期刊文献+
共找到112,372篇文章
< 1 2 250 >
每页显示 20 50 100
A Hybrid and Lightweight Device-to-Server Authentication Technique for the Internet of Things
1
作者 Shaha Al-Otaibi Rahim Khan +3 位作者 Hashim Ali Aftab Ahmed Khan Amir Saeed Jehad Ali 《Computers, Materials & Continua》 SCIE EI 2024年第3期3805-3823,共19页
The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective se... The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λi of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server Sj and members Ci,with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs. 展开更多
关键词 internet of things AUtheNTICITY security LOCATION communication
下载PDF
Congestion Control Algorithms for the Internet-A Secondary Publication
2
作者 Satoshi Utsumi 《Journal of Electronic Research and Application》 2024年第2期33-48,共16页
In the last five years,there has been a V-shaped recovery in the number of papers on congestion control algorithms on the Internet.In this paper,congestion problems on the Internet are discussed,such as congestion col... In the last five years,there has been a V-shaped recovery in the number of papers on congestion control algorithms on the Internet.In this paper,congestion problems on the Internet are discussed,such as congestion collapse and bufferbloat from the perspective of the necessity of congestion control algorithms.The typical congestion control algorithms are introduced,and the research areas and methods of congestion control algorithms are described.Recent research trends and future prospects of congestion control algorithms are also presented. 展开更多
关键词 TCP Congestion control algorithm CONGESTION internet
下载PDF
Construction and Application of a Quality Evaluation System for Group Elderly Care Services Based on the Internet of Things
3
作者 Xiyu Yang Jialu Li Weiming Tian 《Proceedings of Business and Economic Studies》 2024年第1期155-161,共7页
With the continuous intensification of global aging,the issue of elderly care has become an increasingly prominent social problem.The Internet of Things(IoT)technology,as an emerging field,holds broad application pros... With the continuous intensification of global aging,the issue of elderly care has become an increasingly prominent social problem.The Internet of Things(IoT)technology,as an emerging field,holds broad application prospects.This article focuses on the application of IoT technology in group elderly care services and constructs a quality evaluation system for these services based on IoT technology.Through the analysis of practical application cases,the advantages and challenges of IoT technology in group elderly care services have been examined,confirming the feasibility and effectiveness of the evaluation system. 展开更多
关键词 internet of Things Group retirement Quality assessment system
下载PDF
Research on a Comprehensive Monitoring System for Tunnel Operation based on the Internet of Things and Artificial Intelligence Identification Technology
4
作者 Xingxing Wang Donglin Dai Xiangjun Fan 《Journal of Architectural Research and Development》 2024年第2期84-89,共6页
This article proposes a comprehensive monitoring system for tunnel operation to address the risks associated with tunnel operations.These risks include safety control risks,increased traffic flow,extreme weather event... This article proposes a comprehensive monitoring system for tunnel operation to address the risks associated with tunnel operations.These risks include safety control risks,increased traffic flow,extreme weather events,and movement of tectonic plates.The proposed system is based on the Internet of Things and artificial intelligence identification technology.The monitoring system will cover various aspects of tunnel operations,such as the slope of the entrance,the structural safety of the cave body,toxic and harmful gases that may appear during operation,excessively high and low-temperature humidity,poor illumination,water leakage or road water accumulation caused by extreme weather,combustion and smoke caused by fires,and more.The system will enable comprehensive monitoring and early warning of fire protection systems,accident vehicles,and overheating vehicles.This will effectively improve safety during tunnel operation. 展开更多
关键词 internet of Things Artificial intelligence Operation tunnel MONITORING
下载PDF
The effect of risk perception and COVID‑19 anxiety in pregnancy on decision‑making via the Internet and prenatal care quality:A cross‑sectional multivariate analysis
5
作者 Ayşe Taştekin OUYABA Şehadet TAŞKIN 《Journal of Integrative Nursing》 2023年第1期27-32,共6页
Background:Risk perception and COVID‑19 anxiety in pregnant women restrict access to health services,cause pregnant women to resort to alternative channels such as the Internet,and affect prenatal care quality(PCQ)neg... Background:Risk perception and COVID‑19 anxiety in pregnant women restrict access to health services,cause pregnant women to resort to alternative channels such as the Internet,and affect prenatal care quality(PCQ)negatively.Purpose:The purpose of this study was to examine the effect of risk perception and COVID‑19 anxiety in pregnancy on decision‑making via the Internet(DMI)and PCQ with multivariate analysis.Materials and Methods:This cross‑sectional study was conducted with 406 pregnant women selected using the convenience sampling method in a training and research hospital,in Turkey.The data were collected using the information form,the perception of pregnancy risk questionnaire,the Coronavirus Anxiety Scale,the DMI Scale,and the PCQ Scale.The data obtained were subject to descriptive analysis and the multivariate analysis of variance.Results:Approximately 24.9%of the pregnant women were found to have a high perception of risk and 18%had symptoms of COVID‑19 anxiety.Pregnant women with high COVID‑19 anxiety and a higher perception of risk perceived the Internet as less influential for decision‑making(P<0.05).Pregnant women with a high‑risk perception had lower PCQ(P<0.05).Conclusion:The findings can be used to enhance mental health and resilience in pregnant women and to formulate appropriate intervention strategies. 展开更多
关键词 COVID-19 anxiety decision-making via the internet perception of risk PREGNANCY prenatal care quality
下载PDF
Machine Learning-Enabled Communication Approach for the Internet of Medical Things
6
作者 Rahim Khan Abdullah Ghani +3 位作者 Samia Allaoua Chelloug Mohammed Amin Aamir Saeed Jason Teo 《Computers, Materials & Continua》 SCIE EI 2023年第8期1569-1584,共16页
The Internet ofMedical Things(IoMT)is mainly concernedwith the efficient utilisation of wearable devices in the healthcare domain to manage various processes automatically,whereas machine learning approaches enable th... The Internet ofMedical Things(IoMT)is mainly concernedwith the efficient utilisation of wearable devices in the healthcare domain to manage various processes automatically,whereas machine learning approaches enable these smart systems to make informed decisions.Generally,broadcasting is used for the transmission of frames,whereas congestion,energy efficiency,and excessive load are among the common issues associated with existing approaches.In this paper,a machine learning-enabled shortest path identification scheme is presented to ensure reliable transmission of frames,especially with the minimum possible communication overheads in the IoMT network.For this purpose,the proposed scheme utilises a well-known technique,i.e.,Kruskal’s algorithm,to find an optimal path from source to destination wearable devices.Additionally,other evaluation metrics are used to find a reliable and shortest possible communication path between the two interested parties.Apart from that,every device is bound to hold a supplementary path,preferably a second optimised path,for situations where the current communication path is no longer available,either due to device failure or heavy traffic.Furthermore,the machine learning approach helps enable these devices to update their routing tables simultaneously,and an optimal path could be replaced if a better one is available.The proposed mechanism has been tested using a smart environment developed for the healthcare domain using IoMT networks.Simulation results show that the proposed machine learning-oriented approach performs better than existing approaches where the proposed scheme has achieved the minimum possible ratios,i.e.,17%and 23%,in terms of end to end delay and packet losses,respectively.Moreover,the proposed scheme has achieved an approximately 21%improvement in the average throughput compared to the existing schemes. 展开更多
关键词 Machine learning internet of Medical Things healthcare load balancing COMMUNICATION
下载PDF
Optimization of the Internet of Remote Things Data Acquisition Based on Satellite UAV Integrated Network
7
作者 Yuanyuan Yao Dengyang Dong +3 位作者 Sai Huang Chunyu Pan Shuo Chen Xuehua Li 《China Communications》 SCIE CSCD 2023年第7期15-28,共14页
In order to achieve dependable and efficient data acquisition and transmission in the Internet of Remote Things(IoRT),we investigate the optimization scheme of IoRT data acquisition under the unmanned aerial vehicle(U... In order to achieve dependable and efficient data acquisition and transmission in the Internet of Remote Things(IoRT),we investigate the optimization scheme of IoRT data acquisition under the unmanned aerial vehicle(UAV)-low earth orbit(LEO)satellite integrated space-air-ground network,in which the UAV acquires data from massive Internet of Things(IoT)devices in special scenarios.To combine with the actual scenario,we consider two different data types,that is,delay-sensitive data and delay-tolerant data,the transmission mode is accordingly divided into two types.For delay-sensitive data,the data will be transmitted via the LEO satellite relay to the data center(DC)in real-time.For delay-tolerant data,the UAV will store and carry the data until the acquisition is completed,and then return to DC.Due to nonconvexity and complexity of the formulated problem,a multi-dimensional optimization Rate Demand based Joint Optimization(RDJO)algorithm is proposed.The algorithm first uses successive convex approximation(SCA)technology to solve the non-convexity,and then based on the block coordinate descent(BCD)method,the data acquisition efficiency is maximized by jointly optimizing UAV deployment,the bandwidth allocation of IoRT devices,and the transmission power of the UAV.Finally,the proposed RDJO algorithm is compared with the conventional algorithms.Simulation consequences demonstrate that the efficiency of IoRT data acquisition can be greatly improved by multi-parameter optimization of the bandwidth allocation,UAV deployment and the transmission power. 展开更多
关键词 internet of Remote Things dataacquisi-tion unmanned aerial vehicle LEO satellite
下载PDF
Marketing Strategies for Chinese Specialty Agricultural Products under the Internet Environment : Taking Tianshui Qinzhou Big Cherry Industry as an Example
8
作者 Haiyan CAO 《Asian Agricultural Research》 2023年第8期16-18,23,共4页
Combined with the current situation of marketing of Chinzhou big cherries in Tianshui,we find out the problems in the development of network marketing of Chinzhou big cherries and put forward corresponding countermeas... Combined with the current situation of marketing of Chinzhou big cherries in Tianshui,we find out the problems in the development of network marketing of Chinzhou big cherries and put forward corresponding countermeasures and suggestions to improve its marketing level and solve the problem of imbalance between supply and demand of Qinzhou big cherries. 展开更多
关键词 internet Agricultural products Marketing strategy Tianshui cherries
下载PDF
SDN-Enabled Content Dissemination Scheme for the Internet of Vehicles
9
作者 Abida Sharif Muhammad Imran Sharif +5 位作者 Muhammad Attique Khan Nisar Ali Abdullah Alqahtani Majed Alhaisoni Ye Jin Kim Byoungchol Chang 《Computers, Materials & Continua》 SCIE EI 2023年第5期2383-2396,共14页
The content-centric networking(CCN)architecture allows access to the content through name,instead of the physical location where the content is stored,which makes it a more robust and flexible content-based architectu... The content-centric networking(CCN)architecture allows access to the content through name,instead of the physical location where the content is stored,which makes it a more robust and flexible content-based architecture.Nevertheless,in CCN,the broadcast nature of vehicles on the Internet of Vehicles(IoV)results in latency and network congestion.The IoVbased content distribution is an emerging concept in which all the vehicles are connected via the internet.Due to the high mobility of vehicles,however,IoV applications have different network requirements that differ from those of many other networks,posing new challenges.Considering this,a novel strategy mediator framework is presented in this paper for managing the network resources efficiently.Software-defined network(SDN)controller is deployed for improving the routing flexibility and facilitating in the interinteroperability of heterogeneous devices within the network.Due to the limited memory of edge devices,the delectable bloom filters are used for caching and storage.Finally,the proposed scheme is compared with the existing variants for validating its effectiveness. 展开更多
关键词 internet of vehicles(IOV) content dissemination multi mediator data traffic management
下载PDF
A Systematic Review on the Internet of Medical Things:Techniques,Open Issues,and Future Directions
10
作者 Apurva Sonavane Aditya Khamparia Deepak Gupta 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第11期1525-1550,共26页
IoT usage in healthcare is one of the fastest growing domains all over the world which applies to every age group.Internet of Medical Things(IoMT)bridges the gap between the medical and IoT field where medical devices... IoT usage in healthcare is one of the fastest growing domains all over the world which applies to every age group.Internet of Medical Things(IoMT)bridges the gap between the medical and IoT field where medical devices communicate with each other through a wireless communication network.Advancement in IoMT makes human lives easy and better.This paper provides a comprehensive detailed literature survey to investigate different IoMT-driven applications,methodologies,and techniques to ensure the sustainability of IoMT-driven systems.The limitations of existing IoMTframeworks are also analyzed concerning their applicability in real-time driven systems or applications.In addition to this,various issues(gaps),challenges,and needs in the context of such systems are highlighted.The purpose of this paper is to interpret a rigorous review concept related to IoMT and present significant contributions in the field across the research fraternity.Lastly,this paper discusses the opportunities and prospects of IoMT and discusses various open research problems. 展开更多
关键词 internet ofMedical Things(IoMT) healthcare systems SENSORS PREPROCESSING RFID remote monitoring devices networks
下载PDF
The Dilemma and Reflection of Art Criticism in the Internet Plus Era
11
作者 WEI Yulong 《Cultural and Religious Studies》 2023年第12期622-627,共6页
The vigorous development of the Internet is changing all aspects of our lives.Today’s“Internet plus”concept has played a vital role in the economic field with its unique advantages.In the cultural field,it still in... The vigorous development of the Internet is changing all aspects of our lives.Today’s“Internet plus”concept has played a vital role in the economic field with its unique advantages.In the cultural field,it still influences people’s spiritual and cultural life in a unique way.The free,open,and equal nature of the Internet provides an unprecedented broad platform for contemporary art criticism,and also frees it from the monopoly of a few authorities,entering the artistic life of the general public with a more humane and new attitude.This has played a certain guiding role in artistic creation,appreciation,dissemination,and popularization. 展开更多
关键词 internet art criticism DIFFICULTIES INTROSPECTION
下载PDF
Adaptive Momentum-Backpropagation Algorithm for Flood Prediction and Management in the Internet of Things
12
作者 Jayaraj Thankappan Delphin Raj Kesari Mary +1 位作者 Dong Jin Yoon Soo-Hyun Park 《Computers, Materials & Continua》 SCIE EI 2023年第10期1053-1079,共27页
Flooding is a hazardous natural calamity that causes significant damage to lives and infrastructure in the real world.Therefore,timely and accurate decision-making is essential for mitigating flood-related damages.The... Flooding is a hazardous natural calamity that causes significant damage to lives and infrastructure in the real world.Therefore,timely and accurate decision-making is essential for mitigating flood-related damages.The traditional flood prediction techniques often encounter challenges in accuracy,timeliness,complexity in handling dynamic flood patterns and leading to substandard flood management strategies.To address these challenges,there is a need for advanced machine learning models that can effectively analyze Internet of Things(IoT)-generated flood data and provide timely and accurate flood predictions.This paper proposes a novel approach-the Adaptive Momentum and Backpropagation(AM-BP)algorithm-for flood prediction and management in IoT networks.The AM-BP model combines the advantages of an adaptive momentum technique with the backpropagation algorithm to enhance flood prediction accuracy and efficiency.Real-world flood data is used for validation,demonstrating the superior performance of the AM-BP algorithm compared to traditional methods.In addition,multilayer high-end computing architecture(MLCA)is used to handle weather data such as rainfall,river water level,soil moisture,etc.The AM-BP’s real-time abilities enable proactive flood management,facilitating timely responses and effective disaster mitigation.Furthermore,the AM-BP algorithm can analyze large and complex datasets,integrating environmental and climatic factors for more accurate flood prediction.The evaluation result shows that the AM-BP algorithm outperforms traditional approaches with an accuracy rate of 96%,96.4%F1-Measure,97%Precision,and 95.9%Recall.The proposed AM-BP model presents a promising solution for flood prediction and management in IoT networks,contributing to more resilient and efficient flood control strategies,and ensuring the safety and well-being of communities at risk of flooding. 展开更多
关键词 internet of Things flood prediction artificial neural network adaptive momentum backpropagation OPTIMIZATION disaster management
下载PDF
Time to forge ahead:The Internet of Things for healthcare
13
作者 Denzil Furtado Andre F.Gygax +1 位作者 Chien Aun Chan Ashley I.Bush 《Digital Communications and Networks》 SCIE CSCD 2023年第1期223-235,共13页
Situated at the intersection of technology and medicine,the Internet of Things(IoT)holds the promise of addressing some of healthcare's most pressing challenges,from medical error,to chronic drug shortages,to over... Situated at the intersection of technology and medicine,the Internet of Things(IoT)holds the promise of addressing some of healthcare's most pressing challenges,from medical error,to chronic drug shortages,to overburdened hospital systems,to dealing with the COVID-19 pandemic.However,despite considerable recent technological advances,the pace of successful implementation of promising IoT healthcare initiatives has been slow.To inspire more productive collaboration,we present here a simple—but surprisingly underrated—problemoriented approach to developing healthcare technologies.To further assist in this effort,we reviewed the various commercial,regulatory,social/cultural,and technological factors in the development of the IoT.We propose that fog computing—a technological paradigm wherein the burden of computing is shifted from a centralized cloud server closer to the data source—offers the greatest promise for building a robust and scalable healthcare IoT ecosystem.To this end,we explore the key enabling technologies that underpin the fog architecture,from the sensing layer all the way up to the cloud.It is our hope that ongoing advances in sensing,communications,cryptography,storage,machine learning,and artificial intelligence will be leveraged in meaningful ways to generate unprecedented medical intelligence and thus drive improvements in the health of many people. 展开更多
关键词 internet of Things Healthcare Information Fog computing Artificial intelligence Machine learning Big data COVID-19 pandemic
下载PDF
Mobile Communication Voice Enhancement Under Convolutional Neural Networks and the Internet of Things
14
作者 Jiajia Yu 《Intelligent Automation & Soft Computing》 SCIE 2023年第7期777-797,共21页
This study aims to reduce the interference of ambient noise in mobile communication,improve the accuracy and authenticity of information transmitted by sound,and guarantee the accuracy of voice information deliv-ered ... This study aims to reduce the interference of ambient noise in mobile communication,improve the accuracy and authenticity of information transmitted by sound,and guarantee the accuracy of voice information deliv-ered by mobile communication.First,the principles and techniques of speech enhancement are analyzed,and a fast lateral recursive least square method(FLRLS method)is adopted to process sound data.Then,the convolutional neural networks(CNNs)-based noise recognition CNN(NR-CNN)algorithm and speech enhancement model are proposed.Finally,related experiments are designed to verify the performance of the proposed algorithm and model.The experimental results show that the noise classification accuracy of the NR-CNN noise recognition algorithm is higher than 99.82%,and the recall rate and F1 value are also higher than 99.92.The proposed sound enhance-ment model can effectively enhance the original sound in the case of noise interference.After the CNN is incorporated,the average value of all noisy sound perception quality evaluation system values is improved by over 21%compared with that of the traditional noise reduction method.The proposed algorithm can adapt to a variety of voice environments and can simultaneously enhance and reduce noise processing on a variety of different types of voice signals,and the processing effect is better than that of traditional sound enhancement models.In addition,the sound distortion index of the proposed speech enhancement model is inferior to that of the control group,indicating that the addition of the CNN neural network is less likely to cause sound signal distortion in various sound environments and shows superior robustness.In summary,the proposed CNN-based speech enhancement model shows significant sound enhancement effects,stable performance,and strong adapt-ability.This study provides a reference and basis for research applying neural networks in speech enhancement. 展开更多
关键词 Convolutional neural networks speech enhancement noise recognition deep learning human-computer interaction internet of Things
下载PDF
Intelligent Intrusion Detection System for the Internet of Medical Things Based on Data-Driven Techniques
15
作者 Okba Taouali Sawcen Bacha +4 位作者 Khaoula Ben Abdellafou Ahamed Aljuhani Kamel Zidi Rehab Alanazi Mohamed Faouzi Harkat 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期1593-1609,共17页
Introducing IoT devices to healthcare fields has made it possible to remotely monitor patients’information and provide a proper diagnosis as needed,resulting in the Internet of Medical Things(IoMT).However,obtaining ... Introducing IoT devices to healthcare fields has made it possible to remotely monitor patients’information and provide a proper diagnosis as needed,resulting in the Internet of Medical Things(IoMT).However,obtaining good security features that ensure the integrity and confidentiality of patient’s information is a significant challenge.However,due to the computational resources being limited,an edge device may struggle to handle heavy detection tasks such as complex machine learning algorithms.Therefore,designing and developing a lightweight detection mechanism is crucial.To address the aforementioned challenges,a new lightweight IDS approach is developed to effectively combat a diverse range of cyberattacks in IoMT networks.The proposed anomaly-based IDS is divided into three steps:pre-processing,feature selection,and decision.In the pre-processing phase,data cleaning and normalization are performed.In the feature selection step,the proposed approach uses two data-driven kernel techniques:kernel principal component analysis and kernel partial least square techniques to reduce the dimension of extracted features and to ameliorate the detection results.Therefore,in decision step,in order to classify whether the traffic flow is normal or malicious the kernel extreme learning machine is used.To check the efficiency of the developed detection scheme,a modern IoMT dataset named WUSTL-EHMS-2020 is considered to evaluate and discuss the achieved results.The proposed method achieved 99.9%accuracy,99.8%specificity,100%Sensitivity,99.9 F-score. 展开更多
关键词 Machine learning data-driven technique KPCA KPLS intrusion detection IoT internet of Medical Things(IoMT)
下载PDF
Energy and Latency Optimization in Edge-Fog-Cloud Computing for the Internet of Medical Things
16
作者 Hatem A.Alharbi Barzan A.Yosuf +1 位作者 Mohammad Aldossary Jaber Almutairi 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期1299-1319,共21页
In this paper,the Internet ofMedical Things(IoMT)is identified as a promising solution,which integrates with the cloud computing environment to provide remote health monitoring solutions and improve the quality of ser... In this paper,the Internet ofMedical Things(IoMT)is identified as a promising solution,which integrates with the cloud computing environment to provide remote health monitoring solutions and improve the quality of service(QoS)in the healthcare sector.However,problems with the present architectural models such as those related to energy consumption,service latency,execution cost,and resource usage,remain a major concern for adopting IoMT applications.To address these problems,this work presents a four-tier IoMT-edge-fog-cloud architecture along with an optimization model formulated using Mixed Integer Linear Programming(MILP),with the objective of efficiently processing and placing IoMT applications in the edge-fog-cloud computing environment,while maintaining certain quality standards(e.g.,energy consumption,service latency,network utilization).A modeling environment is used to assess and validate the proposed model by considering different traffic loads and processing requirements.In comparison to the other existing models,the performance analysis of the proposed approach shows a maximum saving of 38%in energy consumption and a 73%reduction in service latency.The results also highlight that offloading the IoMT application to the edge and fog nodes compared to the cloud is highly dependent on the tradeoff between the network journey time saved vs.the extra power consumed by edge or fog resources. 展开更多
关键词 internet of medical things(IoMT) E-HEALTHCARE edge-fog-cloud computing remote monitoring energy consumption computation offloading
下载PDF
Conceptual Blending and Meme Humor on the Internet:The Example of COVID-19 Publicity Posters in Chinese Microblogging
17
作者 WANG Lei 《Sino-US English Teaching》 2023年第6期217-226,共10页
Internet memes,as multimodal cultural products disseminated through the Internet,usually take the form of short videos or images that express humor or satire.The creation and dissemination of humor in memes are both c... Internet memes,as multimodal cultural products disseminated through the Internet,usually take the form of short videos or images that express humor or satire.The creation and dissemination of humor in memes are both creative and complex,and the successful perception of meme humor reflects humans’universal thinking capacity.Based on the theoretical framework of conceptual blending,this paper selects a set of COVID-19 publicity posters from the official Weibo account of China Guangzhou Fabu(Guangzhou Internet Information Office),analyses the multi-level structure of Internet memes,and explores the dynamic cognitive process in the interpretation of humorous memes to reveal people’s ability to make simultaneous analogies and integration between elements in different mental spaces. 展开更多
关键词 conceptual blending internet meme HUMOR COVID-19 prevention and control
下载PDF
Oral English Autonomous Learning Ability of English Majors Under the Background of the Internet and Its Improvement
18
作者 Xiaohong Zhu 《Journal of Contemporary Educational Research》 2023年第10期166-172,共7页
The Internet is an important means of communication for contemporary college students,especially those majoring in English,to acquire knowledge about information and improve their oral proficiency.However,research on ... The Internet is an important means of communication for contemporary college students,especially those majoring in English,to acquire knowledge about information and improve their oral proficiency.However,research on the relevant oral English autonomous learning ability of English majors shows that the overall learning situation is not satisfying.Based on the development of the concept of autonomous learning,this article explores the current situation and existing problems in oral English autonomous learning of English majors under the context of the Internet,and proposes corresponding autonomous learning strategies for improving their oral English skill. 展开更多
关键词 Oral English Autonomous learning ability internet English majors
下载PDF
Privacy Protection Algorithm for the Internet of Vehicles Based on Local Differential Privacy and Game Model 被引量:3
19
作者 Wenxi Han Mingzhi Cheng +3 位作者 Min Lei Hanwen Xu Yu Yang Lei Qian 《Computers, Materials & Continua》 SCIE EI 2020年第8期1025-1038,共14页
In recent years,with the continuous advancement of the intelligent process of the Internet of Vehicles(IoV),the problem of privacy leakage in IoV has become increasingly prominent.The research on the privacy protectio... In recent years,with the continuous advancement of the intelligent process of the Internet of Vehicles(IoV),the problem of privacy leakage in IoV has become increasingly prominent.The research on the privacy protection of the IoV has become the focus of the society.This paper analyzes the advantages and disadvantages of the existing location privacy protection system structure and algorithms,proposes a privacy protection system structure based on untrusted data collection server,and designs a vehicle location acquisition algorithm based on a local differential privacy and game model.The algorithm first meshes the road network space.Then,the dynamic game model is introduced into the game user location privacy protection model and the attacker location semantic inference model,thereby minimizing the possibility of exposing the regional semantic privacy of the k-location set while maximizing the availability of the service.On this basis,a statistical method is designed,which satisfies the local differential privacy of k-location sets and obtains unbiased estimation of traffic density in different regions.Finally,this paper verifies the algorithm based on the data set of mobile vehicles in Shanghai.The experimental results show that the algorithm can guarantee the user’s location privacy and location semantic privacy while satisfying the service quality requirements,and provide better privacy protection and service for the users of the IoV. 展开更多
关键词 the internet of Vehicles privacy protection local differential privacy location semantic inference attack game theory
下载PDF
The application of the Internet to English Teaching In China
20
作者 孟凡红 《教育教学论坛》 2014年第11期177-178,共2页
Undisputedly,Internet is a valuable resource and tool in assisting ESL/EFL teaching and learning.But problems still exist along side when used on large scale.In this paper,we’ll discusses the function of the Internet... Undisputedly,Internet is a valuable resource and tool in assisting ESL/EFL teaching and learning.But problems still exist along side when used on large scale.In this paper,we’ll discusses the function of the Internet in teaching languages,the current ways that it is used in teaching English and examines the applicability of using it in EFL teaching in China. 展开更多
关键词 the internet INTERACTION
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部