期刊文献+
共找到2,803篇文章
< 1 2 141 >
每页显示 20 50 100
Security Requirement Management for Cloud-Assisted and Internet of Things—Enabled Smart City 被引量:2
1
作者 Muhammad Usman Tariq Muhammad Babar +3 位作者 Mian Ahmad Jan Akmal Saeed Khattak Mohammad Dahman Alshehri Abid Yahya 《Computers, Materials & Continua》 SCIE EI 2021年第4期625-639,共15页
The world is rapidly changing with the advance of information technology.The expansion of the Internet of Things(IoT)is a huge step in the development of the smart city.The IoT consists of connected devices that trans... The world is rapidly changing with the advance of information technology.The expansion of the Internet of Things(IoT)is a huge step in the development of the smart city.The IoT consists of connected devices that transfer information.The IoT architecture permits on-demand services to a public pool of resources.Cloud computing plays a vital role in developing IoT-enabled smart applications.The integration of cloud computing enhances the offering of distributed resources in the smart city.Improper management of security requirements of cloud-assisted IoT systems can bring about risks to availability,security,performance,condentiality,and privacy.The key reason for cloud-and IoT-enabled smart city application failure is improper security practices at the early stages of development.This article proposes a framework to collect security requirements during the initial development phase of cloud-assisted IoT-enabled smart city applications.Its three-layered architecture includes privacy preserved stakeholder analysis(PPSA),security requirement modeling and validation(SRMV),and secure cloud-assistance(SCA).A case study highlights the applicability and effectiveness of the proposed framework.A hybrid survey enables the identication and evaluation of signicant challenges. 展开更多
关键词 SECURITY PRIVACY smart city internet of things cloud computing
在线阅读 下载PDF
Lightweight Storage Framework for Blockchain-Enabled Internet of Things Under Cloud Computing 被引量:2
2
作者 Xinyi Qing Baopeng Ye +3 位作者 Yuanquan Shi Tao Li Yuling Chen Lei Liu 《Computers, Materials & Continua》 SCIE EI 2023年第5期3607-3624,共18页
Due to its decentralized,tamper-proof,and trust-free characteristics,blockchain is used in the Internet of Things(IoT)to guarantee the reliability of data.However,some technical flaws in blockchain itself prevent the ... Due to its decentralized,tamper-proof,and trust-free characteristics,blockchain is used in the Internet of Things(IoT)to guarantee the reliability of data.However,some technical flaws in blockchain itself prevent the development of these applications,such as the issue with linearly growing storage capacity of blockchain systems.On the other hand,there is a lack of storage resources for sensor devices in IoT,and numerous sensor devices will generate massive data at ultra-high speed,which makes the storage problem of the IoT enabled by blockchain more prominent.There are various solutions to reduce the storage burden by modifying the blockchain’s storage policy,but most of them do not consider the willingness of peers.In attempt to make the blockchain more compatible with the IoT,this paper proposes a storage optimization scheme that revisits the system data storage problem from amore practically oriented standpoint.Peers will only store transactional data that they are directly involved in.In addition,a transaction verification model is developed to enable peers to undertake transaction verification with the aid of cloud computing,and an incentive mechanism is premised on the storage optimization scheme to assure data integrity.The results of the simulation experiments demonstrate the proposed scheme’s advantage in terms of storage and throughput. 展开更多
关键词 Blockchain internet of things storage optimization transaction verification cloud computing incentive mechanism
在线阅读 下载PDF
Internet of Things Cloud Framework for Smart Homes 被引量:1
3
作者 RaafatAburukba A.R.Al-Ali +1 位作者 Mohammed Rashid Rizwan Hassan 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第4期319-327,共9页
Smart appliances and renewable energy resources are becoming an integral part of smart homes. Nowadays, home appliances are communicating with each other with home short-range home area gateways, using existing netwo... Smart appliances and renewable energy resources are becoming an integral part of smart homes. Nowadays, home appliances are communicating with each other with home short-range home area gateways, using existing network communication protocols such as ZigBee, Bluetooth, RFID, and WiFi. A Gateway allows homeowners and utilities to communicate remotely with the appliances via long-range communication networks such as GPRS, WiMax, LTE, and power liner carrier. This paper utilizes the Internet of Things (IoT) concepts to monitor and control home appliances. Moreover, this paper proposes a framework that enables the integration and the coordination of Human-to-Appliance, Utility-to- Appliance, and Appliance-to-Appliance. Utilizing the concepts of Internet of Things leads to one standard communication protocols, TCP/IPV6, which overcomes the many diverse home area networks and neighborhood area networks protocols. This work proposes a cloud based framework that enables the IoTs integration and supports the coordination between devices, as well as with device-human interaction. A prototype is designed, implemented, and tested to validate the proposed solution. 展开更多
关键词 internet of things (IoT) internet of things (IoT) cloud framework smart homes smart appliances.
在线阅读 下载PDF
Blockchain Platform for Industrial Internet of Things 被引量:45
4
作者 Arshdeep Bahga Vijay K. Madisetti 《Journal of Software Engineering and Applications》 2016年第10期533-546,共14页
Internet of Things (IoT) are being adopted for industrial and manufacturing applications such as manufacturing automation, remote machine diagnostics, prognostic health management of industrial machines and supply cha... Internet of Things (IoT) are being adopted for industrial and manufacturing applications such as manufacturing automation, remote machine diagnostics, prognostic health management of industrial machines and supply chain management. Cloud-Based Manufacturing is a recent on-demand model of manufacturing that is leveraging IoT technologies. While Cloud-Based Manufacturing enables on-demand access to manufacturing resources, a trusted intermediary is required for transactions between the users who wish to avail manufacturing services. We present a decentralized, peer-to-peer platform called BPIIoT for Industrial Internet of Things based on the Block chain technology. With the use of Blockchain technology, the BPIIoT platform enables peers in a decentralized, trustless, peer-to-peer network to interact with each other without the need for a trusted intermediary. 展开更多
关键词 internet of things Blockchain Smart Contracts cloud-Based Manufacturing
在线阅读 下载PDF
Exploration on the Load Balancing Technique for Platform of Internet of Things
5
作者 Donglei Lu Dongjie Zhu +6 位作者 Yundong Sun Haiwen Du Xiaofang Li Rongning Qu Yansong Wang Ning Cao Helen Min Zhou 《Computer Systems Science & Engineering》 SCIE EI 2021年第9期339-350,共12页
In recent years,the Internet of Things technology has developed rapidly,and smart Internet of Things devices have also been widely popularized.A large amount of data is generated every moment.Now we are in the era of ... In recent years,the Internet of Things technology has developed rapidly,and smart Internet of Things devices have also been widely popularized.A large amount of data is generated every moment.Now we are in the era of big data in the Internet of Things.The rapid growth of massive data has brought great challenges to storage technology,which cannot be well coped with by traditional storage technology.The demand for massive data storage has given birth to cloud storage technology.Load balancing technology plays an important role in improving the performance and resource utilization of cloud storage systems.Therefore,it is of great practical significance to study how to improve the performance and resource utilization of cloud storage systems through load balancing technology.On the basis of studying the read strategy of Swift,this article proposes a reread strategy based on load balancing of storage resources to solve the problem of unbalanced read load between interruptions caused by random data copying in Swift.The storage asynchronously tracks the I/O conversion to select the storage with the smallest load for asynchronous reading.The experimental results indicate that the proposed strategy can achieve a better load balancing state in terms of storage I/O utilization and CPU utilization than the random read strategy index of Swift. 展开更多
关键词 The internet of things cloud storage SWIFT load balancing scheduling algorithm
在线阅读 下载PDF
Edge Cloud Selection in Mobile Edge Computing(MEC)-Aided Applications for Industrial Internet of Things(IIoT)Services
6
作者 Dae-Young Kim SoYeon Lee +1 位作者 MinSeung Kim Seokhoon Kim 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2049-2060,共12页
In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to im... In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method. 展开更多
关键词 Industrial internet of things(IIoT)network IIoT service mobile edge computing(MEC) edge cloud selection MEC-aided application
在线阅读 下载PDF
Revolutionizing Learning:The Role of AI,IoT,and Cloud Computing in Smart Education
7
作者 Chiweng Leng 《Journal of Contemporary Educational Research》 2025年第6期12-17,共6页
The rapid advancement of technology has paved the way for innovative approaches to education.Artificial intelligence(AI),the Internet of Things(IoT),and cloud computing are three transformative technologies reshaping ... The rapid advancement of technology has paved the way for innovative approaches to education.Artificial intelligence(AI),the Internet of Things(IoT),and cloud computing are three transformative technologies reshaping how education is delivered,accessed,and experienced.These technologies enable personalized learning,optimize teaching processes,and make educational resources more accessible to learners worldwide.This paper examines the integration of these technologies into smart education systems,highlighting their applications,benefits,and challenges,and exploring their potential to bridge gaps in educational equity and inclusivity. 展开更多
关键词 Artificial intelligence internet of things cloud computing Smart education Personalized learning
在线阅读 下载PDF
Real-Time Monitoring and Intelligent Analysis Platform for Carbon Emission in Smart Power Plants
8
作者 Jie Gao Tiejun Lin Zhannan Ma 《Journal of Architectural Research and Development》 2025年第5期96-100,共5页
As global climate change intensifies,the power industry-a major source of carbon emissions-plays a pivotal role in achieving carbon peaking and neutrality goals through its low-carbon transition.Traditional power pla... As global climate change intensifies,the power industry-a major source of carbon emissions-plays a pivotal role in achieving carbon peaking and neutrality goals through its low-carbon transition.Traditional power plants’carbon management systems can no longer meet the demands of high-precision,real-time monitoring.Smart power plants now offer innovative solutions for carbon emission tracking and intelligent analysis by integrating IoT,big data,and AI technologies.Current research predominantly focuses on optimizing individual processes,lacking systematic exploration of comprehensive dynamic monitoring and intelligent decision-making across the entire workflow.To address this gap,we propose a smart carbon emission monitoring and analysis platform for power plants that integrates IoT sensing,multimodal data analytics,and AI-driven decision-making.The platform establishes a multi-source sensor network to collect emissions data throughout the fuel combustion,auxiliary equipment operation,and waste treatment processes.Combining carbon emission factor analysis with machine learning models enables real-time emission calculations and utilizes long short-term memory networks to predict future emission trends. 展开更多
关键词 Smart power plant Real-time carbon emission monitoring Intelligent analysis platform internet of things perception
在线阅读 下载PDF
A Novel Proactive AI-Based Agents Framework for an IoE-Based Smart Things Monitoring System with Applications for Smart Vehicles
9
作者 Meng-Hua Yen Nilamadhab Mishra +1 位作者 Win-Jet Luo Chu-En Lin 《Computers, Materials & Continua》 2025年第2期1839-1855,共17页
The Internet of Everything(IoE)coupled with Proactive Artificial Intelligence(AI)-Based Learning Agents(PLAs)through a cloud processing system is an idea that connects all computing resources to the Internet,making it... The Internet of Everything(IoE)coupled with Proactive Artificial Intelligence(AI)-Based Learning Agents(PLAs)through a cloud processing system is an idea that connects all computing resources to the Internet,making it possible for these devices to communicate with one another.Technologies featured in the IoE include embedding,networking,and sensing devices.To achieve the intended results of the IoE and ease life for everyone involved,sensing devices and monitoring systems are linked together.The IoE is used in several contexts,including intelligent cars’protection,navigation,security,and fuel efficiency.The Smart Things Monitoring System(STMS)framework,which has been proposed for early occurrence identification and theft prevention,is discussed in this article.The STMS uses technologies based on the IoE and PLAs to continuously and remotely observe,control,and monitor vehicles.The STMS is familiar with the platform used by the global positioning system;as a result,the STMS can maintain a real-time record of current vehicle positions.This information is utilized to locate the vehicle in an accident or theft.The findings of the STMS system are promising for precisely identifying crashes,evaluating incident severity,and locating vehicles after collisions have occurred.Moreover,we formulate an ad hoc STMS network communication scenario to evaluate the efficacy of data communication by utilizing various network parameters,such as round-trip time(RTT),data packet transmission,data packet reception,and loss.From our experimentation,we obtained an improved communication efficiency for STMS across multiple PLAs compared to the standard greedy routing and traditional AODV approaches.Our framework facilitates adaptable solutions with communication competence by deploying Proactive PLAs in a cloud-connected smart vehicular environment. 展开更多
关键词 Artificial intelligence(AI) proactive AI-based learning agents(PLA) internet of everything(IoE) smart things monitoring system(STMS) cloud processing system driving monitoring assistance system(MAS) smart vehicles
在线阅读 下载PDF
A Formal Testing Model for Operating Room Control System Using Internet of Things 被引量:3
10
作者 Moez Krichen Seifeddine Mechti +4 位作者 Roobaea Alroobaea Elyes Said Parminder Singh Osamah Ibrahim Khalaf Mehedi Masud 《Computers, Materials & Continua》 SCIE EI 2021年第3期2997-3011,共15页
Technological advances in recent years have significantly changed the way an operating room works.This work aims to create a platformto solve the problems of operating room occupancy and prepare the rooms with an envi... Technological advances in recent years have significantly changed the way an operating room works.This work aims to create a platformto solve the problems of operating room occupancy and prepare the rooms with an environment that is favorable for all operations.Using this system,a doctor can control all operation rooms,especially before an operation,and monitor their temperature and humidity to prepare for the operation.Also,in the event of a problem,an alert is sent to the nurse responsible for the room and medical stuff so that the problem can be resolved.The platformis tested using a Raspberry PI card and sensors.The sensors are connected to a cloud layer that collects and analyzes the temperature and humidity values obtained from the environment during an operation.The result of experimentations is visualized through a web application and an Android application.The platform also considers the security aspects such as authorization to access application functionalities for the Web and the mobile applications.We can also test and evaluate the system’s existing problems and vulnerabilities using the IEEE and owasp IoT standards.Finally,the proposed framework is extended with a model based testing technique that may be adopted for validating the security aspects. 展开更多
关键词 Communication internet of things control rooms SENSORS cloud ROBOT
在线阅读 下载PDF
Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine 被引量:3
11
作者 Haifeng Lin Qilin Xue +1 位作者 Jiayin Feng Di Bai 《Digital Communications and Networks》 SCIE CSCD 2023年第1期111-124,共14页
With the rapid development of the Internet of Things(IoT),there are several challenges pertaining to security in IoT applications.Compared with the characteristics of the traditional Internet,the IoT has many problems... With the rapid development of the Internet of Things(IoT),there are several challenges pertaining to security in IoT applications.Compared with the characteristics of the traditional Internet,the IoT has many problems,such as large assets,complex and diverse structures,and lack of computing resources.Traditional network intrusion detection systems cannot meet the security needs of IoT applications.In view of this situation,this study applies cloud computing and machine learning to the intrusion detection system of IoT to improve detection performance.Usually,traditional intrusion detection algorithms require considerable time for training,and these intrusion detection algorithms are not suitable for cloud computing due to the limited computing power and storage capacity of cloud nodes;therefore,it is necessary to study intrusion detection algorithms with low weights,short training time,and high detection accuracy for deployment and application on cloud nodes.An appropriate classification algorithm is a primary factor for deploying cloud computing intrusion prevention systems and a prerequisite for the system to respond to intrusion and reduce intrusion threats.This paper discusses the problems related to IoT intrusion prevention in cloud computing environments.Based on the analysis of cloud computing security threats,this study extensively explores IoT intrusion detection,cloud node monitoring,and intrusion response in cloud computing environments by using cloud computing,an improved extreme learning machine,and other methods.We use the Multi-Feature Extraction Extreme Learning Machine(MFE-ELM)algorithm for cloud computing,which adds a multi-feature extraction process to cloud servers,and use the deployed MFE-ELM algorithm on cloud nodes to detect and discover network intrusions to cloud nodes.In our simulation experiments,a classical dataset for intrusion detection is selected as a test,and test steps such as data preprocessing,feature engineering,model training,and result analysis are performed.The experimental results show that the proposed algorithm can effectively detect and identify most network data packets with good model performance and achieve efficient intrusion detection for heterogeneous data of the IoT from cloud nodes.Furthermore,it can enable the cloud server to discover nodes with serious security threats in the cloud cluster in real time,so that further security protection measures can be taken to obtain the optimal intrusion response strategy for the cloud cluster. 展开更多
关键词 internet of things cloud Computing Intrusion Prevention Intrusion Detection Extreme Learning Machine
在线阅读 下载PDF
Internet of robotic things for mobile robots:Concepts,technologies,challenges,applications,and future directions 被引量:3
12
作者 Homayun Kabir Mau-Luen Tham Yoong Choon Chang 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1265-1290,共26页
Nowadays,Multi Robotic System(MRS)consisting of different robot shapes,sizes and capabilities has received significant attention from researchers and are being deployed in a variety of real-world applications.From sen... Nowadays,Multi Robotic System(MRS)consisting of different robot shapes,sizes and capabilities has received significant attention from researchers and are being deployed in a variety of real-world applications.From sensors and actuators improved by communication technologies to powerful computing systems utilizing advanced Artificial Intelligence(AI)algorithms have rapidly driven the development of MRS,so the Internet of Things(IoT)in MRS has become a new topic,namely the Internet of Robotic Things(IoRT).This paper summarizes a comprehensive survey of state-of-the-art technologies for mobile robots,including general architecture,benefits,challenges,practical applications,and future research directions.In addition,remarkable research of i)multirobot navigation,ii)network architecture,routing protocols and communications,and iii)coordination among robots as well as data analysis via external computing(cloud,fog,edge,edge-cloud)are merged with the IoRT architecture according to their applicability.Moreover,security is a long-term challenge for IoRT because of various attack vectors,security flaws,and vulnerabilities.Security threats,attacks,and existing solutions based on IoRT architectures are also under scrutiny.Moreover,the identification of environmental situations that are crucial for all types of IoRT applications,such as the detection of objects,human,and obstacles,is also critically reviewed.Finally,future research directions are given by analyzing the challenges of IoRT in mobile robots. 展开更多
关键词 Multi Robotic System(MRS) internet of things(IoT) internet of Robotic things(IoRT) cloud computing Artificial intelligence(AI) Machine learning(ML) Reinforcement learning(RL)
在线阅读 下载PDF
A Trusted NUMFabric Algorithm for Congestion Price Calculation at the Internet-of-Things Datacenter 被引量:1
13
作者 Shan Chun Xiaolong Chen +1 位作者 Guoqiang Deng Hao Liu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第3期1203-1216,共14页
The important issues of network TCP congestion control are how to compute the link price according to the link status and regulate the data sending rate based on link congestion pricing feedback information.However,it... The important issues of network TCP congestion control are how to compute the link price according to the link status and regulate the data sending rate based on link congestion pricing feedback information.However,it is difficult to predict the congestion state of the link-end accurately at the source.In this paper,we presented an improved NUMFabric algorithm for calculating the overall congestion price.In the proposed scheme,the whole network structure had been obtained by the central control server in the Software Defined Network,and a kind of dual-hierarchy algorithm for calculating overall network congestion price had been demonstrated.In this scheme,the first hierarchy algorithm was set up in a central control server like Opendaylight and the guiding parameter B is obtained based on the intelligent data of global link state information.Based on the historical data,the congestion state of the network and the guiding parameter B is accurately predicted by the machine learning algorithm.The second hierarchy algorithm was installed in the Openflow link and the link price was calculated based on guiding parameter B given by the first algorithm.We evaluate this evolved NUMFabric algorithm in NS3,which demonstrated that the proposed NUMFabric algorithm could efficiently increase the link bandwidth utilization of cloud computing IoT datacenters. 展开更多
关键词 internet of things cloud computing intelligent data aggregation distributed optimization trusted network calculation
在线阅读 下载PDF
An Overview of Privacy Preserving Schemes for Industrial Internet of Things
14
作者 Yan Huo Chun Meng +1 位作者 Ruinian Li Tao Jing 《China Communications》 SCIE CSCD 2020年第10期1-18,共18页
The concept of Internet of Everything is like a revolutionary storm,bringing the whole society closer together.Internet of Things(IoT)has played a vital role in the process.With the rise of the concept of Industry 4.0... The concept of Internet of Everything is like a revolutionary storm,bringing the whole society closer together.Internet of Things(IoT)has played a vital role in the process.With the rise of the concept of Industry 4.0,intelligent transformation is taking place in the industrial field.As a new concept,an industrial IoT system has also attracted the attention of industry and academia.In an actual industrial scenario,a large number of devices will generate numerous industrial datasets.The computing efficiency of an industrial IoT system is greatly improved with the help of using either cloud computing or edge computing.However,privacy issues may seriously harmed interests of users.In this article,we summarize privacy issues in a cloud-or an edge-based industrial IoT system.The privacy analysis includes data privacy,location privacy,query and identity privacy.In addition,we also review privacy solutions when applying software defined network and blockchain under the above two systems.Next,we analyze the computational complexity and privacy protection performance of these solutions.Finally,we discuss open issues to facilitate further studies. 展开更多
关键词 privacy preserving cloud computing edge computing industrial internet of things
在线阅读 下载PDF
How do Internet of Things Service Pricing Schemes Affect Compatibility Investment between Platform and Smart Device Manufacturer?
15
作者 Xiufeng Li Jinglei Jiang Shaojun Ma 《Journal of Systems Science and Systems Engineering》 2025年第3期360-384,共25页
The development of the Internet of Things(IoT)has rapidly progressed,revolutionizing numerous industries and transforming how we interact with technology.IoT relies on seamless connectivity between devices,allowing th... The development of the Internet of Things(IoT)has rapidly progressed,revolutionizing numerous industries and transforming how we interact with technology.IoT relies on seamless connectivity between devices,allowing them to collect,share,and analyze data.As a result,compatibility and connectivity have become major concerns for customers adopting smart devices.Achieving compatibility in a smart device is a shared responsibility between the IoT platform provider and the smart device manufacturer.However,the impact of their respective efforts on smart device compatibility depends on investment efficiency and the service level.In this study,we develop a game-theoretical model to examine how investment efficiency affects the incentives of the upstream platform and the downstream manufacturer to exert compatibility efforts under the licensing pricing and revenue sharing models in a supply chain setting.Our findings indicate that,given a certain IoT platform service level,a manufacturer’s effort decreases as the relative weight decreases in the licensing pricing model.Additionally,when the platform’s effort cost is lower,the platform can invest more in compatibility,thereby improving the compatibility of smart devices.In such cases,the manufacturer can benefit from the platform’s incentives to exert compatibility efforts by reducing her efforts.We also identify two effects:the compatibility effect and the service value-added effect.When the relative weight of compatibility is small,the role of platform compatibility diminishes.Consequently,the platform cannot increase technology licensing fees to augment IoT service income,reducing profits.Our results also provide insights into how an IoT platform provider can strategically target a particular IoT service based on their cost characteristics and service level in smart device supply chains. 展开更多
关键词 internet of things platform smart device supply chains system compatibility investment decisions platform service pricing
原文传递
Cloud control for IIoT in a cloud-edge environment 被引量:1
16
作者 YAN Ce XIA Yuanqing +1 位作者 YANG Hongjiu ZHAN Yufeng 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第4期1013-1027,共15页
The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for... The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for IIoT in cloud-edge envi-ronment with three modes of 5G.For 5G based IIoT,the time sensitive network(TSN)service is introduced in transmission network.A 5G logical TSN bridge is designed to transport TSN streams over 5G framework to achieve end-to-end configuration.For a transmission control protocol(TCP)model with nonlinear disturbance,time delay and uncertainties,a robust adaptive fuzzy sliding mode controller(AFSMC)is given with control rule parameters.IIoT workflows are made up of a series of subtasks that are linked by the dependencies between sensor datasets and task flows.IIoT workflow scheduling is a non-deterministic polynomial(NP)-hard problem in cloud-edge environment.An adaptive and non-local-convergent particle swarm optimization(ANCPSO)is designed with nonlinear inertia weight to avoid falling into local optimum,which can reduce the makespan and cost dramatically.Simulation and experiments demonstrate that ANCPSO has better performances than other classical algo-rithms. 展开更多
关键词 5G and time sensitive network(TSN) industrial internet of things(IIoT)workflow transmission control protocol(TCP)flows control cloud edge collaboration multi-objective optimal scheduling
在线阅读 下载PDF
MV-Honeypot:Security Threat Analysis by Deploying Avatar as a Honeypot in COTS Metaverse Platforms
17
作者 Arpita Dinesh Sarang Mohsen Ali Alawami Ki-Woong Park 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期655-669,共15页
Nowadays,theuse of Avatars that are unique digital depictions has increased by users to access Metaverse—a virtual reality environment—through multiple devices and for various purposes.Therefore,the Avatar and Metav... Nowadays,theuse of Avatars that are unique digital depictions has increased by users to access Metaverse—a virtual reality environment—through multiple devices and for various purposes.Therefore,the Avatar and Metaverse are being developed with a new theory,application,and design,necessitating the association of more personal data and devices of targeted users every day.This Avatar and Metaverse technology explosion raises privacy and security concerns,leading to cyber attacks.MV-Honeypot,or Metaverse-Honeypot,as a commercial off-the-shelf solution that can counter these cyber attack-causing vulnerabilities,should be developed.To fill this gap,we study user’s engagements with Avatars in Metaverse,analyze possible security vulnerabilities,and create a model named Simplified Avatar Relationship Association with Non-linear Gradient(SARANG)that draws the full diagram of infrastructure components and data flow through accessing Metaverse in this paper.We also determine the most significant threat for each component’s cyberattacks that will affect user data and Avatars.As a result,the commercial off-the-shelf(COTS)of the MV-Honeypot must be established. 展开更多
关键词 AVATAR metaverse CYBERSECURITY cloud computing internet of things artificial intelligence security analysis
在线阅读 下载PDF
Exploring Multi-Task Learning for Forecasting Energy-Cost Resource Allocation in IoT-Cloud Systems
18
作者 Mohammad Aldossary Hatem A.Alharbi Nasir Ayub 《Computers, Materials & Continua》 SCIE EI 2024年第6期4603-4620,共18页
Cloud computing has become increasingly popular due to its capacity to perform computations without relying on physical infrastructure,thereby revolutionizing computer processes.However,the rising energy consumption i... Cloud computing has become increasingly popular due to its capacity to perform computations without relying on physical infrastructure,thereby revolutionizing computer processes.However,the rising energy consumption in cloud centers poses a significant challenge,especially with the escalating energy costs.This paper tackles this issue by introducing efficient solutions for data placement and node management,with a clear emphasis on the crucial role of the Internet of Things(IoT)throughout the research process.The IoT assumes a pivotal role in this study by actively collecting real-time data from various sensors strategically positioned in and around data centers.These sensors continuously monitor vital parameters such as energy usage and temperature,thereby providing a comprehensive dataset for analysis.The data generated by the IoT is seamlessly integrated into the Hybrid TCN-GRU-NBeat(NGT)model,enabling a dynamic and accurate representation of the current state of the data center environment.Through the incorporation of the Seagull Optimization Algorithm(SOA),the NGT model optimizes storage migration strategies based on the latest information provided by IoT sensors.The model is trained using 80%of the available dataset and subsequently tested on the remaining 20%.The results demonstrate the effectiveness of the proposed approach,with a Mean Squared Error(MSE)of 5.33%and a Mean Absolute Error(MAE)of 2.83%,accurately estimating power prices and leading to an average reduction of 23.88%in power costs.Furthermore,the integration of IoT data significantly enhances the accuracy of the NGT model,outperforming benchmark algorithms such as DenseNet,Support Vector Machine(SVM),Decision Trees,and AlexNet.The NGT model achieves an impressive accuracy rate of 97.9%,surpassing the rates of 87%,83%,80%,and 79%,respectively,for the benchmark algorithms.These findings underscore the effectiveness of the proposed method in optimizing energy efficiency and enhancing the predictive capabilities of cloud computing systems.The IoT plays a critical role in driving these advancements by providing real-time data insights into the operational aspects of data centers. 展开更多
关键词 cloud computing energy efficiency data center optimization internet of things(IoT) hybrid models
在线阅读 下载PDF
Analysis of identifiers in IoT platforms 被引量:1
19
作者 Haris Aftab Komal Gilani +3 位作者 JiEun Lee Lewis Nkenyereye SeungMyeong Jeong JaeSeung Song 《Digital Communications and Networks》 SCIE 2020年第3期333-340,共8页
The Internet of Things(IoT)provides new opportunities for different IoT platforms connecting various devices together.The need to identify those devices is the foremost important to perform any kind of operation.Many ... The Internet of Things(IoT)provides new opportunities for different IoT platforms connecting various devices together.The need to identify those devices is the foremost important to perform any kind of operation.Many organizations and standard bodies that provide specifications and frameworks for the IoT currently have their own identification mechanisms.Some existing industrial identification mechanisms can also be used in the IoT.There is no common Identification Scheme(IS)for the IoT as yet,because of the political and commercial differences amongst the standard bodies.The unavailability of a unified IS method makes the inter-working among IoT platforms challenging.This paper analyses and compares ISs used by several selected IoT platforms.This work will help in understanding the need for a common identification mechanism to provide inter-working among different IoT platforms. 展开更多
关键词 internet of things Identifiers Identification schemes IoT platforms IoT standards
在线阅读 下载PDF
Quantum-Edge Cloud Computing for IoT: Bridging the Gap between Cloud, Edge, and Quantum Technologies
20
作者 Shahanaz Akter Md. Khairul Islam Bhuiyan +3 位作者 Md. Bahauddin Badhon Habib Md. Hasan Fatema Akter Mohammad Nahid Ul Islam 《Advances in Internet of Things》 2024年第4期99-120,共22页
The rapid expansion of the Internet of Things (IoT) has driven the need for advanced computational frameworks capable of handling the complex data processing and security challenges that modern IoT applications demand... The rapid expansion of the Internet of Things (IoT) has driven the need for advanced computational frameworks capable of handling the complex data processing and security challenges that modern IoT applications demand. However, traditional cloud computing frameworks face significant latency, scalability, and security issues. Quantum-Edge Cloud Computing (QECC) offers an innovative solution by integrating the computational power of quantum computing with the low-latency advantages of edge computing and the scalability of cloud computing resources. This study is grounded in an extensive literature review, performance improvements, and metrics data from Bangladesh, focusing on smart city infrastructure, healthcare monitoring, and the industrial IoT sector. The discussion covers vital elements, including integrating quantum cryptography to enhance data security, the critical role of edge computing in reducing response times, and cloud computing’s ability to support large-scale IoT networks with its extensive resources. Through case studies such as the application of quantum sensors in autonomous vehicles, the practical impact of QECC is demonstrated. Additionally, the paper outlines future research opportunities, including developing quantum-resistant encryption techniques and optimizing quantum algorithms for edge computing. The convergence of these technologies in QECC has the potential to overcome the current limitations of IoT frameworks, setting a new standard for future IoT applications. 展开更多
关键词 Quantum-Edge cloud Computing (QECC) internet of things (IoT) Low Latency Quantum Computing (QC) Scalable cloud Services
在线阅读 下载PDF
上一页 1 2 141 下一页 到第
使用帮助 返回顶部