首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 156 毫秒
1.
物联网技术是最近几年发展起来的新型计算,但物联网技术应用领域比较广,在我国工业、农业、交通等领域都取得一定成绩。本论文主要从物联网的体系特征与应用、我国物联网产业发展存在的问题、我国物联网技术与产业发展的政策建议三方面进行阐述我国物联网技术与产业发展研究,希望能为研究物联网技术学者提供理论参考依据,促进我国物联网技术进一步发展,对早日实现我国现代化工业强国起到促进作用。  相似文献   

2.
从物联网的基本概念出发,扼要介绍与物联网相关的CPS、无线传感器网络和下一代网络等应用,并举例说明物联网在智能电网、煤炭行业、上海2010世博会和西安2011世界园艺博览会方面的最新应用情况,并指出物联网对今后工业生产、社会生活等诸多领域产生深远的影响,其技术有广阔的应用前景.  相似文献   

3.
随着科学技术的飞速发展,物联网技术以其技术优势在社会各界得到了有效应用。物联网的出现,使互联网与各种资源之间有了有效联系,促进了产业的成功转型。其在提高人们工作效率和生活质量的基础上,成为促进社会积极发展的新力量。基于此,从物联网的概念出发,分析、探究物联网的关键技术及相关应用,并提出一些建议,供相关人士参考。  相似文献   

4.
物联网在技术上融合了感知、网络、应用等多项技术,在系统体系结构上从信息技术终端和系统延伸到了感知物理世界和多项应用业务,物联网实质上不仅是传统网络的范畴,且已经成为以数据为核心的信息化系统。物资装备是生产生活中必不可少的工具,其安全运转关系到经济发展与人们的人身安全。随着物联网技术的发展,运用物联网技术对物资装备进行监管成为可能。  相似文献   

5.
《工矿自动化》2017,(9):1-11
介绍了矿山物联网技术发展现状和产业发展模式,指出矿山物联网顶层设计的目的是从国家安全生产监管的全局进行感知矿山总体设计,实现矿山物联网物与物相联,并明确矿山物联网的服务本质。探讨了矿山物联网的发展趋势:关键技术不断突破,服务承载模式逐步显现,政府与企业共促发展。阐述了矿山物联网发展重点领域:核心关键技术突破,包括微型化智能装置及能量捕获技术,矿山覆盖网络、通信与灾后重建技术,云计算、大数据及安全生产管理技术,矿山语义与虚拟化技术,安全、隐私与可信网络技术;5S应用,即感知人员、感知灾害、感知设备、感知矿区、感知管理;云服务体系构建;标准化建设。提出了矿山物联网保障措施及建设路线。  相似文献   

6.
刘卓  刘宏志  林木 《计算机测量与控制》2012,20(8):2034-2035,2038
为了适应高速铁路物联网产业发展的需要,提出将物联网技术应用在GSM-R电磁环境测试领域中;该系统设计充分运用无线传感器网络技术在测控领域的优势,辅助电磁环境测试设备采集GSM-R电磁环境测试环境中的温度、湿度、车距等信息,通过互联网进行实时传输,并在计算机软件中完成对数据的接收、存储、处理及分析;通过对某铁路段GSM-R频段的电磁环境进行的测试实验表明,该系统能获取被测路段中受干扰站点的干扰信号强度等信息,证实了物联网技术在GSM-R电磁环境测试中有一定的应用价值。  相似文献   

7.
物联网信息技术在不断发展,物联网技术在多个领域中的应用也逐渐拓展,尤其是在当今的智能化小区建设中物联网技术的应用得到了多方的关注,并在改善人们居住环境,维护居民安全中发挥了重要作用。因此,本研究主要从对物联网技术的认识入手,主要分析了物联网及其关键技术,及射频技术与无线传感网络技术在智能化住宅小区中的具体应用。  相似文献   

8.
目前,云计算、网络虚拟化等技术的发展对物联网的应用产生了重要影响。基于物联网技术的不足,探讨了SDN架构、网络虚拟化和云管理技术,并将3种技术应用于物联网,提出了未来的物联网架构,为实现物联网的大规模发展及应用提供了参考。  相似文献   

9.
正e络盟宣布与飞思卡尔、Atmel及德州仪器(TI)等技术合作伙伴联合推出一系列独有的全新技术、产品及设计资源。e络盟大中华区总经理刘嘉功先生表示:"物联网已成为全球最重要的发展趋势之一,其必将推动中国电子产业的发展。未来几年,物联网将影响到经济与社会生活的方方面面。e络盟很高兴能够为中国工程师推出一系列开创性的物联网应用解决方案,以激发他们的创新理念设计从而将物联网概念变为现实。"  相似文献   

10.
随着科技的快速发展,及网络信息平台的构建,使社会各领域的生产及管理能效有了质的飞跃,而且在一定程度上提升了人们的生活质量。从互联网数据信息安全的角度来看,构建一种可追溯的物联网数据模型是各产业发展的未来趋势,对于产业发展有着极大的促进作用。本文就以基于物联网技术的维吾尔药质量监管与追溯系统建设为例,探讨面向可追溯的物联网数据采集的策略以及物联网数据平台的建模方法,以期为相关产业的物联网实践带来启示。  相似文献   

11.
With each passing day, Internet of Things (IoT), has the potential to transform our society to a more digital way. In this paper, a cryptographic system is proposed, which has been designed and implemented, following the IoT optimized technologies. As the benefits of IoT are numerous, the need for a privacy platform is more than necessary to be developed. This work aims to demonstrate this by, firstly, implementing efficient and flexible, the fundamentals primitives of cryptography and privacy. Secondly, this is achieved, by introducing applied cryptography, in a more interactive and flexible approach. The proposed system and the incorporation of this platform is scrutinized. In the context of this work, an application of symmetric cryptography is introduced, based on the Advanced Encryption Standard (AES) in Electronic Code Book (ECB), Cipher Block Chaining (CBC) and Counter (CTR) modes of operation, for both encryption and decryption of texts, images and electronic data applications. In addition two other security schemes are supported by the proposed system: AES Galois/Counter Mode (GCM) and AES Galois Message Authentication Code (GMAC). The GCM proposed integration, in an authentication scheme, designed to provide authenticity and confidentiality, at the same time. On the other hand, GMAC, can be applied as message authentication code. Both operations, are optimized in sense of implementation resources, since the major cost is targeted to AES core. In addition, based on the integrated hardware modules, user registration and validation is proposed and implemented, with no additional cost, and with no performance penalty. Furthermore, two factor authentication has been designed and proposed, based on One Time Passwords (OTP), which can been produced with a random procedure. After these, a reference to the security levels, as regards to the communication between the IoT layers of the architecture, is presented. IoT hardware platforms are facing lack of security level and this brings the opportunity to use advanced security mechanisms. Implementation comparison results emphasize the importance of testing and measuring the performance of the alternative encryption algorithms, supported by hardware platforms.  相似文献   

12.
Abstract

The Internet of Things (IoT) has gained significant attention from industry as well as academia during the past decade. Smartness, however, remains a substantial challenge for IoT applications. Recent advances in networked sensor technologies, computing, and machine learning have made it possible for building new smart IoT applications. In this paper, we propose a novel approach: the Neural Knowledge DNA based Smart Internet of Things that enables IoT to extract knowledge from past experiences, as well as to store, evolve, share, and reuse such knowledge aiming for smart functions. By catching decision events, this approach helps IoT gather its own daily operation experiences, and it uses such experiences for knowledge discovery with the support of machine learning technologies. An initial case study is presented at the end of this paper to demonstrate how this approach can help IoT applications become smart: the proposed approach is applied to fitness wristbands to enable human action recognition.  相似文献   

13.
The Internet of Things (IoT) concept is being widely presented as the next revolution toward massively distributed information, where any real-world object can automatically participate in the Internet and thus be globally discovered and queried. Despite the consensus on the great potential of the concept and the significant progress in a number of enabling technologies, there is a general lack of an integrated vision on how to realize it. This paper examines the technologies that will be fundamental for realizing the IoT and proposes an architecture that integrates them into a single platform. The architecture introduces the use of the Smart Object framework to encapsulate radio-frequency identification (RFID), sensor technologies, embedded object logic, object ad-hoc networking, and Internet-based information infrastructure. We evaluate the architecture against a number of energy-based performance measures, and also show that it outperforms existing industry standards in metrics such as network throughput, delivery ratio, or routing distance. Finally, we demonstrate the feasibility and flexibility of the architecture by detailing an implementation using Wireless Sensor Networks and Web Services, and describe a prototype for the real-time monitoring of goods flowing through a supply chain.  相似文献   

14.
This paper presents an overview of the potential obstacles and challenges related to research topics such as IoT, DfPL WSNs (Wireless Sensor Networks) in IoT and disaster management using WSNs. This review will analyse key aspects of deploying a DfPL WSN in IoT scenario for disaster management.In an IoT scenario the DfPL WSN is only collecting raw data that is forwarded to the Internet using a Compressed Sensing (CS) IoT framework or other solutions including data compression. Compressed Sensing (CS) refers to a method used to reduce the number of samples collected in an IoT WSN. Thus it is possible to create stand-alone applications that require fewer resources. There is no need to process the data in the WSN as this can be done in the Data Analysis Network, after the data is reconstructed. This will enable a reduced volume of data transmitted and lower power consumption for battery-operated nodes.The detection of people in a disaster scenario who are simply moving and not in the possession of a ‘tracking device’ is revolutionary. The aim here is to build upon our patent-pended technology in order to deliver a robust field-trial ready human detection system for disaster situations.  相似文献   

15.
给出以GIS分析为核心的公共气象服务网站框架。阐述GIS与多时空尺度气象要素间的相互关系,GIS在系统逻辑分层中的位置,一维、二维、三维分析图的网页功能。同时对GIS应用中所面对的一些关键技术进行了深入分析。如含权地理边界预剪裁气象要素插值算法、netCDF文件产生、二维和三维可视化技术等等。该套系统已经在中国天气网、四川气象网、成都公共气象服务网等网站中得到应用。  相似文献   

16.
This paper presents a comprehensive review of emerging technologies for the internet of things (IoT)-based smart agriculture. We begin by summarizing the existing surveys and describing emergent technologies for the agricultural IoT, such as unmanned aerial vehicles, wireless technologies, open-source IoT platforms, software defined networking (SDN), network function virtualization (NFV) technologies, cloud/fog computing, and middleware platforms. We also provide a classification of IoT applications for smart agriculture into seven categories: including smart monitoring, smart water management, agrochemicals applications, disease management, smart harvesting, supply chain management, and smart agricultural practices. Moreover, we provide a taxonomy and a side-by-side comparison of the state-of-the-art methods toward supply chain management based on the blockchain technology for agricultural IoTs. Furthermore, we present real projects that use most of the aforementioned technologies, which demonstrate their great performance in the field of smart agriculture. Finally, we highlight open research challenges and discuss possible future research directions for agricultural IoTs.   相似文献   

17.
Interconnection of the sensing and actuating devices providing the ability to share information across platform through a unified framework for enabling innovative applications. This is achieved by seamless ubiquitous sensing, data analytics and information representation as the unifying framework. Extending the current internet with interconnected objects and devices and their virtual representation has been a growing trend in recent years. Internet of Things (IoT) services are becoming a popular services. This will be supported challenges in a large of aspects such as smart health, green energy, smart home and personalized applications. So, the IoT plays more and more important issue in lifestyle through entertainment such as Games. As of yet, there has not been much research done on IoT environment games as a service. In this paper, we propose schemes of the design and implantation of IT convergence framework for games as a service of IoT. First of all, we discussed what to consider when design and implementation of IT convergence framework for games through contents using user’s mobile devices and various sensors in IoT environment and suggest related techniques. Then, we showed the possibility of games in the IoT environment by creating games and measuring the interactions of users in the IoT environment.  相似文献   

18.
随着物联网应用的发展和普及利用,针对物联网的攻击事件日益增多且危害严重。目前面对物联网安全问题主要采用被动补救的方式,缺乏对物联网安全的体系化思考和研究。本论文首先介绍物联网系统架构和各实体的发展,然后分析物联网面临的多层次安全威胁,包括各实体自身的安全威胁,也包括跨域的安全威胁。其中,实体自身安全威胁涉及到云平台、设备端、管道、云端交互。物联网跨域安全威胁包含4个方面:多域级联攻击、物理域的冲突与叠加、信息域对物理域进行非预期的控制、信息域对物理域输入的理解不全面。在此基础上,论文研究了基于PDRR网络安全体系的物联网安全模型,包含安全防护、安全检测、响应、恢复4个维度。安全防护包含认证、授权与访问控制、通信加密等技术,需要考虑物联网种类繁多,规模巨大,异构等特点进行设计与实施。安全检测需要对各实体进行入侵检测、在线安全监测、脆弱性检测以及恶意代码检测。其中,在线安全监测获取系统内部设备、应用程序的行为、状态、是否存在已知脆弱性等。脆弱性检测偏向于对未知脆弱性进行深度挖掘。在响应阶段,除了配合相关部门机关完成安全行动资源配置、态势感知等响应工作外,还需要进行入侵事件的分析与响应,漏洞与恶意代码的公告与修复,以及安全防护加固与检测规则的更新。在恢复阶段,需要对关键数据进行恢复,并对系统进行升级与恢复。最后论文进行总结并提出值得关注的研究方向。  相似文献   

19.
物联网环境下数据转发模型研究   总被引:4,自引:1,他引:3  
随着5G移动通信技术、软件定义网络、命名数据网、移动边缘计算或雾计算等新兴技术或方法的出现及深入研究,物联网应用得到进一步升华。在这种应用场景多样化、服务质量高要求、参与对象普及化的环境下,隶属物联网子范畴的传统无线传感器网络数据转发模型已经不能完全适应这种时代需求,更加适合物联网应用的数据转发模型成为物联网连续性服务保障的基础性问题及研究热点。本文首先对物联网架构及其应用环境下的数据转发关键问题进行了分析;其次,对目前有代表性的物联网数据转发相关研究成果进行分类总结;然后,选取不同物联网场景下典型的数据转发模型及其使用的数学方法进行评述、分析和对比;最后,指出目前研究中存在的问题及相应解决方案,并对未来的发展方向进行了展望。研究表明,5G等新兴技术的出现为物联网环境下数据转发模型研究带来了新的机遇和挑战,今后的工作重点是对物联网环境下数据转发的节能模型和方法进行攻关,为实际应用提供坚实的理论基础。  相似文献   

20.
从物联网在医疗行业中的应用现状着手,分析了现有的面向医疗行业物联网的概念,并从狭义和广义角度对其进行剖析。借鉴物联网的现有体系架构,针对面向医疗行业物联网的特点,分析了医疗物联网体系架构设计时应考虑的领域业务范畴和体系架构模型标准,并对面向医疗行业物联网的关键技术进行归纳,分析其在医疗领域应用的场合,最后指出未来智慧医疗的发展方向。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号