scispace - formally typeset
Search or ask a question
Author

Yunchuan Sun

Bio: Yunchuan Sun is an academic researcher from Beijing Normal University. The author has contributed to research in topics: Semantic similarity & Semantic grid. The author has an hindex of 25, co-authored 136 publications receiving 2538 citations. Previous affiliations of Yunchuan Sun include Chinese Academy of Sciences & Beijing Union University.


Papers
More filters
Journal ArticleDOI
TL;DR: It is argued that Internet of Things (IoT) has the potential to provide a ubiquitous network of connected devices and smart sensors for SCC, and big data analytics has the Potential to enable the move from IoT to real-time control desired for S CC.
Abstract: This paper promotes the concept of smart and connected communities SCC, which is evolving from the concept of smart cities. SCC are envisioned to address synergistically the needs of remembering the past (preservation and revitalization), the needs of living in the present (livability), and the needs of planning for the future (attainability). Therefore, the vision of SCC is to improve livability, preservation, revitalization, and attainability of a community. The goal of building SCC for a community is to live in the present, plan for the future, and remember the past. We argue that Internet of Things (IoT) has the potential to provide a ubiquitous network of connected devices and smart sensors for SCC, and big data analytics has the potential to enable the move from IoT to real-time control desired for SCC. We highlight mobile crowdsensing and cyber-physical cloud computing as two most important IoT technologies in promoting SCC. As a case study, we present TreSight, which integrates IoT and big data analytics for smart tourism and sustainable cultural heritage in the city of Trento, Italy.

740 citations

Journal ArticleDOI
TL;DR: A heterogeneous-network-based epidemic model that incorporates the two kinds of methods to describe rumor spreading in MSNs is proposed that can restrain rumors in a continuous or periodical manner and guarantee cost efficiency.
Abstract: With the popularity of mobile devices, mobile social networks (MSNs) have become an important platform for information dissemination. However, the spread of rumors in MSNs present a massive social threat. Currently, there are two kinds of methods to address this: blocking rumors at influential users and spreading truth to clarify rumors. However, most existing works either overlook the cost of various methods or only consider different methods individually. This paper proposes a heterogeneous-network-based epidemic model that incorporates the two kinds of methods to describe rumor spreading in MSNs. Moreover, two cost-efficient strategies are designed to restrain rumors. The first strategy is the real-time optimization strategy that minimizes the rumor-restraining cost by optimally combining various rumor-restraining methods such that a rumor can be extinct within an expected time period. The second strategy is the pulse spreading truth and continuous blocking rumor strategy that restrains rumor spreading through spreading truth periodically. The two strategies can restrain rumors in a continuous or periodical manner and guarantee cost efficiency. The experiments toward the Digg2009 data set demonstrate the effectiveness of the proposed model and the efficiency of the two strategies.

249 citations

Journal ArticleDOI
TL;DR: This study is to review different security techniques and challenges from both software and hardware aspects for protecting data in the cloud and aims at enhancing the data security and privacy protection for the trustworthy cloud environment.
Abstract: Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe. Data security and privacy protection are the two main factors of user’s concerns about the cloud technology. Though many techniques on the topics in cloud computing have been investigated in both academics and industries, data security and privacy protection are becoming more important for the future development of cloud computing technology in government, industry, and business. Data security and privacy protection issues are relevant to both hardware and software in the cloud architecture. This study is to review different security techniques and challenges from both software and hardware aspects for protecting data in the cloud and aims at enhancing the data security and privacy protection for the trustworthy cloud environment. In this paper, we make a comparative research analysis of the existing research work regarding the data security and privacy protection techniques used in the cloud computing.

209 citations

Journal ArticleDOI
Yunchuan Sun1, Hongli Yan1, Cheng Lu1, Rongfang Bie1, Peter Thomas 
13 Sep 2012
TL;DR: The Business DNA Model is described - a representation of a business model in terms of Design, Needs, and Aspirations, which greatly simplifies presentation, analysis, and design of business models.
Abstract: The Internet of Things (IoT) promises huge potential economic benefits. However, current IoT applications are in their infancy and the full potential of possible business opportunities is yet to be discovered. To help realize these economic benefits, workable business models are required that show where opportunities exist. In this article we describe the Business DNA Model - a representation of a business model in terms of Design, Needs, and Aspirations, which greatly simplifies presentation, analysis, and design of business models. This model can be used by IoT stakeholders to generate and analyse stories, models, and projects for strategic management, business strategy, and innovation. We present one scenario - smart logistics - to illustrate how the Business DNA Model might be applied.

89 citations

Journal ArticleDOI
TL;DR: This paper aims to review the advances on issues of security and privacy in IoV, includingSecurity and privacy requirements, attack types, and the relevant solutions, and discuss challenges and future trends in this area.
Abstract: As a typical application of Internet of Things (IoT) in the field of transportation, Internet of Vehicles (IoV) aims at achieving an integrated intelligent transportation system to enhance traffics efficiency, avoid accidents, ensure road safety, and improve driving experiences by using new IoT technologies. Different from other Internet, it is characterized by dynamic topological structures, huge network scale, non-uniform distribution of nodes, and mobile limitation. Due to these characteristics, IoV systems face various types of attacks, such as authentication and identification attacks, availability attacks, confidentiality attacks, routing attacks, data authenticity attacks, etc., which result in several challenging requirements in security and privacy. Many security scientists made numerous efforts to ensure the security and privacy for the Internet of Vehicles in recent years. This paper aims to review the advances on issues of security and privacy in IoV, including security and privacy requirements, attack types, and the relevant solutions, and discuss challenges and future trends in this area.

77 citations


Cited by
More filters
Journal ArticleDOI

[...]

08 Dec 2001-BMJ
TL;DR: There is, I think, something ethereal about i —the square root of minus one, which seems an odd beast at that time—an intruder hovering on the edge of reality.
Abstract: There is, I think, something ethereal about i —the square root of minus one. I remember first hearing about it at school. It seemed an odd beast at that time—an intruder hovering on the edge of reality. Usually familiarity dulls this sense of the bizarre, but in the case of i it was the reverse: over the years the sense of its surreal nature intensified. It seemed that it was impossible to write mathematics that described the real world in …

33,785 citations

01 Jan 2002

9,314 citations

Journal ArticleDOI
01 May 1981
TL;DR: This chapter discusses Detecting Influential Observations and Outliers, a method for assessing Collinearity, and its applications in medicine and science.
Abstract: 1. Introduction and Overview. 2. Detecting Influential Observations and Outliers. 3. Detecting and Assessing Collinearity. 4. Applications and Remedies. 5. Research Issues and Directions for Extensions. Bibliography. Author Index. Subject Index.

4,948 citations