期刊文献+
共找到173,908篇文章
< 1 2 250 >
每页显示 20 50 100
Call for Papers——Feature Topic Vol.22,No.2,2025 Efficient Cooperative Transmission over Satellite Internet for 6G
1
《China Communications》 2025年第1期I0002-I0002,共1页
Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enh... Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enhance the range of network information services accessible to humans.With the transition of terrestrial mobile communication networks from the 5G era,which provides access to information anywhere,to the 6G era,which seeks to connect everything,the construction of satellite Internet,which promises a"network reaching everywhere and service is ubiquitous",has become the consensus of the industry's development and the focus of global scientific and technological innovation. 展开更多
关键词 internet SERVICES service
下载PDF
The Association between Problematic Internet Use,Resilience,and Fatigue in First-Year Medical College Students in China:A Moderated Mediation Model
2
作者 Xiumei Chen Xiaobing Lu +6 位作者 Yufu Ning Lifeng Wang Jeffrey H.Gamble Xianhe Chen Xingyong Jiang I-Hua Chen Peijin Lin 《International Journal of Mental Health Promotion》 2025年第1期51-63,共13页
Background:Resilience is crucial for medical college students to thrive in the highly stressful environment of medical education.However,the prevalence of problematic internet use(PIU)in this population may negatively... Background:Resilience is crucial for medical college students to thrive in the highly stressful environment of medical education.However,the prevalence of problematic internet use(PIU)in this population may negatively impact their resilience.This study investigated the influence of problematic online gaming(PG)and problematic social media use(PSMU)on the resilience of medical college students in China.Methods:A sample of 5075 first-year medical college students from four Chinese universities was studied.PG served as the independent variable,resilience as the dependent variable,fatigue as the mediator,and PSMU as the moderator.Structural equation modeling was conducted using LISREL 8.80.Additionally,a moderated mediation model was evaluated using the jAMM module in jamovi 2.6.13.Results:The study’s findings revealed significant negative correlations between resilience and the variables of PG,PSMU,and fatigue.Fatigue mediated the relationship between PG and resilience(B=−0.04,95%CI=[−0.05,−0.03]).PSMU moderated the direct relationship between PG and resilience with the interaction term PG×PSMU significant(B=−0.004,t=−6.501,p<0.001)and the first stage(PG→fatigue)of the mediation with PG×PSMU significant(B=0.055,t=8.351,p<0.001).The detrimental effects of PG on resilience were more pronounced among individuals with lower levels of PSMU.Conclusion:This study concluded that addressing PIU,particularly PG,is essential for fostering resilience in medical college students.While PSMU itself is maladaptive,the underlying social media engagement may serve a protective role through social support in mitigating the adverse effects of PG on resilience. 展开更多
关键词 Problematic internet use problematic online gaming problematic social media use FATIGUE RESILieNCE structural equation modeling conditional mediation
下载PDF
The impact of Internet access on household dietary quality:Evidence from rural China 被引量:1
3
作者 Yi Cui Qiran Zhao +1 位作者 Thomas Glauben Wei Si 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第2期374-383,共10页
Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access sig... Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access significantly impacts agricultural production and improves smallholder farmers’income.Beyond these,the Internet can affect other dimensions of social welfare.However,research about the impact of Internet access on dietary quality in rural China remains scarce.This study utilizes multi-period panel data from Fixed Observation Point in rural China from 2009 to 2015 to estimate the impact of Internet access on dietary quality and food consumption of rural households and conducts a causal analysis.Regression models with time and household fixed effects allow robust estimation while reducing potential issues of unobserved heterogeneity.The estimates show that Internet access has significantly increased rural household dietary quality(measured by the Chinese Diet Balance Index).Further research finds that Internet access has increased the consumption of animal products,such as aquatic and dairy products.We also examine the underlying mechanisms.Internet access improves dietary quality and food consumption mainly through increasing household income and food expenditure.These results encourage the promotion of Internet access as a valuable tool for nutritional improvements,especially in rural areas. 展开更多
关键词 dietary quality fixed effect model internet access rural China
下载PDF
Deep Transfer Learning Techniques in Intrusion Detection System-Internet of Vehicles: A State-of-the-Art Review
4
作者 Wufei Wu Javad Hassannataj Joloudari +8 位作者 Senthil Kumar Jagatheesaperumal Kandala N.V.P.SRajesh Silvia Gaftandzhieva Sadiq Hussain Rahimullah Rabih Najibullah Haqjoo Mobeen Nazar Hamed Vahdat-Nejad Rositsa Doneva 《Computers, Materials & Continua》 SCIE EI 2024年第8期2785-2813,共29页
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accide... The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks. 展开更多
关键词 Cyber-attacks internet of things internet of vehicles intrusion detection system
下载PDF
Call for Papers——Feature Topic Vol.22,No.2,2025 Efficient Cooperative Transmission over Satellite Internet for 6G
5
《China Communications》 SCIE CSCD 2024年第1期I0006-I0006,共1页
Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enh... Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enhance the range of network information services accessible to humans.With the transition of terrestrial mobile communication networks from the 5G era,which provides access to information anywhere,to the 6G era,which seeks to connect everything,the construction of satellite Internet,which promises a"network reaching everywhere and service is ubiquitous",has become the consensus of the industry's development and the focus of global scientific and technological innovation. 展开更多
关键词 internet SERVICES service
下载PDF
Intelligent Internet of Things with Reliable Communication and Collaboration Technologies
6
作者 Zhao Junhui Wu Celimuge +4 位作者 Xu Wenjun Qi Chenhao Bu Shengrong Zhang Shuowen Zhang Qingmiao 《China Communications》 SCIE CSCD 2024年第8期I0002-I0006,共5页
The Internet of Things(IoT)connects objects to Internet through sensor devices,radio frequency identification devices and other information collection and processing devices to realize information interaction.IoT is w... The Internet of Things(IoT)connects objects to Internet through sensor devices,radio frequency identification devices and other information collection and processing devices to realize information interaction.IoT is widely used in many fields,including intelligent transportation,intelligent healthcare,intelligent home and industry.In these fields,IoT devices connected via high-speed internet for efficient and reliable communications and faster response times. 展开更多
关键词 INTERACTION internet IOT
下载PDF
Assessing the effectiveness of internetbased interventions for mental health outcomes:an umbrella review
7
作者 Mi Zhang Chuan Fan +6 位作者 Lijun Ma Huixue Wang Zhenyue Zu Linxi Yang Fenglan Chen Wenzhuo Wei Xiaoming Li 《General Psychiatry》 CSCD 2024年第4期452-462,共11页
Internet-based interventions(IBIs)for behavioural health have been prevalent for over two decades,and a growing proportion of individuals with mental health concerns prefer these emerging digital alternatives.However,... Internet-based interventions(IBIs)for behavioural health have been prevalent for over two decades,and a growing proportion of individuals with mental health concerns prefer these emerging digital alternatives.However,the effectiveness and acceptability of IBIs for various mental health disorders continue to be subject to scholarly debate.We performed an umbrella review of meta-analyses(MAs),conducting literature searches in PubMed,Web of Science,Embase,Cochrane and Ovid Medline from their inception to 17 January 2023.A total of 87MAs,reporting on 1683 randomised controlled trials and 295589 patients,were included.The results indicated that IBIs had a moderate effect on anxiety disorder(standardised mean difference(SMD)=0.53,95%CI 0.44 to 0.62)and post-traumatic stress disorder(PTSD)(SMD=0.63,95%CI 0.38 to 0.89).In contrast,the efficacy on depression(SMD=0.45,95%CI 0.39 to 0.52),addiction(SMD=0.23,95%CI 0.16 to 0.31),suicidal ideation(SMD=0.23,95%CI 0.16 to 0.30),stress(SMD=0.41,95%CI 0.33 to 0.48)and obsessive-compulsive disorder(SMD=0.47,95%CI 0.22 to 0.73)was relatively small.However,no significant effects were observed for personality disorders(SMD=0.07,95%CI-0.13 to 0.26).Our findings suggest a significant association between IBIs and improved mental health outcomes,with particular effectiveness noted in treating anxiety disorders and PTSD.However,it is noteworthy that the effectiveness of IBIs was impacted by high dropout rates during treatment.Furthermore,our results indicated that guided IBIs proved to be more effective than unguided ones,playing a positive role in reducing dropout rates and enhancing patient adherence rates. 展开更多
关键词 internet UMBRELLA CONDUCTING
下载PDF
Survey on digital twins for Internet of Vehicles:Fundamentals,challenges,and opportunities
8
作者 Jiajie Guo Muhammad Bilal +3 位作者 Yuying Qiu Cheng Qian Xiaolong Xu Kim-Kwang Raymond Choo 《Digital Communications and Networks》 SCIE CSCD 2024年第2期237-247,共11页
As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly prevalent.There hav... As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly prevalent.There have been attempts to utilize Digital Twins(DTs)to facilitate the design,evaluation,and deployment of IoV-based systems,for example by supporting high-fidelity modeling,real-time monitoring,and advanced predictive capabilities.However,the literature review undertaken in this paper suggests that integrating DTs into IoV-based system design and deployment remains an understudied topic.In addition,this paper explains how DTs can benefit IoV system designers and implementers,as well as describes several challenges and opportunities for future researchers. 展开更多
关键词 internet of vehicles Digital twin Simulation Traffic systems
下载PDF
A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles
9
作者 Feng Zhao Hongtao Ding +3 位作者 Chunhai Li Zhaoyu Su Guoling Liang Changsong Yang 《Computers, Materials & Continua》 SCIE EI 2024年第7期567-585,共19页
The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and varia... The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and variable nature of its network topology,vehicles frequently engage in cross-domain interactions.During such processes,directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers,thus compromising the security of the cross-domain authentication process.Additionally,IoV imposes high real-time requirements,and existing cross-domain authentication schemes for IoV often encounter efficiency issues.To mitigate these challenges,we propose CAIoV,a blockchain-based efficient cross-domain authentication scheme for IoV.This scheme comprehensively integrates technologies such as zero-knowledge proofs,smart contracts,and Merkle hash tree structures.It divides the cross-domain process into anonymous cross-domain authentication and safe cross-domain authentication phases to ensure efficiency while maintaining a balance between efficiency and security.Finally,we evaluate the performance of CAIoV.Experimental results demonstrate that our proposed scheme reduces computational overhead by approximately 20%,communication overhead by around 10%,and storage overhead by nearly 30%. 展开更多
关键词 Blockchain cross-domain authentication internet of vehicle zero-knowledge proof
下载PDF
Application of Patient Simulators Combined with Internet plus Scenario Simulation Teaching Models on Intravenous Infusion Nursing Education in China
10
作者 Ying Wu Yun Chen +5 位作者 Liuyan Zhang Guohua Huang Jinai He Yutong Li Yuzhen Renqing Zhijuan Zhan 《Journal of Biosciences and Medicines》 2024年第1期64-71,共8页
Objective: To explore the effectiveness of applying patient simulators combined with Internet Plus scenario simulation teaching models on intravenous (IV) infusion nursing education, and to provide scientific evidence... Objective: To explore the effectiveness of applying patient simulators combined with Internet Plus scenario simulation teaching models on intravenous (IV) infusion nursing education, and to provide scientific evidence for the implementation of advanced teaching models in future nursing education. Methods: Enrolled 60 nurses who took the IV infusion therapy training program in our hospital from January 2022 to December 2023 for research. 30 nurses who were trained in traditional teaching models from January to December 2022 were selected as the control group, and 30 nurses who were trained with simulation-based teaching models with methods including simulated patients, internet, online meetings which can be replayed and scenario simulation, etc. from January to December 2023 were selected as the experimental group. Evaluated the learning outcomes based on the Competency Inventory for Nursing Students (CINS), Problem-Solving Inventory (PSI), comprehensive learning ability, scientific research ability, and proficiency in the theoretical knowledge and practical skills of IV infusion therapy. Nursing quality, the incidence of IV infusion therapy complications and nurse satisfaction with different teaching models were also measured. Results: The scientific research ability, PSI scores, CINS scores, and comprehensive learning ability of the experimental group were better than those of the control group (P 0.05), and their assessment results of practical skills, nursing quality of IV infusion therapy during training, and satisfaction with teaching models were all better than those of the control group with statistical significance (P < 0.05). The incidence of IV infusion therapy complications in the experimental group was lower than that in the control group, indicating statistical significance (P < 0.05). Conclusions: Teaching models based on patient simulators combined with Internet Plus scenario simulation enable nursing students to learn more directly and practice at any time and in any place, and can improve their proficiency in IV infusion theoretical knowledge and skills (e.g. PICC catheterization), core competencies, problem-solving ability, comprehensive learning ability, scientific research ability and the ability to deal with complicated cases. Also, it helps provide high-quality nursing education, improve the nursing quality of IV therapy, reduce the incidence of related complications, and ensure the safety of patients with IV therapy. 展开更多
关键词 Specialty of Intravenous Infusion Therapy Nursing Education Patient Simulators internet Plus Scenario Simulation Teaching Model
下载PDF
Unmanned aerial vehicles towards future Industrial Internet:Roles and opportunities
11
作者 Linpei Li Chunlei Sun +5 位作者 Jiahao Huo Yu Su Lei Sun Yao Huang Ning Wang Haijun Zhang 《Digital Communications and Networks》 SCIE CSCD 2024年第4期873-883,共11页
Unmanned Aerial Vehicles(UAVs)are gaining increasing attention in many fields,such as military,logistics,and hazardous site mapping.Utilizing UAVs to assist communications is one of the promising applications and rese... Unmanned Aerial Vehicles(UAVs)are gaining increasing attention in many fields,such as military,logistics,and hazardous site mapping.Utilizing UAVs to assist communications is one of the promising applications and research directions.The future Industrial Internet places higher demands on communication quality.The easy deployment,dynamic mobility,and low cost of UAVs make them a viable tool for wireless communication in the Industrial Internet.Therefore,UAVs are considered as an integral part of Industry 4.0.In this article,three typical use cases of UAVs-assisted communications in Industrial Internet are first summarized.Then,the state-of-the-art technologies for drone-assisted communication in support of the Industrial Internet are presented.According to the current research,it can be assumed that UAV-assisted communication can support the future Industrial Internet to a certain extent.Finally,the potential research directions and open challenges in UAV-assisted communications in the upcoming future Industrial Internet are discussed. 展开更多
关键词 Unmanned aerial vehicles(UAVs) UAV-assisted communications Industrial internet
下载PDF
Internet in China:Yesterday and Tomorrow Exclusive interview with Li Xiaodong,Vice Chairman of Internet Society of China
12
作者 Huang Jiangqin 《China Report ASEAN》 2024年第5期39-43,共5页
On April 20,1994,the National Computing and Networking Facility of China(NCFC)project opened a 64Kbps international dedicated line to the internet through Sprint Co.,Ltd.in the United States,marking China’s first ful... On April 20,1994,the National Computing and Networking Facility of China(NCFC)project opened a 64Kbps international dedicated line to the internet through Sprint Co.,Ltd.in the United States,marking China’s first full-function connection to the internet.More than 30 years later,China boasts the world’s largest internet market with the most users of both the internet and mobile internet,the most innovative internet technology,and the most active environment for mobile application development. 展开更多
关键词 internet internet SPRINT
下载PDF
A compatible carbon efficiency information service framework based on the industrial internet identification
13
作者 Cheng Chi Yang Liu +3 位作者 Baoluo Ma Senchun Chai Puning Zhang Zihang Yin 《Digital Communications and Networks》 SCIE CSCD 2024年第4期884-894,共11页
Green and low-carbon is a new development model that seeks balance between environmental sustainability and high economic growth.If explainable and available carbon emission data can be accurately obtained,it will hel... Green and low-carbon is a new development model that seeks balance between environmental sustainability and high economic growth.If explainable and available carbon emission data can be accurately obtained,it will help policy regulators and enterprise managers to more accurately implement this development strategy.A lot of research has been carried out,but it is still a difficult problem that how to accommodate and adapt the complex carbon emission data computing models and factor libraries developed by different regions,different industries and different enterprises.Meanwhile,with the rapid development of the Industrial Internet,it has not only been used for the supply chain optimization and intelligent scheduling of the manufacturing industry,but also been used by more and more industries as an important way of digital transformation.Especially in China,the Industrial Internet identification and resolution system is becoming an important digital infrastructure to uniquely identify objects and share data.Hence,a compatible carbon efficiency information service framework based on the Industrial Internet Identification is proposed in this paper to address the problem of computing and querying multi-source heterogeneous carbon emission data.We have defined a multi cooperation carbon emission data interaction model consisting of three roles and three basic operations.Further,the implementation of the framework includes carbon emission data identification,modeling,calculation,query and sharing.The practice results show that its capability and effectiveness in improving the responsiveness,accuracy,and credibility of compatible carbon efficiency data query and sharing services. 展开更多
关键词 Industrial internet Identification and resolution Carbon emission data Carbon efficiency evaluation Carbon footprint tracking
下载PDF
An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things
14
作者 Senshan Ouyang Xiang Liu +3 位作者 Lei Liu Shangchao Wang Baichuan Shao Yang Zhao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期903-915,共13页
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smar... With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smart equipment is not trustworthy,so the issue of data authenticity needs to be addressed.The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems.Unfortunately,it still suffers from the problem of key exposure.In order to address this concern,this study first introduces a key-insulated scheme,SM2-KI-SIGN,based on the SM2 algorithm.This scheme boasts strong key insulation and secure keyupdates.Our scheme uses the elliptic curve algorithm,which is not only more efficient but also more suitable for IIoT-cloud environments.Finally,the security proof of SM2-KI-SIGN is given under the Elliptic Curve Discrete Logarithm(ECDL)assumption in the random oracle. 展开更多
关键词 KEY-INSULATED SM2 algorithm digital signature Industrial internet of Things(IIoT) provable security
下载PDF
Federated Learning on Internet of Things:Extensive and Systematic Review
15
作者 Meenakshi Aggarwal Vikas Khullar +4 位作者 Sunita Rani Thomas AndréProla Shyama Barna Bhattacharjee Sarowar Morshed Shawon Nitin Goyal 《Computers, Materials & Continua》 SCIE EI 2024年第5期1795-1834,共40页
The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and ... The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and needs to be explored in various areas to understand the key challenges for deployment in real-world scenarios.The paper systematically reviewed the available literature using the PRISMA guiding principle.The study aims to provide a detailed overview of the increasing use of FL in IoT networks,including the architecture and challenges.A systematic review approach is used to collect,categorize and analyze FL-IoT-based articles.Asearch was performed in the IEEE,Elsevier,Arxiv,ACM,and WOS databases and 92 articles were finally examined.Inclusion measures were published in English and with the keywords“FL”and“IoT”.The methodology begins with an overview of recent advances in FL and the IoT,followed by a discussion of how these two technologies can be integrated.To be more specific,we examine and evaluate the capabilities of FL by talking about communication protocols,frameworks and architecture.We then present a comprehensive analysis of the use of FL in a number of key IoT applications,including smart healthcare,smart transportation,smart cities,smart industry,smart finance,and smart agriculture.The key findings from this analysis of FL IoT services and applications are also presented.Finally,we performed a comparative analysis with FL IID(independent and identical data)and non-ID,traditional centralized deep learning(DL)approaches.We concluded that FL has better performance,especially in terms of privacy protection and resource utilization.FL is excellent for preserving privacy becausemodel training takes place on individual devices or edge nodes,eliminating the need for centralized data aggregation,which poses significant privacy risks.To facilitate development in this rapidly evolving field,the insights presented are intended to help practitioners and researchers navigate the complex terrain of FL and IoT. 展开更多
关键词 internet of Things federated learning PRISMA framework of FL applications of FL data privacy COMMUNICATION
下载PDF
Potential Benefits and Obstacles of the Use of Internet of Things in Saudi Universities: Empirical Study
16
作者 Najmah Adel Fallatah Fahad Mahmoud Ghabban +4 位作者 Omair Ameerbakhsh Ibrahim Alfadli Wael Ghazy Alheadary Salem Sulaiman Alatawi Ashwaq Hasen Al-Shehri 《Advances in Internet of Things》 2024年第1期1-20,共20页
Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of thi... Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of things (devices) that can be connected through the internet. The purpose: this paper aims to explore the concept of the Internet of Things (IoT) generally and outline the main definitions of IoT. The paper also aims to examine and discuss the obstacles and potential benefits of IoT in Saudi universities. Methodology: the researchers reviewed the previous literature and focused on several databases to use the recent studies and research related to the IoT. Then, the researchers also used quantitative methodology to examine the factors affecting the obstacles and potential benefits of IoT. The data were collected by using a questionnaire distributed online among academic staff and a total of 150 participants completed the survey. Finding: the result of this study reveals there are twelve factors that affect the potential benefits of using IoT such as reducing human errors, increasing business income and worker’s productivity. It also shows the eighteen factors which affect obstacles the IoT use, for example sensors’ cost, data privacy, and data security. These factors have the most influence on using IoT in Saudi universities. 展开更多
关键词 internet of Things (IoT) M2M Factors Obstacles Potential Benefits UNIVERSITieS
下载PDF
Multi-source heterogeneous data access management framework and key technologies for electric power Internet of Things
17
作者 Pengtian Guo Kai Xiao +1 位作者 Xiaohui Wang Daoxing Li 《Global Energy Interconnection》 EI CSCD 2024年第1期94-105,共12页
The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initiall... The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT. 展开更多
关键词 Power internet of Things Object model High concurrency access Zero trust mechanism Multi-source heterogeneous data
下载PDF
Vertical gradients of neutral winds observed by ICON and estimated by the Horizontal Wind Model during the geomagnetic storm on August 26−28,2021
18
作者 JiaWei Wu Chao Xiong +1 位作者 YuYang Huang YunLiang Zhou 《Earth and Planetary Physics》 EI CAS 2025年第1期69-80,共12页
The Michelson Interferometer for Global High-resolution Thermospheric Imaging(MIGHTI)onboard the Ionospheric Connection Explorer(ICON)satellite offers the opportunity to investigate the altitude profile of thermospher... The Michelson Interferometer for Global High-resolution Thermospheric Imaging(MIGHTI)onboard the Ionospheric Connection Explorer(ICON)satellite offers the opportunity to investigate the altitude profile of thermospheric winds.In this study,we used the red-line measurements of MIGHTI to compare with the results estimated by Horizontal Wind Model 14(HWM14).The data selected included both the geomagnetic quiet period(December 2019 to August 2022)and the geomagnetic storm on August 26-28,2021.During the geomagnetic quiet period,the estimations of neutral winds from HWM14 showed relatively good agreement with the observations from ICON.According to the ICON observations,near the equator,zonal winds reverse from westward to eastward at around 06:00 local time(LT)at higher altitudes,and the stronger westward winds appear at later LTs at lower altitudes.At around 16:00 LT,eastward winds at 300 km reverse to westward,and vertical gradients of zonal winds similar to those at sunrise hours can be observed.In the middle latitudes,zonal winds reverse about 2-4 h earlier.Meridional winds vary more significantly than zonal winds with seasonal and latitudinal variations.According to the ICON observations,in the northern low latitudes,vertical reversals of meridional winds are found at 08:00-13:00 LT from 300 to 160 km and at around 18:00 LT from 300 to 200 km during the June solstice.Similar reversals of meridional winds are found at 04:00-07:00 LT from 300 to 160 km and at 22:00-02:00 LT from 270 to 200 km during the December solstice.In the southern low latitudes,meridional wind reversals occur at 08:00-11:00 LT from 200 to 160 km and at 21:00-02:00 LT from 300 to 200 km during the June solstice.During the December solstice,reversals of the meridional wind appear at 20:00-01:00 LT below 200 km and at 06:00-11:00 LT from 300 to 160 km.In the northern middle latitudes,the northward winds are dominant at 08:00-14:00 LT at 230 km during the June solstice.Northward winds persist until 16:00 LT at 160 and 300 km.During the December solstice,the northward winds are dominant from 06:00 to 21:00 LT.The vertical variations in neutral winds during the geomagnetic storm on August 26-28 were analyzed in detail.Both meridional and zonal winds during the active geomagnetic period observed by ICON show distinguishable vertical shear structures at different stages of the storm.On the dayside,during the main phase,the peak velocities of westward winds extend from a higher altitude to a lower altitude,whereas during the recovery phase,the peak velocities of the westward winds extend from lower altitudes to higher altitudes.The velocities of the southward winds are stronger at lower altitudes during the storm.These vertical structures of horizontal winds during the storm could not be reproduced by the HWM14 wind estimations,and the overall response to the storm of the horizontal winds in the low and middle latitudes is underestimated by HWM14.The ICON observations provide a good dataset for improving the HWM wind estimations in the middle and upper atmosphere,especially the vertical variations. 展开更多
关键词 horizontal neutral winds vertical gradients Ionospheric Connection explorer satellite Horizontal Wind Model 14 geomagnetic storm
下载PDF
Application Analysis of Doctor-Nurse Cooperation Follow-up Model Based on the Internet Platform in Continuation Care of Patients after Urooncology Surgery
19
作者 Yan Guo Hanjing Zhu +3 位作者 Sijie You Yeli Cao Liya Ma Xia Yuan 《Journal of Clinical and Nursing Research》 2024年第7期310-321,共12页
Objective:To explore the application effect of a doctor-nurse cooperation follow-up model based on an Internet platform in the continuation of care for patients after uro-oncology surgery.Methods:A convenient sampling... Objective:To explore the application effect of a doctor-nurse cooperation follow-up model based on an Internet platform in the continuation of care for patients after uro-oncology surgery.Methods:A convenient sampling method was used to select patients with urinary system tumors who underwent surgery in the Department of Urology in Grade III A general hospital in Shanghai from May to August 2022.Patients who underwent surgery from May to June 2022 were assigned to the control group,and those who underwent surgery from July to August 2022 were assigned to the experimental group.The control group received routine post-discharge nursing health education and telephone follow-up.On the basis of routine discharge guidance,the experimental group implemented the intervention method based on the Internet platform in continuation care.The levels of self-management efficacy,satisfaction,and incidence of unplanned readmission were compared one month after discharge between the two groups.Results:One month after discharge,the self-management efficacy of the experimental group(90.15±7.92)was significantly higher than that of the control group(79.10±7.84),and the patient satisfaction score(97.83±2.32)was significantly higher than that of the control group(90.23±2.58),with statistical significance(P<0.05).Additionally,the incidence of unplanned readmissions within one month after discharge in the experimental group(1.59%)was slightly lower than that in the control group(4.84%).Conclusion:The doctor-nurse cooperation follow-up model based on the Internet platform in continuation care can significantly improve the self-management efficiency of patients after discharge and enhance patient satisfaction,providing a new approach for discharge follow-up of urological tumor patients after surgery. 展开更多
关键词 Urologic neoplasms internet platform Doctor-nurse cooperation Continuation care
下载PDF
Core competencies and perceived training needs of nurses in the background of Internet plus nursing service:a qualitative descriptive study
20
作者 Qiang-Hui-Zi Zhang Wei-Wei Liu Zhen-Zhen Cheng 《Frontiers of Nursing》 2024年第2期181-190,共10页
Background:The Internet plus nursing service program is being piloted in China,which has become a new home nursing service model led by nurses.To enable safe and effective homecare service delivery,nurses working in t... Background:The Internet plus nursing service program is being piloted in China,which has become a new home nursing service model led by nurses.To enable safe and effective homecare service delivery,nurses working in the program need a high level of competency.However,the content of these core competencies and the training needs of nurses for Internet plus nursing services are still unknown.Aim:To describe nurses’perceptions of core competencies and training needs to work in the Internet plus nursing service program,thereby providing a reference for the development of training programs.Methods:A qualitative descriptive study using semi-structured interviews was conducted on 15 nurses with experience of working in the Internet plus nursing service program.Interviews were audio-recorded and transcribed verbatim,and the data were analyzed using thematic analysis.Results:Core competencies involved comprehensive assessment competence,direct care practice competence,health education and consulting competence,risk estimation and response competence,and communication competence.Training needs involved complex operational items,knowledge of chronic disease management,professional communication,risk identification and response,nursing standards,norms,and procedures,and utilization of information technology.Conclusions:The training system may be developed based on nurses’core competencies and their training needs to promote professional development of the Internet plus nursing service. 展开更多
关键词 core competence internet plus nursing service NURSING qualitative study training needs
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部