Research on Internet of Vehicles and its Application in Intelligent Transportation

2013 ◽  
Vol 321-324 ◽  
pp. 2818-2821 ◽  
Author(s):  
Jian Ming Huang

At present, the transportation industry brings energy consumption, pollution and traffic congestion is becoming more and more serious, which has greatly restricted the economic and social development. This paper elaborates the concepts of Internet of things, intelligent transportation, and Internet of vehicles; Internet of vehicles based on Internet of Things technology is considered as an effective method to solve road congestion. The key technologies of the Internet of vehicles include traffic information perception technology, network communication technology, and cloud computing technologies etc. among them, radio frequency identification technology, sensor technology, floating car data technology, and GPS positioning technology are the focus. Application of Internet of vehicles is discussed, and its future development is prospected.

2020 ◽  
Author(s):  
Islam Saleh Hassanin

The road traffic congestion has become an excessive problem and a great pressure on both the governmental and social aspects especially in megacities. Hence, developing control systems that administrate the traffic flows is a vigorous solution, which can solve the problem of traffic congestion especially in megacities that should convert their services to be smart. The Intelligent Transport System (ITS) one of the Internet of Things (IoT) applications that provides a group of pioneer schemes for handling the challenges of traffic congestion. Traditionally, sensor-based structures have been used for gathering traffic information, but the coverage, cost, and real-time matters have remained unexplained. Thus, this paper aims at proposing a new model named Traffic Flow Optimization Model (TFOM) applied in Alexandria as a case study, which is considered a cost-effective and easily maintainable traffic congestion minimization method. It combines Infra-Red (IR) and active Radio Frequency Identification (RFID) technologies. TFOM is designed to minimize traffic congestion, given reroute options to the users, taken decisions regarding congestion, and finally it could be an initial step to help future predictions in linear megacities.


2012 ◽  
Vol 203 ◽  
pp. 139-141 ◽  
Author(s):  
Wen Ding

the IOT (Internet of Things) technology is another major breakthrough in the contemporary information technology, a new information technology outcome after the computer and Internet technology which is very important to change the way of our future life and production. This paper studies the composing principles of the IOT system and analyzes the application of RFID (radio frequency identification) technology in the IOT in detail.


2014 ◽  
Vol 513-517 ◽  
pp. 2050-2053 ◽  
Author(s):  
Gui Xin Zhao ◽  
Bei Qi

The internet of things technology is applies to the management of universities multimedia classroom in an effort to reach the network, information technology and intelligent management. The radio frequency identification technology and sensor technology are used in the management of university multimedia classrooms, and explains the information stored in the teacher RFID, student RFID card and the property staff RFID card, finally make a detail analysis of the implementation of Access management multimedia device management and the control of electric and heating in the application of the IOT technology in the intelligent management of university multimedia classrooms.


2014 ◽  
Vol 687-691 ◽  
pp. 2494-2496
Author(s):  
Kai Liu ◽  
Lu Lv

with the development of computer technology, network communication technology and multimedia technology, multimedia teaching has being widely used, especially in colleges and universities.This paper emphatically presented the application situation of radio frequency identification technology (RFID) and wireless sensor network technology (WSN) in internet of things technology in the existing problems of multimedia teaching equipment management, and explored its application effect.


Author(s):  
Jordan Frith

The phrase the Internet of things was originally coined in a 1999 presentation about attaching radio frequency identification (RFID) tags to individual objects. These tags would make the objects machine-readable, uniquely identifiable, and, most importantly, wirelessly communicative with infrastructure. This chapter evaluates RFID as a piece of mobile communicative infrastructure, and it examines two emerging forms: near-field communication (NFC) and Bluetooth low-energy beacons. The chapter shows how NFC and Bluetooth low-energy beacons may soon move some types of RFID to smartphones, in this way evolving the use of RFID in payment and transportation and enabling new practices of post-purchasing behaviors.


2018 ◽  
Vol 14 (8) ◽  
pp. 155014771879512 ◽  
Author(s):  
Madiha Khalid ◽  
Umar Mujahid ◽  
Muhammad Najam-ul-Islam

Internet of Things is one of the most important components of modern technological systems. It allows the real time synchronization and connectivity of devices with each other and with the rest of the world. The radio frequency identification system is used as node identification mechanism in the Internet of Thing networks. Since Internet of Things involve wireless channel for communication that is open for all types of malicious adversaries, therefore many security protocols have been proposed to ensure encryption over wireless channel. To reduce the overall cost of radio frequency identification enabled Internet of Thing network security, the researchers use simple bitwise logical operations such as XOR, AND, OR, and Rot and have proposed many ultralightweight mutual authentication protocols. However, almost all the previously proposed protocols were later found to be vulnerable against several attack models. Recently, a new ultralightweight mutual authentication protocol has been proposed which involves only XOR and Rotation functions in its design and claimed to be robust against all possible attack models. In this article, we have performed cryptanalysis of this recently proposed ultralightweight mutual authentication protocol and found many pitfalls and vulnerabilities in the protocol design. We have exploited weak structure of the protocol messages and proposed three attacks against the said protocol: one desynchronization and two full disclosure attacks.


Author(s):  
Yuqiao YANG ◽  
Kanhua YU

Internet of Things technology and industrial development will trigger a new round of information technology revolution and industrial revolution, and they are the commanding point of future competition in information industry and core driving force of industrial upgrade. This paper introduces current situation of distance teaching of Internet of Things and architecture specialties, designs and implements distance teaching experiment system platform for architecture specialty based on Internet of Things. This system is based on ZigBee /GPRS wireless network technology, sensor technology, embedded technology, Web distributed software technology and database technology. Besides, it adopts three interlinked networks and achieves efficient connection of multiple experiment terminals, servers and clients. As well, the information exchange is fast. Hence, it is convenient for practical application of distance teaching. The results of teaching experiment show that Internet of Things technology can improve students’ academic performance and teachers’ teaching effect. Therefore, it is a hot spot in modern teaching technology, so we should pay attention to it.


Author(s):  
Sini-Kaisu Kinnunen ◽  
Antti Ylä-Kujala ◽  
Salla Marttonen-Arola ◽  
Timo Kärri ◽  
David Baglee

The emerging Internet of Things (IoT) technologies could rationalize data processes from acquisition to decision making if future research is focused on the exact needs of industry. This article contributes to this field by examining and categorizing the applications available through IoT technologies in the management of industrial asset groups. Previous literature and a number of industrial professionals and academic experts are used to identify the feasibility of IoT technologies in asset management. This article describes a preliminary study, which highlights the research potential of specific IoT technologies, for further research related to smart factories of the future. Based on the results of literature review and empirical panels IoT technologies have significant potential to be applied widely in the management of different asset groups. For example, RFID (Radio Frequency Identification) technologies are recognized to be potential in the management of inventories, sensor technologies in the management of machinery, equipment and buildings, and the naming technologies are potential in the management of spare parts.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Tingting Tan

In today’s globalized situation, people on the one hand enjoy the great convenience brought by the Internet and artificial intelligence Internet of Things (IoT) technology, and, on the other hand, they are also inevitably subject to a series of harms brought by network technology. Internet economic crime is a new type of crime based on Internet technology. Criminals use Internet technology to conduct illegal visits and Trojan horse program attacks, steal user information, and defraud victims of money. This has resulted in the people’s personal and property safety and social harmony and stability. Strictly cracking down on cyber economic crimes in accordance with the law is of great significance to safeguarding the interests of the people and maintaining social stability. However, as the methods and forms of cyber economic crimes emerge endlessly, it is very important to collect intelligence information on such crimes. This paper proposes using the sensor technology, embedded system technology, radio frequency automatic identification technology, and cloud computing technology in artificial intelligence Internet of Things technology to design and build a data-mining-based network economic crime intelligent information aggregation collection system to realize network economic crime intelligence of aggregation and analyze and help combat cyber economic crimes. This article takes cyber economic crime cases in various cities in our province as an example, selects 9 cyber economic criminals’ intelligence information as sample data, and tests and applies the designed cyber economic crime intelligence information system. The final results show that the numbers of cyber economic crime cases in four cities A, B, C, and D in four provinces are roughly the same, but city A has the largest number; the minimum confidence of the 9 criminals is above 0.60, indicating that the economic crimes of cyber economic criminals are related to their academic background and family status and criminal history are related to a certain extent; illegal fund-raising fraud and online credit card fraud account for the largest proportion of the four cities and are currently the main forms of online economic crime.


2021 ◽  
pp. 1-10
Author(s):  
Jintao Tang ◽  
Lvqing Yang ◽  
Jiangsheng Zhao ◽  
Yishu Qiu ◽  
Yihui Deng

With the development of the Internet of Things and Radio Frequency Identification (RFID), indoor positioning technology as an important part of positioning technology, has been attracting much attention in recent years. In order to solve the problems of low precision, high cost and signal collision between readers, a new indoor positioning algorithm based on a single RFID reader combined with a Double-order Gated Recurrent Unit (GRU) are proposed in this paper. Firstly, the reader is moved along the specified direction to collect the sequential tag data. Then, the tag’s coordinate is taken as the target value to train models and compare them with existing algorithms. Finally, the best Gated Recurrent Unit positioning model is used to estimate the position of the tags. Experiment results show that the proposed algorithm can effectively improve positioning accuracy, reduce the number of readers, cut down the cost and eliminate the collisions of reader signals.


Sign in / Sign up

Export Citation Format

Share Document