PPNA special issue on "the green, reliability and security of machine-to-machine communications"

نویسندگان

  • Xu Li
  • Xiaodong Lin
  • Wenye Wang
  • Nathalie Mitton
چکیده

Machine-to-machine communications is an emerging technology that realizes a system of networks, wireless or wired, possibly distributed across the world, for transmitting events captured by low-end machines such as sensors and smart meters to high-end applications and/or personal appliances, where the events are translated into meaningful information. It embraces several major research fields including wireless sensor networks, vehicular networks, smart grid and RFID, and enables future ubiquitous computing environment. Unlike current world-scale human-centric 3G wireless networks, M2M communication network is characterized by the absence of direct human intervention and the rapid increase in size and is therefore imposed with unique requirements.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies

The increasing volatility in pricing and growing potential for profit in digital currency have made predicting the price of cryptocurrency a very attractive research topic. Several studies have already been conducted using various machine-learning models to predict crypto currency prices. This study presented in this paper applied a classic Autoregressive Integrated Moving Average(ARIMA) model ...

متن کامل

Maintenance and Work-rest Scheduling in Human-machine System According to Fatigue and Reliability

Most manufacturers use human-machine systems to produce high-quality products. Dealing with human-machine systems is very complicated since not only machines should be utilized in proper condition but also appropriate environment should be provided for human resources. Most manufacturers have a maintenance plan for machines but many of them do not have a proper work-rest schedule for human reso...

متن کامل

Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors

Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion detection systems is managing of the large amount of network traffic features. Removing un...

متن کامل

An improved memetic algorithm to minimize earliness–tardiness on a single batch processing machine

In this research, a single batch processing machine scheduling problem with minimization of total earliness and tardiness as the objective function is investigated.We first formulate the problem as a mixed integer linear programming model. Since the research problem is shown to be NP-hard, an improved memetic algorithmis proposed to efficiently solve the problem. To further enhance the memetic ...

متن کامل

A One-Stage Two-Machine Replacement Strategy Based on the Bayesian Inference Method

In this research, we consider an application of the Bayesian Inferences in machine replacement problem. The application is concerned with the time to replace two machines producing a specific product; each machine doing a special operation on the product when there are manufacturing defects because of failures. A common practice for this kind of problem is to fit a single distribution to the co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Peer-to-Peer Networking and Applications

دوره 7  شماره 

صفحات  -

تاریخ انتشار 2014