Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enh...Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enhance the range of network information services accessible to humans.With the transition of terrestrial mobile communication networks from the 5G era,which provides access to information anywhere,to the 6G era,which seeks to connect everything,the construction of satellite Internet,which promises a"network reaching everywhere and service is ubiquitous",has become the consensus of the industry's development and the focus of global scientific and technological innovation.展开更多
Background:Resilience is crucial for medical college students to thrive in the highly stressful environment of medical education.However,the prevalence of problematic internet use(PIU)in this population may negatively...Background:Resilience is crucial for medical college students to thrive in the highly stressful environment of medical education.However,the prevalence of problematic internet use(PIU)in this population may negatively impact their resilience.This study investigated the influence of problematic online gaming(PG)and problematic social media use(PSMU)on the resilience of medical college students in China.Methods:A sample of 5075 first-year medical college students from four Chinese universities was studied.PG served as the independent variable,resilience as the dependent variable,fatigue as the mediator,and PSMU as the moderator.Structural equation modeling was conducted using LISREL 8.80.Additionally,a moderated mediation model was evaluated using the jAMM module in jamovi 2.6.13.Results:The study’s findings revealed significant negative correlations between resilience and the variables of PG,PSMU,and fatigue.Fatigue mediated the relationship between PG and resilience(B=−0.04,95%CI=[−0.05,−0.03]).PSMU moderated the direct relationship between PG and resilience with the interaction term PG×PSMU significant(B=−0.004,t=−6.501,p<0.001)and the first stage(PG→fatigue)of the mediation with PG×PSMU significant(B=0.055,t=8.351,p<0.001).The detrimental effects of PG on resilience were more pronounced among individuals with lower levels of PSMU.Conclusion:This study concluded that addressing PIU,particularly PG,is essential for fostering resilience in medical college students.While PSMU itself is maladaptive,the underlying social media engagement may serve a protective role through social support in mitigating the adverse effects of PG on resilience.展开更多
Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access sig...Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access significantly impacts agricultural production and improves smallholder farmers’income.Beyond these,the Internet can affect other dimensions of social welfare.However,research about the impact of Internet access on dietary quality in rural China remains scarce.This study utilizes multi-period panel data from Fixed Observation Point in rural China from 2009 to 2015 to estimate the impact of Internet access on dietary quality and food consumption of rural households and conducts a causal analysis.Regression models with time and household fixed effects allow robust estimation while reducing potential issues of unobserved heterogeneity.The estimates show that Internet access has significantly increased rural household dietary quality(measured by the Chinese Diet Balance Index).Further research finds that Internet access has increased the consumption of animal products,such as aquatic and dairy products.We also examine the underlying mechanisms.Internet access improves dietary quality and food consumption mainly through increasing household income and food expenditure.These results encourage the promotion of Internet access as a valuable tool for nutritional improvements,especially in rural areas.展开更多
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accide...The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks.展开更多
Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enh...Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enhance the range of network information services accessible to humans.With the transition of terrestrial mobile communication networks from the 5G era,which provides access to information anywhere,to the 6G era,which seeks to connect everything,the construction of satellite Internet,which promises a"network reaching everywhere and service is ubiquitous",has become the consensus of the industry's development and the focus of global scientific and technological innovation.展开更多
The Internet of Things(IoT)connects objects to Internet through sensor devices,radio frequency identification devices and other information collection and processing devices to realize information interaction.IoT is w...The Internet of Things(IoT)connects objects to Internet through sensor devices,radio frequency identification devices and other information collection and processing devices to realize information interaction.IoT is widely used in many fields,including intelligent transportation,intelligent healthcare,intelligent home and industry.In these fields,IoT devices connected via high-speed internet for efficient and reliable communications and faster response times.展开更多
Internet-based interventions(IBIs)for behavioural health have been prevalent for over two decades,and a growing proportion of individuals with mental health concerns prefer these emerging digital alternatives.However,...Internet-based interventions(IBIs)for behavioural health have been prevalent for over two decades,and a growing proportion of individuals with mental health concerns prefer these emerging digital alternatives.However,the effectiveness and acceptability of IBIs for various mental health disorders continue to be subject to scholarly debate.We performed an umbrella review of meta-analyses(MAs),conducting literature searches in PubMed,Web of Science,Embase,Cochrane and Ovid Medline from their inception to 17 January 2023.A total of 87MAs,reporting on 1683 randomised controlled trials and 295589 patients,were included.The results indicated that IBIs had a moderate effect on anxiety disorder(standardised mean difference(SMD)=0.53,95%CI 0.44 to 0.62)and post-traumatic stress disorder(PTSD)(SMD=0.63,95%CI 0.38 to 0.89).In contrast,the efficacy on depression(SMD=0.45,95%CI 0.39 to 0.52),addiction(SMD=0.23,95%CI 0.16 to 0.31),suicidal ideation(SMD=0.23,95%CI 0.16 to 0.30),stress(SMD=0.41,95%CI 0.33 to 0.48)and obsessive-compulsive disorder(SMD=0.47,95%CI 0.22 to 0.73)was relatively small.However,no significant effects were observed for personality disorders(SMD=0.07,95%CI-0.13 to 0.26).Our findings suggest a significant association between IBIs and improved mental health outcomes,with particular effectiveness noted in treating anxiety disorders and PTSD.However,it is noteworthy that the effectiveness of IBIs was impacted by high dropout rates during treatment.Furthermore,our results indicated that guided IBIs proved to be more effective than unguided ones,playing a positive role in reducing dropout rates and enhancing patient adherence rates.展开更多
As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly prevalent.There hav...As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly prevalent.There have been attempts to utilize Digital Twins(DTs)to facilitate the design,evaluation,and deployment of IoV-based systems,for example by supporting high-fidelity modeling,real-time monitoring,and advanced predictive capabilities.However,the literature review undertaken in this paper suggests that integrating DTs into IoV-based system design and deployment remains an understudied topic.In addition,this paper explains how DTs can benefit IoV system designers and implementers,as well as describes several challenges and opportunities for future researchers.展开更多
The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and varia...The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and variable nature of its network topology,vehicles frequently engage in cross-domain interactions.During such processes,directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers,thus compromising the security of the cross-domain authentication process.Additionally,IoV imposes high real-time requirements,and existing cross-domain authentication schemes for IoV often encounter efficiency issues.To mitigate these challenges,we propose CAIoV,a blockchain-based efficient cross-domain authentication scheme for IoV.This scheme comprehensively integrates technologies such as zero-knowledge proofs,smart contracts,and Merkle hash tree structures.It divides the cross-domain process into anonymous cross-domain authentication and safe cross-domain authentication phases to ensure efficiency while maintaining a balance between efficiency and security.Finally,we evaluate the performance of CAIoV.Experimental results demonstrate that our proposed scheme reduces computational overhead by approximately 20%,communication overhead by around 10%,and storage overhead by nearly 30%.展开更多
Objective: To explore the effectiveness of applying patient simulators combined with Internet Plus scenario simulation teaching models on intravenous (IV) infusion nursing education, and to provide scientific evidence...Objective: To explore the effectiveness of applying patient simulators combined with Internet Plus scenario simulation teaching models on intravenous (IV) infusion nursing education, and to provide scientific evidence for the implementation of advanced teaching models in future nursing education. Methods: Enrolled 60 nurses who took the IV infusion therapy training program in our hospital from January 2022 to December 2023 for research. 30 nurses who were trained in traditional teaching models from January to December 2022 were selected as the control group, and 30 nurses who were trained with simulation-based teaching models with methods including simulated patients, internet, online meetings which can be replayed and scenario simulation, etc. from January to December 2023 were selected as the experimental group. Evaluated the learning outcomes based on the Competency Inventory for Nursing Students (CINS), Problem-Solving Inventory (PSI), comprehensive learning ability, scientific research ability, and proficiency in the theoretical knowledge and practical skills of IV infusion therapy. Nursing quality, the incidence of IV infusion therapy complications and nurse satisfaction with different teaching models were also measured. Results: The scientific research ability, PSI scores, CINS scores, and comprehensive learning ability of the experimental group were better than those of the control group (P 0.05), and their assessment results of practical skills, nursing quality of IV infusion therapy during training, and satisfaction with teaching models were all better than those of the control group with statistical significance (P < 0.05). The incidence of IV infusion therapy complications in the experimental group was lower than that in the control group, indicating statistical significance (P < 0.05). Conclusions: Teaching models based on patient simulators combined with Internet Plus scenario simulation enable nursing students to learn more directly and practice at any time and in any place, and can improve their proficiency in IV infusion theoretical knowledge and skills (e.g. PICC catheterization), core competencies, problem-solving ability, comprehensive learning ability, scientific research ability and the ability to deal with complicated cases. Also, it helps provide high-quality nursing education, improve the nursing quality of IV therapy, reduce the incidence of related complications, and ensure the safety of patients with IV therapy.展开更多
Unmanned Aerial Vehicles(UAVs)are gaining increasing attention in many fields,such as military,logistics,and hazardous site mapping.Utilizing UAVs to assist communications is one of the promising applications and rese...Unmanned Aerial Vehicles(UAVs)are gaining increasing attention in many fields,such as military,logistics,and hazardous site mapping.Utilizing UAVs to assist communications is one of the promising applications and research directions.The future Industrial Internet places higher demands on communication quality.The easy deployment,dynamic mobility,and low cost of UAVs make them a viable tool for wireless communication in the Industrial Internet.Therefore,UAVs are considered as an integral part of Industry 4.0.In this article,three typical use cases of UAVs-assisted communications in Industrial Internet are first summarized.Then,the state-of-the-art technologies for drone-assisted communication in support of the Industrial Internet are presented.According to the current research,it can be assumed that UAV-assisted communication can support the future Industrial Internet to a certain extent.Finally,the potential research directions and open challenges in UAV-assisted communications in the upcoming future Industrial Internet are discussed.展开更多
On April 20,1994,the National Computing and Networking Facility of China(NCFC)project opened a 64Kbps international dedicated line to the internet through Sprint Co.,Ltd.in the United States,marking China’s first ful...On April 20,1994,the National Computing and Networking Facility of China(NCFC)project opened a 64Kbps international dedicated line to the internet through Sprint Co.,Ltd.in the United States,marking China’s first full-function connection to the internet.More than 30 years later,China boasts the world’s largest internet market with the most users of both the internet and mobile internet,the most innovative internet technology,and the most active environment for mobile application development.展开更多
Green and low-carbon is a new development model that seeks balance between environmental sustainability and high economic growth.If explainable and available carbon emission data can be accurately obtained,it will hel...Green and low-carbon is a new development model that seeks balance between environmental sustainability and high economic growth.If explainable and available carbon emission data can be accurately obtained,it will help policy regulators and enterprise managers to more accurately implement this development strategy.A lot of research has been carried out,but it is still a difficult problem that how to accommodate and adapt the complex carbon emission data computing models and factor libraries developed by different regions,different industries and different enterprises.Meanwhile,with the rapid development of the Industrial Internet,it has not only been used for the supply chain optimization and intelligent scheduling of the manufacturing industry,but also been used by more and more industries as an important way of digital transformation.Especially in China,the Industrial Internet identification and resolution system is becoming an important digital infrastructure to uniquely identify objects and share data.Hence,a compatible carbon efficiency information service framework based on the Industrial Internet Identification is proposed in this paper to address the problem of computing and querying multi-source heterogeneous carbon emission data.We have defined a multi cooperation carbon emission data interaction model consisting of three roles and three basic operations.Further,the implementation of the framework includes carbon emission data identification,modeling,calculation,query and sharing.The practice results show that its capability and effectiveness in improving the responsiveness,accuracy,and credibility of compatible carbon efficiency data query and sharing services.展开更多
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smar...With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smart equipment is not trustworthy,so the issue of data authenticity needs to be addressed.The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems.Unfortunately,it still suffers from the problem of key exposure.In order to address this concern,this study first introduces a key-insulated scheme,SM2-KI-SIGN,based on the SM2 algorithm.This scheme boasts strong key insulation and secure keyupdates.Our scheme uses the elliptic curve algorithm,which is not only more efficient but also more suitable for IIoT-cloud environments.Finally,the security proof of SM2-KI-SIGN is given under the Elliptic Curve Discrete Logarithm(ECDL)assumption in the random oracle.展开更多
The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and ...The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and needs to be explored in various areas to understand the key challenges for deployment in real-world scenarios.The paper systematically reviewed the available literature using the PRISMA guiding principle.The study aims to provide a detailed overview of the increasing use of FL in IoT networks,including the architecture and challenges.A systematic review approach is used to collect,categorize and analyze FL-IoT-based articles.Asearch was performed in the IEEE,Elsevier,Arxiv,ACM,and WOS databases and 92 articles were finally examined.Inclusion measures were published in English and with the keywords“FL”and“IoT”.The methodology begins with an overview of recent advances in FL and the IoT,followed by a discussion of how these two technologies can be integrated.To be more specific,we examine and evaluate the capabilities of FL by talking about communication protocols,frameworks and architecture.We then present a comprehensive analysis of the use of FL in a number of key IoT applications,including smart healthcare,smart transportation,smart cities,smart industry,smart finance,and smart agriculture.The key findings from this analysis of FL IoT services and applications are also presented.Finally,we performed a comparative analysis with FL IID(independent and identical data)and non-ID,traditional centralized deep learning(DL)approaches.We concluded that FL has better performance,especially in terms of privacy protection and resource utilization.FL is excellent for preserving privacy becausemodel training takes place on individual devices or edge nodes,eliminating the need for centralized data aggregation,which poses significant privacy risks.To facilitate development in this rapidly evolving field,the insights presented are intended to help practitioners and researchers navigate the complex terrain of FL and IoT.展开更多
Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of thi...Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of things (devices) that can be connected through the internet. The purpose: this paper aims to explore the concept of the Internet of Things (IoT) generally and outline the main definitions of IoT. The paper also aims to examine and discuss the obstacles and potential benefits of IoT in Saudi universities. Methodology: the researchers reviewed the previous literature and focused on several databases to use the recent studies and research related to the IoT. Then, the researchers also used quantitative methodology to examine the factors affecting the obstacles and potential benefits of IoT. The data were collected by using a questionnaire distributed online among academic staff and a total of 150 participants completed the survey. Finding: the result of this study reveals there are twelve factors that affect the potential benefits of using IoT such as reducing human errors, increasing business income and worker’s productivity. It also shows the eighteen factors which affect obstacles the IoT use, for example sensors’ cost, data privacy, and data security. These factors have the most influence on using IoT in Saudi universities.展开更多
The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initiall...The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT.展开更多
The Michelson Interferometer for Global High-resolution Thermospheric Imaging(MIGHTI)onboard the Ionospheric Connection Explorer(ICON)satellite offers the opportunity to investigate the altitude profile of thermospher...The Michelson Interferometer for Global High-resolution Thermospheric Imaging(MIGHTI)onboard the Ionospheric Connection Explorer(ICON)satellite offers the opportunity to investigate the altitude profile of thermospheric winds.In this study,we used the red-line measurements of MIGHTI to compare with the results estimated by Horizontal Wind Model 14(HWM14).The data selected included both the geomagnetic quiet period(December 2019 to August 2022)and the geomagnetic storm on August 26-28,2021.During the geomagnetic quiet period,the estimations of neutral winds from HWM14 showed relatively good agreement with the observations from ICON.According to the ICON observations,near the equator,zonal winds reverse from westward to eastward at around 06:00 local time(LT)at higher altitudes,and the stronger westward winds appear at later LTs at lower altitudes.At around 16:00 LT,eastward winds at 300 km reverse to westward,and vertical gradients of zonal winds similar to those at sunrise hours can be observed.In the middle latitudes,zonal winds reverse about 2-4 h earlier.Meridional winds vary more significantly than zonal winds with seasonal and latitudinal variations.According to the ICON observations,in the northern low latitudes,vertical reversals of meridional winds are found at 08:00-13:00 LT from 300 to 160 km and at around 18:00 LT from 300 to 200 km during the June solstice.Similar reversals of meridional winds are found at 04:00-07:00 LT from 300 to 160 km and at 22:00-02:00 LT from 270 to 200 km during the December solstice.In the southern low latitudes,meridional wind reversals occur at 08:00-11:00 LT from 200 to 160 km and at 21:00-02:00 LT from 300 to 200 km during the June solstice.During the December solstice,reversals of the meridional wind appear at 20:00-01:00 LT below 200 km and at 06:00-11:00 LT from 300 to 160 km.In the northern middle latitudes,the northward winds are dominant at 08:00-14:00 LT at 230 km during the June solstice.Northward winds persist until 16:00 LT at 160 and 300 km.During the December solstice,the northward winds are dominant from 06:00 to 21:00 LT.The vertical variations in neutral winds during the geomagnetic storm on August 26-28 were analyzed in detail.Both meridional and zonal winds during the active geomagnetic period observed by ICON show distinguishable vertical shear structures at different stages of the storm.On the dayside,during the main phase,the peak velocities of westward winds extend from a higher altitude to a lower altitude,whereas during the recovery phase,the peak velocities of the westward winds extend from lower altitudes to higher altitudes.The velocities of the southward winds are stronger at lower altitudes during the storm.These vertical structures of horizontal winds during the storm could not be reproduced by the HWM14 wind estimations,and the overall response to the storm of the horizontal winds in the low and middle latitudes is underestimated by HWM14.The ICON observations provide a good dataset for improving the HWM wind estimations in the middle and upper atmosphere,especially the vertical variations.展开更多
Objective:To explore the application effect of a doctor-nurse cooperation follow-up model based on an Internet platform in the continuation of care for patients after uro-oncology surgery.Methods:A convenient sampling...Objective:To explore the application effect of a doctor-nurse cooperation follow-up model based on an Internet platform in the continuation of care for patients after uro-oncology surgery.Methods:A convenient sampling method was used to select patients with urinary system tumors who underwent surgery in the Department of Urology in Grade III A general hospital in Shanghai from May to August 2022.Patients who underwent surgery from May to June 2022 were assigned to the control group,and those who underwent surgery from July to August 2022 were assigned to the experimental group.The control group received routine post-discharge nursing health education and telephone follow-up.On the basis of routine discharge guidance,the experimental group implemented the intervention method based on the Internet platform in continuation care.The levels of self-management efficacy,satisfaction,and incidence of unplanned readmission were compared one month after discharge between the two groups.Results:One month after discharge,the self-management efficacy of the experimental group(90.15±7.92)was significantly higher than that of the control group(79.10±7.84),and the patient satisfaction score(97.83±2.32)was significantly higher than that of the control group(90.23±2.58),with statistical significance(P<0.05).Additionally,the incidence of unplanned readmissions within one month after discharge in the experimental group(1.59%)was slightly lower than that in the control group(4.84%).Conclusion:The doctor-nurse cooperation follow-up model based on the Internet platform in continuation care can significantly improve the self-management efficiency of patients after discharge and enhance patient satisfaction,providing a new approach for discharge follow-up of urological tumor patients after surgery.展开更多
Background:The Internet plus nursing service program is being piloted in China,which has become a new home nursing service model led by nurses.To enable safe and effective homecare service delivery,nurses working in t...Background:The Internet plus nursing service program is being piloted in China,which has become a new home nursing service model led by nurses.To enable safe and effective homecare service delivery,nurses working in the program need a high level of competency.However,the content of these core competencies and the training needs of nurses for Internet plus nursing services are still unknown.Aim:To describe nurses’perceptions of core competencies and training needs to work in the Internet plus nursing service program,thereby providing a reference for the development of training programs.Methods:A qualitative descriptive study using semi-structured interviews was conducted on 15 nurses with experience of working in the Internet plus nursing service program.Interviews were audio-recorded and transcribed verbatim,and the data were analyzed using thematic analysis.Results:Core competencies involved comprehensive assessment competence,direct care practice competence,health education and consulting competence,risk estimation and response competence,and communication competence.Training needs involved complex operational items,knowledge of chronic disease management,professional communication,risk identification and response,nursing standards,norms,and procedures,and utilization of information technology.Conclusions:The training system may be developed based on nurses’core competencies and their training needs to promote professional development of the Internet plus nursing service.展开更多
文摘Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enhance the range of network information services accessible to humans.With the transition of terrestrial mobile communication networks from the 5G era,which provides access to information anywhere,to the 6G era,which seeks to connect everything,the construction of satellite Internet,which promises a"network reaching everywhere and service is ubiquitous",has become the consensus of the industry's development and the focus of global scientific and technological innovation.
基金supported by General Education Project of the National Social Science Foundation in 2020:“Multi-Dimensional Reconstruction of Peer Review Mechanisms in the Evaluation of Scientific and Technological Talents in Universities(BIA200167).”。
文摘Background:Resilience is crucial for medical college students to thrive in the highly stressful environment of medical education.However,the prevalence of problematic internet use(PIU)in this population may negatively impact their resilience.This study investigated the influence of problematic online gaming(PG)and problematic social media use(PSMU)on the resilience of medical college students in China.Methods:A sample of 5075 first-year medical college students from four Chinese universities was studied.PG served as the independent variable,resilience as the dependent variable,fatigue as the mediator,and PSMU as the moderator.Structural equation modeling was conducted using LISREL 8.80.Additionally,a moderated mediation model was evaluated using the jAMM module in jamovi 2.6.13.Results:The study’s findings revealed significant negative correlations between resilience and the variables of PG,PSMU,and fatigue.Fatigue mediated the relationship between PG and resilience(B=−0.04,95%CI=[−0.05,−0.03]).PSMU moderated the direct relationship between PG and resilience with the interaction term PG×PSMU significant(B=−0.004,t=−6.501,p<0.001)and the first stage(PG→fatigue)of the mediation with PG×PSMU significant(B=0.055,t=8.351,p<0.001).The detrimental effects of PG on resilience were more pronounced among individuals with lower levels of PSMU.Conclusion:This study concluded that addressing PIU,particularly PG,is essential for fostering resilience in medical college students.While PSMU itself is maladaptive,the underlying social media engagement may serve a protective role through social support in mitigating the adverse effects of PG on resilience.
基金This study was supported in part by the National Natural Science Foundation of China(71973136 and 72061147002)the 2115 Talent Development Program of China Agricultural University.
文摘Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access significantly impacts agricultural production and improves smallholder farmers’income.Beyond these,the Internet can affect other dimensions of social welfare.However,research about the impact of Internet access on dietary quality in rural China remains scarce.This study utilizes multi-period panel data from Fixed Observation Point in rural China from 2009 to 2015 to estimate the impact of Internet access on dietary quality and food consumption of rural households and conducts a causal analysis.Regression models with time and household fixed effects allow robust estimation while reducing potential issues of unobserved heterogeneity.The estimates show that Internet access has significantly increased rural household dietary quality(measured by the Chinese Diet Balance Index).Further research finds that Internet access has increased the consumption of animal products,such as aquatic and dairy products.We also examine the underlying mechanisms.Internet access improves dietary quality and food consumption mainly through increasing household income and food expenditure.These results encourage the promotion of Internet access as a valuable tool for nutritional improvements,especially in rural areas.
基金This paper is financed by the European Union-NextGenerationEU,through the National Recovery and Resilience Plan of the Republic of Bulgaria,Project No.BG-RRP-2.004-0001-C01.
文摘The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks.
文摘Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enhance the range of network information services accessible to humans.With the transition of terrestrial mobile communication networks from the 5G era,which provides access to information anywhere,to the 6G era,which seeks to connect everything,the construction of satellite Internet,which promises a"network reaching everywhere and service is ubiquitous",has become the consensus of the industry's development and the focus of global scientific and technological innovation.
文摘The Internet of Things(IoT)connects objects to Internet through sensor devices,radio frequency identification devices and other information collection and processing devices to realize information interaction.IoT is widely used in many fields,including intelligent transportation,intelligent healthcare,intelligent home and industry.In these fields,IoT devices connected via high-speed internet for efficient and reliable communications and faster response times.
基金supported by Anhui Province University Scientific Research Projects(2023AH040086)Key Laboratory of Philosophy and Social Science of Anhui Province on Adolescent Mental Health and Crisis Intelligence Intervention(SYS2023B08).
文摘Internet-based interventions(IBIs)for behavioural health have been prevalent for over two decades,and a growing proportion of individuals with mental health concerns prefer these emerging digital alternatives.However,the effectiveness and acceptability of IBIs for various mental health disorders continue to be subject to scholarly debate.We performed an umbrella review of meta-analyses(MAs),conducting literature searches in PubMed,Web of Science,Embase,Cochrane and Ovid Medline from their inception to 17 January 2023.A total of 87MAs,reporting on 1683 randomised controlled trials and 295589 patients,were included.The results indicated that IBIs had a moderate effect on anxiety disorder(standardised mean difference(SMD)=0.53,95%CI 0.44 to 0.62)and post-traumatic stress disorder(PTSD)(SMD=0.63,95%CI 0.38 to 0.89).In contrast,the efficacy on depression(SMD=0.45,95%CI 0.39 to 0.52),addiction(SMD=0.23,95%CI 0.16 to 0.31),suicidal ideation(SMD=0.23,95%CI 0.16 to 0.30),stress(SMD=0.41,95%CI 0.33 to 0.48)and obsessive-compulsive disorder(SMD=0.47,95%CI 0.22 to 0.73)was relatively small.However,no significant effects were observed for personality disorders(SMD=0.07,95%CI-0.13 to 0.26).Our findings suggest a significant association between IBIs and improved mental health outcomes,with particular effectiveness noted in treating anxiety disorders and PTSD.However,it is noteworthy that the effectiveness of IBIs was impacted by high dropout rates during treatment.Furthermore,our results indicated that guided IBIs proved to be more effective than unguided ones,playing a positive role in reducing dropout rates and enhancing patient adherence rates.
基金supported by the Natural Science Foundation of Jiangsu Province of China under grant no.BK20211284the Financial and Science Technology Plan Project of Xinjiang Production and Construction Corps under grant no.2020DB005.
文摘As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly prevalent.There have been attempts to utilize Digital Twins(DTs)to facilitate the design,evaluation,and deployment of IoV-based systems,for example by supporting high-fidelity modeling,real-time monitoring,and advanced predictive capabilities.However,the literature review undertaken in this paper suggests that integrating DTs into IoV-based system design and deployment remains an understudied topic.In addition,this paper explains how DTs can benefit IoV system designers and implementers,as well as describes several challenges and opportunities for future researchers.
基金supported by the National Natural Science Foundation of China(62362013)the Guangxi Natural Science Foundation(2023GXNSFAA026294).
文摘The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and variable nature of its network topology,vehicles frequently engage in cross-domain interactions.During such processes,directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers,thus compromising the security of the cross-domain authentication process.Additionally,IoV imposes high real-time requirements,and existing cross-domain authentication schemes for IoV often encounter efficiency issues.To mitigate these challenges,we propose CAIoV,a blockchain-based efficient cross-domain authentication scheme for IoV.This scheme comprehensively integrates technologies such as zero-knowledge proofs,smart contracts,and Merkle hash tree structures.It divides the cross-domain process into anonymous cross-domain authentication and safe cross-domain authentication phases to ensure efficiency while maintaining a balance between efficiency and security.Finally,we evaluate the performance of CAIoV.Experimental results demonstrate that our proposed scheme reduces computational overhead by approximately 20%,communication overhead by around 10%,and storage overhead by nearly 30%.
文摘Objective: To explore the effectiveness of applying patient simulators combined with Internet Plus scenario simulation teaching models on intravenous (IV) infusion nursing education, and to provide scientific evidence for the implementation of advanced teaching models in future nursing education. Methods: Enrolled 60 nurses who took the IV infusion therapy training program in our hospital from January 2022 to December 2023 for research. 30 nurses who were trained in traditional teaching models from January to December 2022 were selected as the control group, and 30 nurses who were trained with simulation-based teaching models with methods including simulated patients, internet, online meetings which can be replayed and scenario simulation, etc. from January to December 2023 were selected as the experimental group. Evaluated the learning outcomes based on the Competency Inventory for Nursing Students (CINS), Problem-Solving Inventory (PSI), comprehensive learning ability, scientific research ability, and proficiency in the theoretical knowledge and practical skills of IV infusion therapy. Nursing quality, the incidence of IV infusion therapy complications and nurse satisfaction with different teaching models were also measured. Results: The scientific research ability, PSI scores, CINS scores, and comprehensive learning ability of the experimental group were better than those of the control group (P 0.05), and their assessment results of practical skills, nursing quality of IV infusion therapy during training, and satisfaction with teaching models were all better than those of the control group with statistical significance (P < 0.05). The incidence of IV infusion therapy complications in the experimental group was lower than that in the control group, indicating statistical significance (P < 0.05). Conclusions: Teaching models based on patient simulators combined with Internet Plus scenario simulation enable nursing students to learn more directly and practice at any time and in any place, and can improve their proficiency in IV infusion theoretical knowledge and skills (e.g. PICC catheterization), core competencies, problem-solving ability, comprehensive learning ability, scientific research ability and the ability to deal with complicated cases. Also, it helps provide high-quality nursing education, improve the nursing quality of IV therapy, reduce the incidence of related complications, and ensure the safety of patients with IV therapy.
基金supported in part by National Key Research&Devel-opment Program of China(2021YFB2900801)in part by Guangdong Basic and Applied Basic Research Foundation(2022A1515110335)in party by Fundamental Research Funds for the Central Universities(FRF-TP-22-094A1).
文摘Unmanned Aerial Vehicles(UAVs)are gaining increasing attention in many fields,such as military,logistics,and hazardous site mapping.Utilizing UAVs to assist communications is one of the promising applications and research directions.The future Industrial Internet places higher demands on communication quality.The easy deployment,dynamic mobility,and low cost of UAVs make them a viable tool for wireless communication in the Industrial Internet.Therefore,UAVs are considered as an integral part of Industry 4.0.In this article,three typical use cases of UAVs-assisted communications in Industrial Internet are first summarized.Then,the state-of-the-art technologies for drone-assisted communication in support of the Industrial Internet are presented.According to the current research,it can be assumed that UAV-assisted communication can support the future Industrial Internet to a certain extent.Finally,the potential research directions and open challenges in UAV-assisted communications in the upcoming future Industrial Internet are discussed.
文摘On April 20,1994,the National Computing and Networking Facility of China(NCFC)project opened a 64Kbps international dedicated line to the internet through Sprint Co.,Ltd.in the United States,marking China’s first full-function connection to the internet.More than 30 years later,China boasts the world’s largest internet market with the most users of both the internet and mobile internet,the most innovative internet technology,and the most active environment for mobile application development.
基金supported by the 2018 Industrial Internet Innovation and Development Project——Industrial Internet Identification Resolution Sys⁃tem:National Top-Level Node Construction Project(Phase I).
文摘Green and low-carbon is a new development model that seeks balance between environmental sustainability and high economic growth.If explainable and available carbon emission data can be accurately obtained,it will help policy regulators and enterprise managers to more accurately implement this development strategy.A lot of research has been carried out,but it is still a difficult problem that how to accommodate and adapt the complex carbon emission data computing models and factor libraries developed by different regions,different industries and different enterprises.Meanwhile,with the rapid development of the Industrial Internet,it has not only been used for the supply chain optimization and intelligent scheduling of the manufacturing industry,but also been used by more and more industries as an important way of digital transformation.Especially in China,the Industrial Internet identification and resolution system is becoming an important digital infrastructure to uniquely identify objects and share data.Hence,a compatible carbon efficiency information service framework based on the Industrial Internet Identification is proposed in this paper to address the problem of computing and querying multi-source heterogeneous carbon emission data.We have defined a multi cooperation carbon emission data interaction model consisting of three roles and three basic operations.Further,the implementation of the framework includes carbon emission data identification,modeling,calculation,query and sharing.The practice results show that its capability and effectiveness in improving the responsiveness,accuracy,and credibility of compatible carbon efficiency data query and sharing services.
基金This work was supported in part by the National Natural Science Foundation of China(Nos.62072074,62076054,62027827,62002047)the Sichuan Science and Technology Innovation Platform and Talent Plan(Nos.2020JDJQ0020,2022JDJQ0039)+2 种基金the Sichuan Science and Technology Support Plan(Nos.2020YFSY0010,2022YFQ0045,2022YFS0220,2023YFG0148,2021YFG0131)the YIBIN Science and Technology Support Plan(No.2021CG003)the Medico-Engineering Cooperation Funds from University of Electronic Science and Technology of China(Nos.ZYGX2021YGLH212,ZYGX2022YGRH012).
文摘With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smart equipment is not trustworthy,so the issue of data authenticity needs to be addressed.The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems.Unfortunately,it still suffers from the problem of key exposure.In order to address this concern,this study first introduces a key-insulated scheme,SM2-KI-SIGN,based on the SM2 algorithm.This scheme boasts strong key insulation and secure keyupdates.Our scheme uses the elliptic curve algorithm,which is not only more efficient but also more suitable for IIoT-cloud environments.Finally,the security proof of SM2-KI-SIGN is given under the Elliptic Curve Discrete Logarithm(ECDL)assumption in the random oracle.
文摘The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and needs to be explored in various areas to understand the key challenges for deployment in real-world scenarios.The paper systematically reviewed the available literature using the PRISMA guiding principle.The study aims to provide a detailed overview of the increasing use of FL in IoT networks,including the architecture and challenges.A systematic review approach is used to collect,categorize and analyze FL-IoT-based articles.Asearch was performed in the IEEE,Elsevier,Arxiv,ACM,and WOS databases and 92 articles were finally examined.Inclusion measures were published in English and with the keywords“FL”and“IoT”.The methodology begins with an overview of recent advances in FL and the IoT,followed by a discussion of how these two technologies can be integrated.To be more specific,we examine and evaluate the capabilities of FL by talking about communication protocols,frameworks and architecture.We then present a comprehensive analysis of the use of FL in a number of key IoT applications,including smart healthcare,smart transportation,smart cities,smart industry,smart finance,and smart agriculture.The key findings from this analysis of FL IoT services and applications are also presented.Finally,we performed a comparative analysis with FL IID(independent and identical data)and non-ID,traditional centralized deep learning(DL)approaches.We concluded that FL has better performance,especially in terms of privacy protection and resource utilization.FL is excellent for preserving privacy becausemodel training takes place on individual devices or edge nodes,eliminating the need for centralized data aggregation,which poses significant privacy risks.To facilitate development in this rapidly evolving field,the insights presented are intended to help practitioners and researchers navigate the complex terrain of FL and IoT.
文摘Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of things (devices) that can be connected through the internet. The purpose: this paper aims to explore the concept of the Internet of Things (IoT) generally and outline the main definitions of IoT. The paper also aims to examine and discuss the obstacles and potential benefits of IoT in Saudi universities. Methodology: the researchers reviewed the previous literature and focused on several databases to use the recent studies and research related to the IoT. Then, the researchers also used quantitative methodology to examine the factors affecting the obstacles and potential benefits of IoT. The data were collected by using a questionnaire distributed online among academic staff and a total of 150 participants completed the survey. Finding: the result of this study reveals there are twelve factors that affect the potential benefits of using IoT such as reducing human errors, increasing business income and worker’s productivity. It also shows the eighteen factors which affect obstacles the IoT use, for example sensors’ cost, data privacy, and data security. These factors have the most influence on using IoT in Saudi universities.
基金supported by the National Key Research and Development Program of China(grant number 2019YFE0123600)。
文摘The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT.
基金supported by the National Key R&D Program of China (Grant No.2022YFF0503700)the special funds of Hubei Luojia Laboratory (Grant No.220100011)+1 种基金supported by the International Space Science Institute–Beijing(ISSI-BJ) project“The Electromagnetic Data Validation and Scientific Application Research based on CSES Satellite”and ISSI/ISSI-BJ project,“Multi-Scale Magnetosphere–Ionosphere–Thermosphere Interaction.”
文摘The Michelson Interferometer for Global High-resolution Thermospheric Imaging(MIGHTI)onboard the Ionospheric Connection Explorer(ICON)satellite offers the opportunity to investigate the altitude profile of thermospheric winds.In this study,we used the red-line measurements of MIGHTI to compare with the results estimated by Horizontal Wind Model 14(HWM14).The data selected included both the geomagnetic quiet period(December 2019 to August 2022)and the geomagnetic storm on August 26-28,2021.During the geomagnetic quiet period,the estimations of neutral winds from HWM14 showed relatively good agreement with the observations from ICON.According to the ICON observations,near the equator,zonal winds reverse from westward to eastward at around 06:00 local time(LT)at higher altitudes,and the stronger westward winds appear at later LTs at lower altitudes.At around 16:00 LT,eastward winds at 300 km reverse to westward,and vertical gradients of zonal winds similar to those at sunrise hours can be observed.In the middle latitudes,zonal winds reverse about 2-4 h earlier.Meridional winds vary more significantly than zonal winds with seasonal and latitudinal variations.According to the ICON observations,in the northern low latitudes,vertical reversals of meridional winds are found at 08:00-13:00 LT from 300 to 160 km and at around 18:00 LT from 300 to 200 km during the June solstice.Similar reversals of meridional winds are found at 04:00-07:00 LT from 300 to 160 km and at 22:00-02:00 LT from 270 to 200 km during the December solstice.In the southern low latitudes,meridional wind reversals occur at 08:00-11:00 LT from 200 to 160 km and at 21:00-02:00 LT from 300 to 200 km during the June solstice.During the December solstice,reversals of the meridional wind appear at 20:00-01:00 LT below 200 km and at 06:00-11:00 LT from 300 to 160 km.In the northern middle latitudes,the northward winds are dominant at 08:00-14:00 LT at 230 km during the June solstice.Northward winds persist until 16:00 LT at 160 and 300 km.During the December solstice,the northward winds are dominant from 06:00 to 21:00 LT.The vertical variations in neutral winds during the geomagnetic storm on August 26-28 were analyzed in detail.Both meridional and zonal winds during the active geomagnetic period observed by ICON show distinguishable vertical shear structures at different stages of the storm.On the dayside,during the main phase,the peak velocities of westward winds extend from a higher altitude to a lower altitude,whereas during the recovery phase,the peak velocities of the westward winds extend from lower altitudes to higher altitudes.The velocities of the southward winds are stronger at lower altitudes during the storm.These vertical structures of horizontal winds during the storm could not be reproduced by the HWM14 wind estimations,and the overall response to the storm of the horizontal winds in the low and middle latitudes is underestimated by HWM14.The ICON observations provide a good dataset for improving the HWM wind estimations in the middle and upper atmosphere,especially the vertical variations.
基金The Project of China Hospital Development Research Institute,Shanghai Jiao Tong University(No.CHDI-2022-B-11)Shanghai Jiao Tong University School of Medicine:Nursing Development Program。
文摘Objective:To explore the application effect of a doctor-nurse cooperation follow-up model based on an Internet platform in the continuation of care for patients after uro-oncology surgery.Methods:A convenient sampling method was used to select patients with urinary system tumors who underwent surgery in the Department of Urology in Grade III A general hospital in Shanghai from May to August 2022.Patients who underwent surgery from May to June 2022 were assigned to the control group,and those who underwent surgery from July to August 2022 were assigned to the experimental group.The control group received routine post-discharge nursing health education and telephone follow-up.On the basis of routine discharge guidance,the experimental group implemented the intervention method based on the Internet platform in continuation care.The levels of self-management efficacy,satisfaction,and incidence of unplanned readmission were compared one month after discharge between the two groups.Results:One month after discharge,the self-management efficacy of the experimental group(90.15±7.92)was significantly higher than that of the control group(79.10±7.84),and the patient satisfaction score(97.83±2.32)was significantly higher than that of the control group(90.23±2.58),with statistical significance(P<0.05).Additionally,the incidence of unplanned readmissions within one month after discharge in the experimental group(1.59%)was slightly lower than that in the control group(4.84%).Conclusion:The doctor-nurse cooperation follow-up model based on the Internet platform in continuation care can significantly improve the self-management efficiency of patients after discharge and enhance patient satisfaction,providing a new approach for discharge follow-up of urological tumor patients after surgery.
基金supported by the undergraduate scientific research and innovation project of Capital Medical University (No.XSKY2020078).
文摘Background:The Internet plus nursing service program is being piloted in China,which has become a new home nursing service model led by nurses.To enable safe and effective homecare service delivery,nurses working in the program need a high level of competency.However,the content of these core competencies and the training needs of nurses for Internet plus nursing services are still unknown.Aim:To describe nurses’perceptions of core competencies and training needs to work in the Internet plus nursing service program,thereby providing a reference for the development of training programs.Methods:A qualitative descriptive study using semi-structured interviews was conducted on 15 nurses with experience of working in the Internet plus nursing service program.Interviews were audio-recorded and transcribed verbatim,and the data were analyzed using thematic analysis.Results:Core competencies involved comprehensive assessment competence,direct care practice competence,health education and consulting competence,risk estimation and response competence,and communication competence.Training needs involved complex operational items,knowledge of chronic disease management,professional communication,risk identification and response,nursing standards,norms,and procedures,and utilization of information technology.Conclusions:The training system may be developed based on nurses’core competencies and their training needs to promote professional development of the Internet plus nursing service.