期刊文献+
共找到7,145篇文章
< 1 2 250 >
每页显示 20 50 100
Multidiscipline Applications of Triboelectric Nanogenerators for the Intelligent Era of Internet of Things 被引量:8
1
作者 Xiaole Cao Yao Xiong +3 位作者 Jia Sun Xiaoyin Xie Qijun Sun Zhong Lin Wang 《Nano-Micro Letters》 SCIE EI CAS CSCD 2023年第1期252-292,共41页
In the era of 5G and the Internet of things(IoTs),vari-ous human-computer interaction systems based on the integration of triboelectric nanogenerators(TENGs)and IoTs technologies dem-onstrate the feasibility of sustai... In the era of 5G and the Internet of things(IoTs),vari-ous human-computer interaction systems based on the integration of triboelectric nanogenerators(TENGs)and IoTs technologies dem-onstrate the feasibility of sustainable and self-powered functional systems.The rapid development of intelligent applications of IoTs based on TENGs mainly relies on supplying the harvested mechanical energy from surroundings and implementing active sensing,which have greatly changed the way of human production and daily life.This review mainly introduced the TENG applications in multidisci-pline scenarios of IoTs,including smart agriculture,smart industry,smart city,emergency monitoring,and machine learning-assisted artificial intelligence applications.The challenges and future research directions of TENG toward IoTs have also been proposed.The exten-sive developments and applications of TENG will push forward the IoTs into an energy autonomy fashion. 展开更多
关键词 Triboelectric nanogenerator Self-powered sensor internet of things Artificial intelligence Machine learning
在线阅读 下载PDF
Security Architecture on the Trusting Internet of Things 被引量:2
2
作者 Bing Zhang Xin-Xin Ma Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS 2011年第4期364-367,共4页
By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined publi... By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined public key (CPK) mechanism is proposed, which solves the problems about a mass amount of authentications and the cross-domain authentication by integrating nodes' validity of identity authentication and uniqueness of identification. Moreover, the proposal of constructing nodes' authentic identification, valid authentication and credible communication connection at the application layer through the perception layer impels the formation of trust chain and relationship among perceptional nodes. Consequently, a trusting environment of the Internet of Things is built, by which a guidance of designing the trusted one would be provided. 展开更多
关键词 Combined public key elliptic curves cryptography internet of things radio frequency identification security system trusting system.
在线阅读 下载PDF
Achieving Fine-Grained and Flexible Access Control on Blockchain-Based Data Sharing for the Internet of Things 被引量:3
3
作者 Ruimiao Wang Xiaodong Wang +2 位作者 Wenti Yang Shuai Yuan Zhitao Guan 《China Communications》 SCIE CSCD 2022年第6期22-34,共13页
The traditional centralized data sharing systems have potential risks such as single point of failures and excessive working load on the central node.As a distributed and collaborative alternative,approaches based upo... The traditional centralized data sharing systems have potential risks such as single point of failures and excessive working load on the central node.As a distributed and collaborative alternative,approaches based upon blockchain have been explored recently for Internet of Things(IoTs).However,the access from a legitimate user may be denied without the pre-defined policy and data update on the blockchain could be costly to the owners.In this paper,we first address these issues by incorporating the Accountable Subgroup Multi-Signature(ASM)algorithm into the Attribute-based Access Control(ABAC)method with Policy Smart Contract,to provide a finegrained and flexible solution.Next,we propose a policy-based Chameleon Hash algorithm that allows the data to be updated in a reliable and convenient way by the authorized users.Finally,we evaluate our work by comparing its performance with the benchmarks.The results demonstrate significant improvement on the effectiveness and efficiency. 展开更多
关键词 blockchain access control smart contract MULTI-SIGNATURE chameleon-hash data sharing internet of things
在线阅读 下载PDF
A Trusted Attestation Mechanism for the Sensing Nodes of Internet of Things Based on Dynamic Trusted Measurement 被引量:10
4
作者 Bei Gong Yubo Wang +2 位作者 Xiangang Liu Fazhi Qi Zhihui Sun 《China Communications》 SCIE CSCD 2018年第2期100-121,共22页
Internet of things has been widely applied to industrial control, smart city and environmental protection, in these applica- tion scenarios, sensing node needs to make real-time response to the feedback control of the... Internet of things has been widely applied to industrial control, smart city and environmental protection, in these applica- tion scenarios, sensing node needs to make real-time response to the feedback control of the application layer. Therefore, it is nec- essary to monitor whether or not awareness nodes are trusted in real time, but the existing mechanisms for trusted certification lack the real-time measurement and tracking of the sensing node. To solve the above problems, this paper proposes a dynamic metric based authentication mechanism for sensing nodes of Internet of things. Firstly, the dynamic trustworthiness measure of the sensing nodes is carried out by introducing the computational function such as the trust function, the trust- worthiness risk assessment function, the feed- back control function and the active function of the sensing node. The dynamic trustworthi- ness measure of sensing nodes from multiple dimensions can effectively describe the change of trusted value of sensing nodes. Then, on the basis of this, a trusted attestation based on node trusted measure is realized by using the revocable group signature mechanism of local verifier. The mechanism has anonymity, un- forgeability and traceability, which is proved the security in the standard model. Simulationexperiments show that the proposed trusted attestation mechanism is flexible, practical and ef|Scient and has better attack resistance. It can effectively guarantee the reliable data transmission of nodes and realize the dynamic tracking of node reliability, which has a lower impact on system performance. 展开更多
关键词 internet of things trusted mea-surement trusted attestation: group signature
在线阅读 下载PDF
Game Theoretical Secure Wireless Communication for UAV-assisted Vehicular Internet of Things 被引量:4
5
作者 Bo Liu Zhou Su Qichao Xu 《China Communications》 SCIE CSCD 2021年第7期147-157,共11页
With the ever-expanding applications of vehicles and the development of wireless communication technology,the burgeoning unmanned aerial vehicle(UAV)assisted vehicular internet of things(UVIoTs)has emerged,where the g... With the ever-expanding applications of vehicles and the development of wireless communication technology,the burgeoning unmanned aerial vehicle(UAV)assisted vehicular internet of things(UVIoTs)has emerged,where the ground vehicles can experience more efficient wireless services by employing UAVs as a temporary mobile base station.However,due to the diversity of UAVs,there exist UAVs such as jammers to degenerate the performance of wireless communication between the normal UAVs and vehicles.To solve above the problem,in this paper,we propose a game based secure data transmission scheme in UVIoTs.Specifically,we exploit the offensive and defensive game to model the interactions between the normal UAVs and jammers.Here,the strategy of the normal UAV is to determine whether to transmit data,while that of the jammer is whether to interfere.We then formulate two optimization problems,i.e.,maximizing the both utilities of UAVs and jammers.Afterwards,we exploit the backward induction method to analyze the proposed countermeasures and finally solve the optimal solution.Lastly,the simulation results show that the proposed scheme can improve the wireless communication performance under the attacks of jammers compared with conventional schemes. 展开更多
关键词 UAV-assisted vehicular internet of things(UVIoTs) jammers offensive and defensive game wireless transmission
在线阅读 下载PDF
Cooperative Differential Game for Model Energy-Bandwidth Efficiency Tradeoff in the Internet of Things 被引量:3
6
作者 LIN Fuhong LIU Qian +2 位作者 ZHOU Xianwei CHEN Yueyun HUANG Daochao 《China Communications》 SCIE CSCD 2014年第1期92-102,共11页
Internet of Things (IoT) refers to an infrastructure which enables the forms of com- munication and collaboration between people and things, and between things themselves. In order to improve its performance, we pre... Internet of Things (IoT) refers to an infrastructure which enables the forms of com- munication and collaboration between people and things, and between things themselves. In order to improve its performance, we present a tradeoff between bandwidth and energy con- sumption in the loT in this paper. A service providing model is built to find the relation- ship between bandwidth and energy consump- tion using a cooperative differential game mo- del. The game solution is gotten in the condi- tion of grand coalition, feedback Nash equili- brium and intermediate coalitions and an allo- cation policy is obtain by Shapley theory. The results are shown as follows. Firstly, the per- formance of IoT decreases with the increasing of bandwidth cost or with the decreasing of en- ergy cost; secondly, all the nodes in the IoT com- posing a grand coalition can save bandwidth and energy consumption; thirdly, when the fac- tors of bandwidth cost and energy cost are eq- ual, the obtained number of provided services is an optimised value which is the trade-off between energy and bandwidth consumption. 展开更多
关键词 internet of things bandwidth con- sumption energy consumption cooperative diff- erential game theory
在线阅读 下载PDF
I^2oT: Advanced Direction of the Internet of Things 被引量:1
7
作者 Yixin Zhong 《ZTE Communications》 2015年第2期3-6,共4页
The Internet of Things (IoT) is still in its infancy because of the limited capability of its embedded processor. In the meantime, re- search on artificial intelligence (AI) has made plenty of progress. The applic... The Internet of Things (IoT) is still in its infancy because of the limited capability of its embedded processor. In the meantime, re- search on artificial intelligence (AI) has made plenty of progress. The application of AI to loT will significantly increase the capa- bilities of IoT, and this will benefit both economic and social development. In this paper, the elementary concepts and key tech- nologies of AI are explained, and the model and principle of intelligent IoT, denoted I^2oT, resulting from the integration of AI and loT are discussed. I^2oT will be the most promising version of IoT. Finally, recommendations for further study and standardization of I2oT are made. 展开更多
关键词 lnternet of things artificial intelligence knowledge producing strategy formulation intelligent internet of things
在线阅读 下载PDF
Strategic Thinking of the Internet of Things and M2M Services 被引量:6
8
作者 Qi Qingzhong 《ZTE Communications》 2010年第1期4-7,共4页
Editor's Desk:The Internet of Things is an important part of the emerging high-tech industry and has been recognized as one of the important technologies for addressing global financial crisis and revitalizing the e... Editor's Desk:The Internet of Things is an important part of the emerging high-tech industry and has been recognized as one of the important technologies for addressing global financial crisis and revitalizing the economy. Therefore, at the beginning of the new year, we are honored to have invited Mr. Samuel Qi (Qi Qingzhong), a famous Chinese communication technology expert and GM of Shanghai Symphony Telecommunications Co., Ltd., to give his views on the development strategy of the Internet of Things and Machine to Machine (M2M) Communications. 展开更多
关键词 In Strategic Thinking of the internet of things and M2M Services
在线阅读 下载PDF
An Effective Differential Fault Analysis on the Serpent Cryptosystem in the Internet of Things 被引量:1
9
作者 LI Wei TAO Zhi +4 位作者 GU Dawu SUN Li QU Bo LIU Zhiqiang LIU Ya 《China Communications》 SCIE CSCD 2014年第6期129-139,共11页
Due to the strong attacking ability, fast speed, simple implementation and other characteristics, differential fault analysis has become an important method to evaluate the security of cryptosystem in the Internet of ... Due to the strong attacking ability, fast speed, simple implementation and other characteristics, differential fault analysis has become an important method to evaluate the security of cryptosystem in the Internet of Things. As one of the AES finalists, the Serpent is a 128-bit Substitution-Permutation Network(SPN) cryptosystem. It has 32 rounds with the variable key length between 0 and 256 bits, which is flexible to provide security in the Internet of Things. On the basis of the byte-oriented model and the differential analysis, we propose an effective differential fault attack on the Serpent cryptosystem. Mathematical analysis and simulating experiment show that the attack could recover its secret key by introducing 48 faulty ciphertexts. The result in this study describes that the Serpent is vulnerable to differential fault analysis in detail. It will be beneficial to the analysis of the same type of other iterated cryptosystems. 展开更多
关键词 internet of things CRYPTANALYSIS differential fault analysis serpent.
在线阅读 下载PDF
Towards the Design of Ethics Aware Systems for the Internet of Things
10
作者 Sahil Sholla Roohie Naaz Mir Mohammad Ahsan Chishti 《China Communications》 SCIE CSCD 2019年第9期209-221,共13页
The Internet of Things promises to offer numerous societal benefits by providing a spectrum of user applications.However,ethical ramifications of adopting such pervasive technology on a society-wide scale have not bee... The Internet of Things promises to offer numerous societal benefits by providing a spectrum of user applications.However,ethical ramifications of adopting such pervasive technology on a society-wide scale have not been adequately considered.Smart things endowed with artificial intelligence may carry out decisions that entail ethical consequences.It is assumed that the functioning of a smart device does not involve any ethical responsibility vis-a-vis its application context.Such a perspective may precipitate situations that endanger essential human values or cause physical or emotional harm.Therefore,it is necessary to consider the design of ethics within intelligent systems to safeguard human interests.In order to address these concerns,we propose a novel method based on Boolean algebra that enables a machine to exhibit varying ethical behaviour by employing the concept of ethics categories and ethics modes.Such enhancement of smart things offers a way to design ethically compliant smart devices and paves way for human friendly technology ecosystems. 展开更多
关键词 BOOLEAN ETHICS aware ETHICAL DESIGN internet of things
在线阅读 下载PDF
Barcelona Smart City: The Heaven on Earth(Internet of Things: Technological God)
11
作者 Somayya Madakam Ramaswamy Ramachandran 《ZTE Communications》 2015年第4期3-9,共7页
Cities are the most preferable dwelling places, having with better employment opportunities, educational hubs, medical services, recreational facilities, theme parks, and shopping malls etc. Cities are the driving for... Cities are the most preferable dwelling places, having with better employment opportunities, educational hubs, medical services, recreational facilities, theme parks, and shopping malls etc. Cities are the driving forces for any national economy too. Unfortunately now a days, these cities are producing circa 70% of pollutants, even though they only oeeupy 2% of surface of the Earth. Pub- lic utility services cannot meet the demands of unexpected growth. The filthiness in cities causing decreasing of Quality of Life. In this light our research paper is giving more concentration on necessity of " Smart Cities", which are the basis for civic centric services. This article is throwing light on Smart Cities and its important roles. The beauty of this manuscript is scribbling "Smart Cities" concepts in pictorially. Moreover this explains on "Barcelona Smart City" using lnternet of Things Technologies. It is a good example in urban paradigm shift. Braeelona is like the heaven on the earth with by providing Quality of Life to all urban citizens. The GOD is Interenet of Things. 展开更多
关键词 smart cities Barcelona City internet of things smart mobility open access data
在线阅读 下载PDF
Crawler for Nodes in the Internet of Things
12
作者 Xuemeng Li Yongyi Wang +1 位作者 Fan Shi Wenchao Jia 《ZTE Communications》 2015年第3期46-50,共5页
Determining the application and version of nodes in the Internet of Things (IoT) is very important for warning about and managing vulnerabilities in the IoT. This article defines the attributes for determining the a... Determining the application and version of nodes in the Internet of Things (IoT) is very important for warning about and managing vulnerabilities in the IoT. This article defines the attributes for determining the application and version of nodes in the roT. By improving the structure of the Internet web crawler, which obtains raw data from nodes, we can obtain data from nodes in the IoT. We improve on the existing strategy, in which only determinations are stored, by also storing downloaded raw data locally in MongoDB. This stored raw data can be conveniently used to determine application type and node version when a new determination method emerges or when there is a new application type or node version. In such instances, the crawler does not have to scan the Internet again. We show through experimentation that our crawler can crawl the loT and obtain data necessary for determining the application type and node version. 展开更多
关键词 CRAWLER local storage NODES internet of things
在线阅读 下载PDF
Machine Learning-Based Radio Access Technology Selection in the Internet of Moving Things
13
作者 Ramon Sanchez-Iborra Luis Bernal-Escobedo Jose Santa 《China Communications》 SCIE CSCD 2021年第7期13-24,共12页
The Internet of Moving Things(IoMT)takes a step further with respect to traditional static IoT deployments.In this line,the integration of new eco-friendly mobility devices such as scooters or bicycles within the Coop... The Internet of Moving Things(IoMT)takes a step further with respect to traditional static IoT deployments.In this line,the integration of new eco-friendly mobility devices such as scooters or bicycles within the Cooperative-Intelligent Transportation Systems(C-ITS)and smart city ecosystems is crucial to provide novel services.To this end,a range of communication technologies is available,such as cellular,vehicular WiFi or Low-Power Wide-Area Network(LPWAN);however,none of them can fully cover energy consumption and Quality of Service(QoS)requirements.Thus,we propose a Decision Support System(DSS),based on supervised Machine Learning(ML)classification,for selecting the most adequate transmission interface to send a certain message in a multi-Radio Access Technology(RAT)set up.Different ML algorithms have been explored taking into account computing and energy constraints of IoMT enddevices and traffic type.Besides,a real implementation of a decision tree-based DSS for micro-controller units is presented and evaluated.The attained results demonstrate the validity of the proposal,saving energy in communication tasks as well as satisfying QoS requirements of certain urgent messages.The footprint of the real implementation on an Arduino Uno is 444 bytes and it can be executed in around 50µs. 展开更多
关键词 internet of moving things multi-RAT CITS classification personal mobility
在线阅读 下载PDF
Optimization of the Internet of Remote Things Data Acquisition Based on Satellite UAV Integrated Network
14
作者 Yuanyuan Yao Dengyang Dong +3 位作者 Sai Huang Chunyu Pan Shuo Chen Xuehua Li 《China Communications》 SCIE CSCD 2023年第7期15-28,共14页
In order to achieve dependable and efficient data acquisition and transmission in the Internet of Remote Things(IoRT),we investigate the optimization scheme of IoRT data acquisition under the unmanned aerial vehicle(U... In order to achieve dependable and efficient data acquisition and transmission in the Internet of Remote Things(IoRT),we investigate the optimization scheme of IoRT data acquisition under the unmanned aerial vehicle(UAV)-low earth orbit(LEO)satellite integrated space-air-ground network,in which the UAV acquires data from massive Internet of Things(IoT)devices in special scenarios.To combine with the actual scenario,we consider two different data types,that is,delay-sensitive data and delay-tolerant data,the transmission mode is accordingly divided into two types.For delay-sensitive data,the data will be transmitted via the LEO satellite relay to the data center(DC)in real-time.For delay-tolerant data,the UAV will store and carry the data until the acquisition is completed,and then return to DC.Due to nonconvexity and complexity of the formulated problem,a multi-dimensional optimization Rate Demand based Joint Optimization(RDJO)algorithm is proposed.The algorithm first uses successive convex approximation(SCA)technology to solve the non-convexity,and then based on the block coordinate descent(BCD)method,the data acquisition efficiency is maximized by jointly optimizing UAV deployment,the bandwidth allocation of IoRT devices,and the transmission power of the UAV.Finally,the proposed RDJO algorithm is compared with the conventional algorithms.Simulation consequences demonstrate that the efficiency of IoRT data acquisition can be greatly improved by multi-parameter optimization of the bandwidth allocation,UAV deployment and the transmission power. 展开更多
关键词 internet of Remote things dataacquisi-tion unmanned aerial vehicle LEO satellite
在线阅读 下载PDF
Associative Tasks Computing Offloading Scheme in Internet of Medical Things with Deep Reinforcement Learning 被引量:1
15
作者 Jiang Fan Qin Junwei +1 位作者 Liu Lei Tian Hui 《China Communications》 SCIE CSCD 2024年第4期38-52,共15页
The Internet of Medical Things(Io MT) is regarded as a critical technology for intelligent healthcare in the foreseeable 6G era. Nevertheless, due to the limited computing power capability of edge devices and task-rel... The Internet of Medical Things(Io MT) is regarded as a critical technology for intelligent healthcare in the foreseeable 6G era. Nevertheless, due to the limited computing power capability of edge devices and task-related coupling relationships, Io MT faces unprecedented challenges. Considering the associative connections among tasks, this paper proposes a computing offloading policy for multiple-user devices(UDs) considering device-to-device(D2D) communication and a multi-access edge computing(MEC)technique under the scenario of Io MT. Specifically,to minimize the total delay and energy consumption concerning the requirement of Io MT, we first analyze and model the detailed local execution, MEC execution, D2D execution, and associated tasks offloading exchange model. Consequently, the associated tasks’ offloading scheme of multi-UDs is formulated as a mixed-integer nonconvex optimization problem. Considering the advantages of deep reinforcement learning(DRL) in processing tasks related to coupling relationships, a Double DQN based associative tasks computing offloading(DDATO) algorithm is then proposed to obtain the optimal solution, which can make the best offloading decision under the condition that tasks of UDs are associative. Furthermore, to reduce the complexity of the DDATO algorithm, the cacheaided procedure is intentionally introduced before the data training process. This avoids redundant offloading and computing procedures concerning tasks that previously have already been cached by other UDs. In addition, we use a dynamic ε-greedy strategy in the action selection section of the algorithm, thus preventing the algorithm from falling into a locally optimal solution. Simulation results demonstrate that compared with other existing methods for associative task models concerning different structures in the Io MT network, the proposed algorithm can lower the total cost more effectively and efficiently while also providing a tradeoff between delay and energy consumption tolerance. 展开更多
关键词 associative tasks cache-aided procedure double deep Q-network internet of Medical things(IoMT) multi-access edge computing(MEC)
在线阅读 下载PDF
Using Artificial Intelligence in the Internet of Things
16
作者 Fuji Ren Yu Gu 《ZTE Communications》 2015年第2期1-2,共2页
The Internet of Things (IoT) has received much attention over the past decade. With the rapid increase in the use of smart devices, we are now able to collect big data on a daily basis. The data we are gathering (a... The Internet of Things (IoT) has received much attention over the past decade. With the rapid increase in the use of smart devices, we are now able to collect big data on a daily basis. The data we are gathering (and related problems) are becoming more complex and uncertain. Researchers have therefore turned to artificial intelligence (AI) to efficiently deal with the problems ereated by big data. 展开更多
关键词 AI DATA Using Artificial Intelligence in the internet of things WSN
在线阅读 下载PDF
Power-Domain Collision-Tolerant Random Access Method with Auxiliary Beam for Satellite Internet of Things:A New Solution
17
作者 Xu Yuanyuan Liu Ziwei +1 位作者 Bian Dongming Zhang Gengxin 《China Communications》 SCIE CSCD 2024年第8期236-248,共13页
There are numerous terminals in the satellite Internet of Things(IoT).To save cost and reduce power consumption,the system needs terminals to catch the characteristics of low power consumption and light control.The re... There are numerous terminals in the satellite Internet of Things(IoT).To save cost and reduce power consumption,the system needs terminals to catch the characteristics of low power consumption and light control.The regular random access(RA)protocols may generate large amounts of collisions,which degrade the system throughout severally.The near-far effect and power control technologies are not applicable in capture effect to obtain power difference,resulting in the collisions that cannot be separated.In fact,the optimal design at the receiving end can also realize the condition of packet power domain separation,but there are few relevant researches.In this paper,an auxiliary beamforming scheme is proposed for power domain signal separation.It adds an auxiliary reception beam based on the conventional beam,utilizing the correlation of packets in time-frequency domain between the main and auxiliary beam to complete signal separation.The roll-off belt of auxiliary beam is used to create the carrier-to-noise ratio(CNR)difference.This paper uses the genetic algorithm to optimize the auxiliary beam direction.Simulation results show that the proposed scheme outperforms slotted ALOHA(SA)in terms of system throughput per-formance and without bringing terminals additional control burden. 展开更多
关键词 beamforming non-orthogonal multiple access random access satellite internet of things
在线阅读 下载PDF
Ultra reliability and massive connectivity provision in integrated internet of military things(IoMT)based on tactical datalink
18
作者 Li Bing Yating Gu +4 位作者 Lanke Hu Li Bowen Yang Lihua Jue Wang Yue Yin 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期386-398,共13页
One of the major challenges arising in internet of military things(IoMT)is accommodating massive connectivity while providing guaranteed quality of service(QoS)in terms of ultra-high reliability.In this regard,this pa... One of the major challenges arising in internet of military things(IoMT)is accommodating massive connectivity while providing guaranteed quality of service(QoS)in terms of ultra-high reliability.In this regard,this paper presents a class of code-domain nonorthogonal multiple accesses(NOMAs)for uplink ultra reliable networking of massive IoMT based on tactical datalink such as Link-16 and joint tactical information distribution system(JTIDS).In the considered scenario,a satellite equipped with Nr antennas servers K devices including vehicles,drones,ships,sensors,handset radios,etc.Nonorthogonal coded modulation,a special form of multiple input multiple output(MIMO)-NOMA is proposed.The discussion starts with evaluating the output signal to interference-plus-noise(SINR)of receiver filter,leading to the unveiling of a closed-form expression for overloading systems as the number of users is significantly larger than the number of devices admitted such that massive connectivity is rendered.The expression allows for the development of simple yet successful interference suppression based on power allocation and phase shaping techniques that maximizes the sum rate since it is equivalent to fixed-point programming as can be proved.The proposed design is exemplified by nonlinear modulation schemes such as minimum shift keying(MSK)and Gaussian MSK(GMSK),two pivotal modulation formats in IoMT standards such as Link-16 and JITDS.Numerical results show that near capacity performance is offered.Fortunately,the performance is obtained using simple forward error corrections(FECs)of higher coding rate than existing schemes do,while the transmit power is reduced by 6 dB.The proposed design finds wide applications not only in IoMT but also in deep space communications,where ultra reliability and massive connectivity is a keen concern. 展开更多
关键词 Satellite network Deep space communications internet of military things Non-orthogonal multiple access MIMO LINK-16 JITDS
在线阅读 下载PDF
Multi-source heterogeneous data access management framework and key technologies for electric power Internet of Things
19
作者 Pengtian Guo Kai Xiao +1 位作者 Xiaohui Wang Daoxing Li 《Global Energy Interconnection》 EI CSCD 2024年第1期94-105,共12页
The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initiall... The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT. 展开更多
关键词 Power internet of things Object model High concurrency access Zero trust mechanism Multi-source heterogeneous data
在线阅读 下载PDF
A Double-Timescale Reinforcement Learning Based Cloud-Edge Collaborative Framework for Decomposable Intelligent Services in Industrial Internet of Things
20
作者 Zhang Qiuyang Wang Ying Wang Xue 《China Communications》 SCIE CSCD 2024年第10期181-199,共19页
With the proportion of intelligent services in the industrial internet of things(IIoT)rising rapidly,its data dependency and decomposability increase the difficulty of scheduling computing resources.In this paper,we p... With the proportion of intelligent services in the industrial internet of things(IIoT)rising rapidly,its data dependency and decomposability increase the difficulty of scheduling computing resources.In this paper,we propose an intelligent service computing framework.In the framework,we take the long-term rewards of its important participants,edge service providers,as the optimization goal,which is related to service delay and computing cost.Considering the different update frequencies of data deployment and service offloading,double-timescale reinforcement learning is utilized in the framework.In the small-scale strategy,the frequent concurrency of services and the difference in service time lead to the fuzzy relationship between reward and action.To solve the fuzzy reward problem,a reward mapping-based reinforcement learning(RMRL)algorithm is proposed,which enables the agent to learn the relationship between reward and action more clearly.The large time scale strategy adopts the improved Monte Carlo tree search(MCTS)algorithm to improve the learning speed.The simulation results show that the strategy is superior to popular reinforcement learning algorithms such as double Q-learning(DDQN)and dueling Q-learning(dueling-DQN)in learning speed,and the reward is also increased by 14%. 展开更多
关键词 computing service edge intelligence industrial internet of things(IIoT) reinforcement learning(RL)
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部