期刊文献+
共找到151,515篇文章
< 1 2 250 >
每页显示 20 50 100
Corporate Social Responsibility and Shipping Supply Chain Risks
1
作者 Wen-Chi Lo 《Economics World》 2024年第3期145-155,共11页
This study aims to investigate whether Corporate Social Responsibility(CSR)activities reduce supply chain disruptions by examining the impact of the Suez Canal obstruction on the Ever Given container ship in March 202... This study aims to investigate whether Corporate Social Responsibility(CSR)activities reduce supply chain disruptions by examining the impact of the Suez Canal obstruction on the Ever Given container ship in March 2021.This study conclude that the more responsible companies have higher returns and are less affected by this event than the less responsible companies;the less responsible companies have lower returns.The companies with better CSR have a lower impact on their supply chains when faced with disruptions in the supply chain. 展开更多
关键词 Suez Canal obstruction corporate social responsibility supply chain risks event study Ever Given container ships
下载PDF
The mediating role of sleep qualityon the relationship between internet gaming disorder and perceived stress and suicidal behaviour among Indian medical students
2
作者 Sunny Garg Aakanksha Kharb +4 位作者 Deepika Verma Ritu Antil Binika Khanna Ritika Sihag Divya Lamba 《General Psychiatry》 CSCD 2023年第3期175-188,共14页
Background In the recent digital era,individuals with internet gaming disorder(IGD)have reported a much higher prevalence of poor sleep quality,perceived stress and suicidal behaviour.However,the underlying mechanisms... Background In the recent digital era,individuals with internet gaming disorder(IGD)have reported a much higher prevalence of poor sleep quality,perceived stress and suicidal behaviour.However,the underlying mechanisms for these psychological problems remain unknown.Aims The primary aims of this study were to explore the mediating role of sleep quality on the relationship between IGD and the health outcomes of perceived stress and suicidal behaviour and to assess the prevalence and risk factors for IGD among medical students.Methods A cross-sectional study enrolling 795 medical students from two medical colleges in a rural area of North India was conducted from April to May 2022.The study participants were chosen using a stratified random sampling approach.A self-administered questionnaire was used to collect data,including sociodemographic and personal information and gaming characteristics.The study also included the Gaming Disorder and Hazardous Gaming Scale,the Pittsburgh Sleep Quality Index,the Perceived Stress Scale-10 and the Suicide Behaviors Questionnaire-Revised to measure IGD,sleep quality,perceived stress and suicidal behaviour,respectively.Multiple logistic regression for the risk factors and Pearson's correlation test for the relationship between variables were used.Hayes'PROCESS macro for SPSS was employed to carry out mediation analysis.Results Among the 348 gamers with a mean age of 21.03(SD 3.27)years,the prevalence of IGD was 15.23%(95%confidence interval:11.6%to 19.4%).In the correlational analysis,small to large(r:0.32-0.72)significant relationships between scores of IGD and other health outcomes were established.The indirect effect(B=0.300)via sleep quality accounted for 30.55%of the total effect(B=0.982)of IGD on perceived stress(partially mediated),while sleep quality(B=0.174)accounted for 27.93%of the total effect(B=0.623)of IGD on suicidal behaviour(partially mediated).The factors of being male,living in a single-parent family,using the internet for other than academic purposes(1-3 hours and more than 3 hours/day),playing games for more than 3 hours/day and playing games with violent content were associated with IGD symptoms. 展开更多
关键词 BEHAVIOUR internet MEDIA
下载PDF
The Relationship between Internet Addiction and Cyberbullying Perpetration: A Moderated Mediation Model of Moral Disengagement and Internet Literacy
3
作者 Wan Xiao Miaoting Cheng 《International Journal of Mental Health Promotion》 2023年第12期1303-1311,共9页
Internet addiction and cyberbullying have emerged as significant global mental health concerns in recent years.Although previous studies have shown a close association between Internet addiction and cyberbullying,the u... Internet addiction and cyberbullying have emerged as significant global mental health concerns in recent years.Although previous studies have shown a close association between Internet addiction and cyberbullying,the underlying mechanisms connecting these two phenomena remain unclear.Therefore,this study aimed to reveal the mechanisms involved between Internet addiction and cyberbullying perpetration from the perspective of cognition function.This study recruited 976 Chinese youth through online survey,using the short version of Internet Addiction Test(s-IAT),Chinese Cyberbullying Intervention Project Questionnaire(C-CIPQ),Cyberbullying Moral Disengagement Scale(CMDS),and Internet Literacy Questionnaire(ILQ)to investigate the relationship between Internet addiction,moral disengagement,Internet literacy and cyberbullying perpetration.The keyfindings of this study were as follows:after controlling gender and age,(1)Internet addiction had a significant positive predictive effect on cyberbullying perpetration;(2)moral disengagement acted as a mediator between Internet addiction and cyberbullying perpetration;and(3)Internet literacy played a moderating role between moral disengagement and cyberbullying perpetration.In conclusion,there was a moderated mediating effect between Internet addiction and cyberbullying perpetration,contributing to a better understanding of the relationship between these two phenomena. 展开更多
关键词 internet addiction CYBERBULLYING cyberbullying perpetration moral disengagement internet literacy
下载PDF
The impact of Internet access on household dietary quality:Evidence from rural China 被引量:1
4
作者 Yi Cui Qiran Zhao +1 位作者 Thomas Glauben Wei Si 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第2期374-383,共10页
Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access sig... Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access significantly impacts agricultural production and improves smallholder farmers’income.Beyond these,the Internet can affect other dimensions of social welfare.However,research about the impact of Internet access on dietary quality in rural China remains scarce.This study utilizes multi-period panel data from Fixed Observation Point in rural China from 2009 to 2015 to estimate the impact of Internet access on dietary quality and food consumption of rural households and conducts a causal analysis.Regression models with time and household fixed effects allow robust estimation while reducing potential issues of unobserved heterogeneity.The estimates show that Internet access has significantly increased rural household dietary quality(measured by the Chinese Diet Balance Index).Further research finds that Internet access has increased the consumption of animal products,such as aquatic and dairy products.We also examine the underlying mechanisms.Internet access improves dietary quality and food consumption mainly through increasing household income and food expenditure.These results encourage the promotion of Internet access as a valuable tool for nutritional improvements,especially in rural areas. 展开更多
关键词 dietary quality fixed effect model internet access rural China
下载PDF
Review and Analysis: Fate of Arsenic Applied to Canal Shipping Lane Vegetation and United States Military Base Grounds in the Panama Canal Zone
5
作者 Kenneth R. Olson 《Open Journal of Soil Science》 2023年第10期391-413,共23页
The opening of the Panama Canal in 1913 increased the availability of internationally traded goods and transformed ocean-shipping by shortening travel time between the Atlantic Ocean and Pacific Ocean. The canal spark... The opening of the Panama Canal in 1913 increased the availability of internationally traded goods and transformed ocean-shipping by shortening travel time between the Atlantic Ocean and Pacific Ocean. The canal sparked the growth of port authorities and increased ship tonnage on both coasts of Panama. Since the construction of the Panama Canal, in the 1910s, pesticides, herbicides and chemicals, including arsenic, have been essential for controlling wetland vegetation, including hyacinth, which blocked rivers, lakes, and the canal as well as managing mosquitoes. Pesticides and chemicals flowed into Lake Gatun (reservoir) either attached to sediment or in solution during the monsoon season. Lake Gatun was the drinking water source for most of the people living in the Panama Canal Zone. The United States military base commanders had the ability to order and use cacodylic acid (arsenic based) from the Naval Depot Supply Federal and Stock Catalog and the later Federal Supply Catalog on the military base grounds in the Panama Canal Zone. Cacodylic acid was shipped to Panama Canal Zone ports, including Balboa and Cristobal, and distributed to the military bases by rail or truck. The objective of this study is to determine the fate of arsenic: 1) applied between 1914 and 1935 to Panama Canal shipping lane hyacinth and other wetland vegetation and 2) cacodylic acid (arsenic) sprayed from 1948 to 1999 on the US military base grounds in the Panama Canal Zone. 展开更多
关键词 Panama Canal ARSENIC Hyacinth Lake Gatun shipping Lanes Cacodylic Acid
下载PDF
The Relationship between Students’ Anxiety and Internet Use Disorders: A Meta-Analysis
6
作者 Yichi Zhang Yuxiang Feng +1 位作者 Shan Hu Huiyong Fan 《International Journal of Mental Health Promotion》 2023年第12期1323-1341,共19页
Theoretical models have predicted a positive association between anxiety and Internet use disorders.However,thefindings of previous studies are conflicting,with some reporting a positive association and others proposing... Theoretical models have predicted a positive association between anxiety and Internet use disorders.However,thefindings of previous studies are conflicting,with some reporting a positive association and others proposing no relationship between the two.To explore the true relationship between the two and analyze the reasons for the differences,100 primary studies involving 108,539 subjects were entered into a meta-analysis.The results showed that(1)there was a significant positive correlation between students’anxiety and Internet use disorder(r=0.330);(2)the moderating effect of anxiety type was significant.(3)The moderating effects of the measurement instrument for Internet use disorder,the measurement instrument for anxiety,the subject’s grade level,the subject’s region,and the type of publication were not significant.The question of how the different anxiety types of students and IUD have different mechanisms of action needs to be further explored. 展开更多
关键词 STUDENTS ANXIETY internet use disorder META-ANALYSIS
下载PDF
Low-Cost Federated Broad Learning for Privacy-Preserved Knowledge Sharing in the RIS-Aided Internet of Vehicles 被引量:1
7
作者 Xiaoming Yuan Jiahui Chen +4 位作者 Ning Zhang Qiang(John)Ye Changle Li Chunsheng Zhu Xuemin Sherman Shen 《Engineering》 SCIE EI CAS CSCD 2024年第2期178-189,共12页
High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency... High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV. 展开更多
关键词 Knowledge sharing internet of Vehicles Federated learning Broad learning Reconfigurable intelligent surfaces Resource allocation
下载PDF
Dilemma and Solutions of Greenhouse Gas Emission Reduction of International Shipping
8
作者 Yanan Qu Jin Li 《Journal of Shipping and Ocean Engineering》 2023年第1期10-17,共8页
How to build an international maritime GHG(greenhouse gas)emission reduction cooperation mechanism is an important international issue at present.Firstly,we describe the current situation of maritime transport GHG emi... How to build an international maritime GHG(greenhouse gas)emission reduction cooperation mechanism is an important international issue at present.Firstly,we describe the current situation of maritime transport GHG emission reduction and analyze the problems that still exist in international maritime transport emission reduction from four aspects:political,economic,legal and technical.For example,geopolitical aggravation hinders the solution of the FOC(Flag of Convenience)issue;maritime emissions are not included in the carbon emission trading system;the synergy of maritime emission reduction principles under the IMO(International Maritime Organization)framework and the technical level of maritime emission reduction needs to be improved.The motivation and essence of the divergent international actions on maritime emission reduction are discussed.Finally,it is proposed to implement the“true linkage principle”to solve the problem of FOCs;to promote the development of regional carbon markets and link them to the international maritime carbon emission trading market economically;to implement the CBDR(the common but differentiated responsibilities)principle legally to promote the international emission reduction work in an orderly manner;and the technical innovation of ships and increase the technical support. 展开更多
关键词 Climate change shipping GHG reduction international cooperation
下载PDF
Unmanned Ship Identification Based on Improved YOLOv8s Algorithm
9
作者 Chun-Ming Wu Jin Lei +2 位作者 Wu-Kai Liu Mei-Ling Ren Ling-Li Ran 《Computers, Materials & Continua》 SCIE EI 2024年第3期3071-3088,共18页
Aiming at defects such as low contrast in infrared ship images,uneven distribution of ship size,and lack of texture details,which will lead to unmanned ship leakage misdetection and slow detection,this paper proposes ... Aiming at defects such as low contrast in infrared ship images,uneven distribution of ship size,and lack of texture details,which will lead to unmanned ship leakage misdetection and slow detection,this paper proposes an infrared ship detection model based on the improved YOLOv8 algorithm(R_YOLO).The algorithm incorporates the Efficient Multi-Scale Attention mechanism(EMA),the efficient Reparameterized Generalized-feature extraction module(CSPStage),the small target detection header,the Repulsion Loss function,and the context aggregation block(CABlock),which are designed to improve the model’s ability to detect targets at multiple scales and the speed of model inference.The algorithm is validated in detail on two vessel datasets.The comprehensive experimental results demonstrate that,in the infrared dataset,the YOLOv8s algorithm exhibits improvements in various performance metrics.Specifically,compared to the baseline algorithm,there is a 3.1%increase in mean average precision at a threshold of 0.5(mAP(0.5)),a 5.4%increase in recall rate,and a 2.2%increase in mAP(0.5:0.95).Simultaneously,while less than 5 times parameters,the mAP(0.5)and frames per second(FPS)exhibit an increase of 1.7%and more than 3 times,respectively,compared to the CAA_YOLO algorithm.Finally,the evaluation indexes on the visible light data set have shown an average improvement of 4.5%. 展开更多
关键词 Unmanned ships R_YOLO EMA CSPStage YOLOv8s
下载PDF
Efficient Ship:A Hybrid Deep Learning Framework for Ship Detection in the River
10
作者 Huafeng Chen Junxing Xue +2 位作者 Hanyun Wen Yurong Hu Yudong Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期301-320,共20页
Optical image-based ship detection can ensure the safety of ships and promote the orderly management of ships in offshore waters.Current deep learning researches on optical image-based ship detection mainly focus on i... Optical image-based ship detection can ensure the safety of ships and promote the orderly management of ships in offshore waters.Current deep learning researches on optical image-based ship detection mainly focus on improving one-stage detectors for real-time ship detection but sacrifices the accuracy of detection.To solve this problem,we present a hybrid ship detection framework which is named EfficientShip in this paper.The core parts of the EfficientShip are DLA-backboned object location(DBOL)and CascadeRCNN-guided object classification(CROC).The DBOL is responsible for finding potential ship objects,and the CROC is used to categorize the potential ship objects.We also design a pixel-spatial-level data augmentation(PSDA)to reduce the risk of detection model overfitting.We compare the proposed EfficientShip with state-of-the-art(SOTA)literature on a ship detection dataset called Seaships.Experiments show our ship detection framework achieves a result of 99.63%(mAP)at 45 fps,which is much better than 8 SOTA approaches on detection accuracy and can also meet the requirements of real-time application scenarios. 展开更多
关键词 ship detection deep learning data augmentation object location object classification
下载PDF
Fine-Grained Ship Recognition Based on Visible and Near-Infrared Multimodal Remote Sensing Images: Dataset,Methodology and Evaluation
11
作者 Shiwen Song Rui Zhang +1 位作者 Min Hu Feiyao Huang 《Computers, Materials & Continua》 SCIE EI 2024年第6期5243-5271,共29页
Fine-grained recognition of ships based on remote sensing images is crucial to safeguarding maritime rights and interests and maintaining national security.Currently,with the emergence of massive high-resolution multi... Fine-grained recognition of ships based on remote sensing images is crucial to safeguarding maritime rights and interests and maintaining national security.Currently,with the emergence of massive high-resolution multi-modality images,the use of multi-modality images for fine-grained recognition has become a promising technology.Fine-grained recognition of multi-modality images imposes higher requirements on the dataset samples.The key to the problem is how to extract and fuse the complementary features of multi-modality images to obtain more discriminative fusion features.The attention mechanism helps the model to pinpoint the key information in the image,resulting in a significant improvement in the model’s performance.In this paper,a dataset for fine-grained recognition of ships based on visible and near-infrared multi-modality remote sensing images has been proposed first,named Dataset for Multimodal Fine-grained Recognition of Ships(DMFGRS).It includes 1,635 pairs of visible and near-infrared remote sensing images divided into 20 categories,collated from digital orthophotos model provided by commercial remote sensing satellites.DMFGRS provides two types of annotation format files,as well as segmentation mask images corresponding to the ship targets.Then,a Multimodal Information Cross-Enhancement Network(MICE-Net)fusing features of visible and near-infrared remote sensing images,has been proposed.In the network,a dual-branch feature extraction and fusion module has been designed to obtain more expressive features.The Feature Cross Enhancement Module(FCEM)achieves the fusion enhancement of the two modal features by making the channel attention and spatial attention work cross-functionally on the feature map.A benchmark is established by evaluating state-of-the-art object recognition algorithms on DMFGRS.MICE-Net conducted experiments on DMFGRS,and the precision,recall,mAP0.5 and mAP0.5:0.95 reached 87%,77.1%,83.8%and 63.9%,respectively.Extensive experiments demonstrate that the proposed MICE-Net has more excellent performance on DMFGRS.Built on lightweight network YOLO,the model has excellent generalizability,and thus has good potential for application in real-life scenarios. 展开更多
关键词 Multi-modality dataset ship recognition fine-grained recognition attention mechanism
下载PDF
A Time-Domain Numerical Simulation for Free Motion Responses of Two Ships Advancing in Head Waves
12
作者 PAN Su-yong CHENG Yong 《China Ocean Engineering》 SCIE EI CSCD 2024年第3期519-530,共12页
The constant panel method within the framework of potential flow theory in the time domain is developed for solving the hydrodynamic interactions between two parallel ships with forward speed.When solving problems wit... The constant panel method within the framework of potential flow theory in the time domain is developed for solving the hydrodynamic interactions between two parallel ships with forward speed.When solving problems within a time domain framework,the free water surface needs to simultaneously satisfy both the kinematic and dynamic boundary conditions of the free water surface.This provides conditions for adding artificial damping layers.Using the Runge−Kutta method to solve equations related to time.An upwind differential scheme is used in the present method to deal with the convection terms on the free surface to prevent waves upstream.Through the comparison with the available experimental data and other numerical methods,the present method is proved to have good mesh convergence,and satisfactory results can be obtained.The constant panel method is applied to calculate the hydrodynamic interaction responses of two parallel ships advancing in head waves.Numerical simulations are conducted on the effects of forward speed,different longitudinal and lateral distances on the motion response of two modified Wigley ships in head waves.Then further investigations are conducted on the effects of different ship types on the motion response. 展开更多
关键词 ship motions time domain simulation forward speed different distances wave loads
下载PDF
ResNeSt-biGRU: An Intrusion Detection Model Based on Internet of Things
13
作者 Yan Xiang Daofeng Li +2 位作者 Xinyi Meng Chengfeng Dong Guanglin Qin 《Computers, Materials & Continua》 SCIE EI 2024年第4期1005-1023,共19页
The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasingdemands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device has... The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasingdemands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device hascaught the attention of cyber hackers, as it provides them with expanded avenues to access valuable data. Thishas resulted in a myriad of security challenges, including information leakage, malware propagation, and financialloss, among others. Consequently, developing an intrusion detection system to identify both active and potentialintrusion traffic in IoT networks is of paramount importance. In this paper, we propose ResNeSt-biGRU, a practicalintrusion detection model that combines the strengths of ResNeSt, a variant of Residual Neural Network, andbidirectionalGated RecurrentUnitNetwork (biGRU).Our ResNeSt-biGRUframework diverges fromconventionalintrusion detection systems (IDS) by employing this dual-layeredmechanism that exploits the temporal continuityand spatial feature within network data streams, a methodological innovation that enhances detection accuracy.In conjunction with this, we introduce the PreIoT dataset, a compilation of prevalent IoT network behaviors, totrain and evaluate IDSmodels with a focus on identifying potential intrusion traffics. The effectiveness of proposedscheme is demonstrated through testing, wherein it achieved an average accuracy of 99.90% on theN-BaIoT datasetas well as on the PreIoT dataset and 94.45% on UNSW-NB15 dataset. The outcomes of this research reveal thepotential of ResNeSt-biGRU to bolster security measures, diminish intrusion-related vulnerabilities, and preservethe overall security of IoT ecosystems. 展开更多
关键词 internet of Things cyberattack intrusion detection internet security
下载PDF
Deep Transfer Learning Techniques in Intrusion Detection System-Internet of Vehicles: A State-of-the-Art Review
14
作者 Wufei Wu Javad Hassannataj Joloudari +8 位作者 Senthil Kumar Jagatheesaperumal Kandala N.V.P.SRajesh Silvia Gaftandzhieva Sadiq Hussain Rahimullah Rabih Najibullah Haqjoo Mobeen Nazar Hamed Vahdat-Nejad Rositsa Doneva 《Computers, Materials & Continua》 SCIE EI 2024年第8期2785-2813,共29页
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accide... The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks. 展开更多
关键词 Cyber-attacks internet of things internet of vehicles intrusion detection system
下载PDF
Securing the Internet of Health Things with Certificateless Anonymous Authentication Scheme
15
作者 Nisreen Innab 《Computers, Materials & Continua》 SCIE EI 2024年第8期2237-2258,共22页
Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible t... Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes. 展开更多
关键词 internet of things internet of health things security authentication hyperelliptic curve cryptography
下载PDF
Call for Papers——Feature Topic Vol.22,No.2,2025 Efficient Cooperative Transmission over Satellite Internet for 6G
16
《China Communications》 SCIE CSCD 2024年第1期I0006-I0006,共1页
Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enh... Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enhance the range of network information services accessible to humans.With the transition of terrestrial mobile communication networks from the 5G era,which provides access to information anywhere,to the 6G era,which seeks to connect everything,the construction of satellite Internet,which promises a"network reaching everywhere and service is ubiquitous",has become the consensus of the industry's development and the focus of global scientific and technological innovation. 展开更多
关键词 internet SERVICES service
下载PDF
Improved Scatter Search Algorithm for Multi-skilled Personnel Scheduling of Ship Block Painting
17
作者 Guanglei Jiao Zuhua Jiang +1 位作者 Jianmin Niu Wenjuan Yu 《Journal of Harbin Institute of Technology(New Series)》 CAS 2024年第1期1-15,共15页
This paper focuses on the optimization method for multi-skilled painting personnel scheduling.The budget working time analysis is carried out considering the influence of operating area,difficulty of spraying area,mul... This paper focuses on the optimization method for multi-skilled painting personnel scheduling.The budget working time analysis is carried out considering the influence of operating area,difficulty of spraying area,multi-skilled workers,and worker’s efficiency,then a mathematical model is established to minimize the completion time. The constraints of task priority,paint preparation,pump management,and neighbor avoidance in the ship block painting production are considered. Based on this model,an improved scatter search(ISS)algorithm is designed,and the hybrid approximate dynamic programming(ADP)algorithm is used to improve search efficiency. In addition,the two solution combination methods of path-relinking and task sequence combination are used to enhance the search breadth and depth. The numerical experimental results show that ISS has a significant advantage in solving efficiency compared with the solver in small scale instances;Compared with the scatter search algorithm and genetic algorithm,ISS can stably improve the solution quality. Verified by the production example,ISS effectively shortens the total completion time of the production,which is suitable for scheduling problems in the actual painting production of the shipyard. 展开更多
关键词 ship painting personnel scheduling multi⁃skilled workers scatter search task constraints
下载PDF
Sending The King Ship, A Tradition Connecting Two Peoples
18
作者 Zhu Mengxiao 《China Report ASEAN》 2024年第6期34-36,共3页
“The sky is dark,and it is about to rain,”goes a lyric from China’s coastal Minnan(southern Fujian)region.“The king ship is leaving the bay,papa is going out to sea,and mama is sending the ship off.May it bring us... “The sky is dark,and it is about to rain,”goes a lyric from China’s coastal Minnan(southern Fujian)region.“The king ship is leaving the bay,papa is going out to sea,and mama is sending the ship off.May it bring us wealth,food,and the gods’protection.”The 600-year-old custom is called Ong Chun,Wangchuan,Wangkang,or“Sending the King Ship.” 展开更多
关键词 COASTAL ship REGION
下载PDF
Internet of Things Authentication Protocols: Comparative Study
19
作者 Souhayla Dargaoui Mourade Azrour +3 位作者 Ahmad ElAllaoui Azidine Guezzaz Abdulatif Alabdulatif Abdullah Alnajim 《Computers, Materials & Continua》 SCIE EI 2024年第4期65-91,共27页
Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is ... Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still thebiggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services providedby an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures,data, and devices. Authentication, as the first line of defense against security threats, becomes the priority ofeveryone. It can either grant or deny users access to resources according to their legitimacy. As a result, studyingand researching authentication issues within IoT is extremely important. As a result, studying and researchingauthentication issues within IoT is extremely important. This article presents a comparative study of recent researchin IoT security;it provides an analysis of recent authentication protocols from2019 to 2023 that cover several areaswithin IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security researchsummary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. Itillustrates that the resistance of protocols against attacks, and their computational and communication cost arelinked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemesand provides some future research directions. 展开更多
关键词 ATTACKS CRYPTOGRAPHY internet of Things SECURITY AUTHENTICATION
下载PDF
A Hybrid and Lightweight Device-to-Server Authentication Technique for the Internet of Things
20
作者 Shaha Al-Otaibi Rahim Khan +3 位作者 Hashim Ali Aftab Ahmed Khan Amir Saeed Jehad Ali 《Computers, Materials & Continua》 SCIE EI 2024年第3期3805-3823,共19页
The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective se... The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λ_(i) of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server S_(j) and members C_(i),with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs. 展开更多
关键词 internet of things AUTHENTICITY security LOCATION communication
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部