internet.com第三季度全线大捷,截止到9月30日,该季度总收入1470万美元,较去年同期的410万美元飙升了258%。纯收入为110万美元,每股纯收益为4美分。internet.com的董事会主席兼CEO Alan M.Meckler认为公司充分掌握到了市场的先...internet.com第三季度全线大捷,截止到9月30日,该季度总收入1470万美元,较去年同期的410万美元飙升了258%。纯收入为110万美元,每股纯收益为4美分。internet.com的董事会主席兼CEO Alan M.Meckler认为公司充分掌握到了市场的先机,使投资发挥了最大的效率。展开更多
With the rapid development of artificial intelligence,the Internet of Things(IoT)can deploy various machine learning algorithms for network and application management.In the IoT environment,many sensors and devices ge...With the rapid development of artificial intelligence,the Internet of Things(IoT)can deploy various machine learning algorithms for network and application management.In the IoT environment,many sensors and devices generatemassive data,but data security and privacy protection have become a serious challenge.Federated learning(FL)can achieve many intelligent IoT applications by training models on local devices and allowing AI training on distributed IoT devices without data sharing.This review aims to deeply explore the combination of FL and the IoT,and analyze the application of federated learning in the IoT from the aspects of security and privacy protection.In this paper,we first describe the potential advantages of FL and the challenges faced by current IoT systems in the fields of network burden and privacy security.Next,we focus on exploring and analyzing the advantages of the combination of FL on the Internet,including privacy security,attack detection,efficient communication of the IoT,and enhanced learning quality.We also list various application scenarios of FL on the IoT.Finally,we propose several open research challenges and possible solutions.展开更多
Objective Systematically integrate nurses’experience with“Internet Nursing Service”to analysis the nurses’experiences with“Internet Nursing Service”,and to provide a theoretical reference for formulating a more ...Objective Systematically integrate nurses’experience with“Internet Nursing Service”to analysis the nurses’experiences with“Internet Nursing Service”,and to provide a theoretical reference for formulating a more rational“Internet Nursing Service”model.Methods A systematic search in PubMed,Embase,Web of Science,the Cochrane Library,CINAHL,China National Knowledge Infrastructure(CNKI),Wanfang Database,and Chinese Biomedical Literature Database was conducted to collect qualitative research on nurses’experiences with“Internet Nursing Service,”with a retrieval time limit from December 2019 to June 2024.Qualitative meta-synthesis was performed through line-by-line coding of relevant quotes,organization of codes into descriptive themes,and development of analytical themes.Results A total of 19 studies were included,one study was rated as Grade A in quality evaluation,and the remaining studies were rated as Grade B.Collectively synthesized into three integrated results:Harvest and growth,Difficulties and challenges,and Expectations and support.Harvest and growth,include 1)manifestation of self-value,2)enhancing nursing capabilities,3)optimizing nursing resources;Difficulties and challenges,include 1)lack of safety guarantee,2)role conflict;Expectations and support include,1)expectation for professional knowledge and skill training,2)expectations for service platform optimization,3)expectation for reasonable charges,4)expectation for related policy support.Conclusion“Internet Nursing Service”model benefits both nurses and patients,but still full of challenges.It aids in the decentralization of medical resources.Management departments still need to encourage nurses to actively invest in“Internet Nursing Service”while ensuring their safety and interests.展开更多
The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and ...The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and advanced services.However,this rapid expansion also heightens the vulnerability of the IoT ecosystem to security threats.Consequently,innovative solutions capable of effectively mitigating risks while accommodating the unique constraints of IoT environments are urgently needed.Recently,the convergence of Blockchain technology and IoT has introduced a decentralized and robust framework for securing data and interactions,commonly referred to as the Internet of Blockchained Things(IoBT).Extensive research efforts have been devoted to adapting Blockchain technology to meet the specific requirements of IoT deployments.Within this context,consensus algorithms play a critical role in assessing the feasibility of integrating Blockchain into IoT ecosystems.The adoption of efficient and lightweight consensus mechanisms for block validation has become increasingly essential.This paper presents a comprehensive examination of lightweight,constraint-aware consensus algorithms tailored for IoBT.The study categorizes these consensus mechanisms based on their core operations,the security of the block validation process,the incorporation of AI techniques,and the specific applications they are designed to support.展开更多
Background Ongoing debates question the harm of internet use with the evolving technology,as many individuals transition from regular to problematic internet use(PIU).The habenula(Hb),located between the thalamus and ...Background Ongoing debates question the harm of internet use with the evolving technology,as many individuals transition from regular to problematic internet use(PIU).The habenula(Hb),located between the thalamus and the third ventricle,is implicated in various psychiatric disorders.In addition,personality features have been suggested to play a role in the pathophysiology of PIU.Aims This study aimed to investigate Hb volumetry in individuals with subclinical PIU and the mediating effect of personality traits on this relationship.Methods 110 healthy adults in this cross-sectional study underwent structural magnetic resonance imaging.Hb segmentation was performed using a deep learning technique.The Internet Addiction Test(IAT)and the NEO Five-Factor Inventory were used to assess the PIU level and personality,respectively.Partial Spearman's correlation analyses were performed to explore the reiationships between Hb volumetry,IAT and NEO.Multiple regression analysis was applied to identify personality traits that predict IAT scores.The significant trait was then treated as a mediator between Hb volume and IAT correlation in mediation analysis with a bootstrap value of 5000.Results Relative Hb volume was negatively correlated with IAT scores(partial rho=-0.142,p=0.009).The IAT score was positively correlated with neuroticism(partial rho=0.430,p<0.001)and negatively correlated with extraversion,agreeableness and conscientiousness(partial rho=-0.213,p<0.001;partial rho=-0.279,p<0.001;and partial rho=-0.327,p<0.001).There was a significant indirect effect of Hb volume on this model(β=-0.061,p=0.048,boot 95%confidence interval:-0.149 to-0.001).Conclusions This study uncovered a crucial link between reduced Hb volume and heightened PIU.Our findings highlight neuroticism as a key risk factor for developing PIU.Moreover,neuroticism was shown to mediate the relationship between Hb volume and PIU tendency,offering valuable insight into the complexities of this interaction.展开更多
China is a fast-developing nation,especially in traditional concepts of emphasis on agricultural production,with millions of highly educated college students as new generations of workers enter the workforce,while pro...China is a fast-developing nation,especially in traditional concepts of emphasis on agricultural production,with millions of highly educated college students as new generations of workers enter the workforce,while promoting the booming agriculture industry in China.Concerning these new generations of ambitious college students,it is a pretty attractive career to leverage their knowledge to spread their local special rural agricultural products(agri-products)to well-known places around the nation,even the world.Meanwhile,the Chinese government also supports rural products branding via internet marketing as well as the exploitation of online technologies.Su et al.pointed out that governments in China are expected to take more effective measures to enhance adoption rates of online purchases and sales technology,in particular for entrepreneurial farmers[1].Currently,the most existing phenomenon in China is that quantities of regional rural products with excellent quality but without national popularity.Thereby,it is significant to enhance the popularity of various brands in regional agricultural products using internet marketing,and also contribute to the nation’s strategy of rural revitalization.To appeal to the nations’strategy,we are supposed to make use of brand personality(BP)traits,which probably contribute to robust internet branding of regional agricultural products.Our research will focus on the influences of differential dimensions of brand personality(BP)in terms of common rural products,additionally,we also attempt to design a BP model for internet branding of agricultural products in China.Furthermore,from the two perspectives of characteristics in rural areas(agricultural producers and agricultural consumers),measures to assist agricultural producers in building their brands through the application of internet tools and marketing should be recognized.On the other side,methods to enhance agricultural consumers’brand loyalty also need to be captured.展开更多
In the rapidly evolving landscape of digital health,the integration of data analytics and Internet healthserviceshasbecome a pivotal area of exploration.To meet keen social needs,Prof.Shan Liu(Xi'an Jiaotong Unive...In the rapidly evolving landscape of digital health,the integration of data analytics and Internet healthserviceshasbecome a pivotal area of exploration.To meet keen social needs,Prof.Shan Liu(Xi'an Jiaotong University)and Prof.Xing Zhang(Wuhan Textile University)have published the timely book Datadriven Internet Health Platform Service Value Co-creation through China Science Press.The book focuses on the provision of medical and health services from doctors to patients through Internet health platforms,where the service value is co-created by three parties.展开更多
Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enh...Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enhance the range of network information services accessible to humans.With the transition of terrestrial mobile communication networks from the 5G era,which provides access to information anywhere,to the 6G era,which seeks to connect everything,the construction of satellite Internet,which promises a“network reaching everywhere and service is ubiquitous”,has become the consensus of the industry’s development and the focus of global scientific and technological innovation.展开更多
The digital revolution era has impacted various domains,including healthcare,where digital technology enables access to and control of medical information,remote patient monitoring,and enhanced clinical support based ...The digital revolution era has impacted various domains,including healthcare,where digital technology enables access to and control of medical information,remote patient monitoring,and enhanced clinical support based on the Internet of Health Things(IoHTs).However,data privacy and security,data management,and scalability present challenges to widespread adoption.This paper presents a comprehensive literature review that examines the authentication mechanisms utilized within IoHT,highlighting their critical roles in ensuring secure data exchange and patient privacy.This includes various authentication technologies and strategies,such as biometric and multifactor authentication,as well as the influence of emerging technologies like blockchain,fog computing,and Artificial Intelligence(AI).The findings indicate that emerging technologies offer hope for the future of IoHT security,promising to address key challenges such as scalability,integrity,privacy and other security requirements.With this systematic review,healthcare providers,decision makers,scientists and researchers are empowered to confidently evaluate the applicability of IoT in healthcare,shaping the future of this field.展开更多
Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enh...Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enhance the range of network information services accessible to humans.With the transition of terrestrial mobile communication networks from the 5G era,which provides access to information anywhere,to the 6G era,which seeks to connect everything,the construction of satellite Internet,which promises a"network reaching everywhere and service is ubiquitous",has become the consensus of the industry's development and the focus of global scientific and technological innovation.展开更多
With the in-depth reform of labor education,the teaching of the Floriculture course in colleges and universities should be further optimized.Teachers need to actively introduce new educational concepts and teaching me...With the in-depth reform of labor education,the teaching of the Floriculture course in colleges and universities should be further optimized.Teachers need to actively introduce new educational concepts and teaching methods to better arouse college students’interest,strengthen their understanding and application of the knowledge they have learned,and improve the effect of talent cultivation.As a popular educational auxiliary tool at present,Internet technology can greatly enrich the content of the Floriculture course teaching in colleges and universities,expand the path of talent cultivation,and play a significant role in promoting the all-round development of college students.In view of this,this paper will analyze the teaching reform of the Floriculture course in colleges and universities under the background of“Internet+”and put forward some strategies,which are only for reference by colleagues.展开更多
This paper investigated the research status and development trends of agricultural environment monitoring systems primarily based on the internet.The issues encountered during system implementation and their correspon...This paper investigated the research status and development trends of agricultural environment monitoring systems primarily based on the internet.The issues encountered during system implementation and their corresponding solutions were analyzed by reviewing relevant domestic and international literature.Through this study,it is understood that advancements in sensor technology have significantly facilitated the collection of agricultural environmental data and real-time data processing.However,inconsistencies in data from sensors with different standards lead to incompatibility of information,thereby restricting comprehensive data utilization.Furthermore,the lack of intelligent analysis technology and the limitations of algorithms have hindered the full utilization of agricultural environmental data mining and intelligent decision support systems,severely impacting the precision management of agricultural production.Therefore,subsequent research will strengthen international technical cooperation and exchanges,promote collaborative innovation in various fields,and facilitate the introduction of new technologies such as Big Data and Cloud Computing.Establishing unified data interfaces and developing adaptive algorithm models represent beneficial attempts to break through bottlenecks and promote sustainable agricultural development.Therefore,this study provides a reference for exploring the application prospects of the internet in agricultural production,while also emphasizing the feasibility and importance of in-depth research and application of the internet to advance sustainable agricultural development.展开更多
With the rapid development of the industrial Internet,the network security environment has become increasingly complex and variable.Intrusion detection,a core technology for ensuring the security of industrial control...With the rapid development of the industrial Internet,the network security environment has become increasingly complex and variable.Intrusion detection,a core technology for ensuring the security of industrial control systems,faces the challenge of unbalanced data samples,particularly the low detection rates for minority class attack samples.Therefore,this paper proposes a data enhancement method for intrusion detection in the industrial Internet based on a Self-Attention Wasserstein Generative Adversarial Network(SA-WGAN)to address the low detection rates of minority class attack samples in unbalanced intrusion detection scenarios.The proposed method integrates a selfattention mechanism with a Wasserstein Generative Adversarial Network(WGAN).The self-attention mechanism automatically learns important features from the input data and assigns different weights to emphasize the key features related to intrusion behaviors,providing strong guidance for subsequent data generation.The WGAN generates new data samples through adversarial training to expand the original dataset.In the SA-WGAN framework,the WGAN directs the data generation process based on the key features extracted by the self-attention mechanism,ensuring that the generated samples exhibit both diversity and similarity to real data.Experimental results demonstrate that the SA-WGAN-based data enhancement method significantly improves detection performance for attack samples from minority classes,addresses issues of insufficient data and category imbalance,and enhances the generalization ability and overall performance of the intrusion detection model.展开更多
Blockchain-enabled Internet of Medical Things (BIoMT) has attracted significant attention from academia and healthcare organizations. However, the large amount of medical data involved in BIoMT has also raised concern...Blockchain-enabled Internet of Medical Things (BIoMT) has attracted significant attention from academia and healthcare organizations. However, the large amount of medical data involved in BIoMT has also raised concerns about data security and personal privacy protection. To alleviate these concerns, blind signature technology has emerged as an effective method to solve blindness and unforgeability. Unfortunately, most existing blind signature schemes suffer from the security risk of key leakage. In addition, traditional blind signature schemes are also vulnerable to quantum computing attacks. Therefore, it remains a crucial and ongoing challenge to explore the construction of key-secure, quantum-resistant blind signatures. In this paper, we introduce lattice-based forward-secure blind signature (LFSBS), a lattice-based forward-secure blind signature scheme for medical privacy preservation in BIoMT. LFSBS achieves forward security by constructing a key evolution mechanism using a binary tree structure. This mechanism ensures that even if future encryption keys are leaked, past data can still remain secure. Meanwhile, LFSBS realizes post-quantum security based on the hardness assumption of small integer solution (SIS), making it resistant to potential quantum computing attacks. In addition, we formally define and prove the security of LFSBS in a random oracle model, including blindness and forward-secure unforgeability. Comprehensive performance evaluation shows that LFSBS performs well in terms of computational overhead, with a reduction of 22%–73% compared to previous schemes.展开更多
The Internet of Things(IoT)is a smart infrastructure where devices share captured data with the respective server or edge modules.However,secure and reliable communication is among the challenging tasks in these netwo...The Internet of Things(IoT)is a smart infrastructure where devices share captured data with the respective server or edge modules.However,secure and reliable communication is among the challenging tasks in these networks,as shared channels are used to transmit packets.In this paper,a decision tree is integrated with other metrics to form a secure distributed communication strategy for IoT.Initially,every device works collaboratively to form a distributed network.In this model,if a device is deployed outside the coverage area of the nearest server,it communicates indirectly through the neighboring devices.For this purpose,every device collects data from the respective neighboring devices,such as hop count,average packet transmission delay,criticality factor,link reliability,and RSSI value,etc.These parameters are used to find an optimal route from the source to the destination.Secondly,the proposed approach has enabled devices to learn from the environment and adjust the optimal route-finding formula accordingly.Moreover,these devices and server modules must ensure that every packet is transmitted securely,which is possible only if it is encrypted with an encryption algorithm.For this purpose,a decision tree-enabled device-to-server authentication algorithm is presented where every device and server must take part in the offline phase.Simulation results have verified that the proposed distributed communication approach has the potential to ensure the integrity and confidentiality of data during transmission.Moreover,the proposed approach has outperformed the existing approaches in terms of communication cost,processing overhead,end-to-end delay,packet loss ratio,and throughput.Finally,the proposed approach is adoptable in different networking infrastructures.展开更多
文摘internet.com第三季度全线大捷,截止到9月30日,该季度总收入1470万美元,较去年同期的410万美元飙升了258%。纯收入为110万美元,每股纯收益为4美分。internet.com的董事会主席兼CEO Alan M.Meckler认为公司充分掌握到了市场的先机,使投资发挥了最大的效率。
基金supported by the Shandong Province Science and Technology Project(2023TSGC0509,2022TSGC2234)Qingdao Science and Technology Plan Project(23-1-5-yqpy-2-qy)Open Topic Grants of Anhui Province Key Laboratory of Intelligent Building&Building Energy Saving,Anhui Jianzhu University(IBES2024KF08).
文摘With the rapid development of artificial intelligence,the Internet of Things(IoT)can deploy various machine learning algorithms for network and application management.In the IoT environment,many sensors and devices generatemassive data,but data security and privacy protection have become a serious challenge.Federated learning(FL)can achieve many intelligent IoT applications by training models on local devices and allowing AI training on distributed IoT devices without data sharing.This review aims to deeply explore the combination of FL and the IoT,and analyze the application of federated learning in the IoT from the aspects of security and privacy protection.In this paper,we first describe the potential advantages of FL and the challenges faced by current IoT systems in the fields of network burden and privacy security.Next,we focus on exploring and analyzing the advantages of the combination of FL on the Internet,including privacy security,attack detection,efficient communication of the IoT,and enhanced learning quality.We also list various application scenarios of FL on the IoT.Finally,we propose several open research challenges and possible solutions.
基金supported by the General Project of the Cultivation Project of the Chinese Hospital Reform and Development Research Institute of Nanjing University(NDYG2022072)。
文摘Objective Systematically integrate nurses’experience with“Internet Nursing Service”to analysis the nurses’experiences with“Internet Nursing Service”,and to provide a theoretical reference for formulating a more rational“Internet Nursing Service”model.Methods A systematic search in PubMed,Embase,Web of Science,the Cochrane Library,CINAHL,China National Knowledge Infrastructure(CNKI),Wanfang Database,and Chinese Biomedical Literature Database was conducted to collect qualitative research on nurses’experiences with“Internet Nursing Service,”with a retrieval time limit from December 2019 to June 2024.Qualitative meta-synthesis was performed through line-by-line coding of relevant quotes,organization of codes into descriptive themes,and development of analytical themes.Results A total of 19 studies were included,one study was rated as Grade A in quality evaluation,and the remaining studies were rated as Grade B.Collectively synthesized into three integrated results:Harvest and growth,Difficulties and challenges,and Expectations and support.Harvest and growth,include 1)manifestation of self-value,2)enhancing nursing capabilities,3)optimizing nursing resources;Difficulties and challenges,include 1)lack of safety guarantee,2)role conflict;Expectations and support include,1)expectation for professional knowledge and skill training,2)expectations for service platform optimization,3)expectation for reasonable charges,4)expectation for related policy support.Conclusion“Internet Nursing Service”model benefits both nurses and patients,but still full of challenges.It aids in the decentralization of medical resources.Management departments still need to encourage nurses to actively invest in“Internet Nursing Service”while ensuring their safety and interests.
文摘The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and advanced services.However,this rapid expansion also heightens the vulnerability of the IoT ecosystem to security threats.Consequently,innovative solutions capable of effectively mitigating risks while accommodating the unique constraints of IoT environments are urgently needed.Recently,the convergence of Blockchain technology and IoT has introduced a decentralized and robust framework for securing data and interactions,commonly referred to as the Internet of Blockchained Things(IoBT).Extensive research efforts have been devoted to adapting Blockchain technology to meet the specific requirements of IoT deployments.Within this context,consensus algorithms play a critical role in assessing the feasibility of integrating Blockchain into IoT ecosystems.The adoption of efficient and lightweight consensus mechanisms for block validation has become increasingly essential.This paper presents a comprehensive examination of lightweight,constraint-aware consensus algorithms tailored for IoBT.The study categorizes these consensus mechanisms based on their core operations,the security of the block validation process,the incorporation of AI techniques,and the specific applications they are designed to support.
基金funded by a Grant-in-Aid for Scientific Research(B)(Japan Society for The Promotion of Science,21H02849)Grant-in-Aid for Scientific Research(C)(Japan Society for The Promotion of Science,23K07013)+2 种基金Grant-in-Aid for Transformative Research Areas(A)(Japan Society for The Promotion of Science,JP21H05173)Grant-in-Aid by the Smoking Research FoundationGrant-in-Aid by the Telecommunications Advancement Foundation.
文摘Background Ongoing debates question the harm of internet use with the evolving technology,as many individuals transition from regular to problematic internet use(PIU).The habenula(Hb),located between the thalamus and the third ventricle,is implicated in various psychiatric disorders.In addition,personality features have been suggested to play a role in the pathophysiology of PIU.Aims This study aimed to investigate Hb volumetry in individuals with subclinical PIU and the mediating effect of personality traits on this relationship.Methods 110 healthy adults in this cross-sectional study underwent structural magnetic resonance imaging.Hb segmentation was performed using a deep learning technique.The Internet Addiction Test(IAT)and the NEO Five-Factor Inventory were used to assess the PIU level and personality,respectively.Partial Spearman's correlation analyses were performed to explore the reiationships between Hb volumetry,IAT and NEO.Multiple regression analysis was applied to identify personality traits that predict IAT scores.The significant trait was then treated as a mediator between Hb volume and IAT correlation in mediation analysis with a bootstrap value of 5000.Results Relative Hb volume was negatively correlated with IAT scores(partial rho=-0.142,p=0.009).The IAT score was positively correlated with neuroticism(partial rho=0.430,p<0.001)and negatively correlated with extraversion,agreeableness and conscientiousness(partial rho=-0.213,p<0.001;partial rho=-0.279,p<0.001;and partial rho=-0.327,p<0.001).There was a significant indirect effect of Hb volume on this model(β=-0.061,p=0.048,boot 95%confidence interval:-0.149 to-0.001).Conclusions This study uncovered a crucial link between reduced Hb volume and heightened PIU.Our findings highlight neuroticism as a key risk factor for developing PIU.Moreover,neuroticism was shown to mediate the relationship between Hb volume and PIU tendency,offering valuable insight into the complexities of this interaction.
文摘China is a fast-developing nation,especially in traditional concepts of emphasis on agricultural production,with millions of highly educated college students as new generations of workers enter the workforce,while promoting the booming agriculture industry in China.Concerning these new generations of ambitious college students,it is a pretty attractive career to leverage their knowledge to spread their local special rural agricultural products(agri-products)to well-known places around the nation,even the world.Meanwhile,the Chinese government also supports rural products branding via internet marketing as well as the exploitation of online technologies.Su et al.pointed out that governments in China are expected to take more effective measures to enhance adoption rates of online purchases and sales technology,in particular for entrepreneurial farmers[1].Currently,the most existing phenomenon in China is that quantities of regional rural products with excellent quality but without national popularity.Thereby,it is significant to enhance the popularity of various brands in regional agricultural products using internet marketing,and also contribute to the nation’s strategy of rural revitalization.To appeal to the nations’strategy,we are supposed to make use of brand personality(BP)traits,which probably contribute to robust internet branding of regional agricultural products.Our research will focus on the influences of differential dimensions of brand personality(BP)in terms of common rural products,additionally,we also attempt to design a BP model for internet branding of agricultural products in China.Furthermore,from the two perspectives of characteristics in rural areas(agricultural producers and agricultural consumers),measures to assist agricultural producers in building their brands through the application of internet tools and marketing should be recognized.On the other side,methods to enhance agricultural consumers’brand loyalty also need to be captured.
文摘In the rapidly evolving landscape of digital health,the integration of data analytics and Internet healthserviceshasbecome a pivotal area of exploration.To meet keen social needs,Prof.Shan Liu(Xi'an Jiaotong University)and Prof.Xing Zhang(Wuhan Textile University)have published the timely book Datadriven Internet Health Platform Service Value Co-creation through China Science Press.The book focuses on the provision of medical and health services from doctors to patients through Internet health platforms,where the service value is co-created by three parties.
文摘Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enhance the range of network information services accessible to humans.With the transition of terrestrial mobile communication networks from the 5G era,which provides access to information anywhere,to the 6G era,which seeks to connect everything,the construction of satellite Internet,which promises a“network reaching everywhere and service is ubiquitous”,has become the consensus of the industry’s development and the focus of global scientific and technological innovation.
文摘The digital revolution era has impacted various domains,including healthcare,where digital technology enables access to and control of medical information,remote patient monitoring,and enhanced clinical support based on the Internet of Health Things(IoHTs).However,data privacy and security,data management,and scalability present challenges to widespread adoption.This paper presents a comprehensive literature review that examines the authentication mechanisms utilized within IoHT,highlighting their critical roles in ensuring secure data exchange and patient privacy.This includes various authentication technologies and strategies,such as biometric and multifactor authentication,as well as the influence of emerging technologies like blockchain,fog computing,and Artificial Intelligence(AI).The findings indicate that emerging technologies offer hope for the future of IoHT security,promising to address key challenges such as scalability,integrity,privacy and other security requirements.With this systematic review,healthcare providers,decision makers,scientists and researchers are empowered to confidently evaluate the applicability of IoT in healthcare,shaping the future of this field.
文摘Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enhance the range of network information services accessible to humans.With the transition of terrestrial mobile communication networks from the 5G era,which provides access to information anywhere,to the 6G era,which seeks to connect everything,the construction of satellite Internet,which promises a"network reaching everywhere and service is ubiquitous",has become the consensus of the industry's development and the focus of global scientific and technological innovation.
基金Research on the Collaborative Path of Curriculum Ideology and Politics in Landscape Architecture Specialty under the Background of New Engineering(Project No.:NGJGH2024018)Empirical Research on the Training Mode of Compound Applied Talents with“Micro-Majors and Interdisciplinary Integration”under the Collaboration of Industry and Education(Project No.:NGJGH2024230)。
文摘With the in-depth reform of labor education,the teaching of the Floriculture course in colleges and universities should be further optimized.Teachers need to actively introduce new educational concepts and teaching methods to better arouse college students’interest,strengthen their understanding and application of the knowledge they have learned,and improve the effect of talent cultivation.As a popular educational auxiliary tool at present,Internet technology can greatly enrich the content of the Floriculture course teaching in colleges and universities,expand the path of talent cultivation,and play a significant role in promoting the all-round development of college students.In view of this,this paper will analyze the teaching reform of the Floriculture course in colleges and universities under the background of“Internet+”and put forward some strategies,which are only for reference by colleagues.
基金Supported by General Project of Natural Science Foundation of Heilongjiang Province (C2018050).
文摘This paper investigated the research status and development trends of agricultural environment monitoring systems primarily based on the internet.The issues encountered during system implementation and their corresponding solutions were analyzed by reviewing relevant domestic and international literature.Through this study,it is understood that advancements in sensor technology have significantly facilitated the collection of agricultural environmental data and real-time data processing.However,inconsistencies in data from sensors with different standards lead to incompatibility of information,thereby restricting comprehensive data utilization.Furthermore,the lack of intelligent analysis technology and the limitations of algorithms have hindered the full utilization of agricultural environmental data mining and intelligent decision support systems,severely impacting the precision management of agricultural production.Therefore,subsequent research will strengthen international technical cooperation and exchanges,promote collaborative innovation in various fields,and facilitate the introduction of new technologies such as Big Data and Cloud Computing.Establishing unified data interfaces and developing adaptive algorithm models represent beneficial attempts to break through bottlenecks and promote sustainable agricultural development.Therefore,this study provides a reference for exploring the application prospects of the internet in agricultural production,while also emphasizing the feasibility and importance of in-depth research and application of the internet to advance sustainable agricultural development.
基金supported by the National Natural Science Foundation of China(62473341)Key Technologies R&D Program of Henan Province(242102211071,252102211086,252102210166).
文摘With the rapid development of the industrial Internet,the network security environment has become increasingly complex and variable.Intrusion detection,a core technology for ensuring the security of industrial control systems,faces the challenge of unbalanced data samples,particularly the low detection rates for minority class attack samples.Therefore,this paper proposes a data enhancement method for intrusion detection in the industrial Internet based on a Self-Attention Wasserstein Generative Adversarial Network(SA-WGAN)to address the low detection rates of minority class attack samples in unbalanced intrusion detection scenarios.The proposed method integrates a selfattention mechanism with a Wasserstein Generative Adversarial Network(WGAN).The self-attention mechanism automatically learns important features from the input data and assigns different weights to emphasize the key features related to intrusion behaviors,providing strong guidance for subsequent data generation.The WGAN generates new data samples through adversarial training to expand the original dataset.In the SA-WGAN framework,the WGAN directs the data generation process based on the key features extracted by the self-attention mechanism,ensuring that the generated samples exhibit both diversity and similarity to real data.Experimental results demonstrate that the SA-WGAN-based data enhancement method significantly improves detection performance for attack samples from minority classes,addresses issues of insufficient data and category imbalance,and enhances the generalization ability and overall performance of the intrusion detection model.
基金funded by the Yunnan Key Laboratory of Blockchain Application Technology(202105AG070005,202305AG340008)&YNB202301,NSFC(Grant Nos.72293583,72293580,62476007,62176273,62271234)the Open Foundation of State Key Laboratory of Networking and Switching Technology(Beijing University of Posts and Telecommunications)(SKLNST-2024-1-06)+2 种基金the Project of Science and Technology Major Project of Yunnan Province(202302AF080006)Open Foundation of State Key Laboratory of Public Big Data(Guizhou University)under Grant No.PBD2022-16Double First-Class Project for Collaborative Innovation Achievements inDisciplines Construction in Heilongjiang Province under Grant No.GXCG2022-054.
文摘Blockchain-enabled Internet of Medical Things (BIoMT) has attracted significant attention from academia and healthcare organizations. However, the large amount of medical data involved in BIoMT has also raised concerns about data security and personal privacy protection. To alleviate these concerns, blind signature technology has emerged as an effective method to solve blindness and unforgeability. Unfortunately, most existing blind signature schemes suffer from the security risk of key leakage. In addition, traditional blind signature schemes are also vulnerable to quantum computing attacks. Therefore, it remains a crucial and ongoing challenge to explore the construction of key-secure, quantum-resistant blind signatures. In this paper, we introduce lattice-based forward-secure blind signature (LFSBS), a lattice-based forward-secure blind signature scheme for medical privacy preservation in BIoMT. LFSBS achieves forward security by constructing a key evolution mechanism using a binary tree structure. This mechanism ensures that even if future encryption keys are leaked, past data can still remain secure. Meanwhile, LFSBS realizes post-quantum security based on the hardness assumption of small integer solution (SIS), making it resistant to potential quantum computing attacks. In addition, we formally define and prove the security of LFSBS in a random oracle model, including blindness and forward-secure unforgeability. Comprehensive performance evaluation shows that LFSBS performs well in terms of computational overhead, with a reduction of 22%–73% compared to previous schemes.
基金supported by the Princess Nourah bint Abdulrahman University Riyadh,Saudi Arabia,through Project number(PNURSP2025R235).
文摘The Internet of Things(IoT)is a smart infrastructure where devices share captured data with the respective server or edge modules.However,secure and reliable communication is among the challenging tasks in these networks,as shared channels are used to transmit packets.In this paper,a decision tree is integrated with other metrics to form a secure distributed communication strategy for IoT.Initially,every device works collaboratively to form a distributed network.In this model,if a device is deployed outside the coverage area of the nearest server,it communicates indirectly through the neighboring devices.For this purpose,every device collects data from the respective neighboring devices,such as hop count,average packet transmission delay,criticality factor,link reliability,and RSSI value,etc.These parameters are used to find an optimal route from the source to the destination.Secondly,the proposed approach has enabled devices to learn from the environment and adjust the optimal route-finding formula accordingly.Moreover,these devices and server modules must ensure that every packet is transmitted securely,which is possible only if it is encrypted with an encryption algorithm.For this purpose,a decision tree-enabled device-to-server authentication algorithm is presented where every device and server must take part in the offline phase.Simulation results have verified that the proposed distributed communication approach has the potential to ensure the integrity and confidentiality of data during transmission.Moreover,the proposed approach has outperformed the existing approaches in terms of communication cost,processing overhead,end-to-end delay,packet loss ratio,and throughput.Finally,the proposed approach is adoptable in different networking infrastructures.