Application of Internet of Things Technology Based on Artificial Intelligence in Electronic Information Engineering

Artiﬁcial intelligence is an intelligent system that can perform tasks in a complex and changeable environment without special manual intervention. It is a technology that can continuously optimize decisions and behaviors through machine learning. It is a portrayal of human intelligence in computers. The simple explanation is usually “artiﬁcial intelligence.” Since the invention of artiﬁcial intelligence, theory and technology have been continuously developed and its scope has also been continuously ex-panded. With the improvement of people’s rich and colorful material living standards, more and more areas of life where artiﬁcial intelligence products are used can be widely and conveniently accessed by people, but the abuse of artiﬁcial intelligence technology will also become the biggest public safety in the future. Artiﬁcial intelligence technology is used by some terrorists, making it more convenient for terrorist attacks. To this end, this article aims to study the artiﬁcial intelligence Internet of Things technology in electronic information engineering. It is hoped that the artiﬁcial intelligence Internet of Things technology can be better optimized and the technical means can be mastered and rationally used to improve people’s material living conditions and happiness. This article proposes how to better apply the artiﬁcial intelligence Internet of Things technology to electronic information engineering and analyze optimization schemes and early warning models to better simulate life and optimize information conditions. The experimental results of this paper are analyzed through model construction. Finally, this paper selects and uses 16 standard mechanics datasets to ﬁnd that it is beneﬁcial to the better application of artiﬁcial intelligence Internet of Things technology, which veriﬁes the accuracy and overall applicability of the method.


Introduction
With the continuous development of Internet information science and technology, many technologies are developing in a more intelligent direction. Artificial intelligence (AI) technology is an important means to build the computing space of the Internet of ings. It belongs to a marginal field, a natural science. Scientists are hoping to understand the nature of intelligence through research and understanding and strive to create a new type of intelligent machinery that can respond to it in various forms and ways similar to human intelligence. Research in this field involves robotic engineering, language recognition, image recognition, natural language processing, and expert systems. Since the birth of artificial intelligence, the development of theory and technology has become more mature and the field of application has been continuously expanded. In the near future, the high-tech products that artificial intelligence bring to the future will be regarded as a vivid expression of human wisdom. With the development of information technology, especially the rapid development of cloud computing and other technologies, artificial intelligence (AI) technology has been developed by leaps and bounds. e emergence of new technological capabilities has made artificial intelligence surveillance a reality. Artificial intelligence surveillance electronic information engineering was born under this background, providing more reliable protection for the safety of human lives and reducing or avoiding tragedies.
In the twenty-first century, the rapid development of electronic information technology has brought tremendous changes to people's lives. Among them, logistics management based on electronic information technology is developing rapidly and its research is particularly important.
As the electronic information technology industry is gradually playing an increasingly important role, it has become an important growth point for enhancing its economic competitiveness on a global scale. Our country's decision to take a new path to modernization and industrialization in recent years demonstrates the progress of our country's electronic information industry. Electronic information products have the typical advantages of short market life cycle and time, frequent product changes, and focus on networked applications. Innovation activities are derived from two guidelines: technological progress and user needs. We must use technological innovation and improve product value. e introduction of artificial intelligence technology and the Internet of ings in the process of promoting electronic information technology and product innovation plays a very important role in the development of the country's electronic information industry and the enhancement of market competitiveness. e field of artificial intelligence (AI) has a long and intertwined history. Hassabis et al. believed that a better understanding of biological brains can play a vital role in building intelligent machines. ey investigated the historical interaction between AI and the field of neuroscience and highlighted the current advances in AI inspired by neural computing research in humans and other animals. Finally, it emphasizes common themes that may be crucial to advancing future research in this field, but only a general scope direction is determined and the practicality is not very high [1]. In the construction of a digital museum, it is very difficult to manage so many collections and find a place to place a collection. Zhao-Hui proposed a technology to identify the collection; this technology is information technology, and it created the foundation for the smart museum. However, the persuasive power of this technology is not strong [2]. Ogidiaka has been creating problems with psychological factors. In this case, the intelligent model is related to rational statistics and economic concepts. Simply put, it is the ability to make correct decisions, plans, or conclusions. e adoption of random representation and statistical learning methods has led to a higher degree of integration and intersection between artificial intelligence, machine learning, statistics, cybernetics, neuroscience, and other disciplines. However, the current technology is not mature enough and there are some shortcomings [3].
From the human beings to the intelligent era, the convenient application of intelligent technology makes human social life and work more convenient. ere are also huge security risks [4]. erefore, scientific analysis of the risks of artificial intelligence technology and standardized use of artificial intelligence electronic information technology will bring opportunities for the future sustainable development of mankind and reduce harm and loss. is article uses the combination of artificial intelligence Internet of ings technology and electronic information engineering to explore the application of artificial intelligence Internet of ings technology in electronic information equipment. It uses the artificial firefly algorithm and ant colony algorithm to explore the optimization of the formula to find the minimum value of the shortest path. Indepth study of the relationship between artificial intelligence Internet of ings technology and electronic information engineering through SOM neural network early warning model construction, agent behavior tree construction, SVR prediction model analysis and optimization, and neural network early warning forecast model analysis strengthens electronic information engineering and artificial intelligence. e synergy of networking is conducive to the research, exploration, and optimization of the application of artificial intelligence Internet of ings technology in electronic information engineering.

The Method of Electronic Information
Engineering Based on Artificial Intelligence Internet of Things Technology

Smart Home in the Internet of ings Environment.
e specific layers of the Internet of ings are the perception layer, the network layer, and the application layer. A corresponding smart home system security framework is proposed, namely, node security, information transmission security, and information use security, and a security mechanism is set up at each layer of the transmission. e security system structure of the Internet of ings is constructed, and its framework is shown in Figure 1.

Internet of ings Gateway.
In the perception layer of the system, there are a large number of sensors. ese sensors form a sensor network for data detection. e sensor data are transmitted to the wide area network through the sensor network at the network level [5]. e gateway achieves the purpose of interconnecting wide area information by providing protocol conversion between the perception layer and the wide area network. erefore, it has an indispensable position in the network layer [6]. Figure 2 shows the status of the Internet of ings in the system: the gateway is connected to the server through the port, and the message is processed through the HTTP protocol; the serial port is connected to the underlying coordinator to receive and forward system data; to achieve the conversion of Modbus/ TCP and Modbus/RTU protocols. In terms of function, the gateway mainly realizes the data duplex communication function and network organization ability; after physically connecting to ZigBee and the coordinator, it monitors the terminal equipment of the system in real time, by connecting modem equipment (GPRS module), cellular mobile communication equipment (3G module), wired and WiFi to transmit the data sensed by the sensor network to the server; connect the SD analog camera to collect on-site pictures regularly and store and forward the pictures on the SD card; display the data sensed by the sensor network through the touch screen, and the camera collects the picture and the working status of the gateway; remotely login to the server to view the system data, pictures, and the working status of the gateway [7].

Artificial
Intelligence. Affected by many factors, it is difficult for artificial intelligence to truly exhaust the mysteries of human intelligence. e academic world cannot form a unified definition of artificial intelligence [8].
Advantages: AI technology has enriched people's lives and provided great help to people's lives. e combination of artificial intelligence technology and various tools and materials of human life has completely changed people's traditional lifestyles and added new colors to people's lives. Artificial intelligence enriches people's lives and makes people's lives smarter [9].
Disadvantages: the development of AI has leaked people's privacy [10].
Artificial intelligence algorithms: there are many artificial intelligence algorithms applied to network reconstruction. e widely used human king neural network, simulated annealing method, genetic algorithm, particle swarm algorithm, expert system, etc. are briefly introduced below [11].
Simulated annealing method: a method that selects an appropriate convergence index according to the difference in temperature to assist in accelerating the speed of the SA algorithm [12].
Particle swarm algorithm: using binary coding, the PSO algorithm is used to reconstruct the problem. e improvement of PSO algorithm also has many applications in reconstruction.
Electronic information has developed rapidly in recent years, and global competition has intensified. It has become one of the most important strategic industries in the world. In order to reach the peak of industrial competition, countries have pushed the electronic information industry to the top of their national strategies. In the past ten years, our country's electronic information industry has been developing very well, its strength has continued to increase, the proportion of output value in GDP has continued to increase, the driving force for economic growth has continued to increase, and its impact on economic growth has also continued to increase. More and more attention has been paid to the development of electronic information manufacturing industry.
e characteristics of the electronic information industry: (1) parallel growth and benefits: along with the increase in output, there will be a corresponding increase in efficiency; (2) large demand for technology and investment: because electronic information products are updated quickly and have high requirements for equipment and technology, a large amount of capital and technical investment are required to keep up with the speed of product upgrades; (3) clustering and relevance to other industries: the output of the  Mobile Information Systems electronic information industry is an indispensable input for related industries [13]. Our country's modern electronic information industry has increasingly become the leading and pillar industry in the mainland of our motherland, promoting our country's social and economic development. Figure 3 shows the change in the total output value of the domestic electronic information technology industry.
As shown in Figure 4, we can find that, from 1997 to 2000, the domestic electronic information industry developed at a high speed higher than the growth rate of the manufacturing industry. It experienced the startup and growth stages and entered the mature stage after the twentyfirst century, and the growth rate began to lag behind because of the growth rate of the manufacturing industry.

BP Network Model Construction.
is article uses MATLAB software to create a BP network prediction model and conducts learning training and system prediction analysis on the established system model. e construction steps of the BP neural network model are shown in Figure 5: (1) rough the determination of the number of layers of the BP neural network, the transfer function, the number of neurons in each layer, and the assignment of weights and thresholds are selected; then, the system structure design is carried out [14] (2) Ben selects the initial model, establishes appropriate training learning and rule functions, sets relevant training parameters, etc., and then trains through the model (3) Use the established model to predict the processed data to be tested and analyze the prediction results

Artificial Firefly Algorithm.
In the original firefly algorithm, some fireflies randomly scattered them in the troubleshooting area during initialization. e fluorescein content of these fireflies is basically the same at startup. Each firefly should be unique. e fireflies communicate with other fireflies within their main decision-making range, so as to be able to achieve control of other fireflies distributed in the surrounding area. e purpose of the event: the fluorescein value of each firefly is determined by the distance between the position of the firefly and the optimal position of the solution. e closer to the optimal position of the solution, the higher the fluorescein content of the firefly. e communication mechanism of fireflies is as follows: all fireflies are in the collection of other fireflies, the brighter the tail, the higher the fluorescein content, the stronger the ability to attract and approach the same firefly, and the other fireflies will spontaneously change to the fluorescein content and move in the direction of the taller fireflies [15].
In the optimization phase of the firefly algorithm, each iteration consists of the fluorescein update phase, the neighbor determination phase, the movement probability update phase, the position update phase, and the sensing radius update phase. Let f(x) be the fitness evaluation function, and C i (n) represents the fluorescein concentration of the i-th firefly in the Nth iteration, and the four stages are described as follows.
Initialization stage: first, NP fireflies are randomly generated in the search area, x i , g � [x1,x2,. . .,x m ], where g represents the number of iterations, i � 1,2, .., NP; all fireflies in the initialization stage have fluorescein concentration li(g) � 0. At the same time, initialize the fluorescein volatilization coefficient ρ of the firefly algorithm, the fitness extraction ratio c, the step size step, the neighborhood change rate β, the decision radius rd, the neighbor number threshold gt, and the maximum number of iterations iter_max [16].

Mobile Information Systems
Fluorescein renewal stage: each firefly updates its fluorescein value according to the current firefly fitness value f(x i ), that is, the fluorescein value at this time is the fluorescein value at the previous moment minus the fluorescein value volatilized over time plus its fitness value of a certain proportion at this time. e specific update rules are expressed as follows: where ρ is the fluorescein volatilization coefficient and α is the fitness extraction ratio. Determine the neighbor stage: each firefly looks for its neighbors within the decision radius, and its neighbor set is composed of neighbors that meet the following conditions: In formula (2), d(i,a) represents the Euclidean distance between the i-th and a-th firefly.
Moving probability update order: the i-th firefly determines the probability of moving to the j-th firefly by comparing the fluorescence brightness values of the fireflies in its neighbor set. e calculation method is as follows: Position update stage: the i-th firefly determines to move a small step to firefly j according to the roulette method, the moving step is step, and its position update formula is as follows: Sensing radius update stage: after the previous step is completed, the sensing radius needs to be updated accordingly. e specific update formula is as follows: e flowchart of the artificial firefly algorithm is shown in Figure 6.

Ant Colony Algorithm.
It is an algorithm based on bionics based on the principle of ant foraging. Ant Colony Algorithm (ACA) was first proposed by Italian scholars Dorigo et al. Little ants can always find food and can find the shortest path from the nest to the food/destination. More importantly, the ants can dynamically choose the optimal path in a dynamically changing environment [17].
In order to improve the development of artificial intelligence and Internet of ings technology electronic information engineering construction, the following symbols are introduced: M represents the number of ants in the algorithm. N represents the number of cities/nodes in the algorithm.
L represents the distance between city A and city B. C i (t), at time t, represents the number of ants located in city i, where δ ab (t), at time t, represents the pheromone on the city (a, b).

Mobile Information Systems
At the beginning of the algorithm, the pheromone on each path is set to a constant C. During the movement, the probability of the ant selecting each optional node is calculated according to (7) and then a random number is generated according to the probability of each node, and you can roughly choose the city/node the ant visits next time.
p k ab (t) represents the probability that ant k chooses the path at node i (a, b): where η ab represents the visibility of the path (a, b), α represents the importance factor of pheromone, β represents the importance factor of path visibility, and N ab represents the number of algorithm iterations. tabu k is the taboo table of ant k, which records the information of the cities that the ants have traveled. In the next route selection, the ants cannot choose the nodes in tabu k . At the same time, tabu k also records the order information of the cities that the ants have traveled.
After n times (there are n cities in the algorithm), m ants have completed an iterative process. According to the node information saved by tabu k , calculate the distance traveled by each ant Lat _k and calculate the shortest path Lat in this iteration at _min. In the ACA, the above process will be repeated N at times. After each iteration is completed, the pheromone on each path will be updated according to the ant's selection in tabu k to guide the ant's selection in the next iteration: where ρ represents the pheromone persistence factor and ρ− 1 represents the pheromone volatilization coefficient.
D/L k represents the path of ant k (a, b): In formula (12), Δδ k ab (t, t + 1) represents the contribution of the k-th ant to the pheromone on the path (a, b) in the total path passed this time and Δδ ab (t, t + 1) represents the path (a, b) selected by the ant during this iteration. e variation of pheromone is shown in Equation (12). In equation (12), D is a constant and L k represents the total path length of the k-th ant through the cycle process. In ACA, the number of algorithm iterations is N ab . e shortest path is the minimum value of the shortest path found in each iteration: L min � minL at− min at � 1, 2, . . . , N at . (13) 2.6. Summary of is Section. is section first introduces the smart home control system under the Internet of ings environment. On the basis of mastering the basic principles of the Internet of ings, it further describes the characteristics of the Internet of ings gateway, depicts the overall block diagram of the Internet of ings gateway system, provides a detailed introduction of artificial intelligence and its advantages and disadvantages, etc. e artificial intelligence algorithm, artificial firefly algorithm, artificial firefly algorithm flowchart, traffic control signal method, etc. are introduced, and the ant colony algorithm is analyzed in detail to determine its optimal path. e optimization and exploration of the formula for finding the minimum value of the shortest path further show that the artificial intelligence Internet of ings technology and electronic information engineering are closely related and promote each other.

Experiments in Electronic Information
Engineering Based on Artificial Intelligence and Internet of Things Technology

Construction of Agent Behavior Tree.
Commonly used AI decision models include state machines and behavior trees. e state machine is closer to human thinking, but the behavior tree is more intuitive and flexible. erefore, the behavior tree has become the mainstream model of complex AI. e behavior tree can be regarded as a tree-type data structure, in which there are leaf nodes and composite nodes. At the same time, the behavior is divided into many levels, and lower-level behaviors can be combined to become higher-level behaviors. When the behavior tree needs to be updated, the structure will perform DFS operations, reaching the end leaf nodes in turn, and the leaf nodes will feed back different results according to different situations, for example, it can be "executed" or "nonexecuted." Because of such a tree structure, each branch is not traversed at the same time. At the same time, using this feature, you can easily set the priority level of behavior actions, allowing the front leaf nodes to take on more important behaviors [18].
Features: (1) the highly modular state removes the jump logic in the state, making the state itself a "behavior." (2) Behavior nodes and control nodes can reuse the same control nodes that can appear in different branches of the behavior tree. Increasing the types of control nodes, the same behavior nodes can be connected with different control nodes to make different AIs, so the purpose of multiplexing behaviors can also be achieved. ere are many kinds of nodes in the behavior tree, and we can even customize the nodes to achieve the target function, as shown in Figure 7.
is behavior tree comprehensively uses the combination of selection nodes and sequence nodes and uses the characteristics of the behavior tree to express the above logic more clearly, which can better realize the behavior of the agent [19].

Construction of the Early Warning Model of SOM Neural
Network.
e establishment of an early warning model based on neural networks can effectively monitor the impact of foreign products on our country's domestic industries and the possible harm caused by some potential damages. However, from the current situation of the electronic information industry, it is more important to prevent foreign countries from antidumping our country [20]. e structure flowchart of using neural network to generate early warning model is shown in Figure 8. e early warning model generated by the neural network also has the ability to keep pace with the times. It can conveniently store and update the newly generated data, so that the result of the judgment is always associated with the international form. e block diagram of the specific operation is given in Figure 9.
Because the model designed in this paper has no special restriction rules for electronic information engineering in the selection of characteristic parameters, the general form is given, so that the model can be applied to the maximum expansion of artificial intelligence electronic information engineering, and the applicability of the model is further proved [20].

Construction of the Production Function Model of the Electronic Information
Industry. We will analyze the various production factors invested in the development of the electronic information industry through the C-D production function and study the relationship between the factors of various production sectors and economic growth. Because of the wide range of electronic information industry, we have improved and optimized the C-D production function for the convenience of calculation.
C-D production function: After introducing the technical variable C ij , its production function is Due to the development of electronics, information technology engineering needs to study the growth of electronic information industry, and the introduction of external variable technology can clearly reflect the comprehensive information development index C ij of the development level of electronic information technology and the production level of the electronic information industry From this, the production function used to study the specific industry of the electronic information industry is obtained: Among them, A is other technological progress factors, C is the comprehensive development index of informatization, h is the elasticity of the informatization index, α and β are the output elasticities of capital and labor elements, respectively, K is the capital investment in the electronic information industry, L is the labor input of the electronic information industry, and Y represents the gross output value of the electronic information industry.

Summary of is Section.
is section first introduces in detail the construction and optimization method of the agent behavior tree, as well as the characteristics of the agent behavior tree and the logical relationship represented by the common behavior tree, and optimizes the method.
en, through the construction of the early warning model of the SOM neural network, the flowchart  information industry, then studies the influence of each factor on the development of the electronic information industry, and maximizes its application in electronic information engineering. e type is further proved.

SVR Prediction Model Analysis and Optimization Advantages of SVR Model
(1) e model provides a strong theoretical basis, and the principle of structural risk minimization can be used.
(2) is model can effectively solve the problem of small samples and finally transform into a secondary planning problem. (3) e topological structure of SVM is determined by the support vector. Because of the excessive dependence of the user's repeated attempts on the network topology, the traditional neural network is hidden.
In order to achieve the purpose of dispersing the two types of samples, we use SVM regression fitting to construct the optimal classification surface to minimize the distance between all training samples and the classification surface. e basic idea of SVR is shown in Figure 10.

Neural Network Early Warning and Forecasting Model.
According to the neural network model parameters in Tables 1 and 2, input the training samples into the network model to train the network. e changing trend of fitness is shown in Figure 11. It can be seen from the figure that the value of fitness is getting smaller and smaller, indicating that it has better performance. e accuracy of forecasting is improved, and good forecasting effects can be obtained.
is article uses the combination of artificial intelligence Internet of ings technology and air quality electronic monitoring equipment to carry out real-time monitoring, early warning, and forecasting to prevent it from happening, to achieve the desired result. rough the construction of neural network models and the analysis of the results, the monitoring revenue can be significantly improved under the monitoring of intelligent electronic equipment. e validity and superiority of the prediction determination through the neural network early warning forecast model are verified.

Summary of is Section.
In this section, by constructing and optimizing the SVR prediction model, it is found that it avoids the traditional neural network's excessive dependence on the user's repeated trial and error of the network topology. In order to solve the problem of separating the two samples, an optimal classification surface is constructed. rough the analysis of the neural network early warning and forecasting model, AI is combined with the air quality electronic monitoring equipment to perform real-time monitoring, early warning, and forecasting. e validity and superiority of the prediction through the neural network early warning forecast model are verified. e discovery establishes the development direction for the application of electronic information.

Conclusions
With the improvement of the maturity of intelligent control applications, the artificial intelligence Internet of ings technology will inevitably further expand the research scope of intelligent control. Production control can be performed more finely and dynamically, and work efficiency can be significantly improved, which brings convenience to people's work and life and ultimately will forcefully promote the development of the national economy. However, the artificial intelligence Internet of ings technology is not mature enough and is still in an experimental stage. It provides a more reliable guarantee for the safety of personnel, reducing or avoiding the occurrence of tragedies. For this reason, the combination of artificial intelligence Internet of ings technology and electronic information engineering should be used scientifically and reasonably.

Data Availability
No data were used to support this study.