Abstract:This paper first gives an application case,showing people the magic performance of IOT(Internet of Thing) application in the agricultural garden,and then gives the definition,connotation,classification,use and application in our Keywords:Internet of things,Key technosphere,Application 机译的相对来说已经比较靠谱了,只是有些明显得错误不是它能搞定的我已经帮你整理了,供你参考 【英语牛人团】倾情奉献,
One entity’s influence, denoted by its virtual identity, is not restricted to the one service it It could be said that such a presence occupies many network nodes and service support functions in the overall We have termed this data and its associated functions the digital The digital shadow thus represents the entity’s uses and sessions, and contains the required information and the endpoint devices in the communication and service The 一个实体的影响,通过引入虚拟身份,不只局限在一个服务它消耗。可以这样说,这样的一种存在占用了大量的网络节点和服务支持功能的整体架构。我们已经把这种数据及其相关功能的数字的影子。数字的影子从而代表了实体的使用和会话,并且包含所需资料及端点设备的沟通和服务保障。这digital shadow is thus the projection of a virtual identity onto the logical nodes that compose the architecture, and denotes the logical end points and used interim nodes, as depicted in Figure 5 Access to and manipulation of the digital shadow is tightly controlled and restricted to the entity itself and authorized providers that know the virtual identity and the context of its Even so,authorized providers may be further restricted to the sessions in which they are directly 数字阴影是如此的投影虚拟身份到逻辑节点组成的体系结构、功能和指示的是逻辑终点,并使用临时节点如图5访问和操作数字阴影是严格控制和限制为实体本身和授权的供应商知道向虚拟身份和背景下了它的使用。即便如此,授权的供应商可能进一步限制在会议中,他们是直接参与。A virtual identity is a sub-set of the digital information about a user ([4]) A user may have more than one virtual identity to represent the different personas and aspects of its service More than a question of personalization, this mechanism should ensure the user’s privacy across the aspects of its A virtual identity may contain data relevant to many services and networks, including subscriptions, identifiers, service preferences, While its logical understanding is that the information may be available from any point in the architecture, the information itself can be distributed and limited to access by only some As described in Figure 4, the virtual identity can then be used in a transparent way to gain access to the network,services and even perform operations in the “real world” 一个虚拟的身份是一个sub-set的数字信息,用户([4])。一个用户可以有多个虚拟身份代表不同的角色和方面服务的使用。超过一个问题的个人化,这个机制应确保用户的隐私穿过等几个方面的个性。一个虚拟身份可以包含数据有关的许多的服务和网络,包括订阅、标识符、服务偏好等。而其逻辑的理解就是信息可能是可以从任何一处的体系结构、信息本身可以分布和有限存取只有部分的实体。图4中所描述的虚拟身份,就可以用在一个透明的方式来获得访问网络,服务,甚至手术在“真实的世界”。The digital shadow allows the user to excerpt its influence over multiple devices simultaneously by associating its virtual identity with those In a similar manner, the user’s influence goes beyond owned devices, since it affects routers, proxies, servers, This information can all be harnessed, for the user’s benefit, and provided to cross-domain and cross-layer One example is that low level queuing information from a user’s flow in a router is provided to a higher 数字的影子,这允许用户将其影响多种设备同时通过将其与虚拟身份的设备。以类似方式,用户的影响已经超越了所有的设备,因为它影响路由器,代理服务器,等等。这些信息都能被利用,为用户的利益着想,提供给cross-domain和cross-layer操作。其中一个例子是,低水平的排队信息从一个用户的流量在路由器是提供给一个更高的目标By scoping the information in a digital shadow, we limit its influence across While some information is only valuable within the boundaries of a device, other is valuable across General policies of the services, legal and user should reflect the privacy level of the operation and whether it is successful or The scoping of the information also means that a piece of data may be different depending on scope (or context) The difference may be caused by the source or access control on the data 由范围界定信息的数字的影子,我们限制了其影响各个领域。虽然有些信息是唯一有价值的范围内,另一种是价值装置各个领域。一般的政策、法律和用户服务水平应该反映的是隐私的运行情况和是否成功或失败。信息的范围也意味着一块数据就可能不同范围(或上下文)。可能是由于不同来源或访问控制中的数据