In civil aviation security screening, laptops, with their intricate structural composition, provide the potential for criminals to conceal dangerous items. Presently, the security process necessitates passengers to in...In civil aviation security screening, laptops, with their intricate structural composition, provide the potential for criminals to conceal dangerous items. Presently, the security process necessitates passengers to individually present their laptops for inspection. The paper introduced a method for laptop removal. By combining projection algorithms with the YOLOv7-Seg model, a laptop’s three views were generated through projection, and instance segmentation of these views was achieved using YOLOv7-Seg. The resulting 2D masks from instance segmentation at different angles were employed to reconstruct a 3D mask through angle restoration. Ultimately, the intersection of this 3D mask with the original 3D data enabled the successful extraction of the laptop’s 3D information. Experimental results demonstrated that the fusion of projection and instance segmentation facilitated the automatic removal of laptops from CT data. Moreover, higher instance segmentation model accuracy leads to more precise removal outcomes. By implementing the laptop removal functionality, the civil aviation security screening process becomes more efficient and convenient. Passengers will no longer be required to individually handle their laptops, effectively enhancing the efficiency and accuracy of security screening.展开更多
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself disc...Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself discrimination paradigmin the biological immune system,the negative representation of information indicates features such as simplicity and efficiency,which is very suitable for preserving social network privacy.Therefore,we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks,called AttNetNRI.Specifically,a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the topology structure can be kept private.Moreover,a negative database-based method is proposed to hide node attributes,so that the privacy of node attributes can be preserved while supporting the similarity estimation between different node attributes,which is crucial to the analysis of social networks.To evaluate the performance of the AttNetNRI,empirical studies have been conducted on various attribute social networks and compared with several state-of-the-art methods tailored to preserve the privacy of social networks.The experimental results show the superiority of the developed method in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topology disturbing and attribute hiding parts.The experimental results show the superiority of the developed methods in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topological interference and attribute-hiding components.展开更多
With the rise of blockchain technology,the security issues of smart contracts have become increasingly critical.Despite the availability of numerous smart contract vulnerability detection tools,many face challenges su...With the rise of blockchain technology,the security issues of smart contracts have become increasingly critical.Despite the availability of numerous smart contract vulnerability detection tools,many face challenges such as slow updates,usability issues,and limited installation methods.These challenges hinder the adoption and practicality of these tools.This paper examines smart contract vulnerability detection tools from 2016 to 2023,sourced from the Web of Science(WOS)and Google Scholar.By systematically collecting,screening,and synthesizing relevant research,38 open-source tools that provide installation methods were selected for further investigation.From a developer’s perspective,this paper offers a comprehensive survey of these 38 open-source tools,discussing their operating principles,installation methods,environmental dependencies,update frequencies,and installation challenges.Based on this,we propose an Ethereum smart contract vulnerability detection framework.This framework enables developers to easily utilize various detection tools and accurately analyze contract security issues.To validate the framework’s stability,over 1700 h of testing were conducted.Additionally,a comprehensive performance test was performed on the mainstream detection tools integrated within the framework,assessing their hardware requirements and vulnerability detection coverage.Experimental results indicate that the Slither tool demonstrates satisfactory performance in terms of system resource consumption and vulnerability detection coverage.This study represents the first performance evaluation of testing tools in this domain,providing significant reference value.展开更多
The first-principles calculations are performed to examine structural,mechanical,and electronic properties at large strain for a monolayer C_(4)N_(4),which has been predicted as an anchoring promising material to atte...The first-principles calculations are performed to examine structural,mechanical,and electronic properties at large strain for a monolayer C_(4)N_(4),which has been predicted as an anchoring promising material to attenuate shuttle effect in Li–S batteries stemming from its large absorption energy and low diffusion energy barrier.Our results show that the ideal strengths of C_(4)N_(4)under tension and pure shear deformation conditions reach 13.9 GPa and 12.5 GPa when the strains are 0.07 and 0.28,respectively.The folded five-membered rings and diverse bonding modes between carbon and nitrogen atoms enhance the ability to resist plastic deformation of C_(4)N_(4).The orderly bond-rearranging behaviors under the weak tensile loading path along the[100]direction cause the impressive semiconductor–metal transition and inverse semiconductor–metal transition.The present results enrich the knowledge of the structure and electronic properties of C_(4)N_(4)under deformations and shed light on exploring other two-dimensional materials under diverse loading conditions.展开更多
In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerabi...In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerability detection has become particularly important.With the popular use of neural network model,there has been a growing utilization of deep learning-based methods and tools for the identification of vulnerabilities within smart contracts.This paper commences by providing a succinct overview of prevalent categories of vulnerabilities found in smart contracts.Subsequently,it categorizes and presents an overview of contemporary deep learning-based tools developed for smart contract detection.These tools are categorized based on their open-source status,the data format and the type of feature extraction they employ.Then we conduct a comprehensive comparative analysis of these tools,selecting representative tools for experimental validation and comparing them with traditional tools in terms of detection coverage and accuracy.Finally,Based on the insights gained from the experimental results and the current state of research in the field of smart contract vulnerability detection tools,we suppose to provide a reference standard for developers of contract vulnerability detection tools.Meanwhile,forward-looking research directions are also proposed for deep learning-based smart contract vulnerability detection.展开更多
One of the biggest dangers to society today is terrorism, where attacks have become one of the most significantrisks to international peace and national security. Big data, information analysis, and artificial intelli...One of the biggest dangers to society today is terrorism, where attacks have become one of the most significantrisks to international peace and national security. Big data, information analysis, and artificial intelligence (AI) havebecome the basis for making strategic decisions in many sensitive areas, such as fraud detection, risk management,medical diagnosis, and counter-terrorism. However, there is still a need to assess how terrorist attacks are related,initiated, and detected. For this purpose, we propose a novel framework for classifying and predicting terroristattacks. The proposed framework posits that neglected text attributes included in the Global Terrorism Database(GTD) can influence the accuracy of the model’s classification of terrorist attacks, where each part of the datacan provide vital information to enrich the ability of classifier learning. Each data point in a multiclass taxonomyhas one or more tags attached to it, referred as “related tags.” We applied machine learning classifiers to classifyterrorist attack incidents obtained from the GTD. A transformer-based technique called DistilBERT extracts andlearns contextual features from text attributes to acquiremore information from text data. The extracted contextualfeatures are combined with the “key features” of the dataset and used to perform the final classification. Thestudy explored different experimental setups with various classifiers to evaluate the model’s performance. Theexperimental results show that the proposed framework outperforms the latest techniques for classifying terroristattacks with an accuracy of 98.7% using a combined feature set and extreme gradient boosting classifier.展开更多
Haptic is the modality that complements traditional multimedia,i.e.,audiovisual,to evolve the next wave of innovation at which the Internet data stream can be exchanged to enable remote skills and control applications...Haptic is the modality that complements traditional multimedia,i.e.,audiovisual,to evolve the next wave of innovation at which the Internet data stream can be exchanged to enable remote skills and control applications.This will require ultra-low latency and ultra-high reliability to evolve the mobile experience into the era of Digital Twin and Tactile Internet.While the 5th generation of mobile networks is not yet widely deployed,Long-Term Evolution(LTE-A)latency remains much higher than the 1 ms requirement for the Tactile Internet and therefore the Digital Twin.This work investigates an interesting solution based on the incorporation of Software-defined networking(SDN)and Multi-access Mobile Edge Computing(MEC)technologies in an LTE-A network,to deliver future multimedia applications over the Tactile Internet while overcoming the QoS challenges.Several network scenarios were designed and simulated using Riverbed modeler and the performance was evaluated using several time-related Key Performance Indicators(KPIs)such as throughput,End-2-End(E2E)delay,and jitter.The best scenario possible is clearly the one integrating MEC and SDN approaches,where the overall delay,jitter,and throughput for haptics-attained 2 ms,0.01 ms,and 1000 packets per second.The results obtained give clear evidence that the integration of,both SDN and MEC,in LTE-A indicates performance improvement,and fulfills the standard requirements in terms of the above KPIs,for realizing a Digital Twin/Tactile Internet-based system.展开更多
Ethereum, currently the most widely utilized smart contracts platform, anchors the security of myriad smartcontracts upon its own robustness. Its foundational peer-to-peer network facilitates a dependable node connect...Ethereum, currently the most widely utilized smart contracts platform, anchors the security of myriad smartcontracts upon its own robustness. Its foundational peer-to-peer network facilitates a dependable node connectionmechanism, whereas an efficient data-sharing protocol constitutes as the bedrock of Blockchain network security.In this paper, we propose NodeHunter, an Ethereum network detector implemented through the application ofsimulation technology, which is capable of aggregating all node records within the network and the interconnectednessbetween them. Utilizing this connection information, NodeHunter can procure more comprehensive insightsfor network status analysis compared to preceding detection methodologies. Throughout a three-month period ofunbroken surveillance of the Ethereum network, we obtained an excess of two million node records along with overone hundred million node acquaintances. Analysis of the gathered data revealed that an alarming 49% or more ofthese node records were maliciously forged.展开更多
Along with the progression of Internet of Things(IoT)technology,network terminals are becoming continuously more intelligent.IoT has been widely applied in various scenarios,including urban infrastructure,transportati...Along with the progression of Internet of Things(IoT)technology,network terminals are becoming continuously more intelligent.IoT has been widely applied in various scenarios,including urban infrastructure,transportation,industry,personal life,and other socio-economic fields.The introduction of deep learning has brought new security challenges,like an increment in abnormal traffic,which threatens network security.Insufficient feature extraction leads to less accurate classification results.In abnormal traffic detection,the data of network traffic is high-dimensional and complex.This data not only increases the computational burden of model training but also makes information extraction more difficult.To address these issues,this paper proposes an MD-MRD-ResNeXt model for abnormal network traffic detection.To fully utilize the multi-scale information in network traffic,a Multi-scale Dilated feature extraction(MD)block is introduced.This module can effectively understand and process information at various scales and uses dilated convolution technology to significantly broaden the model’s receptive field.The proposed Max-feature-map Residual with Dual-channel pooling(MRD)block integrates the maximum feature map with the residual block.This module ensures the model focuses on key information,thereby optimizing computational efficiency and reducing unnecessary information redundancy.Experimental results show that compared to the latest methods,the proposed abnormal traffic detection model improves accuracy by about 2%.展开更多
In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signal...In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signals make the receiving ability of the signal receiver worse, the signal processing ability weaker,and the anti-interference ability of the communication system lower. Aiming at the above problems, to save communication resources and improve communication efficiency, and considering the irregularity of interference signals, the underdetermined blind separation technology can effectively deal with the problem of interference sensing and signal reconstruction in this scenario. In order to improve the stability of source signal separation and the security of information transmission, a greedy optimization algorithm can be executed. At the same time, to improve network information transmission efficiency and prevent algorithms from getting trapped in local optima, delete low-energy points during each iteration process. Ultimately, simulation experiments validate that the algorithm presented in this paper enhances both the transmission efficiency of the network transmission system and the security of the communication system, achieving the process of interference sensing and signal reconstruction in the LEO satellite communication system.展开更多
In mega-constellation Communication Systems, efficient routing algorithms and data transmission technologies are employed to ensure fast and reliable data transfer. However, the limited computational resources of sate...In mega-constellation Communication Systems, efficient routing algorithms and data transmission technologies are employed to ensure fast and reliable data transfer. However, the limited computational resources of satellites necessitate the use of edge computing to enhance secure communication.While edge computing reduces the burden on cloud computing, it introduces security and reliability challenges in open satellite communication channels. To address these challenges, we propose a blockchain architecture specifically designed for edge computing in mega-constellation communication systems. This architecture narrows down the consensus scope of the blockchain to meet the requirements of edge computing while ensuring comprehensive log storage across the network. Additionally, we introduce a reputation management mechanism for nodes within the blockchain, evaluating their trustworthiness, workload, and efficiency. Nodes with higher reputation scores are selected to participate in tasks and are appropriately incentivized. Simulation results demonstrate that our approach achieves a task result reliability of 95% while improving computational speed.展开更多
Tomato(Solanum lycopersicum), an economically important vegetable crop cultivated worldwide, often suffers massive financial losses due to Phytophthora infestans(P. infestans) spread and breakouts. Arbuscular mycorrhi...Tomato(Solanum lycopersicum), an economically important vegetable crop cultivated worldwide, often suffers massive financial losses due to Phytophthora infestans(P. infestans) spread and breakouts. Arbuscular mycorrhiza(AM) fungi mediated biocontrol has demonstrated great potential in plant resistance. However, little information is available on the regulation of mycorrhizal tomato resistance against P. infestans.Therefore, microRNAs(miRNAs) sequencing technology was used to analyse miRNA and their targets in the mycorrhizal tomato after P.infestans infection. Our study showed a lower severity of necrotic lesions in mycorrhizal tomato than in nonmycorrhizal controls. We investigated 35 miRNAs that showed the opposite expression tendency in mycorrhizal and nonmycorrhizal tomato after P. infestans infection when compared with uninfected P. infestans. Among them, miR319c was upregulated in mycorrhizal tomato leaves after pathogen infection. Overexpression of miR319c or silencing of its target gene(TCP1) increased tomato resistance to P. infestans, implying that miR319c acts as a positive regulator in tomato after pathogen infection. Additionally, we examined the induced expression patterns of miR319c and TCP1 in tomato plants exposed to salicylic acid(SA) treatment, and SA content and the expression levels of SA-related genes were also measured in overexpressing transgenic plants. The result revealed that miR319c can not only participates in tomato resistance to P. infestans by regulating SA content, but also indirectly regulates the expression levels of key genes in the SA pathway by regulating TCP1. In this study, we propose a novel mechanism in which the miR319c in mycorrhizal tomato increases resistance to P. infestans.展开更多
Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g....Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g., stylistic,semantic, and syntactic. The importance of AP lies in various fields, including forensics, security, medicine, andmarketing. In previous studies, many works have been done using different languages, e.g., English, Arabic, French,etc.However, the research on RomanUrdu is not up to the mark.Hence, this study focuses on detecting the author’sage and gender based on Roman Urdu text messages. The dataset used in this study is Fire’18-MaponSMS. Thisstudy proposed an ensemble model based on AdaBoostM1 and Random Forest (AMBRF) for AP using multiplelinguistic features that are stylistic, character-based, word-based, and sentence-based. The proposed model iscontrasted with several of the well-known models fromthe literature, including J48-Decision Tree (J48),Na飗e Bays(NB), K Nearest Neighbor (KNN), and Composite Hypercube on Random Projection (CHIRP), NB-Updatable,RF, and AdaboostM1. The overall outcome shows the better performance of the proposed AdaboostM1 withRandom Forest (ABMRF) with an accuracy of 54.2857% for age prediction and 71.1429% for gender predictioncalculated on stylistic features. Regarding word-based features, age and gender were considered in 50.5714% and60%, respectively. On the other hand, KNN and CHIRP show the weakest performance using all the linguisticfeatures for age and gender prediction.展开更多
The establishment of an elastostatic stiffness model for over constrained parallel manipulators(PMs),particularly those with over constrained subclosed loops,poses a challenge while ensuring numerical stability.This s...The establishment of an elastostatic stiffness model for over constrained parallel manipulators(PMs),particularly those with over constrained subclosed loops,poses a challenge while ensuring numerical stability.This study addresses this issue by proposing a systematic elastostatic stiffness model based on matrix structural analysis(MSA)and independent displacement coordinates(IDCs)extraction techniques.To begin,the closed-loop PM is transformed into an open-loop PM by eliminating constraints.A subassembly element is then introduced,which considers the flexibility of both rods and joints.This approach helps circumvent the numerical instability typically encountered with traditional constraint equations.The IDCs and analytical constraint equations of nodes constrained by various joints are summarized in the appendix,utilizing multipoint constraint theory and singularity analysis,all unified within a single coordinate frame.Subsequently,the open-loop mechanism is efficiently closed by referencing the constraint equations presented in the appendix,alongside its elastostatic model.The proposed method proves to be both modeling and computationally efficient due to the comprehensive summary of the constraint equations in the Appendix,eliminating the need for additional equations.An example utilizing an over constrained subclosed loops demonstrate the application of the proposed method.In conclusion,the model proposed in this study enriches the theory of elastostatic stiffness modeling of PMs and provides an effective solution for stiffness modeling challenges they present.展开更多
In permissioned blockchain networks,the Proof of Authority(PoA)consensus,which uses the election of authorized nodes to validate transactions and blocks,has beenwidely advocated thanks to its high transaction throughp...In permissioned blockchain networks,the Proof of Authority(PoA)consensus,which uses the election of authorized nodes to validate transactions and blocks,has beenwidely advocated thanks to its high transaction throughput and fault tolerance.However,PoA suffers from the drawback of centralization dominated by a limited number of authorized nodes and the lack of anonymity due to the round-robin block proposal mechanism.As a result,traditional PoA is vulnerable to a single point of failure that compromises the security of the blockchain network.To address these issues,we propose a novel decentralized reputation management mechanism for permissioned blockchain networks to enhance security,promote liveness,and mitigate centralization while retaining the same throughput as traditional PoA.This paper aims to design an off-chain reputation evaluation and an on-chain reputation-aided consensus.First,we evaluate the nodes’reputation in the context of the blockchain networks and make the reputation globally verifiable through smart contracts.Second,building upon traditional PoA,we propose a reputation-aided PoA(rPoA)consensus to enhance securitywithout sacrificing throughput.In particular,rPoA can incentivize nodes to autonomously form committees based on reputation authority,which prevents block generation from being tracked through the randomness of reputation variation.Moreover,we develop a reputation-aided fork-choice rule for rPoA to promote the network’s liveness.Finally,experimental results show that the proposed rPoA achieves higher security performance while retaining transaction throughput compared to traditional PoA.展开更多
Soybean(Glycine max)stands as a globally significant agricultural crop,and the comprehensive assembly of its genome is of paramount importance for unraveling its biological characteristics and evolutionary history.Nev...Soybean(Glycine max)stands as a globally significant agricultural crop,and the comprehensive assembly of its genome is of paramount importance for unraveling its biological characteristics and evolutionary history.Nevertheless,previous soybean genome assemblies have harbored gaps and incompleteness,which have constrained in-depth investigations into soybean.Here,we present Telomere-to-Telomere(T2T)assembly of the Chinese soybean cultivar Zhonghuang 13(ZH13)genome,termed ZH13-T2T,utilizing PacBio Hifi and ONT ultralong reads.We employed a multi-assembler approach,integrating Hifiasm,NextDenovo,and Canu,to minimize biases and enhance assembly accuracy.The assembly spans 1,015,024,879 bp,effectively resolving all 393 gaps that previously plagued the reference genome.Our annotation efforts identified 50,564 high-confidence protein-coding genes,707 of which are novel.ZH13-T2T revealed longer chromosomes,421 not-aligned regions(NARs),112 structure variations(SVs),and a substantial expansion of repetitive element compared to earlier assemblies.Specifically,we identified 25.67 Mb of tandem repeats,an enrichment of 5S and 48S rDNAs,and characterized their genotypic diversity.In summary,we deliver the first complete Chinese soybean cultivar T2T genome.The comprehensive annotation,along with precise centromere and telomere characterization,as well as insights into structural variations,further enhance our understanding of soybean genetics and evolution.展开更多
UAV marine monitoring plays an essential role in marine environmental protection because of its flexibility and convenience,low cost and convenient maintenance.In marine environmental monitoring,the similarity between...UAV marine monitoring plays an essential role in marine environmental protection because of its flexibility and convenience,low cost and convenient maintenance.In marine environmental monitoring,the similarity between objects such as oil spill and sea surface,Spartina alterniflora and algae is high,and the effect of the general segmentation algorithm is poor,which brings new challenges to the segmentation of UAV marine images.Panoramic segmentation can do object detection and semantic segmentation at the same time,which can well solve the polymorphism problem of objects in UAV ocean images.Currently,there are few studies on UAV marine image recognition with panoptic segmentation.In addition,there are no publicly available panoptic segmentation datasets for UAV images.In this work,we collect and annotate UAV images to form a panoptic segmentation UAV dataset named UAV-OUC-SEG and propose a panoptic segmentation method named PanopticUAV.First,to deal with the large intraclass variability in scale,deformable convolution and CBAM attention mechanism are employed in the backbone to obtain more accurate features.Second,due to the complexity and diversity of marine images,boundary masks by the Laplacian operator equation from the ground truth are merged into feature maps to improve boundary segmentation precision.Experiments demonstrate the advantages of PanopticUAV beyond the most other advanced approaches on the UAV-OUC-SEG dataset.展开更多
Traditional diagnostic techniques including visual examination,ultrasound(US),and magnetic resonance imaging(MRI)have limitations of in-depth information for the detection of nail disorders,resolution,and practicality...Traditional diagnostic techniques including visual examination,ultrasound(US),and magnetic resonance imaging(MRI)have limitations of in-depth information for the detection of nail disorders,resolution,and practicality.This pilot study,for thefirst time,evaluates a dualmodality imaging system that combines photoacoustic tomography(PAT)with the US for the multiparametric quantitative assessment of human nail.The study involved a small cohort offive healthy volunteers who underwent PAT/US imaging for acquiring the nail unit data.The PAT/US dual-modality imaging successfully revealed thefine anatomical structures and microvascular distribution within the nail and nail bed.Moreover,this system utilized multispectral PAT to analyze functional tissue parameters,including oxygenated hemoglobin,deoxyhemoglobin,oxygen saturation,and collagen under tourniquet and cold stimulus tests to evaluate changes in the microcirculation of the nail bed.The quantitative analysis of multispectral PAT reconstructed images demonstrated heightened sensitivity in detecting alterations in blood oxygenation levels and collagen content within the nail bed,under simulated different physiological conditions.This pilot study highlights the potential of PAT/US dual-modality imaging as a real-time,noninvasive diagnostic modality for evaluating human nail health and for early detection of nail bed pathologies.展开更多
The software development process mostly depends on accurately identifying both essential and optional features.Initially,user needs are typically expressed in free-form language,requiring significant time and human re...The software development process mostly depends on accurately identifying both essential and optional features.Initially,user needs are typically expressed in free-form language,requiring significant time and human resources to translate these into clear functional and non-functional requirements.To address this challenge,various machine learning(ML)methods have been explored to automate the understanding of these requirements,aiming to reduce time and human effort.However,existing techniques often struggle with complex instructions and large-scale projects.In our study,we introduce an innovative approach known as the Functional and Non-functional Requirements Classifier(FNRC).By combining the traditional random forest algorithm with the Accuracy Sliding Window(ASW)technique,we develop optimal sub-ensembles that surpass the initial classifier’s accuracy while using fewer trees.Experimental results demonstrate that our FNRC methodology performs robustly across different datasets,achieving a balanced Precision of 75%on the PROMISE dataset and an impressive Recall of 85%on the CCHIT dataset.Both datasets consistently maintain an F-measure around 64%,highlighting FNRC’s ability to effectively balance precision and recall in diverse scenarios.These findings contribute to more accurate and efficient software development processes,increasing the probability of achieving successful project outcomes.展开更多
[Objectives]To explore pathways and countermeasures for transforming farmers livelihoods in the way of reducing their dependence on land while promoting sustainable development and alleviating ecological degradation.[...[Objectives]To explore pathways and countermeasures for transforming farmers livelihoods in the way of reducing their dependence on land while promoting sustainable development and alleviating ecological degradation.[Methods]A combination of field research,literature review,and policy analysis was employed to identify key factors affecting farmers livelihoods and potential strategies for transformation.[Results]The study found that developing ecological agriculture and modern agriculture,promoting agricultural transformation and upgrading,cultivating alternative industries,strengthening ecological engineering construction,and establishing diversified ecological compensation methods and supporting policies are effective strategies for transforming farmers livelihoods.[Conclusions]Implementing these strategies can help alleviate the contradiction between ecological protection and farmers livelihood development,promoting coordinated development of both.This approach not only benefits farmers but also contributes to sustainable environmental management and biodiversity conservation.展开更多
文摘In civil aviation security screening, laptops, with their intricate structural composition, provide the potential for criminals to conceal dangerous items. Presently, the security process necessitates passengers to individually present their laptops for inspection. The paper introduced a method for laptop removal. By combining projection algorithms with the YOLOv7-Seg model, a laptop’s three views were generated through projection, and instance segmentation of these views was achieved using YOLOv7-Seg. The resulting 2D masks from instance segmentation at different angles were employed to reconstruct a 3D mask through angle restoration. Ultimately, the intersection of this 3D mask with the original 3D data enabled the successful extraction of the laptop’s 3D information. Experimental results demonstrated that the fusion of projection and instance segmentation facilitated the automatic removal of laptops from CT data. Moreover, higher instance segmentation model accuracy leads to more precise removal outcomes. By implementing the laptop removal functionality, the civil aviation security screening process becomes more efficient and convenient. Passengers will no longer be required to individually handle their laptops, effectively enhancing the efficiency and accuracy of security screening.
基金supported by the National Natural Science Foundation of China(Nos.62006001,62372001)the Natural Science Foundation of Chongqing City(Grant No.CSTC2021JCYJ-MSXMX0002).
文摘Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself discrimination paradigmin the biological immune system,the negative representation of information indicates features such as simplicity and efficiency,which is very suitable for preserving social network privacy.Therefore,we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks,called AttNetNRI.Specifically,a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the topology structure can be kept private.Moreover,a negative database-based method is proposed to hide node attributes,so that the privacy of node attributes can be preserved while supporting the similarity estimation between different node attributes,which is crucial to the analysis of social networks.To evaluate the performance of the AttNetNRI,empirical studies have been conducted on various attribute social networks and compared with several state-of-the-art methods tailored to preserve the privacy of social networks.The experimental results show the superiority of the developed method in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topology disturbing and attribute hiding parts.The experimental results show the superiority of the developed methods in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topological interference and attribute-hiding components.
基金supported by the Major Public Welfare Special Fund of Henan Province(No.201300210200)the Major Science and Technology Research Special Fund of Henan Province(No.221100210400).
文摘With the rise of blockchain technology,the security issues of smart contracts have become increasingly critical.Despite the availability of numerous smart contract vulnerability detection tools,many face challenges such as slow updates,usability issues,and limited installation methods.These challenges hinder the adoption and practicality of these tools.This paper examines smart contract vulnerability detection tools from 2016 to 2023,sourced from the Web of Science(WOS)and Google Scholar.By systematically collecting,screening,and synthesizing relevant research,38 open-source tools that provide installation methods were selected for further investigation.From a developer’s perspective,this paper offers a comprehensive survey of these 38 open-source tools,discussing their operating principles,installation methods,environmental dependencies,update frequencies,and installation challenges.Based on this,we propose an Ethereum smart contract vulnerability detection framework.This framework enables developers to easily utilize various detection tools and accurately analyze contract security issues.To validate the framework’s stability,over 1700 h of testing were conducted.Additionally,a comprehensive performance test was performed on the mainstream detection tools integrated within the framework,assessing their hardware requirements and vulnerability detection coverage.Experimental results indicate that the Slither tool demonstrates satisfactory performance in terms of system resource consumption and vulnerability detection coverage.This study represents the first performance evaluation of testing tools in this domain,providing significant reference value.
基金Project support by the National Natural Science Foundation of China(Grant Nos.11704044 and 12074140)。
文摘The first-principles calculations are performed to examine structural,mechanical,and electronic properties at large strain for a monolayer C_(4)N_(4),which has been predicted as an anchoring promising material to attenuate shuttle effect in Li–S batteries stemming from its large absorption energy and low diffusion energy barrier.Our results show that the ideal strengths of C_(4)N_(4)under tension and pure shear deformation conditions reach 13.9 GPa and 12.5 GPa when the strains are 0.07 and 0.28,respectively.The folded five-membered rings and diverse bonding modes between carbon and nitrogen atoms enhance the ability to resist plastic deformation of C_(4)N_(4).The orderly bond-rearranging behaviors under the weak tensile loading path along the[100]direction cause the impressive semiconductor–metal transition and inverse semiconductor–metal transition.The present results enrich the knowledge of the structure and electronic properties of C_(4)N_(4)under deformations and shed light on exploring other two-dimensional materials under diverse loading conditions.
基金funded by the Major PublicWelfare Special Fund of Henan Province(No.201300210200)the Major Science and Technology Research Special Fund of Henan Province(No.221100210400).
文摘In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerability detection has become particularly important.With the popular use of neural network model,there has been a growing utilization of deep learning-based methods and tools for the identification of vulnerabilities within smart contracts.This paper commences by providing a succinct overview of prevalent categories of vulnerabilities found in smart contracts.Subsequently,it categorizes and presents an overview of contemporary deep learning-based tools developed for smart contract detection.These tools are categorized based on their open-source status,the data format and the type of feature extraction they employ.Then we conduct a comprehensive comparative analysis of these tools,selecting representative tools for experimental validation and comparing them with traditional tools in terms of detection coverage and accuracy.Finally,Based on the insights gained from the experimental results and the current state of research in the field of smart contract vulnerability detection tools,we suppose to provide a reference standard for developers of contract vulnerability detection tools.Meanwhile,forward-looking research directions are also proposed for deep learning-based smart contract vulnerability detection.
文摘One of the biggest dangers to society today is terrorism, where attacks have become one of the most significantrisks to international peace and national security. Big data, information analysis, and artificial intelligence (AI) havebecome the basis for making strategic decisions in many sensitive areas, such as fraud detection, risk management,medical diagnosis, and counter-terrorism. However, there is still a need to assess how terrorist attacks are related,initiated, and detected. For this purpose, we propose a novel framework for classifying and predicting terroristattacks. The proposed framework posits that neglected text attributes included in the Global Terrorism Database(GTD) can influence the accuracy of the model’s classification of terrorist attacks, where each part of the datacan provide vital information to enrich the ability of classifier learning. Each data point in a multiclass taxonomyhas one or more tags attached to it, referred as “related tags.” We applied machine learning classifiers to classifyterrorist attack incidents obtained from the GTD. A transformer-based technique called DistilBERT extracts andlearns contextual features from text attributes to acquiremore information from text data. The extracted contextualfeatures are combined with the “key features” of the dataset and used to perform the final classification. Thestudy explored different experimental setups with various classifiers to evaluate the model’s performance. Theexperimental results show that the proposed framework outperforms the latest techniques for classifying terroristattacks with an accuracy of 98.7% using a combined feature set and extreme gradient boosting classifier.
文摘Haptic is the modality that complements traditional multimedia,i.e.,audiovisual,to evolve the next wave of innovation at which the Internet data stream can be exchanged to enable remote skills and control applications.This will require ultra-low latency and ultra-high reliability to evolve the mobile experience into the era of Digital Twin and Tactile Internet.While the 5th generation of mobile networks is not yet widely deployed,Long-Term Evolution(LTE-A)latency remains much higher than the 1 ms requirement for the Tactile Internet and therefore the Digital Twin.This work investigates an interesting solution based on the incorporation of Software-defined networking(SDN)and Multi-access Mobile Edge Computing(MEC)technologies in an LTE-A network,to deliver future multimedia applications over the Tactile Internet while overcoming the QoS challenges.Several network scenarios were designed and simulated using Riverbed modeler and the performance was evaluated using several time-related Key Performance Indicators(KPIs)such as throughput,End-2-End(E2E)delay,and jitter.The best scenario possible is clearly the one integrating MEC and SDN approaches,where the overall delay,jitter,and throughput for haptics-attained 2 ms,0.01 ms,and 1000 packets per second.The results obtained give clear evidence that the integration of,both SDN and MEC,in LTE-A indicates performance improvement,and fulfills the standard requirements in terms of the above KPIs,for realizing a Digital Twin/Tactile Internet-based system.
基金the National Key Research and Development Program of China(No.2020YFB1005805)Peng Cheng Laboratory Project(Grant No.PCL2021A02)+2 种基金Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies(2022B1212010005)Shenzhen Basic Research(General Project)(No.JCYJ20190806142601687)Shenzhen Stable Supporting Program(General Project)(No.GXWD20201230155427003-20200821160539001).
文摘Ethereum, currently the most widely utilized smart contracts platform, anchors the security of myriad smartcontracts upon its own robustness. Its foundational peer-to-peer network facilitates a dependable node connectionmechanism, whereas an efficient data-sharing protocol constitutes as the bedrock of Blockchain network security.In this paper, we propose NodeHunter, an Ethereum network detector implemented through the application ofsimulation technology, which is capable of aggregating all node records within the network and the interconnectednessbetween them. Utilizing this connection information, NodeHunter can procure more comprehensive insightsfor network status analysis compared to preceding detection methodologies. Throughout a three-month period ofunbroken surveillance of the Ethereum network, we obtained an excess of two million node records along with overone hundred million node acquaintances. Analysis of the gathered data revealed that an alarming 49% or more ofthese node records were maliciously forged.
基金supported by the Key Research and Development Program of Xinjiang Uygur Autonomous Region(No.2022B01008)the National Natural Science Foundation of China(No.62363032)+4 种基金the Natural Science Foundation of Xinjiang Uygur Autonomous Region(No.2023D01C20)the Scientific Research Foundation of Higher Education(No.XJEDU2022P011)National Science and Technology Major Project(No.2022ZD0115803)Tianshan Innovation Team Program of Xinjiang Uygur Autonomous Region(No.2023D14012)the“Heaven Lake Doctor”Project(No.202104120018).
文摘Along with the progression of Internet of Things(IoT)technology,network terminals are becoming continuously more intelligent.IoT has been widely applied in various scenarios,including urban infrastructure,transportation,industry,personal life,and other socio-economic fields.The introduction of deep learning has brought new security challenges,like an increment in abnormal traffic,which threatens network security.Insufficient feature extraction leads to less accurate classification results.In abnormal traffic detection,the data of network traffic is high-dimensional and complex.This data not only increases the computational burden of model training but also makes information extraction more difficult.To address these issues,this paper proposes an MD-MRD-ResNeXt model for abnormal network traffic detection.To fully utilize the multi-scale information in network traffic,a Multi-scale Dilated feature extraction(MD)block is introduced.This module can effectively understand and process information at various scales and uses dilated convolution technology to significantly broaden the model’s receptive field.The proposed Max-feature-map Residual with Dual-channel pooling(MRD)block integrates the maximum feature map with the residual block.This module ensures the model focuses on key information,thereby optimizing computational efficiency and reducing unnecessary information redundancy.Experimental results show that compared to the latest methods,the proposed abnormal traffic detection model improves accuracy by about 2%.
基金supported by National Natural Science Foundation of China (62171390)Central Universities of Southwest Minzu University (ZYN2022032,2023NYXXS034)the State Scholarship Fund of the China Scholarship Council (NO.202008510081)。
文摘In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signals make the receiving ability of the signal receiver worse, the signal processing ability weaker,and the anti-interference ability of the communication system lower. Aiming at the above problems, to save communication resources and improve communication efficiency, and considering the irregularity of interference signals, the underdetermined blind separation technology can effectively deal with the problem of interference sensing and signal reconstruction in this scenario. In order to improve the stability of source signal separation and the security of information transmission, a greedy optimization algorithm can be executed. At the same time, to improve network information transmission efficiency and prevent algorithms from getting trapped in local optima, delete low-energy points during each iteration process. Ultimately, simulation experiments validate that the algorithm presented in this paper enhances both the transmission efficiency of the network transmission system and the security of the communication system, achieving the process of interference sensing and signal reconstruction in the LEO satellite communication system.
基金supported in part by the National Natural Science Foundation of China under Grant No.U2268204,62172061 and 61871422National Key R&D Program of China under Grant No.2020YFB1711800 and 2020YFB1707900+2 种基金the Science and Technology Project of Sichuan Province under Grant No.2023ZHCG0014,2023ZHCG0011,2022YFG0155,2022YFG0157,2021GFW019,2021YFG0152,2021YFG0025,2020YFG0322Central Universities of Southwest Minzu University under Grant No.ZYN2022032,2023NYXXS034the State Scholarship Fund of the China Scholarship Council under Grant No.202008510081。
文摘In mega-constellation Communication Systems, efficient routing algorithms and data transmission technologies are employed to ensure fast and reliable data transfer. However, the limited computational resources of satellites necessitate the use of edge computing to enhance secure communication.While edge computing reduces the burden on cloud computing, it introduces security and reliability challenges in open satellite communication channels. To address these challenges, we propose a blockchain architecture specifically designed for edge computing in mega-constellation communication systems. This architecture narrows down the consensus scope of the blockchain to meet the requirements of edge computing while ensuring comprehensive log storage across the network. Additionally, we introduce a reputation management mechanism for nodes within the blockchain, evaluating their trustworthiness, workload, and efficiency. Nodes with higher reputation scores are selected to participate in tasks and are appropriately incentivized. Simulation results demonstrate that our approach achieves a task result reliability of 95% while improving computational speed.
基金supported by the National Natural Science Foundation of China (Grant Nos.32230091,32072592)。
文摘Tomato(Solanum lycopersicum), an economically important vegetable crop cultivated worldwide, often suffers massive financial losses due to Phytophthora infestans(P. infestans) spread and breakouts. Arbuscular mycorrhiza(AM) fungi mediated biocontrol has demonstrated great potential in plant resistance. However, little information is available on the regulation of mycorrhizal tomato resistance against P. infestans.Therefore, microRNAs(miRNAs) sequencing technology was used to analyse miRNA and their targets in the mycorrhizal tomato after P.infestans infection. Our study showed a lower severity of necrotic lesions in mycorrhizal tomato than in nonmycorrhizal controls. We investigated 35 miRNAs that showed the opposite expression tendency in mycorrhizal and nonmycorrhizal tomato after P. infestans infection when compared with uninfected P. infestans. Among them, miR319c was upregulated in mycorrhizal tomato leaves after pathogen infection. Overexpression of miR319c or silencing of its target gene(TCP1) increased tomato resistance to P. infestans, implying that miR319c acts as a positive regulator in tomato after pathogen infection. Additionally, we examined the induced expression patterns of miR319c and TCP1 in tomato plants exposed to salicylic acid(SA) treatment, and SA content and the expression levels of SA-related genes were also measured in overexpressing transgenic plants. The result revealed that miR319c can not only participates in tomato resistance to P. infestans by regulating SA content, but also indirectly regulates the expression levels of key genes in the SA pathway by regulating TCP1. In this study, we propose a novel mechanism in which the miR319c in mycorrhizal tomato increases resistance to P. infestans.
基金the support of Prince Sultan University for the Article Processing Charges(APC)of this publication。
文摘Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g., stylistic,semantic, and syntactic. The importance of AP lies in various fields, including forensics, security, medicine, andmarketing. In previous studies, many works have been done using different languages, e.g., English, Arabic, French,etc.However, the research on RomanUrdu is not up to the mark.Hence, this study focuses on detecting the author’sage and gender based on Roman Urdu text messages. The dataset used in this study is Fire’18-MaponSMS. Thisstudy proposed an ensemble model based on AdaBoostM1 and Random Forest (AMBRF) for AP using multiplelinguistic features that are stylistic, character-based, word-based, and sentence-based. The proposed model iscontrasted with several of the well-known models fromthe literature, including J48-Decision Tree (J48),Na飗e Bays(NB), K Nearest Neighbor (KNN), and Composite Hypercube on Random Projection (CHIRP), NB-Updatable,RF, and AdaboostM1. The overall outcome shows the better performance of the proposed AdaboostM1 withRandom Forest (ABMRF) with an accuracy of 54.2857% for age prediction and 71.1429% for gender predictioncalculated on stylistic features. Regarding word-based features, age and gender were considered in 50.5714% and60%, respectively. On the other hand, KNN and CHIRP show the weakest performance using all the linguisticfeatures for age and gender prediction.
基金Supported by National Natural Science Foundation of China (Grant No.52275036)Key Research and Development Project of the Jiaxing Science and Technology Bureau (Grant No.2022BZ10004)。
文摘The establishment of an elastostatic stiffness model for over constrained parallel manipulators(PMs),particularly those with over constrained subclosed loops,poses a challenge while ensuring numerical stability.This study addresses this issue by proposing a systematic elastostatic stiffness model based on matrix structural analysis(MSA)and independent displacement coordinates(IDCs)extraction techniques.To begin,the closed-loop PM is transformed into an open-loop PM by eliminating constraints.A subassembly element is then introduced,which considers the flexibility of both rods and joints.This approach helps circumvent the numerical instability typically encountered with traditional constraint equations.The IDCs and analytical constraint equations of nodes constrained by various joints are summarized in the appendix,utilizing multipoint constraint theory and singularity analysis,all unified within a single coordinate frame.Subsequently,the open-loop mechanism is efficiently closed by referencing the constraint equations presented in the appendix,alongside its elastostatic model.The proposed method proves to be both modeling and computationally efficient due to the comprehensive summary of the constraint equations in the Appendix,eliminating the need for additional equations.An example utilizing an over constrained subclosed loops demonstrate the application of the proposed method.In conclusion,the model proposed in this study enriches the theory of elastostatic stiffness modeling of PMs and provides an effective solution for stiffness modeling challenges they present.
基金supported by the Shenzhen Science and Technology Program under Grants KCXST20221021111404010,JSGG20220831103400002,JSGGKQTD20221101115655027,JCYJ 20210324094609027the National KeyR&DProgram of China under Grant 2021YFB2700900+1 种基金the National Natural Science Foundation of China under Grants 62371239,62376074,72301083the Jiangsu Specially-Appointed Professor Program 2021.
文摘In permissioned blockchain networks,the Proof of Authority(PoA)consensus,which uses the election of authorized nodes to validate transactions and blocks,has beenwidely advocated thanks to its high transaction throughput and fault tolerance.However,PoA suffers from the drawback of centralization dominated by a limited number of authorized nodes and the lack of anonymity due to the round-robin block proposal mechanism.As a result,traditional PoA is vulnerable to a single point of failure that compromises the security of the blockchain network.To address these issues,we propose a novel decentralized reputation management mechanism for permissioned blockchain networks to enhance security,promote liveness,and mitigate centralization while retaining the same throughput as traditional PoA.This paper aims to design an off-chain reputation evaluation and an on-chain reputation-aided consensus.First,we evaluate the nodes’reputation in the context of the blockchain networks and make the reputation globally verifiable through smart contracts.Second,building upon traditional PoA,we propose a reputation-aided PoA(rPoA)consensus to enhance securitywithout sacrificing throughput.In particular,rPoA can incentivize nodes to autonomously form committees based on reputation authority,which prevents block generation from being tracked through the randomness of reputation variation.Moreover,we develop a reputation-aided fork-choice rule for rPoA to promote the network’s liveness.Finally,experimental results show that the proposed rPoA achieves higher security performance while retaining transaction throughput compared to traditional PoA.
基金This work has been supported by the National Key Research and Development Program of China(2021YFF1200105)National Natural Science Foundation of China(62172125,62371161).
文摘Soybean(Glycine max)stands as a globally significant agricultural crop,and the comprehensive assembly of its genome is of paramount importance for unraveling its biological characteristics and evolutionary history.Nevertheless,previous soybean genome assemblies have harbored gaps and incompleteness,which have constrained in-depth investigations into soybean.Here,we present Telomere-to-Telomere(T2T)assembly of the Chinese soybean cultivar Zhonghuang 13(ZH13)genome,termed ZH13-T2T,utilizing PacBio Hifi and ONT ultralong reads.We employed a multi-assembler approach,integrating Hifiasm,NextDenovo,and Canu,to minimize biases and enhance assembly accuracy.The assembly spans 1,015,024,879 bp,effectively resolving all 393 gaps that previously plagued the reference genome.Our annotation efforts identified 50,564 high-confidence protein-coding genes,707 of which are novel.ZH13-T2T revealed longer chromosomes,421 not-aligned regions(NARs),112 structure variations(SVs),and a substantial expansion of repetitive element compared to earlier assemblies.Specifically,we identified 25.67 Mb of tandem repeats,an enrichment of 5S and 48S rDNAs,and characterized their genotypic diversity.In summary,we deliver the first complete Chinese soybean cultivar T2T genome.The comprehensive annotation,along with precise centromere and telomere characterization,as well as insights into structural variations,further enhance our understanding of soybean genetics and evolution.
基金This work was partially supported by the National Key Research and Development Program of China under Grant No.2018AAA0100400the Natural Science Foundation of Shandong Province under Grants Nos.ZR2020MF131 and ZR2021ZD19the Science and Technology Program of Qingdao under Grant No.21-1-4-ny-19-nsh.
文摘UAV marine monitoring plays an essential role in marine environmental protection because of its flexibility and convenience,low cost and convenient maintenance.In marine environmental monitoring,the similarity between objects such as oil spill and sea surface,Spartina alterniflora and algae is high,and the effect of the general segmentation algorithm is poor,which brings new challenges to the segmentation of UAV marine images.Panoramic segmentation can do object detection and semantic segmentation at the same time,which can well solve the polymorphism problem of objects in UAV ocean images.Currently,there are few studies on UAV marine image recognition with panoptic segmentation.In addition,there are no publicly available panoptic segmentation datasets for UAV images.In this work,we collect and annotate UAV images to form a panoptic segmentation UAV dataset named UAV-OUC-SEG and propose a panoptic segmentation method named PanopticUAV.First,to deal with the large intraclass variability in scale,deformable convolution and CBAM attention mechanism are employed in the backbone to obtain more accurate features.Second,due to the complexity and diversity of marine images,boundary masks by the Laplacian operator equation from the ground truth are merged into feature maps to improve boundary segmentation precision.Experiments demonstrate the advantages of PanopticUAV beyond the most other advanced approaches on the UAV-OUC-SEG dataset.
基金supported by the program of Chengdu Fifth people's hospital Fund,No.KYJJ 2021-29the Xinglin Scholars research program,No.YYZX2021037+1 种基金the Chengdu Medical Research Project,Nos.2022055 and 2023022,Chongqing Education Commission,Youth Fund(No.KJQN202000607)Chongqing postdoctoral research project(special funding project,No.2021XM3040).
文摘Traditional diagnostic techniques including visual examination,ultrasound(US),and magnetic resonance imaging(MRI)have limitations of in-depth information for the detection of nail disorders,resolution,and practicality.This pilot study,for thefirst time,evaluates a dualmodality imaging system that combines photoacoustic tomography(PAT)with the US for the multiparametric quantitative assessment of human nail.The study involved a small cohort offive healthy volunteers who underwent PAT/US imaging for acquiring the nail unit data.The PAT/US dual-modality imaging successfully revealed thefine anatomical structures and microvascular distribution within the nail and nail bed.Moreover,this system utilized multispectral PAT to analyze functional tissue parameters,including oxygenated hemoglobin,deoxyhemoglobin,oxygen saturation,and collagen under tourniquet and cold stimulus tests to evaluate changes in the microcirculation of the nail bed.The quantitative analysis of multispectral PAT reconstructed images demonstrated heightened sensitivity in detecting alterations in blood oxygenation levels and collagen content within the nail bed,under simulated different physiological conditions.This pilot study highlights the potential of PAT/US dual-modality imaging as a real-time,noninvasive diagnostic modality for evaluating human nail health and for early detection of nail bed pathologies.
基金This work is supported by EIAS(Emerging Intelligent Autonomous Systems)Data Science Lab,Prince Sultan University,Kingdom of Saudi Arabia,by paying the APC.
文摘The software development process mostly depends on accurately identifying both essential and optional features.Initially,user needs are typically expressed in free-form language,requiring significant time and human resources to translate these into clear functional and non-functional requirements.To address this challenge,various machine learning(ML)methods have been explored to automate the understanding of these requirements,aiming to reduce time and human effort.However,existing techniques often struggle with complex instructions and large-scale projects.In our study,we introduce an innovative approach known as the Functional and Non-functional Requirements Classifier(FNRC).By combining the traditional random forest algorithm with the Accuracy Sliding Window(ASW)technique,we develop optimal sub-ensembles that surpass the initial classifier’s accuracy while using fewer trees.Experimental results demonstrate that our FNRC methodology performs robustly across different datasets,achieving a balanced Precision of 75%on the PROMISE dataset and an impressive Recall of 85%on the CCHIT dataset.Both datasets consistently maintain an F-measure around 64%,highlighting FNRC’s ability to effectively balance precision and recall in diverse scenarios.These findings contribute to more accurate and efficient software development processes,increasing the probability of achieving successful project outcomes.
基金Supported by 2024 General Project of Guangdong Provincial Philosophy and Social Science Planning(GD24CGL18).
文摘[Objectives]To explore pathways and countermeasures for transforming farmers livelihoods in the way of reducing their dependence on land while promoting sustainable development and alleviating ecological degradation.[Methods]A combination of field research,literature review,and policy analysis was employed to identify key factors affecting farmers livelihoods and potential strategies for transformation.[Results]The study found that developing ecological agriculture and modern agriculture,promoting agricultural transformation and upgrading,cultivating alternative industries,strengthening ecological engineering construction,and establishing diversified ecological compensation methods and supporting policies are effective strategies for transforming farmers livelihoods.[Conclusions]Implementing these strategies can help alleviate the contradiction between ecological protection and farmers livelihood development,promoting coordinated development of both.This approach not only benefits farmers but also contributes to sustainable environmental management and biodiversity conservation.