Abstract

This research uses Auto-ID Labs radio frequency identification system to realize the information dissemination from the destination node to the nodes in its neighborhood. The purpose is to forward messages and explore typical applications. Realize the intelligent analysis and management of IoT devices and data. Design a set of edge video CDN system, in the G1 data set A = 9, p = 9, ℤp = 9, lℤp = 8, AES = 5, ES = 9. Distribute some hot content to public wireless hotspots closer to users in advance, A = 9, p = 7, ℤp = 9, lℤp = 9, AES = 9, ES = 8. At present, a large amount of research is mainly to deploy an edge node between the end node of the Internet of Things and the cloud computing center to provide high-quality services. By learning a stable dynamic system from human teaching to ensure the robustness of the controller to spatial disturbances. FPP-SCA plan FPP-SCA = 1.99, FPP-SCA = 1.86, FPP-SCA = 1.03, FPP-SCA = 1.18, FPP-SCA = 1.01, FPP-SCA = 1.46, FPP-SCA = 1.61.The more robots work in an unstructured environment, with different scenarios and tasks, the comparison shows that the FPP-SCA scheme is the optimal model F-S0 = 2.52, F-S5 = 2.38, F-S10 = 2.5, F- S15 = 2.09, F-S20 = 2.54, F-S25 = 2.8, F-S30 = 2.98.

1. Introduction

The Internet of Things (IoT) connects various sensors to the Internet to realize the intelligent analysis and management of Internet of Things equipment and data. Information dissemination of nodes in the neighborhood. Its concept was formally confirmed in the report of the 2005 International Telecommunication Union World Summit on the Information Society. Point out that the node that will receive this message performs intelligent analysis and manages the broadcast data message. The node receiving this message judges whether it is between the destination node and the source node [13]. In the first stage, the message is forwarded, mainly for the purpose of exploring typical applications. At this stage, the data is sensed and obtained by the information terminal node of the Internet of Things, and is transmitted to an independent and centralized data center for processing through the energy multi-path protocol multi-hop mode. However, due to the limitation of node energy and communication energy consumption technology at this stage, a large number of node energy and communication energy consumption applications cannot be implemented well. For example, the clustered hierarchical deployment algorithm adopted by the wireless sensor network cannot undertake the real-time transmission of large-capacity data such as video data. Only by controlling the routing hop count to avoid the loss of transmission data [46]. The information is transmitted to the cluster head in the communication time slot, and the cluster head collects a small amount of data such as humidity. And during large-scale deployment, the difficulty of application deployment, development, and debugging has increased significantly. In terms of the number of nodes, the total installed capacity of the energy multi-path routing protocol global Internet of Things equipment is about 9.1 billion, and it will reach 28.1 billion later. With the emergence of a new computing model of transmission path control edge computing and the development of hardware, the development of the Internet of Things has entered a new stage in order to solve the growing problems of Internet of Things data and meet the needs of low-latency services. In the stage of clustering edge node algorithm with better real-time performance, the edge node protocol is introduced into the optimization step system. The IoT data computing tasks originally deployed in the cloud computing center are migrated to hierarchical energy multi-path sensing nodes and edge nodes. IoT data is processed at the edge of the network, and only a small amount of data needs to be transmitted to the cloud computing center for final analysis and storage. The operation of the task design process of the online scheduling algorithm of the robot mobile node can be divided into: grasping, palletizing, polishing, polishing, welding, and dispensing according to the task type. However, at the execution level of the robot, an important problem is the task conflict between mobile nodes. The most basic and common operation skills can be divided into point-to-point motion (corresponding task scenarios include palletizing, grabbing, and placing, etc.), which is the intelligent analysis of multi-threaded tasks in the scene when access conflicts occur in the online scheduling algorithm. Select and perform algorithmic scheduling on nodes. Trajectory tracking movement (corresponding task scenarios include welding, dispensing, etc.), and game theory is commonly used to solve the problem of trajectory tracking movement conflicts. Smooth motion with mixed force and position (corresponding task scenes include polishing, sanding, etc.) [713]. The study of robot point-to-point motion learning is based on visually guided hand-eye coordinated motion. Point motion algorithm status For intelligent multi-purpose robots, the online scheduling algorithm of mobile nodes can be realized by executing a set of pre-programmed actions. However, it is not enough to rely on the execution of a set of pre-programmed actions or behaviors of the point motion algorithm, once disturbances (such as deviations of position and displacement) occur. The robot’s operation task may fail due to calculation errors in positioning. Robot demonstration teaching involves learning the corresponding task scenes, including visually guided object grabbing and assembly. Teaching gives the robot basic skills in teaching (dragging teaching, remote operation teaching, and observation (video, image teaching information extraction) teaching, etc.). The ability to learn how to perform teaching tasks in the online scheduling algorithm of mobile nodes in the game theory method. The control strategy completes formation maintenance [1315]. The biggest difference between this method and the traditional method is that it avoids the situation of large transmission delay, and the clustering algorithm has better real-time performance. The dynamic system (DS) modeling the robot motion is to allow the robot to understand and comprehend a certain operation skill, and still have a certain generalization ability to perform motion coding under new conditions, not just simple repetition. The dynamic energy multi-path routing protocol system is used to encode the robot motion characteristics. It allows the discarded message to adapt to changes in the dynamic environment, and reproduce the movement taught in the optimization step, following the path defined by the pre-forwarding node’s measurement standard. Many scholars use dynamic systems to control the formation of nodes through the optimal data transmission path of the machine. Introduce node energy and communication energy consumption as hand-eye coordinated movement based on visual guidance. Choosing the number of hops avoids the situation where the task scene has a large transmission delay for visually guided objects to grab and transmit. Point-to-point motion clustering algorithm with better real-time performance, using trajectory tracking motion formation control strategy to complete formation maintenance. The compliant motion of force and position mixing is based on clustering, and the hierarchical algorithm divides the signal network into several clusters based on visual guidance of hand-eye coordinated motion according to a certain rule. Learning method and intelligent control technology The cluster transmits information by the cluster head and the communication time slot within the cluster.

2. Dynamic Architecture of IoT Technology

2.1. Architecture of Dynamic Secure Collaborative Computing Method under VECA

The architecture of the dynamic secure computing method includes virtual edge nodes composed of application management, task management, security management, and message systems. Common nodes composed of security management and instance management, virtual edge nodes and common nodes realize interconnection and intercommunication. The dynamic security calculation method transmits information to the virtual edge node in the corresponding security management and instance management communication time slots. After collecting and fusing information between ordinary nodes, it is transmitted to task management. The virtual edge node has a heavier load than other nodes. After a round of data transmission is completed, a new round of secure calculation method architecture will be performed to balance energy consumption. As shown in Figure 1.

2.2. General Process Based on CNN Training and Testing

The CNN training and testing method is to realize the collection of data samples through the online scheduling algorithm of mobile nodes. Resolve task conflicts between mobile nodes on the training set and data validation set encountered during the design process. Access conflicts caused by task conflicts between mobile nodes are imported into the CNN model for training and new test set collection, the results are classified and verified, and the correctness and error rates of the results are verified. The method often involved in resolving conflicts is the line scheduling algorithm. It mainly includes the application of analyzing wireless sensor networks to model the interaction between players with conflicting interests. To compete for limited network resources such as energy and bandwidth. as shown in Figure 2.

2.3. Joint Transmission of Information and Power

The battery capacity of wireless information and power combined transmission sensor equipment is limited. In order to save costs and facilitate the distribution of its battery capacity, the battery capacity is usually relatively small, and it is inconvenient to replace the battery, which may be dangerous, costly, and sometimes not feasible. In the natural environment, energy exists in many forms, is widely distributed, and has infinite supply. It can be obtained, developed and utilized in large quantities without any extra effort. However, the implementation of energy harvesting technology is not simple. In order to effectively convert energy and effectively use energy, many factors need to be considered. Since each dimension is separated in the modeling process, it is difficult to generalize a learned dynamic system to other different shapes of motion. The stability estimation of dynamic system (SEDS) method is to ensure the robustness of the controller to spatial disturbances by learning a stable dynamic system from human teaching. SEDS uses Gaussian mixture model to model the motion, and ensures the global asymptotic stability of the dynamic system by introducing stability constraints derived from the Lyapunov function. The SEDS method provides a theoretical framework to ensure the global asymptotic stability of the learning dynamic system. This method has certain reference significance for solving the robustness problem of the nonlinear dynamic system.

3. Application of IoT Technology in Smart Robots

3.1. FPP-SCA [1619]

Information dissemination from the destination node to the nodes in its neighborhood

CDN system

IoT devices

Intelligent analysis of IoT data

The Internet of Things in the Cloud Computing Center

3.2. SNRS [2023]

Robot execution layer

Hierarchical energy multipath perception

Intelligent sorting

Intelligent management of IoT data

3.3. SDR [24, 25]

Robot demonstration teaches learning

Robot trajectory tracking

Edge computing

Robot teaches from

4. Simulation Experiment

4.1. Edge Computing

The research work of edge computing revolves around data downlink services. A set of edge video CDN system is designed, in the G1 data set A = 9, p = 9, ℤp = 9, lℤp = 8, AES = 5, ES = 9. Distribute some hot content to public wireless hotspots closer to users in advance, A = 9, p = 7, ℤp = 9, lℤp = 9, AES = 9, ES = 8. At present, a large amount of research is mainly to deploy an edge node between the end node of the Internet of Things and the cloud computing center to provide high-quality services. As shown in Table 1 and Figure 3.

4.2. TSP Algorithm

Regarding the multi-route IoT nested non-cooperative problem, even if it is not a large-scale network individual, it may be selfish. The number of variables is also very large, and the solution is in the best interest. It is very difficult to directly deviate from the established solution. The conversion to the energy-constrained TSP algorithm is to convert the refusal forwarding mTSP into the standard freight forwarding dilemma TSP, which can solve the pure strategy set Si and the revenue function µi. The algorithm designed for TSP can solve it by deviating from the Nash equilibrium. The basic parameter variables are shown in Table 2 and Figure 4.

4.3. Data Values of Different Scenarios

Energy model In order to effectively complete the data transmission and charging tasks of the sensor node, the mobile node needs to reach the sensor node for energy replenishment before the sensor node does not have enough power to continue working. In the FPP-SCA scheme, β = 0.3 SNRs is 0.21, β = 0.5 SNRs is 0.29, β = 0.7 SNRs is 0.19, β = 0.3 SNRs is 0.08, β = 0.5 SNRs is 0.79, β = 0.7 SNRs is 0.89. When a sensor node receives a beacon signal from a mobile node in the distance-based energy loss model, according to the strength of the beacon signal, the distance required for the sensor node to send data to the mobile node can be estimated. When β = 0.3, the SNRs is 0.77, When β = 0.5, SNRs is 0.71, when β = 0.7, SNRs is 0.63, when β = 0.3, SNRs is 0.3, when β = 0.5, SNRs is 0.79, and when β = 0.7, SNRs is 0.68. As shown in Table 3 and Figure 5.

The location of sensor nodes can be known in advance. Independent scheme, FPP-SCA scheme, low-complexity scheme, SDR scheme. These nodes are used as relays to collect the information monitored by the static nodes and charge these sensor nodes. In the independent scheme, S = 0, ID = 1.51, S = 5, ID = 1.47, S = 10, ID = 1.98, S = 15, ID = 1.92, S = 20, ID = 1.77, S = 25, ID = 1.09. By learning a stable dynamic system from human teaching to ensure the robustness of the controller to spatial disturbances. FPP-SCA scheme FPP-SCA = 1.99, FPP-SCA = 1.86, FPP-SCA = 1.03, FPP-SCA = 1.18, FPP-SCA = 1.01, FPP-SCA = 1.46, FPP-SCA = 1.61. As shown in Table 4 and Figure 6.

4.4. Model Comparison

Comparing the independent scheme, FPP-SCA scheme, low complexity scheme, and SDR, it is found that the global asymptotic stability can ensure that the system responds appropriately and quickly to the disturbances that the robot may encounter during the movement. More and more robots work in unstructured environments, with different scenarios and tasks. The comparison shows that the FPP-SCA scheme is the optimal model F-S0 = 2.52, F-S5 = 2.38, F-S10 = 2.5, F-S15 = 2.09, F-S20 = 2.54, F-S25 = 2.8, F-S30 = 2.98. As shown in Table 5 and Figure 7.

Robots need to master new skills frequently and quickly. Therefore, the learning speed of the algorithm is also an important evaluation index for the study of teaching learning algorithms. Fast learning algorithms can make sports learning more efficient. In the FPP-SCA scheme model, AM, N = 0.99, BM, N = 1.99, CM, N = 0.58, DM, N = 0.55, EM, N = 1.92, FM, N = 1.82. The FPP-SCA project model uses dynamic motion primitives to improve the accuracy of DMP modeling. An autonomous dynamic system model of human motion is established, and stability is achieved through a combination of linear and nonlinear dynamic systems. The dimensions of low complexity algorithms are all separated, AM, N = 1.3, BM, N = 0, CM, N = 1.16, DM, N = 1.33, EM, N = 1.45, FM, N = 1.24. As shown in Table 6 and Figure 8.

5. Conclusion

This research uses Auto-ID Labs radio frequency identification system to realize the information dissemination from the destination node to the nodes in its neighborhood. The purpose is to forward messages and explore typical applications. Realize the intelligent analysis and management of IoT devices and data.

Design a set of edge video CDN system, in the G1 data set A = 9, p = 9, ℤp = 9, lℤp = 8, AES = 5, ES = 9. Distribute some hot content to public wireless hotspots closer to users in advance, A = 9, p = 7, ℤp = 9, lℤp = 9, AES = 9, ES = 8. At present, a large amount of research is mainly to deploy an edge node between the end node of the Internet of Things and the cloud computing center to provide high-quality services.

Data Availability

The experimental data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that they have no conflicts of interest regarding this work.