internet of Things (IoT), as an open-loop ubiquitous network, makes things in the world directly "dialogue". It realizes the interconnection between "things". Unlike computing devices with internet...
详细信息
ISBN:
(纸本)9781509025350
internet of Things (IoT), as an open-loop ubiquitous network, makes things in the world directly "dialogue". It realizes the interconnection between "things". Unlike computing devices with internet access, there are a lot of heterogeneous things without access capability under IoT, and how to access IoT for such "things" is a key issue and technology of IoT. In this study, we first recognize the features and attributes of things in IoT. We then analyze the functional and non-functional access requirements for those access constrained devices. Finally, the current IoT access cases are analyzed and summarized. This study gives thorough analysis on access features of things in IoT. It will provide an important foundation for further research on access technology and access systems.
Self-quantification services are applications of internet of things (IoT) that quantitatively record almost all aspects of human life and surrounding environment in order to understand his or her various status by ana...
详细信息
ISBN:
(纸本)9781509025763
Self-quantification services are applications of internet of things (IoT) that quantitatively record almost all aspects of human life and surrounding environment in order to understand his or her various status by analyzing the relationship of collected data. The authors introduce the overview and the challenges of self-quantification services. The high-level requirements are then defined and categorized into three. The relationship among high-level requirements and corresponding challenges is described afterwards. We conclude the paper by emphasizing the need of proper standards to ensure interoperability of self-quantification services and applications over internet of things.
The internet of Things provides visions of innovative services and domain-specific applications. With the development of internet of Things services, various structural data need to be transferred over the internet. H...
详细信息
The internet of Things provides visions of innovative services and domain-specific applications. With the development of internet of Things services, various structural data need to be transferred over the internet. However, protecting structural information that contains sensitive data has raised concerns against internet of Things services. For a publish/subscribe scenario consisting of sensors, fog nodes, and subscribers, we propose a model that (1) expands the present XML Encryption standard for data with string and numeric types implemented in the sensors, (2) efficiently and discreetly filters matched streaming data and performs summation in the fog nodes, and (3) decrypts the filtered and aggregated data in the subscribers without revealing privacy data. The experimental results of the performance on fog node implemented by PC or Raspberry Pi show that the proposed model can rapidly process multiple encrypted XML streams generated by sensors in a parallel manner without revealing privacy data to subscribers. Therefore, the proposed model is a solution to the fog computing applications in which the privacy preservation of sensor data is of great concern.
Named Data Networking (NDN) is a new network architecture design that led to the evolution of a network architecture based on data-centric. Questions have been raised about how to compare its performance with the old ...
详细信息
Named Data Networking (NDN) is a new network architecture design that led to the evolution of a network architecture based on data-centric. Questions have been raised about how to compare its performance with the old architecture such as IP network which is generally based on internet Protocol version 4 (IPv4). Differs with the old one, source and destination addresses in the delivery of data are not required on the NDN network because the addresses function is replaced by a data name (Name) which serves to identify the data uniquely. In a computer network, a network routing is an essential factor to support data communication. The network routing on IP network relies only on Routing Information Base (RIB) derived from the IP table on the router. So that, if there is a problem on the network such as there is one node exposed to a dangerous attack, the IP router should wait until the IP table is updated, and then the routing channel is changed. The issue of how to change the routing path without updating IP table has received considerable critical attention. The NDN network has an advantage such as its capability to execute an adaptive forwarding mechanism, which FIB (Forwarding Information Base) of the NDN router keeps information for routing and forwarding planes. Therefore, if there is a problem on the network, the NDN router can detect the problem more quickly than the IP router. The contribution of this study is important to explain the benefit of the forwarding mechanism of the NDN network compared to the IP network forwarding mechanism when there is a node which is suffered a hijack attack.
internet of Things (IoT) creates value through data that can be captured from connected assets and can improve the quality of our lives. Organizations can use IoT to gain a better understanding of their customers39;...
详细信息
ISBN:
(纸本)9789380544199
internet of Things (IoT) creates value through data that can be captured from connected assets and can improve the quality of our lives. Organizations can use IoT to gain a better understanding of their customers' requirements and can also improve processes such as supply chain, inventory management, investments and public safety. The increasing technological intensity of business is driving significant acceptance of IoT.
Urban Energy internet is an energy ecosystem, which is based on smart distribution network, and constructed by a variety of highly coupled networks. Urban Energy internet is an effective solution for the high penetrat...
详细信息
Smart grid has become the inevitable development trend of the modern power grid. The vigorous development of the smart grid led to the rise and development of the smart grid industry, seize the smart grid industry dev...
详细信息
ISBN:
(纸本)9789811063640;9789811063633
Smart grid has become the inevitable development trend of the modern power grid. The vigorous development of the smart grid led to the rise and development of the smart grid industry, seize the smart grid industry development opportunities, also has become one of the important choice of regional planning and construction. Scientifically reflecting the effect of regional development of smart grid industry of the conditions and the development of the industries to the region will guide regional smart grid industry planning, and encourage regional investment in the development of smart grid industry. This paper established smart grid industry maturity comprehensive evaluation index system from five aspects, the technical performance, industrial facilities, market environment, policy environment and social influence, to put forward to smart grid industry maturity evaluation algorithm, thus smart grid industry maturity assessment model is established, in order to provide reference for regional planning and smart grid industry.
We have proposed Enhancing internet Networks Confidentiality Based on composite Coding and Channels Coding Schemes of Signatures Reconfiguration. On the transmitter side, data bits are sliced into spectral chips, code...
详细信息
distributed data mining (DDM) has become important research area with the increase in large distributed transactional databases and need to investigate important patterns in such databases. DDM may increase the proces...
详细信息
ISBN:
(纸本)9789380544199
distributed data mining (DDM) has become important research area with the increase in large distributed transactional databases and need to investigate important patterns in such databases. DDM may increase the processing capabilities but it increases communication and storage cost. Many algorithms and tools for mining association rules in distributed databases are proposed in literature. This paper illustrates some of the DDM algorithms and also tools proposed in literature for mining association rules in the distributed environment.
the ability to provide public eservices has tremendously increased with the rapid advancements and development of the IT infrastructure and the availability of internet. The aim to ensure the scalability, flexibility ...
详细信息
ISBN:
(纸本)9781467395847
the ability to provide public eservices has tremendously increased with the rapid advancements and development of the IT infrastructure and the availability of internet. The aim to ensure the scalability, flexibility and feasibility to meet the IT infrastructure demands which can be achieved with the Cloud computingtechnology. Therefore, the perspective of the IT personnel, working in Oman public sector organizations, becomes imperative towards understanding the factors that impact the willingness to adopt Cloud computingtechnology. This research aims to understand whether an IT personnel's perspective is an influencing factor in the slowness of the adoption of Cloud computing. And also whether the influencing factors are an outcome of individual characteristics of the IT personnel or an outcome of the characteristics of the technology itself. The authors examine the factors and build a research model that integrates the two types of factors;those that relate to the individual characteristics of IT personnel (Human-related factors) and those that relate to the IT personnel's perception of various characteristics of the Cloud computingtechnology (system-related factors). This study is based on quantitative approach wherein the online survey is applied for collecting the information. The findings of this study will reveal and highlight the IT personnel perspective as a factor faced by Oman public sector organizations in the slow adoption of cloud computingtechnology.
暂无评论