Design and Analysis of Intelligent Robot Based on Internet of Things Technology

This research uses Auto-ID Labs radio frequency identification system to realize the information dissemination from the destination node to the nodes in its neighborhood. The purpose is to forward messages and explore typical applications. Realize the intelligent analysis and management of IoT devices and data. Design a set of edge video CDN system, in the G1 data set A = 9, p = 9, ℤp = 9, lℤp = 8, AES = 5, ES = 9. Distribute some hot content to public wireless hotspots closer to users in advance, A = 9, p = 7, ℤp = 9, lℤp = 9, AES = 9, ES = 8. At present, a large amount of research is mainly to deploy an edge node between the end node of the Internet of Things and the cloud computing center to provide high-quality services. By learning a stable dynamic system from human teaching to ensure the robustness of the controller to spatial disturbances. FPP-SCA plan FPP-SCA = 1.99, FPP-SCA = 1.86, FPP-SCA = 1.03, FPP-SCA = 1.18, FPP-SCA = 1.01, FPP-SCA = 1.46, FPP-SCA = 1.61.The more robots work in an unstructured environment, with different scenarios and tasks, the comparison shows that the FPP-SCA scheme is the optimal model F-S0 = 2.52, F-S5 = 2.38, F-S10 = 2.5, F- S15 = 2.09, F-S20 = 2.54, F-S25 = 2.8, F-S30 = 2.98.


Introduction
e Internet of ings (IoT) connects various sensors to the Internet to realize the intelligent analysis and management of Internet of ings equipment and data. Information dissemination of nodes in the neighborhood. Its concept was formally confirmed in the report of the 2005 International Telecommunication Union World Summit on the Information Society. Point out that the node that will receive this message performs intelligent analysis and manages the broadcast data message. e node receiving this message judges whether it is between the destination node and the source node [1][2][3]. In the first stage, the message is forwarded, mainly for the purpose of exploring typical applications. At this stage, the data is sensed and obtained by the information terminal node of the Internet of ings, and is transmitted to an independent and centralized data center for processing through the energy multi-path protocol multi-hop mode. However, due to the limitation of node energy and communication energy consumption technology at this stage, a large number of node energy and communication energy consumption applications cannot be implemented well. For example, the clustered hierarchical deployment algorithm adopted by the wireless sensor network cannot undertake the real-time transmission of largecapacity data such as video data. Only by controlling the routing hop count to avoid the loss of transmission data [4][5][6]. e information is transmitted to the cluster head in the communication time slot, and the cluster head collects a small amount of data such as humidity. And during largescale deployment, the difficulty of application deployment, development, and debugging has increased significantly. In terms of the number of nodes, the total installed capacity of the energy multi-path routing protocol global Internet of ings equipment is about 9.1 billion, and it will reach 28.1 billion later. With the emergence of a new computing model of transmission path control edge computing and the development of hardware, the development of the Internet of ings has entered a new stage in order to solve the growing problems of Internet of ings data and meet the needs of low-latency services. In the stage of clustering edge node algorithm with better real-time performance, the edge node protocol is introduced into the optimization step system. e IoT data computing tasks originally deployed in the cloud computing center are migrated to hierarchical energy multi-path sensing nodes and edge nodes. IoT data is processed at the edge of the network, and only a small amount of data needs to be transmitted to the cloud computing center for final analysis and storage. e operation of the task design process of the online scheduling algorithm of the robot mobile node can be divided into: grasping, palletizing, polishing, polishing, welding, and dispensing according to the task type. However, at the execution level of the robot, an important problem is the task conflict between mobile nodes. e most basic and common operation skills can be divided into point-to-point motion (corresponding task scenarios include palletizing, grabbing, and placing, etc.), which is the intelligent analysis of multithreaded tasks in the scene when access conflicts occur in the online scheduling algorithm. Select and perform algorithmic scheduling on nodes. Trajectory tracking movement (corresponding task scenarios include welding, dispensing, etc.), and game theory is commonly used to solve the problem of trajectory tracking movement conflicts. Smooth motion with mixed force and position (corresponding task scenes include polishing, sanding, etc.) [7][8][9][10][11][12][13]. e study of robot point-to-point motion learning is based on visually guided hand-eye coordinated motion. Point motion algorithm status For intelligent multi-purpose robots, the online scheduling algorithm of mobile nodes can be realized by executing a set of pre-programmed actions. However, it is not enough to rely on the execution of a set of pre-programmed actions or behaviors of the point motion algorithm, once disturbances (such as deviations of position and displacement) occur. e robot's operation task may fail due to calculation errors in positioning. Robot demonstration teaching involves learning the corresponding task scenes, including visually guided object grabbing and assembly. Teaching gives the robot basic skills in teaching (dragging teaching, remote operation teaching, and observation (video, image teaching information extraction) teaching, etc.). e ability to learn how to perform teaching tasks in the online scheduling algorithm of mobile nodes in the game theory method. e control strategy completes formation maintenance [13][14][15]. e biggest difference between this method and the traditional method is that it avoids the situation of large transmission delay, and the clustering algorithm has better real-time performance. e dynamic system (DS) modeling the robot motion is to allow the robot to understand and comprehend a certain operation skill, and still have a certain generalization ability to perform motion coding under new conditions, not just simple repetition. e dynamic energy multi-path routing protocol system is used to encode the robot motion characteristics. It allows the discarded message to adapt to changes in the dynamic environment, and reproduce the movement taught in the optimization step, following the path defined by the pre-forwarding node's measurement standard. Many scholars use dynamic systems to control the formation of nodes through the optimal data transmission path of the machine. Introduce node energy and communication energy consumption as hand-eye coordinated movement based on visual guidance. Choosing the number of hops avoids the situation where the task scene has a large transmission delay for visually guided objects to grab and transmit. Point-topoint motion clustering algorithm with better real-time performance, using trajectory tracking motion formation control strategy to complete formation maintenance. e compliant motion of force and position mixing is based on clustering, and the hierarchical algorithm divides the signal network into several clusters based on visual guidance of hand-eye coordinated motion according to a certain rule. Learning method and intelligent control technology e cluster transmits information by the cluster head and the communication time slot within the cluster.

Architecture of Dynamic Secure Collaborative Computing Method under VECA.
e architecture of the dynamic secure computing method includes virtual edge nodes composed of application management, task management, security management, and message systems. Common nodes composed of security management and instance management, virtual edge nodes and common nodes realize interconnection and intercommunication. e dynamic security calculation method transmits information to the virtual edge node in the corresponding security management and instance management communication time slots. After collecting and fusing information between ordinary nodes, it is transmitted to task management. e virtual edge node has a heavier load than other nodes. After a round of data transmission is completed, a new round of secure calculation method architecture will be performed to balance energy consumption. As shown in Figure 1.

General Process Based on CNN Training and Testing.
e CNN training and testing method is to realize the collection of data samples through the online scheduling algorithm of mobile nodes. Resolve task conflicts between mobile nodes on the training set and data validation set encountered during the design process. Access conflicts caused by task conflicts between mobile nodes are imported into the CNN model for training and new test set collection, the results are classified and verified, and the correctness and error rates of the results are verified. e method often involved in resolving conflicts is the line scheduling algorithm. It mainly includes the application of analyzing wireless sensor networks to model the interaction between players with conflicting interests. To compete for limited network resources such as energy and bandwidth. as shown in Figure 2.

Joint Transmission of Information and Power.
e battery capacity of wireless information and power combined transmission sensor equipment is limited. In order to save costs and facilitate the distribution of its battery capacity, the battery capacity is usually relatively small, and it is inconvenient to replace the battery, which may be dangerous, costly, and sometimes not feasible. In the natural environment, energy exists in many forms, is widely distributed, and has infinite supply. It can be obtained, developed and utilized in large quantities without any extra effort. However, the implementation of energy harvesting technology is not simple. In order to effectively convert energy and effectively use energy, many factors need to be considered. Since each dimension is separated in the modeling process, it is difficult to generalize a learned dynamic system to other different shapes of motion. e stability estimation of dynamic system (SEDS) method is to ensure the robustness of the controller to spatial disturbances by learning a stable dynamic system from human teaching. SEDS uses Gaussian mixture model to model the motion, and ensures the global asymptotic stability of the dynamic system by introducing stability constraints derived from the Lyapunov function.
e SEDS method provides a theoretical framework to ensure the global asymptotic stability of the learning dynamic system. is method has certain reference significance for solving the robustness problem of the nonlinear dynamic system. [16][17][18][19]. Information dissemination from the destination node to the nodes in its neighborhood

FPP-SCA
CDN system IoT devices Intelligent analysis of IoT data
Robot demonstration teaches learning , Robot trajectory tracking Edge computing Robot teaches from

Edge
Computing. e research work of edge computing revolves around data downlink services. A set of edge video CDN system is designed, in the G1 data set A � 9, p � 9, Zp � 9, lZp � 8, AES � 5, ES � 9. Distribute some hot content to public wireless hotspots closer to users in advance, A � 9, p � 7, Zp � 9, lZp � 9, AES � 9, ES � 8. At present, a large amount of research is mainly to deploy an edge node between the end node of the Internet of ings and the cloud computing center to provide high-quality services. As shown in Table 1 and Figure 3.

TSP Algorithm.
Regarding the multi-route IoT nested non-cooperative problem, even if it is not a large-scale network individual, it may be selfish. e number of variables is also very large, and the solution is in the best interest. It is very difficult to directly deviate from the established solution.
e conversion to the energy-constrained TSP algorithm is to convert the refusal forwarding mTSP into the standard freight forwarding dilemma TSP, which can solve the pure strategy set Si and the revenue function µi. e algorithm designed for TSP can solve it by deviating from the Nash equilibrium. e basic parameter variables are shown in Table 2 and

Data Values of Different Scenarios.
Energy model In order to effectively complete the data transmission and charging tasks of the sensor node, the mobile node needs to reach the sensor node for energy replenishment before the sensor node does not have enough power to continue working. In the FPP-SCA scheme, β � 0.3 SNRs is 0.21, β � 0.5 SNRs is 0.29, β � 0.7 SNRs is 0.19, β � 0.3 SNRs is 0.08, β � 0.5 SNRs is 0.79, β � 0.7 SNRs is 0.89. When a sensor node receives a beacon signal from a mobile node in the distance-based energy loss model, according to the strength of the beacon signal, the distance required for the sensor node to send data to the mobile node can be estimated. When β � 0.3, the SNRs is 0.77, When β � 0.5, SNRs is 0.71, when β � 0.7, SNRs is 0.63, when β � 0.3, SNRs is 0.3, when β � 0.5, SNRs is 0.79, and when β � 0.7, SNRs is 0.68. As shown in Table 3 and Figure 5.

Model Comparison.
Comparing the independent scheme, FPP-SCA scheme, low complexity scheme, and SDR, it is found that the global asymptotic stability can ensure that the system responds appropriately and quickly to the disturbances that the robot may encounter during the movement. More and more robots work in unstructured environments, with different scenarios and tasks. e comparison shows that the FPP-SCA scheme is the optimal model F-S0 � 2.52, F-S5 � 2.38, F-S10 � 2.5, F-S15 � 2.09, F-S20 � 2.54, F-S25 � 2.8, F-S30 � 2.98. As shown in Table 5 and Figure 7.    Cloud  18  17  18  10  17  19  Edge  15  14  13  12  19  17  End  14  13  10  11  18  15  PaaS  15  15  14  12  13  11  IaaS  20  12  10  19  10  10 Computational Intelligence and Neuroscience 5 Robots need to master new skills frequently and quickly. erefore, the learning speed of the algorithm is also an important evaluation index for the study of teaching learning algorithms. Fast learning algorithms can make sports learning more efficient. In the FPP-SCA

Conclusion
is research uses Auto-ID Labs radio frequency identification system to realize the information dissemination from the destination node to the nodes in its neighborhood. e purpose is to forward messages and explore typical applications. Realize the intelligent analysis and management of IoT devices and data.
Design a set of edge video CDN system, in the G1 data set A � 9, p � 9, Zp � 9, lZp � 8, AES � 5, ES � 9. Distribute some hot content to public wireless hotspots closer to users in advance, A � 9, p � 7, Zp � 9, lZp � 9, AES � 9, ES � 8. At present, a large amount of research is mainly to deploy an edge node between the end node of the Internet of ings and the cloud computing center to provide high-quality services.

Data Availability
e experimental data used to support the findings of this study are available from the corresponding author upon request.