A Personal Health Index System with IoT Devices

Author(s):  
Moon Kwon Kim ◽  
Han Ter Jung ◽  
Soo Dong Kim ◽  
Hyun Jung La
Author(s):  
Ling Chen ◽  
Xue Li ◽  
Sen Wang ◽  
Hsiao-Yun Hu ◽  
Nicole Huang ◽  
...  

2021 ◽  
Author(s):  
Huanying Feng ◽  
Wenhui Su ◽  
Guanglu Liu ◽  
Manyi Du ◽  
Shaohui Fan

Abstract Background: The Moso bamboo (Phyllostachys edulis) forest is an important forest resource. The health status of the Moso bamboo forest are increasingly affected by a range of unscientific and irrational management, which may permanently alter the Moso bamboo forest economic value and ecological function and disrupt the long-term sustainable management. However, how to assess the health status of the Moso bamboo forest and guide the scientific management of the Moso bamboo forest are little known. Methods: The index system of Moso bamboo forest health assessment was identified and quantified by literature collection, indicators simplification, expert questionnaires, and mathematical analysis. The health index of Moso bamboo forest health assessment was calculated by the comprehensive health index method. The practicability and feasibility of the health index were verified in the Moso bamboo forest in Anhui and Fujian provinces of China.Results: An index system that included four layers and 19 indicators could comprehensively assess the health of the Moso bamboo forest. This index system assessed the ‘Health basis of the Moso bamboo forest’ and the ‘Value and function of the Moso bamboo forest’. The health index of the Moso bamboo forest in Anhui and Fujian provinces ranged from 0.50 to 0.83. Only2.35 % of the Moso bamboo forest showed a health index higher than 0.80, whereas the health index of 22.35 % of the forest was lower than 0.60. The health index of the Moso bamboo forest was higher under irrigation management and fertilization management than others. The treetop cutting was not recommended unless those areas had frequent occurrences of snow and ice disasters. Conclusions: These results suggest that the health status need to be improved in most of the Moso bamboo forest. Scientific management would be the important tool to keep and improve the health status of Moso bamboo forest. Our results can be adapted in the resource management and policy decisions for better management of the Moso bamboo forest.


2014 ◽  
Vol 635-637 ◽  
pp. 1852-1856
Author(s):  
Nan Zhao ◽  
Qian Li ◽  
Hong Yu Shao

Based on the enterprise ecosystem theory and brittleness of complex systems theory, to propose the enterprise life-cycle manufacturing enterprise ecosystem health evaluation index system, from the growth, the stability, the resistance to brittle, the recoverability and the adaptability five dimensions, building enterprise ecosystem health index, applying Projection Pursuit Principal Component Analysis to achieve ecosystem health index calculation. By the example of Tianjin manufacturing enterprise ecosystem health evaluation, to verify an index system and algorithm reliability and operability constructed in the paper.


2019 ◽  
Vol 20 (3) ◽  
pp. 457-484 ◽  
Author(s):  
Syed Rameem Zahra ◽  
Mohammad Ahsan Chishti

The purpose of this paper is to chalk out the criticality of the most important pillar of Internet of Things (IoT),i.e., Security and Privacy (S&P). IoT has seen its journey from implausible and impossible to sustainable and tenable. Its rateof expansion into various grounds from agriculture to sports; personal health to intelligent trac detection; waste managementto smart homes is astonishing, dramatic and unforeseen. With such vast adaptability and functionality, its security remains thebiggest concern because in contrast to the traditional networks, IoT faces huge vulnerabilities some of which are inherent and othersexplicit. The existing security solutions cannot be implemented in IoT because of its unique characteristics. Therefore, there is adire need to develop novel security procedures betting IoT. This paper spots the features that are peculiar to IoT and concurrentlyanalyzes the security threats and challenges they pose. This work also provides a glimpse of the major IoT implementations withtheir particular security requirements and challenges. Moreover, this paper critically evaluates the proposed countermeasures tosecurity attacks on dierent features and why they cannot be used in IoT environments. Also, it is found that most of the securitysolutions used in IoT devices are inspired from Wireless Sensor Networks (WSN) but the striking dierences among the two makethem inadequate in IoT. The security requirements and challenges peculiar to various IoT services are also identied. To assist theresearchers in remaining up-to-date, we for the rst time have thoroughly expressed some of the most famous and practical attacksfaced across the world in the recent past, how much damage they caused, how much nancial losses were faced, etc.


Sign in / Sign up

Export Citation Format

Share Document