期刊文献+
共找到273,114篇文章
< 1 2 250 >
每页显示 20 50 100
Congestion Control Algorithms for the Internet-A Secondary Publication
1
作者 Satoshi Utsumi 《Journal of Electronic Research and Application》 2024年第2期33-48,共16页
In the last five years,there has been a V-shaped recovery in the number of papers on congestion control algorithms on the Internet.In this paper,congestion problems on the Internet are discussed,such as congestion col... In the last five years,there has been a V-shaped recovery in the number of papers on congestion control algorithms on the Internet.In this paper,congestion problems on the Internet are discussed,such as congestion collapse and bufferbloat from the perspective of the necessity of congestion control algorithms.The typical congestion control algorithms are introduced,and the research areas and methods of congestion control algorithms are described.Recent research trends and future prospects of congestion control algorithms are also presented. 展开更多
关键词 TCP Congestion control algorithm CONGESTION internet
下载PDF
The impact of Internet access on household dietary quality:Evidence from rural China 被引量:1
2
作者 Yi Cui Qiran Zhao +1 位作者 Thomas Glauben Wei Si 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第2期374-383,共10页
Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access sig... Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access significantly impacts agricultural production and improves smallholder farmers’income.Beyond these,the Internet can affect other dimensions of social welfare.However,research about the impact of Internet access on dietary quality in rural China remains scarce.This study utilizes multi-period panel data from Fixed Observation Point in rural China from 2009 to 2015 to estimate the impact of Internet access on dietary quality and food consumption of rural households and conducts a causal analysis.Regression models with time and household fixed effects allow robust estimation while reducing potential issues of unobserved heterogeneity.The estimates show that Internet access has significantly increased rural household dietary quality(measured by the Chinese Diet Balance Index).Further research finds that Internet access has increased the consumption of animal products,such as aquatic and dairy products.We also examine the underlying mechanisms.Internet access improves dietary quality and food consumption mainly through increasing household income and food expenditure.These results encourage the promotion of Internet access as a valuable tool for nutritional improvements,especially in rural areas. 展开更多
关键词 dietary quality fixed effect model internet access rural China
下载PDF
Low-Cost Federated Broad Learning for Privacy-Preserved Knowledge Sharing in the RIS-Aided Internet of Vehicles 被引量:1
3
作者 Xiaoming Yuan Jiahui Chen +4 位作者 Ning Zhang Qiang(John)Ye Changle Li Chunsheng Zhu Xuemin Sherman Shen 《Engineering》 SCIE EI CAS CSCD 2024年第2期178-189,共12页
High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency... High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV. 展开更多
关键词 Knowledge sharing internet of Vehicles Federated learning Broad learning Reconfigurable intelligent surfaces Resource allocation
下载PDF
Discreet investors exert greater influence on cooperation in the public goods game
4
作者 康洪炜 金展瑶 +4 位作者 李明远 旺咩 孙兴平 沈勇 陈清毅 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期170-178,共9页
This paper studies the evolutionary process of cooperative behavior in a public goods game model with heterogeneous investment strategies in square lattices.In the proposed model,players are divided into defectors,coo... This paper studies the evolutionary process of cooperative behavior in a public goods game model with heterogeneous investment strategies in square lattices.In the proposed model,players are divided into defectors,cooperators and discreet investors.Among these,defectors do not participate in investing,discreet investors make heterogeneous investments based on the investment behavior and cooperation value of their neighbors,and cooperators invest equally in each neighbor.In real life,heterogeneous investment is often accompanied by time or economic costs.The discreet investors in this paper pay a certain price to obtain their neighbors'investment behavior and cooperation value,which quantifies the time and economic costs of the heterogeneous investment process.The results of Monte Carlo simulation experiments in this study show that discreet investors can effectively resist the invasion of the defectors,form a stable cooperative group and expand the cooperative advantage in evolution.However,when discreet investors pay too high a price,they lose their strategic advantage.The results in this paper help us understand the role of heterogeneous investment in promoting and maintaining human social cooperation. 展开更多
关键词 public goods game heterogeneous investment discreet investors COOPERATION
下载PDF
ResNeSt-biGRU: An Intrusion Detection Model Based on Internet of Things
5
作者 Yan Xiang Daofeng Li +2 位作者 Xinyi Meng Chengfeng Dong Guanglin Qin 《Computers, Materials & Continua》 SCIE EI 2024年第4期1005-1023,共19页
The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasingdemands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device has... The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasingdemands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device hascaught the attention of cyber hackers, as it provides them with expanded avenues to access valuable data. Thishas resulted in a myriad of security challenges, including information leakage, malware propagation, and financialloss, among others. Consequently, developing an intrusion detection system to identify both active and potentialintrusion traffic in IoT networks is of paramount importance. In this paper, we propose ResNeSt-biGRU, a practicalintrusion detection model that combines the strengths of ResNeSt, a variant of Residual Neural Network, andbidirectionalGated RecurrentUnitNetwork (biGRU).Our ResNeSt-biGRUframework diverges fromconventionalintrusion detection systems (IDS) by employing this dual-layeredmechanism that exploits the temporal continuityand spatial feature within network data streams, a methodological innovation that enhances detection accuracy.In conjunction with this, we introduce the PreIoT dataset, a compilation of prevalent IoT network behaviors, totrain and evaluate IDSmodels with a focus on identifying potential intrusion traffics. The effectiveness of proposedscheme is demonstrated through testing, wherein it achieved an average accuracy of 99.90% on theN-BaIoT datasetas well as on the PreIoT dataset and 94.45% on UNSW-NB15 dataset. The outcomes of this research reveal thepotential of ResNeSt-biGRU to bolster security measures, diminish intrusion-related vulnerabilities, and preservethe overall security of IoT ecosystems. 展开更多
关键词 internet of Things cyberattack intrusion detection internet security
下载PDF
Dynamic analysis of major public health emergency transmission considering the dual-layer coupling of community–resident complex networks
6
作者 杨鹏 范如国 +1 位作者 王奕博 张应青 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期158-169,共12页
We construct a dual-layer coupled complex network of communities and residents to represent the interconnected risk transmission network between communities and the disease transmission network among residents. It cha... We construct a dual-layer coupled complex network of communities and residents to represent the interconnected risk transmission network between communities and the disease transmission network among residents. It characterizes the process of infectious disease transmission among residents between communities through the SE2IHR model considering two types of infectors. By depicting a more fine-grained social structure and combining further simulation experiments, the study validates the crucial role of various prevention and control measures implemented by communities as primary executors in controlling the epidemic. Research shows that the geographical boundaries of communities and the social interaction patterns of residents have a significant impact on the spread of the epidemic, where early detection, isolation and treatment strategies at community level are essential for controlling the spread of the epidemic. In addition, the study explores the collaborative governance model and institutional advantages of communities and residents in epidemic prevention and control. 展开更多
关键词 propagation dynamics complex networks public health events community structure
下载PDF
Deep Transfer Learning Techniques in Intrusion Detection System-Internet of Vehicles: A State-of-the-Art Review
7
作者 Wufei Wu Javad Hassannataj Joloudari +8 位作者 Senthil Kumar Jagatheesaperumal Kandala N.V.P.SRajesh Silvia Gaftandzhieva Sadiq Hussain Rahimullah Rabih Najibullah Haqjoo Mobeen Nazar Hamed Vahdat-Nejad Rositsa Doneva 《Computers, Materials & Continua》 SCIE EI 2024年第8期2785-2813,共29页
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accide... The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks. 展开更多
关键词 Cyber-attacks internet of things internet of vehicles intrusion detection system
下载PDF
A comparative study on characteristics of retracted publications across different open access levels
8
作者 Er-Te Zheng Hui-Zhen Fu 《Journal of Data and Information Science》 CSCD 2024年第2期22-40,共19页
Purpose:Recently,global science has shown an increasing open trend,however,the characteristics of research integrity of open access(OA)publications have rarely been studied.The aim of this study is to compare the char... Purpose:Recently,global science has shown an increasing open trend,however,the characteristics of research integrity of open access(OA)publications have rarely been studied.The aim of this study is to compare the characteristics of retracted articles across different OA levels and discover whether OA level influences the characteristics of retracted articles.Design/methodology/approach:The research conducted an analysis of 6,005 retracted publications between 2001 and 2020 from the Web of Science and Retraction Watch databases.These publications were categorized based on their OA levels,including Gold OA,Green OA,and non-OA.The study explored retraction rates,time lags and reasons within these categories.Findings:The findings of this research revealed distinct patterns in retraction rates among different OA levels.Publications with Gold OA demonstrated the highest retraction rate,followed by Green OA and non-OA.A comparison of retraction reasons between Gold OA and non-OA categories indicated similar proportions,while Green OA exhibited a higher proportion due to falsification and manipulation issues,along with a lower occurrence of plagiarism and authorship issues.The retraction time lag was shortest for Gold OA,followed by non-OA,and longest for Green OA.The prolonged retraction time for Green OA could be attributed to an atypical distribution of retraction reasons.A comparative study on characteristics of retracted publications across different open access levels Research limitations:There is no exploration of a wider range of OA levels,such as Hybrid OA and Bronze OA.Practical implications:The outcomes of this study suggest the need for increased attention to research integrity within the OA publications.The occurrences offalsification,manipulation,and ethical concerns within Green OA publications warrant attention from the scientific community.Originality/value:This study contributes to the understanding of research integrity in the realm of OA publications,shedding light on retraction patterns and reasons across different OA levels. 展开更多
关键词 Open access Retracted publications Reasons for retraction Retraction time lag BIBLIOMETRICS
下载PDF
Securing the Internet of Health Things with Certificateless Anonymous Authentication Scheme
9
作者 Nisreen Innab 《Computers, Materials & Continua》 SCIE EI 2024年第8期2237-2258,共22页
Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible t... Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes. 展开更多
关键词 internet of things internet of health things security authentication hyperelliptic curve cryptography
下载PDF
Call for Papers——Feature Topic Vol.22,No.2,2025 Efficient Cooperative Transmission over Satellite Internet for 6G
10
《China Communications》 SCIE CSCD 2024年第1期I0006-I0006,共1页
Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enh... Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enhance the range of network information services accessible to humans.With the transition of terrestrial mobile communication networks from the 5G era,which provides access to information anywhere,to the 6G era,which seeks to connect everything,the construction of satellite Internet,which promises a"network reaching everywhere and service is ubiquitous",has become the consensus of the industry's development and the focus of global scientific and technological innovation. 展开更多
关键词 internet SERVICES service
下载PDF
Structured Multi-Head Attention Stock Index Prediction Method Based Adaptive Public Opinion Sentiment Vector
11
作者 Cheng Zhao Zhe Peng +2 位作者 Xuefeng Lan Yuefeng Cen Zuxin Wang 《Computers, Materials & Continua》 SCIE EI 2024年第1期1503-1523,共21页
The present study examines the impact of short-term public opinion sentiment on the secondary market,with a focus on the potential for such sentiment to cause dramatic stock price fluctuations and increase investment ... The present study examines the impact of short-term public opinion sentiment on the secondary market,with a focus on the potential for such sentiment to cause dramatic stock price fluctuations and increase investment risk.The quantification of investment sentiment indicators and the persistent analysis of their impact has been a complex and significant area of research.In this paper,a structured multi-head attention stock index prediction method based adaptive public opinion sentiment vector is proposed.The proposedmethod utilizes an innovative approach to transform numerous investor comments on social platforms over time into public opinion sentiment vectors expressing complex sentiments.It then analyzes the continuous impact of these vectors on the market through the use of aggregating techniques and public opinion data via a structured multi-head attention mechanism.The experimental results demonstrate that the public opinion sentiment vector can provide more comprehensive feedback on market sentiment than traditional sentiment polarity analysis.Furthermore,the multi-head attention mechanism is shown to improve prediction accuracy through attention convergence on each type of input information separately.Themean absolute percentage error(MAPE)of the proposedmethod is 0.463%,a reduction of 0.294% compared to the benchmark attention algorithm.Additionally,the market backtesting results indicate that the return was 24.560%,an improvement of 8.202% compared to the benchmark algorithm.These results suggest that themarket trading strategy based on thismethod has the potential to improve trading profits. 展开更多
关键词 public opinion sentiment structured multi-head attention stock index prediction deep learning
下载PDF
Conceptual Blending and Meme Humor on the Internet:The Example of COVID-19 Publicity Posters in Chinese Microblogging
12
作者 WANG Lei 《Sino-US English Teaching》 2023年第6期217-226,共10页
Internet memes,as multimodal cultural products disseminated through the Internet,usually take the form of short videos or images that express humor or satire.The creation and dissemination of humor in memes are both c... Internet memes,as multimodal cultural products disseminated through the Internet,usually take the form of short videos or images that express humor or satire.The creation and dissemination of humor in memes are both creative and complex,and the successful perception of meme humor reflects humans’universal thinking capacity.Based on the theoretical framework of conceptual blending,this paper selects a set of COVID-19 publicity posters from the official Weibo account of China Guangzhou Fabu(Guangzhou Internet Information Office),analyses the multi-level structure of Internet memes,and explores the dynamic cognitive process in the interpretation of humorous memes to reveal people’s ability to make simultaneous analogies and integration between elements in different mental spaces. 展开更多
关键词 conceptual blending internet meme HUMOR COVID-19 prevention and control
下载PDF
Ancylostoma ceylanicum and other zoonotic canine hookworms:neglected public and animal health risks in the Asia-Pacific region
13
作者 Jan Clyden B.Tenorio lan Kim B.Tabios +4 位作者 Tawin Inpankaew Adrian P.Ybanez Saruda Tiwananthagorn Sirikachorn Tangkawattana Sutas Suttiprapa 《Animal Diseases》 CAS 2024年第1期59-74,共16页
Zoonotic hookworm infections remain a significant public health problem,causing nearly 500 milion cases globally and approximately four million disability-adjusted life years lost annually.More than one-fth of these c... Zoonotic hookworm infections remain a significant public health problem,causing nearly 500 milion cases globally and approximately four million disability-adjusted life years lost annually.More than one-fth of these cases are attrib-uted to Ancylostoma ceylanicum,an emerging zoonotic health issue in the Asia-Pacific region.This review presents key research gaps regarding the epidemiology,diagnosis,control,prevention and elimination of A.ceylanicum and other canine zoonotic hookworms as neglected health threats.A.ceylanicum is the second most prevalent human hook-worm in the region;it is the most common hookworm among dogs and cats-reservoirs of zoonotic infections.Previous population genetic and phylogenetic analyses revealed that A.ceylanicum has three possible transmis-sion dynamics:zoonotic,animal-only,and human-only pathways.The actual burden of zoonotic ancylostomiasis in most endemic countries remains unknown due to the use of parasitological techniques(e.g.,Kato-Katz thick smear and floatation techniques)that have reduced diagnostic performance and do not allow accurate species identifica-tion in helminth surveys.The emergence of benzimidazole resistance in soil-transmitted helminths(STHs),includ-ing hookworms,is a concern due to the protracted implementation of mass drug administration(MDA).Resistance is conferred by single nucleotide polymorphisms(SNPs)that occur in theβ-tubulin isotype 1 gene.These mutations have been reported in drug-resistant A.caninum but have not been found in A.ceylanicum in the field.A.ceylanicum remains understudied in the Asia-Pacific region.The zoonotic nature of the parasite warrants investigation of its occur-rence in human and animal reservoir hosts to understand the dynamics of zoonotic transmission in different endemic foci.The detection of benzimidazole resistance-associated SNPs in zoonotic hookworms from Asia-Pacific countries has yet to be thoroughly explored.Considering the high level of hookworm endemicity in the region,the circulation of resistant isolates between humans and animals potentially presents a significant One Health threat that can under-mine current MDA and proposed animal deworming-based control efforts. 展开更多
关键词 Soil-transmitted helminths Neglected tropical diseases Mass drug administration DEWORMING Veterinary public health
下载PDF
A Blind Batch Encryption and Public Ledger-Based Protocol for Sharing Sensitive Data
14
作者 Zhiwei Wang Nianhua Yang +2 位作者 Qingqing Chen Wei Shen Zhiying Zhang 《China Communications》 SCIE CSCD 2024年第1期310-322,共13页
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all... For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks. 展开更多
关键词 blind batch encryption data sharing onetime adaptive access public ledger security and privacy
下载PDF
Use of cognitive-behavioral career coaching to reduce work anxiety and depression in public employees
15
作者 Mkpoikanke Sunday Otu Maximus Monaheng Sefotho 《World Journal of Clinical Cases》 SCIE 2024年第2期322-334,共13页
BACKGROUND Public employees worldwide are increasingly concerned about work anxiety and depression.Cognitive-behavioral career coaching has emerged as a promising strategy for addressing these mental health disorders,... BACKGROUND Public employees worldwide are increasingly concerned about work anxiety and depression.Cognitive-behavioral career coaching has emerged as a promising strategy for addressing these mental health disorders,which can negatively impact on a person's overall well-being and performance.AIM To examine whether cognitive-behavioral career coaching reduces work anxiety and depression among Nigerian public employees.METHODS A total of 120 public employees(n=60)suffering from severe anxiety and depression were randomly assigned to the treatment or control groups in this study.Cognitive behavioral coaching was provided twice a week to those in the treatment group,whereas no treatment was given to those in the control group.As part of the study,the Hamilton Anxiety Rating Scales and Beck Depression Inventory were used to collect data.RESULTS Analysis of covariance of the data from participants indicates a significant effect of cognitive-behavioral career coaching on work anxiety and depression.CONCLUSION Insights into the underlying mechanisms by which cognitive behavior career coaching exerts its effects have been gained from this study.Also,the study has gathered valuable data that can inform future practice and guide the development of strategies for supporting mental health at work. 展开更多
关键词 Cognitive-behavioral career coaching Work anxiety Depression public employees North Central Nigeria
下载PDF
How to enhance agricultural plastic waste management in China?Insights from public participation
16
作者 Aibo Hao Thomas Dogot Changbin Yin 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第6期2127-2143,共17页
Agricultural plastics play a pivotal role in agricultural production.However,due to expensive costs,agricultural plastic waste management(APWM)encounters a vast funding gap.As one of the crucial stakeholders,the publi... Agricultural plastics play a pivotal role in agricultural production.However,due to expensive costs,agricultural plastic waste management(APWM)encounters a vast funding gap.As one of the crucial stakeholders,the public deserves to make appropriate efforts for APWM.Accordingly,identifying whether the public is willing to pay for APWM and clarifying the decisions’driving pathways to explore initiatives for promoting their payment intentions are essential to address the dilemma confronting APWM.To this end,by applying the extended theory of planned behavior(TPB),the study conducted an empirical analysis based on 1,288 residents from four provinces(autonomous regions)of northern China.Results illustrate that:1)respondents hold generally positive and relatively strong payment willingness towards APWM;2)respondents’attitude(AT),subjective norm(SN),and perceived behavioral control(PBC)are positively correlated with their payment intentions(INT);3)environmental cognition(EC)and environmental emotion(EE)positively moderate the relationships between AT and INT,and between SN and INT,posing significant indirect impacts on INT.The study’s implications extend to informing government policies,suggesting that multi-entity cooperation,specifically public payment for APWM,can enhance agricultural non-point waste management. 展开更多
关键词 agricultural plastic waste extended theory of planned behavior public payment environmental cognition environmental emotion
下载PDF
The coordinated evolution of ecological environment,public service,and tourism economy along the Silk Road Economic Belt,using the Dual-Carbon Targets
17
作者 Shuo Yang Wei Guo +1 位作者 Tianjun Xu Tongtong Liu 《Chinese Journal of Population,Resources and Environment》 2024年第1期34-47,共14页
Carbon peak and carbon neutrality(dual-carbon)are important targets for the international response to climate change.The Silk Road Economic Belt is a strategic resource region and is important for future ecological en... Carbon peak and carbon neutrality(dual-carbon)are important targets for the international response to climate change.The Silk Road Economic Belt is a strategic resource region and is important for future ecological environment and tourism development.Based on the“dual-carbon”targets,the Single index quantification,Multiple index synthesis,and Poly-criteria integration evaluation model were used in this study to measure the coordinated development index of the ecological environment,public service,and tourism economy along the Silk Road Economic Belt and to analyze its spatial and temporal evolution.Further,it explores the dynamic evolution and development trend of the three systems using the Kernel Density and Grey Markov Prediction Model.The results show that the coordinated development index along this region needs to be improved during the study period.Furthermore,the coordinated development index of the Southwest region is relatively higher than that of the Northwest region.From the development trend of the three systems,all of them develop in a stable manner;however,the tourism economy system is easily affected by external disturbances.The coordinated development index of the three systems changes dynamically and tends to be in a good state of coordination.There is a certain spatial and temporal heterogeneity.The gravity center of the coordinated development index has been in the Southwest region.During the forecast period,the coordinated development index along this region will improve significantly,while insufficient and unbalanced development will continue. 展开更多
关键词 Dual-carbon Ecological environment public services Tourist economy Silk Road Economic Belt
下载PDF
Comprehensive Analysis of Cancer Incidence and Mortality Trends in Costa Rica: Implications for Public Health
18
作者 Guzman Percy 《Journal of Cancer Therapy》 2024年第5期219-221,共3页
This commentary delves into the evolving landscape of cancer incidence and mortality in Costa Rica, presenting a comprehensive analysis of the data. Key findings reveal a concerning upward trajectory in cancer inciden... This commentary delves into the evolving landscape of cancer incidence and mortality in Costa Rica, presenting a comprehensive analysis of the data. Key findings reveal a concerning upward trajectory in cancer incidence rates, placing Costa Rica at the forefront within Central America. While prostate cancer and breast cancer dominate, disparities emerge when scrutinizing gender-specific trends. Notably, stomach and cervical cancers show declines, potentially attributed to targeted interventions. However, colorectal and liver cancers witness mortality increases, necessitating strategic responses. Geographical disparities persist across provinces, highlighting the need for equitable healthcare access. In conclusion, this commentary underscores the urgency of addressing the burgeoning cancer burden in Costa Rica, calling for evidence-based interventions and collaborative efforts on a global scale. 展开更多
关键词 Cancer Incidence Cancer Mortality Costa Rica Cancer Trends Risk Factors Early Detection public Health
下载PDF
Dedicated to Public Welfare and Constantly Giving Back to Society
19
作者 Alice Song 《China's Foreign Trade》 2024年第3期15-18,共4页
As the Chairman of the Hong Kong Doyen’s Club Ltd.,Sunny Wu has devoted himself to public welfare undertakings through practical actions over the years,and his down-to-earth ideas contain strong patriotism and a sinc... As the Chairman of the Hong Kong Doyen’s Club Ltd.,Sunny Wu has devoted himself to public welfare undertakings through practical actions over the years,and his down-to-earth ideas contain strong patriotism and a sincere love for Hong Kong. 展开更多
关键词 devoted public Chairman
下载PDF
Internet of Things Authentication Protocols: Comparative Study
20
作者 Souhayla Dargaoui Mourade Azrour +3 位作者 Ahmad ElAllaoui Azidine Guezzaz Abdulatif Alabdulatif Abdullah Alnajim 《Computers, Materials & Continua》 SCIE EI 2024年第4期65-91,共27页
Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is ... Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still thebiggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services providedby an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures,data, and devices. Authentication, as the first line of defense against security threats, becomes the priority ofeveryone. It can either grant or deny users access to resources according to their legitimacy. As a result, studyingand researching authentication issues within IoT is extremely important. As a result, studying and researchingauthentication issues within IoT is extremely important. This article presents a comparative study of recent researchin IoT security;it provides an analysis of recent authentication protocols from2019 to 2023 that cover several areaswithin IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security researchsummary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. Itillustrates that the resistance of protocols against attacks, and their computational and communication cost arelinked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemesand provides some future research directions. 展开更多
关键词 ATTACKS CRYPTOGRAPHY internet of Things SECURITY AUTHENTICATION
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部