There exist serious problems in the trustworthiness (security, reliability, controllability and manageability) of the Internet. In order to solve these problems, a new-generation network architecture model, based on t...There exist serious problems in the trustworthiness (security, reliability, controllability and manageability) of the Internet. In order to solve these problems, a new-generation network architecture model, based on the research of the basic theories of new-generation Internet system, is proposed. The solution creates a switching routing model and theory for the new-generation Internet system, and defines the access identifier, generalized switching routing identifier and their mapping principles. It also establishes a pervasive service system architecture and theory, defines the service identifier, connection identifier and their mapping principles. This paper discusses key technologies for the new-generation Internet system, such as access control and management, trusted routing and Quality of Service (QoS), multi-streaming, and network monitoring and management.展开更多
On October 18, the International Electrotechnical Commission(IEC) published IEC PAS 63441:2022, Functional architecture of industrial internet system for industrial automation applications, which is the first internat...On October 18, the International Electrotechnical Commission(IEC) published IEC PAS 63441:2022, Functional architecture of industrial internet system for industrial automation applications, which is the first international specification in this field.Laying the cornerstone of industrial internet, IEC PAS 63441:2022 normalizes the models, structures.展开更多
加州红木城和印度孟买2008年10月14日电/新华美通/-通信新世界领域的领先供应商Tata Communications和非营利性公益企业Internet Systems Consortium.Inc.(ISCl今天宣布,双方将合作为企业和服务供应商提供业界最佳的域名系统(DN...加州红木城和印度孟买2008年10月14日电/新华美通/-通信新世界领域的领先供应商Tata Communications和非营利性公益企业Internet Systems Consortium.Inc.(ISCl今天宣布,双方将合作为企业和服务供应商提供业界最佳的域名系统(DNS)托管服务。DNS能够提供互联网必须的功能。展开更多
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accide...The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks.展开更多
In recent years,the Industrial Internet and Industry 4.0 came into being.With the development of modern industrial intelligent manufacturing technology,digital twins,Web3 and many other digital entity applications are...In recent years,the Industrial Internet and Industry 4.0 came into being.With the development of modern industrial intelligent manufacturing technology,digital twins,Web3 and many other digital entity applications are also proposed.These applications apply architectures such as distributed learning,resource sharing,and arithmetic trading,which make high demands on identity authentication,asset authentication,resource addressing,and service location.Therefore,an efficient,secure,and trustworthy Industrial Internet identity resolution system is needed.However,most of the traditional identity resolution systems follow DNS architecture or tree structure,which has the risk of a single point of failure and DDoS attack.And they cannot guarantee the security and privacy of digital identity,personal assets,and device information.So we consider a decentralized approach for identity management,identity authentication,and asset verification.In this paper,we propose a distributed trusted active identity resolution system based on the inter-planetary file system(IPFS)and non-fungible token(NFT),which can provide distributed identity resolution services.And we have designed the system architecture,identity service process,load balancing strategy and smart contract service.In addition,we use Jmeter to verify the performance of the system,and the results show that the system has good high concurrent performance and robustness.展开更多
The Autonomous Underwater Glider(AUG)is a kind of prevailing underwater intelligent internet vehicle and occupies a dominant position in industrial applications,in which path planning is an essential problem.Due to th...The Autonomous Underwater Glider(AUG)is a kind of prevailing underwater intelligent internet vehicle and occupies a dominant position in industrial applications,in which path planning is an essential problem.Due to the complexity and variability of the ocean,accurate environment modeling and flexible path planning algorithms are pivotal challenges.The traditional models mainly utilize mathematical functions,which are not complete and reliable.Most existing path planning algorithms depend on the environment and lack flexibility.To overcome these challenges,we propose a path planning system for underwater intelligent internet vehicles.It applies digital twins and sensor data to map the real ocean environment to a virtual digital space,which provides a comprehensive and reliable environment for path simulation.We design a value-based reinforcement learning path planning algorithm and explore the optimal network structure parameters.The path simulation is controlled by a closed-loop model integrated into the terminal vehicle through edge computing.The integration of state input enriches the learning of neural networks and helps to improve generalization and flexibility.The task-related reward function promotes the rapid convergence of the training.The experimental results prove that our reinforcement learning based path planning algorithm has great flexibility and can effectively adapt to a variety of different ocean conditions.展开更多
The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and ...The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and needs to be explored in various areas to understand the key challenges for deployment in real-world scenarios.The paper systematically reviewed the available literature using the PRISMA guiding principle.The study aims to provide a detailed overview of the increasing use of FL in IoT networks,including the architecture and challenges.A systematic review approach is used to collect,categorize and analyze FL-IoT-based articles.Asearch was performed in the IEEE,Elsevier,Arxiv,ACM,and WOS databases and 92 articles were finally examined.Inclusion measures were published in English and with the keywords“FL”and“IoT”.The methodology begins with an overview of recent advances in FL and the IoT,followed by a discussion of how these two technologies can be integrated.To be more specific,we examine and evaluate the capabilities of FL by talking about communication protocols,frameworks and architecture.We then present a comprehensive analysis of the use of FL in a number of key IoT applications,including smart healthcare,smart transportation,smart cities,smart industry,smart finance,and smart agriculture.The key findings from this analysis of FL IoT services and applications are also presented.Finally,we performed a comparative analysis with FL IID(independent and identical data)and non-ID,traditional centralized deep learning(DL)approaches.We concluded that FL has better performance,especially in terms of privacy protection and resource utilization.FL is excellent for preserving privacy becausemodel training takes place on individual devices or edge nodes,eliminating the need for centralized data aggregation,which poses significant privacy risks.To facilitate development in this rapidly evolving field,the insights presented are intended to help practitioners and researchers navigate the complex terrain of FL and IoT.展开更多
This article proposes a comprehensive monitoring system for tunnel operation to address the risks associated with tunnel operations.These risks include safety control risks,increased traffic flow,extreme weather event...This article proposes a comprehensive monitoring system for tunnel operation to address the risks associated with tunnel operations.These risks include safety control risks,increased traffic flow,extreme weather events,and movement of tectonic plates.The proposed system is based on the Internet of Things and artificial intelligence identification technology.The monitoring system will cover various aspects of tunnel operations,such as the slope of the entrance,the structural safety of the cave body,toxic and harmful gases that may appear during operation,excessively high and low-temperature humidity,poor illumination,water leakage or road water accumulation caused by extreme weather,combustion and smoke caused by fires,and more.The system will enable comprehensive monitoring and early warning of fire protection systems,accident vehicles,and overheating vehicles.This will effectively improve safety during tunnel operation.展开更多
This paper proposes a street light warning system based on Internet of Things(IoT)technology,which uses cameras to detect moving targets such as vehicles and pedestrians around the system and adjust the brightness of ...This paper proposes a street light warning system based on Internet of Things(IoT)technology,which uses cameras to detect moving targets such as vehicles and pedestrians around the system and adjust the brightness of street lights according to road conditions to reduce unnecessary power waste.The system has a mature self-fault detection mechanism and is equipped with a wireless communication device for data exchange and timely communication with the host computer terminal.The intelligent street lamp system in this paper can be used to reduce the occurrence of pedestrian and vehicle accidents at intersections,and at the same time reduce the consumption of manpower and material resources for street lamp troubleshooting,to achieve energy conservation and emission reduction.展开更多
With the continuous intensification of global aging,the issue of elderly care has become an increasingly prominent social problem.The Internet of Things(IoT)technology,as an emerging field,holds broad application pros...With the continuous intensification of global aging,the issue of elderly care has become an increasingly prominent social problem.The Internet of Things(IoT)technology,as an emerging field,holds broad application prospects.This article focuses on the application of IoT technology in group elderly care services and constructs a quality evaluation system for these services based on IoT technology.Through the analysis of practical application cases,the advantages and challenges of IoT technology in group elderly care services have been examined,confirming the feasibility and effectiveness of the evaluation system.展开更多
Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enh...Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enhance the range of network information services accessible to humans.With the transition of terrestrial mobile communication networks from the 5G era,which provides access to information anywhere,to the 6G era,which seeks to connect everything,the construction of satellite Internet,which promises a"network reaching everywhere and service is ubiquitous",has become the consensus of the industry's development and the focus of global scientific and technological innovation.展开更多
In indoor environments,various batterypowered Internet of Things(IoT)devices,such as remote controllers and electronic tags on high-level shelves,require efficient energy management.However,manually monitoring remaini...In indoor environments,various batterypowered Internet of Things(IoT)devices,such as remote controllers and electronic tags on high-level shelves,require efficient energy management.However,manually monitoring remaining energy levels and battery replacement is both inadequate and costly.This paper introduces an energy management system for indoor IoT,which includes a mobile energy station(ES)for enabling on-demand wireless energy transfer(WET)in radio frequency(RF),some energy receivers(ERs),and a cloud server.By implementing a two-stage positioning system and embedding energy receivers into traditional IoT devices,we robustly manage their energy storage.The experimental results demonstrate that the energy receiver can harvest a minimum power of 58 mW.展开更多
AIM: To provide a comprehensive overview of clinical studies on the clinical picture of Internet-use related addictions from a holistic perspective. A literature search was conducted using the database Web of Science....AIM: To provide a comprehensive overview of clinical studies on the clinical picture of Internet-use related addictions from a holistic perspective. A literature search was conducted using the database Web of Science.METHODS: Over the last 15 years, the number of Internet users has increased by 1000%, and at the same time, research on addictive Internet use has proliferated. Internet addiction has not yet been understood very well, and research on its etiology and natural history is still in its infancy. In 2013, the American Psychiatric Association included Internet Gaming Disorder in the appendix of the updated version of the Diagnostic and Statistical Manual for Mental Disorders(DSM-5) as condition that requires further research prior to official inclusion in the main manual, with important repercussions for research and treatment. To date, reviews have focused on clinical and treatment studies of Internet addiction and Internet Gaming Disorder. This arguably limits the analysis to a specific diagnosis of a potential disorder that has not yet been officially recognised in the Western world, rather than a comprehensive and inclusive investigation of Internet-use related addictions(including problematic Internet use) more generally. RESULTS: The systematic literature review identified a total of 46 relevant studies. The included studies used clinical samples, and focused on characteristics of treatment seekers and online addiction treatment. Four main types of clinical research studies were identified, namely research involving(1) treatment seeker characteristics;(2) psychopharmacotherapy;(3) psychological therapy; and(4) combined treatment. CONCLUSION: A consensus regarding diagnostic criteria and measures is needed to improve reliability across studies and to develop effective and efficient treatment approaches for treatment seekers.展开更多
With the development of Internet technologies, Internet Based Information System (IBIS) arises with more advantages: Firstly, it is convenient for users to use owing to the introduction of Internet technologies. Secon...With the development of Internet technologies, Internet Based Information System (IBIS) arises with more advantages: Firstly, it is convenient for users to use owing to the introduction of Internet technologies. Secondly, it benefits greatly the data dissemination and data sharing based on Internet. The most important but not the last is that we can establish the information service network supported by its technologies and the facilities of information highway. So, it would be significant to design IBIS to realize the data collection, sharing and dissemination on Internet. There are many factors affecting regional environment. So it is not easy to realize the integrated environmental monitoring. Given this, we designed the Internet based environmental monitoring information system. By the virtue of the Internet based environmental monitoring information system, the management and storage of environmental monitoring data would be easier, which lays the foundation to actualize the environmental monitoring efficiently.展开更多
This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the per...This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the perspective of blocking attacks. On this basis, the host protection mobile agent protection technology is selected, and a method to enhance the security protection of mobile agents (referred to as IEOP method) is proposed. The method first encrypts the mobile agent code using the encryption function, and then encapsulates the encrypted mobile agent with the improved EOP protocol IEOP, and then traces the suspicious execution result. Experiments show that using this method can block most malicious attacks on mobile agents, and can protect the integrity and confidentiality of mobile agents, but the increment of mobile agent tour time is not large.展开更多
Background The internet is an integral part of everyone’s life.College going adolescents are highly vulnerable to the misuse of the internet.Aims To estimate the pooled prevalence of internet addiction(IA)among colle...Background The internet is an integral part of everyone’s life.College going adolescents are highly vulnerable to the misuse of the internet.Aims To estimate the pooled prevalence of internet addiction(IA)among college students in India.Methods Literature databases(PubMed,Web of Science,Scopus,EMBASE,PsycINFO and Google Scholar)were searched for studies assessing IA using the Young Internet Addiction Test(Y-IAT)among adolescents from India,published in the English language up to December 2020.We included studies from 2010 to 2020 as this is the marked era of momentum in wireless internet connectivity in India.The methodological quality of each study was scored,and data were extracted from the published reports.Pooled prevalence was estimated using the fixed-effects model.Publication bias was evaluated using Egger’s test and visual inspection of the symmetry in funnel plots.Results Fifty studies conducted in 19 states of India estimated the prevalence of IA and the overall prevalence of IA as 19.9%(95%CI:19.3%to 20.5%)and 40.7%(95%CI:38.7%to 42.8%)based on the Y-IAT cut-off scores of 50 and 40,respectively.The estimated prevalence of severe IA was significantly higher in the Y-IAT cut-off points of 70 than 80(12.7%(95%CI:11.2%to 14.3%)vs 4.6%(95%CI:4.1%to 5.2%)).The sampling method and quality of included studies had a significant effect on the estimation of prevalence in which studies using non-probability sampling and low risk of bias(total quality score≥7)reported lower prevalence.The overall quality of evidence was rated as‘moderate’based on the Grading of Recommendations Assessment,Development and Evaluation criteria.Conclusions Our nationally representative data suggest that about 20%to 40%of college students in India are at risk for IA.There is a need for further research in the reconsideration of Y-IAT cut-off points among Indian college students.展开更多
Technological advances in recent years have significantly changed the way an operating room works.This work aims to create a platformto solve the problems of operating room occupancy and prepare the rooms with an envi...Technological advances in recent years have significantly changed the way an operating room works.This work aims to create a platformto solve the problems of operating room occupancy and prepare the rooms with an environment that is favorable for all operations.Using this system,a doctor can control all operation rooms,especially before an operation,and monitor their temperature and humidity to prepare for the operation.Also,in the event of a problem,an alert is sent to the nurse responsible for the room and medical stuff so that the problem can be resolved.The platformis tested using a Raspberry PI card and sensors.The sensors are connected to a cloud layer that collects and analyzes the temperature and humidity values obtained from the environment during an operation.The result of experimentations is visualized through a web application and an Android application.The platform also considers the security aspects such as authorization to access application functionalities for the Web and the mobile applications.We can also test and evaluate the system’s existing problems and vulnerabilities using the IEEE and owasp IoT standards.Finally,the proposed framework is extended with a model based testing technique that may be adopted for validating the security aspects.展开更多
IoT usage in healthcare is one of the fastest growing domains all over the world which applies to every age group.Internet of Medical Things(IoMT)bridges the gap between the medical and IoT field where medical devices...IoT usage in healthcare is one of the fastest growing domains all over the world which applies to every age group.Internet of Medical Things(IoMT)bridges the gap between the medical and IoT field where medical devices communicate with each other through a wireless communication network.Advancement in IoMT makes human lives easy and better.This paper provides a comprehensive detailed literature survey to investigate different IoMT-driven applications,methodologies,and techniques to ensure the sustainability of IoMT-driven systems.The limitations of existing IoMTframeworks are also analyzed concerning their applicability in real-time driven systems or applications.In addition to this,various issues(gaps),challenges,and needs in the context of such systems are highlighted.The purpose of this paper is to interpret a rigorous review concept related to IoMT and present significant contributions in the field across the research fraternity.Lastly,this paper discusses the opportunities and prospects of IoMT and discusses various open research problems.展开更多
The ubiquitous power Internet of Things(UPIoT)is an intelligent service system with comprehensive state perception,efficient processing,and flexible application of information.It focuses on each link of the power syst...The ubiquitous power Internet of Things(UPIoT)is an intelligent service system with comprehensive state perception,efficient processing,and flexible application of information.It focuses on each link of the power system and makes full use of the mobile internet,artificial intelligence,and other advanced information and communication technologies in order to realize the inter-human interaction of all things in all links of the power system.This article systematically presents to the national and international organizations and agencies in charge of UPIoT layer standardization the status quo of the research on the Internet of Things(IoT)-related industry standards system.It briefly describes the generic standard classification methods,layered architecture,conceptual model,and system tables in the UPIoT application layer.Based on the principles of inheritance,innovation,and practicability,this study divides the application layer into customer service,power grid operation,integrated energy,and enterprise operation,emerging business and analyzes the standard requirements of these five fields.This study also proposes a standard plan.Finally,it summarizes the research report and provides suggestions for a follow-up work.展开更多
基金the National BasicResearch Program of China ("973" Program)under Grant 2007CB307101the CultivationFinances of Ministry of Education for HigherEducation Institutes’Major Programs in Scienceand Technology Innovation Engineering underGrant 706005the Discipline Innovation andTalent Introduction Plan for Higher EducationInstitutes of China under Grant B08002.
文摘There exist serious problems in the trustworthiness (security, reliability, controllability and manageability) of the Internet. In order to solve these problems, a new-generation network architecture model, based on the research of the basic theories of new-generation Internet system, is proposed. The solution creates a switching routing model and theory for the new-generation Internet system, and defines the access identifier, generalized switching routing identifier and their mapping principles. It also establishes a pervasive service system architecture and theory, defines the service identifier, connection identifier and their mapping principles. This paper discusses key technologies for the new-generation Internet system, such as access control and management, trusted routing and Quality of Service (QoS), multi-streaming, and network monitoring and management.
文摘On October 18, the International Electrotechnical Commission(IEC) published IEC PAS 63441:2022, Functional architecture of industrial internet system for industrial automation applications, which is the first international specification in this field.Laying the cornerstone of industrial internet, IEC PAS 63441:2022 normalizes the models, structures.
文摘加州红木城和印度孟买2008年10月14日电/新华美通/-通信新世界领域的领先供应商Tata Communications和非营利性公益企业Internet Systems Consortium.Inc.(ISCl今天宣布,双方将合作为企业和服务供应商提供业界最佳的域名系统(DNS)托管服务。DNS能够提供互联网必须的功能。
基金This paper is financed by the European Union-NextGenerationEU,through the National Recovery and Resilience Plan of the Republic of Bulgaria,Project No.BG-RRP-2.004-0001-C01.
文摘The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks.
基金supported by the National Natural Science Foundation of China(No.92267301).
文摘In recent years,the Industrial Internet and Industry 4.0 came into being.With the development of modern industrial intelligent manufacturing technology,digital twins,Web3 and many other digital entity applications are also proposed.These applications apply architectures such as distributed learning,resource sharing,and arithmetic trading,which make high demands on identity authentication,asset authentication,resource addressing,and service location.Therefore,an efficient,secure,and trustworthy Industrial Internet identity resolution system is needed.However,most of the traditional identity resolution systems follow DNS architecture or tree structure,which has the risk of a single point of failure and DDoS attack.And they cannot guarantee the security and privacy of digital identity,personal assets,and device information.So we consider a decentralized approach for identity management,identity authentication,and asset verification.In this paper,we propose a distributed trusted active identity resolution system based on the inter-planetary file system(IPFS)and non-fungible token(NFT),which can provide distributed identity resolution services.And we have designed the system architecture,identity service process,load balancing strategy and smart contract service.In addition,we use Jmeter to verify the performance of the system,and the results show that the system has good high concurrent performance and robustness.
基金supported by the National Natural Science Foundation of China(No.61871283).
文摘The Autonomous Underwater Glider(AUG)is a kind of prevailing underwater intelligent internet vehicle and occupies a dominant position in industrial applications,in which path planning is an essential problem.Due to the complexity and variability of the ocean,accurate environment modeling and flexible path planning algorithms are pivotal challenges.The traditional models mainly utilize mathematical functions,which are not complete and reliable.Most existing path planning algorithms depend on the environment and lack flexibility.To overcome these challenges,we propose a path planning system for underwater intelligent internet vehicles.It applies digital twins and sensor data to map the real ocean environment to a virtual digital space,which provides a comprehensive and reliable environment for path simulation.We design a value-based reinforcement learning path planning algorithm and explore the optimal network structure parameters.The path simulation is controlled by a closed-loop model integrated into the terminal vehicle through edge computing.The integration of state input enriches the learning of neural networks and helps to improve generalization and flexibility.The task-related reward function promotes the rapid convergence of the training.The experimental results prove that our reinforcement learning based path planning algorithm has great flexibility and can effectively adapt to a variety of different ocean conditions.
文摘The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and needs to be explored in various areas to understand the key challenges for deployment in real-world scenarios.The paper systematically reviewed the available literature using the PRISMA guiding principle.The study aims to provide a detailed overview of the increasing use of FL in IoT networks,including the architecture and challenges.A systematic review approach is used to collect,categorize and analyze FL-IoT-based articles.Asearch was performed in the IEEE,Elsevier,Arxiv,ACM,and WOS databases and 92 articles were finally examined.Inclusion measures were published in English and with the keywords“FL”and“IoT”.The methodology begins with an overview of recent advances in FL and the IoT,followed by a discussion of how these two technologies can be integrated.To be more specific,we examine and evaluate the capabilities of FL by talking about communication protocols,frameworks and architecture.We then present a comprehensive analysis of the use of FL in a number of key IoT applications,including smart healthcare,smart transportation,smart cities,smart industry,smart finance,and smart agriculture.The key findings from this analysis of FL IoT services and applications are also presented.Finally,we performed a comparative analysis with FL IID(independent and identical data)and non-ID,traditional centralized deep learning(DL)approaches.We concluded that FL has better performance,especially in terms of privacy protection and resource utilization.FL is excellent for preserving privacy becausemodel training takes place on individual devices or edge nodes,eliminating the need for centralized data aggregation,which poses significant privacy risks.To facilitate development in this rapidly evolving field,the insights presented are intended to help practitioners and researchers navigate the complex terrain of FL and IoT.
文摘This article proposes a comprehensive monitoring system for tunnel operation to address the risks associated with tunnel operations.These risks include safety control risks,increased traffic flow,extreme weather events,and movement of tectonic plates.The proposed system is based on the Internet of Things and artificial intelligence identification technology.The monitoring system will cover various aspects of tunnel operations,such as the slope of the entrance,the structural safety of the cave body,toxic and harmful gases that may appear during operation,excessively high and low-temperature humidity,poor illumination,water leakage or road water accumulation caused by extreme weather,combustion and smoke caused by fires,and more.The system will enable comprehensive monitoring and early warning of fire protection systems,accident vehicles,and overheating vehicles.This will effectively improve safety during tunnel operation.
文摘This paper proposes a street light warning system based on Internet of Things(IoT)technology,which uses cameras to detect moving targets such as vehicles and pedestrians around the system and adjust the brightness of street lights according to road conditions to reduce unnecessary power waste.The system has a mature self-fault detection mechanism and is equipped with a wireless communication device for data exchange and timely communication with the host computer terminal.The intelligent street lamp system in this paper can be used to reduce the occurrence of pedestrian and vehicle accidents at intersections,and at the same time reduce the consumption of manpower and material resources for street lamp troubleshooting,to achieve energy conservation and emission reduction.
基金Phased Achievement of the National College Student Innovation and Entrepreneurship Training Project“Time Bay-A Group Elderly Care Service Platform Based on Internet of Things Technology”(S202013836008X)2021 Chongqing Education Commission Science and Technology Research Program Youth Project(KJQN202105501).
文摘With the continuous intensification of global aging,the issue of elderly care has become an increasingly prominent social problem.The Internet of Things(IoT)technology,as an emerging field,holds broad application prospects.This article focuses on the application of IoT technology in group elderly care services and constructs a quality evaluation system for these services based on IoT technology.Through the analysis of practical application cases,the advantages and challenges of IoT technology in group elderly care services have been examined,confirming the feasibility and effectiveness of the evaluation system.
文摘Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enhance the range of network information services accessible to humans.With the transition of terrestrial mobile communication networks from the 5G era,which provides access to information anywhere,to the 6G era,which seeks to connect everything,the construction of satellite Internet,which promises a"network reaching everywhere and service is ubiquitous",has become the consensus of the industry's development and the focus of global scientific and technological innovation.
基金supported in part by the Natural Science Foundation of China(NSFC)under Grant 61971102in part by the Key Research and Development Program of Zhejiang Province under Grant 2022C01093.
文摘In indoor environments,various batterypowered Internet of Things(IoT)devices,such as remote controllers and electronic tags on high-level shelves,require efficient energy management.However,manually monitoring remaining energy levels and battery replacement is both inadequate and costly.This paper introduces an energy management system for indoor IoT,which includes a mobile energy station(ES)for enabling on-demand wireless energy transfer(WET)in radio frequency(RF),some energy receivers(ERs),and a cloud server.By implementing a two-stage positioning system and embedding energy receivers into traditional IoT devices,we robustly manage their energy storage.The experimental results demonstrate that the energy receiver can harvest a minimum power of 58 mW.
基金Supported by A grant from the European Commission("Tech Use Disorders"Grant ID:FP7-PEOPLE-2013-IEF-627999)awarded to Olatz Lopez-Fernandez
文摘AIM: To provide a comprehensive overview of clinical studies on the clinical picture of Internet-use related addictions from a holistic perspective. A literature search was conducted using the database Web of Science.METHODS: Over the last 15 years, the number of Internet users has increased by 1000%, and at the same time, research on addictive Internet use has proliferated. Internet addiction has not yet been understood very well, and research on its etiology and natural history is still in its infancy. In 2013, the American Psychiatric Association included Internet Gaming Disorder in the appendix of the updated version of the Diagnostic and Statistical Manual for Mental Disorders(DSM-5) as condition that requires further research prior to official inclusion in the main manual, with important repercussions for research and treatment. To date, reviews have focused on clinical and treatment studies of Internet addiction and Internet Gaming Disorder. This arguably limits the analysis to a specific diagnosis of a potential disorder that has not yet been officially recognised in the Western world, rather than a comprehensive and inclusive investigation of Internet-use related addictions(including problematic Internet use) more generally. RESULTS: The systematic literature review identified a total of 46 relevant studies. The included studies used clinical samples, and focused on characteristics of treatment seekers and online addiction treatment. Four main types of clinical research studies were identified, namely research involving(1) treatment seeker characteristics;(2) psychopharmacotherapy;(3) psychological therapy; and(4) combined treatment. CONCLUSION: A consensus regarding diagnostic criteria and measures is needed to improve reliability across studies and to develop effective and efficient treatment approaches for treatment seekers.
基金Knowledge Innovation Project of CAS No. KZCX02-308
文摘With the development of Internet technologies, Internet Based Information System (IBIS) arises with more advantages: Firstly, it is convenient for users to use owing to the introduction of Internet technologies. Secondly, it benefits greatly the data dissemination and data sharing based on Internet. The most important but not the last is that we can establish the information service network supported by its technologies and the facilities of information highway. So, it would be significant to design IBIS to realize the data collection, sharing and dissemination on Internet. There are many factors affecting regional environment. So it is not easy to realize the integrated environmental monitoring. Given this, we designed the Internet based environmental monitoring information system. By the virtue of the Internet based environmental monitoring information system, the management and storage of environmental monitoring data would be easier, which lays the foundation to actualize the environmental monitoring efficiently.
基金supported by the National Natural Science Foundation of China (61772196 61472136)+3 种基金the Hunan Provincial Focus Social Science Fund (2016ZDB006)Hunan Provincial Social Science Achievement Review Committee results appraisal identification project (Xiang social assessment 2016JD05)Key Project of Hunan Provincial Social Science Achievement Review Committee (XSP 19ZD1005)the financial support provided by the Key Laboratory of Hunan Province for New Retail Virtual Reality Technology (2017TP1026)
文摘This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the perspective of blocking attacks. On this basis, the host protection mobile agent protection technology is selected, and a method to enhance the security protection of mobile agents (referred to as IEOP method) is proposed. The method first encrypts the mobile agent code using the encryption function, and then encapsulates the encrypted mobile agent with the improved EOP protocol IEOP, and then traces the suspicious execution result. Experiments show that using this method can block most malicious attacks on mobile agents, and can protect the integrity and confidentiality of mobile agents, but the increment of mobile agent tour time is not large.
文摘Background The internet is an integral part of everyone’s life.College going adolescents are highly vulnerable to the misuse of the internet.Aims To estimate the pooled prevalence of internet addiction(IA)among college students in India.Methods Literature databases(PubMed,Web of Science,Scopus,EMBASE,PsycINFO and Google Scholar)were searched for studies assessing IA using the Young Internet Addiction Test(Y-IAT)among adolescents from India,published in the English language up to December 2020.We included studies from 2010 to 2020 as this is the marked era of momentum in wireless internet connectivity in India.The methodological quality of each study was scored,and data were extracted from the published reports.Pooled prevalence was estimated using the fixed-effects model.Publication bias was evaluated using Egger’s test and visual inspection of the symmetry in funnel plots.Results Fifty studies conducted in 19 states of India estimated the prevalence of IA and the overall prevalence of IA as 19.9%(95%CI:19.3%to 20.5%)and 40.7%(95%CI:38.7%to 42.8%)based on the Y-IAT cut-off scores of 50 and 40,respectively.The estimated prevalence of severe IA was significantly higher in the Y-IAT cut-off points of 70 than 80(12.7%(95%CI:11.2%to 14.3%)vs 4.6%(95%CI:4.1%to 5.2%)).The sampling method and quality of included studies had a significant effect on the estimation of prevalence in which studies using non-probability sampling and low risk of bias(total quality score≥7)reported lower prevalence.The overall quality of evidence was rated as‘moderate’based on the Grading of Recommendations Assessment,Development and Evaluation criteria.Conclusions Our nationally representative data suggest that about 20%to 40%of college students in India are at risk for IA.There is a need for further research in the reconsideration of Y-IAT cut-off points among Indian college students.
基金Taif University Researchers Supporting Project(TURSP-2020/36),Taif University,Taif,Saudi Arabia.
文摘Technological advances in recent years have significantly changed the way an operating room works.This work aims to create a platformto solve the problems of operating room occupancy and prepare the rooms with an environment that is favorable for all operations.Using this system,a doctor can control all operation rooms,especially before an operation,and monitor their temperature and humidity to prepare for the operation.Also,in the event of a problem,an alert is sent to the nurse responsible for the room and medical stuff so that the problem can be resolved.The platformis tested using a Raspberry PI card and sensors.The sensors are connected to a cloud layer that collects and analyzes the temperature and humidity values obtained from the environment during an operation.The result of experimentations is visualized through a web application and an Android application.The platform also considers the security aspects such as authorization to access application functionalities for the Web and the mobile applications.We can also test and evaluate the system’s existing problems and vulnerabilities using the IEEE and owasp IoT standards.Finally,the proposed framework is extended with a model based testing technique that may be adopted for validating the security aspects.
文摘IoT usage in healthcare is one of the fastest growing domains all over the world which applies to every age group.Internet of Medical Things(IoMT)bridges the gap between the medical and IoT field where medical devices communicate with each other through a wireless communication network.Advancement in IoMT makes human lives easy and better.This paper provides a comprehensive detailed literature survey to investigate different IoMT-driven applications,methodologies,and techniques to ensure the sustainability of IoMT-driven systems.The limitations of existing IoMTframeworks are also analyzed concerning their applicability in real-time driven systems or applications.In addition to this,various issues(gaps),challenges,and needs in the context of such systems are highlighted.The purpose of this paper is to interpret a rigorous review concept related to IoMT and present significant contributions in the field across the research fraternity.Lastly,this paper discusses the opportunities and prospects of IoMT and discusses various open research problems.
基金supported by Science and Technology Foundation of State Grid Corporation of China(Ubiquitous Power Internet of Things Technical Standard System)5442HL 190008National Key Research and Development Program of China(2020YFB0905900)。
文摘The ubiquitous power Internet of Things(UPIoT)is an intelligent service system with comprehensive state perception,efficient processing,and flexible application of information.It focuses on each link of the power system and makes full use of the mobile internet,artificial intelligence,and other advanced information and communication technologies in order to realize the inter-human interaction of all things in all links of the power system.This article systematically presents to the national and international organizations and agencies in charge of UPIoT layer standardization the status quo of the research on the Internet of Things(IoT)-related industry standards system.It briefly describes the generic standard classification methods,layered architecture,conceptual model,and system tables in the UPIoT application layer.Based on the principles of inheritance,innovation,and practicability,this study divides the application layer into customer service,power grid operation,integrated energy,and enterprise operation,emerging business and analyzes the standard requirements of these five fields.This study also proposes a standard plan.Finally,it summarizes the research report and provides suggestions for a follow-up work.