物联网外文文献翻译
物联网工程中英文对照外文翻译文献

中英文对照外文翻译(文档含英文原文和中文翻译)Android: A Programmer’s Guide1 What Is Android1.1 Key Skills & Concepts● History of embedded device programming● Explanation of Open Handset Alliance● First look at the Android home screenIt can be said that, for a while, traditional desktop application developers have been spoiled. This is not to say that traditional desktop application development is easier than other forms of develop ment. However, as traditional desktop application developers, we have had the ability to create alm ost any kind of application we can imagine. I am including myself in this grouping because I got my start in desktop programming.One aspect that has made desktop programming more accessible is that we have had the ability to interact with the desktop operating system, and thus interact with any underlying hardware, pretty1freely (or at least with minimal exceptions). This kind of freedom to program independently, how ever, has never really been available to the small group of programmers who dared to venture int o the murky waters of cell phone development.NOTE :I refer to two different kinds of developers in this discussion: traditional desktop applicati on developers, who work in almost any language and whose end product, applications, are built to run on any “desktop” operating system; and Android developers, J ava developers who develop for the Android platform. This is not for the purposes of saying one is by any means better or wors e than the other. Rather, the distinction is made for purposes of comparing the development styles and tools of desktop operating system environments to the mobile operating system environment1.2 Brief History of Embedded Device ProgrammingFor a long time, cell phone developers comprised a small sect of a slightly larger group of developers known as embedded device developers. Seen as a less “glamorous” sibling to desktop—and later web—development, embedded device development typically got the proverbial short end of the stick as far as hardware and operating system features, because embedded device manufacturers were notoriously stingy on feature support.Embedded device manufacturers typically needed to guard their hardware secrets closely, so they gave embedded device developers few libraries to call when trying to interact with a specific device. Embedded devices differ fro m desktops in that an embedded device is typically a “computer on a chip.” For example, consider your standard television remote control; it is not really seen as an overwhelming achievement of technological complexity. When any button is pressed, a chip interprets the signal in a way that has been programmed into the device. This allows the device to know what to expect from the input device (key pad), and how to respond to those commands (for example, turn on the television). This is a simple form of embedded device programming. However, believe it or not, simple devices such as these are definitely related to the roots of early cell phone devices and development.Most embedded devices ran (and in some cases still run) proprietary operating systems. The reason for choosing to create a proprietary operating system rather than use any consumer system was really a product of necessity. Simple devices did not need very robust and optimized operating systems.As a product of device evolution, many of the more complex embedded devices, such as early PDAs, household security systems, and GPSs, moved to somewhat standardized operating system platforms about five years ago. Small-footprint operating systems such as Linux, or even an embedded version of Microsoft Windows, have become more prevalent on many embedded devices. Around this time in device evolution, cell phones branched from other embedded devices onto their own path. This branching is evident whenyou examine their architecture.Nearly since their inception, cell phones have been fringe devices insofar as they run on proprietary software—software that is owned and controlled by the manufacturer, and is almost always considered to be a “closed” system. The practice of manufacturers using proprietary operating systems began more out of necessity than any other reason. That is, cell phone manufacturers typically used hardware that was completely developed in-house, or at least hardware that was specifically developed for the purposes of running cell phone equipment. As a result, there were no openly available, off-the-shelf software packages or solutions that would reliably interact with their hardware. Since the manufacturers also wanted to guard very closely their hardware trade secrets, some of which could be revealed by allowing access to the software level of the device, the common practice was, and in most cases still is, to use completely proprietary and closed software to run their devices. The downside to this is that anyone who wanted to develop applications for cell phones needed to have intimate knowledge of the proprietary environment within which it was to run. The solution was to purchase expensive development tools directly from the manufacturer. This isolated many of the “homebrew” develo pers.NOTE:A growing culture of homebrew developers has embraced cell phone application development. The term “homebrew” refers to the fact that these developers typically do not work for a cell phone development company and generally produce small, one-off products on their own time.Another, more compelling “necessity” that kept cell phone development out of the hands of theeveryday developer was the hardware manufacturers’ solution to the “memory versus need” dilemma. Until recently, cell phones did little more than execute and receive phone calls, track your contacts, and possiblysend and receive short text messages; not really the “Swiss army knives” of technology they are today.Even as late as 2002, cell phones with cameras were not commonly found in the hands of consumers.By 1997, small applications such as calculators and games (Tetris, for example) crept their way ontocell phones, but the overwhelming function was still that of a phone dialer itself. Cell phones had not yetbecome the multiuse, multifunction personal tools they are today. No one yet saw the need for Internetbrowsing, MP3 playing, or any of the multitudes of functions we are accustomed to using today. It ispossible that the cell phone manufacturers of 1997 did not fully perceive the need consumers would havefor an all-in-one device. However, even if the need was present, a lack of device memory and storagecapacity was an even bigger obstacle to overcome. More people may have wanted their devices to be all-in-one tools, but manufacturers still had to climb the memory hurdle.To put the problem simply, it takes memory to store and run applications on any device, cell phones included. Cell phones, as a device, until recently did not have the amount of memory available to them thatwould facilitate the inclusion of “extra” programs. Within the last two years, the price of memory hasreached very low levels. Device manufacturers now have the ability to include more memory at lowerprices. Many cell phones now have more standard memory than the average PC had in the mid-1990s. So,now that we have the need, and the memory, we can all jump in and develop cool applications for cellphones around the world, right? Not exactly.Device manufacturers still closely guard the operating systems that run on their devices. While a fewhave opened up to the point where they will allow some Java-based applications to run within a smallenvironment on the phone, many do not allow this. Even the systems that do allow some Java apps to rundo not allow the kind of access to the “core” system that standard desktop developers are accustomed to having.1.3 Open Handset Alliance and AndroidThis barrier to application development began to crumble in November of 2007 when Google, under theOpen Handset Alliance, released Android. The Open Handset Alliance is a group of hardware and softwaredevelopers, including Google, NTT DoCoMo, Sprint Nextel, and HTC, whose goal is to create a more opencell phone environment. The first product to be released under the alliance is the mobile device operatingsystem, Android.With the release of Android, Google made available a host of development tools and tutorials to aid would-be developers onto the new system. Help files, the platform software development kit (SDK), and even a developers’ community can be found at Google’s Android website, This site should be your starting point, and I highly encourage you to visit the site.NOTE :Google, in promoting the new Android operating system, even went as far as to create a $10million contest looking for new and exciting Android applications.While cell phones running Linux, Windows, and even PalmOS are easy to find, as of this writing, nohardware platforms have been announced for Android to run on. HTC, LG Electronics, Motorola, andSamsung are members of the Open Handset Alliance, under which Android has been released, so we canonly hope that they have plans for a few Android-based devices in the near future. With its release inNovember 2007, the system itself is still in a software-only beta. This is good news for developers because it gives us a rare advance look at a future system and a chance to begin developing applications that willrun as soon as the hardware is released.NOTE:This strategy clearly gives the Open Handset Alliance a big advantage over other cell phone operating system developers, because there could be an uncountable number of applications available immediately for the first devices released to run Android.Introduction to AndroidAndroid, as a system, is a Java-based operating system that runs on the Linux 2.6 kernel. The system is very lightweight and full featured. Android applications are developed using Java and can be ported rather easily to the new platform. If you have not yet downloaded Java or are unsure about which version you need, I detail the installation of the development environment in Chapter 2. Other features of Android include an accelerated 3-D graphics engine (based on hardware support), database support powered by SQLite, and an integrated web browser.If you are familiar with Java programming or are an OOP developer of any sort, you are likely used to programmatic user interface (UI) development—that is, UI placement which is handled directly within the program code. Android, while recognizing and allowing for programmatic UI development, also supports the newer, XML-based UI layout. XML UI layout is a fairly new concept to the average desktop developer. I will cover both the XML UI layout and the programmatic UI development in the supporting chapters of this book.One of the more exciting and compelling features of Android is that, because of its architecture, third-partyapplications—including those that are “home grown”—are executed with the same system priority as those that are bundled with the core system. This is a major departure from most systems, which give embeddedsystem apps a greater execution priority than the thread priority available to apps created by third-partydevelopers. Also, each application is executed within its own thread using a very lightweight virtualmachine.Aside from the very generous SDK and the well-formed libraries that are available to us to develop with,the most exciting feature for Android developers is that we now have access to anything the operatingsystem has access to. In other words, if you want to create an application that dials the phone, you haveaccess to the phone’s dialer; if you want to create an application that utilizes the phone’s internal GPS (ifequipped), you have access to it. The potential for developers to create dynamic and intriguing applicationsis now wide open.On top of all the features that are available from the Android side of the equation, Google has thrown insome very tantalizing features of its own. Developers of Android applications will be able to tie their applications into existing Google offerings such as Google Maps and the omnipresent Google Search.Suppose you want to write an application that pulls up a Google map of where an incoming call isemanating from, or you want to be able to store common search results with your contacts; the doors ofpossibility have been flung wide open with Android.Chapter 2 begins your journey to Android development. You will learn the how’s and why’s of usingspecific development environments or integrated development environments (IDE), and you will downloadand install the Java IDE Eclipse.2 Application: Hello World2.1 Key Skills & Concepts● Creating new Android projects● Working with Views● Using a TextView● Modifying the main.xml file● Running applications on the Android EmulatorIn this chapter, you will be creating your first Android Activity. This chapter examines theapplication-building process from start to finish. I will show you how to create an Android project inEclipse, add code to the initial files, and run the finished application in the Android Emulator. The resultingapplication will be a fully functioning program running in an Android environment.Actually, as you move through this chapter, you will be creating more than one Android Activity.Computer programming tradition dictates that your first application be the typical Hello World! application,so in the first section you will create a standard Hello World! application with just a blank background andthe “Hello World!” text. Then, for the sake of enabling you to get to know the language better, the next section explains in detail the files automatically created by Android for your Hello World! application. You will create two iterations of this Activity, each using different techniques for displaying information to the screen. You will also create two different versions of a Hello World! application that will display an image that delivers the “Hello World!” message. This will give you a good introduction to the controls and inner workings of Android.NOTE:You will often see “application” and “Activity” used interchangeably. The difference between the two is that an application can be composed of multiple Activities, but one application must have at leastone Activity. Each “window” or screen of your application is a separate Activity. Therefore, if you create a fairly simple application with only one screen of data (like the Hello World! application in this chapter),that will be one Activity. In future chapters you will create applications with multiple Activities.To make sure that you get a good overall look at programming in Android, in Chapter 6 you will createboth of these applications in the Android SDK command-line environment for Microsoft Windows andLinux. In other words, this chapter covers the creation process in Eclipse, and Chapter 6 covers the creationprocess using the command-line tools. Therefore, before continuing, you should check that your Eclipseenvironment is correctly configured. Review the steps in Chapter 3 for setting the PATH statement for theAndroid SDK. You should also ensure that the JRE is correctly in your PATH statement.TIP:If you have configuration-related issues while attempting to work with any of the command-lineexamples, try referring to the configuration steps in Chapters 2 and 3; and look at the Android SDK documentation.2.2 Creating Your First Android Project in EclipseTo start your first Android project, open Eclipse. When you open Eclipse for the first time, it opens toan empty development environment (see Figure 5-1), which is where you want to begin. Your first task isto set up and name the workspace for your application. Choose File | New | Android Project, which willlaunch the New Android Project wizard.CAUTION Do not select Java Project from the New menu. While Android applications are written in Java, and you are doing all of your development in Java projects, this option will create a standard Java application. Selecting Android Project enables you to create Android-specific applications.If you do not see the option for Android Project, this indicates that the Android plugin for Eclipse was not fully or correctly installed. Review the procedure in Chapter 3 for installing the Android plugin for Eclipse to correct this.2.3 The New Android Project wizard creates two things for youA shell application that ties into the Android SDK, using the android.jar file, and ties the project intothe Android Emulator. This allows you to code using all of the Android libraries and packages, and alsolets you debug your applications in the proper environment.Your first shell files for the new project. These shell files contain some of the vital application blocksupon which you will be building your programs. In much the same way as creating a Microsoft .NETapplication in Visual Studio generates some Windows-created program code in your files, using the Android Project wizard in Eclipse generates your initial program files and some Android-created code. Inaddition, the New Android Project wizard contains a few options, shown next, that you must set to initiate your Android project. For the Project Name field, for purposes of this example, use the titleHelloWorldText. This name sufficiently distinguishes this Hello World! project from the others that youwill be creating in this chapter.In the Contents area, keep the default selections: the Create New Project inWorkspace radio button should be selected and the Use Default Location check box should be checked.This will allow Eclipse to create your project in your default workspace directory. The advantage ofkeeping the default options is that your projects are kept in a central location, which makes ordering,managing, and finding these projects quite easy. For example, if you are working in a Unix-basedenvironment, this path points to your $HOME directory.If you are working in a Microsoft Windows environment, the workspace path will beC:/Users/<username>/workspace, as shown in the previous illustration. However, for any number of reasons, you may want to uncheck the Use Default Location check box and select a different location for your project. One reason you may want to specify a different location here is simply if you want to choose a location for this specific project that is separate from other Android projects. For example, you may want to keep the projects that you create in this book in a different location from projects that you create in the future on your own. If so, simply override the Location option to specify your own custom location directory for this project.3 Application FundamentalsAndroid applications are written in the Java programming language. The compiled Java code — along with any data and resource files required by the application — is bundled by the aapt tool into an Androidpackage, an archive file marked by an .apk suffix. This file is the vehicle for distributing the application and installing it on mobile devices; it's the file users download to their devices. All the code in a single .apk file is considered to be one application.In many ways, each Android application lives in its own world:1. By default, every application runs in its own Linux process. Android starts the process when any of the application's code needs to be executed, and shuts down the process when it's no longer needed and system resources are required by other applications.2. Each process has its own virtual machine (VM), so application code runs in isolation from the code of all other applications.3. By default, each application is assigned a unique Linux user ID. Permissions are set so that the application's files are visible only to that user and only to the application itself — although there are ways to export them to other applications as well.It's possible to arrange for two applications to share the same user ID, in which case they will be able to see each other's files. To conserve system resources, applications with the same ID can also arrange to run in the same Linux process, sharing the same VM.3.1 Application ComponentsA central feature of Android is that one application can make use of elements of other applications (provided those applications permit it). For example, if your application needs to display a scrolling list of images and another application has developed a suitable scroller and made it available to others, you can call upon that scroller to do the work, rather than develop your own. Application have four types of components:(1)ActivitiesAn activity presents a visual user interface for one focused endeavor the user can undertake. For example, an activity might present a list of menu items users can choose from or it might display photographs along with their captions. A text messaging application might have one activity that shows a list of contacts to send messages to, a second activity to write the message to the chosen contact, and other activities to review old messages or change settings. Though they work together to form a cohesive user interface, each activity is independent of the others. Each one is implemented as a subclass of the Activity base class.An application might consist of just one activity or, like the text messaging application just mentioned, it may contain several. What the activities are, and how many there are depends, of course, on the application and its design. Typically, one of the activities is marked as the first one that should be presented to the user when the application is launched. Moving from one activity to another is accomplished by having the current activity start the next one.Each activity is given a default window to draw in. Typically, the window fills the screen, but it might be smaller than the screen and float on top of other windows. An activity can also make use of additional windows —— for example, a pop-up dialog that calls for a user response in the midst of the activity, or a windowswindow that presents users with vital information when they select a particular item on-screen.The visual content of the window is provided by a hierarchy of views — objects derived from the base View class. Each view controls a particular rectangular space within the window. Parent views contain and organize the layout of their children. Leaf views (those at the bottom of the hierarchy) draw in the rectangles they control and respond to user actions directed at that space. Thus, views are where the activity's interaction with the user takes place.For example, a view might display a small image and initiate an action when the user taps that image. Android has a number of ready-made views that you can use — including buttons, text fields, scroll bars, menu items, check boxes, and more.A view hierarchy is placed within an activity's window by the Activity.setContentView() method. The content view is the View object at the root of the hierarchy. (See the separate User Interface document for more information on views and the hierarchy.)(2)ServicesA service doesn't have a visual user interface, but rather runs in the background for an indefinite period of time. For example, a service might play background music as the user attends to other matters, or it might fetch data over the network or calculate something and provide the result to activities that need it. Each service extends the Service base class.A prime example is a media player playing songs from a play list. The player application would probably have one or more activities that allow the user to choose songs and start playing them. However, the musicplayback itself would not be handled by an activity because users will expect the music to keep playing even after they leave the player and begin something different. To keep the music going, the media player activity could start a service to run in the background. The system would then keep the music playback service running even after the activity that started it leaves the screen.It's possible to connect to (bind to) an ongoing service (and start the service if it's not already running). While connected, you can communicate with the service through an interface that the service exposes. For the music service, this interface might allow users to pause, rewind, stop, and restart the playback.Like activities and the other components, services run in the main thread of the application process. So that they won't block other components or the user interface, they often spawn another thread for time-consuming tasks (like music playback). See Processes and Threads, later.(3)Broadcast receiversA broadcast receiver is a component that does nothing but receive and react to broadcast announcements. Many broadcasts originate in system code — for example, announcements that the timezone has changed, that the battery is low, that a picture has been taken, or that the user changed a language preference. Applications can also initiate broadcasts — for example, to let other applications know that some data has been downloaded to the device and is available for them to use.An application can have any number of broadcast receivers to respond to any announcements it considers important. All receivers extend the BroadcastReceiver base class.Broadcast receivers do not display a user interface. However, they may start an activity in response to the information they receive, or they may use the NotificationManager to alert the user. Notifications can get the user's attention in various ways —— flashing the backlight, vibrating the device, playing a sound, and so the user's attention in various wayson. They typically place a persistent icon in the status bar, which users can open to get the message.(4)Content providersA content provider makes a specific set of the application's data available to other applications. The data can be stored in the file system, in an SQLite database, or in any other manner that makes sense. The content provider extends the ContentProvider base class to implement a standard set of methods that enable other applications to retrieve and store data of the type it controls. However, applications do not call these methods directly. Rather they use a ContentResolver object and call its methods instead. A ContentResolver can talk to any content provider; it cooperates with the provider to manage any interprocess communication that's involved.See the separate Content Providers document for more information on using content providers. Whenever there's a request that should be handled by a particular component, Android makes sure that the application process of the component is running, starting it if necessary, and that an appropriate instance of the component is available, creating the instance if necessary.3.2 Activating components: intentsContent providers are activated when they're targeted by a request from a ContentResolver. The other three components — activities, services, and broadcast receivers — are activated by asynchronous messages called intents. An intent is an Intent object that holds the content of the message. For activities and services, it names the action being requested and specifies the URI of the data to act on, among other things. For example, it might convey a request for an activity to present an image to the user or let the user edit some text. For broadcast receivers, theIntent object names the action being announced. For example, it might announce to interested parties that the camera button has been pressed.。
物联网安全问题的研究外文文献翻译

物联网安全问题的研究外文文献翻译毕业设计(论文)外文文献翻译院系:年级专业:姓名:学号:附件:指导老师评语:指导教师签名:年月日备注:1.从所引用的与毕业设计(论文)内容相近的外文文献中选择一篇或一部分进行翻译(不少于3000实词);2.外文文献翻译的装订分两部分,第一部分为外文文献;第二部分为该外文文献的中文翻译;3.外文文献正文按毕业设计(论文)格式排版,两部分内容不能联排,用分页符分页。
The Internet of thingsThe Internet of things the Internet of things the Internet of things more and more modules and sensors embedded system to enhance theirability of communication. The resulting information networks will create new business models, improve business processes, risk and reduce costs Michael cui, marcus method, and Roger RobertsIn most organizations, the information spread along the familiar path. Proprietary information is placed in the database and make a analysis in the report and then start the management chain. Information collected from public sources, Internet information collection and information from suppliers to buy.But the forecast information is changing the way: the physical world itself is becoming a kind of information system. In so-called iot, sensors, and micro devices (actuators) is embedded in the physical module from highway to heart pacemakers is through wired or wireless network connections, is often connected to the Internet using the same Internet protocol. The network transmission of data is used for computer analysis. If some modules can sense the environment and can be used for information exchange, so they can become and rapid response to solve the problem of complicated tools. The information revolution in the field of the physical information system is developing continuously, and even some will also be able to work under a single intervention.Pill shape photomicrographic device has successfully through the human digestive tract, and back to the thousands of images to pinpoint the source of the disease. Composed of satellite and ground sensor data acquisition system through the wireless device can detect crop status and connected to the precision agriculture can adjust method for everypart of the farming land. For example, by spreading more chemical fertilizers to increase poor soil fertile. Billboards in Japan, waiting for pedestrians pass by, and can assess the consumption of passers-by, and then according to the evaluation results show that the different advertising information.Yes, in many companies, or even earlier today has been warned many predict the future. With the emergence of new value creation method, the current business model is largely based on static information structure is faced with challenges. If in a specific location to a specific time you will be able to experience the mind of the buyer, then the dynamic pricing may increase the possibility of buying. Know how often, and a deep understanding of the usage of the product might get more harvest, choose addfee instead of direct selling. There are a lot of people responsible for the control of manufacturing process to get a more accurate, and can improve the production efficiency. There are such as the operating system are constantly monitored to prevent the emergence of dangerous or people can take corrective measures to avoid the occurrence of damage, risk, and to reduce the cost. Make the fullest use of these functions of the company will gain more profit than the competitor.The wide application of Internet of things is need time, but thanks to its development technology, got advance time line. Wireless technology and the further standardization of communication protocol makes it possible to collect information from the sensor at any time.Based on this, a small silicon chip is endowed with new functions, and at the same time, based on the pattern of Moore's law, its cost is falling. These largely increase the storage capacity of computer and computing power, some of the digital operation scope has expanded through the cloud computing, and reduces the cost.The Internet of things in the workIot for those technologies and not walk in the forefront of company is the news. But as these technologies mature, the enterprise deployment scope will increase. Now is the manager ofall industries to build ideas, consider the contact from theInternet of things or get potential of the development of The Times. We now know that there are six different types of emerging applications, most of which belong to the following two categories: the first, second, information and analysis, automation and control.Information and analysisDue to network increased with the product, the company's assets or data management environment of the link, they will produce better information and analysis, it is important to improve decision making. Some organizations have begun to use these application deployment in the target region, and more advanced and thirst for application is still in concept or test phase. 1, tracking, behaviorSensors embedded in the product, the enterprise can track the movements of these products, even interaction and monitoring them. Business models can be slightly adjusted to take advantage of thisscience. For example, some insurance companies to provide the carposition sensor installation. That how the insurance company may, according to the car was driven to determine the amount and where is the travel situation. Insurance can be customized to operating the vehicle's actual risk, not based on if the driver's age, gender,or places to live in such a situation.Or consider install the sensor and the network connection to thetaxi will happen: it can be used for a short period of time for the car rental service member, so you no longer need to rental service center, and each car's use can also be optimized for higher revenues. Zipcar company pioneered the use of this model, and a growing number of car rental companies are also beginning to follow suit. In retail, used to display shopping data of sensors can provide more detailed informationor provide discount information, make shopping easier. Leaders such as tesco supermarket in the forefront of the use of this technology.The English name for The Internet of Things The Internet of Things, hereinafter referred to as: The IOT. The Internet of things through the transmission device, radio frequency identification technology, such as global positioning system (GPS) technology, no need to monitor real-time acquisition, connected, interactive object or process, collect the sound, light, heat, electricity, mechanics, chemistry, biology, location and other needed information, through all kinds of possible Internet access, content and the content, the objects and people in the link, to realizeintelligent perception of objects and processes, identification and management. Internet of things is through theintellisense recognition technology and pervasive computing, ubiquitous network integration application, known as the computer andthe Internet after the third wave of world information industry development. Rather than the Internet of things is a network, theInternet of things is the business and application of Internet of things is seen as the Internet application development. The innovation is the core of the development of the Internet of things application, the user experience as the core of innovation is the soul of the development of the Internet of things. 2.0The meaning of "thing" here "objects" to satisfy the following conditions can be incorporated into the scope of the "Internet of things" : 1. The receiver should have corresponding information; 2. Must have the data transmission channel; 3. To have a storage function; 4. Have the CPU; 5. Must have the operating system; 6. There should be special applications; 7. Must have the data sender; 8. To follow the communication protocol of the Internet of things; 9. In the network have the only number can be identified. 3. Definition of "Chinese" Internetof Things (Internet of Things) refers to the Ubiquitous (Ubiquitous) at the end of the equipment (Devices) and facility (Facilities), including "inherent intelligence" of sensors, mobile terminals, industrial system, building control systems, home intelligent Facilities and video monitoring system, etc, and "external Enabled" (Enabled), such as thevarious Assets (Assets), RFID wireless terminal to carry personal and vehicle and so on "intelligent objects or animals" or "smart dust" (Mote), through a variety of wireless and/or cable over long distances and/or short distance communication network connectivity (M2M), application Integration (Grand Integration), and cloud-based SaaS operation mode, in the internal network (Intranet), private network (Extranet), and/or the Internet (Internet) environment, adoptappropriate information security guarantee mechanism, to provide safeand controllable and personalized real-time online monitoring,positioning traces, alarm linkage, dispatch control, program management, remote control, security, remote maintenance, online upgrade, statistics, decision support, leading desktop (Cockpit display Dashboard), etc. Management and service functions,implementation of "all Things" "high efficiency, energy saving, safety, environmental protection" "tube, control, camp" Integration of the. 4. The definition of the eu in September 2009, held in Beijing the china-eu seminar on Internet of things and the enterprise environment, and social media department of RFID, head of the European commission information Lorent Ferderix DrGives the definition of the Internet of things: the Internet ofthings is a dynamic global network infrastructure, it has a standard and interoperable communications protocol based self-organizing ability, including physical and virtual "things" have identification, physical properties, the characteristics of virtual and intelligent interface,and seamless integration and information network. Iot will work with the media, Internet service of the Internet and the Internet, constitute the future Internet.Changes in theIot (Internet of Things), the word widely recognized at home and abroad is a professor at MIT Auto - Ashton ID center in RFID research in 1999 at the earliest. In 2005, the international telecommunication union (ITU) release of the same report, the definition and scope of the Internet of things have changed, coverage has a larger development, is no longer just a iot based on RFID technology.Since August 2009, when prime minister wen jiabao put forward since the "experience China" Internet of things was officially listed as one of five major emerging strategic industries, write "government work report," the Internet of things in China is heavily influenced by the whole society's attention, is the degreeof concern in the United States, European Union, and the rest of the world incomparable.The concept of Internet of things is not so much a foreign concept, as it is already a "made in China" concept, and his coverage of advancing with The Times, professor Ashton has exceeded 1999 and 2005, the scope of the ITU report referred to in the Internet of things has been labeled "Chinese".物联网物联网物联网物联网越来越多的模块与传感器构成嵌入式系统从而增强其通讯能力。
(完整word版)物联网英文

The Application of Iot Technology in Agriculture。
邵清源917106840533 1 IntroductionThe Internet of things is the network of physical devices,vehicles, home appliances and other itemsembedded with electronics, software, sensors, actuators,and connectivity which enables these objects to connect and exchange data。
Each thing is uniquely identifiable through its embedded computing system but is able to inter—operate within the existing Internet infrastructure.(from Wikipedia)The application of iot technology in agriculture is the definition of the agricultural Internet of things,which is quite simple to understand. This involves a wide range of aspects of agriculture, including monitoring of agricultural greenhouses, agricultural drip irrigation, freshwater aquaculture water quality monitoring and other aspects. Using a large number of sensors to form an effective monitoring network,which agricultural information feedback is realized through, is necessary. In order to facilitate the timely detection of problems in agricultural production,timely feedback the position of the problem, the agriculture and modern production technology should be combined with, and the application of intelligent and automatic equipment in agricultural production should be realized。
物联网安全问题的研究外文文献翻译

物联网安全问题的研究外文文献翻译毕业设计(论文)外文文献翻译院系:年级专业:姓名:学号:附件:指导老师评语:指导教师签名:年月日备注:1.从所引用的与毕业设计(论文)内容相近的外文文献中选择一篇或一部分进行翻译(不少于3000实词);2.外文文献翻译的装订分两部分,第一部分为外文文献;第二部分为该外文文献的中文翻译;3.外文文献正文按毕业设计(论文)格式排版,两部分内容不能联排,用分页符分页。
The Internet of thingsThe Internet of things the Internet of things the Internet of things more and more modules and sensors embedded system to enhance theirability of communication. The resulting information networks will create new business models, improve business processes, risk and reduce costs Michael cui, marcus method, and Roger RobertsIn most organizations, the information spread along the familiar path. Proprietary information is placed in the database and make a analysis in the report and then start the management chain. Information collected from public sources, Internet information collection and information from suppliers to buy.But the forecast information is changing the way: the physical world itself is becoming a kind of information system. In so-called iot, sensors, and micro devices (actuators) is embedded in the physical module from highway to heart pacemakers is through wired or wireless network connections, is often connected to the Internet using the same Internet protocol. The network transmission of data is used for computer analysis. If some modules can sense the environment and can be used for information exchange, so they can become and rapid response to solve the problem of complicated tools. The information revolution in the field of the physical information system is developing continuously, and even some will also be able to work under a single intervention.Pill shape photomicrographic device has successfully through the human digestive tract, and back to the thousands of images to pinpoint the source of the disease. Composed of satellite and ground sensor data acquisition system through the wireless device can detect crop status and connected to the precision agriculture can adjust method for everypart of the farming land. For example, by spreading more chemical fertilizers to increase poor soil fertile. Billboards in Japan, waiting for pedestrians pass by, and can assess the consumption of passers-by, and then according to the evaluation results show that the different advertising information.Yes, in many companies, or even earlier today has been warned many predict the future. With the emergence of new value creation method, the current business model is largely based on static information structure is faced with challenges. If in a specific location to a specific time you will be able to experience the mind of the buyer, then the dynamic pricing may increase the possibility of buying. Know how often, and a deep understanding of the usage of the product might get more harvest, choose addfee instead of direct selling. There are a lot of people responsible for the control of manufacturing process to get a more accurate, and can improve the production efficiency. There are such as the operating system are constantly monitored to prevent the emergence of dangerous or people can take corrective measures to avoid the occurrence of damage, risk, and to reduce the cost. Make the fullest use of these functions of the company will gain more profit than the competitor.The wide application of Internet of things is need time, but thanks to its development technology, got advance time line. Wireless technology and the further standardization of communication protocol makes it possible to collect information from the sensor at any time.Based on this, a small silicon chip is endowed with new functions, and at the same time, based on the pattern of Moore's law, its cost is falling. These largely increase the storage capacity of computer and computing power, some of the digital operation scope has expanded through the cloud computing, and reduces the cost.The Internet of things in the workIot for those technologies and not walk in the forefront of company is the news. But as these technologies mature, the enterprise deployment scope will increase. Now is the manager ofall industries to build ideas, consider the contact from theInternet of things or get potential of the development of The Times. We now know that there are six different types of emerging applications, most of which belong to the following two categories: the first, second, information and analysis, automation and control.Information and analysisDue to network increased with the product, the company's assets or data management environment of the link, they will produce better information and analysis, it is important to improve decision making. Some organizations have begun to use these application deployment in the target region, and more advanced and thirst for application is still in concept or test phase. 1, tracking, behaviorSensors embedded in the product, the enterprise can track the movements of these products, even interaction and monitoring them. Business models can be slightly adjusted to take advantage of thisscience. For example, some insurance companies to provide the carposition sensor installation. That how the insurance company may, according to the car was driven to determine the amount and where is the travel situation. Insurance can be customized to operating the vehicle's actual risk, not based on if the driver's age, gender,or places to live in such a situation.Or consider install the sensor and the network connection to thetaxi will happen: it can be used for a short period of time for the car rental service member, so you no longer need to rental service center, and each car's use can also be optimized for higher revenues. Zipcar company pioneered the use of this model, and a growing number of car rental companies are also beginning to follow suit. In retail, used to display shopping data of sensors can provide more detailed informationor provide discount information, make shopping easier. Leaders such as tesco supermarket in the forefront of the use of this technology.The English name for The Internet of Things The Internet of Things, hereinafter referred to as: The IOT. The Internet of things through the transmission device, radio frequency identification technology, such as global positioning system (GPS) technology, no need to monitor real-time acquisition, connected, interactive object or process, collect the sound, light, heat, electricity, mechanics, chemistry, biology, location and other needed information, through all kinds of possible Internet access, content and the content, the objects and people in the link, to realizeintelligent perception of objects and processes, identification and management. Internet of things is through theintellisense recognition technology and pervasive computing, ubiquitous network integration application, known as the computer andthe Internet after the third wave of world information industry development. Rather than the Internet of things is a network, theInternet of things is the business and application of Internet of things is seen as the Internet application development. The innovation is the core of the development of the Internet of things application, the user experience as the core of innovation is the soul of the development of the Internet of things. 2.0The meaning of "thing" here "objects" to satisfy the following conditions can be incorporated into the scope of the "Internet of things" : 1. The receiver should have corresponding information; 2. Must have the data transmission channel; 3. To have a storage function; 4. Have the CPU; 5. Must have the operating system; 6. There should be special applications; 7. Must have the data sender; 8. To follow the communication protocol of the Internet of things; 9. In the network have the only number can be identified. 3. Definition of "Chinese" Internetof Things (Internet of Things) refers to the Ubiquitous (Ubiquitous) at the end of the equipment (Devices) and facility (Facilities), including "inherent intelligence" of sensors, mobile terminals, industrial system, building control systems, home intelligent Facilities and video monitoring system, etc, and "external Enabled" (Enabled), such as thevarious Assets (Assets), RFID wireless terminal to carry personal and vehicle and so on "intelligent objects or animals" or "smart dust" (Mote), through a variety of wireless and/or cable over long distances and/or short distance communication network connectivity (M2M), application Integration (Grand Integration), and cloud-based SaaS operation mode, in the internal network (Intranet), private network (Extranet), and/or the Internet (Internet) environment, adoptappropriate information security guarantee mechanism, to provide safeand controllable and personalized real-time online monitoring,positioning traces, alarm linkage, dispatch control, program management, remote control, security, remote maintenance, online upgrade, statistics, decision support, leading desktop (Cockpit display Dashboard), etc. Management and service functions,implementation of "all Things" "high efficiency, energy saving, safety, environmental protection" "tube, control, camp" Integration of the. 4. The definition of the eu in September 2009, held in Beijing the china-eu seminar on Internet of things and the enterprise environment, and social media department of RFID, head of the European commission information Lorent Ferderix DrGives the definition of the Internet of things: the Internet ofthings is a dynamic global network infrastructure, it has a standard and interoperable communications protocol based self-organizing ability, including physical and virtual "things" have identification, physical properties, the characteristics of virtual and intelligent interface,and seamless integration and information network. Iot will work with the media, Internet service of the Internet and the Internet, constitute the future Internet.Changes in theIot (Internet of Things), the word widely recognized at home and abroad is a professor at MIT Auto - Ashton ID center in RFID research in 1999 at the earliest. In 2005, the international telecommunication union (ITU) release of the same report, the definition and scope of the Internet of things have changed, coverage has a larger development, is no longer just a iot based on RFID technology.Since August 2009, when prime minister wen jiabao put forward since the "experience China" Internet of things was officially listed as one of five major emerging strategic industries, write "government work report," the Internet of things in China is heavily influenced by the whole society's attention, is the degreeof concern in the United States, European Union, and the rest of the world incomparable.The concept of Internet of things is not so much a foreign concept, as it is already a "made in China" concept, and his coverage of advancing with The Times, professor Ashton has exceeded 1999 and 2005, the scope of the ITU report referred to in the Internet of things has been labeled "Chinese".物联网物联网物联网物联网越来越多的模块与传感器构成嵌入式系统从而增强其通讯能力。
(完整word版)物联网英文

The Application of Iot Technology in Agriculture.邵清源917106840533 1 IntroductionThe Internet of things is the network of physical devices, vehicles, home appliances and other itemsembedded with electronics, software, sensors, actuators, and connectivity which enables these objects to connect and exchange data. Each thing is uniquely identifiable through its embedded computing system but is able to inter-operate within the existing Internet infrastructure.(from Wikipedia)The application of iot technology in agriculture is the definition of the agricultural Internet of things, which is quite simple to understand. This involves a wide range of aspects of agriculture, including monitoring of agricultural greenhouses, agricultural drip irrigation, freshwater aquaculture water quality monitoring and other aspects. Using a large number of sensors to form an effective monitoring network,which agricultural information feedback is realized through, is necessary. In order to facilitate the timely detection of problems in agricultural production, timely feedback the position of the problem, the agriculture and modern production technology should be combined with, and the application of intelligent and automatic equipment in agricultural production should be realized.the emergence of theagriculture has played an important role in improving agricultural productivity. With the popularity of the Internet of things of agriculture, the traditional inefficient and casual way of agricultural production are also gradually improve, information technology and agricultural development is the inevitable trend of modernization.2 Literature ReviewThe Internet of things technology has great application prospect in agriculture, and it is believed that in the near future, Internet of things technology will be the core technology to assist the development of agricultural technology in China.(Intelligent agricultural design analysis of Internet of things technology,2018/3/21,Sun Hujun). Internet technology can be precisely controlled relative crop growth environment, guarantee the plants grew well, avoid necrosis, especially for growing environment requires higher flowers, can obviously improve the survival rate and quality; It can reduce labor cost and realize scale planting. It can also realize the monitoring and prevention of cordyceps sinensis, the disaster warning, etc. (The application of Internet of things technology in intelligent greenhouse,2015/8/3,Wang Lina).The Internet of things is the third wave after the development of computer and Internet technology. The development of Internet technology to the development of agricultural economy in our country laid a certain foundation, in the application of modern agriculture become more and more widely, can achieve scientific monitoring, planting, to further promote the transformation of modern agricultural development.(The application of Internet of things technology in agriculture,2018/1/16,Dai Lian, Lai yuling).3 HistoryConcept of a network of smart devices was discussed as early as 1982, a modified Coke machine at Carnegie Mellon University became the first Internet-connected appliance. Between 1993 and 1996 several companies proposed solutions likeMicrosoft's at Work or Novell's NEST. However, only in 1999 did the field start gathering momentum. Bill Joy envisioned Device to Device (D2D) communication as part of his "Six Webs" framework, presented at the World Economic Forum at Davos in 1999.The thought-model for future interconnection environment was proposed in 2004.This thought model envisioned the development trend of the Internet of things.4 Potentiality4.1 Full information chain trackingIn recent years, there have been many problems about China's food safety, and people are paying more and more attention to the dangers of food safety. Investigate its reason, the food safety problem is due to the process of agricultural products from production to sales rather than the quality of supervision and management, consumers also did not understand the process, which directly lead to food appear a series of problems. Internet of things technology in the food regulation can play a role in supervision. From food production and processing to transportation and sales, each one links in the real-time tracking and monitoring, to ensure the safety of the agricultural product quality effectively. At present, some places in our country has been applied to the Internet of things technology, such as: chengdu, Qingdao and other regions where restaurant s’ food production and processing and saling, which all are installed electronic chips, to monitor restaurant food safety problems from the production, processing, transportation and sales. Iot technology mainly equip the electronic track scale installation to the farmer's market, then consumers can in a farmers' market buy food at the same time through the phone they can query to the food production, processing, transportation and sales and other related quality information. Such as: to implement “ the Internet of things technology”, “the safety of the food” “RFID” and “GPS”technology which set up during the Olympic Games in Beijing,for the Olympic stadium in catering staff has carried on the tracking and monitoring of food, from the production, processing to sales of each link to tracking and monitoring information. In addition, for the supply of enterprise products supply logistics implementation of GPS real-time positioning in the process of monitoring, including the vehicles, such as temperature, humidity monitoring, once the temperature humidity in excess of the prescribed scope, the administrator will receive monitoring alarm message. In short, the wide application of Internet of things technology has provided a guarantee for the safety of food supply in the agricultural industry.4.2 Intelligent planting and farmingGenerally, the influence factors of planting and breeding are carbon dioxide concentration, air temperature, soil moisture and light. In greenhouse cultivation, breeding, therefore, the use of the Internet of things technology, through real-time monitoring of temperature, humidity, light intensity, PH value and air pressure data, and automatic control fertilization homework, so as to provide a good environment for the growth of crops, also greatly reduce the workload of migrant workers. In addition, the Internet of things not only can monitor the above data, also can analyze the data and processing, and through the sensor nodes send data to a wireless sensor, which can be a large area of data collection, management, analysis and informationprocessing technology, etc. For example, in aquaculture, the quality of the farmers' work is not high if the weather is hot and humid, but the weather affects the growth of the products most. The hot and humid weather will lead to the lack of oxygen in the pond and changes in PH value, and ammonia nitrogen content will also change. And through the use of the Internet of things technology, can 24 hours real-time monitoring of aquaculture water quality situation, including ammonia nitrogen, water PH, temperature and other data, once found that the problem can be through the warning form inform farmers. In addition, farmers can check the temperature, water quality and oxygen content of the pond at any time through Internet and mobile phone terminals, effectively reducing the workload of the farmers. Therefore, the use of Internet of things technology can greatly improve the yield and quality of agricultural products, thus maximizing economic benefits.4.3 Agricultural information pushMany people think that the push of agricultural information mainly refers to the push of weather forecast. But the development of crops now has more to do with weather. Therefore, through the use of the Internet of things technology, the data analysis and processing, and to predict future data changes over a period of time, the farmers can be predicted by these forecast accordingly in advance to prepare, etc., this can be for the growth of crops to reduce unnecessary loss. The amur region, for example, has realized the formula of soil, fertilization data monitoring and analysis, the prediction data and the result was sent to the farmers, provide favorable basis for providing sowing.5 examples about application of IoT in agriculture5.1Application of agricultural iot technology to grape planting.5.1.1The application of agricultural iot technology in improving grape planting environment.In the grape growing area, set up multiple information collector of the Internet, and information collector of grape growth environmental conditions to collect information including grape growing area of temperature, humidity, light conditions, co2 concentration, soil moisture, soil nutrient and so on. Using the Internet to link the information to collect, transmit the information to the terminal through the network management platform. Information collected by computer management center of culture analysis, draw the conclusion: the growth of grape growing environment, and then according to the analysis results will need to deal with matters in the form of the command control cabinet, grapes, irrigation, fertilization, spraying, etc. The Internet of things technology can real-time acquisition, storage, the location of the various soil and environmental parameters, including soil temperature, moisture, air humidity, light. These data directly enter the computer control room, farmers can know the result in time. If the data shows that the humidity is not enough, then the mouse will send commands and automatically start the pump to spray the grapes according to the preset procedure. In addition, mobile video monitoring is installed in the garden, and farmers can see the inside of the plantation at any time if they use a computer or mobile phone at home.5.1.2Application of agricultural Internet of things technology to achieve intelligentgrape irrigation.Apply the agricultural Internet of things technology, introduce the automatic frequency conversion irrigation system, through the Internet of things control box and expert information system, according to the collected information to irrigate the grape precisely. Automatic frequency conversion irrigation system using the frequency conversion technology, can realize the pump automatic start and stop, and it do not need to run for a long time, which can reduce the load of pump. As long as the related parameters set, it can ensure that the pipe water pressure and flow rate to maintain in a reasonable scope, to avoid the damage to pipeline. Reducing the pipeline jam phenomenon happened . Internet of things can get the moisture of the soil through a variety of sensors, when they tested that the soil moisture is less, which will affect the growth of grapes, the sensor will transfer the information to the management center, management center after receiving the information, send instructions will be needed for irrigation area of solenoid valve is opened, automatic watering grapes need irrigation of grapes. After the irrigation to a certain extent, whether to continue the irrigation information system will be judged by experts, information system can be experts knowledge and experience of related plant transformation as the control parameter, sending them to give the control center, provide a reliable basis for judging the current situation.5.2The application of Internet of things technology in soilless culture.5.2.1The perception of environmental conditions of soil without soil.Iot perception layer by all sorts of information and data acquisition and sensor devices, including information collection layer by temperature and humidity sensor, pH sensors, nutrition concentration sensors, cameras and infrared sensors to sense, collect soilless cultivation equipment of environment temperature, humidity, pH, and nutrient concentrations, and the collected data, video, or physical quantities into the physical world of information. Self-organizing sensor network adopting digital link coding, modulation and demodulation technology to realize data transmission between the sensor and the sensor node of the wlan, based on the network, traffic management and routing technology, realize the self organization and coordination between each node. Through the various kinds of sensors installed, the changes of relevant indicators in the soil cultivation facilities are perceived and collected, and the information transmission is carried out through 3G, 4G network technology, wireless network and bluetooth.5.2.2The processing of environmental information of soil without soil.The related index information collected by the sensing layer is transmitted to the network layer through the self-organizing sensor network. Network layer is passed perception send or receive data, through access to physical quantities carry electronic information, identification and information format conversion, and then by the network interface layer perception layer collected information into the application layer,to realize the whole iot structure of three levels of connection.5.2.3The regulation of soil culture environmentAccording to the requirement of the soilless cultivation facilities plants to environmental conditions, set the cultivation in advance environmental indicators,such as temperature, humidity in soilless cultivation facilities, pH, concentration of carbon dioxide, nutrient concentrations, illumination, and cultivation of outdoor climatic conditions and related indicators to monitor, record. Through a variety of sensors and perception layer information acquisition terminal access parameters in time, and then through the network layer transfer and processing, output to the corresponding operation interface, then realize that implementation of soilless cultivation environment related indicators of the real-time monitoring and regulation. In addition, the user according to the requirement of environmental indicators in different periods, set the corresponding warning threshold, network system can be according to the different need of related parameters of plants to the intelligent adjustment5.3The application of iot technology to the quality and safety traceability system of fertilizer.5.3.1The importance of quality and safety of fertilizer production.Short for fertilizer, chemical fertilizer, is made by chemical methods to provide one or more needed to make crops grow in the nutrient fertilizer, nitrogen fertilizer, phosphate fertilizer, potash fertilizer and compound fertilizer, hefei, China is a populous country, and agriculture is very important. Food production in our country agricultural development occupies a pivotal position. Our country's arable land accounts for only 7% of the world's, but China's population22%, therefore, increasing production per unit area of cultivated land is the only way for China's grain production. fertilizer is to improve the soil properties, increase soil fertility, and is the important measures to increase food production. Fertilizer inputs, which is the basis for the most, is closely related to people's healthy diet also, its production quality and safety is very important.5.3.2Chemical fertilizer quality safety traceability system architecture.In chemical fertilizer quality safety traceability system, the hardware layer includes sensors, RFID tag module (to EPC coding of RFID tags, unified distribution and management), read and write, antenna, printer (printing RFID tags and traceability code). Chemical fertilizer quality safety traceability system mainly used in the product information collection and transfer the information to the service layer. Service layer is responsible for data processing and transmission, including rf data with the query, proofreading, storage and management. The data layer is used to store data, including details of products and business. Application layer includes production, storage, transportation, sales and so on each link of the process management, main body involved in the activities of all aspects of the formation of the relevant information, the application layer also provides all kinds of query, regulation and other service functions.5.3.3The realization of quality and safety traceability system of chemical fertilizer.In fertilizer production processing store sales in the link, the operation of the information acquisition process is: when the factory finished fertilizer production work, after inspectors inspection by rf label management functions for all processing fertilizer was distributed with EPC RFID tag encoding information. After Rf reader to the EPC tag information, by the operator for detailed information on school work.When the fertilizer has completed the sales process, the purchaser can check the relevant information of each link in the company's fertilizer quality and safety traceability system through the tracing code on the packaging bag.If the product quality problem is found, the purchaser may report or complain to the relevant quality control department. In this way, the product quality information traceability is realized, and the anti-counterfeiting authentication of chemical fertilizer products and the certification of enterprises' anti-cross products are realized. Traceability links can also record problem product traceability code,when and who buy, contact phone number, thus it is advantageous to the enterprise and the government supervision department in accordance with the relevant information query, to implement supervision and control of products. The fertilizer quality safety traceability system also has a separate management module for data backup and recovery functions to ensure the security of all data in the traceability system.6 The limitations of using the Internet of things in agriculture6.1 higher costAlthough in recent years there has been a massive decline in the cost of the sensor, but the cost is still high. The humidity sensor, soil moisture sensor price is more expensive. The total greenhouse environment parameter sensor price at around $ten thousand. The needs of large investment funds for migrant workers, lead to the application of the Internet of things technology can't realize. It still need to reduce the investment cost.6.2 technical problemsSensor will be measured due to improper installation location, bad stability of inaccurate data. There are some wireless sensor signal transmission distance is limited, and data transmission is not stabl .The maintenance cost is high as well. In addition, using the sensor power supply problem no good solution. if use solar power, power is not enough. If use alternating current (ac) is the most greenhouse without electricity and laying electric power line, which limit the popularization of the internet of thing technology in agriculture.7 conclusionThe Internet of things technology belongs to a kind of new technology, belong to the core of intelligent technology, the typical use of new network technology, however, judging from the actual situation of our country at present stage, the Internet of things technology has not yet formed technology system of the system.Results show that the Internet of things technology has great application prospects in the agriculture, believe in the near future, the Internet of things technology can be a secondary agricultural technology level of the development of the core technology in our country.。
物联网英译汉

物联网英译汉1. Internet of Things (IoT) is an integrated part of Future Internetwith selfcould be defined a s a dynamic global n etwork infrastructureconfiguring capabilities based on standard and interoperablehave communication protocols where physical a nd vi rtual “things”identities, physical attributes, and virtual personalities and use intel interfaces, and are seamlessly integrated into the information network.2. Unquestionably, the main strength of the IoT idea is the highimpact it w ill h ave on several aspects of everyday-lifeand behavior ofpotential users. From the point of view of a private user, the most obviowill be visible in both working andeffects of the IoT introductiondomestic fields. In this c ontext, domotics, a ssisted living, e-health,enhanced learning are only a few examples of possible applicationscenarios in which the new paradigm will play a leading role in the nea future. Similarly, from the perspective of business u sers, t he mostapparent consequences will be equally visible i n fields s uch as,business/processmanufacturing, logistics,automation and industrialmanagement, intelligent transportation of people and goods.3. In the IoT, “things” are expected to become active participants business, information and social processes where they are enabled t ointeractand communicate among themselves and with the environmentabout the environment,by exchanging data and information “sensed”world” events a ndwhile reacting autonomously to the “real/physicalinfluencing it by running processes that trigger actions and create servi with or without direct human intervention.Lesson 1 History of Internet in a NetshellHere’s a brief history of the Internet, including important da people, projects, sites, and other information that should give you least a partial picture of what this thing we call the Internet rea and where it came from.While the complete history of the Internet could easily fill a fyou with key milestones and eventsbooks, w e should familiarizerelated to the growth and evolution of the Internet between 1969 t 2009.1969: ArpanetArpanet was the first real network to run on packet(new at the time). On the October 29, 1969,switching technologycomputers a t Stanford and UCLA connected f or the first time. I neffect, they were the first hosts on what would one day become the Internet.The first message sent a cross the network was supposed to bethe link b etween the two colleges crashed "Login", but reportedly,on the letter "g".1969: UnixAnother major milestone d uring the 60’s was the inceptionof Unix: the operating system whose design heavily influenced that of Linux and FreeBSD (the operating systems most popular intoday’s web servers/web hosting services).1970: Arpanet networkAn Arpanet network was established between Harvard, MIT, andmessage processor"BBN (the c ompany that c reated the "interfacecomputers used to connect to the network) in 1970.1971: EmailEmail was first developed in 1971 by Ray Tomlinson, who also made the decision to use the "@" symbol to separate the user name from the computer name (which later on became the domain name).1971: Project Gutenberg and eBooksOne of the most impressive developments of 1971 was the startof Project Gutenberg. Project Gutenberg, for t hose u nfamiliar withthe site, is a global effort to make books and documents in the publ–for f ree–in a variety of eBook anddomain availableelectronicallyelectronic formats.It began when Michael Hart gained access to a large block ofthat t he future o fcomputing time and came to the realizationbut in the storage, retrieval computers w asn’t in computing itself,and searching of information that, at the time, was only contained libraries. He manually typed (no OCR at the time) the "Declaration of Independence" and launched Project Gutenberg to makeinformation contained in books widely available in electronic form. In effect, this was the birth of the eBook.1972: CYCLADESFrance began its own Arpanet-like project i n 1972, called CYCLADES. While Cyclades was eventually shut down, it d idpioneer a key idea: the host computer should be responsible for dat transmission rather than the network itself.connection a nd the popularity of1973: The first trans-AtlanticemailingArpanet made its first trans-Atlantic connection in 1973, with thUniversity C ollege of London. During the same year, emailaccounted for 75% of all Arpanet network activity.1974: The beginning of TCP/IP[1]1974 was a breakthrough year. A proposal was published to link Arpa-like networks together into a so-called "inter-network", which would have no central c ontrol and would work around a transmission control protocol (which eventually became TCP/IP).1975: The email clientWith the popularity of emailing, the first modern email programa programmer at the University ofwas developed b y John Vittal,Southern California in 1975. The biggest technological advance this program (called MSG) made was the addition of "Reply" and "Forward" functionality.1977: The PC modemas we 1977 was a big year f or t he d evelopment o f the I nternetknow it today. It’s the year the first PC modem, developed by Denni Hayes and Dale Heatherington, was introduced and initially sold to computer hobbyists.1978: The Bulletin Board System (BBS)board system (BBS) was developed d uring a The first bulletinblizzard in Chicago in 1978.1978: Spam is born1978 is also the year that brought the first unsolicited commercial email message (later known as spam), sent o ut to 600 CaliforniaArpanet users by Gary Thuerk.1979: MUD – The earliest form of multiplayer gamesThe precursor t o World of Warcraft and Second Life wasdeveloped in 1979, and was called M UD (short f or MultiUser Dungeon). MUDs were entirely t ext-based virtual worlds,combining elements of role-playing games, interactive, fiction, an online chat.1979: Usenet1979 also ushered into the scene: Usenet, created b y twograduate students. Usenet was an internet-based discussion system, allowing people from around the globe to converse about the same topics by posting public messages categorized by newsgroups.1980: ENQUIRE softwareThe European Organization for Nuclear Research (better known as CERN) launched ENQUIRE (written by Tim Berners-Lee), ahypertext program that allowed scientists at the particle physics to keep track o f people, s oftware, and projects using hypertext (hyperlinks).翻译:1971:电子邮件作出决定使用“@”符号来分割用户名和计算机名称(之后称域名)的Ray Tomlinson在1971年首先开发了电子邮件。
物流管理专业文献翻译--物联网--传统数据库的死亡--大学毕业设计论文

英文翻译分院海运学院专业物流管理届别2012届学号084771115姓名指导教师2011 年 10 月 31日<文献翻译一:原文>The Internet of Things: The Death of a TraditionalDatabase?Keith G. JefferyDirector IT & International Strategy, Science and Technology Facilities Council, Rutherford Appleton Laboratory, Harwell Science and Innovation Campus, Chilton, Didcot, Oxfordshire OX11 0QX UKAbstractTraditional database research has developed technology to ensure that the database — even when distributed — represents the world of interest with integrity and a consistent state. Important concepts have been developed and proven. However, the internet of things challenges all this. Very large numbers of nodes handle volumes that are vast, the speed is fast and the data/information space is global — indeed with space data — universal. This poses challenges. What does the concept of a state mean when the information map of the real world of interest is represented across millions of nodes, many of which are updating in real-time? What does a transaction look like when the data being updated is spread across hundreds or thousands of nodes with differing update policies? Worse, how does one roll back or compensate a transaction? We have already seen database research applied to semi-structured data, to streamed data, and real-time applications. Is it possible for these techniques to be applied to the internet of things? The internet of things opens up more opportunities for security compromises. How do we develop trust band security techniques across multiple policies? How do we prevent the unauthorized use of private information yet permit authorized use? We need dynamic trust, security, and privacy management. Do we need a new theoretical framework?KeywordsDatabase, Future internet, Integrity, Process, State, Transaction, Workflow.1. IntroductionThere is much activity in Europe and the world on predicting the future of information and communication technology (ICT). There are roadmapping exercises for R and D in various domains to meet that predicted future. The EC has set up expert groups and/or Projects covering GRIDs, CLOUDs,Service-Oriented Architectures, quantum and bio-computing, new materials, human‑computer interaction,and cognitive technology among others. There is much discussion of Web2.0 and beyond. The ‘Internet of Things’ (http:// /wiki/Internet_of_Things) is a strong theme with a recent EC (European Commission) conference (May 2009) dedicated to it. The formation of the FIA (Future Internet Assembly) underpins the groundswell of enthusiasm for this idea, and Issue 77 of ERCIM News [1] has Future Internet Technology as the special theme, with a foreword by Viviane Reding, EC Commissioner for Information Society and Media, emphasizing the importance. Europe is establishing an e-Infrastructure and the US is establishing its Cyberinfrastructure.Database researchers (with a few notable exceptions) have not been very prominent in these discussions. This is surprising, as the movement toward take‑up of these new technologies by the business world pioneered in the research field will require, at the least, interoperation with the existing database technology, and most likely a further wholesale evolutionary or revolutionary developmentof the database technology, to adapt to the new environment. Database research has moved to includesemi-structured data and its processing and managing of data streams. There is work on schema matching and mapping for interoperation (sometimes in the context of Dataspaces), and on domain ontologies. Thereis still ongoing work on web-database interfaces, modeling, and systems development. Work on performance or query optimization with new algorithms continues, as does optimized storage architecture — includingP2P (Peer to Peer).Where are the advances in database research matching — and/or contributing to — the huge advancesin (among others) social networking, content creation and repurposing, gaming, sensor systems, robotics, autonomic systems, visualization, user interaction, systems and software development, and service-oriented architecture?2. A VisionThe vision has its roots in [2] with subsequent refinements [3,4] leading to an analysis and synthesis performed in 2008 and updated in 2009 by ERCIM (). It is based on the architecture proposed for the UK e-Science program [2] and is represented in Figure 1.Let us imagine a possible state in 20 years’ time. The problems facing Europe — and the world —(from continent through country to individual person scale) are large, complex, and require unprecedentedscientific, mathematical, and IT skills for their solution.There is a fast, reliable, inexpensive e-infrastructure providing all communication services. Persons are connected to the e-infrastructure via personal computer devices that are continuously online. The networking components of the e-infrastructure invisibly provide optimal connectivity in terms of performance, reliability, cost, and security. The e-infrastructure physically senses, detects, records, and curates everything, using all the computers, storage devices, networks, and sensors. Subject to security, privacy, ownership and commercial rights all computational, storage, detector, and communication facilities are available to everyone. Detectors and subsystems will occur in all environments, across all industries and social services, as also in the home environment. Subsystems are embedded within the e-infrastructure — for example control systems for utilities — including personaltransport. Other subsystems will be robotic for agriculture, manufacturing, healthcare, and other applications. This e-infrastructure vision has major implications:1. There is a continuing and accelerating need for ever faster, smaller, cheaper, and more energy-efficient (and less heat-producing) devices. At some point biologically-inspired systems will dominate and will compete/cooperate with quantum-based technologies.2. New ‘intelligent materials’ will be developed, which will allow artifacts to be constructed ‘internet-ready’. These will range from agricultural products through to manufactured products.3. The open availability of everything simplifies the physical access and improves the performance, Including reducing latency, but will demand ever‑increasing performance, scalability, reliability, andself-management.4. The middleware of the e-infrastructure bears heavy responsibilities: (a) for providing the self‑* characteristics (self-managing, self-tuning, self- repairing) of a reliable e-infrastructure; (b) for identification, authorization, trust, security, privacy, and access control; (c) for hiding the complexity through virtualization and abstraction, thus providing homogeneous access to and utilization of heterogeneous facilities.The i-infrastructure relies on the underlying e-infrastructure and converts the data (structured,semi-structured, and unstructured) to information. The i-infrastructure provides the processing capabilities to collect, structure, manage, describe, and manipulate the information. It provides computationalmodeling/simulation facilities to generate new information. The processing capabilities will beService-Oriented Knowledge Utilities (SOKUs) which are discoverable/composable and dynamicallytunable, based on properties described by their metadata. There is a massive Amount of content: From structured verified data and information through to personally authored social networking artifacts, and from data streams generated by detectors through to entertainment and education material. The volumes of data and information will preclude shipping data to processors with appropriate software; rather we shall need to ship software to the data.The k-Infrastructure manages knowledge; allowing differing semantic descriptions over a formal syntax in the i-layer. This is the domain where humans or data mining extract knowledge from information by deduction or induction, where that knowledge is codified and stored for use in optimizing the e- and i- layers, and for interfacing to intelligent applications and intelligent user interfaces in the overlying application layer.Relying on this e-, i-, and k-infrastructure are applications. They also will be constructed from SOKUs. The SOKUs will have functional characteristics and their nonfunctional characteristics (including performance, security, and use-condition aspects) will be determined by a well-defined interface to thee-infrastructure. Such architecture allows extensive re-use of well-tried components and the rapid development of applications, using them and additional new services specifically for a particular application. The applications will range from games and edutainment through to B2C (Business‑to‑customer) and B2B (business-to-business) transactions within an E2E (enterprise-to-enterprise) environment and on to advanced R and D activities. Decision-making will be based not just on structured information and knowledge induction and deduction utilizing information, but also on simulations. These applications will be available (under appropriate conditions determined by the restrictive metadata) to everyone. Some applications will be general and widely applicable — ranging from entertainment and games through cooperativeworking/socializing to information management and analysis. These are likely to be pre-composed and optimized for efficiency. Some applications will be highly specialized for particular industrial/commercial sectors or for social sectors such as healthcare and environment; these will be constructed dynamically at demand-time.The end-user will interact with the applications via a set of personalized devices — including robots —providing services. Each device-based service will have associated role-based profiles (metadata covering mainly nonfunctional requirements) to interact with the e-infrastructure. This provides the context for user-application interactions mediated by SOKU agents. The end-user device services will be ‘intelligent’ and will ‘learn’ from experience. They will act on behalf of the user in a majority of the cases. The end-user will not know (or care) where and how her requirements are met, as long as the agreed service levels are achieved. The use of service level agreements negotiated by agents on behalf of the user, their enforcement, and dealing with dissatisfaction and recompense will raise new challenges.7. ConclusionThe database research community has in the past made great advances with major results (e.g., relational database technology — although the pivotal research was done 40 years ago) being taken up and developed further by the IT industry and their products used throughout commerce and industry generating wealth and value. Similarly the technology has underpinned advances in domains such as, environmental monitoring, healthcare, and education, generating improvements in the quality of life.Dave deWitt [7] proposed that database technology was a ‘roadkill on the information superhighway’ and the subsequent development of web-based systems — al though backended by database technology —has in some ways proved him right.The ‘internet of things’ provides database research with a new opportunity and new challenges. The speed and required low latency for many applications are beyond the current capabilities and demand architecture beyond the current database server clusters and distributed databases. Although database technology research has addressed semi-structured and multimedia information and datastreams, homogeneous access to — and processing of — heterogeneous sources is not yet solved. There has been research on representation of temporal properties, but no generally accepted representation has emerged (despite standardization). There has been research on incomplete and uncertain information, but again no generally accepted consensus.There are challenges (not dealt with above) in the representation of morality in the processing of information with appropriate privacy and security. A more widespread, open, and intelligent environment will produce new malware and malicious attacks; therefore, safeguards will have to be designed.<文献翻译一:译文>物联网:传统数据库的死亡?摘要:传统的数据库研究通过开发技术,来确保数据库即便在为分散式的情况下——依然代表利益世界完整和一致的状态。
云计算与物联网外文翻译文献

文献信息:文献标题:Integration of Cloud Computing with Internet of Things: Challenges and Open Issues(云计算与物联网的集成:挑战与开放问题)国外作者:HF Atlam等人文献出处:《IEEE International Conference on Internet of Things》, 2017字数统计:英文4176单词,23870字符;中文7457汉字外文文献:Integration of Cloud Computing with Internet of Things:Challenges and Open IssuesAbstract The Internet of Things (IoT) is becoming the next Internet-related revolution. It allows billions of devices to be connected and communicate with each other to share information that improves the quality of our daily lives. On the other hand, Cloud Computing provides on-demand, convenient and scalable network access which makes it possible to share computing resources; indeed, this, in turn, enables dynamic data integration from various data sources. There are many issues standing in the way of the successful implementation of both Cloud and IoT. The integration of Cloud Computing with the IoT is the most effective way on which to overcome these issues. The vast number of resources available on the Cloud can be extremely beneficial for the IoT, while the Cloud can gain more publicity to improve its limitations with real world objects in a more dynamic and distributed manner. This paper provides an overview of the integration of the Cloud into the IoT by highlighting the integration benefits and implementation challenges. Discussion will also focus on the architecture of the resultant Cloud-based IoT paradigm and its new applications scenarios. Finally, open issues and future research directions are also suggested.Keywords: Cloud Computing, Internet of Things, Cloud based IoT, Integration.I.INTRODUCTIONIt is important to explore the common features of the technologies involved in the field of computing. Indeed, this is certainly the case with Cloud Computing and the Internet of Things (IoT) – two paradigms which share many common features. The integration of these numerous concepts may facilitate and improve these technologies. Cloud computing has altered the way in which technologies can be accessed, managed and delivered. It is widely agreed that Cloud computing can be used for utility services in the future. Although many consider Cloud computing to be a new technology, it has, in actual fact, been involved in and encompassed various technologies such as grid, utility computing virtualisation, networking and software services. Cloud computing provides services which make it possible to share computing resources across the Internet. As such, it is not surprising that the origins of Cloud technologies lie in grid, utility computing virtualisation, networking and software services, as well as distributed computing, and parallel computing. On the other hand, the IoT can be considered both a dynamic and global networked infrastructure that manages self-configuring objects in a highly intelligent way. The IoT is moving towards a phase where all items around us will be connected to the Internet and will have the ability to interact with minimum human effort. The IoT normally includes a number of objects with limited storage and computing capacity. It could well be said that Cloud computing and the IoT will be the future of the Internet and next-generation technologies. However, Cloud services are dependent on service providers which are extremely interoperable, while IoT technologies are based on diversity rather than interoperability.This paper provides an overview of the integration of Cloud Computing into the IoT; this involves an examination of the benefits resulting from the integration process and the implementation challenges encountered. Open issues and research directions are also discussed. The remainder of the paper is organised as follows: Section II provides the basic concepts of Cloud computing, IoT, and Cloud-based IoT; SectionIII discusses the benefits of integrating the IoT into the Cloud; Could-based IoT Architecture is presented in section IV; Section V illustrates different Cloud-based IoT applications scenarios. Following this, the challenges facing Cloud-based IoT integration and open research directions are discussed in Section VI and Section VII respectively, before Section VIII concludes the paper.II.BASIC CONCEPTSThis section reviews the basic concepts of Cloud Computing, the IoT, and Cloud-based IoT.1.Cloud ComputingThere exist a number of proposed definitions for Cloud computing, although the most widely agreed upon seems be that put forth by the National Institute of Standards and Technology (NIST). Indeed, the NIST has defined Cloud computing as "a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction".As stated in this definition, Cloud computing comprises four types of deployment models, three different service models, and five essential characteristics.Cloud computing deployment models are most commonly classified as belonging to the public Cloud, where resources are made available to consumers over the Internet. Public Clouds are generally owned by a profitable organisation (e.g. Amazon EC2). Conversely, the infrastructure of a private Cloud is commonly provided by a single organisation to serve the particular purposes of its users. The private Cloud offers a secure environment and a higher level of control (Microsoft Private Cloud). Hybrid Clouds are a mixture of private and public Clouds. This choice is provided for consumers as it makes it possible to overcome some of the limitations of each model. In contrast, a community Cloud is a Cloud infrastructure which is delivered to a group of users by a number of organisations which share the same need.In order to allow consumers to choose the service that suits them, services inCloud computing are provided at three different levels, namely: the Software as a Service (SaaS) model, where software is delivered through the Internet to users (e.g. GoogleApps); the Platform as a Service (PaaS) model, which offers a higher level of integrated environment that can build, test, and deploy specific software (e.g. Microsoft Azure); and finally, with the Infrastructure as a Service (IaaS) model, infrastructure such as storage, hardware and servers are delivered as a service (e.g. Amazon Web Services).2.Internet of ThingsThe IoT represents a modern approach where boundaries between real and digital domains are progressively eliminated by consistently changing every physical device to a smart alternative ready to provide smart services. All things in the IoT (smart devices, sensors, etc.) have their own identity. They are combined to form the communication network and will become actively participating objects. These objects include not only daily usable electronic devices, but also things like food, clothing, materials, parts, and subassemblies; commodities and luxury items; monuments and landmarks; and various forms of commerce and culture. In addition, these objects are able to create requests and alter their states. Thus, all IoT devices can be monitored, tracked and counted, which significantly decreases waste, loss, and cost.The concept of the IoT was first mentioned by Kevin Ashton in 1999, when he stated that “The Internet of Things has the potential to change the world, just as the Internet did. Maybe even more so”. Later, the IoT was formally presented by the International Telecommunication Union (ITU) in 2005. A great many definitions of the IoT have been put forth by numerous organisations and researchers. According to the ITU (2012), the IoT is “a global infrastructure for the Information Society, enabling advanced services by interconnecting (physical and virtual) things based on, existing and evolving, interoperable information and communication technologies”. The IoT introduces a variety of opportunities and applications. However, it faces many challenges which could potentially hinder its successful implementation, such as data storage, heterogeneous resource-constrained, scalability, Things, variable geospatial deployment, and energy efficiency.3.Cloud-Based Internet of ThingsThe IoT and Cloud computing are both rapidly developing services, and have their own unique characteristics. On the one hand, the IoT approach is based on smart devices which intercommunicate in a global network and dynamic infrastructure. It enables ubiquitous computing scenarios. The IoT is typically characterised by widely-distributed devices with limited processing capabilities and storage. These devices encounter issues regarding performance, reliability, privacy, and security. On the other hand, Cloud computing comprises a massive network with unlimited storage capabilities and computation power. Furthermore, it provides a flexible, robust environment which allows for dynamic data integration from various data sources. Cloud computing has partially resolved most of the IoT issues. Indeed, the IoT and Cloud are two comparatively challenging technologies, and are being combined in order to change the current and future environment of internetworking services.The Cloud-based Internet of Things is a platform which allows for the smart usage of applications, information, and infrastructure in a cost-effective way. While the IoT and Cloud computing are different from each other, their features are almost complementary, as shown in TABLE 1. This complementarity is the primary reason why many researchers have proposed their integration.TABLE 1. COMPARISON OF THE IOT WITH CLOUD COMPUTINGIII.BENEFITS OF INTEGRATING IOT WITH CLOUDSince the IoT suffers from limited capabilities in terms of processing power and storage, it must also contend with issues such as performance, security, privacy, reliability. The integration of the IoT into the Cloud is certainly the best way toovercome most of these issues. The Cloud can even benefit from the IoT by expanding its limits with real world objects in a more dynamic and distributed way, and providing new services for billions of devices in different real life scenarios. In addition, the Cloud provides simplicity of use and reduces the cost of the usage of applications and services for end-users. The Cloud also simplifies the flow of the IoT data gathering and processing, and provides quick, low-cost installation and integration for complex data processing and deployment. The benefits of integrating IoT into Cloud are discussed in this section as follows.municationApplication and data sharing are two significant features of the Cloud-based IoT paradigm. Ubiquitous applications can be transmitted through the IoT, whilst automation can be utilised to facilitate low-cost data distribution and collection. The Cloud is an effective and economical solution which can be used to connect, manage, and track anything by using built-in apps and customised portals. The availability of fast systems facilitates dynamic monitoring and remote objects control, as well as data real-time access. It is worth declaring that, although the Cloud can greatly develop and facilitate the IoT interconnection, it still has weaknesses in certain areas. Thus, practical restrictions can appear when an enormous amount of data needs to be transferred from the Internet to the Cloud.2.StorageAs the IoT can be used on billions of devices, it comprises a huge number of information sources, which generate an enormous amount of semi-structured or non-structured data. This is known as Big Data, and has three characteristics: variety (e.g. data types), velocity (e.g. data generation frequency), and volume (e.g. data size). The Cloud is considered to be one of the most cost-effective and suitable solutions when it comes to dealing with the enormous amount of data created by the IoT. Moreover, it produces new chances for data integration, aggregation, and sharing with third parties.3.Processing capabilitiesIoT devices are characterised by limited processing capabilities which preventon-site and complex data processing. Instead, gathered data is transferred to nodes that have high capabilities; indeed, it is here that aggregation and processing are accomplished. However, achieving scalability remains a challenge without an appropriate underlying infrastructure. Offering a solution, the Cloud provides unlimited virtual processing capabilities and an on-demand usage model. Predictive algorithms and data-driven decisions making can be integrated into the IoT in order to increase revenue and reduce risks at a lower cost.4.ScopeWith billions of users communicating with one another together and a variety of information being collected, the world is quickly moving towards the Internet of Everything (IoE) realm - a network of networks with billions of things that generate new chances and risks. The Cloud-based IoT approach provides new applications and services based on the expansion of the Cloud through the IoT objects, which in turn allows the Cloud to work with a number of new real world scenarios, and leads to the emergence of new services.5.New abilitiesThe IoT is characterised by the heterogeneity of its devices, protocols, and technologies. Hence, reliability, scalability, interoperability, security, availability and efficiency can be very hard to achieve. Integrating IoT into the Cloud resolves most of these issues. It provides other features such as ease- of-use and ease-of-access, with low deployment costs.6.New ModelsCloud-based IoT integration empowers new scenarios for smart objects, applications, and services. Some of the new models are listed as follows:•SaaS (Sensing as a Service), which allows access to sensor data;•EaaS (Ethernet as a Service), the main role of which is to provide ubiquitous connectivity to control remote devices;•SAaaS (Sensing and Actuation as a Service), which provides control logics automatically;•IPMaaS (Identity and Policy Management as a Service), which provides access to policy and identity management;•DBaaS (Database as a Service), which provides ubiquitous database management;•SEaaS (Sensor Event as a Service), which dispatches messaging services that are generated by sensor events;•SenaaS (Sensor as a Service), which provides management for remote sensors;•DaaS (Data as a Service), which provides ubiquitous access to any type of data.IV.CLOUD-BASED IOT ARCHITECTUREAccording to a number of previous studies, the well-known IoT architecture is typically divided into three different layers: application, perception and network layer. Most assume that the network layer is the Cloud layer, which realises the Cloud-based IoT architecture, as depicted in Fig. 1.Fig. 1. Cloud-based IoT architectureThe perception layer is used to identify objects and gather data, which is collected from the surrounding environment. In contrast, the main objective of the network layer is to transfer the collected data to the Internet/Cloud. Finally, the application layer provides the interface to different services.V.CLOUD-BASED IOT APPLICATIONSThe Cloud-based IoT approach has introduced a number of applications and smart services, which have affected end users’ daily lives. TABLE 2 presents a brief discussion of certain applications which have been improved by the Cloud-based IoT paradigm.TABLE 2. CLOUD-BASED IOT APPLICATIONSVI.CHALLENGES FACING CLOUD-BASED IOT INTEGRATION There are many challenges which could potentially prevent the successful integration of the Cloud-based IoT paradigm. These challenges include:1.Security and privacyCloud-based IoT makes it possible to transport data from the real world to theCloud. Indeed, one particularly important issues which has not yet been resolved is how to provide appropriate authorisation rules and policies while ensuring that only authorised users have access to the sensitive data; this is crucial when it comes to preserving users’ privacy, and particularly when data integrity must be guaranteed. In addition, when critical IoT applications move into the Cloud, issues arise because of the lack of trust in the service provider, information regarding service level agreements (SLAs), and the physical location of data. Sensitive information leakage can also occur due to the multi-tenancy. Moreover, public key cryptography cannot be applied to all layers because of the processing power constraints imposed by IoT objects. New challenges also require specific attention; for example, the distributed system is exposed to number of possible attacks, such as SQL injection, session riding, cross- site scripting, and side-channel. Moreover, important vulnerabilities, including session hijacking and virtual machine escape are also problematic.2.HeterogeneityOne particularly important challenge faced by the Cloud- based IoT approach is related to the extensive heterogeneity of devices, platforms, operating systems, and services that exist and might be used for new or developed applications. Cloud platforms suffer from heterogeneity issues; for instance, Cloud services generally come with proprietary interfaces, thus allowing for resource integration based on specific providers. In addition, the heterogeneity challenge can be exacerbated when end-users adopt multi-Cloud approaches, and thus services will depend on multiple providers to improve application performance and resilience.3.Big dataWith many predicting that Big Data will reach 50 billion IoT devices by 2020, it is important to pay more attention to the transportation, access, storage and processing of the enormous amount of data which will be produced. Indeed, given recent technological developments, it is clear that the IoT will be one of the core sources of big data, and that the Cloud can facilitate the storage of this data for a long period of time, in addition to subjecting it to complex analysis. Handling the huge amount of data produced is a significant issue, as the application’s whole performance is heavilyreliant on the properties of this data management service. Finding a perfect data management solution which will allow the Cloud to manage massive amounts of data is still a big issue. Furthermore, data integrity is a vital element, not only because of its effect on the service’s quality, but also because of security and privacy issues, the majority of which relate to outsourced data.4.PerformanceTransferring the huge amount of data created from IoT devices to the Cloud requires high bandwidth. As a result, the key issue is obtaining adequate network performance in order to transfer data to Cloud environments; indeed, this is because broadband growth is not keeping pace with storage and computation evolution. In a number of scenarios, services and data provision should be achieved with high reactivity. This is because timeliness might be affected by unpredictable matters and real-time applications are very sensitive to performance efficiency.5.Legal aspectsLegal aspects have been very significant in recent research concerning certain applications. For instance, service providers must adapt to various international regulations. On the other hand, users should give donations in order to contribute to data collection.6.MonitoringMonitoring is a primary action in Cloud Computing when it comes to performance, managing resources, capacity planning, security, SLAs, and for troubleshooting. As a result, the Cloud-based IoT approach inherits the same monitoring demands from the Cloud, although there are still some related challenges that are impacted by velocity, volume, and variety characteristics of the IoT.rge scaleThe Cloud-based IoT paradigm makes it possible to design new applications that aim to integrate and analyse data coming from the real world into IoT objects. This requires interacting with billions of devices which are distributed throughout many areas. The large scale of the resulting systems raises many new issues that are difficult to overcome. For instance, achieving computational capability and storage capacityrequirements is becoming difficult. Moreover, the monitoring process has made the distribution of the IoT devices more difficult, as IoT devices have to face connectivity issues and latency dynamics.VII.OPEN ISSUES AND RESEARCH DIRECTIONSThis section will address some of the open issues and future research directions related to Cloud-based IoT, and which still require more research efforts. These issues include:1.StandardisationMany studies have highlighted the issues of lack of standards, which is considered critical in relation to the Cloud- based IoT paradigm. Although a number of proposed standardisations have been put forth by the scientific society for the deployment of IoT and Cloud approaches, it is obvious that architectures, standard protocols, and APIs are required to allow for interconnection between heterogeneous smart things and the generation of new services, which make up the Cloud- based IoT paradigm.2.Fog ComputingFog computing is a model which extends Cloud computing services to the edge of the network. Similar to the Cloud, Fog supply communicates application services to users. Fog can essentially be considered an extension of Cloud Computing which acts as an intermediate between the edge of the network and the Cloud; indeed, it works with latency-sensitive applications that require other nodes to satisfy their delay requirements. Although storage, computing, and networking are the main resources of both Fog and the Cloud, the Fog has certain features, such as location awareness and edge location, that provide geographical distribution, and low latency; moreover, there are a large nodes; this is in contrast with the Cloud, which is supported for real-time interaction and mobility.3.Cloud CapabilitiesAs in any networked environment, security is considered to be one of the main issues of the Cloud-based IoT paradigm. There are more chances of attacks on boththe IoT and the Cloud side. In the IoT context, data integrity, confidentiality and authenticity can be guaranteed by encryption. However, insider attacks cannot be resolved and it is also hard to use the IoT on devices with limited capabilities.4.SLA enforcementCloud-based IoT users need created data to be conveyed and processed based on application-dependent limitations, which can be tough in some cases. Ensuring a specific Quality of Service (QoS) level regarding Cloud resources by depending on a single provider raises many issues. Thus, multiple Cloud providers may be required to avoid SLA violations. However, dynamically choosing the most appropriate mixture of Cloud providers still represents an open issue due to time, costs, and heterogeneity of QoS management support.5.Big dataIn the previous section, we discussed Big Data as a critical challenge that is tightly coupled with the Cloud-based IoT paradigm. Although a number of contributions have been proposed, Big Data is still considered a critical open issue, and one in need of more research. The Cloud-based IoT approach involves the management and processing of huge amounts of data stemming from various locations and from heterogeneous sources; indeed, in the Cloud-based IoT, many applications need complicated tasks to be performed in real-time.6.Energy efficiencyRecent Cloud-based IoT applications include frequent data that is transmitted from IoT objects to the Cloud, which quickly consumes the node energy. Thus, generating efficient energy when it comes to data processing and transmission remains a significant open issue. Several directions have been suggested to overcome this issue, such as compression technologies, efficient data transmission; and data caching techniques for reusing collected data with time-insensitive application.7.Security and privacyAlthough security and privacy are both critical research issues which have received a great deal of attention, they are still open issues which require more efforts. Indeed, adapting to different threats from hackers is still an issue. Moreover, anotherproblem is providing the appropriate authorisation rules and policies while ensuring that only authorised users have access to sensitive data; this is crucial for preserving users’ privacy, specifically when data integrity must be guaranteed.VIII.CONCLUSIONThe IoT is becoming an increasingly ubiquitous computing service which requires huge volumes of data storage and processing capabilities. The IoT has limited capabilities in terms of processing power and storage, while there also exist consequential issues such as security, privacy, performance, and reliability; As such, the integration of the Cloud into the IoT is very beneficial in terms of overcoming these challenges. In this paper, we presented the need for the creation of the Cloud-based IoT approach. Discussion also focused on the Cloud-based IoT architecture, different applications scenarios, challenges facing the successful integration, and open research directions. In future work, a number of case studies will be carried out to test the effectiveness of the Cloud-based IoT approach in healthcare applications.中文译文:云计算与物联网的集成:挑战与开放问题摘要物联网(IoT)正在成为下一次与互联网相关的革命。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
物联网外文文献翻译
物联网是一个由许多设备彼此连接而形成的网络,这些设备可以是智能手机、传感器、汽车等。
物联网允许设备之间相互通信和交换数据,从而实现更智能、更高效和更安全的生活。
在物联网领域,一些外文文献对于我们的研究和研究非常有帮助。
以下是一些常见的物联网外文文献:
- "A Survey on Internet of Things From Industrial Market Perspective":这篇论文介绍了物联网的概念、应用和市场现状,并分析了物联网在未来的趋势。
- "Big Data Analytics for IoT-Based Smart Environments: A Survey":文章描述了如何使用大数据分析来处理物联网设备所产生的数据,并探讨了这种技术如何应用于智能环境中。
- "A Review of Smart Cities Based on the Internet of Things Concept":这篇综述了物联网在智慧城市中的应用,并对物联网在智慧城市化中的挑战和机遇进行了讨论。
通过阅读这些文献,我们可以更深入地了解物联网的应用、市场和发展趋势,并且了解如何将物联网技术应用到实际生活中。