001484261 000__ 06964cam\\2200577\a\4500 001484261 001__ 1484261 001484261 003__ OCoLC 001484261 005__ 20240117003318.0 001484261 006__ m\\\\\o\\d\\\\\\\\ 001484261 007__ cr\un\nnnunnun 001484261 008__ 231125s2023\\\\si\\\\\\ob\\\\000\0\eng\d 001484261 019__ $$a1410514913$$a1410593995 001484261 020__ $$a9789819957323$$q(electronic bk.) 001484261 020__ $$a981995732X$$q(electronic bk.) 001484261 020__ $$z9819957311 001484261 020__ $$z9789819957316 001484261 0247_ $$a10.1007/978-981-99-5732-3$$2doi 001484261 035__ $$aSP(OCoLC)1410561551 001484261 040__ $$aYDX$$beng$$cYDX$$dOCLCO$$dGW5XE$$dEBLCP$$dOCLCO 001484261 049__ $$aISEA 001484261 050_4 $$aTS183 001484261 08204 $$a670.427$$223/eng/20231212 001484261 1001_ $$aDou, Wanchun. 001484261 24510 $$aIntelligent industrial internet systems :$$barchitecture, deployment and applications /$$cWanchun Dou, Xiaolong Xu, Shui Yu. 001484261 260__ $$aSingapore :$$bSpringer,$$c2023. 001484261 300__ $$a1 online resource 001484261 504__ $$aIncludes bibliographical references. 001484261 5050_ $$aIntro -- Preface -- Acknowledgment -- Contents -- About the Authors -- Chapter 1: Introduction -- 1.1 Industrial Internet-Centric Intelligent Resources Scheduling -- 1.1.1 Related Work -- 1.1.2 Edge-Enabled IoT Service Orchestration Framework -- 1.1.3 Problem Formulation for Optimal Resource Allocation -- 1.2 Industrial Internet-Centric Privacy and Security -- 1.2.1 Security-Enforcement Technique -- 1.2.1.1 Securing Edge-Enabled from Attacks -- 1.2.1.2 Vulnerabilities of Edge-Enabled IoT -- 1.2.1.3 Edge-Enabled IoT Traffic Scenario -- 1.2.1.4 System Modeling and Analysis 001484261 5058_ $$aLink Selection Module -- Attack Detection Module -- Malicious Flow Interception Module -- 1.2.2 Privacy-Preserving Technique -- 1.2.2.1 Related Work and Motivation Analysis -- 1.2.2.2 System Modeling and Analysis -- Components -- Architecture -- Authentication Mechanism -- 1.2.2.3 Working Principle of the Proposed Technique -- 1.3 Introduction to Business Process Management -- 1.3.1 Business Process Management (BPM) -- 1.3.2 The Benefits and Drivers -- 1.3.3 The Process Lifecycle and Methodologies -- 1.3.4 Challenges and Best Practices in BPM -- 1.4 Summary -- References 001484261 5058_ $$aChapter 2: Architecture of Industrial Internet-Centric BPM -- 2.1 Mobile Industrial Internet-Centric BPM -- 2.1.1 Introduction -- 2.1.2 Server Selection Example -- 2.1.2.1 Formulation of Server Selection Problem -- 2.1.2.2 Architecture -- 2.2 Resources Deployment in BPM -- 2.2.1 Introduction -- 2.2.2 Architecture -- 2.3 Business Process Scheduling Problem -- 2.3.1 Introduction -- 2.3.2 Architecture for Business Process Scheduling Problem -- 2.4 Summary -- References -- Chapter 3: Industrial-Metadata Intelligent Service for Geo-Distributed File System 001484261 5058_ $$a3.1 Metadata Service in Geo-Distributed File System -- 3.2 Industrial Distributed Virtual Edge Data Center -- 3.3 Intelligent Metadata Service for Industrial Edge Data Center -- 3.4 Analysis of Industrial-Metadata Intelligent Service -- 3.5 Summary -- References -- Chapter 4: Intelligent Cooperation Technology for Multi-Access Device -- 4.1 D2D Cooperation in Multi-Access Transmission Network -- 4.2 Device Selection During Cooperative D2D Transmission -- 4.3 Dynamic Intelligent Decision in Multi-Path Parallel Transmission -- 4.4 Intelligent Multi-Access Device Cooperation in Multi-Path Network 001484261 5058_ $$a4.5 Summary -- References -- Chapter 5: Deep Optimization for Storage and Computation Over Industrial Internet -- 5.1 Deep Learning-Empowered Industrial Internet -- 5.2 Attentive Model Compression for Deep Learning Model -- 5.3 Computation Sharing Across Multi-Application -- 5.4 Deep Optimization for Industrial Applications -- 5.5 Summary -- References -- Chapter 6: User Data Privacy Protection in Industrial Application -- 6.1 Location Data Privacy of User Over Industrial Internet -- 6.2 Adversary Against Location Data Privacy of User -- 6.2.1 Adversary Type -- 6.2.2 Adversary Behavior 001484261 506__ $$aAccess limited to authorized users. 001484261 520__ $$aIn the process of transforming modern manufacturing into intelligent manufacturing, more and more manufacturing processes are being deployed digitally on the Internet. As a novel digital industrial infrastructure and new application ecology, Industrial Internet could integrate the novel information and communication technology into various industrial manufacturing processes, through the safe and reliable intelligent interconnection of factors concerning people, machines and things. It aims at significantly improving the digitalization, networking and intelligence of manufacturing processes through the comprehensive interconnection of all manufacturing factors. To deploy and run traditional manufacturing processes on Industrial Internet efficiently, corresponding digital technical means are called for. These technical means play an important role in many potential applications of intelligent manufacturing, e.g. integrating product lifecycle data, strengthening industrial chain cooperation, providing decision-making service information oriented on the production organization process, and providing data support for product optimization and upgrading. This book focuses on the theory, techniques and means for integrating intelligent Industrial Internet applications deployed via mobile edge computing. Concretely, it mainly studies the intelligent theory, techniques and means from a problem-driven and demand-driven perspective, which supports collaborative design, agile manufacturing, remote operation and maintenance on Industrial Internet. These technologies primarily include Industrial Internet-centric intelligent resource scheduling methods, various types of industrial data privacy protection, intelligent version management technologies supporting digital twin applications, various data mining algorithms for intelligent execution of business processes, etc. Given its scope, the book offers a valuable theoretical and technical resource for project managers, technical developers, researchers, educators and students at colleges and universities. 001484261 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed December 12, 2023). 001484261 650_6 $$aFabrication$$xAutomatisation. 001484261 650_6 $$aCommande intelligente. 001484261 650_0 $$aManufacturing processes$$xAutomation.$$xComputer simulation$$0(DLC)sh2010100513 001484261 650_0 $$aIntelligent control systems. 001484261 655_0 $$aElectronic books. 001484261 7001_ $$aXu, Xiaolong. 001484261 7001_ $$aYu, Shui$$c(Computer scientist) 001484261 77608 $$iPrint version: $$z9819957311$$z9789819957316$$w(OCoLC)1390678385 001484261 852__ $$bebk 001484261 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-99-5732-3$$zOnline Access$$91397441.1 001484261 909CO $$ooai:library.usi.edu:1484261$$pGLOBAL_SET 001484261 980__ $$aBIB 001484261 980__ $$aEBOOK 001484261 982__ $$aEbook 001484261 983__ $$aOnline 001484261 994__ $$a92$$bISE