Академический Документы
Профессиональный Документы
Культура Документы
Lu Tan
Neng Wang
forms
human-human,
M2M).This
will
expand
human-thing
will
bring
and
new
from
human-human
thing-thing
ubiquitous
(also
to
called
computing
and
Identification
techniques
(RFID)
and
roove
Nghl
'Daytime
On the
related
On the
Outdoors
roove
AI the
of the
Internet of Things.
Then
we
give
our
Figure 1.
A new dimension
0/
Things;
M2M;
RFID;
ubiqutious
I.
INTRODUCTION
V5-376
2010
TecIvloiogy Reach
Miniilturiz::rtioo, power.
effie ent electronics: ar.d
avai'abIB speClrum -----
r.eoper,tio, and
t.,pr"nC8: Abii ro
inDoors to recerJe
geoloc3tioosinals
__
:-
Cost reductolllcLldinaa
to diffusion Into
Wi1ve of applicatil)'rS
Web
-y objec
- --II ::;ver)Ila
___ -<III'
200 ;....
dsnl obI<ds
....
...III = -- Physical-World
Ubiquitous Positioning
Surveilance, security,
hl!"l!lK:;m!.II;UlsllIl,
1oocJ,,1.'y, """menl
m'_
n ,_
'g m _. n_
' _ ----' V8rtica ..:\4ark91 Applicafions
..._
Ocrn3l"<l'orcxpc<li:ed
t.Qistics
RFIDIag.,or
IJCiilatingrouting,
invcnl
Trends
p'evenloo
SJpply.Choin Hdpcrs
21100
2010
Figure 2.
II.
2020
TilJlH
ARCHITECTURE
V5-377
2010
Network
supported services
Interrogator I
Wider area
Gateway
communications
device
and Networks
Middleware layer
Interrogator I
Gateway
device
Physical
Edgetechnology data
Application commands
interface zone
and responses
Figure 5.
Figure 3.
r--.L-1
I nterrogator I
Gate way
data
device
ACtuC 1
r,
Host
Information
Wider area
communications
and Networks
Sensory data
Figure 4.
Figure 6.
V5-378
Internet of Things
2010
III.
Information
World
Application Layer
Communication Manager
Middleware Layer
Wi-Fi
Coordination Layer
Communication Manager
Existed alone
Access Layer
Application
System
Edge Technology
Layer
Figure 8.
Figure 7.
V5-379
2010
Security and
some air conditions. We can see that all actions can be done
automatically without human intervention. And we can use
energy more efficiently by this method. In addition, by
analyzing the data we can know the maintenance situation of
facilities and if there is potential problems we could do some
particular actions in advance to avoid damage happening.
IV.
Privacy
Protection
DISCUSSION
Figure 9.
V.
CONCLUSIONS
and
make
decisions
by
themselves.
The
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
www.wikipedia.com
V5-380