期刊文献+
共找到318,300篇文章
< 1 2 250 >
每页显示 20 50 100
Economic Growth:The Fundamental Path to the Realization of Social Security Rights for Migrant Workers
1
作者 Zhang Yuqing 《Economics World》 2024年第3期117-121,共5页
The International Labour Organization seems to only see the aspect of social security promoting economic growth,while neglecting the aspect of economic growth supporting social security.From the standpoint of material... The International Labour Organization seems to only see the aspect of social security promoting economic growth,while neglecting the aspect of economic growth supporting social security.From the standpoint of materialism and the practice of social security,the realization of social security rights for migrant workers fundamentally depends on economic growth.The Belt and Road Initiative has provided a Chinese solution for creating a strong material and technological foundation to meet the social security needs of all people,including migrant workers. 展开更多
关键词 economic growth migrant workers social security rights implementation pathways
下载PDF
A simulation-based emergency force planning method for social security events
2
作者 YANG Xuesheng WANG Yingli GUAN Yong 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2023年第1期141-148,共8页
The occurrence of social security events is uncertain, and the distribution characteristics are highly complex due to a variety of external factors, posing challenges to their rapid and effective handling. The scienti... The occurrence of social security events is uncertain, and the distribution characteristics are highly complex due to a variety of external factors, posing challenges to their rapid and effective handling. The scientific and reasonable requirement evaluation of the emergency force to deal with social security events is very urgent. Based on data analysis, this paper uses the neural network, operational research, modelling and simulation to predict and analyze social security events, studies the usage rule of emergency force and deployment algorithm, and conducts simulation experiments to evaluate and compare the different force deployment schemes for selection. 展开更多
关键词 social security emergency force SIMULATION force deployment
下载PDF
Public Sentiment Analysis of Social Security Emergencies Based on Feature Fusion Model of BERT and TextLevelGCN
3
作者 Linli Wang Hu Wang Hanlu Lei 《Journal of Computer and Communications》 2023年第5期194-204,共11页
At present, the emotion classification method of Weibo public opinions based on graph neural network cannot solve the polysemy problem well, and the scale of global graph with fixed weight is too large. This paper pro... At present, the emotion classification method of Weibo public opinions based on graph neural network cannot solve the polysemy problem well, and the scale of global graph with fixed weight is too large. This paper proposes a feature fusion network model Bert-TextLevelGCN based on BERT pre-training and improved TextGCN. On the one hand, Bert is introduced to obtain the initial vector input of graph neural network containing rich semantic features. On the other hand, the global graph connection window of traditional TextGCN is reduced to the text level, and the message propagation mechanism of global sharing is applied. Finally, the output vector of BERT and TextLevelGCN is fused by interpolation update method, and a more robust mapping of positive and negative sentiment classification of public opinion text of “Tangshan Barbecue Restaurant beating people” is obtained. In the context of the national anti-gang campaign, it is of great significance to accurately and efficiently analyze the emotional characteristics of public opinion in sudden social violence events with bad social impact, which is of great significance to improve the government’s public opinion warning and response ability to public opinion in sudden social security events. . 展开更多
关键词 social security Emergencies Network Public Opinion Emotion Analysis Graph Neural Network TextLevelGCN BERT
下载PDF
Integrated ribosome and proteome analyses reveal insights into sevoflurane-induced long-term social behavior and cognitive dysfunctions through ADNP inhibition in neonatal mice 被引量:1
4
作者 Li-Rong Liang Bing Liu +9 位作者 Shu-Hui Cao You-Yi Zhao Tian Zeng Mei-Ting Zhai Ze Fan Dan-Yi He San-Xin Ma Xiao-Tong Shi Yao Zhang Hui Zhang 《Zoological Research》 SCIE CSCD 2024年第3期663-678,共16页
A growing number of studies have demonstrated that repeated exposure to sevoflurane during development results in persistent social abnormalities and cognitive impairment.Davunetide,an active fragment of the activity-... A growing number of studies have demonstrated that repeated exposure to sevoflurane during development results in persistent social abnormalities and cognitive impairment.Davunetide,an active fragment of the activity-dependent neuroprotective protein(ADNP),has been implicated in social and cognitive protection.However,the potential of davunetide to attenuate social deficits following sevoflurane exposure and the underlying developmental mechanisms remain poorly understood.In this study,ribosome and proteome profiles were analyzed to investigate the molecular basis of sevoflurane-induced social deficits in neonatal mice.The neuropathological basis was also explored using Golgi staining,morphological analysis,western blotting,electrophysiological analysis,and behavioral analysis.Results indicated that ADNP was significantly down-regulated following developmental exposure to sevoflurane.In adulthood,anterior cingulate cortex(ACC)neurons exposed to sevoflurane exhibited a decrease in dendrite number,total dendrite length,and spine density.Furthermore,the expression levels of Homer,PSD95,synaptophysin,and vglut2 were significantly reduced in the sevoflurane group.Patch-clamp recordings indicated reductions in both the frequency and amplitude of miniature excitatory postsynaptic currents(mEPSCs).Notably,davunetide significantly ameliorated the synaptic defects,social behavior deficits,and cognitive impairments induced by sevoflurane.Mechanistic analysis revealed that loss of ADNP led to dysregulation of Ca^(2+)activity via the Wnt/β-catenin signaling,resulting in decreased expression of synaptic proteins.Suppression of Wnt signaling was restored in the davunetide-treated group.Thus,ADNP was identified as a promising therapeutic target for the prevention and treatment of neurodevelopmental toxicity caused by general anesthetics.This study provides important insights into the mechanisms underlying social and cognitive disturbances caused by sevoflurane exposure in neonatal mice and elucidates the regulatory pathways involved. 展开更多
关键词 Davunetide SEVOFLURANE Abnormal social behaviors ADNP NEUROTOXICITY
下载PDF
Repositioning fertilizer manufacturing subsidies for improving food security and reducing greenhouse gas emissions in China 被引量:1
5
作者 Zongyi Wu Xiaolong Feng +1 位作者 Yumei Zhang Shenggen Fan 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第2期430-443,共14页
China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the ... China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the environment remains inadequately evaluated.Moreover,although green and low-carbon technologies offer environmental advantages,their widespread adoption is hindered by prohibitively high costs.This study analyzes the impact of removing fertilizer manufacturing subsidies and explores the potential feasibility of redirecting fertilizer manufacturing subsidies to invest in the diffusion of these technologies.Utilizing the China Agricultural University Agri-food Systems model,we analyzed the potential for achieving mutually beneficial outcomes regarding food security and environmental sustainability.The findings indicate that removing fertilizer manufacturing subsidies has reduced greenhouse gas(GHG)emissions from agricultural activities by 3.88 million metric tons,with minimal impact on food production.Redirecting fertilizer manufacturing subsidies to invest in green and low-carbon technologies,including slow and controlled-release fertilizer,organic-inorganic compound fertilizers,and machine deep placement of fertilizer,emerges as a strategy to concurrently curtail GHG emissions,ensure food security,and secure robust economic returns.Finally,we propose a comprehensive set of government interventions,including subsidies,field guidance,and improved extension systems,to promote the widespread adoption of these technologies. 展开更多
关键词 food security fertilizer manufacturing subsidies agri-food systems greenhouse gas emissions
下载PDF
Spotted Hyena Optimizer with Deep Learning Driven Cybersecurity for Social Networks
6
作者 Anwer Mustafa Hilal Aisha Hassan Abdalla Hashim +5 位作者 Heba G.Mohamed Lubna A.Alharbi Mohamed K.Nour Abdullah Mohamed Ahmed S.Almasoud Abdelwahed Motwakel 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期2033-2047,共15页
Recent developments on Internet and social networking have led to the growth of aggressive language and hate speech.Online provocation,abuses,and attacks are widely termed cyberbullying(CB).The massive quantity of use... Recent developments on Internet and social networking have led to the growth of aggressive language and hate speech.Online provocation,abuses,and attacks are widely termed cyberbullying(CB).The massive quantity of user generated content makes it difficult to recognize CB.Current advancements in machine learning(ML),deep learning(DL),and natural language processing(NLP)tools enable to detect and classify CB in social networks.In this view,this study introduces a spotted hyena optimizer with deep learning driven cybersecurity(SHODLCS)model for OSN.The presented SHODLCS model intends to accomplish cybersecurity from the identification of CB in the OSN.For achieving this,the SHODLCS model involves data pre-processing and TF-IDF based feature extraction.In addition,the cascaded recurrent neural network(CRNN)model is applied for the identification and classification of CB.Finally,the SHO algorithm is exploited to optimally tune the hyperparameters involved in the CRNN model and thereby results in enhanced classifier performance.The experimental validation of the SHODLCS model on the benchmark dataset portrayed the better outcomes of the SHODLCS model over the recent approaches. 展开更多
关键词 CYBERsecurity CYBERBULLYING online social network deep learning spotted hyena optimizer
下载PDF
An Investigation on Open-RAN Specifications:Use Cases,Security Threats,Requirements,Discussions
7
作者 Heejae Park Tri-HaiNguyen Laihyuk Park 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期13-41,共29页
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Rece... The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Recently,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs.By disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network automation.However,this openness introduces new security challenges compared to traditional RANs.Many existing studies overlook these security requirements of the O-RAN networks.To gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G applications.We then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities effectively.By providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security. 展开更多
关键词 O-RAN ARCHITECTURE use cases security issues security requirements security discussions
下载PDF
Spatiotemporal dynamics of the social structure of Indo-Pacific humpback dolphins(Sousa chinensis)in Xiamen waters from 2007 to 2019
8
作者 Yi Lu Xin-Rong Xu +3 位作者 Bing-Yao Chen Thomas A Jefferson Holly Fearnbach Guang Yang 《Zoological Research》 SCIE CSCD 2024年第2期439-450,共12页
As highly social animals,Indo-Pacific humpback dolphins(Sousa chinensis)exhibit community differentiation.Nevertheless,our understanding of the external and internal factors influencing these dynamics,as well as their... As highly social animals,Indo-Pacific humpback dolphins(Sousa chinensis)exhibit community differentiation.Nevertheless,our understanding of the external and internal factors influencing these dynamics,as well as their spatiotemporal variations,is still limited.In the present study,variations in the social structure of an endangered Indo-Pacific humpback dolphin population in Xiamen Bay,China,were monitored over two distinct periods(2007–2010 and 2017–2019)to analyze the effects of habitat utilization and the composition of individuals within the population.In both periods,the population demonstrated a strikingly similar pattern of social differentiation,characterized by the division of individuals into two main clusters and one small cluster.Spatially,the two primary clusters occupied the eastern and western waters,respectively,although the core distribution area of the eastern cluster shifted further eastward between the two periods.Despite this distribution shift,the temporal stability of the social structure and inter-associations within the eastern cluster remained unaffected.A subset of 16individuals observed in both periods,comprising 51.6%and 43.2%of the population in each respective period,emerged as a foundational element of the social structure and may be responsible for sustaining social structure stability,especially during the 2007–2010 period.These observations suggest that the composition of dominant individuals,an internal factor,had a more substantial influence on the formation of the social network than changes in habitat use,an external factor.Consequently,the study proposes distinct conservation measures tailored to each of the two main clusters. 展开更多
关键词 social differentiation social structure Sousa chinensis DYNAMICS CONSERVATION
下载PDF
Enhancing Data Forwarding Efficiency in SIoT with Multidimensional Social Relations
9
作者 Fang Xu Songhao Jiang +3 位作者 Yi Ma Manzoor Ahmed Zenggang Xiong Yuanlin Lyu 《Computers, Materials & Continua》 SCIE EI 2024年第1期1095-1113,共19页
Effective data communication is a crucial aspect of the Social Internet of Things(SIoT)and continues to be a significant research focus.This paper proposes a data forwarding algorithm based on Multidimensional Social ... Effective data communication is a crucial aspect of the Social Internet of Things(SIoT)and continues to be a significant research focus.This paper proposes a data forwarding algorithm based on Multidimensional Social Relations(MSRR)in SIoT to solve this problem.The proposed algorithm separates message forwarding into intra-and cross-community forwarding by analyzing interest traits and social connections among nodes.Three new metrics are defined:the intensity of node social relationships,node activity,and community connectivity.Within the community,messages are sent by determining which node is most similar to the sender by weighing the strength of social connections and node activity.When a node performs cross-community forwarding,the message is forwarded to the most reasonable relay community by measuring the node activity and the connection between communities.The proposed algorithm was compared to three existing routing algorithms in simulation experiments.Results indicate that the proposed algorithmsubstantially improves message delivery efficiency while lessening network overhead and enhancing connectivity and coordination in the SIoT context. 展开更多
关键词 SIoT data forwarding social attributes social relations COMMUNITY
下载PDF
基于Social Transformer的井下多人轨迹预测方法
10
作者 马征 杨大山 张天翔 《工矿自动化》 CSCD 北大核心 2024年第5期67-74,共8页
目前煤矿井下人员轨迹预测方法中,Transformer与循环神经网络(RNN)、长短期记忆(LSTM)网络相比,在处理数据时不仅计算量小,同时还有效解决了梯度消失导致的长时依赖问题。但当环境中涉及多人同时运动时,Transformer对于场景中所有人员... 目前煤矿井下人员轨迹预测方法中,Transformer与循环神经网络(RNN)、长短期记忆(LSTM)网络相比,在处理数据时不仅计算量小,同时还有效解决了梯度消失导致的长时依赖问题。但当环境中涉及多人同时运动时,Transformer对于场景中所有人员未来轨迹的预测会出现较大偏差。并且目前在井下多人轨迹预测领域尚未出现一种同时采用Transformer并考虑个体之间相互影响的模型。针对上述问题,提出一种基于Social Transformer的井下多人轨迹预测方法。首先对井下每一个人员独立建模,获取人员历史轨迹信息,通过Transformer编码器进行特征提取,接着由全连接层对特征进行表示,然后通过基于图卷积的交互层相互连接,该交互层允许空间上接近的网络彼此共享信息,计算预测对象在受到周围邻居影响时对周围邻居分配的注意力,从而提取其邻居的运动模式,继而更新特征矩阵,最后新的特征矩阵由Transformer解码器进行解码,输出对于未来时刻的人员位置信息预测。实验结果表明,Social Transformer的平均位移误差相较于Transformer降低了45.8%,且与其他主流轨迹预测方法LSTM,S−GAN,Trajectron++和Social−STGCNN相比分别降低了67.1%,35.9%,30.1%和10.9%,有效克服了煤矿井下多人场景中由于人员间互相影响导致预测轨迹失准的问题,提升了预测精度。 展开更多
关键词 电子围栏 井下多人轨迹预测 TRANSFORMER 交互编码 social Transformer
下载PDF
The Role of AI in Cyber Security: Safeguarding Digital Identity
11
作者 Mohammad Binhammad Shaikha Alqaydi +1 位作者 Azzam Othman Laila Hatim Abuljadayel 《Journal of Information Security》 2024年第2期245-278,共34页
This article signals the use of Artificial Intelligence (AI) in information security where its merits, downsides as well as unanticipated negative outcomes are noted. It considers AI based models that can strengthen o... This article signals the use of Artificial Intelligence (AI) in information security where its merits, downsides as well as unanticipated negative outcomes are noted. It considers AI based models that can strengthen or undermine infrastructural functions and organize the networks. In addition, the essay delves into AI’s role in Cyber security software development and the need for AI-resilient strategies that could anticipate and thwart AI-created vulnerabilities. The document also touched on the socioeconomic ramifications of the emergence of AI in Cyber security as well. Looking into AI and security literature, the report outlines benefits including made threat detection precision, extended security ops efficiency, and preventive security tasks. At the same time, it emphasizes the positive side of AI, but it also shows potential limitations such as data bias, lack of interpretability, ethical concerns, and security flaws. The work similarly focuses on the characterized of misuse and sophisticated cyberattacks. The research suggests ways to diminish AI-generating maleficence which comprise ethical AI development, robust safety measures and constant audits and updates. With regard to the AI application in Cyber security, there are both pros and cons in terms of socio-economic issues, for example, job displacement, economic growth and the change in the required workforce skills. 展开更多
关键词 Artificial Intelligence Cyber Attack Cyber security Real-Time Mitigation social Media security AI-Driven Threat Intelligence
下载PDF
Enhancing Cybersecurity Competency in the Kingdom of Saudi Arabia:A Fuzzy Decision-Making Approach
12
作者 Wajdi Alhakami 《Computers, Materials & Continua》 SCIE EI 2024年第5期3211-3237,共27页
The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual user... The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare. 展开更多
关键词 Cyber security fuzzy DMTAEL security policy cyber crime MCDM
下载PDF
Predicting Users’ Latent Suicidal Risk in Social Media: An Ensemble Model Based on Social Network Relationships
13
作者 Xiuyang Meng Chunling Wang +3 位作者 Jingran Yang Mairui Li Yue Zhang Luo Wang 《Computers, Materials & Continua》 SCIE EI 2024年第6期4259-4281,共23页
Suicide has become a critical concern,necessitating the development of effective preventative strategies.Social media platforms offer a valuable resource for identifying signs of suicidal ideation.Despite progress in ... Suicide has become a critical concern,necessitating the development of effective preventative strategies.Social media platforms offer a valuable resource for identifying signs of suicidal ideation.Despite progress in detecting suicidal ideation on social media,accurately identifying individuals who express suicidal thoughts less openly or infrequently poses a significant challenge.To tackle this,we have developed a dataset focused on Chinese suicide narratives from Weibo’s Tree Hole feature and introduced an ensemble model named Text Convolutional Neural Network based on Social Network relationships(TCNN-SN).This model enhances predictive performance by leveraging social network relationship features and applying correction factors within a weighted linear fusion framework.It is specifically designed to identify key individuals who can help uncover hidden suicidal users and clusters.Our model,assessed using the bespoke dataset and benchmarked against alternative classification approaches,demonstrates superior accuracy,F1-score and AUC metrics,achieving 88.57%,88.75%and 94.25%,respectively,outperforming traditional TextCNN models by 12.18%,10.84%and 10.85%.We assert that our methodology offers a significant advancement in the predictive identification of individuals at risk,thereby contributing to the prevention and reduction of suicide incidences. 展开更多
关键词 Suicide risk prediction social media social network relationships Weibo Tree Hole deep learning
下载PDF
Social prescribing in the metaverse:a new frontier for primary care practice
14
作者 Arunpirasath Nadarasa 《Global Health Journal》 2024年第1期32-35,共4页
The advent of immersive technologies such as the metaverse,extended reality,artificial intelligence,and blockchain offers novel possibilities to transform healthcare services.These innovations coincide with clinicians... The advent of immersive technologies such as the metaverse,extended reality,artificial intelligence,and blockchain offers novel possibilities to transform healthcare services.These innovations coincide with clinicians'aspirations to deliver more comprehensive,patient-centered care tailored to individuals singular needs and preferences.Integration of these emerging tools may confer opportunities for providers to engage patients through new modalities and expand their role.However,responsible implementation necessitates deliberation of ethical implications and steadfast adherence to foundational principles of compassion and interpersonal connection underpinning the profession.While the metaverse introduces new channels for social prescribing,this perspective advocates that its ultimate purpose should be strengthening,not supplanting,human relationships.We propose an ethical framework centered on respect for patients'dignity to guide integration of metaverse platforms into medical practice.This framework serves both to harness their potential benefits and mitigate risks of dehumanization or uncompassionate care.Our analysis maps the developing topology of metaverse-enabled care while upholding moral imperatives for medicine to promote healing relationships and human flourishing. 展开更多
关键词 social prescribing Metaverse Decentralized social prescribing Primarycare
下载PDF
A Practical Regular LDPC Coded Scheme for Physical-Layer Information Security
15
作者 Du Junyi 《China Communications》 SCIE CSCD 2024年第5期190-201,共12页
In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured L... In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes. 展开更多
关键词 extrinsic information transfer function physical layer scheme secure open channel security gap
下载PDF
Information Security in the Cloud: Emerging Trends and Challenges
16
作者 Keerthana Chitreddy Andrew Mikhl Anthony +1 位作者 Chinna Manikanta Bandaru Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第5期69-80,共12页
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering... This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective. 展开更多
关键词 Cloud Computing Information security Cloud Infrastructure Offerings Cloud Migration security Measures Data Breaches Cloud Service Providers CYBERsecurity Cloud security Case Studies Cloud Threat Landscape Data Encryption COMPLIANCE Cloud security Tools
下载PDF
Social Robot Detection Method with Improved Graph Neural Networks
17
作者 Zhenhua Yu Liangxue Bai +1 位作者 Ou Ye Xuya Cong 《Computers, Materials & Continua》 SCIE EI 2024年第2期1773-1795,共23页
Social robot accounts controlled by artificial intelligence or humans are active in social networks,bringing negative impacts to network security and social life.Existing social robot detection methods based on graph ... Social robot accounts controlled by artificial intelligence or humans are active in social networks,bringing negative impacts to network security and social life.Existing social robot detection methods based on graph neural networks suffer from the problem of many social network nodes and complex relationships,which makes it difficult to accurately describe the difference between the topological relations of nodes,resulting in low detection accuracy of social robots.This paper proposes a social robot detection method with the use of an improved neural network.First,social relationship subgraphs are constructed by leveraging the user’s social network to disentangle intricate social relationships effectively.Then,a linear modulated graph attention residual network model is devised to extract the node and network topology features of the social relation subgraph,thereby generating comprehensive social relation subgraph features,and the feature-wise linear modulation module of the model can better learn the differences between the nodes.Next,user text content and behavioral gene sequences are extracted to construct social behavioral features combined with the social relationship subgraph features.Finally,social robots can be more accurately identified by combining user behavioral and relationship features.By carrying out experimental studies based on the publicly available datasets TwiBot-20 and Cresci-15,the suggested method’s detection accuracies can achieve 86.73%and 97.86%,respectively.Compared with the existing mainstream approaches,the accuracy of the proposed method is 2.2%and 1.35%higher on the two datasets.The results show that the method proposed in this paper can effectively detect social robots and maintain a healthy ecological environment of social networks. 展开更多
关键词 social robot detection social relationship subgraph graph attention network feature linear modulation behavioral gene sequences
下载PDF
The Role of Plantain in Promoting Food Security: A Review
18
作者 Doreen Dedo Adi 《Food and Nutrition Sciences》 CAS 2024年第5期313-335,共23页
Plantain is a food security crop of significant nutritional value in the global south. Yet there are significant post-harvest losses, especially at the senescent stage. This review seeks to give a general overview of ... Plantain is a food security crop of significant nutritional value in the global south. Yet there are significant post-harvest losses, especially at the senescent stage. This review seeks to give a general overview of the crop, its nutritional significance and the technologies that can be adopted to enhance its utilisation at its senescent stage. In West Africa, plantains are eaten at all ripening stages, yet processing is limited to the unripe and semi-ripe. Adoptable technologies such as foam-mat drying will enhance its utilisation in indigenous meals and other food applications. This review provides useful insight to optimize the use of plantain to prevent food waste. 展开更多
关键词 Food security PLANTAIN Foam-Mat Drying RIPENING
下载PDF
Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis
19
作者 Dahyeon Kim Namgi Kim Junho Ahn 《Computers, Materials & Continua》 SCIE EI 2024年第3期3867-3889,共23页
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world sof... This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world software.The existing analysis of software security vulnerabilities often focuses on specific features or modules.This partial and arbitrary analysis of the security vulnerabilities makes it challenging to comprehend the overall security vulnerabilities of the software.The key novelty lies in overcoming the constraints of partial approaches.The proposed framework utilizes data from various sources to create a comprehensive functionality profile,facilitating the derivation of real-world security guidelines.Security guidelines are dynamically generated by associating functional security vulnerabilities with the latest Common Vulnerabilities and Exposure(CVE)and Common Vulnerability Scoring System(CVSS)scores,resulting in automated guidelines tailored to each product.These guidelines are not only practical but also applicable in real-world software,allowing for prioritized security responses.The proposed framework is applied to virtual private network(VPN)software,wherein a validated Level 2 data flow diagram is generated using the Spoofing,Tampering,Repudiation,Information Disclosure,Denial of Service,and Elevation of privilege(STRIDE)technique with references to various papers and examples from related software.The analysis resulted in the identification of a total of 121 vulnerabilities.The successful implementation and validation demonstrate the framework’s efficacy in generating customized guidelines for entire systems,subsystems,and selected modules. 展开更多
关键词 FRAMEWORK AUTOMATION vulnerability analysis security GUIDELINES
下载PDF
Exploring the Reasons for Selfie-Taking and Selfie-Posting on Social Media with Its Effect on Psychological and Social Lives:A Study among Indian Youths
20
作者 Divya P.Vijayan Tokani Ghuhato +3 位作者 Eslavath Rajkumar Allen Joshua George Romate John John Abraham 《International Journal of Mental Health Promotion》 2024年第5期389-398,共10页
‘Selfie’taking was introduced to the common people by smartphones and has become a common practice across the globe in no time.With technological advancement and the popularity of smartphones,selfie-taking has grown... ‘Selfie’taking was introduced to the common people by smartphones and has become a common practice across the globe in no time.With technological advancement and the popularity of smartphones,selfie-taking has grown rapidly within a short time.In light of the new trend set by the generation,this study aimed to explore reasons for selfie-taking and selfie-posting on social media and their effects on the social and psychological lives of young adults.A purposive sampling method was adopted to select 20 Indian citizens,between 18 and 24 years.The data were collected through semi-structured interviews and analysed using thematic analysis.Selfie-taking and posting on social media give positive feelings,and it acts as a mood modifier dependent mostly on the favourability and feedback about the post which in turn affects emotions and self-satisfaction. 展开更多
关键词 Selfie social media social networking sites obsessive selfie-taking Indian youth
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部