Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Workplace Violence Prevention using Security Robots
Guest editors: Priyan Malarvizhi Kumar, Hari Mohan Pandey and Gautam Srivastava
Article type: Research Article
Authors: Pingli, Duana; * | Muthu, Bala Anandb | Kadry, Seifedine Nimerc
Affiliations: [a] Business School, Northwest University of Political Science and Law, Xi’an, China | [b] V.R.S. College of Engineering & Technology, Villupuram, India | [c] Beirut Arab University, Beirut, Lebanon
Correspondence: [*] Address for correspondence: Duan Pingli, Business School, Northwest University of Political Science and Law, Xi’an 710122, China. E-mail: [email protected].
Abstract: BACKGROUND:The manufacturing industry undergoes a new age, with significant changes taking place on several fronts. Companies devoted to digital transformation take their future plants inspired by the Internet of Things (IoT). The IoT is a worldwide network of interrelated physical devices, which is an essential component of the internet, including sensors, actuators, smart apps, computers, mechanical machines, and people. The effective allocation of the computing resources and the carrier is critical in the Industrial Internet of Things (IIoT) for smart production systems. Indeed, the existing assignment method in the smart production system cannot guarantee that resources meet the inherently complex and volatile requirements of the user are timely. Many research results on resource allocations in auction formats which have been implemented to consider the demand and real-time supply for smart development resources, but safety privacy and trust estimation issues related to these outcomes are not actively discussed. OBJECTIVES:The paper proposes a Hierarchical Trustful Resource Assignment (HTRA) and Trust Computing Algorithm (TCA) based on Vickrey Clarke-Groves (VGCs) in the computer carriers necessary resources to communicate wirelessly among IIoT devices and gateways, and the allocation of CPU resources for processing information at the CPC. RESULTS:Finally, experimental findings demonstrate that when the IIoT equipment and gateways are valid, the utilities of each participant are improved. CONCLUSION:This is an easy and powerful method to guarantee that intelligent manufacturing components genuinely work for their purposes, which want to integrate each element into a system without interactions with each other.
Keywords: Safety, privacy, trustfulness, VGC’s, IoT, CPU
DOI: 10.3233/WOR-203429
Journal: Work, vol. 68, no. 3, pp. 955-965, 2021
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]