1.Introduction It has been almost 60 years since the launch of Intelsat-I,the world’s first commercial satellite communications system.Over the past few decades,the development of satellite communications has been dr...1.Introduction It has been almost 60 years since the launch of Intelsat-I,the world’s first commercial satellite communications system.Over the past few decades,the development of satellite communications has been driven by both technological advancements and growing application demands,which have given rise to three primary services:broadcast,fixed satellite,and mobile satellite services[1].展开更多
In order to solve the problem of modeling product configuration knowledge at the semantic level to successfully implement the mass customization strategy, an approach of ontology-based configuration knowledge modeling...In order to solve the problem of modeling product configuration knowledge at the semantic level to successfully implement the mass customization strategy, an approach of ontology-based configuration knowledge modeling, combining semantic web technologies, was proposed. A general configuration ontology was developed to provide a common concept structure for modeling configuration knowledge and rules of specific product domains. The OWL web ontology language and semantic web rule language (SWRL) were used to formally represent the configuration ontology, domain configuration knowledge and rules to enhance the consistency, maintainability and reusability of all the configuration knowledge. The configuration knowledge modeling of a customizable personal computer family shows that the approach can provide explicit, computerunderstandable knowledge semantics for specific product configuration domains and can efficiently support automatic configuration tasks of complex products.展开更多
Human beings and their activities are now connected through Internet of Things(IoT)with the evolution of wireless communication technologies.IoT is becoming popular and its usage is immensely increasing among various ...Human beings and their activities are now connected through Internet of Things(IoT)with the evolution of wireless communication technologies.IoT is becoming popular and its usage is immensely increasing among various sectors.In this research paper,a comprehensive review has been conducted by considering recent and important literature review on IoT applications being operated in three major sectors.The three sectors studied are health,sports and transportation and logistics.Paper explored that with the help of IoT techniques,different miniature sized devices are invented which can record various parameters of human body,wearables devices have been invented which are playing important role in monitoring and recording daily fitness are working on CIoT technology and IoT emergence in the field of transportation and logistics helps in resolving several issues including conveniences,navigation issues,service cost and security issues.All the papers reviewed are journal published from 2010 to 2020.In latter part,this paper also highlighted security,privacy,reliability,consumption of various resources and policies as significant challenges for IoT.展开更多
With the rapid development of modern information technology,the Internet of Things(IoT)has been integrated into various fields such as social life,industrial production,education,and medical care.Through the connectio...With the rapid development of modern information technology,the Internet of Things(IoT)has been integrated into various fields such as social life,industrial production,education,and medical care.Through the connection of various physical devices,sensors,and machines,it realizes information intercommunication and remote control among devices,significantly enhancing the convenience and efficiency of work and life.However,the rapid development of the IoT has also brought serious security problems.IoT devices have limited resources and a complex network environment,making them one of the important targets of network intrusion attacks.Therefore,from the perspective of deep learning,this paper deeply analyzes the characteristics and key points of IoT intrusion detection,summarizes the application advantages of deep learning in IoT intrusion detection,and proposes application strategies of typical deep learning models in IoT intrusion detection so as to improve the security of the IoT architecture and guarantee people’s convenient lives.展开更多
The Internet of Things technology provides a comprehensive solution for the real-time monitoring of cold chain logistics by integrating sensors,wireless communication,cloud computing,and big data analysis.Based on thi...The Internet of Things technology provides a comprehensive solution for the real-time monitoring of cold chain logistics by integrating sensors,wireless communication,cloud computing,and big data analysis.Based on this,this paper deeply explores the overview and characteristics of the Internet of Things technology,the feasibility analysis of the Internet of Things technology in the cold chain logistics monitoring,the application analysis of the Internet of Things technology in the cold chain logistics real-time monitoring to better improve the management level and operational efficiency of the cold chain logistics,to provide consumers with safer and fresh products.展开更多
The recent years have witnessed unprecedented growth in digital infrastructure,driven by rapid advances in cloud computing,the Internet of Things(IoT),smart cities,healthcare informatics,and industrial automation.Whil...The recent years have witnessed unprecedented growth in digital infrastructure,driven by rapid advances in cloud computing,the Internet of Things(IoT),smart cities,healthcare informatics,and industrial automation.While these technologies have improved efficiency and connectivity,they have also created complex vulnerabilities that more sophisticated cyber adversaries can exploit.Cybersecurity is no longer a static domain but a constantly evolving field where threats such as ransomware,advanced persistent threats,and zero-day exploits demand adaptive,intelligent,and proactive responses.Emergent technologies such as artificial intelligence(AI),deep learning,distributed architectures,chaos theory,and post-quantum cryptography are transforming the way we conceptualise and implement information security.These approaches offer not only enhanced accuracy and robustness but also scalability,adaptability,and resilience across diverse,resource-limited environments.Consequently,the goal of this Special Issue on Emerging Technologies in Information Security is to compile innovative contributions that advance the boundaries of theory and practice in this swiftly evolving field.展开更多
On the basis of an initial introduction to the status quo in the worldwide research on mobile Internet technologies,this paper presents the problems encountered during the research and points out some key points and r...On the basis of an initial introduction to the status quo in the worldwide research on mobile Internet technologies,this paper presents the problems encountered during the research and points out some key points and research goals in this field.It infers that it is necessary to perform research on issues such as new Internet routing theories and protocols,structural characteristics of changing networks,multicast theories in mobile Internet environment and IPv6-based wireless IP network theories.展开更多
In recent years, online engineering technologies are widely distributed and developed. Their influence on society is very strong. The Internet technology has provided additional opportunities for a new development lev...In recent years, online engineering technologies are widely distributed and developed. Their influence on society is very strong. The Internet technology has provided additional opportunities for a new development level of education, design and production. Associations and scientific conferences in the field of online engineering that appeared, seek to foster practices in education and research in higher education institutions and the industry on online engineering. A particular challenge for online engineering is how to extend the traditional equipments and laboratories to the Internet. A method of the embedded systems design with using online laboratory is described in this paper. Also, in this paper the experimental set of remote laboratory which allows carrying out hardware/software oriented design of the embedded control system of a mobile platform is considered.展开更多
In the era of Web2.0, AJAX as one of the core technology to provide asynchronous communication with the server's ability to solve most of the Web site to force the user to enter the "submit, wait for redisplay proce...In the era of Web2.0, AJAX as one of the core technology to provide asynchronous communication with the server's ability to solve most of the Web site to force the user to enter the "submit, wait for redisplay process, so that user from requestfreed response cycle, ultimately allows developers and designers to use standard HTML / CSS / JavaScript to create a "desktop style Web applications. According AJAX principles and characteristics, and the combination of educational administration and educational management system based on AJAX technology solutions.展开更多
基金supported in part by the National Key Research and Development Program of China(2023YFB2904703).
文摘1.Introduction It has been almost 60 years since the launch of Intelsat-I,the world’s first commercial satellite communications system.Over the past few decades,the development of satellite communications has been driven by both technological advancements and growing application demands,which have given rise to three primary services:broadcast,fixed satellite,and mobile satellite services[1].
基金The National Natural Science Foundation of China(No.70471023).
文摘In order to solve the problem of modeling product configuration knowledge at the semantic level to successfully implement the mass customization strategy, an approach of ontology-based configuration knowledge modeling, combining semantic web technologies, was proposed. A general configuration ontology was developed to provide a common concept structure for modeling configuration knowledge and rules of specific product domains. The OWL web ontology language and semantic web rule language (SWRL) were used to formally represent the configuration ontology, domain configuration knowledge and rules to enhance the consistency, maintainability and reusability of all the configuration knowledge. The configuration knowledge modeling of a customizable personal computer family shows that the approach can provide explicit, computerunderstandable knowledge semantics for specific product configuration domains and can efficiently support automatic configuration tasks of complex products.
文摘Human beings and their activities are now connected through Internet of Things(IoT)with the evolution of wireless communication technologies.IoT is becoming popular and its usage is immensely increasing among various sectors.In this research paper,a comprehensive review has been conducted by considering recent and important literature review on IoT applications being operated in three major sectors.The three sectors studied are health,sports and transportation and logistics.Paper explored that with the help of IoT techniques,different miniature sized devices are invented which can record various parameters of human body,wearables devices have been invented which are playing important role in monitoring and recording daily fitness are working on CIoT technology and IoT emergence in the field of transportation and logistics helps in resolving several issues including conveniences,navigation issues,service cost and security issues.All the papers reviewed are journal published from 2010 to 2020.In latter part,this paper also highlighted security,privacy,reliability,consumption of various resources and policies as significant challenges for IoT.
基金the research result of the 2022 Municipal Education Commission Science and Technology Research Plan Project“Research on the Technology of Detecting Double-Surface Cracks in Concrete Lining of Highway Tunnels Based on Image Blast”(KJQN02202403)the first batch of school-level classroom teaching reform projects“Principles Applications of Embedded Systems”(23JG2166)the school-level reform research project“Continuous Results-Oriented Practice Research Based on BOPPPS Teaching Model-Taking the‘Programming Fundamentals’Course as an Example”(22JG332).
文摘With the rapid development of modern information technology,the Internet of Things(IoT)has been integrated into various fields such as social life,industrial production,education,and medical care.Through the connection of various physical devices,sensors,and machines,it realizes information intercommunication and remote control among devices,significantly enhancing the convenience and efficiency of work and life.However,the rapid development of the IoT has also brought serious security problems.IoT devices have limited resources and a complex network environment,making them one of the important targets of network intrusion attacks.Therefore,from the perspective of deep learning,this paper deeply analyzes the characteristics and key points of IoT intrusion detection,summarizes the application advantages of deep learning in IoT intrusion detection,and proposes application strategies of typical deep learning models in IoT intrusion detection so as to improve the security of the IoT architecture and guarantee people’s convenient lives.
文摘The Internet of Things technology provides a comprehensive solution for the real-time monitoring of cold chain logistics by integrating sensors,wireless communication,cloud computing,and big data analysis.Based on this,this paper deeply explores the overview and characteristics of the Internet of Things technology,the feasibility analysis of the Internet of Things technology in the cold chain logistics monitoring,the application analysis of the Internet of Things technology in the cold chain logistics real-time monitoring to better improve the management level and operational efficiency of the cold chain logistics,to provide consumers with safer and fresh products.
文摘The recent years have witnessed unprecedented growth in digital infrastructure,driven by rapid advances in cloud computing,the Internet of Things(IoT),smart cities,healthcare informatics,and industrial automation.While these technologies have improved efficiency and connectivity,they have also created complex vulnerabilities that more sophisticated cyber adversaries can exploit.Cybersecurity is no longer a static domain but a constantly evolving field where threats such as ransomware,advanced persistent threats,and zero-day exploits demand adaptive,intelligent,and proactive responses.Emergent technologies such as artificial intelligence(AI),deep learning,distributed architectures,chaos theory,and post-quantum cryptography are transforming the way we conceptualise and implement information security.These approaches offer not only enhanced accuracy and robustness but also scalability,adaptability,and resilience across diverse,resource-limited environments.Consequently,the goal of this Special Issue on Emerging Technologies in Information Security is to compile innovative contributions that advance the boundaries of theory and practice in this swiftly evolving field.
文摘On the basis of an initial introduction to the status quo in the worldwide research on mobile Internet technologies,this paper presents the problems encountered during the research and points out some key points and research goals in this field.It infers that it is necessary to perform research on issues such as new Internet routing theories and protocols,structural characteristics of changing networks,multicast theories in mobile Internet environment and IPv6-based wireless IP network theories.
文摘In recent years, online engineering technologies are widely distributed and developed. Their influence on society is very strong. The Internet technology has provided additional opportunities for a new development level of education, design and production. Associations and scientific conferences in the field of online engineering that appeared, seek to foster practices in education and research in higher education institutions and the industry on online engineering. A particular challenge for online engineering is how to extend the traditional equipments and laboratories to the Internet. A method of the embedded systems design with using online laboratory is described in this paper. Also, in this paper the experimental set of remote laboratory which allows carrying out hardware/software oriented design of the embedded control system of a mobile platform is considered.
文摘In the era of Web2.0, AJAX as one of the core technology to provide asynchronous communication with the server's ability to solve most of the Web site to force the user to enter the "submit, wait for redisplay process, so that user from requestfreed response cycle, ultimately allows developers and designers to use standard HTML / CSS / JavaScript to create a "desktop style Web applications. According AJAX principles and characteristics, and the combination of educational administration and educational management system based on AJAX technology solutions.