At the end of the Ming Dynasty and at the beginning of the Qing Dynasty,a new theory of learning was created-Muslim Confucian Study(Chinese Islamic Philosophy)-on the basis of Islamic philosophy and under the influenc...At the end of the Ming Dynasty and at the beginning of the Qing Dynasty,a new theory of learning was created-Muslim Confucian Study(Chinese Islamic Philosophy)-on the basis of Islamic philosophy and under the influence of Confucianism.Wang Daiyu(1570-1660)and Liu Zhi(1660-1739)were two great Huiru(Muslim Confucian)scholars at that time.They published Zhengjiao zhenquan(The real commentary on the tire teaching),Tianfang xingli(Nature and principle in Islam)major books.Their approach is distinguished from that of other Muslim scholars in that they addressed the basic articles of Islamic thought with Confucian terminology and categories.The study deals with the Islamic worldview,and with the practices that make it possible for people to bring themselves into conformity with that worldview.However,the teaching of the Muslim Confucian was continuous with those of Mainstream Islam.In my research,I attempted to answer two questions:(a)How did Muslim Confucian Study Inherit the Mainstream Islamic Thought?(b)What is the value and contribution of the World Islamic philology and civilization?展开更多
Chaining watermark is an effective way to verify the integrity of streaming data in wireless network environment,especially in resource-constrained sensor networks,such as the perception layer of Internet of Things ap...Chaining watermark is an effective way to verify the integrity of streaming data in wireless network environment,especially in resource-constrained sensor networks,such as the perception layer of Internet of Things applications.However,in all existing single chaining watermark schemes,how to ensure the synchronization between the data sender and the receiver is still an unsolved problem.Once the synchronization points are attacked by the adversary,existing data integrity authentication schemes are difficult to work properly,and the false negative rate might be up to 50 percent.And the additional fixed group delimiters not only increase the data size,but are also easily detected by adversaries.In this paper,we propose an effective dual-chaining watermark scheme,called DCW,for data integrity protection in smart campus IoT applications.The proposed DCW scheme has the following three characteristics:(1)In order to authenticate the integrity of the data,fragile watermarks are generated and embedded into the data in a chaining way using dynamic grouping;(2)Instead of additional fixed group delimiters,chained watermark delimiters are proposed to synchronize the both transmission sides in case of the synchronization points are tampered;(3)To achieve lossless integrity authentication,a reversible watermarking technique is applied.The experimental results and security analysis can prove that the proposed DCW scheme is able to effectively authenticate the integrity of the data with free distortion at low cost in our smart meteorological Internet of Things system.展开更多
To realize the ultimate vision of Internet of Things(IoT),only depending on terrestrial network is far from enough.As a supplement and extension of terrestrial network,satellite network can offer powerful support to r...To realize the ultimate vision of Internet of Things(IoT),only depending on terrestrial network is far from enough.As a supplement and extension of terrestrial network,satellite network can offer powerful support to realize the depth and breadth of the coverage.However,existing satellite networks are usually designed for particular purposes.Moreover,traditional satellite networks and terrestrial networks are developed and operated separately,consequently they cannot meet the need of network flexibility required by IoT.In this paper,a space-terrestrial architecture is conceived for constructing a spaceterrestrial based IoT(ST-IoT) system.Additionally,a reliable identification procedure,an integrated access and communication procedure,as well as a clustering cooperative transmission strategy are also presented.展开更多
Based on analysis of the present situation and problems of course project of the Internet of Things engineering,we propose a relational integrated course project pattern around three levels of perception layer,network...Based on analysis of the present situation and problems of course project of the Internet of Things engineering,we propose a relational integrated course project pattern around three levels of perception layer,network layer,application layer of the Internet of Things system.The realization of a complete Internet of Things system is divided into three course projects to complete three key points,which may eventually make a complete system of things.Through the link among the three integrated course projects,knowledge of four years will be connected together and form an organic whole.We use a team performance and examination methods of the process-oriented examination,project paper and oral examination for the integrated course project in order to improve students’cooperation ability,expression ability,communication ability and other integrated quality.展开更多
the world is experiencing a strong rush towards modern technology, while specialized companies are living a terrible rush in the information technology towards the so-called Internet of things IoT or Internet of objec...the world is experiencing a strong rush towards modern technology, while specialized companies are living a terrible rush in the information technology towards the so-called Internet of things IoT or Internet of objects,</span><span style="font-family:""> </span><span style="font-family:Verdana;">which is the integration of things with the world of Internet, by adding hardware or/and software to be smart and so be able to communicate with each other and participate effectively in all aspects of daily life,</span><span style="font-family:""> </span><span style="font-family:Verdana;">so enabling new forms of communication between people and things, and between things themselves, that’s will change the traditional life into a high style of living. But it won’t be easy, because there are still many challenges an</span><span style="font-family:Verdana;">d</span><span style="font-family:Verdana;"> issues that need to be addressed and have to be viewed from various aspects to realize </span><span style="font-family:Verdana;">their</span><span style="font-family:Verdana;"> full potential. The main objective of this review paper will provide the reader with a detailed discussion from a technological and social perspective. The various IoT challenges and issues, definition and architecture were discussed. Furthermore, a description of several sensors and actuators and </span><span style="font-family:Verdana;">their</span><span style="font-family:Verdana;"> smart communication. Also, the most important application areas of IoT were presented. This work will help readers and researchers understand the IoT and its potential application in the real world.展开更多
Terminal devices deployed in outdoor environments are facing a thorny problem of power supply.Data and energy integrated network(DEIN)is a promising technology to solve the problem,which simultaneously transfers data ...Terminal devices deployed in outdoor environments are facing a thorny problem of power supply.Data and energy integrated network(DEIN)is a promising technology to solve the problem,which simultaneously transfers data and energy through radio frequency signals.State-of-the-art researches mostly focus on theoretical aspects.By contrast,we provide a complete design and implementation of a fully functioning DEIN system with the support of an unmanned aerial vehicle(UAV).The UAV can be dispatched to areas of interest to remotely recharge batteryless terminals,while collecting essential information from them.Then,the UAV uploads the information to remote base stations.Our system verifies the feasibility of the DEIN in practical applications.展开更多
Resonantly enhanced dielectric sensing has superior sensitivity and accuracy because the signal is measured from relative resonance shifts that are immune to signal fluctuations.For applications in the Internet of Thi...Resonantly enhanced dielectric sensing has superior sensitivity and accuracy because the signal is measured from relative resonance shifts that are immune to signal fluctuations.For applications in the Internet of Things(IoT),accurate detection of resonance frequency shifts using a compact circuit is in high demand.We proposed an ultracompact integrated sensing system that merges a spoof surface plasmon resonance sensor with signal detection,processing,and wireless communication.A softwaredefined scheme was developed to track the resonance shift,which minimized the hardware circuit and made the detection adaptive to the target resonance.A microwave spoof surface plasmon resonator was designed to enhance sensitivity and resonance intensity.The integrated sensing system was constructed on a printed circuit board with dimensions of 1.8 cm×1.2 cm and connected to a smartphone wirelessly through Bluetooth,working in both frequency scanning mode and resonance tracking mode and achieving a signal-to-noise ratio of 69 dB in acetone vapor sensing.This study provides an ultracompact,accurate,adaptive,sensitive,and wireless solution for resonant sensors in the IoT.展开更多
Due to their simple hardware,sensor nodes in IoT are vulnerable to attack,leading to data routing blockages or malicious tampering,which significantly disrupts secure data collection.An Intelligent Active Probing and ...Due to their simple hardware,sensor nodes in IoT are vulnerable to attack,leading to data routing blockages or malicious tampering,which significantly disrupts secure data collection.An Intelligent Active Probing and Trace-back Scheme for IoT Anomaly Detection(APTAD)is proposed to collect integrated IoT data by recruiting Mobile Edge Users(MEUs).(a)An intelligent unsupervised learning approach is used to identify anomalous data from the collected data by MEUs and help to identify anomalous nodes.(b)Recruit MEUs to trace back and propose a series of trust calculation methods to determine the trust of nodes.(c)The last,the number of active detection packets and detection paths are designed,so as to accurately identify the trust of nodes in IoT at the minimum cost of the network.A large number of experimental results show that the recruiting cost and average anomaly detection time are reduced by 6.5 times and 34.33%respectively,while the accuracy of trust identification is improved by 20%.展开更多
文摘At the end of the Ming Dynasty and at the beginning of the Qing Dynasty,a new theory of learning was created-Muslim Confucian Study(Chinese Islamic Philosophy)-on the basis of Islamic philosophy and under the influence of Confucianism.Wang Daiyu(1570-1660)and Liu Zhi(1660-1739)were two great Huiru(Muslim Confucian)scholars at that time.They published Zhengjiao zhenquan(The real commentary on the tire teaching),Tianfang xingli(Nature and principle in Islam)major books.Their approach is distinguished from that of other Muslim scholars in that they addressed the basic articles of Islamic thought with Confucian terminology and categories.The study deals with the Islamic worldview,and with the practices that make it possible for people to bring themselves into conformity with that worldview.However,the teaching of the Muslim Confucian was continuous with those of Mainstream Islam.In my research,I attempted to answer two questions:(a)How did Muslim Confucian Study Inherit the Mainstream Islamic Thought?(b)What is the value and contribution of the World Islamic philology and civilization?
基金This work is supported by the Major Program of the National Social Science Fund of China under Grant No.17ZDA092by the Electronic Information and Control of Fujian University Engineering Research Center Fund under Grant No.EIC1704+3 种基金by the National Key R&D Program of China under grant 2018YFB1003205by the National Natural Science Foundation of China under grant 61173136,U1836208,U1536206,U1836110,61602253,61672294by the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)fundby the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET)fund,China.
文摘Chaining watermark is an effective way to verify the integrity of streaming data in wireless network environment,especially in resource-constrained sensor networks,such as the perception layer of Internet of Things applications.However,in all existing single chaining watermark schemes,how to ensure the synchronization between the data sender and the receiver is still an unsolved problem.Once the synchronization points are attacked by the adversary,existing data integrity authentication schemes are difficult to work properly,and the false negative rate might be up to 50 percent.And the additional fixed group delimiters not only increase the data size,but are also easily detected by adversaries.In this paper,we propose an effective dual-chaining watermark scheme,called DCW,for data integrity protection in smart campus IoT applications.The proposed DCW scheme has the following three characteristics:(1)In order to authenticate the integrity of the data,fragile watermarks are generated and embedded into the data in a chaining way using dynamic grouping;(2)Instead of additional fixed group delimiters,chained watermark delimiters are proposed to synchronize the both transmission sides in case of the synchronization points are tampered;(3)To achieve lossless integrity authentication,a reversible watermarking technique is applied.The experimental results and security analysis can prove that the proposed DCW scheme is able to effectively authenticate the integrity of the data with free distortion at low cost in our smart meteorological Internet of Things system.
文摘To realize the ultimate vision of Internet of Things(IoT),only depending on terrestrial network is far from enough.As a supplement and extension of terrestrial network,satellite network can offer powerful support to realize the depth and breadth of the coverage.However,existing satellite networks are usually designed for particular purposes.Moreover,traditional satellite networks and terrestrial networks are developed and operated separately,consequently they cannot meet the need of network flexibility required by IoT.In this paper,a space-terrestrial architecture is conceived for constructing a spaceterrestrial based IoT(ST-IoT) system.Additionally,a reliable identification procedure,an integrated access and communication procedure,as well as a clustering cooperative transmission strategy are also presented.
文摘Based on analysis of the present situation and problems of course project of the Internet of Things engineering,we propose a relational integrated course project pattern around three levels of perception layer,network layer,application layer of the Internet of Things system.The realization of a complete Internet of Things system is divided into three course projects to complete three key points,which may eventually make a complete system of things.Through the link among the three integrated course projects,knowledge of four years will be connected together and form an organic whole.We use a team performance and examination methods of the process-oriented examination,project paper and oral examination for the integrated course project in order to improve students’cooperation ability,expression ability,communication ability and other integrated quality.
文摘the world is experiencing a strong rush towards modern technology, while specialized companies are living a terrible rush in the information technology towards the so-called Internet of things IoT or Internet of objects,</span><span style="font-family:""> </span><span style="font-family:Verdana;">which is the integration of things with the world of Internet, by adding hardware or/and software to be smart and so be able to communicate with each other and participate effectively in all aspects of daily life,</span><span style="font-family:""> </span><span style="font-family:Verdana;">so enabling new forms of communication between people and things, and between things themselves, that’s will change the traditional life into a high style of living. But it won’t be easy, because there are still many challenges an</span><span style="font-family:Verdana;">d</span><span style="font-family:Verdana;"> issues that need to be addressed and have to be viewed from various aspects to realize </span><span style="font-family:Verdana;">their</span><span style="font-family:Verdana;"> full potential. The main objective of this review paper will provide the reader with a detailed discussion from a technological and social perspective. The various IoT challenges and issues, definition and architecture were discussed. Furthermore, a description of several sensors and actuators and </span><span style="font-family:Verdana;">their</span><span style="font-family:Verdana;"> smart communication. Also, the most important application areas of IoT were presented. This work will help readers and researchers understand the IoT and its potential application in the real world.
基金partly funded by Natural Science Foundation of China(No.61971102 and 62132004)Sichuan Science and Technology Program(No.22QYCX0168)the Municipal Government of Quzhou(Grant No.2021D003)。
文摘Terminal devices deployed in outdoor environments are facing a thorny problem of power supply.Data and energy integrated network(DEIN)is a promising technology to solve the problem,which simultaneously transfers data and energy through radio frequency signals.State-of-the-art researches mostly focus on theoretical aspects.By contrast,we provide a complete design and implementation of a fully functioning DEIN system with the support of an unmanned aerial vehicle(UAV).The UAV can be dispatched to areas of interest to remotely recharge batteryless terminals,while collecting essential information from them.Then,the UAV uploads the information to remote base stations.Our system verifies the feasibility of the DEIN in practical applications.
基金supported by the National Natural Science Foundation of China(62288101,61701108,and 61631007)the National Key Research and Development Program of China(2017YFA0700201,2017YFA0700202,and 2017YFA0700203)+1 种基金the Major Project of Natural Science Foundation of Jiangsu Province(BK20212002)the 111 Project(111-2-05).
文摘Resonantly enhanced dielectric sensing has superior sensitivity and accuracy because the signal is measured from relative resonance shifts that are immune to signal fluctuations.For applications in the Internet of Things(IoT),accurate detection of resonance frequency shifts using a compact circuit is in high demand.We proposed an ultracompact integrated sensing system that merges a spoof surface plasmon resonance sensor with signal detection,processing,and wireless communication.A softwaredefined scheme was developed to track the resonance shift,which minimized the hardware circuit and made the detection adaptive to the target resonance.A microwave spoof surface plasmon resonator was designed to enhance sensitivity and resonance intensity.The integrated sensing system was constructed on a printed circuit board with dimensions of 1.8 cm×1.2 cm and connected to a smartphone wirelessly through Bluetooth,working in both frequency scanning mode and resonance tracking mode and achieving a signal-to-noise ratio of 69 dB in acetone vapor sensing.This study provides an ultracompact,accurate,adaptive,sensitive,and wireless solution for resonant sensors in the IoT.
基金supported by the National Natural Science Foundation of China(62072475)the Fundamental Research Funds for the Central Universities of Central South University(CX20230356)。
文摘Due to their simple hardware,sensor nodes in IoT are vulnerable to attack,leading to data routing blockages or malicious tampering,which significantly disrupts secure data collection.An Intelligent Active Probing and Trace-back Scheme for IoT Anomaly Detection(APTAD)is proposed to collect integrated IoT data by recruiting Mobile Edge Users(MEUs).(a)An intelligent unsupervised learning approach is used to identify anomalous data from the collected data by MEUs and help to identify anomalous nodes.(b)Recruit MEUs to trace back and propose a series of trust calculation methods to determine the trust of nodes.(c)The last,the number of active detection packets and detection paths are designed,so as to accurately identify the trust of nodes in IoT at the minimum cost of the network.A large number of experimental results show that the recruiting cost and average anomaly detection time are reduced by 6.5 times and 34.33%respectively,while the accuracy of trust identification is improved by 20%.