Home Technology peripherals AI China Telecom released the self-developed Tianyi IoT Cloud Core AI module

China Telecom released the self-developed Tianyi IoT Cloud Core AI module

Nov 11, 2023 pm 02:13 PM
telecommunications ai things

On November 10, at the Science and Technology Innovation Cooperation Forum of the 2023 Digital Technology Ecology Conference, the Yunxin AI module independently developed by Tianyi IoT was officially released. The Cloud Core AI module is an important capability entrance for Tianyi IoT to create a new paradigm of cloud-network integration and promote the new generation of Tianyi IoT intelligent connection business. It will empower the digital transformation and upgrading of traditional industries through multiple core capabilities.

China Telecom released the self-developed Tianyi IoT Cloud Core AI module

Yunxin AI module integrates China Telecom’s self-developed CTWing SDK capability warehouse, focusing on customer business pain points, provides intelligent connection, one-stop cloud, low power consumption, and national Differentiated capabilities such as cryptographic security certification will help the industry upgrade from the Internet of Things to the Internet of Things.

China Telecom released the self-developed Tianyi IoT Cloud Core AI module

In terms of connection intelligence, it provides intelligent fault diagnosis services to improve fault diagnosis efficiency by 30%; it provides intelligent peak-shifting flow control services to help IoT terminals accurately sense network busy and idle status and improve data reporting. Success rate.

One-stop cloud access, Yunxin AI module integrates the cloud access capabilities of the Tianyi Internet of Things platform (AIoT), enabling an instant connection to the platform upon power-on.

In terms of business low power consumption, based on the module session retention capability, the number of message interactions between the IoT terminal and the platform is reduced, effectively reducing power consumption and extending the life cycle of the terminal device.

In terms of national secret security certification, it provides end-to-end national secret security certification capabilities to protect the safe and reliable transmission of massive IoT terminal authentication and data.

Currently, Tianyi IoT Cloud Core AI modules have been launched for different scenarios, including NB-IoT modules (SNS521 series, CTN168), 4G Cat.1 modules (CTL01, CTL02, CTL03-RV), 5G RedCap module (CTR01) and other module models.

Among them, CTL03-RV is China Telecom’s first intelligent IoT module based on RISC-V architecture. The core capabilities are fully independent and controllable, and the production chain is domestically produced. It has high cost performance, high compatibility, high integration, etc. Features can fully meet the needs of various application scales in the Cat.1 industry and accelerate the digitalization of the industry.

Currently, Tianyi IoT Cloud Core AI modules have been applied in water services, gas, smoke detectors, transportation and other fields.

In the field of water affairs, Tianyi IoT provides a smart water meter equipment manufacturer in Jiangxi with intelligent connection services based on cloud core AI modules, and jointly develops low-cost, low-power consumption products with customers. , high-performance NB-IoT cloud-core smart water meters help customers reduce the number of water meter terminal devices by 1/3, reduce PCB board size by 1/3, and reduce sleep power consumption by 30%. At the same time, based on intelligent diagnosis functions, it helps customers achieve accurate operation. dimension.

In the field of transportation, Tianyi IoT provides a customer in Beijing with low-power cloud core modules and development tools that integrate fault diagnosis functions. By embedding them into track detection equipment, remote monitoring of track status is achieved. , fault information can be quickly eliminated to ensure the safe operation of the track.

In the future, Tianyi IoT will adhere to the leadership of technological innovation, create a full-scale cloud core AI module product matrix, innovatively provide module and platform integrated solutions, and help the Internet of Everything move towards the Intelligent Internet of Everything.

The above is the detailed content of China Telecom released the self-developed Tianyi IoT Cloud Core AI module. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How to configure Debian Apache log format How to configure Debian Apache log format Apr 12, 2025 pm 11:30 PM

This article describes how to customize Apache's log format on Debian systems. The following steps will guide you through the configuration process: Step 1: Access the Apache configuration file The main Apache configuration file of the Debian system is usually located in /etc/apache2/apache2.conf or /etc/apache2/httpd.conf. Open the configuration file with root permissions using the following command: sudonano/etc/apache2/apache2.conf or sudonano/etc/apache2/httpd.conf Step 2: Define custom log formats to find or

How Tomcat logs help troubleshoot memory leaks How Tomcat logs help troubleshoot memory leaks Apr 12, 2025 pm 11:42 PM

Tomcat logs are the key to diagnosing memory leak problems. By analyzing Tomcat logs, you can gain insight into memory usage and garbage collection (GC) behavior, effectively locate and resolve memory leaks. Here is how to troubleshoot memory leaks using Tomcat logs: 1. GC log analysis First, enable detailed GC logging. Add the following JVM options to the Tomcat startup parameters: -XX: PrintGCDetails-XX: PrintGCDateStamps-Xloggc:gc.log These parameters will generate a detailed GC log (gc.log), including information such as GC type, recycling object size and time. Analysis gc.log

How to implement file sorting by debian readdir How to implement file sorting by debian readdir Apr 13, 2025 am 09:06 AM

In Debian systems, the readdir function is used to read directory contents, but the order in which it returns is not predefined. To sort files in a directory, you need to read all files first, and then sort them using the qsort function. The following code demonstrates how to sort directory files using readdir and qsort in Debian system: #include#include#include#include#include//Custom comparison function, used for qsortintcompare(constvoid*a,constvoid*b){returnstrcmp(*(

How to optimize the performance of debian readdir How to optimize the performance of debian readdir Apr 13, 2025 am 08:48 AM

In Debian systems, readdir system calls are used to read directory contents. If its performance is not good, try the following optimization strategy: Simplify the number of directory files: Split large directories into multiple small directories as much as possible, reducing the number of items processed per readdir call. Enable directory content caching: build a cache mechanism, update the cache regularly or when directory content changes, and reduce frequent calls to readdir. Memory caches (such as Memcached or Redis) or local caches (such as files or databases) can be considered. Adopt efficient data structure: If you implement directory traversal by yourself, select more efficient data structures (such as hash tables instead of linear search) to store and access directory information

How to configure firewall rules for Debian syslog How to configure firewall rules for Debian syslog Apr 13, 2025 am 06:51 AM

This article describes how to configure firewall rules using iptables or ufw in Debian systems and use Syslog to record firewall activities. Method 1: Use iptablesiptables is a powerful command line firewall tool in Debian system. View existing rules: Use the following command to view the current iptables rules: sudoiptables-L-n-v allows specific IP access: For example, allow IP address 192.168.1.100 to access port 80: sudoiptables-AINPUT-ptcp--dport80-s192.16

Where is the Debian Nginx log path Where is the Debian Nginx log path Apr 12, 2025 pm 11:33 PM

In the Debian system, the default storage locations of Nginx's access log and error log are as follows: Access log (accesslog):/var/log/nginx/access.log Error log (errorlog):/var/log/nginx/error.log The above path is the default configuration of standard DebianNginx installation. If you have modified the log file storage location during the installation process, please check your Nginx configuration file (usually located in /etc/nginx/nginx.conf or /etc/nginx/sites-available/ directory). In the configuration file

Debian mail server SSL certificate installation method Debian mail server SSL certificate installation method Apr 13, 2025 am 11:39 AM

The steps to install an SSL certificate on the Debian mail server are as follows: 1. Install the OpenSSL toolkit First, make sure that the OpenSSL toolkit is already installed on your system. If not installed, you can use the following command to install: sudoapt-getupdatesudoapt-getinstallopenssl2. Generate private key and certificate request Next, use OpenSSL to generate a 2048-bit RSA private key and a certificate request (CSR): openss

Debian mail server firewall configuration tips Debian mail server firewall configuration tips Apr 13, 2025 am 11:42 AM

Configuring a Debian mail server's firewall is an important step in ensuring server security. The following are several commonly used firewall configuration methods, including the use of iptables and firewalld. Use iptables to configure firewall to install iptables (if not already installed): sudoapt-getupdatesudoapt-getinstalliptablesView current iptables rules: sudoiptables-L configuration

See all articles