期刊文献+
共找到171,803篇文章
< 1 2 250 >
每页显示 20 50 100
The impact of Internet access on household dietary quality:Evidence from rural China 被引量:1
1
作者 Yi Cui Qiran Zhao +1 位作者 Thomas Glauben Wei Si 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第2期374-383,共10页
Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access sig... Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access significantly impacts agricultural production and improves smallholder farmers’income.Beyond these,the Internet can affect other dimensions of social welfare.However,research about the impact of Internet access on dietary quality in rural China remains scarce.This study utilizes multi-period panel data from Fixed Observation Point in rural China from 2009 to 2015 to estimate the impact of Internet access on dietary quality and food consumption of rural households and conducts a causal analysis.Regression models with time and household fixed effects allow robust estimation while reducing potential issues of unobserved heterogeneity.The estimates show that Internet access has significantly increased rural household dietary quality(measured by the Chinese Diet Balance Index).Further research finds that Internet access has increased the consumption of animal products,such as aquatic and dairy products.We also examine the underlying mechanisms.Internet access improves dietary quality and food consumption mainly through increasing household income and food expenditure.These results encourage the promotion of Internet access as a valuable tool for nutritional improvements,especially in rural areas. 展开更多
关键词 dietary quality fixed effect model internet access rural China
下载PDF
Deep Transfer Learning Techniques in Intrusion Detection System-Internet of Vehicles: A State-of-the-Art Review
2
作者 Wufei Wu Javad Hassannataj Joloudari +8 位作者 Senthil Kumar Jagatheesaperumal Kandala N.V.P.SRajesh Silvia Gaftandzhieva Sadiq Hussain Rahimullah Rabih Najibullah Haqjoo Mobeen Nazar Hamed Vahdat-Nejad Rositsa Doneva 《Computers, Materials & Continua》 SCIE EI 2024年第8期2785-2813,共29页
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accide... The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks. 展开更多
关键词 Cyber-attacks internet of things internet of vehicles intrusion detection system
下载PDF
Call for Papers——Feature Topic Vol.22,No.2,2025 Efficient Cooperative Transmission over Satellite Internet for 6G
3
《China Communications》 SCIE CSCD 2024年第1期I0006-I0006,共1页
Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enh... Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enhance the range of network information services accessible to humans.With the transition of terrestrial mobile communication networks from the 5G era,which provides access to information anywhere,to the 6G era,which seeks to connect everything,the construction of satellite Internet,which promises a"network reaching everywhere and service is ubiquitous",has become the consensus of the industry's development and the focus of global scientific and technological innovation. 展开更多
关键词 internet SERVICES service
下载PDF
Intelligent Internet of Things with Reliable Communication and Collaboration Technologies
4
作者 Zhao Junhui Wu Celimuge +4 位作者 Xu Wenjun Qi Chenhao Bu Shengrong Zhang Shuowen Zhang Qingmiao 《China Communications》 SCIE CSCD 2024年第8期I0002-I0006,共5页
The Internet of Things(IoT)connects objects to Internet through sensor devices,radio frequency identification devices and other information collection and processing devices to realize information interaction.IoT is w... The Internet of Things(IoT)connects objects to Internet through sensor devices,radio frequency identification devices and other information collection and processing devices to realize information interaction.IoT is widely used in many fields,including intelligent transportation,intelligent healthcare,intelligent home and industry.In these fields,IoT devices connected via high-speed internet for efficient and reliable communications and faster response times. 展开更多
关键词 INTERACTION internet IOT
下载PDF
Survey on digital twins for Internet of Vehicles:Fundamentals,challenges,and opportunities
5
作者 Jiajie Guo Muhammad Bilal +3 位作者 Yuying Qiu Cheng Qian Xiaolong Xu Kim-Kwang Raymond Choo 《Digital Communications and Networks》 SCIE CSCD 2024年第2期237-247,共11页
As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly prevalent.There hav... As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly prevalent.There have been attempts to utilize Digital Twins(DTs)to facilitate the design,evaluation,and deployment of IoV-based systems,for example by supporting high-fidelity modeling,real-time monitoring,and advanced predictive capabilities.However,the literature review undertaken in this paper suggests that integrating DTs into IoV-based system design and deployment remains an understudied topic.In addition,this paper explains how DTs can benefit IoV system designers and implementers,as well as describes several challenges and opportunities for future researchers. 展开更多
关键词 internet of vehicles Digital twin Simulation Traffic systems
下载PDF
A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles
6
作者 Feng Zhao Hongtao Ding +3 位作者 Chunhai Li Zhaoyu Su Guoling Liang Changsong Yang 《Computers, Materials & Continua》 SCIE EI 2024年第7期567-585,共19页
The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and varia... The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and variable nature of its network topology,vehicles frequently engage in cross-domain interactions.During such processes,directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers,thus compromising the security of the cross-domain authentication process.Additionally,IoV imposes high real-time requirements,and existing cross-domain authentication schemes for IoV often encounter efficiency issues.To mitigate these challenges,we propose CAIoV,a blockchain-based efficient cross-domain authentication scheme for IoV.This scheme comprehensively integrates technologies such as zero-knowledge proofs,smart contracts,and Merkle hash tree structures.It divides the cross-domain process into anonymous cross-domain authentication and safe cross-domain authentication phases to ensure efficiency while maintaining a balance between efficiency and security.Finally,we evaluate the performance of CAIoV.Experimental results demonstrate that our proposed scheme reduces computational overhead by approximately 20%,communication overhead by around 10%,and storage overhead by nearly 30%. 展开更多
关键词 Blockchain cross-domain authentication internet of vehicle zero-knowledge proof
下载PDF
Application of Patient Simulators Combined with Internet plus Scenario Simulation Teaching Models on Intravenous Infusion Nursing Education in China
7
作者 Ying Wu Yun Chen +5 位作者 Liuyan Zhang Guohua Huang Jinai He Yutong Li Yuzhen Renqing Zhijuan Zhan 《Journal of Biosciences and Medicines》 2024年第1期64-71,共8页
Objective: To explore the effectiveness of applying patient simulators combined with Internet Plus scenario simulation teaching models on intravenous (IV) infusion nursing education, and to provide scientific evidence... Objective: To explore the effectiveness of applying patient simulators combined with Internet Plus scenario simulation teaching models on intravenous (IV) infusion nursing education, and to provide scientific evidence for the implementation of advanced teaching models in future nursing education. Methods: Enrolled 60 nurses who took the IV infusion therapy training program in our hospital from January 2022 to December 2023 for research. 30 nurses who were trained in traditional teaching models from January to December 2022 were selected as the control group, and 30 nurses who were trained with simulation-based teaching models with methods including simulated patients, internet, online meetings which can be replayed and scenario simulation, etc. from January to December 2023 were selected as the experimental group. Evaluated the learning outcomes based on the Competency Inventory for Nursing Students (CINS), Problem-Solving Inventory (PSI), comprehensive learning ability, scientific research ability, and proficiency in the theoretical knowledge and practical skills of IV infusion therapy. Nursing quality, the incidence of IV infusion therapy complications and nurse satisfaction with different teaching models were also measured. Results: The scientific research ability, PSI scores, CINS scores, and comprehensive learning ability of the experimental group were better than those of the control group (P 0.05), and their assessment results of practical skills, nursing quality of IV infusion therapy during training, and satisfaction with teaching models were all better than those of the control group with statistical significance (P < 0.05). The incidence of IV infusion therapy complications in the experimental group was lower than that in the control group, indicating statistical significance (P < 0.05). Conclusions: Teaching models based on patient simulators combined with Internet Plus scenario simulation enable nursing students to learn more directly and practice at any time and in any place, and can improve their proficiency in IV infusion theoretical knowledge and skills (e.g. PICC catheterization), core competencies, problem-solving ability, comprehensive learning ability, scientific research ability and the ability to deal with complicated cases. Also, it helps provide high-quality nursing education, improve the nursing quality of IV therapy, reduce the incidence of related complications, and ensure the safety of patients with IV therapy. 展开更多
关键词 Specialty of Intravenous Infusion Therapy Nursing Education Patient Simulators internet Plus Scenario Simulation Teaching Model
下载PDF
Internet in China:Yesterday and Tomorrow Exclusive interview with Li Xiaodong,Vice Chairman of Internet Society of China
8
作者 Huang Jiangqin 《China Report ASEAN》 2024年第5期39-43,共5页
On April 20,1994,the National Computing and Networking Facility of China(NCFC)project opened a 64Kbps international dedicated line to the internet through Sprint Co.,Ltd.in the United States,marking China’s first ful... On April 20,1994,the National Computing and Networking Facility of China(NCFC)project opened a 64Kbps international dedicated line to the internet through Sprint Co.,Ltd.in the United States,marking China’s first full-function connection to the internet.More than 30 years later,China boasts the world’s largest internet market with the most users of both the internet and mobile internet,the most innovative internet technology,and the most active environment for mobile application development. 展开更多
关键词 internet internet SPRINT
下载PDF
An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things
9
作者 Senshan Ouyang Xiang Liu +3 位作者 Lei Liu Shangchao Wang Baichuan Shao Yang Zhao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期903-915,共13页
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smar... With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smart equipment is not trustworthy,so the issue of data authenticity needs to be addressed.The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems.Unfortunately,it still suffers from the problem of key exposure.In order to address this concern,this study first introduces a key-insulated scheme,SM2-KI-SIGN,based on the SM2 algorithm.This scheme boasts strong key insulation and secure keyupdates.Our scheme uses the elliptic curve algorithm,which is not only more efficient but also more suitable for IIoT-cloud environments.Finally,the security proof of SM2-KI-SIGN is given under the Elliptic Curve Discrete Logarithm(ECDL)assumption in the random oracle. 展开更多
关键词 KEY-INSULATED SM2 algorithm digital signature Industrial internet of Things(IIoT) provable security
下载PDF
Federated Learning on Internet of Things:Extensive and Systematic Review
10
作者 Meenakshi Aggarwal Vikas Khullar +4 位作者 Sunita Rani Thomas AndréProla Shyama Barna Bhattacharjee Sarowar Morshed Shawon Nitin Goyal 《Computers, Materials & Continua》 SCIE EI 2024年第5期1795-1834,共40页
The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and ... The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and needs to be explored in various areas to understand the key challenges for deployment in real-world scenarios.The paper systematically reviewed the available literature using the PRISMA guiding principle.The study aims to provide a detailed overview of the increasing use of FL in IoT networks,including the architecture and challenges.A systematic review approach is used to collect,categorize and analyze FL-IoT-based articles.Asearch was performed in the IEEE,Elsevier,Arxiv,ACM,and WOS databases and 92 articles were finally examined.Inclusion measures were published in English and with the keywords“FL”and“IoT”.The methodology begins with an overview of recent advances in FL and the IoT,followed by a discussion of how these two technologies can be integrated.To be more specific,we examine and evaluate the capabilities of FL by talking about communication protocols,frameworks and architecture.We then present a comprehensive analysis of the use of FL in a number of key IoT applications,including smart healthcare,smart transportation,smart cities,smart industry,smart finance,and smart agriculture.The key findings from this analysis of FL IoT services and applications are also presented.Finally,we performed a comparative analysis with FL IID(independent and identical data)and non-ID,traditional centralized deep learning(DL)approaches.We concluded that FL has better performance,especially in terms of privacy protection and resource utilization.FL is excellent for preserving privacy becausemodel training takes place on individual devices or edge nodes,eliminating the need for centralized data aggregation,which poses significant privacy risks.To facilitate development in this rapidly evolving field,the insights presented are intended to help practitioners and researchers navigate the complex terrain of FL and IoT. 展开更多
关键词 internet of Things federated learning PRISMA framework of FL applications of FL data privacy COMMUNICATION
下载PDF
Potential Benefits and Obstacles of the Use of Internet of Things in Saudi Universities: Empirical Study
11
作者 Najmah Adel Fallatah Fahad Mahmoud Ghabban +4 位作者 Omair Ameerbakhsh Ibrahim Alfadli Wael Ghazy Alheadary Salem Sulaiman Alatawi Ashwaq Hasen Al-Shehri 《Advances in Internet of Things》 2024年第1期1-20,共20页
Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of thi... Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of things (devices) that can be connected through the internet. The purpose: this paper aims to explore the concept of the Internet of Things (IoT) generally and outline the main definitions of IoT. The paper also aims to examine and discuss the obstacles and potential benefits of IoT in Saudi universities. Methodology: the researchers reviewed the previous literature and focused on several databases to use the recent studies and research related to the IoT. Then, the researchers also used quantitative methodology to examine the factors affecting the obstacles and potential benefits of IoT. The data were collected by using a questionnaire distributed online among academic staff and a total of 150 participants completed the survey. Finding: the result of this study reveals there are twelve factors that affect the potential benefits of using IoT such as reducing human errors, increasing business income and worker’s productivity. It also shows the eighteen factors which affect obstacles the IoT use, for example sensors’ cost, data privacy, and data security. These factors have the most influence on using IoT in Saudi universities. 展开更多
关键词 internet of Things (IoT) M2M Factors Obstacles Potential Benefits UNIVERSITieS
下载PDF
Multi-source heterogeneous data access management framework and key technologies for electric power Internet of Things
12
作者 Pengtian Guo Kai Xiao +1 位作者 Xiaohui Wang Daoxing Li 《Global Energy Interconnection》 EI CSCD 2024年第1期94-105,共12页
The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initiall... The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT. 展开更多
关键词 Power internet of Things Object model High concurrency access Zero trust mechanism Multi-source heterogeneous data
下载PDF
Application Analysis of Doctor-Nurse Cooperation Follow-up Model Based on the Internet Platform in Continuation Care of Patients after Urooncology Surgery
13
作者 Yan Guo Hanjing Zhu +3 位作者 Sijie You Yeli Cao Liya Ma Xia Yuan 《Journal of Clinical and Nursing Research》 2024年第7期310-321,共12页
Objective:To explore the application effect of a doctor-nurse cooperation follow-up model based on an Internet platform in the continuation of care for patients after uro-oncology surgery.Methods:A convenient sampling... Objective:To explore the application effect of a doctor-nurse cooperation follow-up model based on an Internet platform in the continuation of care for patients after uro-oncology surgery.Methods:A convenient sampling method was used to select patients with urinary system tumors who underwent surgery in the Department of Urology in Grade III A general hospital in Shanghai from May to August 2022.Patients who underwent surgery from May to June 2022 were assigned to the control group,and those who underwent surgery from July to August 2022 were assigned to the experimental group.The control group received routine post-discharge nursing health education and telephone follow-up.On the basis of routine discharge guidance,the experimental group implemented the intervention method based on the Internet platform in continuation care.The levels of self-management efficacy,satisfaction,and incidence of unplanned readmission were compared one month after discharge between the two groups.Results:One month after discharge,the self-management efficacy of the experimental group(90.15±7.92)was significantly higher than that of the control group(79.10±7.84),and the patient satisfaction score(97.83±2.32)was significantly higher than that of the control group(90.23±2.58),with statistical significance(P<0.05).Additionally,the incidence of unplanned readmissions within one month after discharge in the experimental group(1.59%)was slightly lower than that in the control group(4.84%).Conclusion:The doctor-nurse cooperation follow-up model based on the Internet platform in continuation care can significantly improve the self-management efficiency of patients after discharge and enhance patient satisfaction,providing a new approach for discharge follow-up of urological tumor patients after surgery. 展开更多
关键词 Urologic neoplasms internet platform Doctor-nurse cooperation Continuation care
下载PDF
Core competencies and perceived training needs of nurses in the background of Internet plus nursing service:a qualitative descriptive study
14
作者 Qiang-Hui-Zi Zhang Wei-Wei Liu Zhen-Zhen Cheng 《Frontiers of Nursing》 2024年第2期181-190,共10页
Background:The Internet plus nursing service program is being piloted in China,which has become a new home nursing service model led by nurses.To enable safe and effective homecare service delivery,nurses working in t... Background:The Internet plus nursing service program is being piloted in China,which has become a new home nursing service model led by nurses.To enable safe and effective homecare service delivery,nurses working in the program need a high level of competency.However,the content of these core competencies and the training needs of nurses for Internet plus nursing services are still unknown.Aim:To describe nurses’perceptions of core competencies and training needs to work in the Internet plus nursing service program,thereby providing a reference for the development of training programs.Methods:A qualitative descriptive study using semi-structured interviews was conducted on 15 nurses with experience of working in the Internet plus nursing service program.Interviews were audio-recorded and transcribed verbatim,and the data were analyzed using thematic analysis.Results:Core competencies involved comprehensive assessment competence,direct care practice competence,health education and consulting competence,risk estimation and response competence,and communication competence.Training needs involved complex operational items,knowledge of chronic disease management,professional communication,risk identification and response,nursing standards,norms,and procedures,and utilization of information technology.Conclusions:The training system may be developed based on nurses’core competencies and their training needs to promote professional development of the Internet plus nursing service. 展开更多
关键词 core competence internet plus nursing service NURSING qualitative study training needs
下载PDF
辟谣信息对社交媒体用户错误信息持续影响效应(CIE)的影响--基于知识修正理论
15
作者 李松涛 张卫东 陈希鹏 《现代情报》 北大核心 2024年第5期123-139,共17页
[目的/意义]通过研究社交媒体辟谣的要素对错误信息的持续影响效应(CIE)的影响,确定改善CIE的关键因素,进一步完善知识修正等相关理论,以遏制信息疫情的影响。[方法/过程]以知识修正理论为基础模型,采用问卷调查的方式对社交媒体用户进... [目的/意义]通过研究社交媒体辟谣的要素对错误信息的持续影响效应(CIE)的影响,确定改善CIE的关键因素,进一步完善知识修正等相关理论,以遏制信息疫情的影响。[方法/过程]以知识修正理论为基础模型,采用问卷调查的方式对社交媒体用户进行回溯调查。从用户个人因素和辟谣信息因素两个维度构建了社交媒体辟谣对用户持续影响效应(CIE)的影响因素模型。为验证该模型的可靠性,采用Smart PLS软件进行分析。[结果/结论]网络辟谣信息对社交媒体用户持续影响效应(CIE)的影响主要受7个因素的影响:辟谣信息的频次、辟谣响应速度、个体的自信水平、辟谣信息的详尽程度、辟谣信息的来源、定向推理动机和辟谣信息内容认知能力。这7个因素共同调节了社交媒体用户的知识修正全过程。其中,辟谣信息的来源、定向推理动机和辟谣信息内容认知能力3个因素对用户消除CIE的效果起到相对主导性作用。 展开更多
关键词 网络辟谣信息 错误信息持续影响效应(Cie) 社交媒体用户 知识修正理论
下载PDF
Neurobiological risk factors for problematic social media use as a specific form of Internet addiction:A narrative review 被引量:1
16
作者 Sergey Yu Tereshchenko 《World Journal of Psychiatry》 SCIE 2023年第5期160-173,共14页
Problematic social media use(PSMU)is a behavioral addiction,a specific form of problematic Internet use associated with the uncontrolled use of social networks.It is typical mostly for modern adolescents and young adu... Problematic social media use(PSMU)is a behavioral addiction,a specific form of problematic Internet use associated with the uncontrolled use of social networks.It is typical mostly for modern adolescents and young adults,which are the first generations fully grown up in the era of total digitalization of society.The modern biopsychosocial model of the formation of behavioral addictions,postulating the impact of a large number of biological,psychological,and social factors on addictive behavior formation,may be quite applicable to PSMU.In this narrative review,we discussed neurobiological risk factors for Internet addiction with a focus on current evidence on the association between PSMU and structural/functional characteristics of the brain and autonomic nervous system,neurochemical correlations,and genetic features.A review of the literature shows that the vast majority of the mentioned neurobiological studies were focused on computer games addiction and generalized Internet addiction(without taking into account the consumed content).Even though a certain number of neuroimaging studies have been conducted for PSMU,there is practically no research on neuropeptide and genetic associations for PSMU to date.This fact points to the extremely high relevance of such studies. 展开更多
关键词 internet COMPUTER MEDIA
下载PDF
基于IEO模型的高校学生增值评价探索与反思
17
作者 万华 魏晨宇 《铜仁学院学报》 2024年第4期55-64,共10页
研究以IEO模型为基础构建高校学生增值评价的分析框架,基于G省某高校师范专业本科生的问卷调查结果,通过SPSS27.0软件,分别采用传统的终结性评价法和增值评价法对学生专业课程学习增值的实际情况和影响机制进行比较研究与深度分析。结... 研究以IEO模型为基础构建高校学生增值评价的分析框架,基于G省某高校师范专业本科生的问卷调查结果,通过SPSS27.0软件,分别采用传统的终结性评价法和增值评价法对学生专业课程学习增值的实际情况和影响机制进行比较研究与深度分析。结果发现,增值评价法能够弥补传统终结性评价“重结果”“唯分数”的缺陷与不足,有效破除学生评价中常见的“天花板效应”和“地板效应”,更有利于实现学生发展的动态监测、建立有效的激励机制、促进教与学过程的优化设计。 展开更多
关键词 ieO模型 增值评价 高校学生评价 评价探索 教学改革
下载PDF
IEEE 802.15.4非信标使能模式在车联网中的性能评估
18
作者 周向 马丽 《机械设计与制造》 北大核心 2024年第5期113-118,共6页
车联网是车与车之间广泛使用的网络技术,是车与车之间经济、高效的通讯渠道。IEEE 802.15.4由一层简单物理层和一层节能型介质访问控制层所组成,是当前所有通讯标准中车联网网络的最佳选择。基于此,这里选择适合车联网的IEEE 802.15.4... 车联网是车与车之间广泛使用的网络技术,是车与车之间经济、高效的通讯渠道。IEEE 802.15.4由一层简单物理层和一层节能型介质访问控制层所组成,是当前所有通讯标准中车联网网络的最佳选择。基于此,这里选择适合车联网的IEEE 802.15.4非信标使能模式作为分析模型,将其应用于车联网中,具体包含非饱和通讯量模式和大型网络,并分别研究了IEEE 802.15.4适合车联网的非信标使能模式的性能,这对车辆积极调整广播速度,在车与车之间联网通讯中取得更高的成功具有一定的参考价值。 展开更多
关键词 分析模型 ieEE 802.15.4 车联网(IoV) 车辆—基础设施(V2I)通讯 车辆—车辆(V2V)通讯
下载PDF
Internet of robotic things for mobile robots:Concepts,technologies,challenges,applications,and future directions 被引量:1
19
作者 Homayun Kabir Mau-Luen Tham Yoong Choon Chang 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1265-1290,共26页
Nowadays,Multi Robotic System(MRS)consisting of different robot shapes,sizes and capabilities has received significant attention from researchers and are being deployed in a variety of real-world applications.From sen... Nowadays,Multi Robotic System(MRS)consisting of different robot shapes,sizes and capabilities has received significant attention from researchers and are being deployed in a variety of real-world applications.From sensors and actuators improved by communication technologies to powerful computing systems utilizing advanced Artificial Intelligence(AI)algorithms have rapidly driven the development of MRS,so the Internet of Things(IoT)in MRS has become a new topic,namely the Internet of Robotic Things(IoRT).This paper summarizes a comprehensive survey of state-of-the-art technologies for mobile robots,including general architecture,benefits,challenges,practical applications,and future research directions.In addition,remarkable research of i)multirobot navigation,ii)network architecture,routing protocols and communications,and iii)coordination among robots as well as data analysis via external computing(cloud,fog,edge,edge-cloud)are merged with the IoRT architecture according to their applicability.Moreover,security is a long-term challenge for IoRT because of various attack vectors,security flaws,and vulnerabilities.Security threats,attacks,and existing solutions based on IoRT architectures are also under scrutiny.Moreover,the identification of environmental situations that are crucial for all types of IoRT applications,such as the detection of objects,human,and obstacles,is also critically reviewed.Finally,future research directions are given by analyzing the challenges of IoRT in mobile robots. 展开更多
关键词 Multi Robotic System(MRS) internet of Things(IoT) internet of Robotic Things(IoRT) Cloud computing Artificial intelligence(AI) Machine learning(ML) Reinforcement learning(RL)
下载PDF
Technologies Behind the Smart Grid and Internet of Things: A System Survey 被引量:1
20
作者 Kuldeep Sharma Arun Malik +3 位作者 Isha Batra A.S.M.Sanwar Hosen Md Abdul Latif Sarker Dong Seog Han 《Computers, Materials & Continua》 SCIE EI 2023年第6期5049-5072,共24页
Electric smart grids enable a bidirectional flow of electricity and information among power system assets.For proper monitoring and con-trolling of power quality,reliability,scalability and flexibility,there is a need... Electric smart grids enable a bidirectional flow of electricity and information among power system assets.For proper monitoring and con-trolling of power quality,reliability,scalability and flexibility,there is a need for an environmentally friendly system that is transparent,sustainable,cost-saving,energy-efficient,agile and secure.This paper provides an overview of the emerging technologies behind smart grids and the internet of things.The dependent variables are identified by analyzing the electricity consumption patterns for optimal utilization and planning preventive maintenance of their legacy assets like power distribution transformers with real-time parameters to ensure an uninterrupted and reliable power supply.In addition,the paper sorts out challenges in the traditional or legacy electricity grid,power generation,transmission,distribution,and revenue management challenges such as reduc-ing aggregate technical and commercial loss by reforming the existing manual or semi-automatic techniques to fully smart or automatic systems.This article represents a concise review of research works in creating components of the smart grid like smart metering infrastructure for postpaid as well as in prepaid mode,internal structure comparison of advanced metering methods in present scenarios,and communication systems. 展开更多
关键词 Electricity consumption BIDIRECTIONAL advanced meter infrastructure energy internet of things smart grid smart meter
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部