<h2id="1-Background"><ahref="#1-Background"class="headerlink"title="1 Background"></a>1 Background</h2><h3id="1-1-Requirements"><ahref="#1-1-Requirements"class="headerlink"title="1.1 Requirements"></a>1.1 Requirements</h3><p>In order to explore the feasibility of agricultural Internet of Things technology, instructor Alam Mohammed hopes that we can provide a <strong>Available</strong> and <strong>Reliable</strong> Internet of Things system to realize intelligent monitoring and management of farmland. This system will be able to timely detect the parameters related to plant health in the soil and the air, process and store these data (proposed by Alam). At the same time, the automatic control irrigation function (proposed by Caleb) and some data display methods (optional requirements proposed by Alam) are also expected to be provided by this system.</p>
<h3id="1-2-Positioning"><ahref="#1-2-Positioning"class="headerlink"title="1.2 Positioning"></a>1.2 Positioning</h3><p>As it is a small scientific research project designed for the agricultural Internet of Things, the goal of the project is to explore the feasibility of the agricultural Internet of Things, and the vision is to simulate the most common small-scale agricultural Internet of Things application scenarios. Therefore, the positioning of this architecture is ** applicable to most small agricultural IoT projects with sensing, control and display functions**.</p>
<h3id="1-2-Positioning"><ahref="#1-2-Positioning"class="headerlink"title="1.2 Positioning"></a>1.2 Positioning</h3><p>As it is a small scientific research project designed for the agricultural Internet of Things, the goal of the project is to explore the feasibility of the agricultural Internet of Things, and the vision is to simulate the most common small-scale agricultural Internet of Things application scenarios. Therefore, the positioning of this architecture is <strong>applicable to most small agricultural IoT projects with sensing, control and display functions</strong>.</p>
<li><code>MQTT</code>: MQTT Message Queuing Telemetry Transport is a message protocol based on the publish/subscribe paradigm under the ISO standard (ISO/IEC PRF 20922). It works on the TCP/IP protocol suite and is a publish/subscribe message protocol designed for remote devices with low hardware performance and poor network conditions [1].</li>
<h2id="4-System-Environment"><ahref="#4-System-Environment"class="headerlink"title="4 System Environment"></a>4 System Environment</h2><h3id="4-1-Related-software-and-hardware"><ahref="#4-1-Related-software-and-hardware"class="headerlink"title="4.1 Related software and hardware"></a>4.1 Related software and hardware</h3><p>!!!</p>
<h2id="4-System-Environment"><ahref="#4-System-Environment"class="headerlink"title="4 System Environment"></a>4 System Environment</h2><h3id="4-1-Related-software-and-hardware"><ahref="#4-1-Related-software-and-hardware"class="headerlink"title="4.1 Related software and hardware"></a>4.1 Related software and hardware</h3>
<h3id="4-2-Data-size-estimation"><ahref="#4-2-Data-size-estimation"class="headerlink"title="4.2 Data size estimation"></a>4.2 Data size estimation</h3><p>According to the production scenario, a data set is generated every 15 minutes, and a data set occupies about 253-291 bytes. According to 291 calculation, 27.93KB of data will be added every day.</p>
<figureclass="highlight js"><table><tr><tdclass="gutter"><pre><spanclass="line">1</span><br><spanclass="line">2</span><br><spanclass="line">3</span><br><spanclass="line">4</span><br><spanclass="line">5</span><br><spanclass="line">6</span><br><spanclass="line">7</span><br><spanclass="line">8</span><br><spanclass="line">9</span><br><spanclass="line">10</span><br><spanclass="line">11</span><br><spanclass="line">12</span><br><spanclass="line">13</span><br><spanclass="line">14</span><br><spanclass="line">15</span><br><spanclass="line">16</span><br><spanclass="line">17</span><br><spanclass="line">18</span><br><spanclass="line">19</span><br><spanclass="line">20</span><br><spanclass="line">21</span><br><spanclass="line">22</span><br><spanclass="line">23</span><br><spanclass="line">24</span><br><spanclass="line">25</span><br><spanclass="line">26</span><br><spanclass="line">27</span><br><spanclass="line">28</span><br></pre></td><tdclass="code"><pre><spanclass="line"><spanclass="keyword">var</span> wiot = <spanclass="built_in">require</span>(<spanclass="string">'wiot'</span>); <spanclass="comment">//Import wiot package from npm</span></span><br><spanclass="line"></span><br><spanclass="line"><spanclass="comment">// Create an object of single chip</span></span><br><spanclass="line"><spanclass="comment">// Here are two parameters, MAC is the MAC adress of single chip, the output port should be defined in pin</span></span><br><spanclass="line"><spanclass="comment">// The MAC address should be editted by user</span></span><br><spanclass="line"><spanclass="keyword">var</span> MyMCU = <spanclass="keyword">new</span> wiot.client({<spanclass="attr">MAC</span>: <spanclass="string">"3C:71:BF:3A:F6:CF"</span>, <spanclass="attr">pin</span>: {<spanclass="attr">D4</span> : <spanclass="number">1</span>}, <spanclass="attr">hint</span> : <spanclass="literal">true</span>});</span><br><spanclass="line"></span><br><spanclass="line"></span><br><spanclass="line"><spanclass="comment">// The following code can let the BUILTIN_LED turn on for one second and off for one second periodically</span></span><br><spanclass="line"></span><br><spanclass="line"><spanclass="comment">// Wait for all the chips to get ready</span></span><br><spanclass="line">wiot.begin([MyMCU], ()=>{</span><br><spanclass="line"><spanclass="comment">// First parameter is the name of chip, second parameter is the function that is going to be executed</span></span><br><spanclass="line"></span><br><spanclass="line"><spanclass="comment">// Set timer, pin 3 of MyMCU will pull up every 2 seconds</span></span><br><spanclass="line"> setInterval(<spanclass="function"><spanclass="params">()</span>=></span>{</span><br><spanclass="line"> MyMCU.write(wiot.D4, wiot.HIGH);</span><br><spanclass="line">}, <spanclass="number">2000</span>);</span><br><spanclass="line"></span><br><spanclass="line"><spanclass="comment">// Set timer, executer the command in {} after a one-second delay</span></span><br><spanclass="line"> setTimeout(<spanclass="function"><spanclass="params">()</span>=></span>{</span><br><spanclass="line"></span><br><spanclass="line"><spanclass="comment">// Set timer, pin 3 of MyMCU will pull down every 2 seconds</span></span><br><spanclass="line"> setInterval(<spanclass="function"><spanclass="params">()</span>=></span>{</span><br><spanclass="line"> MyMCU.write(wiot.D4, wiot.LOW);</span><br><spanclass="line">}, <spanclass="number">2000</span>);</span><br><spanclass="line">}, <spanclass="number">1000</span>);</span><br><spanclass="line">});</span><br></pre></td></tr></table></figure>
<p>The LED is expected to blink after you execute the code</p>
<p><strong>参考(IEEE)</strong><br>[1] M. Aazam,I。Khan,AA Alsaffar和E. Huh,“物联网:整合物联网和云计算及其所涉及的问题”,2014年第11届国际巴本应用科学与技术会议论文集(IBCAST )巴基斯坦伊斯兰堡。 [线上]。 2014年1月14日至18日,伊斯兰堡,第414-419页。提供:https://uk.cloud.yimian.xyz/index.php/s/PAbkLC5bqoWFcJi</p>
<pre><code>这是一篇经过同行评审的早期文章,介绍了云和物联网的概念。它为我提供了研究人员如何看待Cloud以及他们如何理解2014年(当Cloud Computing开始流行时)IoT的范围。我使用它来提供有关Cloud简介的一些背景。</code></pre><p>[2] F. Bonomi,R。Milito,J。Zhu和S. Addepalli,“雾计算及其在物联网中的作用”,在第一版MCC移动云计算研讨会论文集中。 [线上]。 2012年8月,第13-16页。可用:https://uk.cloud.yimian.xyz/index.php/s/ZnyXdJKk84dR2QD</p>
<pre><code>本文首先指出了雾的概念。它的作者全部来自思科,思科被认为是提供Internetworking解决方案的最强大的公司。我已使用此资源介绍了Fog和Fog计算以及其虚构的Fog-IoT应用程序之一的互联汽车的一些背景。</code></pre><p>[3] M. Chiang和T. Zhang,IEEE物联网杂志中的“雾与物联网:研究机会概述”。 [线上]。卷3号6,pp.854-864,2016年12月。可用:https://uk.cloud.yimian.xyz/index.php/s/Fi7KELbjE7kR3qq</p>
<pre><code>本文详细介绍了Google Spanner。 Google Spanner是根据本文设计的。之所以包含此来源,是因为我认为Google Spanner是Fog存储的革命性尝试。当我尝试描述雾存储的概念时,我以它为例。</code></pre><p>[5] W. Shi,J。Cao,Q。Zhang,Y。Li和L. Xu,“边缘计算:愿景与挑战”,在IEEE物联网杂志上。 [线上]。卷3号5,第637-646页,2016年10月。可用:https://uk.cloud.yimian.xyz/index.php/s/p4QGJA6AWPDKEK4</p>
<pre><code>这是IEEE的期刊,已被引用8422次。它提供了有关如何将Fog应用于计算领域的一些新颖思想。我从此来源总结了Fog控制概念,并引用了他们对Fog IoT的隐私和安全性问题的质疑。</code></pre><p>[6] A. Yousefpour,G。Ishigaki和J. P. Jue,“雾计算:努力使物联网中的延迟最小化”,2017 IEEE国际边缘计算会议(EDGE),美国檀香山,檀香山。 [线上]。 2017年,第17-24页。可用:https://uk.cloud.yimian.xyz/index.php/s/EsDjHnHHGND2SoD</p>
<pre><code>作者来自德克萨斯大学,他们在雾领域并不出名。由于它是唯一一篇评估延迟(Fog IoT的最重要特征)的数学方法,并且得出了看似可靠的结果,因此我使用它来支持我的低延迟论点。</code></pre><p>[7] S. Sarkar,S。Chatterjee和S. Misra,“在物联网环境下进行雾计算的适用性评估”,在IEEE交易云计算中。[在线]。卷6号1,第46-59页,2018年1月至3月。可用:https://uk.cloud.yimian.xyz/index.php/s/m7of3EjZ6Tji7jF</p>
<pre><code>该论文是在几个月前发表的。它由两名学生和一名医生撰写,因此并不那么权威。但是,由于对Fog的研究很少,我最终决定使用其建模结果来支持Fog IoT比Cloud更环境友好。</code></pre><p>[8] G. Zyskind,O。Nathan和A.’。 Pentland,“去中心化隐私:使用区块链保护个人数据”,2015 IEEE安全和隐私研讨会,加利福尼亚州圣何塞。 [线上]。 2015年,第180-184页。可用:https://uk.cloud.yimian.xyz/index.php/s/7FirJsrD93wzDxN</p>
<p><strong>参考(IEEE)</strong><br>[1] M. Aazam,I。Khan,AA Alsaffar和E. Huh,“物联网:整合物联网和云计算及其所涉及的问题”,2014年第11届国际巴本应用科学与技术会议论文集(IBCAST )巴基斯坦伊斯兰堡。 [线上]。 2014年1月14日至18日,伊斯兰堡,第414-419页。</p>
<pre><code>这是一篇经过同行评审的早期文章,介绍了云和物联网的概念。它为我提供了研究人员如何看待Cloud以及他们如何理解2014年(当Cloud Computing开始流行时)IoT的范围。我使用它来提供有关Cloud简介的一些背景。</code></pre><p>[2] F. Bonomi,R。Milito,J。Zhu和S. Addepalli,“雾计算及其在物联网中的作用”,在第一版MCC移动云计算研讨会论文集中。 [线上]。 2012年8月,第13-16页。</p>
<pre><code>本文首先指出了雾的概念。它的作者全部来自思科,思科被认为是提供Internetworking解决方案的最强大的公司。我已使用此资源介绍了Fog和Fog计算以及其虚构的Fog-IoT应用程序之一的互联汽车的一些背景。</code></pre><p>[3] M. Chiang和T. Zhang,IEEE物联网杂志中的“雾与物联网:研究机会概述”。 [线上]。卷3号6,pp.854-864,2016年12月。</p>
<pre><code>本文详细介绍了Google Spanner。 Google Spanner是根据本文设计的。之所以包含此来源,是因为我认为Google Spanner是Fog存储的革命性尝试。当我尝试描述雾存储的概念时,我以它为例。</code></pre><p>[5] W. Shi,J。Cao,Q。Zhang,Y。Li和L. Xu,“边缘计算:愿景与挑战”,在IEEE物联网杂志上。 [线上]。卷3号5,第637-646页,2016年10月。</p>
<pre><code>这是IEEE的期刊,已被引用8422次。它提供了有关如何将Fog应用于计算领域的一些新颖思想。我从此来源总结了Fog控制概念,并引用了他们对Fog IoT的隐私和安全性问题的质疑。</code></pre><p>[6] A. Yousefpour,G。Ishigaki和J. P. Jue,“雾计算:努力使物联网中的延迟最小化”,2017 IEEE国际边缘计算会议(EDGE),美国檀香山,檀香山。 [线上]。 2017年,第17-24页。</p>
<pre><code>作者来自德克萨斯大学,他们在雾领域并不出名。由于它是唯一一篇评估延迟(Fog IoT的最重要特征)的数学方法,并且得出了看似可靠的结果,因此我使用它来支持我的低延迟论点。</code></pre><p>[7] S. Sarkar,S。Chatterjee和S. Misra,“在物联网环境下进行雾计算的适用性评估”,在IEEE交易云计算中。[在线]。卷6号1,第46-59页,2018年1月至3月。</p>
<pre><code>该论文是在几个月前发表的。它由两名学生和一名医生撰写,因此并不那么权威。但是,由于对Fog的研究很少,我最终决定使用其建模结果来支持Fog IoT比Cloud更环境友好。</code></pre><p>[8] G. Zyskind,O。Nathan和A.’。 Pentland,“去中心化隐私:使用区块链保护个人数据”,2015 IEEE安全和隐私研讨会,加利福尼亚州圣何塞。 [线上]。 2015年,第180-184页。</p>
<p>One argument is that the Fog architected IoT was questioned in privacy and security [3]. Since the important internet functions and resources are near the users, it becomes risky for a Fog device of being attacked. However, this might be solved by collaborating with other technics. For example, Zyskind and Nathan [8] designed a decentralized personal data management algorithm basing on blockchain, a powerful encoding method. This algorithm might be one possible solution to cover the data security shortage of Fog net and keep the system safe.</p>
<p>To conclude, although the IoT based on Fog concept may be currently doubted in privacy and system security, it has satisfactory performance in respect of latency, system reliability and eco-friendliness, which are crucial factors on facilitating IoT construction. However, Fog is still a new concept and nearly all of the relevant research was conducted in the past two years. It is still a long way to go before the Fog concept can be actually applied into the framework of IoT.</p>
<hr>
<p><strong>Reference (IEEE)</strong><br>[1] M. Aazam, I. Khan, A. A. Alsaffar and E. Huh, “Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved,” Proceedings of 2014 11th International Bhurban Conference on Applied Sciences & Technology (IBCAST) Islamabad,Pakistan. [Online]. 14th – 18th January, 2014, Islamabad, 2014, pp. 414-419.Available: <ahref="https://uk.cloud.yimian.xyz/index.php/s/PAbkLC5bqoWFcJi"target="_blank"rel="noopener">https://uk.cloud.yimian.xyz/index.php/s/PAbkLC5bqoWFcJi</a></p>
<pre><code>This is an early peer-reviewed article introducingthe concept of Cloud and IoT. It provides me the scope of how researcherslooked at Cloud and how they understood IoT in 2014 (when Cloud Computing beganto be popular). I have used this to provide some background about Cloud inintroduction.</code></pre><p>[2] F. Bonomi, R. Milito, J. Zhu and S. Addepalli, “Fog computing and its role in the internet of things” In Proceedings of the first edition of the MCC workshop on Mobile cloud computing. [Online]. August, 2012, pp.13-16. Available: <ahref="https://uk.cloud.yimian.xyz/index.php/s/ZnyXdJKk84dR2QD"target="_blank"rel="noopener">https://uk.cloud.yimian.xyz/index.php/s/ZnyXdJKk84dR2QD</a></p>
<pre><code>Thispaper firstly pointed out the Fog concept. Its writers were all from Cisco, which is considered the most powerfulcompany on providing Internetworking solution. I have used this sourceto introduce some background of Fog and Fog computing and the Connected Vehicle,one of their imaginary Fog-IoT application.</code></pre><p>[3] M. Chiang and T. Zhang, “Fog and IoT:An Overview of Research Opportunities” in IEEE Internet of Things Journal. [Online]. vol. 3, no. 6, pp.854-864, Dec. 2016. Available: <ahref="https://uk.cloud.yimian.xyz/index.php/s/Fi7KELbjE7kR3qq"target="_blank"rel="noopener">https://uk.cloud.yimian.xyz/index.php/s/Fi7KELbjE7kR3qq</a></p>
<pre><code>This is an invited paper published by IEEE, the most influential organization for Engineer. Chiang is from Princeton and Zhang is from Cisco. After this paper, more researchers began to notice Fog. I have used this source to introduce, evaluate and query Fog because this is a rare high-quality paper.</code></pre><p>[4] J.C. Corbett, J. Dean, M. Epstein, A. Fikes, C. Frost,J.J. Furman, S. Ghemawat, A. Gubarev, C. Heiser, P. Hochschild and W. Hsieh, “Spanner:Google’s globally distributed database”, ACM Transactions on Computer Systems (TOCS). [Online].vol. 31, no. 3,pp. 8, Aug. 2013. Available: <ahref="https://uk.cloud.yimian.xyz/index.php/s/oxj4EAm6M78GPN8"target="_blank"rel="noopener">https://uk.cloud.yimian.xyz/index.php/s/oxj4EAm6M78GPN8</a></p>
<pre><code>This paper detailly introduced Google Spanner. Google Spanner was designed based on this paper. I include this source because I think Google Spanner is are volutionary attempt of Fog storage. And I have used this as an example when I try to describe the concept of Fog storage.</code></pre><p>[5] W. Shi, J. Cao, Q. Zhang, Y. Li and L. Xu, “Edge Computing: Vision and Challenges” in IEEE Internet of Things Journal. [Online]. vol. 3, no. 5, pp. 637-646, Oct. 2016.Available: <ahref="https://uk.cloud.yimian.xyz/index.php/s/p4QGJA6AWPDKEK4"target="_blank"rel="noopener">https://uk.cloud.yimian.xyz/index.php/s/p4QGJA6AWPDKEK4</a></p>
<pre><code>This is a journal from IEEE and have been cited 8422 times. It provides several novel ideas concerning how would the Fog be applied in computing field. I have summarized the Fog control concept from this source and cited their questioning concerning the privacy and security issue of Fog IoT.</code></pre><p>[6] A. Yousefpour, G. Ishigaki and J. P. Jue, “Fog Computing: Towards Minimizing Delay in the Internet of Things” 2017 IEEE International Conference on Edge Computing (EDGE), Honolulu, HI. [Online]. 2017, pp. 17-24. Available: <ahref="https://uk.cloud.yimian.xyz/index.php/s/EsDjHnHHGND2SoD"target="_blank"rel="noopener">https://uk.cloud.yimian.xyz/index.php/s/EsDjHnHHGND2SoD</a></p>
<pre><code>The authors were from Texas University and they are not famous in Fog field. As it is the only paper which evaluated latency, the most significant trait of Fog IoT, mathematically and got a seemly reliable result, I have used this to support my low latency argument. </code></pre><p>[7] S. Sarkar, S. Chatterjee and S. Misra, “Assessment of the Suitability of Fog Computing in the Context of Internet of Things”in IEEE Transactions on Cloud Computing.[Online]. vol. 6, no. 1, pp. 46-59, Jan.-March 2018. Available: <ahref="https://uk.cloud.yimian.xyz/index.php/s/m7of3EjZ6Tji7jF"target="_blank"rel="noopener">https://uk.cloud.yimian.xyz/index.php/s/m7of3EjZ6Tji7jF</a></p>
<pre><code>This paper was just published a few month ago. It was written by two students and one doctor, which makes it not so authoritative. However, since there are few Fog research, I finally decide to use its modeling result to support that Fog IoT is more environment friendly than Cloud.</code></pre><p>[8] G. Zyskind, O. Nathan and A. ‘. Pentland,”Decentralizing Privacy: Using Blockchain to Protect Personal Data” 2015 IEEE Security and Privacy Workshops,San Jose, CA. [Online]. 2015, pp. 180-184. Available: <ahref="https://uk.cloud.yimian.xyz/index.php/s/7FirJsrD93wzDxN"target="_blank"rel="noopener">https://uk.cloud.yimian.xyz/index.php/s/7FirJsrD93wzDxN</a></p>
<p><strong>Reference (IEEE)</strong><br>[1] M. Aazam, I. Khan, A. A. Alsaffar and E. Huh, “Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved,” Proceedings of 2014 11th International Bhurban Conference on Applied Sciences & Technology (IBCAST) Islamabad,Pakistan. [Online]. 14th – 18th January, 2014, Islamabad, 2014, pp. 414-419.</p>
<pre><code>This is an early peer-reviewed article introducingthe concept of Cloud and IoT. It provides me the scope of how researcherslooked at Cloud and how they understood IoT in 2014 (when Cloud Computing beganto be popular). I have used this to provide some background about Cloud inintroduction.</code></pre><p>[2] F. Bonomi, R. Milito, J. Zhu and S. Addepalli, “Fog computing and its role in the internet of things” In Proceedings of the first edition of the MCC workshop on Mobile cloud computing. [Online]. August, 2012, pp.13-16. </p>
<pre><code>Thispaper firstly pointed out the Fog concept. Its writers were all from Cisco, which is considered the most powerfulcompany on providing Internetworking solution. I have used this sourceto introduce some background of Fog and Fog computing and the Connected Vehicle,one of their imaginary Fog-IoT application.</code></pre><p>[3] M. Chiang and T. Zhang, “Fog and IoT:An Overview of Research Opportunities” in IEEE Internet of Things Journal. [Online]. vol. 3, no. 6, pp.854-864, Dec. 2016.</p>
<pre><code>This is an invited paper published by IEEE, the most influential organization for Engineer. Chiang is from Princeton and Zhang is from Cisco. After this paper, more researchers began to notice Fog. I have used this source to introduce, evaluate and query Fog because this is a rare high-quality paper.</code></pre><p>[4] J.C. Corbett, J. Dean, M. Epstein, A. Fikes, C. Frost,J.J. Furman, S. Ghemawat, A. Gubarev, C. Heiser, P. Hochschild and W. Hsieh, “Spanner:Google’s globally distributed database”, ACM Transactions on Computer Systems (TOCS). [Online].vol. 31, no. 3,pp. 8, Aug. 2013.</p>
<pre><code>This paper detailly introduced Google Spanner. Google Spanner was designed based on this paper. I include this source because I think Google Spanner is are volutionary attempt of Fog storage. And I have used this as an example when I try to describe the concept of Fog storage.</code></pre><p>[5] W. Shi, J. Cao, Q. Zhang, Y. Li and L. Xu, “Edge Computing: Vision and Challenges” in IEEE Internet of Things Journal. [Online]. vol. 3, no. 5, pp. 637-646, Oct. 2016.</p>
<pre><code>This is a journal from IEEE and have been cited 8422 times. It provides several novel ideas concerning how would the Fog be applied in computing field. I have summarized the Fog control concept from this source and cited their questioning concerning the privacy and security issue of Fog IoT.</code></pre><p>[6] A. Yousefpour, G. Ishigaki and J. P. Jue, “Fog Computing: Towards Minimizing Delay in the Internet of Things” 2017 IEEE International Conference on Edge Computing (EDGE), Honolulu, HI. [Online]. 2017, pp. 17-24. </p>
<pre><code>The authors were from Texas University and they are not famous in Fog field. As it is the only paper which evaluated latency, the most significant trait of Fog IoT, mathematically and got a seemly reliable result, I have used this to support my low latency argument. </code></pre><p>[7] S. Sarkar, S. Chatterjee and S. Misra, “Assessment of the Suitability of Fog Computing in the Context of Internet of Things”in IEEE Transactions on Cloud Computing.[Online]. vol. 6, no. 1, pp. 46-59, Jan.-March 2018.</p>
<pre><code>This paper was just published a few month ago. It was written by two students and one doctor, which makes it not so authoritative. However, since there are few Fog research, I finally decide to use its modeling result to support that Fog IoT is more environment friendly than Cloud.</code></pre><p>[8] G. Zyskind, O. Nathan and A. ‘. Pentland,”Decentralizing Privacy: Using Blockchain to Protect Personal Data” 2015 IEEE Security and Privacy Workshops,San Jose, CA. [Online]. 2015, pp. 180-184. </p>
<pre><code>This paper was published by IEEE. Zyskind was from MIT, which makes the source seems to be credible. I am interested in the blockchain algorithm which is theoretically absolutely safe as it mentioned and I think it is one ideal method to deal with the security problem of Fog IoT.</code></pre><hr>
<p>Attachment<br>Fog and IoT PPT:<ahref="https://uk.cloud.yimian.xyz/index.php/s/GbLfqxX2CBTDdRR"target="_blank"rel="noopener">https://uk.cloud.yimian.xyz/index.php/s/GbLfqxX2CBTDdRR</a></p>
<h3id="Historical-temperature-research-method"><ahref="#Historical-temperature-research-method"class="headerlink"title="Historical temperature research method"></a>Historical temperature research method</h3><p>The ratio of ${}^{18}O/{}^{16}O$ in the atmosphere is closely related to temperature. Therefore, the current temperature can be indirectly inferred by measuring the isotope ratio of the corresponding position in the ice layer.<br>In addition, the concentration of $CO_{2}$ in each historical period can also be measured by a similar method.</p>
<h2id="The-study-found"><ahref="#The-study-found"class="headerlink"title="The study found"></a>The study found</h2><h3id="Carbon-dioxide-concentration-is-closely-related-to-temperature"><ahref="#Carbon-dioxide-concentration-is-closely-related-to-temperature"class="headerlink"title="Carbon dioxide concentration is closely related to temperature"></a>Carbon dioxide concentration is closely related to temperature</h3><p><imgsrc="https://api.yimian.xyz/img/?path=imgbed/img_d2a8246_394x204_8_null_normal.jpeg"alt="History of carbon dioxide and temperature"></p>
<p>As can be seen from the above figure, in the history of the earth, the concentration of carbon dioxide has a close correlation with temperature. Until the past 150 years, this rule was broken, and the concentration of atmospheric carbon dioxide increased dramatically. People expressed panic ⌇●﹏●⌇</p>
<h2id="With-humans"><ahref="#With-humans"class="headerlink"title="With humans"></a>With humans</h2><h3id="A-formula"><ahref="#A-formula"class="headerlink"title="A formula"></a>A formula</h3><p>$$Increase CO_{2} = Increasing Population + \Delta Emission per Person + Efficiency of CO_{2} Use$$<br>This formula can also be translated as:<br>$$Carbon emissions = population + economy-technology$$</p>
<p>$$Increase CO_{2} = Increasing Population + \Delta Emission per Person + Efficiency of CO_{2} Use$$</p>
</div>
<p>This formula can also be translated as:</p>
<divstyle="overflow:scroll;">
<p>$$Carbon emissions = population + economy-technology$$</p>
</div>
<h3id="An-organization"><ahref="#An-organization"class="headerlink"title="An organization"></a>An organization</h3><p>The Intergovernmental Panel on Climate Change (IPCC) has set a small goal to limit greenhouse gas emissions in various countries, stating that by 2050, global carbon dioxide emissions will have to be half. . In fact, this is equivalent to linking emissions with money, giving each country a portion of the emissions, and paying for more emissions. As a result, the industrialized developed countries cut away more than 40% of the cake. The president of the National University of Science and Technology, Lao Ding, said that this is unbearable. Do people in developing countries have human rights? ヾ(´・ ・`。)ノ”</p>