In the last five years,there has been a V-shaped recovery in the number of papers on congestion control algorithms on the Internet.In this paper,congestion problems on the Internet are discussed,such as congestion col...In the last five years,there has been a V-shaped recovery in the number of papers on congestion control algorithms on the Internet.In this paper,congestion problems on the Internet are discussed,such as congestion collapse and bufferbloat from the perspective of the necessity of congestion control algorithms.The typical congestion control algorithms are introduced,and the research areas and methods of congestion control algorithms are described.Recent research trends and future prospects of congestion control algorithms are also presented.展开更多
Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access sig...Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access significantly impacts agricultural production and improves smallholder farmers’income.Beyond these,the Internet can affect other dimensions of social welfare.However,research about the impact of Internet access on dietary quality in rural China remains scarce.This study utilizes multi-period panel data from Fixed Observation Point in rural China from 2009 to 2015 to estimate the impact of Internet access on dietary quality and food consumption of rural households and conducts a causal analysis.Regression models with time and household fixed effects allow robust estimation while reducing potential issues of unobserved heterogeneity.The estimates show that Internet access has significantly increased rural household dietary quality(measured by the Chinese Diet Balance Index).Further research finds that Internet access has increased the consumption of animal products,such as aquatic and dairy products.We also examine the underlying mechanisms.Internet access improves dietary quality and food consumption mainly through increasing household income and food expenditure.These results encourage the promotion of Internet access as a valuable tool for nutritional improvements,especially in rural areas.展开更多
High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency...High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV.展开更多
This paper studies the evolutionary process of cooperative behavior in a public goods game model with heterogeneous investment strategies in square lattices.In the proposed model,players are divided into defectors,coo...This paper studies the evolutionary process of cooperative behavior in a public goods game model with heterogeneous investment strategies in square lattices.In the proposed model,players are divided into defectors,cooperators and discreet investors.Among these,defectors do not participate in investing,discreet investors make heterogeneous investments based on the investment behavior and cooperation value of their neighbors,and cooperators invest equally in each neighbor.In real life,heterogeneous investment is often accompanied by time or economic costs.The discreet investors in this paper pay a certain price to obtain their neighbors'investment behavior and cooperation value,which quantifies the time and economic costs of the heterogeneous investment process.The results of Monte Carlo simulation experiments in this study show that discreet investors can effectively resist the invasion of the defectors,form a stable cooperative group and expand the cooperative advantage in evolution.However,when discreet investors pay too high a price,they lose their strategic advantage.The results in this paper help us understand the role of heterogeneous investment in promoting and maintaining human social cooperation.展开更多
The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasingdemands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device has...The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasingdemands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device hascaught the attention of cyber hackers, as it provides them with expanded avenues to access valuable data. Thishas resulted in a myriad of security challenges, including information leakage, malware propagation, and financialloss, among others. Consequently, developing an intrusion detection system to identify both active and potentialintrusion traffic in IoT networks is of paramount importance. In this paper, we propose ResNeSt-biGRU, a practicalintrusion detection model that combines the strengths of ResNeSt, a variant of Residual Neural Network, andbidirectionalGated RecurrentUnitNetwork (biGRU).Our ResNeSt-biGRUframework diverges fromconventionalintrusion detection systems (IDS) by employing this dual-layeredmechanism that exploits the temporal continuityand spatial feature within network data streams, a methodological innovation that enhances detection accuracy.In conjunction with this, we introduce the PreIoT dataset, a compilation of prevalent IoT network behaviors, totrain and evaluate IDSmodels with a focus on identifying potential intrusion traffics. The effectiveness of proposedscheme is demonstrated through testing, wherein it achieved an average accuracy of 99.90% on theN-BaIoT datasetas well as on the PreIoT dataset and 94.45% on UNSW-NB15 dataset. The outcomes of this research reveal thepotential of ResNeSt-biGRU to bolster security measures, diminish intrusion-related vulnerabilities, and preservethe overall security of IoT ecosystems.展开更多
We construct a dual-layer coupled complex network of communities and residents to represent the interconnected risk transmission network between communities and the disease transmission network among residents. It cha...We construct a dual-layer coupled complex network of communities and residents to represent the interconnected risk transmission network between communities and the disease transmission network among residents. It characterizes the process of infectious disease transmission among residents between communities through the SE2IHR model considering two types of infectors. By depicting a more fine-grained social structure and combining further simulation experiments, the study validates the crucial role of various prevention and control measures implemented by communities as primary executors in controlling the epidemic. Research shows that the geographical boundaries of communities and the social interaction patterns of residents have a significant impact on the spread of the epidemic, where early detection, isolation and treatment strategies at community level are essential for controlling the spread of the epidemic. In addition, the study explores the collaborative governance model and institutional advantages of communities and residents in epidemic prevention and control.展开更多
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accide...The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks.展开更多
Purpose:Recently,global science has shown an increasing open trend,however,the characteristics of research integrity of open access(OA)publications have rarely been studied.The aim of this study is to compare the char...Purpose:Recently,global science has shown an increasing open trend,however,the characteristics of research integrity of open access(OA)publications have rarely been studied.The aim of this study is to compare the characteristics of retracted articles across different OA levels and discover whether OA level influences the characteristics of retracted articles.Design/methodology/approach:The research conducted an analysis of 6,005 retracted publications between 2001 and 2020 from the Web of Science and Retraction Watch databases.These publications were categorized based on their OA levels,including Gold OA,Green OA,and non-OA.The study explored retraction rates,time lags and reasons within these categories.Findings:The findings of this research revealed distinct patterns in retraction rates among different OA levels.Publications with Gold OA demonstrated the highest retraction rate,followed by Green OA and non-OA.A comparison of retraction reasons between Gold OA and non-OA categories indicated similar proportions,while Green OA exhibited a higher proportion due to falsification and manipulation issues,along with a lower occurrence of plagiarism and authorship issues.The retraction time lag was shortest for Gold OA,followed by non-OA,and longest for Green OA.The prolonged retraction time for Green OA could be attributed to an atypical distribution of retraction reasons.A comparative study on characteristics of retracted publications across different open access levels Research limitations:There is no exploration of a wider range of OA levels,such as Hybrid OA and Bronze OA.Practical implications:The outcomes of this study suggest the need for increased attention to research integrity within the OA publications.The occurrences offalsification,manipulation,and ethical concerns within Green OA publications warrant attention from the scientific community.Originality/value:This study contributes to the understanding of research integrity in the realm of OA publications,shedding light on retraction patterns and reasons across different OA levels.展开更多
Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible t...Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes.展开更多
Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enh...Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enhance the range of network information services accessible to humans.With the transition of terrestrial mobile communication networks from the 5G era,which provides access to information anywhere,to the 6G era,which seeks to connect everything,the construction of satellite Internet,which promises a"network reaching everywhere and service is ubiquitous",has become the consensus of the industry's development and the focus of global scientific and technological innovation.展开更多
The present study examines the impact of short-term public opinion sentiment on the secondary market,with a focus on the potential for such sentiment to cause dramatic stock price fluctuations and increase investment ...The present study examines the impact of short-term public opinion sentiment on the secondary market,with a focus on the potential for such sentiment to cause dramatic stock price fluctuations and increase investment risk.The quantification of investment sentiment indicators and the persistent analysis of their impact has been a complex and significant area of research.In this paper,a structured multi-head attention stock index prediction method based adaptive public opinion sentiment vector is proposed.The proposedmethod utilizes an innovative approach to transform numerous investor comments on social platforms over time into public opinion sentiment vectors expressing complex sentiments.It then analyzes the continuous impact of these vectors on the market through the use of aggregating techniques and public opinion data via a structured multi-head attention mechanism.The experimental results demonstrate that the public opinion sentiment vector can provide more comprehensive feedback on market sentiment than traditional sentiment polarity analysis.Furthermore,the multi-head attention mechanism is shown to improve prediction accuracy through attention convergence on each type of input information separately.Themean absolute percentage error(MAPE)of the proposedmethod is 0.463%,a reduction of 0.294% compared to the benchmark attention algorithm.Additionally,the market backtesting results indicate that the return was 24.560%,an improvement of 8.202% compared to the benchmark algorithm.These results suggest that themarket trading strategy based on thismethod has the potential to improve trading profits.展开更多
Internet memes,as multimodal cultural products disseminated through the Internet,usually take the form of short videos or images that express humor or satire.The creation and dissemination of humor in memes are both c...Internet memes,as multimodal cultural products disseminated through the Internet,usually take the form of short videos or images that express humor or satire.The creation and dissemination of humor in memes are both creative and complex,and the successful perception of meme humor reflects humans’universal thinking capacity.Based on the theoretical framework of conceptual blending,this paper selects a set of COVID-19 publicity posters from the official Weibo account of China Guangzhou Fabu(Guangzhou Internet Information Office),analyses the multi-level structure of Internet memes,and explores the dynamic cognitive process in the interpretation of humorous memes to reveal people’s ability to make simultaneous analogies and integration between elements in different mental spaces.展开更多
Zoonotic hookworm infections remain a significant public health problem,causing nearly 500 milion cases globally and approximately four million disability-adjusted life years lost annually.More than one-fth of these c...Zoonotic hookworm infections remain a significant public health problem,causing nearly 500 milion cases globally and approximately four million disability-adjusted life years lost annually.More than one-fth of these cases are attrib-uted to Ancylostoma ceylanicum,an emerging zoonotic health issue in the Asia-Pacific region.This review presents key research gaps regarding the epidemiology,diagnosis,control,prevention and elimination of A.ceylanicum and other canine zoonotic hookworms as neglected health threats.A.ceylanicum is the second most prevalent human hook-worm in the region;it is the most common hookworm among dogs and cats-reservoirs of zoonotic infections.Previous population genetic and phylogenetic analyses revealed that A.ceylanicum has three possible transmis-sion dynamics:zoonotic,animal-only,and human-only pathways.The actual burden of zoonotic ancylostomiasis in most endemic countries remains unknown due to the use of parasitological techniques(e.g.,Kato-Katz thick smear and floatation techniques)that have reduced diagnostic performance and do not allow accurate species identifica-tion in helminth surveys.The emergence of benzimidazole resistance in soil-transmitted helminths(STHs),includ-ing hookworms,is a concern due to the protracted implementation of mass drug administration(MDA).Resistance is conferred by single nucleotide polymorphisms(SNPs)that occur in theβ-tubulin isotype 1 gene.These mutations have been reported in drug-resistant A.caninum but have not been found in A.ceylanicum in the field.A.ceylanicum remains understudied in the Asia-Pacific region.The zoonotic nature of the parasite warrants investigation of its occur-rence in human and animal reservoir hosts to understand the dynamics of zoonotic transmission in different endemic foci.The detection of benzimidazole resistance-associated SNPs in zoonotic hookworms from Asia-Pacific countries has yet to be thoroughly explored.Considering the high level of hookworm endemicity in the region,the circulation of resistant isolates between humans and animals potentially presents a significant One Health threat that can under-mine current MDA and proposed animal deworming-based control efforts.展开更多
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all...For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks.展开更多
BACKGROUND Public employees worldwide are increasingly concerned about work anxiety and depression.Cognitive-behavioral career coaching has emerged as a promising strategy for addressing these mental health disorders,...BACKGROUND Public employees worldwide are increasingly concerned about work anxiety and depression.Cognitive-behavioral career coaching has emerged as a promising strategy for addressing these mental health disorders,which can negatively impact on a person's overall well-being and performance.AIM To examine whether cognitive-behavioral career coaching reduces work anxiety and depression among Nigerian public employees.METHODS A total of 120 public employees(n=60)suffering from severe anxiety and depression were randomly assigned to the treatment or control groups in this study.Cognitive behavioral coaching was provided twice a week to those in the treatment group,whereas no treatment was given to those in the control group.As part of the study,the Hamilton Anxiety Rating Scales and Beck Depression Inventory were used to collect data.RESULTS Analysis of covariance of the data from participants indicates a significant effect of cognitive-behavioral career coaching on work anxiety and depression.CONCLUSION Insights into the underlying mechanisms by which cognitive behavior career coaching exerts its effects have been gained from this study.Also,the study has gathered valuable data that can inform future practice and guide the development of strategies for supporting mental health at work.展开更多
Agricultural plastics play a pivotal role in agricultural production.However,due to expensive costs,agricultural plastic waste management(APWM)encounters a vast funding gap.As one of the crucial stakeholders,the publi...Agricultural plastics play a pivotal role in agricultural production.However,due to expensive costs,agricultural plastic waste management(APWM)encounters a vast funding gap.As one of the crucial stakeholders,the public deserves to make appropriate efforts for APWM.Accordingly,identifying whether the public is willing to pay for APWM and clarifying the decisions’driving pathways to explore initiatives for promoting their payment intentions are essential to address the dilemma confronting APWM.To this end,by applying the extended theory of planned behavior(TPB),the study conducted an empirical analysis based on 1,288 residents from four provinces(autonomous regions)of northern China.Results illustrate that:1)respondents hold generally positive and relatively strong payment willingness towards APWM;2)respondents’attitude(AT),subjective norm(SN),and perceived behavioral control(PBC)are positively correlated with their payment intentions(INT);3)environmental cognition(EC)and environmental emotion(EE)positively moderate the relationships between AT and INT,and between SN and INT,posing significant indirect impacts on INT.The study’s implications extend to informing government policies,suggesting that multi-entity cooperation,specifically public payment for APWM,can enhance agricultural non-point waste management.展开更多
Carbon peak and carbon neutrality(dual-carbon)are important targets for the international response to climate change.The Silk Road Economic Belt is a strategic resource region and is important for future ecological en...Carbon peak and carbon neutrality(dual-carbon)are important targets for the international response to climate change.The Silk Road Economic Belt is a strategic resource region and is important for future ecological environment and tourism development.Based on the“dual-carbon”targets,the Single index quantification,Multiple index synthesis,and Poly-criteria integration evaluation model were used in this study to measure the coordinated development index of the ecological environment,public service,and tourism economy along the Silk Road Economic Belt and to analyze its spatial and temporal evolution.Further,it explores the dynamic evolution and development trend of the three systems using the Kernel Density and Grey Markov Prediction Model.The results show that the coordinated development index along this region needs to be improved during the study period.Furthermore,the coordinated development index of the Southwest region is relatively higher than that of the Northwest region.From the development trend of the three systems,all of them develop in a stable manner;however,the tourism economy system is easily affected by external disturbances.The coordinated development index of the three systems changes dynamically and tends to be in a good state of coordination.There is a certain spatial and temporal heterogeneity.The gravity center of the coordinated development index has been in the Southwest region.During the forecast period,the coordinated development index along this region will improve significantly,while insufficient and unbalanced development will continue.展开更多
This commentary delves into the evolving landscape of cancer incidence and mortality in Costa Rica, presenting a comprehensive analysis of the data. Key findings reveal a concerning upward trajectory in cancer inciden...This commentary delves into the evolving landscape of cancer incidence and mortality in Costa Rica, presenting a comprehensive analysis of the data. Key findings reveal a concerning upward trajectory in cancer incidence rates, placing Costa Rica at the forefront within Central America. While prostate cancer and breast cancer dominate, disparities emerge when scrutinizing gender-specific trends. Notably, stomach and cervical cancers show declines, potentially attributed to targeted interventions. However, colorectal and liver cancers witness mortality increases, necessitating strategic responses. Geographical disparities persist across provinces, highlighting the need for equitable healthcare access. In conclusion, this commentary underscores the urgency of addressing the burgeoning cancer burden in Costa Rica, calling for evidence-based interventions and collaborative efforts on a global scale.展开更多
As the Chairman of the Hong Kong Doyen’s Club Ltd.,Sunny Wu has devoted himself to public welfare undertakings through practical actions over the years,and his down-to-earth ideas contain strong patriotism and a sinc...As the Chairman of the Hong Kong Doyen’s Club Ltd.,Sunny Wu has devoted himself to public welfare undertakings through practical actions over the years,and his down-to-earth ideas contain strong patriotism and a sincere love for Hong Kong.展开更多
Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is ...Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still thebiggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services providedby an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures,data, and devices. Authentication, as the first line of defense against security threats, becomes the priority ofeveryone. It can either grant or deny users access to resources according to their legitimacy. As a result, studyingand researching authentication issues within IoT is extremely important. As a result, studying and researchingauthentication issues within IoT is extremely important. This article presents a comparative study of recent researchin IoT security;it provides an analysis of recent authentication protocols from2019 to 2023 that cover several areaswithin IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security researchsummary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. Itillustrates that the resistance of protocols against attacks, and their computational and communication cost arelinked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemesand provides some future research directions.展开更多
基金supported by JSPS Grants-in-Aid for Scientific Research JP20K11786 and JP21KK0202.
文摘In the last five years,there has been a V-shaped recovery in the number of papers on congestion control algorithms on the Internet.In this paper,congestion problems on the Internet are discussed,such as congestion collapse and bufferbloat from the perspective of the necessity of congestion control algorithms.The typical congestion control algorithms are introduced,and the research areas and methods of congestion control algorithms are described.Recent research trends and future prospects of congestion control algorithms are also presented.
基金This study was supported in part by the National Natural Science Foundation of China(71973136 and 72061147002)the 2115 Talent Development Program of China Agricultural University.
文摘Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access significantly impacts agricultural production and improves smallholder farmers’income.Beyond these,the Internet can affect other dimensions of social welfare.However,research about the impact of Internet access on dietary quality in rural China remains scarce.This study utilizes multi-period panel data from Fixed Observation Point in rural China from 2009 to 2015 to estimate the impact of Internet access on dietary quality and food consumption of rural households and conducts a causal analysis.Regression models with time and household fixed effects allow robust estimation while reducing potential issues of unobserved heterogeneity.The estimates show that Internet access has significantly increased rural household dietary quality(measured by the Chinese Diet Balance Index).Further research finds that Internet access has increased the consumption of animal products,such as aquatic and dairy products.We also examine the underlying mechanisms.Internet access improves dietary quality and food consumption mainly through increasing household income and food expenditure.These results encourage the promotion of Internet access as a valuable tool for nutritional improvements,especially in rural areas.
基金supported in part by the National Natural Science Foundation of China(62371116 and 62231020)in part by the Science and Technology Project of Hebei Province Education Department(ZD2022164)+2 种基金in part by the Fundamental Research Funds for the Central Universities(N2223031)in part by the Open Research Project of Xidian University(ISN24-08)Key Laboratory of Cognitive Radio and Information Processing,Ministry of Education(Guilin University of Electronic Technology,China,CRKL210203)。
文摘High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV.
基金Project supported by the Open Foundation of Key Laboratory of Software Engineering of Yunnan Province(Grant Nos.2020SE308 and 2020SE309).
文摘This paper studies the evolutionary process of cooperative behavior in a public goods game model with heterogeneous investment strategies in square lattices.In the proposed model,players are divided into defectors,cooperators and discreet investors.Among these,defectors do not participate in investing,discreet investors make heterogeneous investments based on the investment behavior and cooperation value of their neighbors,and cooperators invest equally in each neighbor.In real life,heterogeneous investment is often accompanied by time or economic costs.The discreet investors in this paper pay a certain price to obtain their neighbors'investment behavior and cooperation value,which quantifies the time and economic costs of the heterogeneous investment process.The results of Monte Carlo simulation experiments in this study show that discreet investors can effectively resist the invasion of the defectors,form a stable cooperative group and expand the cooperative advantage in evolution.However,when discreet investors pay too high a price,they lose their strategic advantage.The results in this paper help us understand the role of heterogeneous investment in promoting and maintaining human social cooperation.
基金the National Natural Science Foundation of China(No.61662004).
文摘The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasingdemands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device hascaught the attention of cyber hackers, as it provides them with expanded avenues to access valuable data. Thishas resulted in a myriad of security challenges, including information leakage, malware propagation, and financialloss, among others. Consequently, developing an intrusion detection system to identify both active and potentialintrusion traffic in IoT networks is of paramount importance. In this paper, we propose ResNeSt-biGRU, a practicalintrusion detection model that combines the strengths of ResNeSt, a variant of Residual Neural Network, andbidirectionalGated RecurrentUnitNetwork (biGRU).Our ResNeSt-biGRUframework diverges fromconventionalintrusion detection systems (IDS) by employing this dual-layeredmechanism that exploits the temporal continuityand spatial feature within network data streams, a methodological innovation that enhances detection accuracy.In conjunction with this, we introduce the PreIoT dataset, a compilation of prevalent IoT network behaviors, totrain and evaluate IDSmodels with a focus on identifying potential intrusion traffics. The effectiveness of proposedscheme is demonstrated through testing, wherein it achieved an average accuracy of 99.90% on theN-BaIoT datasetas well as on the PreIoT dataset and 94.45% on UNSW-NB15 dataset. The outcomes of this research reveal thepotential of ResNeSt-biGRU to bolster security measures, diminish intrusion-related vulnerabilities, and preservethe overall security of IoT ecosystems.
基金Project supported by the Ministry of Education of China in the later stage of philosophy and social science research(Grant No.19JHG091)the National Natural Science Foundation of China(Grant No.72061003)+1 种基金the Major Program of National Social Science Fund of China(Grant No.20&ZD155)the Guizhou Provincial Science and Technology Projects(Grant No.[2020]4Y172)。
文摘We construct a dual-layer coupled complex network of communities and residents to represent the interconnected risk transmission network between communities and the disease transmission network among residents. It characterizes the process of infectious disease transmission among residents between communities through the SE2IHR model considering two types of infectors. By depicting a more fine-grained social structure and combining further simulation experiments, the study validates the crucial role of various prevention and control measures implemented by communities as primary executors in controlling the epidemic. Research shows that the geographical boundaries of communities and the social interaction patterns of residents have a significant impact on the spread of the epidemic, where early detection, isolation and treatment strategies at community level are essential for controlling the spread of the epidemic. In addition, the study explores the collaborative governance model and institutional advantages of communities and residents in epidemic prevention and control.
基金This paper is financed by the European Union-NextGenerationEU,through the National Recovery and Resilience Plan of the Republic of Bulgaria,Project No.BG-RRP-2.004-0001-C01.
文摘The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks.
基金the National Social Science Foundation of China(No.22CTQ032).
文摘Purpose:Recently,global science has shown an increasing open trend,however,the characteristics of research integrity of open access(OA)publications have rarely been studied.The aim of this study is to compare the characteristics of retracted articles across different OA levels and discover whether OA level influences the characteristics of retracted articles.Design/methodology/approach:The research conducted an analysis of 6,005 retracted publications between 2001 and 2020 from the Web of Science and Retraction Watch databases.These publications were categorized based on their OA levels,including Gold OA,Green OA,and non-OA.The study explored retraction rates,time lags and reasons within these categories.Findings:The findings of this research revealed distinct patterns in retraction rates among different OA levels.Publications with Gold OA demonstrated the highest retraction rate,followed by Green OA and non-OA.A comparison of retraction reasons between Gold OA and non-OA categories indicated similar proportions,while Green OA exhibited a higher proportion due to falsification and manipulation issues,along with a lower occurrence of plagiarism and authorship issues.The retraction time lag was shortest for Gold OA,followed by non-OA,and longest for Green OA.The prolonged retraction time for Green OA could be attributed to an atypical distribution of retraction reasons.A comparative study on characteristics of retracted publications across different open access levels Research limitations:There is no exploration of a wider range of OA levels,such as Hybrid OA and Bronze OA.Practical implications:The outcomes of this study suggest the need for increased attention to research integrity within the OA publications.The occurrences offalsification,manipulation,and ethical concerns within Green OA publications warrant attention from the scientific community.Originality/value:This study contributes to the understanding of research integrity in the realm of OA publications,shedding light on retraction patterns and reasons across different OA levels.
文摘Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes.
文摘Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enhance the range of network information services accessible to humans.With the transition of terrestrial mobile communication networks from the 5G era,which provides access to information anywhere,to the 6G era,which seeks to connect everything,the construction of satellite Internet,which promises a"network reaching everywhere and service is ubiquitous",has become the consensus of the industry's development and the focus of global scientific and technological innovation.
基金funded by the Major Humanities and Social Sciences Research Projects in Zhejiang higher education institutions,grant number 2023QN082,awarded to Cheng ZhaoThe National Natural Science Foundation of China also provided funding,grant number 61902349,awarded to Cheng Zhao.
文摘The present study examines the impact of short-term public opinion sentiment on the secondary market,with a focus on the potential for such sentiment to cause dramatic stock price fluctuations and increase investment risk.The quantification of investment sentiment indicators and the persistent analysis of their impact has been a complex and significant area of research.In this paper,a structured multi-head attention stock index prediction method based adaptive public opinion sentiment vector is proposed.The proposedmethod utilizes an innovative approach to transform numerous investor comments on social platforms over time into public opinion sentiment vectors expressing complex sentiments.It then analyzes the continuous impact of these vectors on the market through the use of aggregating techniques and public opinion data via a structured multi-head attention mechanism.The experimental results demonstrate that the public opinion sentiment vector can provide more comprehensive feedback on market sentiment than traditional sentiment polarity analysis.Furthermore,the multi-head attention mechanism is shown to improve prediction accuracy through attention convergence on each type of input information separately.Themean absolute percentage error(MAPE)of the proposedmethod is 0.463%,a reduction of 0.294% compared to the benchmark attention algorithm.Additionally,the market backtesting results indicate that the return was 24.560%,an improvement of 8.202% compared to the benchmark algorithm.These results suggest that themarket trading strategy based on thismethod has the potential to improve trading profits.
文摘Internet memes,as multimodal cultural products disseminated through the Internet,usually take the form of short videos or images that express humor or satire.The creation and dissemination of humor in memes are both creative and complex,and the successful perception of meme humor reflects humans’universal thinking capacity.Based on the theoretical framework of conceptual blending,this paper selects a set of COVID-19 publicity posters from the official Weibo account of China Guangzhou Fabu(Guangzhou Internet Information Office),analyses the multi-level structure of Internet memes,and explores the dynamic cognitive process in the interpretation of humorous memes to reveal people’s ability to make simultaneous analogies and integration between elements in different mental spaces.
文摘Zoonotic hookworm infections remain a significant public health problem,causing nearly 500 milion cases globally and approximately four million disability-adjusted life years lost annually.More than one-fth of these cases are attrib-uted to Ancylostoma ceylanicum,an emerging zoonotic health issue in the Asia-Pacific region.This review presents key research gaps regarding the epidemiology,diagnosis,control,prevention and elimination of A.ceylanicum and other canine zoonotic hookworms as neglected health threats.A.ceylanicum is the second most prevalent human hook-worm in the region;it is the most common hookworm among dogs and cats-reservoirs of zoonotic infections.Previous population genetic and phylogenetic analyses revealed that A.ceylanicum has three possible transmis-sion dynamics:zoonotic,animal-only,and human-only pathways.The actual burden of zoonotic ancylostomiasis in most endemic countries remains unknown due to the use of parasitological techniques(e.g.,Kato-Katz thick smear and floatation techniques)that have reduced diagnostic performance and do not allow accurate species identifica-tion in helminth surveys.The emergence of benzimidazole resistance in soil-transmitted helminths(STHs),includ-ing hookworms,is a concern due to the protracted implementation of mass drug administration(MDA).Resistance is conferred by single nucleotide polymorphisms(SNPs)that occur in theβ-tubulin isotype 1 gene.These mutations have been reported in drug-resistant A.caninum but have not been found in A.ceylanicum in the field.A.ceylanicum remains understudied in the Asia-Pacific region.The zoonotic nature of the parasite warrants investigation of its occur-rence in human and animal reservoir hosts to understand the dynamics of zoonotic transmission in different endemic foci.The detection of benzimidazole resistance-associated SNPs in zoonotic hookworms from Asia-Pacific countries has yet to be thoroughly explored.Considering the high level of hookworm endemicity in the region,the circulation of resistant isolates between humans and animals potentially presents a significant One Health threat that can under-mine current MDA and proposed animal deworming-based control efforts.
基金partially supported by the National Natural Science Foundation of China under grant no.62372245the Foundation of Yunnan Key Laboratory of Blockchain Application Technology under Grant 202105AG070005+1 种基金in part by the Foundation of State Key Laboratory of Public Big Datain part by the Foundation of Key Laboratory of Computational Science and Application of Hainan Province under Grant JSKX202202。
文摘For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks.
文摘BACKGROUND Public employees worldwide are increasingly concerned about work anxiety and depression.Cognitive-behavioral career coaching has emerged as a promising strategy for addressing these mental health disorders,which can negatively impact on a person's overall well-being and performance.AIM To examine whether cognitive-behavioral career coaching reduces work anxiety and depression among Nigerian public employees.METHODS A total of 120 public employees(n=60)suffering from severe anxiety and depression were randomly assigned to the treatment or control groups in this study.Cognitive behavioral coaching was provided twice a week to those in the treatment group,whereas no treatment was given to those in the control group.As part of the study,the Hamilton Anxiety Rating Scales and Beck Depression Inventory were used to collect data.RESULTS Analysis of covariance of the data from participants indicates a significant effect of cognitive-behavioral career coaching on work anxiety and depression.CONCLUSION Insights into the underlying mechanisms by which cognitive behavior career coaching exerts its effects have been gained from this study.Also,the study has gathered valuable data that can inform future practice and guide the development of strategies for supporting mental health at work.
基金supported by the Major Program of the National Social Science Foundation of China(18ZDA048).
文摘Agricultural plastics play a pivotal role in agricultural production.However,due to expensive costs,agricultural plastic waste management(APWM)encounters a vast funding gap.As one of the crucial stakeholders,the public deserves to make appropriate efforts for APWM.Accordingly,identifying whether the public is willing to pay for APWM and clarifying the decisions’driving pathways to explore initiatives for promoting their payment intentions are essential to address the dilemma confronting APWM.To this end,by applying the extended theory of planned behavior(TPB),the study conducted an empirical analysis based on 1,288 residents from four provinces(autonomous regions)of northern China.Results illustrate that:1)respondents hold generally positive and relatively strong payment willingness towards APWM;2)respondents’attitude(AT),subjective norm(SN),and perceived behavioral control(PBC)are positively correlated with their payment intentions(INT);3)environmental cognition(EC)and environmental emotion(EE)positively moderate the relationships between AT and INT,and between SN and INT,posing significant indirect impacts on INT.The study’s implications extend to informing government policies,suggesting that multi-entity cooperation,specifically public payment for APWM,can enhance agricultural non-point waste management.
基金supported by the Hebei Province Cultural and Artistic Science Planning and Tourism Research Project[Grant No.HB22-ZD002].
文摘Carbon peak and carbon neutrality(dual-carbon)are important targets for the international response to climate change.The Silk Road Economic Belt is a strategic resource region and is important for future ecological environment and tourism development.Based on the“dual-carbon”targets,the Single index quantification,Multiple index synthesis,and Poly-criteria integration evaluation model were used in this study to measure the coordinated development index of the ecological environment,public service,and tourism economy along the Silk Road Economic Belt and to analyze its spatial and temporal evolution.Further,it explores the dynamic evolution and development trend of the three systems using the Kernel Density and Grey Markov Prediction Model.The results show that the coordinated development index along this region needs to be improved during the study period.Furthermore,the coordinated development index of the Southwest region is relatively higher than that of the Northwest region.From the development trend of the three systems,all of them develop in a stable manner;however,the tourism economy system is easily affected by external disturbances.The coordinated development index of the three systems changes dynamically and tends to be in a good state of coordination.There is a certain spatial and temporal heterogeneity.The gravity center of the coordinated development index has been in the Southwest region.During the forecast period,the coordinated development index along this region will improve significantly,while insufficient and unbalanced development will continue.
文摘This commentary delves into the evolving landscape of cancer incidence and mortality in Costa Rica, presenting a comprehensive analysis of the data. Key findings reveal a concerning upward trajectory in cancer incidence rates, placing Costa Rica at the forefront within Central America. While prostate cancer and breast cancer dominate, disparities emerge when scrutinizing gender-specific trends. Notably, stomach and cervical cancers show declines, potentially attributed to targeted interventions. However, colorectal and liver cancers witness mortality increases, necessitating strategic responses. Geographical disparities persist across provinces, highlighting the need for equitable healthcare access. In conclusion, this commentary underscores the urgency of addressing the burgeoning cancer burden in Costa Rica, calling for evidence-based interventions and collaborative efforts on a global scale.
文摘As the Chairman of the Hong Kong Doyen’s Club Ltd.,Sunny Wu has devoted himself to public welfare undertakings through practical actions over the years,and his down-to-earth ideas contain strong patriotism and a sincere love for Hong Kong.
文摘Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still thebiggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services providedby an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures,data, and devices. Authentication, as the first line of defense against security threats, becomes the priority ofeveryone. It can either grant or deny users access to resources according to their legitimacy. As a result, studyingand researching authentication issues within IoT is extremely important. As a result, studying and researchingauthentication issues within IoT is extremely important. This article presents a comparative study of recent researchin IoT security;it provides an analysis of recent authentication protocols from2019 to 2023 that cover several areaswithin IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security researchsummary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. Itillustrates that the resistance of protocols against attacks, and their computational and communication cost arelinked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemesand provides some future research directions.