Embedded printing is a highly promising approach for creating complex structures within a yield-stress support bath.However,the accurate prediction and control of printability remain fundamental challenges due to the ...Embedded printing is a highly promising approach for creating complex structures within a yield-stress support bath.However,the accurate prediction and control of printability remain fundamental challenges due to the complex interactions between inks and support baths.Here,we present an artificial intelligence(AI)-driven framework that interprets and predicts embedded printability using rheological data.Using a standardized workflow,we extracted 21 rheological descriptors and established 12 indicators to evaluate structural continuity and geometric fidelity.Interpretable machine learning models revealed that direction-dependent defects are governed by the synergistic interplay among ink yield stress,support bath zero shear viscosity,flow behavior index,and time constant.To enable the prediction of printability in a generalizable manner,we further developed a cascaded neural network,which achieved mean relative prediction errors below 15%across all indicators.Experimental validation using three-dimensional(3 D)-printed constructs and micro-computed tomography(μCT)reconstructions confirmed a strong correlation between predicted and actual fidelity.This work establishes a physics-informed,data-driven paradigm for decoding and optimizing embedded printing,offering broad applicability and providing a robust tool for the rapid pairing of suitable printable ink-support bath combinations.展开更多
Unmanned aerial vehicles(UAVs),especially quadcopters,have become indispensable in numerous industrial and scientific applications due to their flexibility,lowcost,and capability to operate in dynamic environments.Thi...Unmanned aerial vehicles(UAVs),especially quadcopters,have become indispensable in numerous industrial and scientific applications due to their flexibility,lowcost,and capability to operate in dynamic environments.This paper presents a complete design and implementation of a compact autonomous quadcopter capable of trajectory tracking,object detection,precision landing,and real-time telemetry via long-range communication protocols.The system integrates an onboard flight controller running real-time sensor fusion algorithms,a vision-based detection system on a companion single-board computer,and a telemetry unit using Long Range(LoRa)communication.Extensive flight tests were conducted to validate the system’s stability,communication range,and autonomous capabilities.Potential applications in law enforcement,agriculture,search and rescue,and environmental monitoring are also discussed.展开更多
Recently,Internet ofThings(IoT)has been increasingly integrated into the automotive sector,enabling the development of diverse applications such as the Internet of Vehicles(IoV)and intelligent connected vehicles.Lever...Recently,Internet ofThings(IoT)has been increasingly integrated into the automotive sector,enabling the development of diverse applications such as the Internet of Vehicles(IoV)and intelligent connected vehicles.Leveraging IoVtechnologies,operational data fromcore vehicle components can be collected and analyzed to construct fault diagnosis models,thereby enhancing vehicle safety.However,automakers often struggle to acquire sufficient fault data to support effective model training.To address this challenge,a robust and efficient federated learning method(REFL)is constructed for machinery fault diagnosis in collaborative IoV,which can organize multiple companies to collaboratively develop a comprehensive fault diagnosis model while keeping their data locally.In the REFL,the gradient-based adversary algorithm is first introduced to the fault diagnosis field to enhance the deep learning model robustness.Moreover,the adaptive gradient processing process is designed to improve the model training speed and ensure the model accuracy under unbalance data scenarios.The proposed REFL is evaluated on non-independent and identically distributed(non-IID)real-world machinery fault dataset.Experiment results demonstrate that the REFL can achieve better performance than traditional learning methods and are promising for real industrial fault diagnosis.展开更多
With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT termi...With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT terminals have security risks and vulnerabilities,and limited resources make it impossible to deploy costly security protection methods on the terminal.In order to cope with these problems,this paper proposes a lightweight trust evaluation model TCL,which combines three network models,TCN,CNN,and LSTM,with stronger feature extraction capability and can score the reliability of the device by periodically analyzing the traffic behavior and activity logs generated by the terminal device,and the trust evaluation of the terminal’s continuous behavior can be achieved by combining the scores of different periods.After experiments,it is proved that TCL can effectively use the traffic behaviors and activity logs of terminal devices for trust evaluation and achieves F1-score of 95.763,94.456,99.923,and 99.195 on HDFS,BGL,N-BaIoT,and KDD99 datasets,respectively,and the size of TCL is only 91KB,which can achieve similar or better performance than CNN-LSTM,RobustLog and other methods with less computational resources and storage space.展开更多
Vehicle Edge Computing(VEC)and Cloud Computing(CC)significantly enhance the processing efficiency of delay-sensitive and computation-intensive applications by offloading compute-intensive tasks from resource-constrain...Vehicle Edge Computing(VEC)and Cloud Computing(CC)significantly enhance the processing efficiency of delay-sensitive and computation-intensive applications by offloading compute-intensive tasks from resource-constrained onboard devices to nearby Roadside Unit(RSU),thereby achieving lower delay and energy consumption.However,due to the limited storage capacity and energy budget of RSUs,it is challenging to meet the demands of the highly dynamic Internet of Vehicles(IoV)environment.Therefore,determining reasonable service caching and computation offloading strategies is crucial.To address this,this paper proposes a joint service caching scheme for cloud-edge collaborative IoV computation offloading.By modeling the dynamic optimization problem using Markov Decision Processes(MDP),the scheme jointly optimizes task delay,energy consumption,load balancing,and privacy entropy to achieve better quality of service.Additionally,a dynamic adaptive multi-objective deep reinforcement learning algorithm is proposed.Each Double Deep Q-Network(DDQN)agent obtains rewards for different objectives based on distinct reward functions and dynamically updates the objective weights by learning the value changes between objectives using Radial Basis Function Networks(RBFN),thereby efficiently approximating the Pareto-optimal decisions for multiple objectives.Extensive experiments demonstrate that the proposed algorithm can better coordinate the three-tier computing resources of cloud,edge,and vehicles.Compared to existing algorithms,the proposed method reduces task delay and energy consumption by 10.64%and 5.1%,respectively.展开更多
The rapid expansion of the Internet of Things(IoT)and Edge Artificial Intelligence(AI)has redefined automation and connectivity acrossmodern networks.However,the heterogeneity and limited resources of IoT devices expo...The rapid expansion of the Internet of Things(IoT)and Edge Artificial Intelligence(AI)has redefined automation and connectivity acrossmodern networks.However,the heterogeneity and limited resources of IoT devices expose them to increasingly sophisticated and persistentmalware attacks.These adaptive and stealthy threats can evade conventional detection,establish remote control,propagate across devices,exfiltrate sensitive data,and compromise network integrity.This study presents a Software-Defined Internet of Things(SD-IoT)control-plane-based,AI-driven framework that integrates Gated Recurrent Units(GRU)and Long Short-TermMemory(LSTM)networks for efficient detection of evolving multi-vector,malware-driven botnet attacks.The proposed CUDA-enabled hybrid deep learning(DL)framework performs centralized real-time detection without adding computational overhead to IoT nodes.A feature selection strategy combining variable clustering,attribute evaluation,one-R attribute evaluation,correlation analysis,and principal component analysis(PCA)enhances detection accuracy and reduces complexity.The framework is rigorously evaluated using the N_BaIoT dataset under k-fold cross-validation.Experimental results achieve 99.96%detection accuracy,a false positive rate(FPR)of 0.0035%,and a detection latency of 0.18 ms,confirming its high efficiency and scalability.The findings demonstrate the framework’s potential as a robust and intelligent security solution for next-generation IoT ecosystems.展开更多
A scheme of transmission control protocol/Internet protocol(TCP/IP) network system based on system-on-programmable chip(SOPC) is proposed for the embedded network communication. In this system, Nios processor, Eth...A scheme of transmission control protocol/Internet protocol(TCP/IP) network system based on system-on-programmable chip(SOPC) is proposed for the embedded network communication. In this system, Nios processor, Ethernet controller and other peripheral logic circuits are all integrated on a Stratix Ⅱ field programmable gate array (FPGA) chip by using SOPC builder design software. And the network communication is realized by transplanting MicroC/OS Ⅱ (uC/OS Ⅱ ) operation system and light weight Internet protocol(LwIP). The design idea, key points and the structures of both software and hardware of the system are presented and ran with a telecommunication example. The experiment shows that the embedded TCP/IP network system has high reliability and real-time performance.展开更多
In recent years, online engineering technologies are widely distributed and developed. Their influence on society is very strong. The Internet technology has provided additional opportunities for a new development lev...In recent years, online engineering technologies are widely distributed and developed. Their influence on society is very strong. The Internet technology has provided additional opportunities for a new development level of education, design and production. Associations and scientific conferences in the field of online engineering that appeared, seek to foster practices in education and research in higher education institutions and the industry on online engineering. A particular challenge for online engineering is how to extend the traditional equipments and laboratories to the Internet. A method of the embedded systems design with using online laboratory is described in this paper. Also, in this paper the experimental set of remote laboratory which allows carrying out hardware/software oriented design of the embedded control system of a mobile platform is considered.展开更多
With the rapid development of artificial intelligence,the Internet of Things(IoT)can deploy various machine learning algorithms for network and application management.In the IoT environment,many sensors and devices ge...With the rapid development of artificial intelligence,the Internet of Things(IoT)can deploy various machine learning algorithms for network and application management.In the IoT environment,many sensors and devices generatemassive data,but data security and privacy protection have become a serious challenge.Federated learning(FL)can achieve many intelligent IoT applications by training models on local devices and allowing AI training on distributed IoT devices without data sharing.This review aims to deeply explore the combination of FL and the IoT,and analyze the application of federated learning in the IoT from the aspects of security and privacy protection.In this paper,we first describe the potential advantages of FL and the challenges faced by current IoT systems in the fields of network burden and privacy security.Next,we focus on exploring and analyzing the advantages of the combination of FL on the Internet,including privacy security,attack detection,efficient communication of the IoT,and enhanced learning quality.We also list various application scenarios of FL on the IoT.Finally,we propose several open research challenges and possible solutions.展开更多
Objective Systematically integrate nurses’experience with“Internet Nursing Service”to analysis the nurses’experiences with“Internet Nursing Service”,and to provide a theoretical reference for formulating a more ...Objective Systematically integrate nurses’experience with“Internet Nursing Service”to analysis the nurses’experiences with“Internet Nursing Service”,and to provide a theoretical reference for formulating a more rational“Internet Nursing Service”model.Methods A systematic search in PubMed,Embase,Web of Science,the Cochrane Library,CINAHL,China National Knowledge Infrastructure(CNKI),Wanfang Database,and Chinese Biomedical Literature Database was conducted to collect qualitative research on nurses’experiences with“Internet Nursing Service,”with a retrieval time limit from December 2019 to June 2024.Qualitative meta-synthesis was performed through line-by-line coding of relevant quotes,organization of codes into descriptive themes,and development of analytical themes.Results A total of 19 studies were included,one study was rated as Grade A in quality evaluation,and the remaining studies were rated as Grade B.Collectively synthesized into three integrated results:Harvest and growth,Difficulties and challenges,and Expectations and support.Harvest and growth,include 1)manifestation of self-value,2)enhancing nursing capabilities,3)optimizing nursing resources;Difficulties and challenges,include 1)lack of safety guarantee,2)role conflict;Expectations and support include,1)expectation for professional knowledge and skill training,2)expectations for service platform optimization,3)expectation for reasonable charges,4)expectation for related policy support.Conclusion“Internet Nursing Service”model benefits both nurses and patients,but still full of challenges.It aids in the decentralization of medical resources.Management departments still need to encourage nurses to actively invest in“Internet Nursing Service”while ensuring their safety and interests.展开更多
The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and ...The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and advanced services.However,this rapid expansion also heightens the vulnerability of the IoT ecosystem to security threats.Consequently,innovative solutions capable of effectively mitigating risks while accommodating the unique constraints of IoT environments are urgently needed.Recently,the convergence of Blockchain technology and IoT has introduced a decentralized and robust framework for securing data and interactions,commonly referred to as the Internet of Blockchained Things(IoBT).Extensive research efforts have been devoted to adapting Blockchain technology to meet the specific requirements of IoT deployments.Within this context,consensus algorithms play a critical role in assessing the feasibility of integrating Blockchain into IoT ecosystems.The adoption of efficient and lightweight consensus mechanisms for block validation has become increasingly essential.This paper presents a comprehensive examination of lightweight,constraint-aware consensus algorithms tailored for IoBT.The study categorizes these consensus mechanisms based on their core operations,the security of the block validation process,the incorporation of AI techniques,and the specific applications they are designed to support.展开更多
In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),dee...In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),deeply embedded in the perception layer architecture of the IoT,play a crucial role as“tactile nerve endings.”A vast number of micro sensor nodes are widely distributed in monitoring areas according to preset deployment strategies,continuously and accurately perceiving and collecting real-time data on environmental parameters such as temperature,humidity,light intensity,air pressure,and pollutant concentration.These data are transmitted to the IoT cloud platform through stable and reliable communication links,forming a massive and detailed basic data resource pool.By using cutting-edge big data processing algorithms,machine learning models,and artificial intelligence analysis tools,in-depth mining and intelligent analysis of these multi-source heterogeneous data are conducted to generate high-value-added decision-making bases.This precisely empowers multiple fields,including agriculture,medical and health care,smart home,environmental science,and industrial manufacturing,driving intelligent transformation and catalyzing society to move towards a new stage of high-quality development.This paper comprehensively analyzes the technical cores of the IoT and WSNs,systematically sorts out the advanced key technologies of WSNs and the evolution of their strategic significance in the IoT system,deeply explores the innovative application scenarios and practical effects of the two in specific vertical fields,and looks forward to the technological evolution trends.It provides a detailed and highly practical guiding reference for researchers,technical engineers,and industrial decision-makers.展开更多
基金supported by the National Natural Science Foundation of China(Nos.52305314 and U21A20394)the Beijing Natural Science Foundation(Nos.7252285 and L246001)the National Key Research and Development Program of China(No.2023YFB4605800)。
文摘Embedded printing is a highly promising approach for creating complex structures within a yield-stress support bath.However,the accurate prediction and control of printability remain fundamental challenges due to the complex interactions between inks and support baths.Here,we present an artificial intelligence(AI)-driven framework that interprets and predicts embedded printability using rheological data.Using a standardized workflow,we extracted 21 rheological descriptors and established 12 indicators to evaluate structural continuity and geometric fidelity.Interpretable machine learning models revealed that direction-dependent defects are governed by the synergistic interplay among ink yield stress,support bath zero shear viscosity,flow behavior index,and time constant.To enable the prediction of printability in a generalizable manner,we further developed a cascaded neural network,which achieved mean relative prediction errors below 15%across all indicators.Experimental validation using three-dimensional(3 D)-printed constructs and micro-computed tomography(μCT)reconstructions confirmed a strong correlation between predicted and actual fidelity.This work establishes a physics-informed,data-driven paradigm for decoding and optimizing embedded printing,offering broad applicability and providing a robust tool for the rapid pairing of suitable printable ink-support bath combinations.
文摘Unmanned aerial vehicles(UAVs),especially quadcopters,have become indispensable in numerous industrial and scientific applications due to their flexibility,lowcost,and capability to operate in dynamic environments.This paper presents a complete design and implementation of a compact autonomous quadcopter capable of trajectory tracking,object detection,precision landing,and real-time telemetry via long-range communication protocols.The system integrates an onboard flight controller running real-time sensor fusion algorithms,a vision-based detection system on a companion single-board computer,and a telemetry unit using Long Range(LoRa)communication.Extensive flight tests were conducted to validate the system’s stability,communication range,and autonomous capabilities.Potential applications in law enforcement,agriculture,search and rescue,and environmental monitoring are also discussed.
基金supported in part by National key R&D projects(2024YFB4207203)National Natural Science Foundation of China(52401376)+3 种基金the Zhejiang Provincial Natural Science Foundation of China under Grant(No.LTGG24F030004)Hangzhou Key Scientific Research Plan Project(2024SZD1A24)“Pioneer”and“Leading Goose”R&DProgramof Zhejiang(2024C03254,2023C03154)Jiangxi Provincial Gan-Po Elite Support Program(Major Academic and Technical Leaders Cultivation Project,20243BCE51180).
文摘Recently,Internet ofThings(IoT)has been increasingly integrated into the automotive sector,enabling the development of diverse applications such as the Internet of Vehicles(IoV)and intelligent connected vehicles.Leveraging IoVtechnologies,operational data fromcore vehicle components can be collected and analyzed to construct fault diagnosis models,thereby enhancing vehicle safety.However,automakers often struggle to acquire sufficient fault data to support effective model training.To address this challenge,a robust and efficient federated learning method(REFL)is constructed for machinery fault diagnosis in collaborative IoV,which can organize multiple companies to collaboratively develop a comprehensive fault diagnosis model while keeping their data locally.In the REFL,the gradient-based adversary algorithm is first introduced to the fault diagnosis field to enhance the deep learning model robustness.Moreover,the adaptive gradient processing process is designed to improve the model training speed and ensure the model accuracy under unbalance data scenarios.The proposed REFL is evaluated on non-independent and identically distributed(non-IID)real-world machinery fault dataset.Experiment results demonstrate that the REFL can achieve better performance than traditional learning methods and are promising for real industrial fault diagnosis.
基金supported by National Key R&D Program of China(No.2022YFB3105101).
文摘With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT terminals have security risks and vulnerabilities,and limited resources make it impossible to deploy costly security protection methods on the terminal.In order to cope with these problems,this paper proposes a lightweight trust evaluation model TCL,which combines three network models,TCN,CNN,and LSTM,with stronger feature extraction capability and can score the reliability of the device by periodically analyzing the traffic behavior and activity logs generated by the terminal device,and the trust evaluation of the terminal’s continuous behavior can be achieved by combining the scores of different periods.After experiments,it is proved that TCL can effectively use the traffic behaviors and activity logs of terminal devices for trust evaluation and achieves F1-score of 95.763,94.456,99.923,and 99.195 on HDFS,BGL,N-BaIoT,and KDD99 datasets,respectively,and the size of TCL is only 91KB,which can achieve similar or better performance than CNN-LSTM,RobustLog and other methods with less computational resources and storage space.
基金supported by Key Science and Technology Program of Henan Province,China(Grant Nos.242102210147,242102210027)Fujian Province Young and Middle aged Teacher Education Research Project(Science and Technology Category)(No.JZ240101)(Corresponding author:Dong Yuan).
文摘Vehicle Edge Computing(VEC)and Cloud Computing(CC)significantly enhance the processing efficiency of delay-sensitive and computation-intensive applications by offloading compute-intensive tasks from resource-constrained onboard devices to nearby Roadside Unit(RSU),thereby achieving lower delay and energy consumption.However,due to the limited storage capacity and energy budget of RSUs,it is challenging to meet the demands of the highly dynamic Internet of Vehicles(IoV)environment.Therefore,determining reasonable service caching and computation offloading strategies is crucial.To address this,this paper proposes a joint service caching scheme for cloud-edge collaborative IoV computation offloading.By modeling the dynamic optimization problem using Markov Decision Processes(MDP),the scheme jointly optimizes task delay,energy consumption,load balancing,and privacy entropy to achieve better quality of service.Additionally,a dynamic adaptive multi-objective deep reinforcement learning algorithm is proposed.Each Double Deep Q-Network(DDQN)agent obtains rewards for different objectives based on distinct reward functions and dynamically updates the objective weights by learning the value changes between objectives using Radial Basis Function Networks(RBFN),thereby efficiently approximating the Pareto-optimal decisions for multiple objectives.Extensive experiments demonstrate that the proposed algorithm can better coordinate the three-tier computing resources of cloud,edge,and vehicles.Compared to existing algorithms,the proposed method reduces task delay and energy consumption by 10.64%and 5.1%,respectively.
基金supported by Princess Nourah bint Abdulrahman University Researchers Supporting ProjectNumber(PNURSP2025R97),PrincessNourah bint AbdulrahmanUniversity,Riyadh,Saudi Arabia.
文摘The rapid expansion of the Internet of Things(IoT)and Edge Artificial Intelligence(AI)has redefined automation and connectivity acrossmodern networks.However,the heterogeneity and limited resources of IoT devices expose them to increasingly sophisticated and persistentmalware attacks.These adaptive and stealthy threats can evade conventional detection,establish remote control,propagate across devices,exfiltrate sensitive data,and compromise network integrity.This study presents a Software-Defined Internet of Things(SD-IoT)control-plane-based,AI-driven framework that integrates Gated Recurrent Units(GRU)and Long Short-TermMemory(LSTM)networks for efficient detection of evolving multi-vector,malware-driven botnet attacks.The proposed CUDA-enabled hybrid deep learning(DL)framework performs centralized real-time detection without adding computational overhead to IoT nodes.A feature selection strategy combining variable clustering,attribute evaluation,one-R attribute evaluation,correlation analysis,and principal component analysis(PCA)enhances detection accuracy and reduces complexity.The framework is rigorously evaluated using the N_BaIoT dataset under k-fold cross-validation.Experimental results achieve 99.96%detection accuracy,a false positive rate(FPR)of 0.0035%,and a detection latency of 0.18 ms,confirming its high efficiency and scalability.The findings demonstrate the framework’s potential as a robust and intelligent security solution for next-generation IoT ecosystems.
基金Applied Programof Basic Research of Tianjin(08JCYBJC14700)
文摘A scheme of transmission control protocol/Internet protocol(TCP/IP) network system based on system-on-programmable chip(SOPC) is proposed for the embedded network communication. In this system, Nios processor, Ethernet controller and other peripheral logic circuits are all integrated on a Stratix Ⅱ field programmable gate array (FPGA) chip by using SOPC builder design software. And the network communication is realized by transplanting MicroC/OS Ⅱ (uC/OS Ⅱ ) operation system and light weight Internet protocol(LwIP). The design idea, key points and the structures of both software and hardware of the system are presented and ran with a telecommunication example. The experiment shows that the embedded TCP/IP network system has high reliability and real-time performance.
文摘In recent years, online engineering technologies are widely distributed and developed. Their influence on society is very strong. The Internet technology has provided additional opportunities for a new development level of education, design and production. Associations and scientific conferences in the field of online engineering that appeared, seek to foster practices in education and research in higher education institutions and the industry on online engineering. A particular challenge for online engineering is how to extend the traditional equipments and laboratories to the Internet. A method of the embedded systems design with using online laboratory is described in this paper. Also, in this paper the experimental set of remote laboratory which allows carrying out hardware/software oriented design of the embedded control system of a mobile platform is considered.
基金supported by the Shandong Province Science and Technology Project(2023TSGC0509,2022TSGC2234)Qingdao Science and Technology Plan Project(23-1-5-yqpy-2-qy)Open Topic Grants of Anhui Province Key Laboratory of Intelligent Building&Building Energy Saving,Anhui Jianzhu University(IBES2024KF08).
文摘With the rapid development of artificial intelligence,the Internet of Things(IoT)can deploy various machine learning algorithms for network and application management.In the IoT environment,many sensors and devices generatemassive data,but data security and privacy protection have become a serious challenge.Federated learning(FL)can achieve many intelligent IoT applications by training models on local devices and allowing AI training on distributed IoT devices without data sharing.This review aims to deeply explore the combination of FL and the IoT,and analyze the application of federated learning in the IoT from the aspects of security and privacy protection.In this paper,we first describe the potential advantages of FL and the challenges faced by current IoT systems in the fields of network burden and privacy security.Next,we focus on exploring and analyzing the advantages of the combination of FL on the Internet,including privacy security,attack detection,efficient communication of the IoT,and enhanced learning quality.We also list various application scenarios of FL on the IoT.Finally,we propose several open research challenges and possible solutions.
基金supported by the General Project of the Cultivation Project of the Chinese Hospital Reform and Development Research Institute of Nanjing University(NDYG2022072)。
文摘Objective Systematically integrate nurses’experience with“Internet Nursing Service”to analysis the nurses’experiences with“Internet Nursing Service”,and to provide a theoretical reference for formulating a more rational“Internet Nursing Service”model.Methods A systematic search in PubMed,Embase,Web of Science,the Cochrane Library,CINAHL,China National Knowledge Infrastructure(CNKI),Wanfang Database,and Chinese Biomedical Literature Database was conducted to collect qualitative research on nurses’experiences with“Internet Nursing Service,”with a retrieval time limit from December 2019 to June 2024.Qualitative meta-synthesis was performed through line-by-line coding of relevant quotes,organization of codes into descriptive themes,and development of analytical themes.Results A total of 19 studies were included,one study was rated as Grade A in quality evaluation,and the remaining studies were rated as Grade B.Collectively synthesized into three integrated results:Harvest and growth,Difficulties and challenges,and Expectations and support.Harvest and growth,include 1)manifestation of self-value,2)enhancing nursing capabilities,3)optimizing nursing resources;Difficulties and challenges,include 1)lack of safety guarantee,2)role conflict;Expectations and support include,1)expectation for professional knowledge and skill training,2)expectations for service platform optimization,3)expectation for reasonable charges,4)expectation for related policy support.Conclusion“Internet Nursing Service”model benefits both nurses and patients,but still full of challenges.It aids in the decentralization of medical resources.Management departments still need to encourage nurses to actively invest in“Internet Nursing Service”while ensuring their safety and interests.
文摘The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and advanced services.However,this rapid expansion also heightens the vulnerability of the IoT ecosystem to security threats.Consequently,innovative solutions capable of effectively mitigating risks while accommodating the unique constraints of IoT environments are urgently needed.Recently,the convergence of Blockchain technology and IoT has introduced a decentralized and robust framework for securing data and interactions,commonly referred to as the Internet of Blockchained Things(IoBT).Extensive research efforts have been devoted to adapting Blockchain technology to meet the specific requirements of IoT deployments.Within this context,consensus algorithms play a critical role in assessing the feasibility of integrating Blockchain into IoT ecosystems.The adoption of efficient and lightweight consensus mechanisms for block validation has become increasingly essential.This paper presents a comprehensive examination of lightweight,constraint-aware consensus algorithms tailored for IoBT.The study categorizes these consensus mechanisms based on their core operations,the security of the block validation process,the incorporation of AI techniques,and the specific applications they are designed to support.
文摘In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),deeply embedded in the perception layer architecture of the IoT,play a crucial role as“tactile nerve endings.”A vast number of micro sensor nodes are widely distributed in monitoring areas according to preset deployment strategies,continuously and accurately perceiving and collecting real-time data on environmental parameters such as temperature,humidity,light intensity,air pressure,and pollutant concentration.These data are transmitted to the IoT cloud platform through stable and reliable communication links,forming a massive and detailed basic data resource pool.By using cutting-edge big data processing algorithms,machine learning models,and artificial intelligence analysis tools,in-depth mining and intelligent analysis of these multi-source heterogeneous data are conducted to generate high-value-added decision-making bases.This precisely empowers multiple fields,including agriculture,medical and health care,smart home,environmental science,and industrial manufacturing,driving intelligent transformation and catalyzing society to move towards a new stage of high-quality development.This paper comprehensively analyzes the technical cores of the IoT and WSNs,systematically sorts out the advanced key technologies of WSNs and the evolution of their strategic significance in the IoT system,deeply explores the innovative application scenarios and practical effects of the two in specific vertical fields,and looks forward to the technological evolution trends.It provides a detailed and highly practical guiding reference for researchers,technical engineers,and industrial decision-makers.