دانلود و نمایش مقالات مرتبط با اینترنت اشیاء::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - اینترنت اشیاء

تعداد مقالات یافته شده: 460
ردیف عنوان نوع
1 Is the Internet of Things a helpful employee? An exploratory study of discourses of Canadian farmers
آیا اینترنت اشیا یک کارمند مفید است؟ بررسی اکتشافی گفتمان های کشاورزان کانادایی-2022
The increasing global population and the growing demand for high-quality products have called for the modernization of agriculture. “Internet of Things” is one of the technologies that is pre- dicted to offer many solutions. We conducted a discourse analysis of 19 interviews with farmers in Ontario, Canada, asking them to describe their experience of working with IoT and related technologies. One main discourse with two opposing tendencies was identified: farmers recognize their relationship with IoT and related technology and view technology as a kind of “employee”, but some tend to emphasize (1) an optimistic view which is discourse of technology is a “Helpful Employee”; while others tend to emphasize (2) a pessimistic view which is a discourse of tech- nology is an “Untrustworthy Employee”. We examine these tendencies in the light of the literature on organizational behavior and identify potential outcomes of these beliefs. The results suggest that a farmer’s style of approaching technology can be assessed on a similar scale as managers’ view of their employees and provide a framework for further research.
keywords: فناوری اینترنت اشیا | کشاورزی | تحلیل گفتمان | سبک استفاده از تکنولوژی | Internet of things technology | Agriculture | Discourse analysis | Style of use of technology
مقاله انگلیسی
2 The “Cyber Security via Determinism” Paradigm for a Quantum Safe Zero Trust Deterministic Internet of Things (IoT)
پارادایم «امنیت سایبری از طریق جبرگرایی» برای اینترنت اشیا قطعی (IoT) ایمن صفر کوانتومی-2022
The next-generation Internet of Things (IoT) will control the critical infrastructure of the 21st century, including the Smart Power Grid and Smart Cities. It will also support Deterministic Communications, where ‘deterministic traffic flows’ (D-flows) receive strict Quality-of-Service (QoS) guarantees. A ‘Cybersecurity via Determinism’ paradigm for the next-generation ‘Industrial and Tactile Deterministic IoT’ is presented. A forwarding sub-layer of simple and secure ‘deterministic packet switches’ (D-switches) is introduced into layer-3. This sub-layer supports many deterministic Software Defined Wide Area Networks (SD-WANs), along with 3 new tools for improving cyber security: Access Control, Rate Control, and Isolation Control. A Software Defined Networking (SDN) control-plane configures each D-switch (ie FPGA) with multiple deterministic schedules to support D-flows. The SDN control-plane can embed millions of isolated Deterministic Virtual Private Networks (DVPNs) into layer 3. This paradigm offers several benefits: 1) All congestion, interference, and Distributed Denial-of-Service (DDOS) attacks are removed; 2) Buffer sizes in D-switches are reduced by 1000C times; 3) End-to-end IoT delays can be reduced to ultra-low latencies, i.e., the speed-of-light in fiber; 4) The D-switches do not require Gigabytes of memory to store large IP routing tables; 5) Hardware support is provided in layer 3 for the US NIST Zero Trust Architecture; 6) Packets within a DVPN can be entirely encrypted using Quantum Safe encryption, which is impervious to attacks by Quantum Computers using existing quantum algorithms; 7) The probability of an undetected cyberattack targeting a DVPN can be made arbitrarily small by using long Quantum Safe encryption keys; and 8) Savings can reach $10s of Billions per year, through reduced capital, energy and operational costs.
INDEX TERMS: Cyber security | deterministic, the Internet of Things (IoT) | quantum computing, zero trust | encryption | privacy | Software Defined Networking (SDN) | industrial internet of things (IIoT) | tactile Internet of Things | FPGA | Industry 4.0 | deterministic Internet of Things.
مقاله انگلیسی
3 LoRaWAN-Based IoT System Implementation for Long-Range Outdoor Air Quality Monitoring
پیاده سازی سیستم اینترنت اشیاء مبتنی بر LoRaWAN برای نظارت بر کیفیت هوای خارج از منزل در محدوده بلند-2022
This study proposes a smart long-range (LoRa) sensing node to timely collect the air quality in- formation and update it on the cloud. The developed long-range wide area network (LoRaWAN)- based Internet of Things (IoT) air quality monitoring system (AQMS), hereafter called LoRaWAN- IoT-AQMS, was deployed in an outdoor environment to validate its reliability and effectiveness. The system is composed of multiple sensors (NO2, SO2, CO2, CO, PM2.5, temperature, and hu- midity), Arduino microcontroller, LoRa shield, LoRaWAN gateway, and The Thing Network (TTN) IoT platform. The LoRaWAN-IoT-AQMS is a standalone system powered continuously by a rechargeable battery with a photovoltaic solar panel via a solar charger shield for sustainable operation. Our system simultaneously gathers the considered air quality information by using the smart sensing unit. Then, the system transmits the information through the gateway to the TTN platform, which is integrated with the ThingSpeak IoT server. This action updates the collected data and displays these data on a developed Web-based dashboard and a Graphical User Interface (GUI) that uses the Virtuino mobile application. Thus, the displayed information can be easily accessed by users via their smartphones. The results obtained by the developed LoRaWAN-IoT- AQMS are validated by comparing them with experimental results based on the high- technology Aeroqual air quality monitoring devices. Our system can reliably monitor various air quality indicators and efficiently transmit the information in real time over the Internet.
keywords: پایش کیفیت هوا | Air quality monitoring | Iot lora lorawan | TTN ThingSpeak Virtuino
مقاله انگلیسی
4 Reassessing caching performance in information-centric IoT
ارزیابی مجدد عملکرد حافظه پنهان در اینترنت اشیاء اطلاعات محور-2022
The performance of in-network caches has traditionally been evaluated using well-understood metrics such as the cache hit rate. This extends to the field of Information-Centric Networking (ICN), where caching strategies are evaluated in the same way. In this paper, we argue that in the subdomain of information-centric Internet of Things (IoT), these traditional metrics are not sufficient to describe caching performance. Using a series of experiments on real hardware as a demonstration, we show the shortcomings of the cache hit rate metric and introduce the two new metrics cache access factor and cache latency factor that provide deeper insights into the effectiveness of in-network caching strategies.
Keywords: Information-Centric Networking | Named Data Networking | Internet of Things | In-network caching | Network topology
مقاله انگلیسی
5 The big picture on the internet of things and the smart city: a review of what we know and what we need to know
تصویر بزرگ در اینترنت اشیا و شهر هوشمند: مروری بر آنچه می‌دانیم و آنچه باید بدانیم-2022
This study examines how the application of the IoT in smart cities is discussed in the current academic literature. Based on bibliometric techniques, 1,802 articles were retrieved from the Scopus database and analyzed to identify the temporal nature of IoT research, the most relevant journals, authors, countries, keywords, and studies. The software tool VOSviewer was used to build the keyword co-occurrence network and to cluster the pertinent literature. Results show the significant growth of IoT research in recent years. The most productive authors, journals, and countries were also identified. The main findings from the keyword co-occurrence clustering and an in-depth qualitative analysis indicate that the IoT is used alongside other technologies including cloud computing, big data analytics, blockchain, artificial intelligence, and wireless telecommunication networks. The major applications of the IoT for smart cities include smart buildings, transportation, healthcare, smart parking, and smart grids. This review is one of the first attempts to map global IoT research in a smart city context and uses a comprehensive set of articles and bibliometric techniques to provide scholars and practitioners with an overview of what has been studied so far and to identify research gaps at the intersection of the IoT and the smart city.
keywords: اینترنت اشیا | شهر هوشمند | مرور | کتاب سنجی | Internet of things | Smart city | Review | Bibliometrics
مقاله انگلیسی
6 A framework for intelligent IoT firmware compliance testing
چارچوبی برای تست سازگاری سیستم عامل اینترنت اشیاء هوشمند-2022
The recent mass production and usage of the Internet of Things (IoT) have posed serious concerns due to the unavoidable security complications. The firmware of IoT systems is a critical component of IoT security. Although multiple organizations have released security guidelines, few IoT vendors are following these guidelines properly, either due to a lack of accountability or the availability of appropriate resources. Some tools for this purpose can use static, dynamic, or fuzzing techniques to test the security of IoT firmware, which may result in false positives or failure to discover vulnerabilities. Furthermore, the vast majority of resources are devoted to a single subject, such as networking protocols, web interfaces, or Internet of Things computer applications. This paper aims to present a novel method for conducting compliance testing and vulnerability evaluation on IoT system firmware, communication interfaces, and networking services using static and dynamic analysis. The proposed system detects a broad range of security bugs across a wide range of platforms and hardware architectures. To test and validate our prototype, we ran tests on 4300 firmware images and discovered 13,000þ compliance issues. This work, we believe, will be the first step toward developing a reliable automated compliance testing framework for the IoT manufacturing industry and other stakeholders.
keywords: اینترنت اشیا | امنیت اینترنت اشیا | تست انطباق | آسیب پذیری های میان افزار | IoT | IoT security | Compliance testing | Firmware vulnerabilities
مقاله انگلیسی
7 A survey of blockchain-based IoT eHealthcare: Applications, research issues, and challenges
بررسی مراقبت های بهداشتی الکترونیک اینترنت اشیاء مبتنی بر بلاک چین: برنامه های کاربردی، مسائل تحقیقاتی و چالش ها-2022
Blockchain (BC) technology has recently emerged as an essential component for different applications, including healthcare and IoT, because of its decentralized ledger, source provenance, and tamper-proof nature. The Internet of Things (IoT) and BC have enabled health systems to expand their scalability and maintain consistency on a decentralized platform. As a result, many researchers have developed BC-enabled IoT eHealth systems and explored the application of BC technology in diverse fields of eHealthcare. This paper conducts a comprehensive survey on the emerging applications of BC technology in healthcare. We summarize applications, research issues, security threats, research challenges, opportunities, and the future scope of BC technologies in the IoT-enabled healthcare system when BC is adopted to handle the privacy and storage of current and future medical records. Furthermore, we analyze the state-of-the-art BC works in the medical area, assessing their benefits-drawbacks, and guiding future researchers to overcome the limitations of the existing articles.
Keywords: Blockchain | IoT | Healthcare | EHR challenge | Medical area
مقاله انگلیسی
8 A survey on security in internet of things with a focus on the impact of emerging technologies
بررسی امنیت در اینترنت اشیا با تمرکز بر تاثیر فناوری های نوظهور-2022
Internet of Things (IoT) have opened the door to a world of unlimited possibilities for imple- mentations in varied sectors in society, but it also has many challenges. One of those challenges is security and privacy. IoT devices are more susceptible to security threats and attacks. Due to constraints of the IoT devices such as area, power, memory, etc., there is a lack of security so- lutions that are compatible with IoT devices and applications, which is leading this world of securely connected things to the “internet of insecure things.” A promising solution to this problem is going beyond the standard or classical techniques to implementing the security so- lutions in the hardware of the IoT device. The integration of emerging technologies in IoT net- works, such as machine learning, blockchain, fog/edge/cloud computing, and quantum computing have added more vulnerable points in the network. This paper introduces a comprehensive study on IoT security threats and solutions. Additionally, this survey outlines how emerging technologies such as machine learning and blockchain are integrated in IoT, challenges resulted from this integration, and potential solutions to these challenges. The paper utilizes the 4-layer IoT architecture as a reference to identify security issues with corresponding solutions.
keywords: اینترنت اشیا | امنیت | فراگیری ماشین | بلاک چین | تهدیدها | راه حل های امنیتی | IoT | Security | Machine learning | Blockchain | Threats | Security solutions
مقاله انگلیسی
9 Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations
پزشکی قانونی دیجیتال پیشرفته و پزشکی قانونی ضد دیجیتال برای سیستم های اینترنت اشیا: تکنیک ها، محدودیت ها و توصیه ها-2022
Recently, the number of cyber attacks against IoT domains has increased tremendously. This resulted into both human and financial losses at all IoT levels especially individual and organization levels. Recently, cyber-criminals have kept on leveraging new skills and capabilities by conducting anti-forensics activities and employing techniques and tools to cover their tracks to evade any possible detection of the attack’s events, which has targeted either the IoT system or/and its component(s). Consequently, IoT cyber-attacks are becoming more efficient and more sophisticated with higher risks and threat levels based on their more frequent likelihood to occur and their impact. However, traditional security and forensics solutions are no longer enough to prevent nor investigate such cyber attacks, especially in terms of acquiring evidence for attack investigation. Hence, the need for well-defined, sophisticated, and advanced forensics investigation techniques is highly required to prevent anti-forensics techniques and track down cyber criminals. This paper reviews the different forensics and anti-forensics methods that can be applied in the IoT domain including tools, techniques, types, and challenges, while also discussing the rise of the anti-anti-forensics as a new forensics protection mechanism against anti-forensics activities. This would help forensics investigators to better understand the different anti-forensics tools, methods and techniques that cyber criminals employ while launching their attacks. Moreover, the limitations of the current forensics techniques are discussed, especially in terms of issues and challenges. Finally, this paper presents a holistic view from a literature point of view over the forensics domain in general and for IoT in particular.
Keywords: IoT digital-forensics | IoT anti-forensics | Anti-anti-forensics techniques | Counter anti-forensics | Internet of things forensics | Internet of Forensics Things | IoT digital forensics investigation | IoT source of evidences | Protecting and preserving IoT evidences
مقاله انگلیسی
10 Autoencoder based Consensus Mechanism for Blockchain-enabled Industrial Internet of Things
مکانیزم اجماع مبتنی بر رمزگذار خودکار برای اینترنت اشیاء صنعتی دارای بلاک چین-2022
Conventional blockchain technologies developed for cryptocurrency applications involve complex consensus algorithms which are not suitable for resource constrained Internet of Things (IoT) devices. Therefore, several lightweight consensus mechanisms that are suitable for IoT devices have been proposed in recent studies. However, these lightweight consensus mechanisms do not verify the originality of the data generated by the IoT devices, so false and anomalous data may pass through and be stored in the ledger for further analysis. In this work to address the data originality verification problem, we propose an autoencoder (AE)-integrated Chaincode (CC)-based consensus mechanism in which the AE differentiates normal data from anomalous data. The AE is invoked through the CC once a transaction is initiated; the result returned from the AE to the CC is stored in the ledger. We have conducted a case study to train and test the AE model on the IoTID20 dataset. Also, Minifabric (MF) is used to implement the CC and illustrate the CC operation that stores only original IoT data. Moreover, the performance has been shown for the CC in terms of latency and throughput.
keywords: IoT | Autoencoder | Blockchain | Hyperledger | Security
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 11036 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 11036 :::::::: افراد آنلاین: 63