A weapon control model based on Huawei's Internet of Things technology
Abstract
IoT is a new type of technology that continues to appear with the development of the "Internet +". The computer technology of the Internet of Things is being popularized in the field of public safety, environmental protection, intelligent transport, as well as people's lives and work. The widespread use of computer technology of the Internet of Things has really led to huge achievements and breakthroughs in all spheres of life in my country. Thanks to advanced technology, ease of use and higher efficiency, it has gradually received strong support and development from various countries. Can say, that our society has now entered the era of the computer Internet of Things with "Internet +" as the background.
Huawei is the main initiator of the development of the global Internet of Things industry. She is a major member of a number of industry organizations/industry alliances around the world, as well as the initiator of the AIoT Industry Alliance. She has made an active contribution to industry standards and industry norms. Huawei uses its own technical capabilities to play an important role in the field of the Internet of Things and contribute to the rapid development of the Internet of Things industry.
With the continuous development of national defense enterprises in various countries, the combination of new Internet technologies with the traditional construction of national defense has become a new trend in the development of national defense enterprises. The purpose of this article is to use Huawei's Internet of Things solutions to offer a new model of modern weapon control.Full Text:
PDF (Russian)References
Gubbi J, Buyya R, Marusic S, Palaniswami M.” Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems-the International Journal of Grid Computing and Escience”., 2013; 29(7): 1645–1660
Borgia E. “The Internet of Things vision: Key features, applications and open issues. Computer Communications”, 2014; 54: 1–31.
Liu Pei, “WMS: RFID Based Weapon Management System”.Advanced Materials Research (Volumes 452-453), doi:https://doi.org/10.4028/www.scientific.net/AMR.452-453.386
Blake Ives,Gerard P. Learmonth, Authors Info & Claims The information system as a competitive weapon.Communications of the ACMVolume 27Issue 12Dec. 1984 pp. doi::1193-1201.https://doi.org/10.1145/2135.2137
ZHNG Xiaomei, XIAO Meihua, ZHANG Tong, YANG Ke, LUO Yunxian. Proving Mutual Authentication Property of RCIA Protocol in RFID Based on Logic of Events[J]. Chinese Journal of Electronics, 2022, 31(1): 79-88. doi: 10.1049/cje.2021.00.101
R. Want, “An introduction to RFID technology”Publication: IEEE Pervasive . Computing.Publisher: IEEE.Date: Jan.-March 2006
Xiaochun Wang, “Analysis of thread schedulability in Huawei LiteOS” MATEC Web Conf.Volume 336, 2021.2020 2nd International Conference on Computer Science Communication and Network Security (CSCNS2020)
Le Cai, Jianjun Chen.Jun Chen, Yu Chen.Kuo rong Chiang, Marko Dimitrijevic, Yonghua Ding "Fusion insight librA: huawei's enterprise cloud data analytics platform".Proceedings of the VLDB EndowmentVolume 11Issue 12August 2018 pp
Lane, Roger, Violent Death in the City: Suicide, Accident, and Murder in Nineteenth-Century Philadelphia. Ohio State University Press. 1999. ISBN 0-8142-5021-1
Murder, “Types of Weapons Used Percent Distribution within Region”, 2005. Federal Bureau of Investigation
Ericsson, Uen 284 23-3278, Cellular networks for massive IoT, Jan., 2016.Available: https://www.ericsson.com/res/docs/whitepapers/wp_iot.pdf Google Scholar
Rapeepat Ratasuk; Benny Vejlgaard; Nitin Mangalvedhe; Amitava Ghosh."NB-IoT system for M2M communication"Publisher: IEEE. vol.15 Sep 2016. DOI: 10.1109/WCNC.2016.7564708
Kapil Bakshi,“Considerations for big data: Architecture and approach”. Published in: 2012 IEEE Aerospace Conference
Refbacks
- There are currently no refbacks.
Abava Кибербезопасность IT Congress 2024
ISSN: 2307-8162