With the rapid development of artificial intelligence,the Internet of Things(IoT)can deploy various machine learning algorithms for network and application management.In the IoT environment,many sensors and devices ge...With the rapid development of artificial intelligence,the Internet of Things(IoT)can deploy various machine learning algorithms for network and application management.In the IoT environment,many sensors and devices generatemassive data,but data security and privacy protection have become a serious challenge.Federated learning(FL)can achieve many intelligent IoT applications by training models on local devices and allowing AI training on distributed IoT devices without data sharing.This review aims to deeply explore the combination of FL and the IoT,and analyze the application of federated learning in the IoT from the aspects of security and privacy protection.In this paper,we first describe the potential advantages of FL and the challenges faced by current IoT systems in the fields of network burden and privacy security.Next,we focus on exploring and analyzing the advantages of the combination of FL on the Internet,including privacy security,attack detection,efficient communication of the IoT,and enhanced learning quality.We also list various application scenarios of FL on the IoT.Finally,we propose several open research challenges and possible solutions.展开更多
As embodied intelligence(EI),large language models(LLMs),and cloud computing continue to advance,Industry5.0 facilitates the development of industrial artificial intelligence(Ind AI)through cyber-physical-social syste...As embodied intelligence(EI),large language models(LLMs),and cloud computing continue to advance,Industry5.0 facilitates the development of industrial artificial intelligence(Ind AI)through cyber-physical-social systems(CPSSs)with a human-centric focus.These technologies are organized by the system-wide approach of Industry 5.0,in order to empower the manufacturing industry to achieve broader societal goals of job creation,economic growth,and green production.This survey first provides a general framework of smart manufacturing in the context of Industry 5.0.Wherein,the embodied agents,like robots,sensors,and actuators,are the carriers for Ind AI,facilitating the development of the self-learning intelligence in individual entities,the collaborative intelligence in production lines and factories(smart systems),and the swarm intelligence within industrial clusters(systems of smart systems).Through the framework of CPSSs,the key technologies and their possible applications for supporting the single-agent,multi-agent and swarm-agent embodied Ind AI have been reviewed,such as the embodied perception,interaction,scheduling,multi-mode large language models,and collaborative training.Finally,to stimulate future research in this area,the open challenges and opportunities of applying Industry 5.0 to smart manufacturing are identified and discussed.The perspective of Industry 5.0-driven manufacturing industry aims to enhance operational productivity and efficiency by seamlessly integrating the virtual and physical worlds in a human-centered manner,thereby fostering an intelligent,sustainable,and resilient industrial landscape.展开更多
Microbatteries(MBs)are crucial to power miniaturized devices for the Internet of Things.In the evolutionary journey of MBs,fabrication technology emerges as the cornerstone,guiding the intricacies of their configurati...Microbatteries(MBs)are crucial to power miniaturized devices for the Internet of Things.In the evolutionary journey of MBs,fabrication technology emerges as the cornerstone,guiding the intricacies of their configuration designs,ensuring precision,and facilitating scalability for mass production.Photolithography stands out as an ideal technology,leveraging its unparalleled resolution,exceptional design flexibility,and entrenched position within the mature semiconductor industry.However,comprehensive reviews on its application in MB development remain scarce.This review aims to bridge that gap by thoroughly assessing the recent status and promising prospects of photolithographic microfabrication for MBs.Firstly,we delve into the fundamental principles and step-by-step procedures of photolithography,offering a nuanced understanding of its operational mechanisms and the criteria for photoresist selection.Subsequently,we highlighted the specific roles of photolithography in the fabrication of MBs,including its utilization as a template for creating miniaturized micropatterns,a protective layer during the etching process,a mold for soft lithography,a constituent of MB active component,and a sacrificial layer in the construction of micro-Swiss-roll structure.Finally,the review concludes with a summary of the key challenges and future perspectives of MBs fabricated by photolithography,providing comprehensive insights and sparking research inspiration in this field.展开更多
Objective Systematically integrate nurses’experience with“Internet Nursing Service”to analysis the nurses’experiences with“Internet Nursing Service”,and to provide a theoretical reference for formulating a more ...Objective Systematically integrate nurses’experience with“Internet Nursing Service”to analysis the nurses’experiences with“Internet Nursing Service”,and to provide a theoretical reference for formulating a more rational“Internet Nursing Service”model.Methods A systematic search in PubMed,Embase,Web of Science,the Cochrane Library,CINAHL,China National Knowledge Infrastructure(CNKI),Wanfang Database,and Chinese Biomedical Literature Database was conducted to collect qualitative research on nurses’experiences with“Internet Nursing Service,”with a retrieval time limit from December 2019 to June 2024.Qualitative meta-synthesis was performed through line-by-line coding of relevant quotes,organization of codes into descriptive themes,and development of analytical themes.Results A total of 19 studies were included,one study was rated as Grade A in quality evaluation,and the remaining studies were rated as Grade B.Collectively synthesized into three integrated results:Harvest and growth,Difficulties and challenges,and Expectations and support.Harvest and growth,include 1)manifestation of self-value,2)enhancing nursing capabilities,3)optimizing nursing resources;Difficulties and challenges,include 1)lack of safety guarantee,2)role conflict;Expectations and support include,1)expectation for professional knowledge and skill training,2)expectations for service platform optimization,3)expectation for reasonable charges,4)expectation for related policy support.Conclusion“Internet Nursing Service”model benefits both nurses and patients,but still full of challenges.It aids in the decentralization of medical resources.Management departments still need to encourage nurses to actively invest in“Internet Nursing Service”while ensuring their safety and interests.展开更多
The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and ...The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and advanced services.However,this rapid expansion also heightens the vulnerability of the IoT ecosystem to security threats.Consequently,innovative solutions capable of effectively mitigating risks while accommodating the unique constraints of IoT environments are urgently needed.Recently,the convergence of Blockchain technology and IoT has introduced a decentralized and robust framework for securing data and interactions,commonly referred to as the Internet of Blockchained Things(IoBT).Extensive research efforts have been devoted to adapting Blockchain technology to meet the specific requirements of IoT deployments.Within this context,consensus algorithms play a critical role in assessing the feasibility of integrating Blockchain into IoT ecosystems.The adoption of efficient and lightweight consensus mechanisms for block validation has become increasingly essential.This paper presents a comprehensive examination of lightweight,constraint-aware consensus algorithms tailored for IoBT.The study categorizes these consensus mechanisms based on their core operations,the security of the block validation process,the incorporation of AI techniques,and the specific applications they are designed to support.展开更多
In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),dee...In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),deeply embedded in the perception layer architecture of the IoT,play a crucial role as“tactile nerve endings.”A vast number of micro sensor nodes are widely distributed in monitoring areas according to preset deployment strategies,continuously and accurately perceiving and collecting real-time data on environmental parameters such as temperature,humidity,light intensity,air pressure,and pollutant concentration.These data are transmitted to the IoT cloud platform through stable and reliable communication links,forming a massive and detailed basic data resource pool.By using cutting-edge big data processing algorithms,machine learning models,and artificial intelligence analysis tools,in-depth mining and intelligent analysis of these multi-source heterogeneous data are conducted to generate high-value-added decision-making bases.This precisely empowers multiple fields,including agriculture,medical and health care,smart home,environmental science,and industrial manufacturing,driving intelligent transformation and catalyzing society to move towards a new stage of high-quality development.This paper comprehensively analyzes the technical cores of the IoT and WSNs,systematically sorts out the advanced key technologies of WSNs and the evolution of their strategic significance in the IoT system,deeply explores the innovative application scenarios and practical effects of the two in specific vertical fields,and looks forward to the technological evolution trends.It provides a detailed and highly practical guiding reference for researchers,technical engineers,and industrial decision-makers.展开更多
The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,s...The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,such as Artificial Intelligence(AI)and machine learning,to make accurate decisions.Data science is the science of dealing with data and its relationships through intelligent approaches.Most state-of-the-art research focuses independently on either data science or IIoT,rather than exploring their integration.Therefore,to address the gap,this article provides a comprehensive survey on the advances and integration of data science with the Intelligent IoT(IIoT)system by classifying the existing IoT-based data science techniques and presenting a summary of various characteristics.The paper analyzes the data science or big data security and privacy features,including network architecture,data protection,and continuous monitoring of data,which face challenges in various IoT-based systems.Extensive insights into IoT data security,privacy,and challenges are visualized in the context of data science for IoT.In addition,this study reveals the current opportunities to enhance data science and IoT market development.The current gap and challenges faced in the integration of data science and IoT are comprehensively presented,followed by the future outlook and possible solutions.展开更多
The Internet of Things(IoT)is integral to modern infrastructure,enabling connectivity among a wide range of devices from home automation to industrial control systems.With the exponential increase in data generated by...The Internet of Things(IoT)is integral to modern infrastructure,enabling connectivity among a wide range of devices from home automation to industrial control systems.With the exponential increase in data generated by these interconnected devices,robust anomaly detection mechanisms are essential.Anomaly detection in this dynamic environment necessitates methods that can accurately distinguish between normal and anomalous behavior by learning intricate patterns.This paper presents a novel approach utilizing generative adversarial networks(GANs)for anomaly detection in IoT systems.However,optimizing GANs involves tuning hyper-parameters such as learning rate,batch size,and optimization algorithms,which can be challenging due to the non-convex nature of GAN loss functions.To address this,we propose a five-dimensional Gray wolf optimizer(5DGWO)to optimize GAN hyper-parameters.The 5DGWO introduces two new types of wolves:gamma(γ)for improved exploitation and convergence,and theta(θ)for enhanced exploration and escaping local minima.The proposed system framework comprises four key stages:1)preprocessing,2)generative model training,3)autoencoder(AE)training,and 4)predictive model training.The generative models are utilized to assist the AE training,and the final predictive models(including convolutional neural network(CNN),deep belief network(DBN),recurrent neural network(RNN),random forest(RF),and extreme gradient boosting(XGBoost))are trained using the generated data and AE-encoded features.We evaluated the system on three benchmark datasets:NSL-KDD,UNSW-NB15,and IoT-23.Experiments conducted on diverse IoT datasets show that our method outperforms existing anomaly detection strategies and significantly reduces false positives.The 5DGWO-GAN-CNNAE exhibits superior performance in various metrics,including accuracy,recall,precision,root mean square error(RMSE),and convergence trend.The proposed 5DGWO-GAN-CNNAE achieved the lowest RMSE values across the NSL-KDD,UNSW-NB15,and IoT-23 datasets,with values of 0.24,1.10,and 0.09,respectively.Additionally,it attained the highest accuracy,ranging from 94%to 100%.These results suggest a promising direction for future IoT security frameworks,offering a scalable and efficient solution to safeguard against evolving cyber threats.展开更多
The Internet of Things(IoT)has orchestrated various domains in numerous applications,contributing significantly to the growth of the smart world,even in regions with low literacy rates,boosting socio-economic developm...The Internet of Things(IoT)has orchestrated various domains in numerous applications,contributing significantly to the growth of the smart world,even in regions with low literacy rates,boosting socio-economic development.This study provides valuable insights into optimizing wireless communication,paving the way for a more connected and productive future in the mining industry.The IoT revolution is advancing across industries,but harsh geometric environments,including open-pit mines,pose unique challenges for reliable communication.The advent of IoT in the mining industry has significantly improved communication for critical operations through the use of Radio Frequency(RF)protocols such as Bluetooth,Wi-Fi,GSM/GPRS,Narrow Band(NB)-IoT,SigFox,ZigBee,and Long Range Wireless Area Network(LoRaWAN).This study addresses the optimization of network implementations by comparing two leading free-spreading IoT-based RF protocols such as ZigBee and LoRaWAN.Intensive field tests are conducted in various opencast mines to investigate coverage potential and signal attenuation.ZigBee is tested in the Tadicherla open-cast coal mine in India.Similarly,LoRaWAN field tests are conducted at one of the associated cement companies(ACC)in the limestone mine in Bargarh,India,covering both Indoor-toOutdoor(I2O)and Outdoor-to-Outdoor(O2O)environments.A robust framework of path-loss models,referred to as Free space,Egli,Okumura-Hata,Cost231-Hata and Ericsson models,combined with key performance metrics,is employed to evaluate the patterns of signal attenuation.Extensive field testing and careful data analysis revealed that the Egli model is the most consistent path-loss model for the ZigBee protocol in an I2O environment,with a coefficient of determination(R^(2))of 0.907,balanced error metrics such as Normalized Root Mean Square Error(NRMSE)of 0.030,Mean Square Error(MSE)of 4.950,Mean Absolute Percentage Error(MAPE)of 0.249 and Scatter Index(SI)of 2.723.In the O2O scenario,the Ericsson model showed superior performance,with the highest R^(2)value of 0.959,supported by strong correlation metrics:NRMSE of 0.026,MSE of 8.685,MAPE of 0.685,Mean Absolute Deviation(MAD)of 20.839 and SI of 2.194.For the LoRaWAN protocol,the Cost-231 model achieved the highest R^(2)value of 0.921 in the I2O scenario,complemented by the lowest metrics:NRMSE of 0.018,MSE of 1.324,MAPE of 0.217,MAD of 9.218 and SI of 1.238.In the O2O environment,the Okumura-Hata model achieved the highest R^(2)value of 0.978,indicating a strong fit with metrics NRMSE of 0.047,MSE of 27.807,MAPE of 27.494,MAD of 37.287 and SI of 3.927.This advancement in reliable communication networks promises to transform the opencast landscape into networked signal attenuation.These results support decision-making for mining needs and ensure reliable communications even in the face of formidable obstacles.展开更多
Background Ongoing debates question the harm of internet use with the evolving technology,as many individuals transition from regular to problematic internet use(PIU).The habenula(Hb),located between the thalamus and ...Background Ongoing debates question the harm of internet use with the evolving technology,as many individuals transition from regular to problematic internet use(PIU).The habenula(Hb),located between the thalamus and the third ventricle,is implicated in various psychiatric disorders.In addition,personality features have been suggested to play a role in the pathophysiology of PIU.Aims This study aimed to investigate Hb volumetry in individuals with subclinical PIU and the mediating effect of personality traits on this relationship.Methods 110 healthy adults in this cross-sectional study underwent structural magnetic resonance imaging.Hb segmentation was performed using a deep learning technique.The Internet Addiction Test(IAT)and the NEO Five-Factor Inventory were used to assess the PIU level and personality,respectively.Partial Spearman's correlation analyses were performed to explore the reiationships between Hb volumetry,IAT and NEO.Multiple regression analysis was applied to identify personality traits that predict IAT scores.The significant trait was then treated as a mediator between Hb volume and IAT correlation in mediation analysis with a bootstrap value of 5000.Results Relative Hb volume was negatively correlated with IAT scores(partial rho=-0.142,p=0.009).The IAT score was positively correlated with neuroticism(partial rho=0.430,p<0.001)and negatively correlated with extraversion,agreeableness and conscientiousness(partial rho=-0.213,p<0.001;partial rho=-0.279,p<0.001;and partial rho=-0.327,p<0.001).There was a significant indirect effect of Hb volume on this model(β=-0.061,p=0.048,boot 95%confidence interval:-0.149 to-0.001).Conclusions This study uncovered a crucial link between reduced Hb volume and heightened PIU.Our findings highlight neuroticism as a key risk factor for developing PIU.Moreover,neuroticism was shown to mediate the relationship between Hb volume and PIU tendency,offering valuable insight into the complexities of this interaction.展开更多
1 Imagine a world where animals can text us their whereabouts,or maybe even their dinner plans.Sounds wild,right?Well,that's the idea behind the Internet of Animals(IoA),a cutting⁃edge concept that's bringing ...1 Imagine a world where animals can text us their whereabouts,or maybe even their dinner plans.Sounds wild,right?Well,that's the idea behind the Internet of Animals(IoA),a cutting⁃edge concept that's bringing the digital revolution to the animal kingdom.展开更多
The“notice-necessary measures”rule began with the“notice-and-takedown”rule,which originated from the United States safe harbors rule,established to limit the liability of Internet Service Providers(ISPs)for helpin...The“notice-necessary measures”rule began with the“notice-and-takedown”rule,which originated from the United States safe harbors rule,established to limit the liability of Internet Service Providers(ISPs)for helping infringement in network infringement.China’s Tort Liability Law and Civil Code amended the“notice-and-takedown”rule so that when the right holder sends an effective notice of infringement to the ISP,the ISP shall take necessary measures more than removal to be exempted from liability.This article will discuss the transformation of the rule and types of necessary measures,and reconstruct the relationship between effectiveness of notice and types of necessary measures.展开更多
China is a fast-developing nation,especially in traditional concepts of emphasis on agricultural production,with millions of highly educated college students as new generations of workers enter the workforce,while pro...China is a fast-developing nation,especially in traditional concepts of emphasis on agricultural production,with millions of highly educated college students as new generations of workers enter the workforce,while promoting the booming agriculture industry in China.Concerning these new generations of ambitious college students,it is a pretty attractive career to leverage their knowledge to spread their local special rural agricultural products(agri-products)to well-known places around the nation,even the world.Meanwhile,the Chinese government also supports rural products branding via internet marketing as well as the exploitation of online technologies.Su et al.pointed out that governments in China are expected to take more effective measures to enhance adoption rates of online purchases and sales technology,in particular for entrepreneurial farmers[1].Currently,the most existing phenomenon in China is that quantities of regional rural products with excellent quality but without national popularity.Thereby,it is significant to enhance the popularity of various brands in regional agricultural products using internet marketing,and also contribute to the nation’s strategy of rural revitalization.To appeal to the nations’strategy,we are supposed to make use of brand personality(BP)traits,which probably contribute to robust internet branding of regional agricultural products.Our research will focus on the influences of differential dimensions of brand personality(BP)in terms of common rural products,additionally,we also attempt to design a BP model for internet branding of agricultural products in China.Furthermore,from the two perspectives of characteristics in rural areas(agricultural producers and agricultural consumers),measures to assist agricultural producers in building their brands through the application of internet tools and marketing should be recognized.On the other side,methods to enhance agricultural consumers’brand loyalty also need to be captured.展开更多
This article reviews the concept of telemedicine,as well as the current status of its application in patients with schizophrenia,problems,and suggestions for improvement,with the aim of providing a reference for the a...This article reviews the concept of telemedicine,as well as the current status of its application in patients with schizophrenia,problems,and suggestions for improvement,with the aim of providing a reference for the application of telemedicine in patients with schizophrenia.展开更多
In the rapidly evolving landscape of digital health,the integration of data analytics and Internet healthserviceshasbecome a pivotal area of exploration.To meet keen social needs,Prof.Shan Liu(Xi'an Jiaotong Unive...In the rapidly evolving landscape of digital health,the integration of data analytics and Internet healthserviceshasbecome a pivotal area of exploration.To meet keen social needs,Prof.Shan Liu(Xi'an Jiaotong University)and Prof.Xing Zhang(Wuhan Textile University)have published the timely book Datadriven Internet Health Platform Service Value Co-creation through China Science Press.The book focuses on the provision of medical and health services from doctors to patients through Internet health platforms,where the service value is co-created by three parties.展开更多
1 The invention and development of the Internet was one of the biggest discoveries by mankind in the 20th century.Today,the Internet is used by more than 50%of the world population.Its applications are found in almost...1 The invention and development of the Internet was one of the biggest discoveries by mankind in the 20th century.Today,the Internet is used by more than 50%of the world population.Its applications are found in almost every field.There are many advantages of the Internet in the field of education,like gaining information,news,historical data,communication,etc.展开更多
The Internet has been enhanced recently by blockchain and Internet of Things(IoT)networks.The Internet of Things is a network of various sensor-equipped devices.It gradually integrates the Internet,sensors,and cloud c...The Internet has been enhanced recently by blockchain and Internet of Things(IoT)networks.The Internet of Things is a network of various sensor-equipped devices.It gradually integrates the Internet,sensors,and cloud computing.Blockchain is based on encryption algorithms,which are shared database technologies on the Internet.Blockchain technology has grown significantly because of its features,such as flexibility,support for integration,anonymity,decentralization,and independent control.Computational nodes in the blockchain network are used to verify online transactions.However,this integration creates scalability,interoperability,and security challenges.Over the last decade,several advancements in blockchain technology have drawn attention fromresearch communities and industries.Blockchain technology helps IoT networks become more reliable and enhance security and privacy.It also removes single points of failure and lowers the cost.In recent years,there has been an increasing amount of literature on IoT and blockchain technology applications.This paper extensively examines the current state of blockchain technologies,focusing specifically on their integration into the Internet of Things.Additionally,it highlights the benefits,drawbacks,and opportunities of recent studies on security issues based on blockchain solutions into categories.The survey examined various research papers fromdifferent types of publications.Also,a review of the other IoT applications has been included,focusing on the security requirements and challenges in IoT-based systems.Future research directions are gathered for the effective integration of Blockchain and IoT.展开更多
High-precision analog-to-digital converters(ADCs)serve as fundamental components in modern electronic systems,bridging physical analog world and digital intelligence.They find ubiquitous applications across diverse do...High-precision analog-to-digital converters(ADCs)serve as fundamental components in modern electronic systems,bridging physical analog world and digital intelligence.They find ubiquitous applications across diverse domains,ranging from internet of things(IoT)to embodied artificial intelligence systems.Achieving high precision necessitates various circuit techniques including high-performance amplifiers and advanced calibration schemes.Furthermore,the evolution of ADC architectures has gradually elevated the significance of peripheral circuitry co-design in optimizing system-level performance metrics.In ISSCC 2025,several techniques are proposed to address these challenges.展开更多
In the domain of Electronic Medical Records(EMRs),emerging technologies are crucial to addressing longstanding concerns surrounding transaction security and patient privacy.This paper explores the integration of smart...In the domain of Electronic Medical Records(EMRs),emerging technologies are crucial to addressing longstanding concerns surrounding transaction security and patient privacy.This paper explores the integration of smart contracts and blockchain technology as a robust framework for securing sensitive healthcare data.By leveraging the decentralized and immutable nature of blockchain,the proposed approach ensures transparency,integrity,and traceability of EMR transactions,effectivelymitigating risks of unauthorized access and data tampering.Smart contracts further enhance this framework by enabling the automation and enforcement of secure transactions,eliminating reliance on intermediaries and reducing the potential for human error.This integration marks a paradigm shift in management and exchange of healthcare information,fostering a secure and privacy-preserving ecosystem for all stakeholders.The research also evaluates the practical implementation of blockchain and smart contracts within healthcare systems,examining their real-world effectiveness in enhancing transactional security,safeguarding patient privacy,and maintaining data integrity.Findings from the study contribute valuable insights to the growing body of work on digital healthcare innovation,underscoring the potential of these technologies to transform EMR systems with high accuracy and precision.As global healthcare systems continue to face the challenge of protecting sensitive patient data,the proposed framework offers a forward-looking,scalable,and effective solution aligned with the evolving digital healthcare landscape.展开更多
Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enh...Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enhance the range of network information services accessible to humans.With the transition of terrestrial mobile communication networks from the 5G era,which provides access to information anywhere,to the 6G era,which seeks to connect everything,the construction of satellite Internet,which promises a“network reaching everywhere and service is ubiquitous”,has become the consensus of the industry’s development and the focus of global scientific and technological innovation.展开更多
基金supported by the Shandong Province Science and Technology Project(2023TSGC0509,2022TSGC2234)Qingdao Science and Technology Plan Project(23-1-5-yqpy-2-qy)Open Topic Grants of Anhui Province Key Laboratory of Intelligent Building&Building Energy Saving,Anhui Jianzhu University(IBES2024KF08).
文摘With the rapid development of artificial intelligence,the Internet of Things(IoT)can deploy various machine learning algorithms for network and application management.In the IoT environment,many sensors and devices generatemassive data,but data security and privacy protection have become a serious challenge.Federated learning(FL)can achieve many intelligent IoT applications by training models on local devices and allowing AI training on distributed IoT devices without data sharing.This review aims to deeply explore the combination of FL and the IoT,and analyze the application of federated learning in the IoT from the aspects of security and privacy protection.In this paper,we first describe the potential advantages of FL and the challenges faced by current IoT systems in the fields of network burden and privacy security.Next,we focus on exploring and analyzing the advantages of the combination of FL on the Internet,including privacy security,attack detection,efficient communication of the IoT,and enhanced learning quality.We also list various application scenarios of FL on the IoT.Finally,we propose several open research challenges and possible solutions.
基金supported by the National Key Research and Development Program of China(2021YFB1714300)the National Natural Science Foundation of China(62233005,U2441245,62173141)+3 种基金CNPC Innovation Found(2024DQ02-0507)Shanghai Natural Science(24ZR1416400)Shanghai Baiyu Lan Talent Program Pujiang Project(24PJD020)the Programme of Introducing Talents of Discipline to Universities(the 111 Project)(B17017)
文摘As embodied intelligence(EI),large language models(LLMs),and cloud computing continue to advance,Industry5.0 facilitates the development of industrial artificial intelligence(Ind AI)through cyber-physical-social systems(CPSSs)with a human-centric focus.These technologies are organized by the system-wide approach of Industry 5.0,in order to empower the manufacturing industry to achieve broader societal goals of job creation,economic growth,and green production.This survey first provides a general framework of smart manufacturing in the context of Industry 5.0.Wherein,the embodied agents,like robots,sensors,and actuators,are the carriers for Ind AI,facilitating the development of the self-learning intelligence in individual entities,the collaborative intelligence in production lines and factories(smart systems),and the swarm intelligence within industrial clusters(systems of smart systems).Through the framework of CPSSs,the key technologies and their possible applications for supporting the single-agent,multi-agent and swarm-agent embodied Ind AI have been reviewed,such as the embodied perception,interaction,scheduling,multi-mode large language models,and collaborative training.Finally,to stimulate future research in this area,the open challenges and opportunities of applying Industry 5.0 to smart manufacturing are identified and discussed.The perspective of Industry 5.0-driven manufacturing industry aims to enhance operational productivity and efficiency by seamlessly integrating the virtual and physical worlds in a human-centered manner,thereby fostering an intelligent,sustainable,and resilient industrial landscape.
基金supported by the National Natural Science Foundation of China(22125903,22439003,22209175)the National Key R&D Program of China(Grant 2022YFA1504100,2023YFB4005204)+1 种基金the Energy Revolution S&T Program of Yulin Innovation Institute of Clean Energy(Grant E412010508)the State Key Laboratory of Catalysis(No:2024SKL-A-001)。
文摘Microbatteries(MBs)are crucial to power miniaturized devices for the Internet of Things.In the evolutionary journey of MBs,fabrication technology emerges as the cornerstone,guiding the intricacies of their configuration designs,ensuring precision,and facilitating scalability for mass production.Photolithography stands out as an ideal technology,leveraging its unparalleled resolution,exceptional design flexibility,and entrenched position within the mature semiconductor industry.However,comprehensive reviews on its application in MB development remain scarce.This review aims to bridge that gap by thoroughly assessing the recent status and promising prospects of photolithographic microfabrication for MBs.Firstly,we delve into the fundamental principles and step-by-step procedures of photolithography,offering a nuanced understanding of its operational mechanisms and the criteria for photoresist selection.Subsequently,we highlighted the specific roles of photolithography in the fabrication of MBs,including its utilization as a template for creating miniaturized micropatterns,a protective layer during the etching process,a mold for soft lithography,a constituent of MB active component,and a sacrificial layer in the construction of micro-Swiss-roll structure.Finally,the review concludes with a summary of the key challenges and future perspectives of MBs fabricated by photolithography,providing comprehensive insights and sparking research inspiration in this field.
基金supported by the General Project of the Cultivation Project of the Chinese Hospital Reform and Development Research Institute of Nanjing University(NDYG2022072)。
文摘Objective Systematically integrate nurses’experience with“Internet Nursing Service”to analysis the nurses’experiences with“Internet Nursing Service”,and to provide a theoretical reference for formulating a more rational“Internet Nursing Service”model.Methods A systematic search in PubMed,Embase,Web of Science,the Cochrane Library,CINAHL,China National Knowledge Infrastructure(CNKI),Wanfang Database,and Chinese Biomedical Literature Database was conducted to collect qualitative research on nurses’experiences with“Internet Nursing Service,”with a retrieval time limit from December 2019 to June 2024.Qualitative meta-synthesis was performed through line-by-line coding of relevant quotes,organization of codes into descriptive themes,and development of analytical themes.Results A total of 19 studies were included,one study was rated as Grade A in quality evaluation,and the remaining studies were rated as Grade B.Collectively synthesized into three integrated results:Harvest and growth,Difficulties and challenges,and Expectations and support.Harvest and growth,include 1)manifestation of self-value,2)enhancing nursing capabilities,3)optimizing nursing resources;Difficulties and challenges,include 1)lack of safety guarantee,2)role conflict;Expectations and support include,1)expectation for professional knowledge and skill training,2)expectations for service platform optimization,3)expectation for reasonable charges,4)expectation for related policy support.Conclusion“Internet Nursing Service”model benefits both nurses and patients,but still full of challenges.It aids in the decentralization of medical resources.Management departments still need to encourage nurses to actively invest in“Internet Nursing Service”while ensuring their safety and interests.
文摘The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and advanced services.However,this rapid expansion also heightens the vulnerability of the IoT ecosystem to security threats.Consequently,innovative solutions capable of effectively mitigating risks while accommodating the unique constraints of IoT environments are urgently needed.Recently,the convergence of Blockchain technology and IoT has introduced a decentralized and robust framework for securing data and interactions,commonly referred to as the Internet of Blockchained Things(IoBT).Extensive research efforts have been devoted to adapting Blockchain technology to meet the specific requirements of IoT deployments.Within this context,consensus algorithms play a critical role in assessing the feasibility of integrating Blockchain into IoT ecosystems.The adoption of efficient and lightweight consensus mechanisms for block validation has become increasingly essential.This paper presents a comprehensive examination of lightweight,constraint-aware consensus algorithms tailored for IoBT.The study categorizes these consensus mechanisms based on their core operations,the security of the block validation process,the incorporation of AI techniques,and the specific applications they are designed to support.
文摘In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),deeply embedded in the perception layer architecture of the IoT,play a crucial role as“tactile nerve endings.”A vast number of micro sensor nodes are widely distributed in monitoring areas according to preset deployment strategies,continuously and accurately perceiving and collecting real-time data on environmental parameters such as temperature,humidity,light intensity,air pressure,and pollutant concentration.These data are transmitted to the IoT cloud platform through stable and reliable communication links,forming a massive and detailed basic data resource pool.By using cutting-edge big data processing algorithms,machine learning models,and artificial intelligence analysis tools,in-depth mining and intelligent analysis of these multi-source heterogeneous data are conducted to generate high-value-added decision-making bases.This precisely empowers multiple fields,including agriculture,medical and health care,smart home,environmental science,and industrial manufacturing,driving intelligent transformation and catalyzing society to move towards a new stage of high-quality development.This paper comprehensively analyzes the technical cores of the IoT and WSNs,systematically sorts out the advanced key technologies of WSNs and the evolution of their strategic significance in the IoT system,deeply explores the innovative application scenarios and practical effects of the two in specific vertical fields,and looks forward to the technological evolution trends.It provides a detailed and highly practical guiding reference for researchers,technical engineers,and industrial decision-makers.
基金supported in part by the National Natural Science Foundation of China under Grant 62371181in part by the Changzhou Science and Technology International Cooperation Program under Grant CZ20230029+1 种基金supported by a National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT)(2021R1A2B5B02087169)supported under the framework of international cooperation program managed by the National Research Foundation of Korea(2022K2A9A1A01098051)。
文摘The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,such as Artificial Intelligence(AI)and machine learning,to make accurate decisions.Data science is the science of dealing with data and its relationships through intelligent approaches.Most state-of-the-art research focuses independently on either data science or IIoT,rather than exploring their integration.Therefore,to address the gap,this article provides a comprehensive survey on the advances and integration of data science with the Intelligent IoT(IIoT)system by classifying the existing IoT-based data science techniques and presenting a summary of various characteristics.The paper analyzes the data science or big data security and privacy features,including network architecture,data protection,and continuous monitoring of data,which face challenges in various IoT-based systems.Extensive insights into IoT data security,privacy,and challenges are visualized in the context of data science for IoT.In addition,this study reveals the current opportunities to enhance data science and IoT market development.The current gap and challenges faced in the integration of data science and IoT are comprehensively presented,followed by the future outlook and possible solutions.
基金described in this paper has been developed with in the project PRESECREL(PID2021-124502OB-C43)。
文摘The Internet of Things(IoT)is integral to modern infrastructure,enabling connectivity among a wide range of devices from home automation to industrial control systems.With the exponential increase in data generated by these interconnected devices,robust anomaly detection mechanisms are essential.Anomaly detection in this dynamic environment necessitates methods that can accurately distinguish between normal and anomalous behavior by learning intricate patterns.This paper presents a novel approach utilizing generative adversarial networks(GANs)for anomaly detection in IoT systems.However,optimizing GANs involves tuning hyper-parameters such as learning rate,batch size,and optimization algorithms,which can be challenging due to the non-convex nature of GAN loss functions.To address this,we propose a five-dimensional Gray wolf optimizer(5DGWO)to optimize GAN hyper-parameters.The 5DGWO introduces two new types of wolves:gamma(γ)for improved exploitation and convergence,and theta(θ)for enhanced exploration and escaping local minima.The proposed system framework comprises four key stages:1)preprocessing,2)generative model training,3)autoencoder(AE)training,and 4)predictive model training.The generative models are utilized to assist the AE training,and the final predictive models(including convolutional neural network(CNN),deep belief network(DBN),recurrent neural network(RNN),random forest(RF),and extreme gradient boosting(XGBoost))are trained using the generated data and AE-encoded features.We evaluated the system on three benchmark datasets:NSL-KDD,UNSW-NB15,and IoT-23.Experiments conducted on diverse IoT datasets show that our method outperforms existing anomaly detection strategies and significantly reduces false positives.The 5DGWO-GAN-CNNAE exhibits superior performance in various metrics,including accuracy,recall,precision,root mean square error(RMSE),and convergence trend.The proposed 5DGWO-GAN-CNNAE achieved the lowest RMSE values across the NSL-KDD,UNSW-NB15,and IoT-23 datasets,with values of 0.24,1.10,and 0.09,respectively.Additionally,it attained the highest accuracy,ranging from 94%to 100%.These results suggest a promising direction for future IoT security frameworks,offering a scalable and efficient solution to safeguard against evolving cyber threats.
文摘The Internet of Things(IoT)has orchestrated various domains in numerous applications,contributing significantly to the growth of the smart world,even in regions with low literacy rates,boosting socio-economic development.This study provides valuable insights into optimizing wireless communication,paving the way for a more connected and productive future in the mining industry.The IoT revolution is advancing across industries,but harsh geometric environments,including open-pit mines,pose unique challenges for reliable communication.The advent of IoT in the mining industry has significantly improved communication for critical operations through the use of Radio Frequency(RF)protocols such as Bluetooth,Wi-Fi,GSM/GPRS,Narrow Band(NB)-IoT,SigFox,ZigBee,and Long Range Wireless Area Network(LoRaWAN).This study addresses the optimization of network implementations by comparing two leading free-spreading IoT-based RF protocols such as ZigBee and LoRaWAN.Intensive field tests are conducted in various opencast mines to investigate coverage potential and signal attenuation.ZigBee is tested in the Tadicherla open-cast coal mine in India.Similarly,LoRaWAN field tests are conducted at one of the associated cement companies(ACC)in the limestone mine in Bargarh,India,covering both Indoor-toOutdoor(I2O)and Outdoor-to-Outdoor(O2O)environments.A robust framework of path-loss models,referred to as Free space,Egli,Okumura-Hata,Cost231-Hata and Ericsson models,combined with key performance metrics,is employed to evaluate the patterns of signal attenuation.Extensive field testing and careful data analysis revealed that the Egli model is the most consistent path-loss model for the ZigBee protocol in an I2O environment,with a coefficient of determination(R^(2))of 0.907,balanced error metrics such as Normalized Root Mean Square Error(NRMSE)of 0.030,Mean Square Error(MSE)of 4.950,Mean Absolute Percentage Error(MAPE)of 0.249 and Scatter Index(SI)of 2.723.In the O2O scenario,the Ericsson model showed superior performance,with the highest R^(2)value of 0.959,supported by strong correlation metrics:NRMSE of 0.026,MSE of 8.685,MAPE of 0.685,Mean Absolute Deviation(MAD)of 20.839 and SI of 2.194.For the LoRaWAN protocol,the Cost-231 model achieved the highest R^(2)value of 0.921 in the I2O scenario,complemented by the lowest metrics:NRMSE of 0.018,MSE of 1.324,MAPE of 0.217,MAD of 9.218 and SI of 1.238.In the O2O environment,the Okumura-Hata model achieved the highest R^(2)value of 0.978,indicating a strong fit with metrics NRMSE of 0.047,MSE of 27.807,MAPE of 27.494,MAD of 37.287 and SI of 3.927.This advancement in reliable communication networks promises to transform the opencast landscape into networked signal attenuation.These results support decision-making for mining needs and ensure reliable communications even in the face of formidable obstacles.
基金funded by a Grant-in-Aid for Scientific Research(B)(Japan Society for The Promotion of Science,21H02849)Grant-in-Aid for Scientific Research(C)(Japan Society for The Promotion of Science,23K07013)+2 种基金Grant-in-Aid for Transformative Research Areas(A)(Japan Society for The Promotion of Science,JP21H05173)Grant-in-Aid by the Smoking Research FoundationGrant-in-Aid by the Telecommunications Advancement Foundation.
文摘Background Ongoing debates question the harm of internet use with the evolving technology,as many individuals transition from regular to problematic internet use(PIU).The habenula(Hb),located between the thalamus and the third ventricle,is implicated in various psychiatric disorders.In addition,personality features have been suggested to play a role in the pathophysiology of PIU.Aims This study aimed to investigate Hb volumetry in individuals with subclinical PIU and the mediating effect of personality traits on this relationship.Methods 110 healthy adults in this cross-sectional study underwent structural magnetic resonance imaging.Hb segmentation was performed using a deep learning technique.The Internet Addiction Test(IAT)and the NEO Five-Factor Inventory were used to assess the PIU level and personality,respectively.Partial Spearman's correlation analyses were performed to explore the reiationships between Hb volumetry,IAT and NEO.Multiple regression analysis was applied to identify personality traits that predict IAT scores.The significant trait was then treated as a mediator between Hb volume and IAT correlation in mediation analysis with a bootstrap value of 5000.Results Relative Hb volume was negatively correlated with IAT scores(partial rho=-0.142,p=0.009).The IAT score was positively correlated with neuroticism(partial rho=0.430,p<0.001)and negatively correlated with extraversion,agreeableness and conscientiousness(partial rho=-0.213,p<0.001;partial rho=-0.279,p<0.001;and partial rho=-0.327,p<0.001).There was a significant indirect effect of Hb volume on this model(β=-0.061,p=0.048,boot 95%confidence interval:-0.149 to-0.001).Conclusions This study uncovered a crucial link between reduced Hb volume and heightened PIU.Our findings highlight neuroticism as a key risk factor for developing PIU.Moreover,neuroticism was shown to mediate the relationship between Hb volume and PIU tendency,offering valuable insight into the complexities of this interaction.
文摘1 Imagine a world where animals can text us their whereabouts,or maybe even their dinner plans.Sounds wild,right?Well,that's the idea behind the Internet of Animals(IoA),a cutting⁃edge concept that's bringing the digital revolution to the animal kingdom.
文摘The“notice-necessary measures”rule began with the“notice-and-takedown”rule,which originated from the United States safe harbors rule,established to limit the liability of Internet Service Providers(ISPs)for helping infringement in network infringement.China’s Tort Liability Law and Civil Code amended the“notice-and-takedown”rule so that when the right holder sends an effective notice of infringement to the ISP,the ISP shall take necessary measures more than removal to be exempted from liability.This article will discuss the transformation of the rule and types of necessary measures,and reconstruct the relationship between effectiveness of notice and types of necessary measures.
文摘China is a fast-developing nation,especially in traditional concepts of emphasis on agricultural production,with millions of highly educated college students as new generations of workers enter the workforce,while promoting the booming agriculture industry in China.Concerning these new generations of ambitious college students,it is a pretty attractive career to leverage their knowledge to spread their local special rural agricultural products(agri-products)to well-known places around the nation,even the world.Meanwhile,the Chinese government also supports rural products branding via internet marketing as well as the exploitation of online technologies.Su et al.pointed out that governments in China are expected to take more effective measures to enhance adoption rates of online purchases and sales technology,in particular for entrepreneurial farmers[1].Currently,the most existing phenomenon in China is that quantities of regional rural products with excellent quality but without national popularity.Thereby,it is significant to enhance the popularity of various brands in regional agricultural products using internet marketing,and also contribute to the nation’s strategy of rural revitalization.To appeal to the nations’strategy,we are supposed to make use of brand personality(BP)traits,which probably contribute to robust internet branding of regional agricultural products.Our research will focus on the influences of differential dimensions of brand personality(BP)in terms of common rural products,additionally,we also attempt to design a BP model for internet branding of agricultural products in China.Furthermore,from the two perspectives of characteristics in rural areas(agricultural producers and agricultural consumers),measures to assist agricultural producers in building their brands through the application of internet tools and marketing should be recognized.On the other side,methods to enhance agricultural consumers’brand loyalty also need to be captured.
文摘This article reviews the concept of telemedicine,as well as the current status of its application in patients with schizophrenia,problems,and suggestions for improvement,with the aim of providing a reference for the application of telemedicine in patients with schizophrenia.
文摘In the rapidly evolving landscape of digital health,the integration of data analytics and Internet healthserviceshasbecome a pivotal area of exploration.To meet keen social needs,Prof.Shan Liu(Xi'an Jiaotong University)and Prof.Xing Zhang(Wuhan Textile University)have published the timely book Datadriven Internet Health Platform Service Value Co-creation through China Science Press.The book focuses on the provision of medical and health services from doctors to patients through Internet health platforms,where the service value is co-created by three parties.
文摘1 The invention and development of the Internet was one of the biggest discoveries by mankind in the 20th century.Today,the Internet is used by more than 50%of the world population.Its applications are found in almost every field.There are many advantages of the Internet in the field of education,like gaining information,news,historical data,communication,etc.
文摘The Internet has been enhanced recently by blockchain and Internet of Things(IoT)networks.The Internet of Things is a network of various sensor-equipped devices.It gradually integrates the Internet,sensors,and cloud computing.Blockchain is based on encryption algorithms,which are shared database technologies on the Internet.Blockchain technology has grown significantly because of its features,such as flexibility,support for integration,anonymity,decentralization,and independent control.Computational nodes in the blockchain network are used to verify online transactions.However,this integration creates scalability,interoperability,and security challenges.Over the last decade,several advancements in blockchain technology have drawn attention fromresearch communities and industries.Blockchain technology helps IoT networks become more reliable and enhance security and privacy.It also removes single points of failure and lowers the cost.In recent years,there has been an increasing amount of literature on IoT and blockchain technology applications.This paper extensively examines the current state of blockchain technologies,focusing specifically on their integration into the Internet of Things.Additionally,it highlights the benefits,drawbacks,and opportunities of recent studies on security issues based on blockchain solutions into categories.The survey examined various research papers fromdifferent types of publications.Also,a review of the other IoT applications has been included,focusing on the security requirements and challenges in IoT-based systems.Future research directions are gathered for the effective integration of Blockchain and IoT.
文摘High-precision analog-to-digital converters(ADCs)serve as fundamental components in modern electronic systems,bridging physical analog world and digital intelligence.They find ubiquitous applications across diverse domains,ranging from internet of things(IoT)to embodied artificial intelligence systems.Achieving high precision necessitates various circuit techniques including high-performance amplifiers and advanced calibration schemes.Furthermore,the evolution of ADC architectures has gradually elevated the significance of peripheral circuitry co-design in optimizing system-level performance metrics.In ISSCC 2025,several techniques are proposed to address these challenges.
文摘In the domain of Electronic Medical Records(EMRs),emerging technologies are crucial to addressing longstanding concerns surrounding transaction security and patient privacy.This paper explores the integration of smart contracts and blockchain technology as a robust framework for securing sensitive healthcare data.By leveraging the decentralized and immutable nature of blockchain,the proposed approach ensures transparency,integrity,and traceability of EMR transactions,effectivelymitigating risks of unauthorized access and data tampering.Smart contracts further enhance this framework by enabling the automation and enforcement of secure transactions,eliminating reliance on intermediaries and reducing the potential for human error.This integration marks a paradigm shift in management and exchange of healthcare information,fostering a secure and privacy-preserving ecosystem for all stakeholders.The research also evaluates the practical implementation of blockchain and smart contracts within healthcare systems,examining their real-world effectiveness in enhancing transactional security,safeguarding patient privacy,and maintaining data integrity.Findings from the study contribute valuable insights to the growing body of work on digital healthcare innovation,underscoring the potential of these technologies to transform EMR systems with high accuracy and precision.As global healthcare systems continue to face the challenge of protecting sensitive patient data,the proposed framework offers a forward-looking,scalable,and effective solution aligned with the evolving digital healthcare landscape.
文摘Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enhance the range of network information services accessible to humans.With the transition of terrestrial mobile communication networks from the 5G era,which provides access to information anywhere,to the 6G era,which seeks to connect everything,the construction of satellite Internet,which promises a“network reaching everywhere and service is ubiquitous”,has become the consensus of the industry’s development and the focus of global scientific and technological innovation.