The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective se...The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λ_(i) of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server S_(j) and members C_(i),with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs.展开更多
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ...Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) regularly share extensive data without human intervention while making all types of decisions. Thesedecisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeatmonitoring, and several different alert systems. Many of these devices simultaneously share data to form anautomated system. The data shared between machine-type communication devices (MTCDs) is prone to risk dueto limited computational power, internal memory, and energy capacity. Therefore, securing the data and devicesbecomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions,and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data isauthentication, where each devicemust be verified before data transmission. SeveralM2Mauthentication schemeshave been proposed in the literature, however, the literature lacks a comprehensive overview of current M2Mauthentication techniques and the challenges associated with them. To utilize a suitable authentication schemefor specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fillsthis gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerningapplication categories, security provisions, and performance efficiency.展开更多
The Internet of things has particularly novel implications in the area of public health. This is due to (1) The rapid and widespread adoption of powerful contemporary Smartphone’s;(2) The increasing availability and ...The Internet of things has particularly novel implications in the area of public health. This is due to (1) The rapid and widespread adoption of powerful contemporary Smartphone’s;(2) The increasing availability and use of health and fitness sensors, wearable sensor patches, smart watches, wireless-enabled digital tattoos and ambient sensors;and (3) The nature of public health to implicitly involve connectivity with and the acquisition of data in relation to large numbers of individuals up to population scale. Of particular relevance in relation to the Internet of Things (IoT) and public health is the need for privacy and anonymity of users. It should be noted that IoT capabilities are not inconsistent with maintaining privacy, due to the focus of public health on aggregate data not individual data and broad public health interventions. In addition, public health information systems utilizing IoT capabilities can be constructed to specifically ensure privacy, security and anonymity, as has been developed and evaluated in this work. In this paper we describe the particular characteristics of the IoT that can play a role in enabling emerging public health capabilities;we describe a privacy-preserving IoT-based public health information system architecture;and provide a privacy evaluation.展开更多
Unmanned Aerial Vehicles(UAVs)are gaining increasing attention in many fields,such as military,logistics,and hazardous site mapping.Utilizing UAVs to assist communications is one of the promising applications and rese...Unmanned Aerial Vehicles(UAVs)are gaining increasing attention in many fields,such as military,logistics,and hazardous site mapping.Utilizing UAVs to assist communications is one of the promising applications and research directions.The future Industrial Internet places higher demands on communication quality.The easy deployment,dynamic mobility,and low cost of UAVs make them a viable tool for wireless communication in the Industrial Internet.Therefore,UAVs are considered as an integral part of Industry 4.0.In this article,three typical use cases of UAVs-assisted communications in Industrial Internet are first summarized.Then,the state-of-the-art technologies for drone-assisted communication in support of the Industrial Internet are presented.According to the current research,it can be assumed that UAV-assisted communication can support the future Industrial Internet to a certain extent.Finally,the potential research directions and open challenges in UAV-assisted communications in the upcoming future Industrial Internet are discussed.展开更多
The public’s attitudes can affect the experience of stuttering of people who stutter.This study investigated the attitudes held by the public about people who stutter in China.A web-based written survey with closed a...The public’s attitudes can affect the experience of stuttering of people who stutter.This study investigated the attitudes held by the public about people who stutter in China.A web-based written survey with closed and open-ended questions was implemented to develop a rich understanding.One hundred and two respondents in 26 provinces and 3 municipalities provided comments on people who stutter in their life aspects such as personality,speech,social life,work,life participation,education,dating and marriage,capability,and communication skills.The predominantly negative attitudes towards the overall domains were identified.Attitudes to people who stutter varied according to the different sources of knowledge.Familiarity with people who stutter might reduce stereotypes.However,knowledge from the media might aggravate stereotypes.Implications and future research orientation were also discussed.展开更多
With the improvement of the degree of aging,the traditional pension model can no longer meet the growing needs of the elderly.Therefore,it is necessary to use the intelligent means of information technology to improve...With the improvement of the degree of aging,the traditional pension model can no longer meet the growing needs of the elderly.Therefore,it is necessary to use the intelligent means of information technology to improve the level of pension services.This paper will integrate multi-sensor fusion technology,NB-IoT communication technology and cloud platform technology to develop and design a smart pension online monitoring system to realize real-time collection of human health and motion status information and realize monitoring platform management.In this system,STM32 microcontroller will be used as the main control module,and MAX30102,ADXL345 and DS18B20 sensors will be used to collect the heart rate,blood oxygen,displacement and body temperature of the human body in real time.On the one hand,the communication part is completed by the BC20 Internet of Things module.The data transmission between the terminal detection device and the cloud platform,on the other hand,the HC-42 Bluetooth module is used to complete the data communication with the mobile phone.The test results show that the system can collect and process data accurately in real time and maintain good communication with the cloud platform and mobile phone.The designed system has strong pertinence,easy operation,high reliability and broad development prospects.展开更多
Globally,there have been multiple public health emergencies in recent decades.High rates of morbidity,occasionally mortality,and economic instability are usually associated with pandemics.One of the epidemics that has...Globally,there have been multiple public health emergencies in recent decades.High rates of morbidity,occasionally mortality,and economic instability are usually associated with pandemics.One of the epidemics that has significantly increased morbidity and mortality worldwide is the human immunodeficiency virus(HIV)and acquired immune deficiency syndrome(AIDS)pandemic.HIV has a disproportionately negative impact on key populations.Strong leadership,effective communication,and sound science are necessary for public health emergency(PHE)responses to be successful.These three PHE response pllars are also essential for bridging the HIV response gap among key populations in the setting of restrictive laws.In this review,we explored the importance of these three pillars of successful PHEs responses,and how they are essential to closing the gap in the HIV response among key populations.Leaders must make decisions and instil a sense of authority in the populace during PHEs to foster trust and confidence.Leaders should base their choices on scientific evidence.Effective communication during PHEs should be proactive,polite,imaginative,innovative,and constructive.To address gaps in the HIV response among key populations,leaders must create a supportive environment for effective communication and scientific research,communication should be used to raise awareness of HIV and to dispel stigma and discrimination,while science should provide evidence of efficacy and effectiveness of interventions amongkey populations.展开更多
Based on three datasets of the Chinese Social Survey(CSS)2013,2015,and 2017 and the National Statistical Yearbook,this study examined whether and in what ways using the Internet may or may not affect the public evalua...Based on three datasets of the Chinese Social Survey(CSS)2013,2015,and 2017 and the National Statistical Yearbook,this study examined whether and in what ways using the Internet may or may not affect the public evaluation of government environmental governance(GEG).There are three main findings.First,Internet use has a negative influence on the public evaluation of GEG.Second,there has been an urban-rural difference in terms of Internet use;especially for the rural resident,increasing their use of the Internet significantly lowered their evaluation of GEG.Third,Internet use affects GEG mainly through political trust,whilst it tends to enhance people’s perception of environmental problems;however,it has little influence on their evaluation of GEG.This finding implies that public evaluation of GEG should be viewed as an important inter-subjective dimension of GEG;especially in the Internet era,it has become increasingly necessary for the government to not only continuously improve the quality of governance by dealing with actual/practical environmental issues,but also enhance its ability to react to the public opinions online effectively and appropriately.展开更多
This study applies the situational theory of publics (STP) to a health crisis by exploring the effect of anger on public behavior. The results of a survey administered on the case of the candlelight rallies on the U...This study applies the situational theory of publics (STP) to a health crisis by exploring the effect of anger on public behavior. The results of a survey administered on the case of the candlelight rallies on the U.S. beef imports in South Korea in 2008 demonstrated that involvement, problem recognition, and constraint recognition predicted communication behaviors as well as various issue-related online and offline behaviors. In addition, anger was found to be a significant driving force for publics to perform the behaviors. The segmented publics showed significantly different levels of anger, information processing and seeking, online behaviors, and participation in the candlelight rallies展开更多
In recent years,public speaking has become more important and useful for undergraduate students.Many colleges and universities have opened the public speaking course and have achieved much success.In this paper,we fir...In recent years,public speaking has become more important and useful for undergraduate students.Many colleges and universities have opened the public speaking course and have achieved much success.In this paper,we first emphasize the importance of communication by public speaking,and let students become interested in public speaking.Secondly,we have studied the relativity of spoken English and public speaking;we have found obviously both have strong relation when students study in the class.Finally,we discuss the method we used and the experience we had in English spoken class.展开更多
By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined publi...By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined public key (CPK) mechanism is proposed, which solves the problems about a mass amount of authentications and the cross-domain authentication by integrating nodes' validity of identity authentication and uniqueness of identification. Moreover, the proposal of constructing nodes' authentic identification, valid authentication and credible communication connection at the application layer through the perception layer impels the formation of trust chain and relationship among perceptional nodes. Consequently, a trusting environment of the Internet of Things is built, by which a guidance of designing the trusted one would be provided.展开更多
Purpose: This paper presents an overview of different kinds of lists of scholarly publication channels and of experiences related to the construction and maintenance of national lists supporting performance-based rese...Purpose: This paper presents an overview of different kinds of lists of scholarly publication channels and of experiences related to the construction and maintenance of national lists supporting performance-based research funding systems. It also contributes with a set of recommendations for the construction and maintenance of national lists of journals and book publishers.Design/methodology/approach: The study is based on analysis of previously published studies, policy papers, and reported experiences related to the construction and use of lists of scholarly publication channels. Findings: Several countries have systems for research funding and/or evaluation, that involve the use of national lists of scholarly publication channels(mainly journals and publishers). Typically, such lists are selective(do not include all scholarly or non-scholarly channels) and differentiated(distinguish between channels of different levels and quality). At the same time, most lists are embedded in a system that encompasses multiple or all disciplines. This raises the question how such lists can be organized and maintained to ensure that all relevant disciplines and all types of research are adequately represented. Research limitation: The conclusions and recommendations of the study are based on the authors' interpretation of a complex and sometimes controversial process with many different stakeholders involved.Practical implications: The recommendations and the related background information provided in this paper enable mutual learning that may feed into improvements in the construction and maintenance of national and other lists of scholarly publication channels in any geographical context. This may foster a development of responsible evaluation practices.Originality/value: This paper presents the first general overview and typology of different kinds of publication channel lists, provides insights on expert-based versus metrics-based evaluation, and formulates a set of recommendations for the responsible construction and maintenance of publication channel lists.展开更多
With the advancements in wireless sensor networks, Internet of Vehicles(IOV) has shown great potential in aiding to ease traffic congestion. In IOV, vehicles can easily exchange information with other vehicles and inf...With the advancements in wireless sensor networks, Internet of Vehicles(IOV) has shown great potential in aiding to ease traffic congestion. In IOV, vehicles can easily exchange information with other vehicles and infrastructures, thus, the development of IOV will greatly improve vehicles safety, promote green information consumption and have a profound impact on many industries. The purpose of this paper is to promote the innovation and development of IOV. Firstly, this paper presents general requirements of IOV such as guidelines, basic principles, and the goal of development. Secondly, we analyze critical applications, crucial support, and business model to promote the industrial development of IOV. Finally, this paper proposes some safeguard measures to further promote the development of IOV.展开更多
The internet of things(IoT)has a wide variety of applications,which in turn raisesmany challenging issues.IoT technology enables devices to closely monitor their environment,providing context-aware intelligence based ...The internet of things(IoT)has a wide variety of applications,which in turn raisesmany challenging issues.IoT technology enables devices to closely monitor their environment,providing context-aware intelligence based on the real-time data collected by their sensor nodes.The IoT not only controls these devices but also monitors their user’s behaviour.One of the major issues related to IoT is the need for an energy-efficient communication protocol which uses the heterogeneity and diversity of the objects connected through the internet.Minimizing energy consumption is a requirement for energyconstrained nodes and outsourced nodes.The IoT nodes deployed in different geographical regions typically have different energy levels.This paper focuses on creating an energy-efficient protocol for IoTwhich can deal with the clustering of nodes and the cluster head selection process.An energy thresholdmodel is developed to select the appropriate cluster heads and also to ensure uniform distribution of energy to those heads andmember nodes.The proposed model envisages an IoT network with three different types of nodes,described here as advanced,intermediate and normal nodes.Normal nodes are first-level nodes,which have the lowest energy use;intermediate nodes are second-level nodes,which have a medium energy requirement;and the advanced class are thirdlevel nodes with the highest energy use.The simulation results demonstrate that the proposed algorithm outperforms other existing algorithms.In tests,it shows a 26%improvement in network lifetime compared with existing algorithms.展开更多
In this paper, the authors present a novel mutual authentication and key agreement protocol based on the Number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and “challenge-respo...In this paper, the authors present a novel mutual authentication and key agreement protocol based on the Number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and “challenge-response” techniques were adopted to build their protocol. To implement the mutual authentication and session key agreement, the proposed protocol contains two stages: namely initial procedure and real execution stage. Since the lightweight NTRU public key cryptography is employed, their protocol can not only overcome the security flaws of secret-key based authentication protocols such as those used in Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS), but also provide greater security and lower computational complexity in comparison with currently well-known public key based wireless authentication schemes such as Beller-Yacobi and M.Aydos protocols.展开更多
With recent advances made in Internet of Vehicles(IoV)and Cloud Computing(CC),the Intelligent Transportation Systems(ITS)find it advantageous in terms of improvement in quality and interactivity of urban transportatio...With recent advances made in Internet of Vehicles(IoV)and Cloud Computing(CC),the Intelligent Transportation Systems(ITS)find it advantageous in terms of improvement in quality and interactivity of urban transportation service,mitigation of costs incurred,reduction in resource utilization,and improvement in traffic management capabilities.Many trafficrelated problems in future smart cities can be sorted out with the incorporation of IoV in transportation.IoV communication enables the collection and distribution of real-time essential data regarding road network condition.In this scenario,energy-efficient and reliable intercommunication routes are essential among vehicular nodes in sustainable urban computing.With this motivation,the current research article presents a new Artificial Intelligence-based Energy Efficient Clustering with Routing(AI-EECR)Protocol for IoV in urban computing.The proposed AI-EECR protocol operates under three stages namely,network initialization,Cluster Head(CH)selection,and routing protocol.The presented AI-EECR protocol determines the CHs from vehicles with the help of Quantum Chemical Reaction Optimization(QCRO)algorithm.QCROalgorithmderives a fitness function with the help of vehicle speed,trust level,and energy level of the vehicle.In order to make appropriate routing decisions,a set of relay nodeswas selected usingGroup Teaching Optimization Algorithm(GTOA).The performance of the presented AI-EECR model,in terms of energy efficiency,was validated against different aspects and a brief comparative analysis was conducted.The experimental outcomes established that AI-EECR model outperformed the existing methods under different measures.展开更多
The value of visuals used in public earthquake education is a theme essentially unexplored.This Los Angeles-based study is a preliminary investigation into this topic,focusing on the pioneering 2008 ShakeOut Southern ...The value of visuals used in public earthquake education is a theme essentially unexplored.This Los Angeles-based study is a preliminary investigation into this topic,focusing on the pioneering 2008 ShakeOut Southern California public earthquake drill: the largest earthquake drill in US history.The ShakeOut scenario is based on a magnitude 7.8 earthquake occurring on the San Andreas Fault,and展开更多
Based on risk social cognition theory and planned behavior theory, the influence factors of the public participation in the nanotechnology risk communication are analyzed,and the concept model is presented to analyze ...Based on risk social cognition theory and planned behavior theory, the influence factors of the public participation in the nanotechnology risk communication are analyzed,and the concept model is presented to analyze their relationships and functional mechanism. In the model,the risk communication behaviors are divided into two variables of the public opinion expression and information acquisition,and the subjective norm divided into the internal and external social networks. Then the questionnaire is designed so as to verify the proposed model and analyze their relationships. The survey data are analyzed using SMART PLS software. The validity analysis shows that the questionnaire has a high convergence and discriminant validity. In addition, the Cronbach'a coefficient of each item is more than 0. 70,which shows the questionnaire has a high credibility. Based on the statistical data analysis, relationships of the influence factors are obtained.Further,the influence path model of the public attitude,intention,self regulation and behavior control in the risk communication is established. According to the Bootstrap algorithm in SMART,the path coefficient and its explanation variance of each influence factor are obtained. The calculation results show that the explanation variance values are all bigger than 10% and the path is reliable.Based on the path model, the influence path and function relationships of the participation attitude, subjective norm and behavior control on the participation intention and behavior are obtained. This will provide theoretical and data supports for the risk management and strategy making of the public participation in nanotechnology risk communication.展开更多
The health impacts of tobacco consumption are well documented and have gained acceptance worldwide. Today, a substantial, preventable burden of tobacco attributable diseases exists in most countries, though in most of...The health impacts of tobacco consumption are well documented and have gained acceptance worldwide. Today, a substantial, preventable burden of tobacco attributable diseases exists in most countries, though in most of the cases, unknown. Smoking accounts for almost half of the deaths in middle age in some regions. In Uganda, translating findings into policy action is slow and involves several stakeholders. It will continue to require support from tobacco control campaign groups. This paper analyses secondary literature on tobacco smoking and later provides an appropriate medium based communication strategy that can be adopted to counteract the persuasive smoking evil adverts of tobacco companies as well as creating awareness among the population of the health impacts caused by smoking.展开更多
The Internet ofMedical Things(IoMT)is mainly concernedwith the efficient utilisation of wearable devices in the healthcare domain to manage various processes automatically,whereas machine learning approaches enable th...The Internet ofMedical Things(IoMT)is mainly concernedwith the efficient utilisation of wearable devices in the healthcare domain to manage various processes automatically,whereas machine learning approaches enable these smart systems to make informed decisions.Generally,broadcasting is used for the transmission of frames,whereas congestion,energy efficiency,and excessive load are among the common issues associated with existing approaches.In this paper,a machine learning-enabled shortest path identification scheme is presented to ensure reliable transmission of frames,especially with the minimum possible communication overheads in the IoMT network.For this purpose,the proposed scheme utilises a well-known technique,i.e.,Kruskal’s algorithm,to find an optimal path from source to destination wearable devices.Additionally,other evaluation metrics are used to find a reliable and shortest possible communication path between the two interested parties.Apart from that,every device is bound to hold a supplementary path,preferably a second optimised path,for situations where the current communication path is no longer available,either due to device failure or heavy traffic.Furthermore,the machine learning approach helps enable these devices to update their routing tables simultaneously,and an optimal path could be replaced if a better one is available.The proposed mechanism has been tested using a smart environment developed for the healthcare domain using IoMT networks.Simulation results show that the proposed machine learning-oriented approach performs better than existing approaches where the proposed scheme has achieved the minimum possible ratios,i.e.,17%and 23%,in terms of end to end delay and packet losses,respectively.Moreover,the proposed scheme has achieved an approximately 21%improvement in the average throughput compared to the existing schemes.展开更多
文摘The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λ_(i) of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server S_(j) and members C_(i),with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs.
基金the Deanship of Scientific Research,Vice Presidency for Graduate Studies and Scientific Research,King Faisal University,Saudi Arabia(Grant No.GRANT5,208).
文摘Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) regularly share extensive data without human intervention while making all types of decisions. Thesedecisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeatmonitoring, and several different alert systems. Many of these devices simultaneously share data to form anautomated system. The data shared between machine-type communication devices (MTCDs) is prone to risk dueto limited computational power, internal memory, and energy capacity. Therefore, securing the data and devicesbecomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions,and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data isauthentication, where each devicemust be verified before data transmission. SeveralM2Mauthentication schemeshave been proposed in the literature, however, the literature lacks a comprehensive overview of current M2Mauthentication techniques and the challenges associated with them. To utilize a suitable authentication schemefor specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fillsthis gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerningapplication categories, security provisions, and performance efficiency.
文摘The Internet of things has particularly novel implications in the area of public health. This is due to (1) The rapid and widespread adoption of powerful contemporary Smartphone’s;(2) The increasing availability and use of health and fitness sensors, wearable sensor patches, smart watches, wireless-enabled digital tattoos and ambient sensors;and (3) The nature of public health to implicitly involve connectivity with and the acquisition of data in relation to large numbers of individuals up to population scale. Of particular relevance in relation to the Internet of Things (IoT) and public health is the need for privacy and anonymity of users. It should be noted that IoT capabilities are not inconsistent with maintaining privacy, due to the focus of public health on aggregate data not individual data and broad public health interventions. In addition, public health information systems utilizing IoT capabilities can be constructed to specifically ensure privacy, security and anonymity, as has been developed and evaluated in this work. In this paper we describe the particular characteristics of the IoT that can play a role in enabling emerging public health capabilities;we describe a privacy-preserving IoT-based public health information system architecture;and provide a privacy evaluation.
基金supported in part by National Key Research&Devel-opment Program of China(2021YFB2900801)in part by Guangdong Basic and Applied Basic Research Foundation(2022A1515110335)in party by Fundamental Research Funds for the Central Universities(FRF-TP-22-094A1).
文摘Unmanned Aerial Vehicles(UAVs)are gaining increasing attention in many fields,such as military,logistics,and hazardous site mapping.Utilizing UAVs to assist communications is one of the promising applications and research directions.The future Industrial Internet places higher demands on communication quality.The easy deployment,dynamic mobility,and low cost of UAVs make them a viable tool for wireless communication in the Industrial Internet.Therefore,UAVs are considered as an integral part of Industry 4.0.In this article,three typical use cases of UAVs-assisted communications in Industrial Internet are first summarized.Then,the state-of-the-art technologies for drone-assisted communication in support of the Industrial Internet are presented.According to the current research,it can be assumed that UAV-assisted communication can support the future Industrial Internet to a certain extent.Finally,the potential research directions and open challenges in UAV-assisted communications in the upcoming future Industrial Internet are discussed.
文摘The public’s attitudes can affect the experience of stuttering of people who stutter.This study investigated the attitudes held by the public about people who stutter in China.A web-based written survey with closed and open-ended questions was implemented to develop a rich understanding.One hundred and two respondents in 26 provinces and 3 municipalities provided comments on people who stutter in their life aspects such as personality,speech,social life,work,life participation,education,dating and marriage,capability,and communication skills.The predominantly negative attitudes towards the overall domains were identified.Attitudes to people who stutter varied according to the different sources of knowledge.Familiarity with people who stutter might reduce stereotypes.However,knowledge from the media might aggravate stereotypes.Implications and future research orientation were also discussed.
基金supported by Jiangsu Provincial Natural Science Fund(BK20150247)the Fundamental Research Funds for Postgraduate Research&Practice Innovation Program of Jiangsu Province(XSJCX22_36,XSJCX22_44,SJCX22_1479)
文摘With the improvement of the degree of aging,the traditional pension model can no longer meet the growing needs of the elderly.Therefore,it is necessary to use the intelligent means of information technology to improve the level of pension services.This paper will integrate multi-sensor fusion technology,NB-IoT communication technology and cloud platform technology to develop and design a smart pension online monitoring system to realize real-time collection of human health and motion status information and realize monitoring platform management.In this system,STM32 microcontroller will be used as the main control module,and MAX30102,ADXL345 and DS18B20 sensors will be used to collect the heart rate,blood oxygen,displacement and body temperature of the human body in real time.On the one hand,the communication part is completed by the BC20 Internet of Things module.The data transmission between the terminal detection device and the cloud platform,on the other hand,the HC-42 Bluetooth module is used to complete the data communication with the mobile phone.The test results show that the system can collect and process data accurately in real time and maintain good communication with the cloud platform and mobile phone.The designed system has strong pertinence,easy operation,high reliability and broad development prospects.
文摘Globally,there have been multiple public health emergencies in recent decades.High rates of morbidity,occasionally mortality,and economic instability are usually associated with pandemics.One of the epidemics that has significantly increased morbidity and mortality worldwide is the human immunodeficiency virus(HIV)and acquired immune deficiency syndrome(AIDS)pandemic.HIV has a disproportionately negative impact on key populations.Strong leadership,effective communication,and sound science are necessary for public health emergency(PHE)responses to be successful.These three PHE response pllars are also essential for bridging the HIV response gap among key populations in the setting of restrictive laws.In this review,we explored the importance of these three pillars of successful PHEs responses,and how they are essential to closing the gap in the HIV response among key populations.Leaders must make decisions and instil a sense of authority in the populace during PHEs to foster trust and confidence.Leaders should base their choices on scientific evidence.Effective communication during PHEs should be proactive,polite,imaginative,innovative,and constructive.To address gaps in the HIV response among key populations,leaders must create a supportive environment for effective communication and scientific research,communication should be used to raise awareness of HIV and to dispel stigma and discrimination,while science should provide evidence of efficacy and effectiveness of interventions amongkey populations.
基金supported by Major Project of The National Social Science Fund of China[Grant number.19ZDA149]the Guanghua Talent Project of Southwestern University of Finance and Economics.
文摘Based on three datasets of the Chinese Social Survey(CSS)2013,2015,and 2017 and the National Statistical Yearbook,this study examined whether and in what ways using the Internet may or may not affect the public evaluation of government environmental governance(GEG).There are three main findings.First,Internet use has a negative influence on the public evaluation of GEG.Second,there has been an urban-rural difference in terms of Internet use;especially for the rural resident,increasing their use of the Internet significantly lowered their evaluation of GEG.Third,Internet use affects GEG mainly through political trust,whilst it tends to enhance people’s perception of environmental problems;however,it has little influence on their evaluation of GEG.This finding implies that public evaluation of GEG should be viewed as an important inter-subjective dimension of GEG;especially in the Internet era,it has become increasingly necessary for the government to not only continuously improve the quality of governance by dealing with actual/practical environmental issues,but also enhance its ability to react to the public opinions online effectively and appropriately.
文摘This study applies the situational theory of publics (STP) to a health crisis by exploring the effect of anger on public behavior. The results of a survey administered on the case of the candlelight rallies on the U.S. beef imports in South Korea in 2008 demonstrated that involvement, problem recognition, and constraint recognition predicted communication behaviors as well as various issue-related online and offline behaviors. In addition, anger was found to be a significant driving force for publics to perform the behaviors. The segmented publics showed significantly different levels of anger, information processing and seeking, online behaviors, and participation in the candlelight rallies
文摘In recent years,public speaking has become more important and useful for undergraduate students.Many colleges and universities have opened the public speaking course and have achieved much success.In this paper,we first emphasize the importance of communication by public speaking,and let students become interested in public speaking.Secondly,we have studied the relativity of spoken English and public speaking;we have found obviously both have strong relation when students study in the class.Finally,we discuss the method we used and the experience we had in English spoken class.
基金supported by the 863 Program under Grant No. 2008AA04A107
文摘By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined public key (CPK) mechanism is proposed, which solves the problems about a mass amount of authentications and the cross-domain authentication by integrating nodes' validity of identity authentication and uniqueness of identification. Moreover, the proposal of constructing nodes' authentic identification, valid authentication and credible communication connection at the application layer through the perception layer impels the formation of trust chain and relationship among perceptional nodes. Consequently, a trusting environment of the Internet of Things is built, by which a guidance of designing the trusted one would be provided.
文摘Purpose: This paper presents an overview of different kinds of lists of scholarly publication channels and of experiences related to the construction and maintenance of national lists supporting performance-based research funding systems. It also contributes with a set of recommendations for the construction and maintenance of national lists of journals and book publishers.Design/methodology/approach: The study is based on analysis of previously published studies, policy papers, and reported experiences related to the construction and use of lists of scholarly publication channels. Findings: Several countries have systems for research funding and/or evaluation, that involve the use of national lists of scholarly publication channels(mainly journals and publishers). Typically, such lists are selective(do not include all scholarly or non-scholarly channels) and differentiated(distinguish between channels of different levels and quality). At the same time, most lists are embedded in a system that encompasses multiple or all disciplines. This raises the question how such lists can be organized and maintained to ensure that all relevant disciplines and all types of research are adequately represented. Research limitation: The conclusions and recommendations of the study are based on the authors' interpretation of a complex and sometimes controversial process with many different stakeholders involved.Practical implications: The recommendations and the related background information provided in this paper enable mutual learning that may feed into improvements in the construction and maintenance of national and other lists of scholarly publication channels in any geographical context. This may foster a development of responsible evaluation practices.Originality/value: This paper presents the first general overview and typology of different kinds of publication channel lists, provides insights on expert-based versus metrics-based evaluation, and formulates a set of recommendations for the responsible construction and maintenance of publication channel lists.
文摘With the advancements in wireless sensor networks, Internet of Vehicles(IOV) has shown great potential in aiding to ease traffic congestion. In IOV, vehicles can easily exchange information with other vehicles and infrastructures, thus, the development of IOV will greatly improve vehicles safety, promote green information consumption and have a profound impact on many industries. The purpose of this paper is to promote the innovation and development of IOV. Firstly, this paper presents general requirements of IOV such as guidelines, basic principles, and the goal of development. Secondly, we analyze critical applications, crucial support, and business model to promote the industrial development of IOV. Finally, this paper proposes some safeguard measures to further promote the development of IOV.
文摘The internet of things(IoT)has a wide variety of applications,which in turn raisesmany challenging issues.IoT technology enables devices to closely monitor their environment,providing context-aware intelligence based on the real-time data collected by their sensor nodes.The IoT not only controls these devices but also monitors their user’s behaviour.One of the major issues related to IoT is the need for an energy-efficient communication protocol which uses the heterogeneity and diversity of the objects connected through the internet.Minimizing energy consumption is a requirement for energyconstrained nodes and outsourced nodes.The IoT nodes deployed in different geographical regions typically have different energy levels.This paper focuses on creating an energy-efficient protocol for IoTwhich can deal with the clustering of nodes and the cluster head selection process.An energy thresholdmodel is developed to select the appropriate cluster heads and also to ensure uniform distribution of energy to those heads andmember nodes.The proposed model envisages an IoT network with three different types of nodes,described here as advanced,intermediate and normal nodes.Normal nodes are first-level nodes,which have the lowest energy use;intermediate nodes are second-level nodes,which have a medium energy requirement;and the advanced class are thirdlevel nodes with the highest energy use.The simulation results demonstrate that the proposed algorithm outperforms other existing algorithms.In tests,it shows a 26%improvement in network lifetime compared with existing algorithms.
基金Project (No. 60372076) supported by the National Natural ScienceFoundation of China
文摘In this paper, the authors present a novel mutual authentication and key agreement protocol based on the Number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and “challenge-response” techniques were adopted to build their protocol. To implement the mutual authentication and session key agreement, the proposed protocol contains two stages: namely initial procedure and real execution stage. Since the lightweight NTRU public key cryptography is employed, their protocol can not only overcome the security flaws of secret-key based authentication protocols such as those used in Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS), but also provide greater security and lower computational complexity in comparison with currently well-known public key based wireless authentication schemes such as Beller-Yacobi and M.Aydos protocols.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under grant number(RGP 2/25/42),Received by Fahd N.Al-Wesabi.www.kku.edu.sa.This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-track Research Funding Program.
文摘With recent advances made in Internet of Vehicles(IoV)and Cloud Computing(CC),the Intelligent Transportation Systems(ITS)find it advantageous in terms of improvement in quality and interactivity of urban transportation service,mitigation of costs incurred,reduction in resource utilization,and improvement in traffic management capabilities.Many trafficrelated problems in future smart cities can be sorted out with the incorporation of IoV in transportation.IoV communication enables the collection and distribution of real-time essential data regarding road network condition.In this scenario,energy-efficient and reliable intercommunication routes are essential among vehicular nodes in sustainable urban computing.With this motivation,the current research article presents a new Artificial Intelligence-based Energy Efficient Clustering with Routing(AI-EECR)Protocol for IoV in urban computing.The proposed AI-EECR protocol operates under three stages namely,network initialization,Cluster Head(CH)selection,and routing protocol.The presented AI-EECR protocol determines the CHs from vehicles with the help of Quantum Chemical Reaction Optimization(QCRO)algorithm.QCROalgorithmderives a fitness function with the help of vehicle speed,trust level,and energy level of the vehicle.In order to make appropriate routing decisions,a set of relay nodeswas selected usingGroup Teaching Optimization Algorithm(GTOA).The performance of the presented AI-EECR model,in terms of energy efficiency,was validated against different aspects and a brief comparative analysis was conducted.The experimental outcomes established that AI-EECR model outperformed the existing methods under different measures.
文摘The value of visuals used in public earthquake education is a theme essentially unexplored.This Los Angeles-based study is a preliminary investigation into this topic,focusing on the pioneering 2008 ShakeOut Southern California public earthquake drill: the largest earthquake drill in US history.The ShakeOut scenario is based on a magnitude 7.8 earthquake occurring on the San Andreas Fault,and
基金National Social Science Foundation of China(No.14BTQ030)
文摘Based on risk social cognition theory and planned behavior theory, the influence factors of the public participation in the nanotechnology risk communication are analyzed,and the concept model is presented to analyze their relationships and functional mechanism. In the model,the risk communication behaviors are divided into two variables of the public opinion expression and information acquisition,and the subjective norm divided into the internal and external social networks. Then the questionnaire is designed so as to verify the proposed model and analyze their relationships. The survey data are analyzed using SMART PLS software. The validity analysis shows that the questionnaire has a high convergence and discriminant validity. In addition, the Cronbach'a coefficient of each item is more than 0. 70,which shows the questionnaire has a high credibility. Based on the statistical data analysis, relationships of the influence factors are obtained.Further,the influence path model of the public attitude,intention,self regulation and behavior control in the risk communication is established. According to the Bootstrap algorithm in SMART,the path coefficient and its explanation variance of each influence factor are obtained. The calculation results show that the explanation variance values are all bigger than 10% and the path is reliable.Based on the path model, the influence path and function relationships of the participation attitude, subjective norm and behavior control on the participation intention and behavior are obtained. This will provide theoretical and data supports for the risk management and strategy making of the public participation in nanotechnology risk communication.
文摘The health impacts of tobacco consumption are well documented and have gained acceptance worldwide. Today, a substantial, preventable burden of tobacco attributable diseases exists in most countries, though in most of the cases, unknown. Smoking accounts for almost half of the deaths in middle age in some regions. In Uganda, translating findings into policy action is slow and involves several stakeholders. It will continue to require support from tobacco control campaign groups. This paper analyses secondary literature on tobacco smoking and later provides an appropriate medium based communication strategy that can be adopted to counteract the persuasive smoking evil adverts of tobacco companies as well as creating awareness among the population of the health impacts caused by smoking.
文摘The Internet ofMedical Things(IoMT)is mainly concernedwith the efficient utilisation of wearable devices in the healthcare domain to manage various processes automatically,whereas machine learning approaches enable these smart systems to make informed decisions.Generally,broadcasting is used for the transmission of frames,whereas congestion,energy efficiency,and excessive load are among the common issues associated with existing approaches.In this paper,a machine learning-enabled shortest path identification scheme is presented to ensure reliable transmission of frames,especially with the minimum possible communication overheads in the IoMT network.For this purpose,the proposed scheme utilises a well-known technique,i.e.,Kruskal’s algorithm,to find an optimal path from source to destination wearable devices.Additionally,other evaluation metrics are used to find a reliable and shortest possible communication path between the two interested parties.Apart from that,every device is bound to hold a supplementary path,preferably a second optimised path,for situations where the current communication path is no longer available,either due to device failure or heavy traffic.Furthermore,the machine learning approach helps enable these devices to update their routing tables simultaneously,and an optimal path could be replaced if a better one is available.The proposed mechanism has been tested using a smart environment developed for the healthcare domain using IoMT networks.Simulation results show that the proposed machine learning-oriented approach performs better than existing approaches where the proposed scheme has achieved the minimum possible ratios,i.e.,17%and 23%,in terms of end to end delay and packet losses,respectively.Moreover,the proposed scheme has achieved an approximately 21%improvement in the average throughput compared to the existing schemes.