large scale adoption of Internet of Things(IoT)applications in people’s lives and industrial manufacturing processes,IoT security has become an important problem today.IoT security significantly relies on the security of the underlying hardware chip,which often contains critical information,such as encryption key.To understand existing IoT chip security,this study analyzes the security of an IoT security chip that has obtained an Arm Platform Security Architecture(PSA)Level 2 certification.Our analysis shows that the chip leaks part of the encryption key and presents a considerable security risk.Specifically,we use commodity equipment to collect electromagnetic traces of the chip.Using a statistical T-test,we find that the target chip has physical leakage during the AES encryption process.We further use correlation analysis to locate the detailed encryption interval in the collected electromagnetic trace for the Advanced Encryption Standard(AES)encryption operation.On the basis of the intermediate value correlation analysis,we recover half of the 16-byte AES encryption key.We repeat the process for three different tests;in all the tests,we obtain the same result,and we recover around 8 bytes of the 16-byte AES encryption key.Therefore,experimental results indicate that despite the Arm PSA Level 2 certification,the target security chip still suffers from physical leakage.Upper layer application developers should impose strong security mechanisms in addition to those of the chip itself to ensure IoT application security.展开更多
基金supported by China State Railway Group Co.,Ltd.Science and Technology Research and Development Plan(K2021G025).
文摘The high-speed railway construction involves multiple professional fields,such as railway design,construction,and supervision.This paper architects the"BIM+"project refined management platform,designs the platform's logical architecture,physical architecture,and solves several key technology difficulties.This"BIM+"platform has been applied on the Jingxiong Bridge Project and achieved all-round,whole-process and multi-management of high-speed railway engineering construction.It significantly improves the level of construction management,and plays a role in promoting the development of high-speed railway construction informatization.
文摘A big scale data poses a great challenge to data storage, management and data analysis. This article analyzes the basic concepts of large data, and mainly used on large data makes the simple contrast. And paper put forward a platform of regional characteristics based on electronic business information publishing system. Finally the paper gives general model and the realization of the platform structure, key technology and process. The platform uses conversion technology of StrutsCX framework based on J2EE platform and the XSLT parsing template of XML document tree that generates and provide automation platform construction features site for the user, it can quickly set up a tourism industry application component with plug-in manner.
基金supported by National Natural Science Foundation of China(62172155)The National Key Research and Development Program of China(2019YFB1405702)。
文摘Driven by the visions of the Internet of Things(IoT),Artificial Intelligence(AI),and 5G communications,the Internet of Cultural Things(IoCT)realize the comprehensive interconnection among cultural products,cultural services,cultural resources,and cultural platforms,bringing individuals with richer humanistic experience,increasing economic benefits for the cultural sector,and promoting the development of cultural heritage protection and education.At present,IoCT has received widespread attention in both industry and academia.To explore new research opportunities and assist users in constructing suitable IoCT systems for specific applications,this survey provides a comprehensive overview of the IoCT components and key technologies.A comparison study of representative IoCT systems is presented according to their applicability.A general platform architecture of IoCT is proposed to link cultural objects with the internet and human.Finally,open issues for research challenges and future opportunities of IoCT are also studied in this paper.
基金supported partially by Key Program of National Natural Science Foundation of China(No.61631018)the Funda-mental Research Funds for the Central Universities and Huawei Technology Innovative Research on Wireless Big Data.
文摘In the age of information explosion,big data has brought challenges but also great opportunities that support a wide range of applications for people in all walks of life.Faced with the continuous and intense competition from OTT service providers,traditional telecommunications service providers have been forced to undergo enterprise transformation.Fortunately,these providers have natural and unique advantages in terms of both data sources and data scale,all of which give them a competitive advantage.Multiple foreign mainstream telecom operators have already applied big data for their own growth,from internal business to external applications.Armed with big data,domestic telecom companies are also innovating business models.This paper will introduce three aspects of big data in the telecommunications industry.First,the unique characteristics and advantages of communications industry big data are discussed.Second,the development of the big data platform architecture is introduced in detail,which incorporates ve crucial sub-systems.We highlight the data collection and data processing systems.Finally,three internal or external application areas based on big data analysis are discussed,namely basic business,network construction,and intelligent tracing.Our work sheds light on how to deal with big data for telecommunications enterprise development.
基金This work was partially supported by the National Natural Science Foundation of China(Nos.61872243 and U1713212)Guangdong Basic and Applied Basic Research Foundation(No.2020A1515011489)+1 种基金the Natural Science Foundation of Guangdong Province-Outstanding Youth Program(No.2019B151502018)Shenzhen Science and Technology Innovation Commission(No.R2020A045).
文摘With the large scale adoption of Internet of Things(IoT)applications in people’s lives and industrial manufacturing processes,IoT security has become an important problem today.IoT security significantly relies on the security of the underlying hardware chip,which often contains critical information,such as encryption key.To understand existing IoT chip security,this study analyzes the security of an IoT security chip that has obtained an Arm Platform Security Architecture(PSA)Level 2 certification.Our analysis shows that the chip leaks part of the encryption key and presents a considerable security risk.Specifically,we use commodity equipment to collect electromagnetic traces of the chip.Using a statistical T-test,we find that the target chip has physical leakage during the AES encryption process.We further use correlation analysis to locate the detailed encryption interval in the collected electromagnetic trace for the Advanced Encryption Standard(AES)encryption operation.On the basis of the intermediate value correlation analysis,we recover half of the 16-byte AES encryption key.We repeat the process for three different tests;in all the tests,we obtain the same result,and we recover around 8 bytes of the 16-byte AES encryption key.Therefore,experimental results indicate that despite the Arm PSA Level 2 certification,the target security chip still suffers from physical leakage.Upper layer application developers should impose strong security mechanisms in addition to those of the chip itself to ensure IoT application security.