Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible t...Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes.展开更多
The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective se...The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λ_(i) of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server S_(j) and members C_(i),with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs.展开更多
Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is ...Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still thebiggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services providedby an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures,data, and devices. Authentication, as the first line of defense against security threats, becomes the priority ofeveryone. It can either grant or deny users access to resources according to their legitimacy. As a result, studyingand researching authentication issues within IoT is extremely important. As a result, studying and researchingauthentication issues within IoT is extremely important. This article presents a comparative study of recent researchin IoT security;it provides an analysis of recent authentication protocols from2019 to 2023 that cover several areaswithin IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security researchsummary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. Itillustrates that the resistance of protocols against attacks, and their computational and communication cost arelinked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemesand provides some future research directions.展开更多
The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which ...The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which is essential in smart healthcare.However,Personal Health Records(PHRs)are normally kept in public cloud servers controlled by IoMT service providers,so privacy and security incidents may be frequent.Fortunately,Searchable Encryption(SE),which can be used to execute queries on encrypted data,can address the issue above.Nevertheless,most existing SE schemes cannot solve the vector dominance threshold problem.In response to this,we present a SE scheme called Vector Dominance with Threshold Searchable Encryption(VDTSE)in this study.We use a Lagrangian polynomial technique and convert the vector dominance threshold problem into a constraint that the number of two equal-length vectors’corresponding bits excluding wildcards is not less than a threshold t.Then,we solve the problem using the proposed technique modified in Hidden Vector Encryption(HVE).This technique makes the trapdoor size linear to the number of attributes and thus much smaller than that of other similar SE schemes.A rigorous experimental analysis of a specific application for privacy-preserving diabetes demonstrates the feasibility of the proposed VDTSE scheme.展开更多
With the adoption of cutting-edge communication technologies such as 5G/6G systems and the extensive development of devices,crowdsensing systems in the Internet of Things(IoT)are now conducting complicated video analy...With the adoption of cutting-edge communication technologies such as 5G/6G systems and the extensive development of devices,crowdsensing systems in the Internet of Things(IoT)are now conducting complicated video analysis tasks such as behaviour recognition.These applications have dramatically increased the diversity of IoT systems.Specifically,behaviour recognition in videos usually requires a combinatorial analysis of the spatial information about objects and information about their dynamic actions in the temporal dimension.Behaviour recognition may even rely more on the modeling of temporal information containing short-range and long-range motions,in contrast to computer vision tasks involving images that focus on understanding spatial information.However,current solutions fail to jointly and comprehensively analyse short-range motions between adjacent frames and long-range temporal aggregations at large scales in videos.In this paper,we propose a novel behaviour recognition method based on the integration of multigranular(IMG)motion features,which can provide support for deploying video analysis in multimedia IoT crowdsensing systems.In particular,we achieve reliable motion information modeling by integrating a channel attention-based short-term motion feature enhancement module(CSEM)and a cascaded long-term motion feature integration module(CLIM).We evaluate our model on several action recognition benchmarks,such as HMDB51,Something-Something and UCF101.The experimental results demonstrate that our approach outperforms the previous state-of-the-art methods,which confirms its effective-ness and efficiency.展开更多
The development of the Internet of Things(IoT)has brought great convenience to people.However,some information security problems such as privacy leakage are caused by communicating with risky users.It is a challenge t...The development of the Internet of Things(IoT)has brought great convenience to people.However,some information security problems such as privacy leakage are caused by communicating with risky users.It is a challenge to choose reliable users with which to interact in the IoT.Therefore,trust plays a crucial role in the IoT because trust may avoid some risks.Agents usually choose reliable users with high trust to maximize their own interests based on reinforcement learning.However,trust propagation is time-consuming,and trust changes with the interaction process in social networks.To track the dynamic changes in trust values,a dynamic trust inference algorithm named Dynamic Double DQN Trust(Dy-DDQNTrust)is proposed to predict the indirect trust values of two users without direct contact with each other.The proposed algorithm simulates the interactions among users by double DQN.Firstly,CurrentNet and TargetNet networks are used to select users for interaction.The users with high trust are chosen to interact in future iterations.Secondly,the trust value is updated dynamically until a reliable trust path is found according to the result of the interaction.Finally,the trust value between indirect users is inferred by aggregating the opinions from multiple users through a Modified Collaborative Filtering Averagebased Similarity(SMCFAvg)aggregation strategy.Experiments are carried out on the FilmTrust and the Epinions datasets.Compared with TidalTrust,MoleTrust,DDQNTrust,DyTrust and Dynamic Weighted Heuristic trust path Search algorithm(DWHS),our dynamic trust inference algorithm has higher prediction accuracy and better scalability.展开更多
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)systems.However,conventional mode-based authentication methods(e.g.,passwords and sm...Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)systems.However,conventional mode-based authentication methods(e.g.,passwords and smart cards)may be vulnerable to a broad range of attacks(e.g.,eavesdropping and side-channel attacks).Hence,there have been attempts to design biometric-based authentication solutions,which rely on physiological and behavioral characteristics.Behavioral characteristics need continuous monitoring and specific environmental settings,which can be challenging to implement in practice.However,we can also leverage Artificial Intelligence(AI)in the extraction and classification of physiological characteristics from IoT devices processing to facilitate authentication.Thus,we review the literature on the use of AI in physiological characteristics recognition pub-lished after 2015.We use the three-layer architecture of the IoT(i.e.,sensing layer,feature layer,and algorithm layer)to guide the discussion of existing approaches and their limitations.We also identify a number of future research opportunities,which will hopefully guide the design of next generation solutions.展开更多
Due to the overwhelming characteristics of the Internet of Things(IoT)and its adoption in approximately every aspect of our lives,the concept of individual devices’privacy has gained prominent attention from both cus...Due to the overwhelming characteristics of the Internet of Things(IoT)and its adoption in approximately every aspect of our lives,the concept of individual devices’privacy has gained prominent attention from both customers,i.e.,people,and industries as wearable devices collect sensitive information about patients(both admitted and outdoor)in smart healthcare infrastructures.In addition to privacy,outliers or noise are among the crucial issues,which are directly correlated with IoT infrastructures,as most member devices are resource-limited and could generate or transmit false data that is required to be refined before processing,i.e.,transmitting.Therefore,the development of privacy-preserving information fusion techniques is highly encouraged,especially those designed for smart IoT-enabled domains.In this paper,we are going to present an effective hybrid approach that can refine raw data values captured by the respectivemember device before transmission while preserving its privacy through the utilization of the differential privacy technique in IoT infrastructures.Sliding window,i.e.,δi based dynamic programming methodology,is implemented at the device level to ensure precise and accurate detection of outliers or noisy data,and refine it prior to activation of the respective transmission activity.Additionally,an appropriate privacy budget has been selected,which is enough to ensure the privacy of every individualmodule,i.e.,a wearable device such as a smartwatch attached to the patient’s body.In contrast,the end module,i.e.,the server in this case,can extract important information with approximately the maximum level of accuracy.Moreover,refined data has been processed by adding an appropriate nose through the Laplace mechanism to make it useless or meaningless for the adversary modules in the IoT.The proposed hybrid approach is trusted from both the device’s privacy and the integrity of the transmitted information perspectives.Simulation and analytical results have proved that the proposed privacy-preserving information fusion technique for wearable devices is an ideal solution for resource-constrained infrastructures such as IoT and the Internet ofMedical Things,where both device privacy and information integrity are important.Finally,the proposed hybrid approach is proven against well-known intruder attacks,especially those related to the privacy of the respective device in IoT infrastructures.展开更多
Background: Infertility is characterized by the inability to conceive after a year of regular unprotected intercourse. Aims: This study aimed to investigate the diagnostic value of sex hormone levels during different ...Background: Infertility is characterized by the inability to conceive after a year of regular unprotected intercourse. Aims: This study aimed to investigate the diagnostic value of sex hormone levels during different physiological periods in the diagnosis of infertility patients. Methods: From December 2019 to May 2021, a total of 93 infertility patients were admitted and selected as the observation group. Among them, 31 cases were in the follicular stage, 31 cases in the ovulation stage, and 31 cases in the luteal stage. Ninety-three healthy women for fertility evaluation due to male infertility were selected as the control group. The control group included 31 women in the follicular phase, 31 women in the ovulatory phase, and 31 women in the luteal phase. The levels of sex hormones (prolactin (PRL), luteinizing hormone (LH), follicle-stimulating hormone (FSH), estradiol (E2), testosterone (T), and progesterone (P)) during different physiological phases were compared between the observation and control groups. Results: The follicular phase showed no significant difference in LH levels between the observation group and the control group. The observation group showed higher levels of PRL and P compared to the control group, while the levels of FSH, E2, and T were lower in the observation group compared to the control group. The ovulation phase showed no significant difference in PRL levels between the two groups. The observation group showed lower levels of LH, FSH, E2, T, and P compared to the control group. The luteal phase showed no statistical difference in E2 levels between the two groups. The observation group showed higher levels of PRL, LH, and FSH compared to the control group, while the levels of T and P were lower in the observation group compared to the control group. Conclusion: Infertile women show variations in hormone levels compared to the normal levels during the follicular phase, ovulatory phase, and luteal phase.展开更多
Examining age-specific heterogeneity of susceptibility to cardiovascular disease is also essential in individuals without prediabetes to determine its relative size and direction compared to those with prediabetes.Of ...Examining age-specific heterogeneity of susceptibility to cardiovascular disease is also essential in individuals without prediabetes to determine its relative size and direction compared to those with prediabetes.Of particular interest,age-specific heterogeneity in genetic susceptibility may exhibit opposite directions depending on the presence or absence of prediabetes.展开更多
Background,aim,and scope Certain physicochemical indexes of topsoil are closely related to climatic factors including temperature,and precipitation.Understanding the relationship between modern topsoil properties and ...Background,aim,and scope Certain physicochemical indexes of topsoil are closely related to climatic factors including temperature,and precipitation.Understanding the relationship between modern topsoil properties and climatic factors is essential for quantitative paleoclimate reconstruction.Motuo located in the eastern Himalayas,exhibits a significant elevation gradient of over 7000 m from Nnamjagbarwa Peak(7782 m a.s.l.)to the Baxika(150 m a.s.l.).This region features a complete vertical zonation of vegetation,from alpine meadow to tropical forest,presenting an ideal place to investigate the relationships among vegetation,soil and climate conditions across altitudinal gradients.This study aims to explore the vertical variations in the physicochemical composition of topsoil and its relationship with temperature and precipitation.Materials and methods Twenty-seven topsoil samples were collected at 100 m intervals from 800 m to 3600 m a.s.l.along the southern slope of the Himalayas.Grain size,magnetic susceptibility and geochemical elements were measured to discuss the vertical variation characteristics of topsoil composition and their correlation with climatic factors.Results(1)The grain size of topsoil at different altitudes in Motuo is mainly composed of sand accounting for an averaged 53.2%,followed by silt and clay.(2)In the mixed forest zone,frequency dependent magnetic susceptibility(χfd%)shows a clear relationship with altitude,and clay is positively correlated with both altitude and climatic factors.(3)The oxides of topsoil in this area mainly consist of SiO_(2),Al_(2)O_(3) and Fe_(2)O_(3),followed by MgO,CaO,Na_(2)O and K_(2)O,with slight variations in the primary components at different altitudes.The sensitivity of elements to climate varies across different altitudes and vegetation zone,likely due to the region’s complex topography and vegetation.(4)Physical and biological weathering dominates in the broad-leaved forest zone of Motuo,while chemical weathering is more prominent in the coniferous forest zone,with the mixed forest zone falling in between.Discussion The formation of topsoil across the three vegetation zones is influenced by various factors,including parent material,vegetation,and climate.In the broad-leaved forest zone,physical weathering(precipitation,root wedging etc.)and pedogenesis dominate,resulting in finer grain size.The χ_(fd)% increases with altitude likely due to the high temperature and abundant precipitation in this zone,which facilitate the transformation of strong magnetic miners into weaker ones,particularly when the soil is oversaturated.Zirconium(Zr),primarily found in zircon,is depleted at lower altitudes by strong current erosion.Barium(Ba)is similarly reduced at low altitudes in this zone.In mixed forest zone,clay content is the lowest,indicating weaker physical weathering conditions than broad-leaved forest zone.The coarser grain size may result from the combined effects of topography and vegetation coverage.Magnetic susceptibility and organic matter show a positive correlation with altitude.Zr concentration is higher than that in the broad-leaved forest zone,likely resulting from decreased precipitation.In the coniferous zone,the clay content shows considerable fluctuations,with grain size generally becoming finer as altitude increases.This trend may be explained by intensified soil disintegration from seasonal freeze-thaw cycles.The χ_(fd)% values lack a clear trend or pattern,possibly due to soil erosion causing the migration of magnetic minerals or insufficient iron precipitation,which reduces the concentration of magnetic minerals in the soil.Additionally,a positive correlation is observed between altitude and organic matter content,with higher altitudes associated with greater organic matter accumulation.This may be attributed to lower microbial activity in colder conditions,which slows the decomposition and transformation of organic matter.Conclusions The variations in grain size,magnetic susceptibility,and geochemical elements differ across altitudes and vegetation zones,closely connected to the complex interplay of terrain,vegetation,and climate in Motuo.In the mixed forest,altitude has a significant impact onχfd%,and the clay component is particularly sensitive to changes in altitude,mean annual temperature,and precipitation.Zr shows a strong correlation with altitude and climate factors,making it a valuable indicator for assessing changes in atmospheric precipitation within specific altitude ranges.Recommendations and perspectives This study enhances our understanding of the relationships between the physicochemical properties of topsoil and climate conditions,offering valuable insights for paleoclimate reconstruction in Motuo.展开更多
Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of thi...Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of things (devices) that can be connected through the internet. The purpose: this paper aims to explore the concept of the Internet of Things (IoT) generally and outline the main definitions of IoT. The paper also aims to examine and discuss the obstacles and potential benefits of IoT in Saudi universities. Methodology: the researchers reviewed the previous literature and focused on several databases to use the recent studies and research related to the IoT. Then, the researchers also used quantitative methodology to examine the factors affecting the obstacles and potential benefits of IoT. The data were collected by using a questionnaire distributed online among academic staff and a total of 150 participants completed the survey. Finding: the result of this study reveals there are twelve factors that affect the potential benefits of using IoT such as reducing human errors, increasing business income and worker’s productivity. It also shows the eighteen factors which affect obstacles the IoT use, for example sensors’ cost, data privacy, and data security. These factors have the most influence on using IoT in Saudi universities.展开更多
[Objectives]This study was conducted to screen suitable seed stems of Fritillaria thunbergii Miq.from different provenances and to provide a theoretical basis for the high-yielding and high-efficiency cultivation of F...[Objectives]This study was conducted to screen suitable seed stems of Fritillaria thunbergii Miq.from different provenances and to provide a theoretical basis for the high-yielding and high-efficiency cultivation of F.thunbergii Miq.introduced to different places.[Methods]F.thunbergii Miq.from four different provenances including Zhejiang,Nantong and Chongqing were introduced and cultivated in Wanzhou of Chongqing.The contents of available Zn,Fe,Mn,Cu,Mo,N,P,K,Ca and Mg in rhizosphere soil of F.thunbergii Miq.during five growing stages were determined after selecting different stem sizes for field cultivation.[Results]Small stems of Pan an and Ningbo provenances(SSG3,121-160/kg)and middle stems of Nantong and Fengjie provenances(SSG2,81-120/kg)showed higher soil availability.[Conclusions]In the process of introduction and cultivation of F.thunbergii Miq.,high yield and high efficiency can be achieved by selecting smaller seed stems of F.thunbergii Miq.展开更多
Background:In this study,we explored the effects of different processing methods on the quality of Polygonatum cyrtonema Hua(PC),and the role of Huangjiu in the processing procedure.Methods:The sensory characteristics...Background:In this study,we explored the effects of different processing methods on the quality of Polygonatum cyrtonema Hua(PC),and the role of Huangjiu in the processing procedure.Methods:The sensory characteristics of the crude product,steamed product,and wine-processed product of PC were described.The colorimeter was used to analyze the chromatic values of three different processed products on PC.At the same time,the contents of the water extract and alcohol extract were measured separately.The content of three different processing Polygonatum Polysaccharide(PCP)was determined using 0.2%anthrone-sulfuric acid.The correlation difference between the chromatic values and chemical composition of different PC products was analyzed using various analytical methods.Results:The surface colors gradually deepened,the sweetness increased,the viscosity strengthened,and the tongue-numbing sensation disappeared after PC processing.The contents of extract and L^(*) gradually decreased from the crude to the steamed to the wine-processed product,consistent with the pattern of surface color alteration.While,E^(*)ab gradually increased.The content of PCP was crude product>wine-processed product>steamed product.The results of multivariate statistical analysis showed that the samples processed for crude,steamed,and wine-processed product were clustered into three classes.The correlation analysis showed that L^(*)and E^(*)ab were highly significant positively correlated with the content of PCP,and a*was significantly negatively correlated with the content of PCP.Conclusion:The results showed that the wine-processed product had the best quality.The internal quality of the PC was correlated with its characteristics and chromatic value.In this study,we investigated the internal and external quality of three different products of PC in order to provide a reference for further research on the impact of different processing methods on PC quality,the standardization of PC processing,and the role of Huangjiu in the processing of PC.展开更多
Objective:To investigate the mechanism of JAK2/STAT3/SOCS1 signaling pathway in electroacupuncture of different acupoints on acute colitis rats.Methods:36 SPF SD rats were randomly divided into 6 groups,with 6 rats in...Objective:To investigate the mechanism of JAK2/STAT3/SOCS1 signaling pathway in electroacupuncture of different acupoints on acute colitis rats.Methods:36 SPF SD rats were randomly divided into 6 groups,with 6 rats in each group.The rat model of acute colitis was prepared by enema with glacial acetic acid solution.After the model was established,electroacupuncture was given to each acupoint group,with density wave,frequency 2Hz-50 Hz,intensity 2 mA,muscle tremor as the degree 20 min/time,1 time/day,for 3 consecutive days.Observe the general condition of rats;the pathological changes of colonic mucosa in rats were observed by HE method.The contents of serum interleukin-4(IL-4)and interleukin-8(IL-8)were detected by ELISA.Western blot and RT-PCR were used to detect the expression of JAK2,STAT3,SOCS1 protein and mRNA in rat colon tissue.Results:In contrast to the normal group,the overall condition of the model group was worse,the colonic mucosa was severely damaged,even necrotic,and the ulcer surface was obvious.The content of IL-4 in serum was obviously reduced,and the content of IL-8 was obviously go up(P<0.01).The protein content of JAK2,STAT3 and the expression of JAK2,STAT3 mRNA in colon tissue of rats were obviously go up,while the protein content of SOCS1 and the expression of SOCS1 mRNA were obviously reduced(P<0.01).In contrast to the model group,the general condition of rats in each acupoint group was significantly improved,the damage and necrosis of colonic mucosa and ulcer surface were obviously alleviated,the content of IL-4 in serum was obviously go up,and the content of IL-8 was significantly decreased(P<0.01).The protein content of JAK2,STAT3 and the expression of JAK2,STAT3 mRNA in colon tissue of rats were obviously reduced,while the protein content of SOCS1 and the expression of SOCS1 mRNA were obviously go up(P<0.05,P<0.01).Comparison of different acupoint groups,the colonic mucosal injury in the Zusanli group was significantly reduced,the content of serum IL-4 was significantly increased,and the content of IL-8 was significantly decreased(P<0.05,P<0.01).The protein content and mRNA expression of JAK2 and STAT3 in colon tissue were significantly down-regulated,while the protein content and mRNA expression of SOCS1 were significantly go up(P<0.05,P<0.01).Conclusion:Electroacupuncture at each acupoint can improve the damage of colonic mucosa and reduce the inflammatory response.The therapeutic effect of Zusanli(ST36)is better than that of Tianshu(ST25),Dachangshu(BL25)and Shangjuxu(ST37).The mechanism may be related to the regulation of JAK2/STAT3/SOCS1 signaling pathway related proteins and inflammatory cytokines IL-4 and IL-8.展开更多
This article proposes a comprehensive monitoring system for tunnel operation to address the risks associated with tunnel operations.These risks include safety control risks,increased traffic flow,extreme weather event...This article proposes a comprehensive monitoring system for tunnel operation to address the risks associated with tunnel operations.These risks include safety control risks,increased traffic flow,extreme weather events,and movement of tectonic plates.The proposed system is based on the Internet of Things and artificial intelligence identification technology.The monitoring system will cover various aspects of tunnel operations,such as the slope of the entrance,the structural safety of the cave body,toxic and harmful gases that may appear during operation,excessively high and low-temperature humidity,poor illumination,water leakage or road water accumulation caused by extreme weather,combustion and smoke caused by fires,and more.The system will enable comprehensive monitoring and early warning of fire protection systems,accident vehicles,and overheating vehicles.This will effectively improve safety during tunnel operation.展开更多
With the rapid development of the Internet of Things(IoT)technology,fiber-optic sensors,as a kind of high-precision and high-sensitivity measurement tool,are increasingly widely used in the field of IoT.This paper out...With the rapid development of the Internet of Things(IoT)technology,fiber-optic sensors,as a kind of high-precision and high-sensitivity measurement tool,are increasingly widely used in the field of IoT.This paper outlines the advantages of fiber-optic sensors over traditional sensors,such as high precision,strong resistance to electromagnetic interference,and long transmission distance.On this basis,the paper discusses the application scenarios of fiber-optic sensors in the Internet of Things,including environmental monitoring,intelligent industry,medical and health care,intelligent transportation,and other fields.It is hoped that this study can provide theoretical support and practical guidance for the further development of fiber-optic sensors in the field of the Internet of Things,as well as promote the innovation and application of IoT.展开更多
With the continuous intensification of global aging,the issue of elderly care has become an increasingly prominent social problem.The Internet of Things(IoT)technology,as an emerging field,holds broad application pros...With the continuous intensification of global aging,the issue of elderly care has become an increasingly prominent social problem.The Internet of Things(IoT)technology,as an emerging field,holds broad application prospects.This article focuses on the application of IoT technology in group elderly care services and constructs a quality evaluation system for these services based on IoT technology.Through the analysis of practical application cases,the advantages and challenges of IoT technology in group elderly care services have been examined,confirming the feasibility and effectiveness of the evaluation system.展开更多
In Bahawalpur,a cross-sectional study assessed depression prevalence across age and gender groups,involving 442 participants from diverse socioeconomic backgrounds and settings.Utilizing the PHQ9 questionnaire,84%were...In Bahawalpur,a cross-sectional study assessed depression prevalence across age and gender groups,involving 442 participants from diverse socioeconomic backgrounds and settings.Utilizing the PHQ9 questionnaire,84%were found to meet depression levels.The findings revealed a higher incidence in females(88%)than males(79%),with the greatest disparity among young adults,particularly young women,due to factors like academic pressure and financial stress.School children had the lowest depression rates(68%),possibly due to better immunity.Elderly individuals exhibited more severe depression,likely related to aging and domestic challenges.The study’s findings highlight a significant variation in depression severity across different demographic groups,with an overall higher incidence in women.The research underscores the necessity for targeted mental health resources and interventions tailored to the specific needs of each demographic group.It also points to the importance of addressing academic and socioeconomic stressors to mitigate depression,particularly among young women.While the study provides valuable insights,it relies on self-reported data,which may introduce bias.Therefore,future research should include clinical assessments to validate these findings and ensure a more accurate representation of depression within the community.展开更多
Urban agglomerations,serving as pivotal centers of human activity,undergo swift alterations in ecosystem services prompted by shifts in land utilization.Strengthening the monitoring of ecosystem services in present an...Urban agglomerations,serving as pivotal centers of human activity,undergo swift alterations in ecosystem services prompted by shifts in land utilization.Strengthening the monitoring of ecosystem services in present and future urban agglomerations contributes to the rational planning of these areas and enhances the well-being of their inhabitants.Here,we analyzed land use conversion in the Yangtze River Delta(YRD)urban agglomeration during 1990-2020 and discussed the spatiotemporal response and main drivers of changes in ecosystem service value(ESV).By considering the different development strategic directions described in land use planning policies,we predicted land use conversion and its impact on ESV using the Future Land Use Simulation(FLUS)model in three scenari-os in 2025 and 2030.Results show that:1)from 1990 to 2020,land use change is mainly manifested as the continuous expansion of con-struction land to cultivated land.Among the reduced cultivated land,82.2%were occupied by construction land.2)The land use types conversion caused a loss of 21.85 billion yuan(RMB)in ESV during 1990-2020.Moreover,the large reduction of cultivated land area led to the continuous decline of food production value,accounting for 13%of the total ESV loss.3)From 2020 to 2030,land use change will mainly focus on Yangzhou and Zhenjiang in central Jiangsu Province and Taizhou in southern Zhejiang Province.Under the BAU(natural development)and ED(cultivated land protection)scenarios,construction land expansion remains dominant.In contrast,under the EP(ecological protection)scenario,the areas of water bodies and forest land increase significantly.Among the different scenarios,ESV is highest in the EP scenario,making it the optimal solution for sustainable land use.It can be seen that the space use conflict among urban,agriculture and ecology is a key factor leading to ESV change in the urban agglomeration of Yangtze River Delta.There-fore,it is crucial to maintain spatial land use coordination.Our findings provide suggestions for scientific and rational land use planning for the urban agglomeration.展开更多
文摘Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes.
文摘The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λ_(i) of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server S_(j) and members C_(i),with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs.
文摘Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still thebiggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services providedby an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures,data, and devices. Authentication, as the first line of defense against security threats, becomes the priority ofeveryone. It can either grant or deny users access to resources according to their legitimacy. As a result, studyingand researching authentication issues within IoT is extremely important. As a result, studying and researchingauthentication issues within IoT is extremely important. This article presents a comparative study of recent researchin IoT security;it provides an analysis of recent authentication protocols from2019 to 2023 that cover several areaswithin IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security researchsummary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. Itillustrates that the resistance of protocols against attacks, and their computational and communication cost arelinked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemesand provides some future research directions.
基金supported in part by the National Natural Science Foundation of China under Grant Nos.61872289 and 62172266in part by the Henan Key Laboratory of Network Cryptography Technology LNCT2020-A07the Guangxi Key Laboratory of Trusted Software under Grant No.KX202308.
文摘The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which is essential in smart healthcare.However,Personal Health Records(PHRs)are normally kept in public cloud servers controlled by IoMT service providers,so privacy and security incidents may be frequent.Fortunately,Searchable Encryption(SE),which can be used to execute queries on encrypted data,can address the issue above.Nevertheless,most existing SE schemes cannot solve the vector dominance threshold problem.In response to this,we present a SE scheme called Vector Dominance with Threshold Searchable Encryption(VDTSE)in this study.We use a Lagrangian polynomial technique and convert the vector dominance threshold problem into a constraint that the number of two equal-length vectors’corresponding bits excluding wildcards is not less than a threshold t.Then,we solve the problem using the proposed technique modified in Hidden Vector Encryption(HVE).This technique makes the trapdoor size linear to the number of attributes and thus much smaller than that of other similar SE schemes.A rigorous experimental analysis of a specific application for privacy-preserving diabetes demonstrates the feasibility of the proposed VDTSE scheme.
基金supported by National Natural Science Foundation of China under grant No.62271125,No.62273071Sichuan Science and Technology Program(No.2022YFG0038,No.2021YFG0018)+1 种基金by Xinjiang Science and Technology Program(No.2022273061)by the Fundamental Research Funds for the Central Universities(No.ZYGX2020ZB034,No.ZYGX2021J019).
文摘With the adoption of cutting-edge communication technologies such as 5G/6G systems and the extensive development of devices,crowdsensing systems in the Internet of Things(IoT)are now conducting complicated video analysis tasks such as behaviour recognition.These applications have dramatically increased the diversity of IoT systems.Specifically,behaviour recognition in videos usually requires a combinatorial analysis of the spatial information about objects and information about their dynamic actions in the temporal dimension.Behaviour recognition may even rely more on the modeling of temporal information containing short-range and long-range motions,in contrast to computer vision tasks involving images that focus on understanding spatial information.However,current solutions fail to jointly and comprehensively analyse short-range motions between adjacent frames and long-range temporal aggregations at large scales in videos.In this paper,we propose a novel behaviour recognition method based on the integration of multigranular(IMG)motion features,which can provide support for deploying video analysis in multimedia IoT crowdsensing systems.In particular,we achieve reliable motion information modeling by integrating a channel attention-based short-term motion feature enhancement module(CSEM)and a cascaded long-term motion feature integration module(CLIM).We evaluate our model on several action recognition benchmarks,such as HMDB51,Something-Something and UCF101.The experimental results demonstrate that our approach outperforms the previous state-of-the-art methods,which confirms its effective-ness and efficiency.
基金supported by the National Natural Science Foundation of China(62072392)the National Natural Science Foundation of China(61972360)the Major Scientific and Technological Innovation Projects of Shandong Province(2019522Y020131).
文摘The development of the Internet of Things(IoT)has brought great convenience to people.However,some information security problems such as privacy leakage are caused by communicating with risky users.It is a challenge to choose reliable users with which to interact in the IoT.Therefore,trust plays a crucial role in the IoT because trust may avoid some risks.Agents usually choose reliable users with high trust to maximize their own interests based on reinforcement learning.However,trust propagation is time-consuming,and trust changes with the interaction process in social networks.To track the dynamic changes in trust values,a dynamic trust inference algorithm named Dynamic Double DQN Trust(Dy-DDQNTrust)is proposed to predict the indirect trust values of two users without direct contact with each other.The proposed algorithm simulates the interactions among users by double DQN.Firstly,CurrentNet and TargetNet networks are used to select users for interaction.The users with high trust are chosen to interact in future iterations.Secondly,the trust value is updated dynamically until a reliable trust path is found according to the result of the interaction.Finally,the trust value between indirect users is inferred by aggregating the opinions from multiple users through a Modified Collaborative Filtering Averagebased Similarity(SMCFAvg)aggregation strategy.Experiments are carried out on the FilmTrust and the Epinions datasets.Compared with TidalTrust,MoleTrust,DDQNTrust,DyTrust and Dynamic Weighted Heuristic trust path Search algorithm(DWHS),our dynamic trust inference algorithm has higher prediction accuracy and better scalability.
基金funded in part by the National Natural Science Foundation of China under Grant No.61872038in part by the Fundamental Research Funds for the Central Universities under Grant No.FRF-GF-20-15B.
文摘Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)systems.However,conventional mode-based authentication methods(e.g.,passwords and smart cards)may be vulnerable to a broad range of attacks(e.g.,eavesdropping and side-channel attacks).Hence,there have been attempts to design biometric-based authentication solutions,which rely on physiological and behavioral characteristics.Behavioral characteristics need continuous monitoring and specific environmental settings,which can be challenging to implement in practice.However,we can also leverage Artificial Intelligence(AI)in the extraction and classification of physiological characteristics from IoT devices processing to facilitate authentication.Thus,we review the literature on the use of AI in physiological characteristics recognition pub-lished after 2015.We use the three-layer architecture of the IoT(i.e.,sensing layer,feature layer,and algorithm layer)to guide the discussion of existing approaches and their limitations.We also identify a number of future research opportunities,which will hopefully guide the design of next generation solutions.
基金Ministry of Higher Education of Malaysia under theResearch GrantLRGS/1/2019/UKM-UKM/5/2 and Princess Nourah bint Abdulrahman University for financing this researcher through Supporting Project Number(PNURSP2024R235),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘Due to the overwhelming characteristics of the Internet of Things(IoT)and its adoption in approximately every aspect of our lives,the concept of individual devices’privacy has gained prominent attention from both customers,i.e.,people,and industries as wearable devices collect sensitive information about patients(both admitted and outdoor)in smart healthcare infrastructures.In addition to privacy,outliers or noise are among the crucial issues,which are directly correlated with IoT infrastructures,as most member devices are resource-limited and could generate or transmit false data that is required to be refined before processing,i.e.,transmitting.Therefore,the development of privacy-preserving information fusion techniques is highly encouraged,especially those designed for smart IoT-enabled domains.In this paper,we are going to present an effective hybrid approach that can refine raw data values captured by the respectivemember device before transmission while preserving its privacy through the utilization of the differential privacy technique in IoT infrastructures.Sliding window,i.e.,δi based dynamic programming methodology,is implemented at the device level to ensure precise and accurate detection of outliers or noisy data,and refine it prior to activation of the respective transmission activity.Additionally,an appropriate privacy budget has been selected,which is enough to ensure the privacy of every individualmodule,i.e.,a wearable device such as a smartwatch attached to the patient’s body.In contrast,the end module,i.e.,the server in this case,can extract important information with approximately the maximum level of accuracy.Moreover,refined data has been processed by adding an appropriate nose through the Laplace mechanism to make it useless or meaningless for the adversary modules in the IoT.The proposed hybrid approach is trusted from both the device’s privacy and the integrity of the transmitted information perspectives.Simulation and analytical results have proved that the proposed privacy-preserving information fusion technique for wearable devices is an ideal solution for resource-constrained infrastructures such as IoT and the Internet ofMedical Things,where both device privacy and information integrity are important.Finally,the proposed hybrid approach is proven against well-known intruder attacks,especially those related to the privacy of the respective device in IoT infrastructures.
文摘Background: Infertility is characterized by the inability to conceive after a year of regular unprotected intercourse. Aims: This study aimed to investigate the diagnostic value of sex hormone levels during different physiological periods in the diagnosis of infertility patients. Methods: From December 2019 to May 2021, a total of 93 infertility patients were admitted and selected as the observation group. Among them, 31 cases were in the follicular stage, 31 cases in the ovulation stage, and 31 cases in the luteal stage. Ninety-three healthy women for fertility evaluation due to male infertility were selected as the control group. The control group included 31 women in the follicular phase, 31 women in the ovulatory phase, and 31 women in the luteal phase. The levels of sex hormones (prolactin (PRL), luteinizing hormone (LH), follicle-stimulating hormone (FSH), estradiol (E2), testosterone (T), and progesterone (P)) during different physiological phases were compared between the observation and control groups. Results: The follicular phase showed no significant difference in LH levels between the observation group and the control group. The observation group showed higher levels of PRL and P compared to the control group, while the levels of FSH, E2, and T were lower in the observation group compared to the control group. The ovulation phase showed no significant difference in PRL levels between the two groups. The observation group showed lower levels of LH, FSH, E2, T, and P compared to the control group. The luteal phase showed no statistical difference in E2 levels between the two groups. The observation group showed higher levels of PRL, LH, and FSH compared to the control group, while the levels of T and P were lower in the observation group compared to the control group. Conclusion: Infertile women show variations in hormone levels compared to the normal levels during the follicular phase, ovulatory phase, and luteal phase.
基金Supported by National Research Foundation of Korea,No.2018R1A2B6004867.
文摘Examining age-specific heterogeneity of susceptibility to cardiovascular disease is also essential in individuals without prediabetes to determine its relative size and direction compared to those with prediabetes.Of particular interest,age-specific heterogeneity in genetic susceptibility may exhibit opposite directions depending on the presence or absence of prediabetes.
文摘Background,aim,and scope Certain physicochemical indexes of topsoil are closely related to climatic factors including temperature,and precipitation.Understanding the relationship between modern topsoil properties and climatic factors is essential for quantitative paleoclimate reconstruction.Motuo located in the eastern Himalayas,exhibits a significant elevation gradient of over 7000 m from Nnamjagbarwa Peak(7782 m a.s.l.)to the Baxika(150 m a.s.l.).This region features a complete vertical zonation of vegetation,from alpine meadow to tropical forest,presenting an ideal place to investigate the relationships among vegetation,soil and climate conditions across altitudinal gradients.This study aims to explore the vertical variations in the physicochemical composition of topsoil and its relationship with temperature and precipitation.Materials and methods Twenty-seven topsoil samples were collected at 100 m intervals from 800 m to 3600 m a.s.l.along the southern slope of the Himalayas.Grain size,magnetic susceptibility and geochemical elements were measured to discuss the vertical variation characteristics of topsoil composition and their correlation with climatic factors.Results(1)The grain size of topsoil at different altitudes in Motuo is mainly composed of sand accounting for an averaged 53.2%,followed by silt and clay.(2)In the mixed forest zone,frequency dependent magnetic susceptibility(χfd%)shows a clear relationship with altitude,and clay is positively correlated with both altitude and climatic factors.(3)The oxides of topsoil in this area mainly consist of SiO_(2),Al_(2)O_(3) and Fe_(2)O_(3),followed by MgO,CaO,Na_(2)O and K_(2)O,with slight variations in the primary components at different altitudes.The sensitivity of elements to climate varies across different altitudes and vegetation zone,likely due to the region’s complex topography and vegetation.(4)Physical and biological weathering dominates in the broad-leaved forest zone of Motuo,while chemical weathering is more prominent in the coniferous forest zone,with the mixed forest zone falling in between.Discussion The formation of topsoil across the three vegetation zones is influenced by various factors,including parent material,vegetation,and climate.In the broad-leaved forest zone,physical weathering(precipitation,root wedging etc.)and pedogenesis dominate,resulting in finer grain size.The χ_(fd)% increases with altitude likely due to the high temperature and abundant precipitation in this zone,which facilitate the transformation of strong magnetic miners into weaker ones,particularly when the soil is oversaturated.Zirconium(Zr),primarily found in zircon,is depleted at lower altitudes by strong current erosion.Barium(Ba)is similarly reduced at low altitudes in this zone.In mixed forest zone,clay content is the lowest,indicating weaker physical weathering conditions than broad-leaved forest zone.The coarser grain size may result from the combined effects of topography and vegetation coverage.Magnetic susceptibility and organic matter show a positive correlation with altitude.Zr concentration is higher than that in the broad-leaved forest zone,likely resulting from decreased precipitation.In the coniferous zone,the clay content shows considerable fluctuations,with grain size generally becoming finer as altitude increases.This trend may be explained by intensified soil disintegration from seasonal freeze-thaw cycles.The χ_(fd)% values lack a clear trend or pattern,possibly due to soil erosion causing the migration of magnetic minerals or insufficient iron precipitation,which reduces the concentration of magnetic minerals in the soil.Additionally,a positive correlation is observed between altitude and organic matter content,with higher altitudes associated with greater organic matter accumulation.This may be attributed to lower microbial activity in colder conditions,which slows the decomposition and transformation of organic matter.Conclusions The variations in grain size,magnetic susceptibility,and geochemical elements differ across altitudes and vegetation zones,closely connected to the complex interplay of terrain,vegetation,and climate in Motuo.In the mixed forest,altitude has a significant impact onχfd%,and the clay component is particularly sensitive to changes in altitude,mean annual temperature,and precipitation.Zr shows a strong correlation with altitude and climate factors,making it a valuable indicator for assessing changes in atmospheric precipitation within specific altitude ranges.Recommendations and perspectives This study enhances our understanding of the relationships between the physicochemical properties of topsoil and climate conditions,offering valuable insights for paleoclimate reconstruction in Motuo.
文摘Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of things (devices) that can be connected through the internet. The purpose: this paper aims to explore the concept of the Internet of Things (IoT) generally and outline the main definitions of IoT. The paper also aims to examine and discuss the obstacles and potential benefits of IoT in Saudi universities. Methodology: the researchers reviewed the previous literature and focused on several databases to use the recent studies and research related to the IoT. Then, the researchers also used quantitative methodology to examine the factors affecting the obstacles and potential benefits of IoT. The data were collected by using a questionnaire distributed online among academic staff and a total of 150 participants completed the survey. Finding: the result of this study reveals there are twelve factors that affect the potential benefits of using IoT such as reducing human errors, increasing business income and worker’s productivity. It also shows the eighteen factors which affect obstacles the IoT use, for example sensors’ cost, data privacy, and data security. These factors have the most influence on using IoT in Saudi universities.
基金Supported by Technological Innovation and Application Demonstration Project of Chongqing City(cstc2018jscx-msybX0367).
文摘[Objectives]This study was conducted to screen suitable seed stems of Fritillaria thunbergii Miq.from different provenances and to provide a theoretical basis for the high-yielding and high-efficiency cultivation of F.thunbergii Miq.introduced to different places.[Methods]F.thunbergii Miq.from four different provenances including Zhejiang,Nantong and Chongqing were introduced and cultivated in Wanzhou of Chongqing.The contents of available Zn,Fe,Mn,Cu,Mo,N,P,K,Ca and Mg in rhizosphere soil of F.thunbergii Miq.during five growing stages were determined after selecting different stem sizes for field cultivation.[Results]Small stems of Pan an and Ningbo provenances(SSG3,121-160/kg)and middle stems of Nantong and Fengjie provenances(SSG2,81-120/kg)showed higher soil availability.[Conclusions]In the process of introduction and cultivation of F.thunbergii Miq.,high yield and high efficiency can be achieved by selecting smaller seed stems of F.thunbergii Miq.
基金sponsored by National Key Research and Development Program of China(2023YFC3504200)High Level Key Discipline Construction of Traditional Chinese Medicine(zyyzdxk-2023272).
文摘Background:In this study,we explored the effects of different processing methods on the quality of Polygonatum cyrtonema Hua(PC),and the role of Huangjiu in the processing procedure.Methods:The sensory characteristics of the crude product,steamed product,and wine-processed product of PC were described.The colorimeter was used to analyze the chromatic values of three different processed products on PC.At the same time,the contents of the water extract and alcohol extract were measured separately.The content of three different processing Polygonatum Polysaccharide(PCP)was determined using 0.2%anthrone-sulfuric acid.The correlation difference between the chromatic values and chemical composition of different PC products was analyzed using various analytical methods.Results:The surface colors gradually deepened,the sweetness increased,the viscosity strengthened,and the tongue-numbing sensation disappeared after PC processing.The contents of extract and L^(*) gradually decreased from the crude to the steamed to the wine-processed product,consistent with the pattern of surface color alteration.While,E^(*)ab gradually increased.The content of PCP was crude product>wine-processed product>steamed product.The results of multivariate statistical analysis showed that the samples processed for crude,steamed,and wine-processed product were clustered into three classes.The correlation analysis showed that L^(*)and E^(*)ab were highly significant positively correlated with the content of PCP,and a*was significantly negatively correlated with the content of PCP.Conclusion:The results showed that the wine-processed product had the best quality.The internal quality of the PC was correlated with its characteristics and chromatic value.In this study,we investigated the internal and external quality of three different products of PC in order to provide a reference for further research on the impact of different processing methods on PC quality,the standardization of PC processing,and the role of Huangjiu in the processing of PC.
基金Natural Science Foundation of Shanxi Province(No.201801D121358)"Basic Research Special Project"of Shanxi University of Tradit Chin Med Science and Technology Innovation Ability Cultivation Program(No.2021PY-JC-13)。
文摘Objective:To investigate the mechanism of JAK2/STAT3/SOCS1 signaling pathway in electroacupuncture of different acupoints on acute colitis rats.Methods:36 SPF SD rats were randomly divided into 6 groups,with 6 rats in each group.The rat model of acute colitis was prepared by enema with glacial acetic acid solution.After the model was established,electroacupuncture was given to each acupoint group,with density wave,frequency 2Hz-50 Hz,intensity 2 mA,muscle tremor as the degree 20 min/time,1 time/day,for 3 consecutive days.Observe the general condition of rats;the pathological changes of colonic mucosa in rats were observed by HE method.The contents of serum interleukin-4(IL-4)and interleukin-8(IL-8)were detected by ELISA.Western blot and RT-PCR were used to detect the expression of JAK2,STAT3,SOCS1 protein and mRNA in rat colon tissue.Results:In contrast to the normal group,the overall condition of the model group was worse,the colonic mucosa was severely damaged,even necrotic,and the ulcer surface was obvious.The content of IL-4 in serum was obviously reduced,and the content of IL-8 was obviously go up(P<0.01).The protein content of JAK2,STAT3 and the expression of JAK2,STAT3 mRNA in colon tissue of rats were obviously go up,while the protein content of SOCS1 and the expression of SOCS1 mRNA were obviously reduced(P<0.01).In contrast to the model group,the general condition of rats in each acupoint group was significantly improved,the damage and necrosis of colonic mucosa and ulcer surface were obviously alleviated,the content of IL-4 in serum was obviously go up,and the content of IL-8 was significantly decreased(P<0.01).The protein content of JAK2,STAT3 and the expression of JAK2,STAT3 mRNA in colon tissue of rats were obviously reduced,while the protein content of SOCS1 and the expression of SOCS1 mRNA were obviously go up(P<0.05,P<0.01).Comparison of different acupoint groups,the colonic mucosal injury in the Zusanli group was significantly reduced,the content of serum IL-4 was significantly increased,and the content of IL-8 was significantly decreased(P<0.05,P<0.01).The protein content and mRNA expression of JAK2 and STAT3 in colon tissue were significantly down-regulated,while the protein content and mRNA expression of SOCS1 were significantly go up(P<0.05,P<0.01).Conclusion:Electroacupuncture at each acupoint can improve the damage of colonic mucosa and reduce the inflammatory response.The therapeutic effect of Zusanli(ST36)is better than that of Tianshu(ST25),Dachangshu(BL25)and Shangjuxu(ST37).The mechanism may be related to the regulation of JAK2/STAT3/SOCS1 signaling pathway related proteins and inflammatory cytokines IL-4 and IL-8.
文摘This article proposes a comprehensive monitoring system for tunnel operation to address the risks associated with tunnel operations.These risks include safety control risks,increased traffic flow,extreme weather events,and movement of tectonic plates.The proposed system is based on the Internet of Things and artificial intelligence identification technology.The monitoring system will cover various aspects of tunnel operations,such as the slope of the entrance,the structural safety of the cave body,toxic and harmful gases that may appear during operation,excessively high and low-temperature humidity,poor illumination,water leakage or road water accumulation caused by extreme weather,combustion and smoke caused by fires,and more.The system will enable comprehensive monitoring and early warning of fire protection systems,accident vehicles,and overheating vehicles.This will effectively improve safety during tunnel operation.
文摘With the rapid development of the Internet of Things(IoT)technology,fiber-optic sensors,as a kind of high-precision and high-sensitivity measurement tool,are increasingly widely used in the field of IoT.This paper outlines the advantages of fiber-optic sensors over traditional sensors,such as high precision,strong resistance to electromagnetic interference,and long transmission distance.On this basis,the paper discusses the application scenarios of fiber-optic sensors in the Internet of Things,including environmental monitoring,intelligent industry,medical and health care,intelligent transportation,and other fields.It is hoped that this study can provide theoretical support and practical guidance for the further development of fiber-optic sensors in the field of the Internet of Things,as well as promote the innovation and application of IoT.
基金Phased Achievement of the National College Student Innovation and Entrepreneurship Training Project“Time Bay-A Group Elderly Care Service Platform Based on Internet of Things Technology”(S202013836008X)2021 Chongqing Education Commission Science and Technology Research Program Youth Project(KJQN202105501).
文摘With the continuous intensification of global aging,the issue of elderly care has become an increasingly prominent social problem.The Internet of Things(IoT)technology,as an emerging field,holds broad application prospects.This article focuses on the application of IoT technology in group elderly care services and constructs a quality evaluation system for these services based on IoT technology.Through the analysis of practical application cases,the advantages and challenges of IoT technology in group elderly care services have been examined,confirming the feasibility and effectiveness of the evaluation system.
文摘In Bahawalpur,a cross-sectional study assessed depression prevalence across age and gender groups,involving 442 participants from diverse socioeconomic backgrounds and settings.Utilizing the PHQ9 questionnaire,84%were found to meet depression levels.The findings revealed a higher incidence in females(88%)than males(79%),with the greatest disparity among young adults,particularly young women,due to factors like academic pressure and financial stress.School children had the lowest depression rates(68%),possibly due to better immunity.Elderly individuals exhibited more severe depression,likely related to aging and domestic challenges.The study’s findings highlight a significant variation in depression severity across different demographic groups,with an overall higher incidence in women.The research underscores the necessity for targeted mental health resources and interventions tailored to the specific needs of each demographic group.It also points to the importance of addressing academic and socioeconomic stressors to mitigate depression,particularly among young women.While the study provides valuable insights,it relies on self-reported data,which may introduce bias.Therefore,future research should include clinical assessments to validate these findings and ensure a more accurate representation of depression within the community.
基金Under the auspices of National Natural Science Foundation of China(No.42276234)National Social Science Foundation Major Project of China(No.23&ZD105)+1 种基金the Open Fund of the Key Laboratory of Coastal Zone Exploitation and Protection,Ministry of Natural Resources of China(No.2023CZEPK04)the Science and Technology Major Project of Ningbo(No.2021Z181)。
文摘Urban agglomerations,serving as pivotal centers of human activity,undergo swift alterations in ecosystem services prompted by shifts in land utilization.Strengthening the monitoring of ecosystem services in present and future urban agglomerations contributes to the rational planning of these areas and enhances the well-being of their inhabitants.Here,we analyzed land use conversion in the Yangtze River Delta(YRD)urban agglomeration during 1990-2020 and discussed the spatiotemporal response and main drivers of changes in ecosystem service value(ESV).By considering the different development strategic directions described in land use planning policies,we predicted land use conversion and its impact on ESV using the Future Land Use Simulation(FLUS)model in three scenari-os in 2025 and 2030.Results show that:1)from 1990 to 2020,land use change is mainly manifested as the continuous expansion of con-struction land to cultivated land.Among the reduced cultivated land,82.2%were occupied by construction land.2)The land use types conversion caused a loss of 21.85 billion yuan(RMB)in ESV during 1990-2020.Moreover,the large reduction of cultivated land area led to the continuous decline of food production value,accounting for 13%of the total ESV loss.3)From 2020 to 2030,land use change will mainly focus on Yangzhou and Zhenjiang in central Jiangsu Province and Taizhou in southern Zhejiang Province.Under the BAU(natural development)and ED(cultivated land protection)scenarios,construction land expansion remains dominant.In contrast,under the EP(ecological protection)scenario,the areas of water bodies and forest land increase significantly.Among the different scenarios,ESV is highest in the EP scenario,making it the optimal solution for sustainable land use.It can be seen that the space use conflict among urban,agriculture and ecology is a key factor leading to ESV change in the urban agglomeration of Yangtze River Delta.There-fore,it is crucial to maintain spatial land use coordination.Our findings provide suggestions for scientific and rational land use planning for the urban agglomeration.