期刊文献+
共找到1,945篇文章
< 1 2 98 >
每页显示 20 50 100
Lightweight Multi-Agent Edge Framework for Cybersecurity and Resource Optimization in Mobile Sensor Networks
1
作者 Fatima Al-Quayed 《Computers, Materials & Continua》 2026年第1期919-934,共16页
Due to the growth of smart cities,many real-time systems have been developed to support smart cities using Internet of Things(IoT)and emerging technologies.They are formulated to collect the data for environment monit... Due to the growth of smart cities,many real-time systems have been developed to support smart cities using Internet of Things(IoT)and emerging technologies.They are formulated to collect the data for environment monitoring and automate the communication process.In recent decades,researchers have made many efforts to propose autonomous systems for manipulating network data and providing on-time responses in critical operations.However,the widespread use of IoT devices in resource-constrained applications and mobile sensor networks introduces significant research challenges for cybersecurity.These systems are vulnerable to a variety of cyberattacks,including unauthorized access,denial-of-service attacks,and data leakage,which compromise the network’s security.Additionally,uneven load balancing between mobile IoT devices,which frequently experience link interferences,compromises the trustworthiness of the system.This paper introduces a Multi-Agent secured framework using lightweight edge computing to enhance cybersecurity for sensor networks,aiming to leverage artificial intelligence for adaptive routing and multi-metric trust evaluation to achieve data privacy and mitigate potential threats.Moreover,it enhances the efficiency of distributed sensors for energy consumption through intelligent data analytics techniques,resulting in highly consistent and low-latency network communication.Using simulations,the proposed framework reveals its significant performance compared to state-of-the-art approaches for energy consumption by 43%,latency by 46%,network throughput by 51%,packet loss rate by 40%,and denial of service attacks by 42%. 展开更多
关键词 Artificial intelligence CYBERSECURITY edge computing Internet of Things threat detection
在线阅读 下载PDF
Intrusion Detection and Security Attacks Mitigation in Smart Cities with Integration of Human-Computer Interaction
2
作者 Abeer Alnuaim 《Computers, Materials & Continua》 2026年第1期711-743,共33页
The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats.In the evolving landscape of cybersecurity,the efficacy of Intrusion Detection Systems(IDS)... The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats.In the evolving landscape of cybersecurity,the efficacy of Intrusion Detection Systems(IDS)is increasingly measured by technical performance,operational usability,and adaptability.This study introduces and rigorously evaluates a Human-Computer Interaction(HCI)-Integrated IDS with the utilization of Convolutional Neural Network(CNN),CNN-Long Short Term Memory(LSTM),and Random Forest(RF)against both a Baseline Machine Learning(ML)and a Traditional IDS model,through an extensive experimental framework encompassing many performance metrics,including detection latency,accuracy,alert prioritization,classification errors,system throughput,usability,ROC-AUC,precision-recall,confusion matrix analysis,and statistical accuracy measures.Our findings consistently demonstrate the superiority of the HCI-Integrated approach utilizing three major datasets(CICIDS 2017,KDD Cup 1999,and UNSW-NB15).Experimental results indicate that the HCI-Integrated model outperforms its counterparts,achieving an AUC-ROC of 0.99,a precision of 0.93,and a recall of 0.96,while maintaining the lowest false positive rate(0.03)and the fastest detection time(~1.5 s).These findings validate the efficacy of incorporating HCI to enhance anomaly detection capabilities,improve responsiveness,and reduce alert fatigue in critical smart city applications.It achieves markedly lower detection times,higher accuracy across all threat categories,reduced false positive and false negative rates,and enhanced system throughput under concurrent load conditions.The HCIIntegrated IDS excels in alert contextualization and prioritization,offering more actionable insights while minimizing analyst fatigue.Usability feedback underscores increased analyst confidence and operational clarity,reinforcing the importance of user-centered design.These results collectively position the HCI-Integrated IDS as a highly effective,scalable,and human-aligned solution for modern threat detection environments. 展开更多
关键词 Anomaly detection smart cities Internet of Things(IoT) HCI CNN LSTM random forest intelligent secure solutions
在线阅读 下载PDF
GSLDWOA: A Feature Selection Algorithm for Intrusion Detection Systems in IIoT
3
作者 Wanwei Huang Huicong Yu +3 位作者 Jiawei Ren Kun Wang Yanbu Guo Lifeng Jin 《Computers, Materials & Continua》 2026年第1期2006-2029,共24页
Existing feature selection methods for intrusion detection systems in the Industrial Internet of Things often suffer from local optimality and high computational complexity.These challenges hinder traditional IDS from... Existing feature selection methods for intrusion detection systems in the Industrial Internet of Things often suffer from local optimality and high computational complexity.These challenges hinder traditional IDS from effectively extracting features while maintaining detection accuracy.This paper proposes an industrial Internet ofThings intrusion detection feature selection algorithm based on an improved whale optimization algorithm(GSLDWOA).The aim is to address the problems that feature selection algorithms under high-dimensional data are prone to,such as local optimality,long detection time,and reduced accuracy.First,the initial population’s diversity is increased using the Gaussian Mutation mechanism.Then,Non-linear Shrinking Factor balances global exploration and local development,avoiding premature convergence.Lastly,Variable-step Levy Flight operator and Dynamic Differential Evolution strategy are introduced to improve the algorithm’s search efficiency and convergence accuracy in highdimensional feature space.Experiments on the NSL-KDD and WUSTL-IIoT-2021 datasets demonstrate that the feature subset selected by GSLDWOA significantly improves detection performance.Compared to the traditional WOA algorithm,the detection rate and F1-score increased by 3.68%and 4.12%.On the WUSTL-IIoT-2021 dataset,accuracy,recall,and F1-score all exceed 99.9%. 展开更多
关键词 Industrial Internet of Things intrusion detection system feature selection whale optimization algorithm Gaussian mutation
在线阅读 下载PDF
A Privacy-Preserving Convolutional Neural Network Inference Framework for AIoT Applications
4
作者 Haoran Wang Shuhong Yang +2 位作者 Kuan Shao Tao Xiao Zhenyong Zhang 《Computers, Materials & Continua》 2026年第1期1354-1371,共18页
With the rapid development of the Artificial Intelligence of Things(AIoT),convolutional neural networks(CNNs)have demonstrated potential and remarkable performance in AIoT applications due to their excellent performan... With the rapid development of the Artificial Intelligence of Things(AIoT),convolutional neural networks(CNNs)have demonstrated potential and remarkable performance in AIoT applications due to their excellent performance in various inference tasks.However,the users have concerns about privacy leakage for the use of AI and the performance and efficiency of computing on resource-constrained IoT edge devices.Therefore,this paper proposes an efficient privacy-preserving CNN framework(i.e.,EPPA)based on the Fully Homomorphic Encryption(FHE)scheme for AIoT application scenarios.In the plaintext domain,we verify schemes with different activation structures to determine the actual activation functions applicable to the corresponding ciphertext domain.Within the encryption domain,we integrate batch normalization(BN)into the convolutional layers to simplify the computation process.For nonlinear activation functions,we use composite polynomials for approximate calculation.Regarding the noise accumulation caused by homomorphic multiplication operations,we realize the refreshment of ciphertext noise through minimal“decryption-encryption”interactions,instead of adopting bootstrapping operations.Additionally,in practical implementation,we convert three-dimensional convolution into two-dimensional convolution to reduce the amount of computation in the encryption domain.Finally,we conduct extensive experiments on four IoT datasets,different CNN architectures,and two platforms with different resource configurations to evaluate the performance of EPPA in detail. 展开更多
关键词 Artificial Intelligence of Things(AIoT) convolutional neural network PRIVACY-PRESERVING fully homomorphic encryption
在线阅读 下载PDF
Thingness, Fusion, and Lyricism
5
作者 JI Jin 《Frontiers of Literary Studies in China-Selected Publications from Chinese Universities》 2023年第3期264-274,共11页
Food Is Heaven,Ge Liang's latest full-length novel,is narrated from the perspective of food culture and offers the experience of historical legends to readers by telling stories of simple and repetitive daily rout... Food Is Heaven,Ge Liang's latest full-length novel,is narrated from the perspective of food culture and offers the experience of historical legends to readers by telling stories of simple and repetitive daily routines,forming the writer's unique perspective of observing and writing about Hong Kong,China.The“eating”in the novel is treated not merely as a daily need in life,but as a reflection on culture and history in the broader sense. 展开更多
关键词 Ge Liang Food Is Heaven thingness lyricism
原文传递
Towards Decentralized IoT Security: Optimized Detection of Zero-Day Multi-Class Cyber-Attacks Using Deep Federated Learning
6
作者 Misbah Anwer Ghufran Ahmed +3 位作者 Maha Abdelhaq Raed Alsaqour Shahid Hussain Adnan Akhunzada 《Computers, Materials & Continua》 2026年第1期744-758,共15页
The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)an... The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)and Deep Learning(DL)techniques have demonstrated promising early detection capabilities.However,their effectiveness is limited when handling the vast volumes of IoT-generated data due to scalability constraints,high computational costs,and the costly time-intensive process of data labeling.To address these challenges,this study proposes a Federated Learning(FL)framework that leverages collaborative and hybrid supervised learning to enhance cyber threat detection in IoT networks.By employing Deep Neural Networks(DNNs)and decentralized model training,the approach reduces computational complexity while improving detection accuracy.The proposed model demonstrates robust performance,achieving accuracies of 94.34%,99.95%,and 87.94%on the publicly available kitsune,Bot-IoT,and UNSW-NB15 datasets,respectively.Furthermore,its ability to detect zero-day attacks is validated through evaluations on two additional benchmark datasets,TON-IoT and IoT-23,using a Deep Federated Learning(DFL)framework,underscoring the generalization and effectiveness of the model in heterogeneous and decentralized IoT environments.Experimental results demonstrate superior performance over existing methods,establishing the proposed framework as an efficient and scalable solution for IoT security. 展开更多
关键词 Cyber-attack intrusion detection system(IDS) deep federated learning(DFL) zero-day attack distributed denial of services(DDoS) MULTI-CLASS Internet of Things(IoT)
在线阅读 下载PDF
The Internet of Things under Federated Learning:A Review of the Latest Advances and Applications 被引量:1
7
作者 Jinlong Wang Zhenyu Liu +2 位作者 Xingtao Yang Min Li Zhihan Lyu 《Computers, Materials & Continua》 SCIE EI 2025年第1期1-39,共39页
With the rapid development of artificial intelligence,the Internet of Things(IoT)can deploy various machine learning algorithms for network and application management.In the IoT environment,many sensors and devices ge... With the rapid development of artificial intelligence,the Internet of Things(IoT)can deploy various machine learning algorithms for network and application management.In the IoT environment,many sensors and devices generatemassive data,but data security and privacy protection have become a serious challenge.Federated learning(FL)can achieve many intelligent IoT applications by training models on local devices and allowing AI training on distributed IoT devices without data sharing.This review aims to deeply explore the combination of FL and the IoT,and analyze the application of federated learning in the IoT from the aspects of security and privacy protection.In this paper,we first describe the potential advantages of FL and the challenges faced by current IoT systems in the fields of network burden and privacy security.Next,we focus on exploring and analyzing the advantages of the combination of FL on the Internet,including privacy security,attack detection,efficient communication of the IoT,and enhanced learning quality.We also list various application scenarios of FL on the IoT.Finally,we propose several open research challenges and possible solutions. 展开更多
关键词 Federated learning Internet of Things SENSORS machine learning privacy security
在线阅读 下载PDF
When Embodied AI Meets Industry 5.0:Human-Centered Smart Manufacturing 被引量:4
8
作者 Jing Xu Qiyu Sun +1 位作者 Qing-Long Han Yang Tang 《IEEE/CAA Journal of Automatica Sinica》 2025年第3期485-501,共17页
As embodied intelligence(EI),large language models(LLMs),and cloud computing continue to advance,Industry5.0 facilitates the development of industrial artificial intelligence(Ind AI)through cyber-physical-social syste... As embodied intelligence(EI),large language models(LLMs),and cloud computing continue to advance,Industry5.0 facilitates the development of industrial artificial intelligence(Ind AI)through cyber-physical-social systems(CPSSs)with a human-centric focus.These technologies are organized by the system-wide approach of Industry 5.0,in order to empower the manufacturing industry to achieve broader societal goals of job creation,economic growth,and green production.This survey first provides a general framework of smart manufacturing in the context of Industry 5.0.Wherein,the embodied agents,like robots,sensors,and actuators,are the carriers for Ind AI,facilitating the development of the self-learning intelligence in individual entities,the collaborative intelligence in production lines and factories(smart systems),and the swarm intelligence within industrial clusters(systems of smart systems).Through the framework of CPSSs,the key technologies and their possible applications for supporting the single-agent,multi-agent and swarm-agent embodied Ind AI have been reviewed,such as the embodied perception,interaction,scheduling,multi-mode large language models,and collaborative training.Finally,to stimulate future research in this area,the open challenges and opportunities of applying Industry 5.0 to smart manufacturing are identified and discussed.The perspective of Industry 5.0-driven manufacturing industry aims to enhance operational productivity and efficiency by seamlessly integrating the virtual and physical worlds in a human-centered manner,thereby fostering an intelligent,sustainable,and resilient industrial landscape. 展开更多
关键词 Embodied AI human-centered manufacturing Industry 5.0 internet of things large multi-mode language models
在线阅读 下载PDF
Integration of data science with the intelligent IoT(IIoT):Current challenges and future perspectives 被引量:2
9
作者 Inam Ullah Deepak Adhikari +3 位作者 Xin Su Francesco Palmieri Celimuge Wu Chang Choi 《Digital Communications and Networks》 2025年第2期280-298,共19页
The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,s... The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,such as Artificial Intelligence(AI)and machine learning,to make accurate decisions.Data science is the science of dealing with data and its relationships through intelligent approaches.Most state-of-the-art research focuses independently on either data science or IIoT,rather than exploring their integration.Therefore,to address the gap,this article provides a comprehensive survey on the advances and integration of data science with the Intelligent IoT(IIoT)system by classifying the existing IoT-based data science techniques and presenting a summary of various characteristics.The paper analyzes the data science or big data security and privacy features,including network architecture,data protection,and continuous monitoring of data,which face challenges in various IoT-based systems.Extensive insights into IoT data security,privacy,and challenges are visualized in the context of data science for IoT.In addition,this study reveals the current opportunities to enhance data science and IoT market development.The current gap and challenges faced in the integration of data science and IoT are comprehensively presented,followed by the future outlook and possible solutions. 展开更多
关键词 Data science Internet of things(IoT) Big data Communication systems Networks Security Data science analytics
在线阅读 下载PDF
Photolithographic Microfabrication of Microbatteries for On-Chip Energy Storage 被引量:1
10
作者 Yuan Ma Sen Wang Zhong-Shuai Wu 《Nano-Micro Letters》 2025年第5期117-144,共28页
Microbatteries(MBs)are crucial to power miniaturized devices for the Internet of Things.In the evolutionary journey of MBs,fabrication technology emerges as the cornerstone,guiding the intricacies of their configurati... Microbatteries(MBs)are crucial to power miniaturized devices for the Internet of Things.In the evolutionary journey of MBs,fabrication technology emerges as the cornerstone,guiding the intricacies of their configuration designs,ensuring precision,and facilitating scalability for mass production.Photolithography stands out as an ideal technology,leveraging its unparalleled resolution,exceptional design flexibility,and entrenched position within the mature semiconductor industry.However,comprehensive reviews on its application in MB development remain scarce.This review aims to bridge that gap by thoroughly assessing the recent status and promising prospects of photolithographic microfabrication for MBs.Firstly,we delve into the fundamental principles and step-by-step procedures of photolithography,offering a nuanced understanding of its operational mechanisms and the criteria for photoresist selection.Subsequently,we highlighted the specific roles of photolithography in the fabrication of MBs,including its utilization as a template for creating miniaturized micropatterns,a protective layer during the etching process,a mold for soft lithography,a constituent of MB active component,and a sacrificial layer in the construction of micro-Swiss-roll structure.Finally,the review concludes with a summary of the key challenges and future perspectives of MBs fabricated by photolithography,providing comprehensive insights and sparking research inspiration in this field. 展开更多
关键词 MICROBATTERIES PHOTOLITHOGRAPHY Internet of Things MICROPATTERNS On-chip energy storage
在线阅读 下载PDF
AI-Driven Sentiment-Enhanced Secure IoT Communication Model Using Resilience Behavior Analysis 被引量:1
11
作者 Menwa Alshammeri Mamoona Humayun +1 位作者 Khalid Haseeb Ghadah Naif Alwakid 《Computers, Materials & Continua》 2025年第7期433-446,共14页
Wireless technologies and the Internet of Things(IoT)are being extensively utilized for advanced development in traditional communication systems.This evolution lowers the cost of the extensive use of sensors,changing... Wireless technologies and the Internet of Things(IoT)are being extensively utilized for advanced development in traditional communication systems.This evolution lowers the cost of the extensive use of sensors,changing the way devices interact and communicate in dynamic and uncertain situations.Such a constantly evolving environment presents enormous challenges to preserving a secure and lightweight IoT system.Therefore,it leads to the design of effective and trusted routing to support sustainable smart cities.This research study proposed a Genetic Algorithm sentiment-enhanced secured optimization model,which combines big data analytics and analysis rules to evaluate user feedback.The sentiment analysis is utilized to assess the perception of network performance,allowing the classification of device behavior as positive,neutral,or negative.By integrating sentiment-driven insights,the IoT network adjusts the system configurations to enhance the performance using network behaviour in terms of latency,reliability,fault tolerance,and sentiment score.Accordingly to the analysis,the proposed model categorizes the behavior of devices as positive,neutral,or negative,facilitating real-time monitoring for crucial applications.Experimental results revealed a significant improvement in the proposed model for threat prevention and network efficiency,demonstrating its resilience for real-time IoT applications. 展开更多
关键词 Internet of things sentiment analysis smart cities big data resilience communication
在线阅读 下载PDF
Lightweight consensus mechanisms in the Internet of Blockchained Things:Thorough analysis and research directions 被引量:1
12
作者 Somia Sahraoui Abdelmalik Bachir 《Digital Communications and Networks》 2025年第4期1245-1260,共16页
The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and ... The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and advanced services.However,this rapid expansion also heightens the vulnerability of the IoT ecosystem to security threats.Consequently,innovative solutions capable of effectively mitigating risks while accommodating the unique constraints of IoT environments are urgently needed.Recently,the convergence of Blockchain technology and IoT has introduced a decentralized and robust framework for securing data and interactions,commonly referred to as the Internet of Blockchained Things(IoBT).Extensive research efforts have been devoted to adapting Blockchain technology to meet the specific requirements of IoT deployments.Within this context,consensus algorithms play a critical role in assessing the feasibility of integrating Blockchain into IoT ecosystems.The adoption of efficient and lightweight consensus mechanisms for block validation has become increasingly essential.This paper presents a comprehensive examination of lightweight,constraint-aware consensus algorithms tailored for IoBT.The study categorizes these consensus mechanisms based on their core operations,the security of the block validation process,the incorporation of AI techniques,and the specific applications they are designed to support. 展开更多
关键词 Blockchain Internet of Things Lightweight consensus
在线阅读 下载PDF
Application Research of Wireless Sensor Networks and the Internet of Things 被引量:1
13
作者 Changjian Lv Rui Wang Man Zhao 《Journal of Electronic Research and Application》 2025年第4期283-289,共7页
In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),dee... In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),deeply embedded in the perception layer architecture of the IoT,play a crucial role as“tactile nerve endings.”A vast number of micro sensor nodes are widely distributed in monitoring areas according to preset deployment strategies,continuously and accurately perceiving and collecting real-time data on environmental parameters such as temperature,humidity,light intensity,air pressure,and pollutant concentration.These data are transmitted to the IoT cloud platform through stable and reliable communication links,forming a massive and detailed basic data resource pool.By using cutting-edge big data processing algorithms,machine learning models,and artificial intelligence analysis tools,in-depth mining and intelligent analysis of these multi-source heterogeneous data are conducted to generate high-value-added decision-making bases.This precisely empowers multiple fields,including agriculture,medical and health care,smart home,environmental science,and industrial manufacturing,driving intelligent transformation and catalyzing society to move towards a new stage of high-quality development.This paper comprehensively analyzes the technical cores of the IoT and WSNs,systematically sorts out the advanced key technologies of WSNs and the evolution of their strategic significance in the IoT system,deeply explores the innovative application scenarios and practical effects of the two in specific vertical fields,and looks forward to the technological evolution trends.It provides a detailed and highly practical guiding reference for researchers,technical engineers,and industrial decision-makers. 展开更多
关键词 Wireless Sensor Networks Internet of Things Key technologies Application fields
在线阅读 下载PDF
5DGWO-GAN:A Novel Five-Dimensional Gray Wolf Optimizer for Generative Adversarial Network-Enabled Intrusion Detection in IoT Systems
14
作者 Sarvenaz Sadat Khatami Mehrdad Shoeibi +2 位作者 Anita Ershadi Oskouei Diego Martín Maral Keramat Dashliboroun 《Computers, Materials & Continua》 SCIE EI 2025年第1期881-911,共31页
The Internet of Things(IoT)is integral to modern infrastructure,enabling connectivity among a wide range of devices from home automation to industrial control systems.With the exponential increase in data generated by... The Internet of Things(IoT)is integral to modern infrastructure,enabling connectivity among a wide range of devices from home automation to industrial control systems.With the exponential increase in data generated by these interconnected devices,robust anomaly detection mechanisms are essential.Anomaly detection in this dynamic environment necessitates methods that can accurately distinguish between normal and anomalous behavior by learning intricate patterns.This paper presents a novel approach utilizing generative adversarial networks(GANs)for anomaly detection in IoT systems.However,optimizing GANs involves tuning hyper-parameters such as learning rate,batch size,and optimization algorithms,which can be challenging due to the non-convex nature of GAN loss functions.To address this,we propose a five-dimensional Gray wolf optimizer(5DGWO)to optimize GAN hyper-parameters.The 5DGWO introduces two new types of wolves:gamma(γ)for improved exploitation and convergence,and theta(θ)for enhanced exploration and escaping local minima.The proposed system framework comprises four key stages:1)preprocessing,2)generative model training,3)autoencoder(AE)training,and 4)predictive model training.The generative models are utilized to assist the AE training,and the final predictive models(including convolutional neural network(CNN),deep belief network(DBN),recurrent neural network(RNN),random forest(RF),and extreme gradient boosting(XGBoost))are trained using the generated data and AE-encoded features.We evaluated the system on three benchmark datasets:NSL-KDD,UNSW-NB15,and IoT-23.Experiments conducted on diverse IoT datasets show that our method outperforms existing anomaly detection strategies and significantly reduces false positives.The 5DGWO-GAN-CNNAE exhibits superior performance in various metrics,including accuracy,recall,precision,root mean square error(RMSE),and convergence trend.The proposed 5DGWO-GAN-CNNAE achieved the lowest RMSE values across the NSL-KDD,UNSW-NB15,and IoT-23 datasets,with values of 0.24,1.10,and 0.09,respectively.Additionally,it attained the highest accuracy,ranging from 94%to 100%.These results suggest a promising direction for future IoT security frameworks,offering a scalable and efficient solution to safeguard against evolving cyber threats. 展开更多
关键词 Internet of things intrusion detection generative adversarial networks five-dimensional binary gray wolf optimizer deep learning
在线阅读 下载PDF
LoRa Sense:Sensing and Optimization of LoRa Link Behavior Using Path-Loss Models in Open-Cast Mines
15
作者 Bhanu Pratap Reddy Bhavanam Prashanth Ragam 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期425-466,共42页
The Internet of Things(IoT)has orchestrated various domains in numerous applications,contributing significantly to the growth of the smart world,even in regions with low literacy rates,boosting socio-economic developm... The Internet of Things(IoT)has orchestrated various domains in numerous applications,contributing significantly to the growth of the smart world,even in regions with low literacy rates,boosting socio-economic development.This study provides valuable insights into optimizing wireless communication,paving the way for a more connected and productive future in the mining industry.The IoT revolution is advancing across industries,but harsh geometric environments,including open-pit mines,pose unique challenges for reliable communication.The advent of IoT in the mining industry has significantly improved communication for critical operations through the use of Radio Frequency(RF)protocols such as Bluetooth,Wi-Fi,GSM/GPRS,Narrow Band(NB)-IoT,SigFox,ZigBee,and Long Range Wireless Area Network(LoRaWAN).This study addresses the optimization of network implementations by comparing two leading free-spreading IoT-based RF protocols such as ZigBee and LoRaWAN.Intensive field tests are conducted in various opencast mines to investigate coverage potential and signal attenuation.ZigBee is tested in the Tadicherla open-cast coal mine in India.Similarly,LoRaWAN field tests are conducted at one of the associated cement companies(ACC)in the limestone mine in Bargarh,India,covering both Indoor-toOutdoor(I2O)and Outdoor-to-Outdoor(O2O)environments.A robust framework of path-loss models,referred to as Free space,Egli,Okumura-Hata,Cost231-Hata and Ericsson models,combined with key performance metrics,is employed to evaluate the patterns of signal attenuation.Extensive field testing and careful data analysis revealed that the Egli model is the most consistent path-loss model for the ZigBee protocol in an I2O environment,with a coefficient of determination(R^(2))of 0.907,balanced error metrics such as Normalized Root Mean Square Error(NRMSE)of 0.030,Mean Square Error(MSE)of 4.950,Mean Absolute Percentage Error(MAPE)of 0.249 and Scatter Index(SI)of 2.723.In the O2O scenario,the Ericsson model showed superior performance,with the highest R^(2)value of 0.959,supported by strong correlation metrics:NRMSE of 0.026,MSE of 8.685,MAPE of 0.685,Mean Absolute Deviation(MAD)of 20.839 and SI of 2.194.For the LoRaWAN protocol,the Cost-231 model achieved the highest R^(2)value of 0.921 in the I2O scenario,complemented by the lowest metrics:NRMSE of 0.018,MSE of 1.324,MAPE of 0.217,MAD of 9.218 and SI of 1.238.In the O2O environment,the Okumura-Hata model achieved the highest R^(2)value of 0.978,indicating a strong fit with metrics NRMSE of 0.047,MSE of 27.807,MAPE of 27.494,MAD of 37.287 and SI of 3.927.This advancement in reliable communication networks promises to transform the opencast landscape into networked signal attenuation.These results support decision-making for mining needs and ensure reliable communications even in the face of formidable obstacles. 展开更多
关键词 Internet of things long range wireless area network ZigBee mining environments path-loss models coefficient of determination mean square error
在线阅读 下载PDF
船海学术语篇摘要中名词词组形式表征的认知分析——以“Classifier +Thing”为例
16
作者 田苗 张宇新 《山东外语教学》 北大核心 2025年第3期19-29,共11页
“Classifier+Thing”结构在船海学术语篇摘要中俯拾皆是,其认知路径和理据亟待深入探究。本研究聚焦“Classifier+Thing”名词词组,分析船海学术语篇摘要中该词组的认知路径及理据。研究发现:(1)“Classifier+Thing”在概念结构-语义... “Classifier+Thing”结构在船海学术语篇摘要中俯拾皆是,其认知路径和理据亟待深入探究。本研究聚焦“Classifier+Thing”名词词组,分析船海学术语篇摘要中该词组的认知路径及理据。研究发现:(1)“Classifier+Thing”在概念结构-语义层的认知过程体现了语法转喻机制,船海摘要语料库中主要通过“过程-动作”“过程-结果”“用途-结构”实现概念结构-语义间的动、静态转换;(2)“Classifier+Thing”的形式表征过程为先确定“核心词(Thing)”,后在大脑词库中匹配“类别语(Classifier)”,遵循认知经济性原则;(3)该词组形式表征过程受学术语篇类型影响,遵循受限语言说。研究结果一定程度上深化了对学术语篇中名词词组的认识,提升学界对于船海学科学术话语的关注。 展开更多
关键词 “Classifier+Thing” 认知路径及理据 学术摘要 名词词组
在线阅读 下载PDF
High-precision ADC design techniques in ISSCC 2025
17
作者 Bingrui Li Zongnan Wang Xiyuan Tang 《Journal of Semiconductors》 2025年第7期16-20,共5页
High-precision analog-to-digital converters(ADCs)serve as fundamental components in modern electronic systems,bridging physical analog world and digital intelligence.They find ubiquitous applications across diverse do... High-precision analog-to-digital converters(ADCs)serve as fundamental components in modern electronic systems,bridging physical analog world and digital intelligence.They find ubiquitous applications across diverse domains,ranging from internet of things(IoT)to embodied artificial intelligence systems.Achieving high precision necessitates various circuit techniques including high-performance amplifiers and advanced calibration schemes.Furthermore,the evolution of ADC architectures has gradually elevated the significance of peripheral circuitry co-design in optimizing system-level performance metrics.In ISSCC 2025,several techniques are proposed to address these challenges. 展开更多
关键词 circuit techniques internet things iot analog digital converters modern electronic systemsbridging internet things embodied artificial intelligence high precision adc embodied artificial intelligence systemsachieving
在线阅读 下载PDF
Dogs
18
作者 黄刚 张超(指导) 《中学生英语》 2025年第13期7-7,共1页
I love dogs because they are so friendly and lovely.With bright eyes,dogs can see things in the dark.Their noses are very sensitive,and this helps them find things easily.My pet dog is named Dahu.He is white with long... I love dogs because they are so friendly and lovely.With bright eyes,dogs can see things in the dark.Their noses are very sensitive,and this helps them find things easily.My pet dog is named Dahu.He is white with long ears.Every day when I come back home from school,he runs to me happily and wags his tail.We often play games together.He likes to chase a ball,and I throw the ball far,then he runs quickly to bring it back. 展开更多
关键词 friendly PETS chase balland sensitivity DOGS APPEARANCE find things noses
在线阅读 下载PDF
Blockchain and Smart Contracts:An Effective Approach for the Transaction Security&Privacy in Electronic Medical Records
19
作者 Amal Al-Rasheed Hashim Ali +1 位作者 Rahim Khan Aamir Saeed 《Computers, Materials & Continua》 2025年第11期3419-3436,共18页
In the domain of Electronic Medical Records(EMRs),emerging technologies are crucial to addressing longstanding concerns surrounding transaction security and patient privacy.This paper explores the integration of smart... In the domain of Electronic Medical Records(EMRs),emerging technologies are crucial to addressing longstanding concerns surrounding transaction security and patient privacy.This paper explores the integration of smart contracts and blockchain technology as a robust framework for securing sensitive healthcare data.By leveraging the decentralized and immutable nature of blockchain,the proposed approach ensures transparency,integrity,and traceability of EMR transactions,effectivelymitigating risks of unauthorized access and data tampering.Smart contracts further enhance this framework by enabling the automation and enforcement of secure transactions,eliminating reliance on intermediaries and reducing the potential for human error.This integration marks a paradigm shift in management and exchange of healthcare information,fostering a secure and privacy-preserving ecosystem for all stakeholders.The research also evaluates the practical implementation of blockchain and smart contracts within healthcare systems,examining their real-world effectiveness in enhancing transactional security,safeguarding patient privacy,and maintaining data integrity.Findings from the study contribute valuable insights to the growing body of work on digital healthcare innovation,underscoring the potential of these technologies to transform EMR systems with high accuracy and precision.As global healthcare systems continue to face the challenge of protecting sensitive patient data,the proposed framework offers a forward-looking,scalable,and effective solution aligned with the evolving digital healthcare landscape. 展开更多
关键词 Smart-contracts internet of things PRIVACY SECURITY blockchain EMR
在线阅读 下载PDF
上一页 1 2 98 下一页 到第
使用帮助 返回顶部