期刊文献+
共找到311,810篇文章
< 1 2 250 >
每页显示 20 50 100
Behaviour recognition based on the integration of multigranular motion features in the Internet of Things
1
作者 Lizong Zhang Yiming Wang +3 位作者 Ke Yan Yi Su Nawaf Alharbe Shuxin Feng 《Digital Communications and Networks》 SCIE CSCD 2024年第3期666-675,共10页
With the adoption of cutting-edge communication technologies such as 5G/6G systems and the extensive development of devices,crowdsensing systems in the Internet of Things(IoT)are now conducting complicated video analy... With the adoption of cutting-edge communication technologies such as 5G/6G systems and the extensive development of devices,crowdsensing systems in the Internet of Things(IoT)are now conducting complicated video analysis tasks such as behaviour recognition.These applications have dramatically increased the diversity of IoT systems.Specifically,behaviour recognition in videos usually requires a combinatorial analysis of the spatial information about objects and information about their dynamic actions in the temporal dimension.Behaviour recognition may even rely more on the modeling of temporal information containing short-range and long-range motions,in contrast to computer vision tasks involving images that focus on understanding spatial information.However,current solutions fail to jointly and comprehensively analyse short-range motions between adjacent frames and long-range temporal aggregations at large scales in videos.In this paper,we propose a novel behaviour recognition method based on the integration of multigranular(IMG)motion features,which can provide support for deploying video analysis in multimedia IoT crowdsensing systems.In particular,we achieve reliable motion information modeling by integrating a channel attention-based short-term motion feature enhancement module(CSEM)and a cascaded long-term motion feature integration module(CLIM).We evaluate our model on several action recognition benchmarks,such as HMDB51,Something-Something and UCF101.The experimental results demonstrate that our approach outperforms the previous state-of-the-art methods,which confirms its effective-ness and efficiency. 展开更多
关键词 Behaviour recognition Motion features Attention mechanism Internet of things Crowdsensing
下载PDF
Development Level and Dynamic Analysis of the Integration of Three Rural Industries in the Context of Rural Revitalization
2
作者 Longling LI Zijian LONG 《Asian Agricultural Research》 2024年第9期1-6,10,共7页
As a key measure to comprehensively promote the strategy of rural revitalization,especially in the field of industrial prosperity,the integration of rural three industries is of great strategic significance.In this st... As a key measure to comprehensively promote the strategy of rural revitalization,especially in the field of industrial prosperity,the integration of rural three industries is of great strategic significance.In this study,entropy method and TOPSIS method were employed to calculate the comprehensive evaluation index of integration of three industries and the ideal development value respectively.The development status of integration of three rural industries was systematically evaluated,and the development trend of different regions was compared and analyzed.The results indicate that the development index of integration of three industries showed a steady growth trend,among which the development level of Jiangsu Province ranked first,followed by Hubei Province,while the development level of Shaanxi Province was relatively low.When analyzing the Level I indicators of integration of three rural industries,the contribution of industrial integration behavior exceeded the performance of industrial integration.Among the behavioral indicators of industrial integration,the weight of agricultural multi-functionality and service integration was relatively large,which plays a significant role in promoting the development of integration of three rural industries.The scores and growth rates of Jiangsu Province in increasing farmers income,increasing agricultural production and rural economic development were higher than those of other regions,while Shaanxi Province still had a certain gap in rural industrial integration indicators compared with Jiangsu Province and Hubei Province.In view of this,we came up with some strategic recommendations for further promoting the development of integration of three rural industries. 展开更多
关键词 integration of three industries Entropy method TOPSIS method Rural revitalization
下载PDF
Research on the Teaching Mode Innovation of Computer Majors Under the Background of Industry and Education Integration
3
作者 Xiyou Wang 《Journal of Contemporary Educational Research》 2024年第6期77-82,共6页
With the rapid development of the times,the continuous innovation of teaching concepts,and the deficiency of the traditional computer teaching mode,the rapid development of computer technology has put forward higher r... With the rapid development of the times,the continuous innovation of teaching concepts,and the deficiency of the traditional computer teaching mode,the rapid development of computer technology has put forward higher requirements of the teaching mode,so it is imperative to carry on the innovation of teaching mode for computer majors.Combined with the development needs of computer technology in today’s society,this paper combs the shortcomings of the existing teaching mode.Under the background of the integration of industry and education,this paper puts forward the tripartite cooperation mode with students as the core,schools as the bridge,and enterprises as the support,and establishes a new mechanism of the teaching mode of computer majors under the background of the integration of industry and education.This way of learning theory on campus and practicing in society will supplement and strengthen students’professional ability needs in the environment of the rapid development of computers in the future. 展开更多
关键词 integration of industry and education Computer teaching Teaching and practice
下载PDF
Discussion on the Integration of“Post,Course,Competition,Certificate”:Taking the Internet of Things Application Technology Courses in Higher Vocational Colleges as an Example
4
作者 Dongmei He 《Journal of Contemporary Educational Research》 2024年第9期25-31,共7页
This article explores the development of the Internet of Things(IoT)application technology course in higher vocational colleges under the background of“post,course,competition,certificate.”It first emphasizes the im... This article explores the development of the Internet of Things(IoT)application technology course in higher vocational colleges under the background of“post,course,competition,certificate.”It first emphasizes the importance of IoT talent training and course construction in higher vocational colleges and deeply analyzes the core concept of“post,course,competition,certificate”integration.In view of the problems faced in the course construction of IoT application technology in higher vocational colleges and the practical experience of Tianjin Vocational College of Mechanics and Electricity,the implementation strategy of the course construction of IoT application technology in higher vocational colleges is elaborated in detail based on the integrated concept of“post,course,competition,certificate.” 展开更多
关键词 Post course competition certificate Course construction integration of industry and education
下载PDF
Challenges and improvement strategies in the hospitalization of chronic multimorbid patients
5
作者 Andres Fontalba-Navas Francisco Pozo Muñoz +4 位作者 Rogelio Garcia Cisneros Maria Jose Garcia Larrosa Maria del Mar Callejon Gil Ignacio Garcia Delgado Maria Belen Jimenez Martinez 《World Journal of Clinical Cases》 SCIE 2025年第3期35-41,共7页
BACKGROUND Addressing the growing challenge of hospitalizing chronic multimorbid patients,this study examines the strain these conditions impose on healthcare systems at a local level,focusing on a pilot program.Chron... BACKGROUND Addressing the growing challenge of hospitalizing chronic multimorbid patients,this study examines the strain these conditions impose on healthcare systems at a local level,focusing on a pilot program.Chronic diseases and complex patients require comprehensive management strategies to reduce healthcare burdens and improve patient outcomes.If proven effective,this pilot model has the potential to be replicated in other healthcare settings to enhance the management of chronic multimorbid patients.AIM To evaluate the effectiveness of the high complexity unit(HCU)in managing chronic multimorbid patients through a multidisciplinary care model and to compare it with standard hospital care.METHODS The study employed a descriptive longitudinal approach,analyzing data from the Basic Minimum Data Set(BMDS)to compare hospitalization variables among the HCU,the Internal Medicine Service,and other services at Antequera Hospital throughout 2022.The HCU,designed for patients with complex chronic conditions,integrates a patient-centered model emphasizing multidisciplinary care and continuity post-discharge.RESULTS The study employed a descriptive longitudinal approach,analyzing data from the BMDS to compare hospitalization variables among the HCU,the Internal Medicine Service,and other services at Antequera Hospital throughout 2022.The HCU,designed for patients with complex chronic conditions,integrates a patient-centered model emphasizing multidisciplinary care and continuity post-discharge.CONCLUSION This study demonstrates the effectiveness of the HCU in managing patients with complex chronic diseases through a multidisciplinary approach.The coordinated care provided by the HCU results in improved patient outcomes,reduced unnecessary hospitalizations,and better management of patient complexity.The superiority of the HCU compared to standard care is evident in key outcomes such as fewer readmissions and higher patient satisfaction,reinforcing its value as a model of care to be replicated. 展开更多
关键词 High complexity unit Chronic multimorbidity Patient-centered care Integrated care Healthcare management
下载PDF
Cohort study on the treatment of BRAF V600E mutant metastatic colorectal cancer with integrated Chinese and western medicine
6
作者 Jiang-Yu Bian Yu-Fang Feng +1 位作者 Wen-Ting He Tong Zhang 《World Journal of Clinical Oncology》 2025年第1期25-33,共9页
BACKGROUND Patients with BRAF V600E mutant metastatic colorectal cancer(mCRC)have a low incidence rate,poor biological activity,suboptimal response to conventional treatments,and a poor prognosis.In the previous cohor... BACKGROUND Patients with BRAF V600E mutant metastatic colorectal cancer(mCRC)have a low incidence rate,poor biological activity,suboptimal response to conventional treatments,and a poor prognosis.In the previous cohort study on mCRC conducted by our team,it was observed that integrated Chinese and Western medicine treatment could significantly prolong the overall survival(OS)of patients with colorectal cancer.Therefore,we further explored the survival benefits in the population with BRAF V600E mutant mCRC.AIM To evaluate the efficacy of integrated Chinese and Western medicine in the treatment of BRAF V600E mutant metastatic colorectal cancer.METHODS A cohort study was conducted on patients with BRAF V600E mutant metastatic colorectal cancer admitted to Xiyuan Hospital of China Academy of Chinese Medical Sciences and Traditional Chinese Medicine Hospital of Xinjiang Uygur Autonomous Region from January 2016 to December 2022.The patients were divided into two cohorts.RESULTS A total of 34 cases were included,with 23 in Chinese-Western medicine cohort(cohort A)and 11 in Western medicine cohort(cohort B).The median overall survival was 19.9 months in cohort A and 14.2 months in cohort B,with a statistically significant difference(P=0.038,hazard ratio=0.46).The 1-3-year survival rates were 95.65%(22/23),39.13%(9/23),and 26.09%(6/23)in cohort A,and 63.64%(7/11),18.18%(2/11),and 9.09%(1/11)in cohort B,respectively.Subgroup analysis showed statistically significant differences in median OS between the two cohorts in the right colon,liver metastasis,chemotherapy,and first-line treatment subgroups(P<0.05).CONCLUSION Integrated Chinese and Western medicine can prolong the survival and reduce the risk of death in patients with BRAF V600E mutant metastatic colorectal cancer,with more pronounced benefits observed in patients with right colon involvement,liver metastasis,combined chemotherapy,and first-line treatment. 展开更多
关键词 Metastatic colorectal cancer BRAF V600E mutation Integrated Chinese and Western medicine Cohort study
下载PDF
Securing the Internet of Health Things with Certificateless Anonymous Authentication Scheme
7
作者 Nisreen Innab 《Computers, Materials & Continua》 SCIE EI 2024年第8期2237-2258,共22页
Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible t... Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes. 展开更多
关键词 Internet of things internet of health things security authentication hyperelliptic curve cryptography
下载PDF
Mechanistic insights into the amelioration effects of diabetic cardiomyopathy by berberine:an integrated systems pharmacology study and experimental validation
8
作者 Hui-Min Ji Wen Yang +10 位作者 Yu Hua Yi-Xuan Sun Ao-Di Li Yue Jiang Zi-Qi Ye Min Lei Xi-Ying Guo Xiu-Fen Liu Ning-Hua Wu Huan-Bo Cheng Qing-Jie Chen 《Traditional Medicine Research》 2025年第3期42-55,共14页
Background:Diabetic cardiomyopathy(DCM)is a type of cardiomyopathy caused by long-term diabetes,characterized by abnormal myocardial structure and function,which can lead to heart failure.Berberine(BBR),a quaternary a... Background:Diabetic cardiomyopathy(DCM)is a type of cardiomyopathy caused by long-term diabetes,characterized by abnormal myocardial structure and function,which can lead to heart failure.Berberine(BBR),a quaternary ammonium alkaloid isolated from Coptidis Rhizoma,a traditional Chinese medicine,has superior anti-diabetic and heart-protective properties.The purpose of this study is to assess the impact of BBR on DCM.Methods:This study used a systems pharmacology approach to evaluate the related proteins and signalling pathways between BBR and DCM targets,combined with experimental validation using diabetic mouse heart sections.Microstructural and pathological changes were observed using Hematoxylin-eosin,Masson’s trichrome stain and wheat germ agglutinin staining.Immunofluorescence and western blot were used to determine protein expression.Results:The results indicate that BBR and DCM share 21 core relevant targets,with cross-targets predominantly located in mitochondrial,endoplasmic reticulum,and plasma membrane components.BBR exerts its main effects in improving DCM by maintaining mitochondrial integrity,particularly involving the PI3K-AKT-GSK3βand apoptosis signalling pathways.In addition,post-treatment changes in the key targets of BBR,including cysteine aspartate specific protease(Caspase)-3,phosphoinositide 3-kinase(PI3K)and mitochondria-related proteins,are suggestive of its efficacy.Conclusion:BBR crucially improves DCM by maintaining mitochondrial integrity,inhibiting apoptosis,and modulating PI3K-AKT-GSK3βsignaling.Further studies must address animal model limitations and validate clinical efficacy to understand BBR’s mechanisms fully and its potential clinical use. 展开更多
关键词 BERBERINE APOPTOSIS integrated systems pharmacology diabetic cardiomyopathy
下载PDF
A Hybrid and Lightweight Device-to-Server Authentication Technique for the Internet of Things
9
作者 Shaha Al-Otaibi Rahim Khan +3 位作者 Hashim Ali Aftab Ahmed Khan Amir Saeed Jehad Ali 《Computers, Materials & Continua》 SCIE EI 2024年第3期3805-3823,共19页
The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective se... The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λ_(i) of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server S_(j) and members C_(i),with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs. 展开更多
关键词 Internet of things AUtheNTICITY security LOCATION communication
下载PDF
Internet of Things Authentication Protocols: Comparative Study
10
作者 Souhayla Dargaoui Mourade Azrour +3 位作者 Ahmad ElAllaoui Azidine Guezzaz Abdulatif Alabdulatif Abdullah Alnajim 《Computers, Materials & Continua》 SCIE EI 2024年第4期65-91,共27页
Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is ... Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still thebiggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services providedby an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures,data, and devices. Authentication, as the first line of defense against security threats, becomes the priority ofeveryone. It can either grant or deny users access to resources according to their legitimacy. As a result, studyingand researching authentication issues within IoT is extremely important. As a result, studying and researchingauthentication issues within IoT is extremely important. This article presents a comparative study of recent researchin IoT security;it provides an analysis of recent authentication protocols from2019 to 2023 that cover several areaswithin IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security researchsummary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. Itillustrates that the resistance of protocols against attacks, and their computational and communication cost arelinked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemesand provides some future research directions. 展开更多
关键词 ATTACKS CRYPTOGRAPHY Internet of things SECURITY AUtheNTICATION
下载PDF
Spireoside Controls Blast Disease by Disrupting Membrane Integrity of Magnaporthe oryzae
11
作者 XU Liting HE Kaiwei +13 位作者 GUO Chunyu QUAN Cantao MA Yahuan ZHANG Wei REN Lifen WANG Long SONG Li OUYANG Qing YIN Junjie ZHU Xiaobo TANG Yongyan HE Min CHEN Xuewei LI Weitao 《Rice science》 2025年第1期107-117,I0061-I0066,共17页
The application of fungicides is an effective strategy for controlling plant diseases.Among these agents,plant-derived antifungal metabolites are particularly promising due to their eco-friendly and sustainable nature... The application of fungicides is an effective strategy for controlling plant diseases.Among these agents,plant-derived antifungal metabolites are particularly promising due to their eco-friendly and sustainable nature.Plant secondary metabolites typically exhibit broad-spectrum antifungal activity without selective toxicity against pathogens.However,only a small fraction of antifungal metabolites have been identified from the tens of thousands of known plant secondary metabolites.In this study,we conducted a metabolomic analysis on both blast-resistant(Digu)and-susceptible(Lijiangxintuanheigu)rice varieties to uncover novel metabolites that enhance blast resistance.We found that 24 and 48 h post-inoculation with Magnaporthe oryzae were critical time points for metabolomic profiling,based on the infected status of M.oryzae in rice and the observed differences in shikimate accumulation between the two varieties.Following metabolomic analysis,we identified nine flavonoids that were differentially accumulated and are considered potential candidates for disease control.Among these,apigenin-7-glucoside,rhamnetin,and spireoside were found to be effective in controlling blast disease,with spireoside demonstrating the most pronounced efficacy.We discovered that spireoside controlled blast disease by inhibiting both spore germination and appressorium formation in M.oryzae,primarily through disrupting cell membrane integrity.However,spireoside did not induce rice immunity.Furthermore,spireoside was also effective in controlling sheath blight disease.Thus,spireoside shows considerable promise as a candidate for the development of a fungicide for controlling plant diseases. 展开更多
关键词 appressorium formation blast disease membrane integrity RESISTANCE spireoside spore germination sheath blight disease
下载PDF
Vector Dominance with Threshold Searchable Encryption (VDTSE) for the Internet of Things
12
作者 Jingjing Nie Zhenhua Chen 《Computers, Materials & Continua》 SCIE EI 2024年第6期4763-4779,共17页
The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which ... The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which is essential in smart healthcare.However,Personal Health Records(PHRs)are normally kept in public cloud servers controlled by IoMT service providers,so privacy and security incidents may be frequent.Fortunately,Searchable Encryption(SE),which can be used to execute queries on encrypted data,can address the issue above.Nevertheless,most existing SE schemes cannot solve the vector dominance threshold problem.In response to this,we present a SE scheme called Vector Dominance with Threshold Searchable Encryption(VDTSE)in this study.We use a Lagrangian polynomial technique and convert the vector dominance threshold problem into a constraint that the number of two equal-length vectors’corresponding bits excluding wildcards is not less than a threshold t.Then,we solve the problem using the proposed technique modified in Hidden Vector Encryption(HVE).This technique makes the trapdoor size linear to the number of attributes and thus much smaller than that of other similar SE schemes.A rigorous experimental analysis of a specific application for privacy-preserving diabetes demonstrates the feasibility of the proposed VDTSE scheme. 展开更多
关键词 Internet of things(IoT) Internet of Medical things(IoMT) vector dominance with threshold searchable encryption(VDTSE) threshold comparison electronic healthcare
下载PDF
A dynamic algorithm for trust inference based on double DQN in the internet of things
13
作者 Xiaodong Zhuang Xiangrong Tong 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1024-1034,共11页
The development of the Internet of Things(IoT)has brought great convenience to people.However,some information security problems such as privacy leakage are caused by communicating with risky users.It is a challenge t... The development of the Internet of Things(IoT)has brought great convenience to people.However,some information security problems such as privacy leakage are caused by communicating with risky users.It is a challenge to choose reliable users with which to interact in the IoT.Therefore,trust plays a crucial role in the IoT because trust may avoid some risks.Agents usually choose reliable users with high trust to maximize their own interests based on reinforcement learning.However,trust propagation is time-consuming,and trust changes with the interaction process in social networks.To track the dynamic changes in trust values,a dynamic trust inference algorithm named Dynamic Double DQN Trust(Dy-DDQNTrust)is proposed to predict the indirect trust values of two users without direct contact with each other.The proposed algorithm simulates the interactions among users by double DQN.Firstly,CurrentNet and TargetNet networks are used to select users for interaction.The users with high trust are chosen to interact in future iterations.Secondly,the trust value is updated dynamically until a reliable trust path is found according to the result of the interaction.Finally,the trust value between indirect users is inferred by aggregating the opinions from multiple users through a Modified Collaborative Filtering Averagebased Similarity(SMCFAvg)aggregation strategy.Experiments are carried out on the FilmTrust and the Epinions datasets.Compared with TidalTrust,MoleTrust,DDQNTrust,DyTrust and Dynamic Weighted Heuristic trust path Search algorithm(DWHS),our dynamic trust inference algorithm has higher prediction accuracy and better scalability. 展开更多
关键词 Internet of things Information security Reinforcement learning Trust propagation Trust inference
下载PDF
Artificial intelligence in physiological characteristics recognition for internet of things authentication
14
作者 Zhimin Zhang Huansheng Ning +2 位作者 Fadi Farha Jianguo Ding Kim-Kwang Raymond Choo 《Digital Communications and Networks》 SCIE CSCD 2024年第3期740-755,共16页
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)systems.However,conventional mode-based authentication methods(e.g.,passwords and sm... Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)systems.However,conventional mode-based authentication methods(e.g.,passwords and smart cards)may be vulnerable to a broad range of attacks(e.g.,eavesdropping and side-channel attacks).Hence,there have been attempts to design biometric-based authentication solutions,which rely on physiological and behavioral characteristics.Behavioral characteristics need continuous monitoring and specific environmental settings,which can be challenging to implement in practice.However,we can also leverage Artificial Intelligence(AI)in the extraction and classification of physiological characteristics from IoT devices processing to facilitate authentication.Thus,we review the literature on the use of AI in physiological characteristics recognition pub-lished after 2015.We use the three-layer architecture of the IoT(i.e.,sensing layer,feature layer,and algorithm layer)to guide the discussion of existing approaches and their limitations.We also identify a number of future research opportunities,which will hopefully guide the design of next generation solutions. 展开更多
关键词 Physiological characteristics recognition Artificial intelligence Internet of things Biological-driven authentication
下载PDF
Research on the Integration Path of Enterprise Management Accounting and Financial Accounting: Taking Construction Enterprises as an Example 被引量:1
15
作者 Yanxue Yang 《Proceedings of Business and Economic Studies》 2024年第6期119-124,共6页
The rapid pace of economic globalization has presented both unprecedented opportunities and challenges for the construction industry.Management accounting and financial accounting,as integral components of enterprise ... The rapid pace of economic globalization has presented both unprecedented opportunities and challenges for the construction industry.Management accounting and financial accounting,as integral components of enterprise management,play indispensable roles in the development of construction companies.While both disciplines possess distinct characteristics,the evolving business landscape necessitates a more integrated approach.By combining the strengths and values of both,construction companies can gain valuable insights and make informed decisions.This paper delves into the concepts of management accounting and financial accounting,explores the feasibility of their integration within construction companies,and provides recommendations for implementation to foster sustainable development.The insights and strategies presented in this paper can serve as a valuable reference for other construction companies seeking to optimize their management and operations. 展开更多
关键词 Management accounting Financial accounting integration path Case analysis
下载PDF
The Machine Learning Ensemble for Analyzing Internet of Things Networks:Botnet Detection and Device Identification
16
作者 Seung-Ju Han Seong-Su Yoon Ieck-Chae Euom 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第11期1495-1518,共24页
The rapid proliferation of Internet of Things(IoT)technology has facilitated automation across various sectors.Nevertheless,this advancement has also resulted in a notable surge in cyberattacks,notably botnets.As a re... The rapid proliferation of Internet of Things(IoT)technology has facilitated automation across various sectors.Nevertheless,this advancement has also resulted in a notable surge in cyberattacks,notably botnets.As a result,research on network analysis has become vital.Machine learning-based techniques for network analysis provide a more extensive and adaptable approach in comparison to traditional rule-based methods.In this paper,we propose a framework for analyzing communications between IoT devices using supervised learning and ensemble techniques and present experimental results that validate the efficacy of the proposed framework.The results indicate that using the proposed ensemble techniques improves accuracy by up to 1.7%compared to single-algorithm approaches.These results also suggest that the proposed framework can flexibly adapt to general IoT network analysis scenarios.Unlike existing frameworks,which only exhibit high performance in specific situations,the proposed framework can serve as a fundamental approach for addressing a wide range of issues. 展开更多
关键词 Internet of things machine learning traffic analysis botnet detection device identification
下载PDF
Privacy-Preserving Information Fusion Technique for Device to Server-Enabled Communication in the Internet of Things:A Hybrid Approach
17
作者 Amal Al-Rasheed Rahim Khan +3 位作者 Tahani Alsaed Mahwish Kundi Mohamad Hanif Md.Saad Mahidur R.Sarker 《Computers, Materials & Continua》 SCIE EI 2024年第7期1305-1323,共19页
Due to the overwhelming characteristics of the Internet of Things(IoT)and its adoption in approximately every aspect of our lives,the concept of individual devices’privacy has gained prominent attention from both cus... Due to the overwhelming characteristics of the Internet of Things(IoT)and its adoption in approximately every aspect of our lives,the concept of individual devices’privacy has gained prominent attention from both customers,i.e.,people,and industries as wearable devices collect sensitive information about patients(both admitted and outdoor)in smart healthcare infrastructures.In addition to privacy,outliers or noise are among the crucial issues,which are directly correlated with IoT infrastructures,as most member devices are resource-limited and could generate or transmit false data that is required to be refined before processing,i.e.,transmitting.Therefore,the development of privacy-preserving information fusion techniques is highly encouraged,especially those designed for smart IoT-enabled domains.In this paper,we are going to present an effective hybrid approach that can refine raw data values captured by the respectivemember device before transmission while preserving its privacy through the utilization of the differential privacy technique in IoT infrastructures.Sliding window,i.e.,δi based dynamic programming methodology,is implemented at the device level to ensure precise and accurate detection of outliers or noisy data,and refine it prior to activation of the respective transmission activity.Additionally,an appropriate privacy budget has been selected,which is enough to ensure the privacy of every individualmodule,i.e.,a wearable device such as a smartwatch attached to the patient’s body.In contrast,the end module,i.e.,the server in this case,can extract important information with approximately the maximum level of accuracy.Moreover,refined data has been processed by adding an appropriate nose through the Laplace mechanism to make it useless or meaningless for the adversary modules in the IoT.The proposed hybrid approach is trusted from both the device’s privacy and the integrity of the transmitted information perspectives.Simulation and analytical results have proved that the proposed privacy-preserving information fusion technique for wearable devices is an ideal solution for resource-constrained infrastructures such as IoT and the Internet ofMedical Things,where both device privacy and information integrity are important.Finally,the proposed hybrid approach is proven against well-known intruder attacks,especially those related to the privacy of the respective device in IoT infrastructures. 展开更多
关键词 Internet of things information fusion differential privacy dynamic programming Laplace function
下载PDF
New insights and investigation:Morphomolecular notes on the infraciliature,taxonomy,and systematics of pleurostomatid ciliates(Protozoa,Ciliophora),with establishment of a new suborder,two new genera,and three new species
18
作者 Gong-Ao-Te Zhang Teng-Yue Zhang +8 位作者 Yong Chi Hong-Bo Pan Zhe Zhang Jia-Chen Zhang Jun-Hua Niu Hong-Gang Ma Khaled A.S.Al-Rasheid Alan Warren Wei-Bo Song 《Zoological Research》 SCIE CSCD 2024年第6期1327-1346,共20页
Pleurostomatid ciliates,as a highly diverse and widely distributed unicellular eukaryote group,play a crucial role in the cycling of nutrients and energy in microbial food webs.However,research on pleurostomatids rema... Pleurostomatid ciliates,as a highly diverse and widely distributed unicellular eukaryote group,play a crucial role in the cycling of nutrients and energy in microbial food webs.However,research on pleurostomatids remains insufficient,resulting in a paucity of molecular information and substantial gaps in knowledge of their phylogenetic relationships.In recent years,we investigated pleurostomatid diversity in various Chinese habitats,including their systematic relationships and taxonomic circumscriptions,which were comprehensively analyzed using an integrative morphomolecular approach.Results revealed that:(1)pleurostomatids can be categorized into two suborders,Protolitonotina subord.nov.and Amphileptina Jankowski,1967;(2)Protolitonotina subord.nov.represents the ancestral pleurostomatid group and includes two genera,Protolitonotus and Heterolitonotus gen.nov.,characterized by right kineties progressively shortened along rightmost full kineties and absence of a left dorsolateral kinety;(3)Heterolitonotus gen.nov.represents an orphan lineage and is defined by an oral slit extending to its dorsal margin;(4)“Protolitonotus clampi”does not group with congeners but instead represents an orphan lineage,thus Novilitonotus gen.nov.is established to which P.clampi is transferred as Novilitonotus clampi comb.nov.;(5)three new species,Apoamphileptus paraclaparedii sp.nov.,Heterolitonotus rex gen.nov.,sp.nov.,and Loxophyllum apohelus sp.nov.,are described;and(6)helices 21es6a to 21es6d within the V4 region of small subunit ribosomal RNA(SSU rRNA)may serve as a useful tool for discriminating pleurostomatids.The evolutionary relationships among all main lineages of pleurostomatids are discussed and a key to the identification of pleurostomatid genera is provided. 展开更多
关键词 CILIATES Integrative approaches New suborder Phylogeny Pleurostomatids
下载PDF
SOME PROPERTIES OF THE INTEGRATION OPERATORS ON THE SPACES F(p,q,s)
19
作者 陈家乐 《Acta Mathematica Scientia》 SCIE CSCD 2024年第1期173-188,共16页
We study the closed range property and the strict singularity of integration operators acting on the spaces F(p,pα-2,s).We completely characterize the closed range property of the Volterra companion operator I_(g)on ... We study the closed range property and the strict singularity of integration operators acting on the spaces F(p,pα-2,s).We completely characterize the closed range property of the Volterra companion operator I_(g)on F(p,pα-2,s),which generalizes the existing results and answers a question raised in[A.Anderson,Integral Equations Operator Theory,69(2011),no.1,87-99].For the Volterra operator J_(g),we show that,for 0<α≤1,J_(g)never has a closed range on F(p,pα-2,s).We then prove that the notions of compactness,weak compactness and strict singularity coincide in the case of J_(g)acting on F(p,p-2,s). 展开更多
关键词 integration operator closed range property strict singularity
下载PDF
Integration, Leading and Empowerment: Folk Culture Boosting the Development of Henan's Tourism Economy
20
作者 Liu Yingji Yu Jiaqi 《China & The World Cultural Exchange》 2024年第4期6-9,共4页
During Chinese New Year holiday,characteristic folk customs activities significantly stimulated local tourism consumption potential and the high-quality development of tourism economy by integrating,leading and empowe... During Chinese New Year holiday,characteristic folk customs activities significantly stimulated local tourism consumption potential and the high-quality development of tourism economy by integrating,leading and empowering local tourism projects. 展开更多
关键词 integrating TOURISM integration
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部