期刊文献+
共找到3,091篇文章
< 1 2 155 >
每页显示 20 50 100
A Hybrid and Lightweight Device-to-Server Authentication Technique for the Internet of Things
1
作者 Shaha Al-Otaibi Rahim Khan +3 位作者 Hashim Ali Aftab Ahmed Khan Amir Saeed Jehad Ali 《Computers, Materials & Continua》 SCIE EI 2024年第3期3805-3823,共19页
The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective se... The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λ_(i) of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server S_(j) and members C_(i),with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs. 展开更多
关键词 internet of things AUtheNTICITY security LOCATION communication
下载PDF
Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges
2
作者 Shafi Ullah Sibghat Ullah Bazai +9 位作者 Mohammad Imran Qazi Mudassar Ilyas Abid Mehmood Muhammad Asim Saleem Muhmmad Aasim Rafique Arsalan Haider Ilyas Khan Sajid Iqbal Yonis Gulzar Kauser Hameed 《Computers, Materials & Continua》 SCIE EI 2024年第4期93-115,共23页
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ... Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) regularly share extensive data without human intervention while making all types of decisions. Thesedecisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeatmonitoring, and several different alert systems. Many of these devices simultaneously share data to form anautomated system. The data shared between machine-type communication devices (MTCDs) is prone to risk dueto limited computational power, internal memory, and energy capacity. Therefore, securing the data and devicesbecomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions,and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data isauthentication, where each devicemust be verified before data transmission. SeveralM2Mauthentication schemeshave been proposed in the literature, however, the literature lacks a comprehensive overview of current M2Mauthentication techniques and the challenges associated with them. To utilize a suitable authentication schemefor specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fillsthis gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerningapplication categories, security provisions, and performance efficiency. 展开更多
关键词 AUtheNTICATION cyber security internet of things machine-type communication devices machine-to-machine communication
下载PDF
The Internet of Things and Next-generation Public Health Information Systems 被引量:2
3
作者 Robert Steele Andrew Clarke 《Communications and Network》 2013年第3期4-9,共6页
The Internet of things has particularly novel implications in the area of public health. This is due to (1) The rapid and widespread adoption of powerful contemporary Smartphone’s;(2) The increasing availability and ... The Internet of things has particularly novel implications in the area of public health. This is due to (1) The rapid and widespread adoption of powerful contemporary Smartphone’s;(2) The increasing availability and use of health and fitness sensors, wearable sensor patches, smart watches, wireless-enabled digital tattoos and ambient sensors;and (3) The nature of public health to implicitly involve connectivity with and the acquisition of data in relation to large numbers of individuals up to population scale. Of particular relevance in relation to the Internet of Things (IoT) and public health is the need for privacy and anonymity of users. It should be noted that IoT capabilities are not inconsistent with maintaining privacy, due to the focus of public health on aggregate data not individual data and broad public health interventions. In addition, public health information systems utilizing IoT capabilities can be constructed to specifically ensure privacy, security and anonymity, as has been developed and evaluated in this work. In this paper we describe the particular characteristics of the IoT that can play a role in enabling emerging public health capabilities;we describe a privacy-preserving IoT-based public health information system architecture;and provide a privacy evaluation. 展开更多
关键词 internet of THINGS public HEALTH Population HEALTH Privacy ANONYMITY
下载PDF
Unmanned aerial vehicles towards future Industrial Internet:Roles and opportunities
4
作者 Linpei Li Chunlei Sun +5 位作者 Jiahao Huo Yu Su Lei Sun Yao Huang Ning Wang Haijun Zhang 《Digital Communications and Networks》 SCIE CSCD 2024年第4期873-883,共11页
Unmanned Aerial Vehicles(UAVs)are gaining increasing attention in many fields,such as military,logistics,and hazardous site mapping.Utilizing UAVs to assist communications is one of the promising applications and rese... Unmanned Aerial Vehicles(UAVs)are gaining increasing attention in many fields,such as military,logistics,and hazardous site mapping.Utilizing UAVs to assist communications is one of the promising applications and research directions.The future Industrial Internet places higher demands on communication quality.The easy deployment,dynamic mobility,and low cost of UAVs make them a viable tool for wireless communication in the Industrial Internet.Therefore,UAVs are considered as an integral part of Industry 4.0.In this article,three typical use cases of UAVs-assisted communications in Industrial Internet are first summarized.Then,the state-of-the-art technologies for drone-assisted communication in support of the Industrial Internet are presented.According to the current research,it can be assumed that UAV-assisted communication can support the future Industrial Internet to a certain extent.Finally,the potential research directions and open challenges in UAV-assisted communications in the upcoming future Industrial Internet are discussed. 展开更多
关键词 Unmanned aerial vehicles(UAVs) UAV-assisted communications Industrial internet
下载PDF
Attitudes Toward People Who Stutter in the Chinese Context: An Exploratory Study on the Impact of Knowledge Sources
5
作者 Ran AN Judith D.OXLEY John A.TETNOWSKI 《Chinese Journal of Applied Linguistics》 2024年第4期591-611,687,共22页
The public’s attitudes can affect the experience of stuttering of people who stutter.This study investigated the attitudes held by the public about people who stutter in China.A web-based written survey with closed a... The public’s attitudes can affect the experience of stuttering of people who stutter.This study investigated the attitudes held by the public about people who stutter in China.A web-based written survey with closed and open-ended questions was implemented to develop a rich understanding.One hundred and two respondents in 26 provinces and 3 municipalities provided comments on people who stutter in their life aspects such as personality,speech,social life,work,life participation,education,dating and marriage,capability,and communication skills.The predominantly negative attitudes towards the overall domains were identified.Attitudes to people who stutter varied according to the different sources of knowledge.Familiarity with people who stutter might reduce stereotypes.However,knowledge from the media might aggravate stereotypes.Implications and future research orientation were also discussed. 展开更多
关键词 public’s attitudes people who stutter personality communication skills FAMILIARITY media
下载PDF
Design of Intelligent Pension Online Monitoring System Under the Environment of Internet of Things 被引量:2
6
作者 WANG Rong WANG Tianhu 《Instrumentation》 2023年第3期53-64,共12页
With the improvement of the degree of aging,the traditional pension model can no longer meet the growing needs of the elderly.Therefore,it is necessary to use the intelligent means of information technology to improve... With the improvement of the degree of aging,the traditional pension model can no longer meet the growing needs of the elderly.Therefore,it is necessary to use the intelligent means of information technology to improve the level of pension services.This paper will integrate multi-sensor fusion technology,NB-IoT communication technology and cloud platform technology to develop and design a smart pension online monitoring system to realize real-time collection of human health and motion status information and realize monitoring platform management.In this system,STM32 microcontroller will be used as the main control module,and MAX30102,ADXL345 and DS18B20 sensors will be used to collect the heart rate,blood oxygen,displacement and body temperature of the human body in real time.On the one hand,the communication part is completed by the BC20 Internet of Things module.The data transmission between the terminal detection device and the cloud platform,on the other hand,the HC-42 Bluetooth module is used to complete the data communication with the mobile phone.The test results show that the system can collect and process data accurately in real time and maintain good communication with the cloud platform and mobile phone.The designed system has strong pertinence,easy operation,high reliability and broad development prospects. 展开更多
关键词 Smart Pension internet of Things NB-IoT Communication Technology Ali Cloud Platform
下载PDF
Leadership,communication,and science:three pillars essential to public health emergency response and closing the gap in the HIV response among key populations
7
作者 Tafadzwa Dzinamarira Enos Moyo +2 位作者 Perseverance Moyo Munashe Chimene Grant Murewanhema 《Global Health Journal》 2023年第4期182-185,共4页
Globally,there have been multiple public health emergencies in recent decades.High rates of morbidity,occasionally mortality,and economic instability are usually associated with pandemics.One of the epidemics that has... Globally,there have been multiple public health emergencies in recent decades.High rates of morbidity,occasionally mortality,and economic instability are usually associated with pandemics.One of the epidemics that has significantly increased morbidity and mortality worldwide is the human immunodeficiency virus(HIV)and acquired immune deficiency syndrome(AIDS)pandemic.HIV has a disproportionately negative impact on key populations.Strong leadership,effective communication,and sound science are necessary for public health emergency(PHE)responses to be successful.These three PHE response pllars are also essential for bridging the HIV response gap among key populations in the setting of restrictive laws.In this review,we explored the importance of these three pillars of successful PHEs responses,and how they are essential to closing the gap in the HIV response among key populations.Leaders must make decisions and instil a sense of authority in the populace during PHEs to foster trust and confidence.Leaders should base their choices on scientific evidence.Effective communication during PHEs should be proactive,polite,imaginative,innovative,and constructive.To address gaps in the HIV response among key populations,leaders must create a supportive environment for effective communication and scientific research,communication should be used to raise awareness of HIV and to dispel stigma and discrimination,while science should provide evidence of efficacy and effectiveness of interventions amongkey populations. 展开更多
关键词 public health emergencies LEADERSHIP COMMUNICATION SCIENCE Key populations HIV response
下载PDF
Does internet use improve the public evaluation of government environmental governance (GEG) in China? An analysis using the Chinese Social Survey, 2013−2017
8
作者 Jinghuan Chen Jason AJean +1 位作者 Yunliang Zhang Yixi Lu 《Chinese Journal of Population,Resources and Environment》 2022年第4期307-315,共9页
Based on three datasets of the Chinese Social Survey(CSS)2013,2015,and 2017 and the National Statistical Yearbook,this study examined whether and in what ways using the Internet may or may not affect the public evalua... Based on three datasets of the Chinese Social Survey(CSS)2013,2015,and 2017 and the National Statistical Yearbook,this study examined whether and in what ways using the Internet may or may not affect the public evaluation of government environmental governance(GEG).There are three main findings.First,Internet use has a negative influence on the public evaluation of GEG.Second,there has been an urban-rural difference in terms of Internet use;especially for the rural resident,increasing their use of the Internet significantly lowered their evaluation of GEG.Third,Internet use affects GEG mainly through political trust,whilst it tends to enhance people’s perception of environmental problems;however,it has little influence on their evaluation of GEG.This finding implies that public evaluation of GEG should be viewed as an important inter-subjective dimension of GEG;especially in the Internet era,it has become increasingly necessary for the government to not only continuously improve the quality of governance by dealing with actual/practical environmental issues,but also enhance its ability to react to the public opinions online effectively and appropriately. 展开更多
关键词 internet use public evaluation Government environmental governance Urban-rural difference Political trust
下载PDF
Anger as a Predictor of Active Public Protest: Extended Application of the Situational Theory of Publics to a Health Crisis
9
作者 Jin-Ae Kang Seon-Kyoung An Kyung Yoon Kwak 《Journalism and Mass Communication》 2013年第3期199-211,共13页
This study applies the situational theory of publics (STP) to a health crisis by exploring the effect of anger on public behavior. The results of a survey administered on the case of the candlelight rallies on the U... This study applies the situational theory of publics (STP) to a health crisis by exploring the effect of anger on public behavior. The results of a survey administered on the case of the candlelight rallies on the U.S. beef imports in South Korea in 2008 demonstrated that involvement, problem recognition, and constraint recognition predicted communication behaviors as well as various issue-related online and offline behaviors. In addition, anger was found to be a significant driving force for publics to perform the behaviors. The segmented publics showed significantly different levels of anger, information processing and seeking, online behaviors, and participation in the candlelight rallies 展开更多
关键词 crisis communication situational theory of publics emotion online behaviors food safety Korea
下载PDF
The Discussion of Relativity of Teaching Public Speaking and Teaching Spoken English to Students
10
作者 李凤华 《海外英语》 2011年第14期67-68,共2页
In recent years,public speaking has become more important and useful for undergraduate students.Many colleges and universities have opened the public speaking course and have achieved much success.In this paper,we fir... In recent years,public speaking has become more important and useful for undergraduate students.Many colleges and universities have opened the public speaking course and have achieved much success.In this paper,we first emphasize the importance of communication by public speaking,and let students become interested in public speaking.Secondly,we have studied the relativity of spoken English and public speaking;we have found obviously both have strong relation when students study in the class.Finally,we discuss the method we used and the experience we had in English spoken class. 展开更多
关键词 communication by public SPEAKING SPOKEN ENGLISH STUDENTS
下载PDF
Security Architecture on the Trusting Internet of Things 被引量:2
11
作者 Bing Zhang Xin-Xin Ma Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS 2011年第4期364-367,共4页
By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined publi... By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined public key (CPK) mechanism is proposed, which solves the problems about a mass amount of authentications and the cross-domain authentication by integrating nodes' validity of identity authentication and uniqueness of identification. Moreover, the proposal of constructing nodes' authentic identification, valid authentication and credible communication connection at the application layer through the perception layer impels the formation of trust chain and relationship among perceptional nodes. Consequently, a trusting environment of the Internet of Things is built, by which a guidance of designing the trusted one would be provided. 展开更多
关键词 Combined public key elliptic curves cryptography internet of Things radio frequency identification security system trusting system.
下载PDF
National Lists of Scholarly Publication Channels: An Overview and Recommendations for Their Construction and Maintenance 被引量:2
12
作者 Janne Pölönen Raf Guns +2 位作者 Emanuel Kulczycki Gunnar Sivertsen Tim C.E.Engels 《Journal of Data and Information Science》 CSCD 2021年第1期50-86,共37页
Purpose: This paper presents an overview of different kinds of lists of scholarly publication channels and of experiences related to the construction and maintenance of national lists supporting performance-based rese... Purpose: This paper presents an overview of different kinds of lists of scholarly publication channels and of experiences related to the construction and maintenance of national lists supporting performance-based research funding systems. It also contributes with a set of recommendations for the construction and maintenance of national lists of journals and book publishers.Design/methodology/approach: The study is based on analysis of previously published studies, policy papers, and reported experiences related to the construction and use of lists of scholarly publication channels. Findings: Several countries have systems for research funding and/or evaluation, that involve the use of national lists of scholarly publication channels(mainly journals and publishers). Typically, such lists are selective(do not include all scholarly or non-scholarly channels) and differentiated(distinguish between channels of different levels and quality). At the same time, most lists are embedded in a system that encompasses multiple or all disciplines. This raises the question how such lists can be organized and maintained to ensure that all relevant disciplines and all types of research are adequately represented. Research limitation: The conclusions and recommendations of the study are based on the authors' interpretation of a complex and sometimes controversial process with many different stakeholders involved.Practical implications: The recommendations and the related background information provided in this paper enable mutual learning that may feed into improvements in the construction and maintenance of national and other lists of scholarly publication channels in any geographical context. This may foster a development of responsible evaluation practices.Originality/value: This paper presents the first general overview and typology of different kinds of publication channel lists, provides insights on expert-based versus metrics-based evaluation, and formulates a set of recommendations for the responsible construction and maintenance of publication channel lists. 展开更多
关键词 publication channel lists Research funding Scholarly communication Journal ranking
下载PDF
The Innovation and Development of Internet of Vehicles 被引量:9
13
作者 Weiwei Zhang Xiaoqiang Xi 《China Communications》 SCIE CSCD 2016年第5期122-127,共6页
With the advancements in wireless sensor networks, Internet of Vehicles(IOV) has shown great potential in aiding to ease traffic congestion. In IOV, vehicles can easily exchange information with other vehicles and inf... With the advancements in wireless sensor networks, Internet of Vehicles(IOV) has shown great potential in aiding to ease traffic congestion. In IOV, vehicles can easily exchange information with other vehicles and infrastructures, thus, the development of IOV will greatly improve vehicles safety, promote green information consumption and have a profound impact on many industries. The purpose of this paper is to promote the innovation and development of IOV. Firstly, this paper presents general requirements of IOV such as guidelines, basic principles, and the goal of development. Secondly, we analyze critical applications, crucial support, and business model to promote the industrial development of IOV. Finally, this paper proposes some safeguard measures to further promote the development of IOV. 展开更多
关键词 internet of vehicles wireless communication vehicle platform
下载PDF
ETM-IoT:Energy-Aware Threshold Model for Heterogeneous Communication in the Internet of Things 被引量:2
14
作者 A.Vijaya Krishna A.Anny Leema 《Computers, Materials & Continua》 SCIE EI 2022年第1期1815-1827,共13页
The internet of things(IoT)has a wide variety of applications,which in turn raisesmany challenging issues.IoT technology enables devices to closely monitor their environment,providing context-aware intelligence based ... The internet of things(IoT)has a wide variety of applications,which in turn raisesmany challenging issues.IoT technology enables devices to closely monitor their environment,providing context-aware intelligence based on the real-time data collected by their sensor nodes.The IoT not only controls these devices but also monitors their user’s behaviour.One of the major issues related to IoT is the need for an energy-efficient communication protocol which uses the heterogeneity and diversity of the objects connected through the internet.Minimizing energy consumption is a requirement for energyconstrained nodes and outsourced nodes.The IoT nodes deployed in different geographical regions typically have different energy levels.This paper focuses on creating an energy-efficient protocol for IoTwhich can deal with the clustering of nodes and the cluster head selection process.An energy thresholdmodel is developed to select the appropriate cluster heads and also to ensure uniform distribution of energy to those heads andmember nodes.The proposed model envisages an IoT network with three different types of nodes,described here as advanced,intermediate and normal nodes.Normal nodes are first-level nodes,which have the lowest energy use;intermediate nodes are second-level nodes,which have a medium energy requirement;and the advanced class are thirdlevel nodes with the highest energy use.The simulation results demonstrate that the proposed algorithm outperforms other existing algorithms.In tests,it shows a 26%improvement in network lifetime compared with existing algorithms. 展开更多
关键词 internet of things COMMUNICATION energy THRESHOLD heterogeneous network
下载PDF
A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications 被引量:1
15
作者 蒋军 何晨 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第5期399-404,共6页
In this paper, the authors present a novel mutual authentication and key agreement protocol based on the Number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and “challenge-respo... In this paper, the authors present a novel mutual authentication and key agreement protocol based on the Number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and “challenge-response” techniques were adopted to build their protocol. To implement the mutual authentication and session key agreement, the proposed protocol contains two stages: namely initial procedure and real execution stage. Since the lightweight NTRU public key cryptography is employed, their protocol can not only overcome the security flaws of secret-key based authentication protocols such as those used in Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS), but also provide greater security and lower computational complexity in comparison with currently well-known public key based wireless authentication schemes such as Beller-Yacobi and M.Aydos protocols. 展开更多
关键词 Mutual authentication Number theory Research Unit (NTRU) public key cryptography Wireless communications
下载PDF
Artificial Intelligence Based Clustering with Routing Protocol for Internet of Vehicles 被引量:1
16
作者 Manar Ahmed Hamza Haya Mesfer Alshahrani +3 位作者 Fahd NAl-Wesabi Mesfer Al Duhayyim Anwer Mustafa Hilal Hany Mahgoub 《Computers, Materials & Continua》 SCIE EI 2022年第3期5835-5853,共19页
With recent advances made in Internet of Vehicles(IoV)and Cloud Computing(CC),the Intelligent Transportation Systems(ITS)find it advantageous in terms of improvement in quality and interactivity of urban transportatio... With recent advances made in Internet of Vehicles(IoV)and Cloud Computing(CC),the Intelligent Transportation Systems(ITS)find it advantageous in terms of improvement in quality and interactivity of urban transportation service,mitigation of costs incurred,reduction in resource utilization,and improvement in traffic management capabilities.Many trafficrelated problems in future smart cities can be sorted out with the incorporation of IoV in transportation.IoV communication enables the collection and distribution of real-time essential data regarding road network condition.In this scenario,energy-efficient and reliable intercommunication routes are essential among vehicular nodes in sustainable urban computing.With this motivation,the current research article presents a new Artificial Intelligence-based Energy Efficient Clustering with Routing(AI-EECR)Protocol for IoV in urban computing.The proposed AI-EECR protocol operates under three stages namely,network initialization,Cluster Head(CH)selection,and routing protocol.The presented AI-EECR protocol determines the CHs from vehicles with the help of Quantum Chemical Reaction Optimization(QCRO)algorithm.QCROalgorithmderives a fitness function with the help of vehicle speed,trust level,and energy level of the vehicle.In order to make appropriate routing decisions,a set of relay nodeswas selected usingGroup Teaching Optimization Algorithm(GTOA).The performance of the presented AI-EECR model,in terms of energy efficiency,was validated against different aspects and a brief comparative analysis was conducted.The experimental outcomes established that AI-EECR model outperformed the existing methods under different measures. 展开更多
关键词 Vehicular communication internet of vehicles energy efficient smart transportation smart city urban computing
下载PDF
Visualizing the Earth in Earthquake Education:Investigating the Value of Visuals Used in Southern California's Shakeout Public Earthquake Public Earthquake Drill
17
作者 Helen Kathleen Bottomley 《地学前缘》 EI CAS CSCD 北大核心 2009年第S1期185-185,共1页
The value of visuals used in public earthquake education is a theme essentially unexplored.This Los Angeles-based study is a preliminary investigation into this topic,focusing on the pioneering 2008 ShakeOut Southern ... The value of visuals used in public earthquake education is a theme essentially unexplored.This Los Angeles-based study is a preliminary investigation into this topic,focusing on the pioneering 2008 ShakeOut Southern California public earthquake drill: the largest earthquake drill in US history.The ShakeOut scenario is based on a magnitude 7.8 earthquake occurring on the San Andreas Fault,and 展开更多
关键词 VISUAL communication EARTHQUAKE public
下载PDF
Influence Factors Concept Model for Public Participation in Nanotechnology Risk Communication
18
作者 刘中梅 王续琨 +2 位作者 罗晨阳 黄福 侯海燕 《Journal of Donghua University(English Edition)》 EI CAS 2016年第2期327-331,共5页
Based on risk social cognition theory and planned behavior theory, the influence factors of the public participation in the nanotechnology risk communication are analyzed,and the concept model is presented to analyze ... Based on risk social cognition theory and planned behavior theory, the influence factors of the public participation in the nanotechnology risk communication are analyzed,and the concept model is presented to analyze their relationships and functional mechanism. In the model,the risk communication behaviors are divided into two variables of the public opinion expression and information acquisition,and the subjective norm divided into the internal and external social networks. Then the questionnaire is designed so as to verify the proposed model and analyze their relationships. The survey data are analyzed using SMART PLS software. The validity analysis shows that the questionnaire has a high convergence and discriminant validity. In addition, the Cronbach'a coefficient of each item is more than 0. 70,which shows the questionnaire has a high credibility. Based on the statistical data analysis, relationships of the influence factors are obtained.Further,the influence path model of the public attitude,intention,self regulation and behavior control in the risk communication is established. According to the Bootstrap algorithm in SMART,the path coefficient and its explanation variance of each influence factor are obtained. The calculation results show that the explanation variance values are all bigger than 10% and the path is reliable.Based on the path model, the influence path and function relationships of the participation attitude, subjective norm and behavior control on the participation intention and behavior are obtained. This will provide theoretical and data supports for the risk management and strategy making of the public participation in nanotechnology risk communication. 展开更多
关键词 NANOTECHNOLOGY risk communication public participation influence path model
下载PDF
Reduction of Tobacco Smoking Health Risk Through an Appropriate Media Based Communication Strategy in Uganda
19
作者 Henry Musoke Semakula 《Chinese Journal of Population,Resources and Environment》 2010年第3期59-66,共8页
The health impacts of tobacco consumption are well documented and have gained acceptance worldwide. Today, a substantial, preventable burden of tobacco attributable diseases exists in most countries, though in most of... The health impacts of tobacco consumption are well documented and have gained acceptance worldwide. Today, a substantial, preventable burden of tobacco attributable diseases exists in most countries, though in most of the cases, unknown. Smoking accounts for almost half of the deaths in middle age in some regions. In Uganda, translating findings into policy action is slow and involves several stakeholders. It will continue to require support from tobacco control campaign groups. This paper analyses secondary literature on tobacco smoking and later provides an appropriate medium based communication strategy that can be adopted to counteract the persuasive smoking evil adverts of tobacco companies as well as creating awareness among the population of the health impacts caused by smoking. 展开更多
关键词 communication strategy tobacco smoking risks public health
下载PDF
Machine Learning-Enabled Communication Approach for the Internet of Medical Things
20
作者 Rahim Khan Abdullah Ghani +3 位作者 Samia Allaoua Chelloug Mohammed Amin Aamir Saeed Jason Teo 《Computers, Materials & Continua》 SCIE EI 2023年第8期1569-1584,共16页
The Internet ofMedical Things(IoMT)is mainly concernedwith the efficient utilisation of wearable devices in the healthcare domain to manage various processes automatically,whereas machine learning approaches enable th... The Internet ofMedical Things(IoMT)is mainly concernedwith the efficient utilisation of wearable devices in the healthcare domain to manage various processes automatically,whereas machine learning approaches enable these smart systems to make informed decisions.Generally,broadcasting is used for the transmission of frames,whereas congestion,energy efficiency,and excessive load are among the common issues associated with existing approaches.In this paper,a machine learning-enabled shortest path identification scheme is presented to ensure reliable transmission of frames,especially with the minimum possible communication overheads in the IoMT network.For this purpose,the proposed scheme utilises a well-known technique,i.e.,Kruskal’s algorithm,to find an optimal path from source to destination wearable devices.Additionally,other evaluation metrics are used to find a reliable and shortest possible communication path between the two interested parties.Apart from that,every device is bound to hold a supplementary path,preferably a second optimised path,for situations where the current communication path is no longer available,either due to device failure or heavy traffic.Furthermore,the machine learning approach helps enable these devices to update their routing tables simultaneously,and an optimal path could be replaced if a better one is available.The proposed mechanism has been tested using a smart environment developed for the healthcare domain using IoMT networks.Simulation results show that the proposed machine learning-oriented approach performs better than existing approaches where the proposed scheme has achieved the minimum possible ratios,i.e.,17%and 23%,in terms of end to end delay and packet losses,respectively.Moreover,the proposed scheme has achieved an approximately 21%improvement in the average throughput compared to the existing schemes. 展开更多
关键词 Machine learning internet of Medical Things healthcare load balancing COMMUNICATION
下载PDF
上一页 1 2 155 下一页 到第
使用帮助 返回顶部