This study aims to investigate whether Corporate Social Responsibility(CSR)activities reduce supply chain disruptions by examining the impact of the Suez Canal obstruction on the Ever Given container ship in March 202...This study aims to investigate whether Corporate Social Responsibility(CSR)activities reduce supply chain disruptions by examining the impact of the Suez Canal obstruction on the Ever Given container ship in March 2021.This study conclude that the more responsible companies have higher returns and are less affected by this event than the less responsible companies;the less responsible companies have lower returns.The companies with better CSR have a lower impact on their supply chains when faced with disruptions in the supply chain.展开更多
Background In the recent digital era,individuals with internet gaming disorder(IGD)have reported a much higher prevalence of poor sleep quality,perceived stress and suicidal behaviour.However,the underlying mechanisms...Background In the recent digital era,individuals with internet gaming disorder(IGD)have reported a much higher prevalence of poor sleep quality,perceived stress and suicidal behaviour.However,the underlying mechanisms for these psychological problems remain unknown.Aims The primary aims of this study were to explore the mediating role of sleep quality on the relationship between IGD and the health outcomes of perceived stress and suicidal behaviour and to assess the prevalence and risk factors for IGD among medical students.Methods A cross-sectional study enrolling 795 medical students from two medical colleges in a rural area of North India was conducted from April to May 2022.The study participants were chosen using a stratified random sampling approach.A self-administered questionnaire was used to collect data,including sociodemographic and personal information and gaming characteristics.The study also included the Gaming Disorder and Hazardous Gaming Scale,the Pittsburgh Sleep Quality Index,the Perceived Stress Scale-10 and the Suicide Behaviors Questionnaire-Revised to measure IGD,sleep quality,perceived stress and suicidal behaviour,respectively.Multiple logistic regression for the risk factors and Pearson's correlation test for the relationship between variables were used.Hayes'PROCESS macro for SPSS was employed to carry out mediation analysis.Results Among the 348 gamers with a mean age of 21.03(SD 3.27)years,the prevalence of IGD was 15.23%(95%confidence interval:11.6%to 19.4%).In the correlational analysis,small to large(r:0.32-0.72)significant relationships between scores of IGD and other health outcomes were established.The indirect effect(B=0.300)via sleep quality accounted for 30.55%of the total effect(B=0.982)of IGD on perceived stress(partially mediated),while sleep quality(B=0.174)accounted for 27.93%of the total effect(B=0.623)of IGD on suicidal behaviour(partially mediated).The factors of being male,living in a single-parent family,using the internet for other than academic purposes(1-3 hours and more than 3 hours/day),playing games for more than 3 hours/day and playing games with violent content were associated with IGD symptoms.展开更多
Internet addiction and cyberbullying have emerged as significant global mental health concerns in recent years.Although previous studies have shown a close association between Internet addiction and cyberbullying,the u...Internet addiction and cyberbullying have emerged as significant global mental health concerns in recent years.Although previous studies have shown a close association between Internet addiction and cyberbullying,the underlying mechanisms connecting these two phenomena remain unclear.Therefore,this study aimed to reveal the mechanisms involved between Internet addiction and cyberbullying perpetration from the perspective of cognition function.This study recruited 976 Chinese youth through online survey,using the short version of Internet Addiction Test(s-IAT),Chinese Cyberbullying Intervention Project Questionnaire(C-CIPQ),Cyberbullying Moral Disengagement Scale(CMDS),and Internet Literacy Questionnaire(ILQ)to investigate the relationship between Internet addiction,moral disengagement,Internet literacy and cyberbullying perpetration.The keyfindings of this study were as follows:after controlling gender and age,(1)Internet addiction had a significant positive predictive effect on cyberbullying perpetration;(2)moral disengagement acted as a mediator between Internet addiction and cyberbullying perpetration;and(3)Internet literacy played a moderating role between moral disengagement and cyberbullying perpetration.In conclusion,there was a moderated mediating effect between Internet addiction and cyberbullying perpetration,contributing to a better understanding of the relationship between these two phenomena.展开更多
Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access sig...Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access significantly impacts agricultural production and improves smallholder farmers’income.Beyond these,the Internet can affect other dimensions of social welfare.However,research about the impact of Internet access on dietary quality in rural China remains scarce.This study utilizes multi-period panel data from Fixed Observation Point in rural China from 2009 to 2015 to estimate the impact of Internet access on dietary quality and food consumption of rural households and conducts a causal analysis.Regression models with time and household fixed effects allow robust estimation while reducing potential issues of unobserved heterogeneity.The estimates show that Internet access has significantly increased rural household dietary quality(measured by the Chinese Diet Balance Index).Further research finds that Internet access has increased the consumption of animal products,such as aquatic and dairy products.We also examine the underlying mechanisms.Internet access improves dietary quality and food consumption mainly through increasing household income and food expenditure.These results encourage the promotion of Internet access as a valuable tool for nutritional improvements,especially in rural areas.展开更多
The opening of the Panama Canal in 1913 increased the availability of internationally traded goods and transformed ocean-shipping by shortening travel time between the Atlantic Ocean and Pacific Ocean. The canal spark...The opening of the Panama Canal in 1913 increased the availability of internationally traded goods and transformed ocean-shipping by shortening travel time between the Atlantic Ocean and Pacific Ocean. The canal sparked the growth of port authorities and increased ship tonnage on both coasts of Panama. Since the construction of the Panama Canal, in the 1910s, pesticides, herbicides and chemicals, including arsenic, have been essential for controlling wetland vegetation, including hyacinth, which blocked rivers, lakes, and the canal as well as managing mosquitoes. Pesticides and chemicals flowed into Lake Gatun (reservoir) either attached to sediment or in solution during the monsoon season. Lake Gatun was the drinking water source for most of the people living in the Panama Canal Zone. The United States military base commanders had the ability to order and use cacodylic acid (arsenic based) from the Naval Depot Supply Federal and Stock Catalog and the later Federal Supply Catalog on the military base grounds in the Panama Canal Zone. Cacodylic acid was shipped to Panama Canal Zone ports, including Balboa and Cristobal, and distributed to the military bases by rail or truck. The objective of this study is to determine the fate of arsenic: 1) applied between 1914 and 1935 to Panama Canal shipping lane hyacinth and other wetland vegetation and 2) cacodylic acid (arsenic) sprayed from 1948 to 1999 on the US military base grounds in the Panama Canal Zone.展开更多
Theoretical models have predicted a positive association between anxiety and Internet use disorders.However,thefindings of previous studies are conflicting,with some reporting a positive association and others proposing...Theoretical models have predicted a positive association between anxiety and Internet use disorders.However,thefindings of previous studies are conflicting,with some reporting a positive association and others proposing no relationship between the two.To explore the true relationship between the two and analyze the reasons for the differences,100 primary studies involving 108,539 subjects were entered into a meta-analysis.The results showed that(1)there was a significant positive correlation between students’anxiety and Internet use disorder(r=0.330);(2)the moderating effect of anxiety type was significant.(3)The moderating effects of the measurement instrument for Internet use disorder,the measurement instrument for anxiety,the subject’s grade level,the subject’s region,and the type of publication were not significant.The question of how the different anxiety types of students and IUD have different mechanisms of action needs to be further explored.展开更多
High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency...High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV.展开更多
How to build an international maritime GHG(greenhouse gas)emission reduction cooperation mechanism is an important international issue at present.Firstly,we describe the current situation of maritime transport GHG emi...How to build an international maritime GHG(greenhouse gas)emission reduction cooperation mechanism is an important international issue at present.Firstly,we describe the current situation of maritime transport GHG emission reduction and analyze the problems that still exist in international maritime transport emission reduction from four aspects:political,economic,legal and technical.For example,geopolitical aggravation hinders the solution of the FOC(Flag of Convenience)issue;maritime emissions are not included in the carbon emission trading system;the synergy of maritime emission reduction principles under the IMO(International Maritime Organization)framework and the technical level of maritime emission reduction needs to be improved.The motivation and essence of the divergent international actions on maritime emission reduction are discussed.Finally,it is proposed to implement the“true linkage principle”to solve the problem of FOCs;to promote the development of regional carbon markets and link them to the international maritime carbon emission trading market economically;to implement the CBDR(the common but differentiated responsibilities)principle legally to promote the international emission reduction work in an orderly manner;and the technical innovation of ships and increase the technical support.展开更多
Aiming at defects such as low contrast in infrared ship images,uneven distribution of ship size,and lack of texture details,which will lead to unmanned ship leakage misdetection and slow detection,this paper proposes ...Aiming at defects such as low contrast in infrared ship images,uneven distribution of ship size,and lack of texture details,which will lead to unmanned ship leakage misdetection and slow detection,this paper proposes an infrared ship detection model based on the improved YOLOv8 algorithm(R_YOLO).The algorithm incorporates the Efficient Multi-Scale Attention mechanism(EMA),the efficient Reparameterized Generalized-feature extraction module(CSPStage),the small target detection header,the Repulsion Loss function,and the context aggregation block(CABlock),which are designed to improve the model’s ability to detect targets at multiple scales and the speed of model inference.The algorithm is validated in detail on two vessel datasets.The comprehensive experimental results demonstrate that,in the infrared dataset,the YOLOv8s algorithm exhibits improvements in various performance metrics.Specifically,compared to the baseline algorithm,there is a 3.1%increase in mean average precision at a threshold of 0.5(mAP(0.5)),a 5.4%increase in recall rate,and a 2.2%increase in mAP(0.5:0.95).Simultaneously,while less than 5 times parameters,the mAP(0.5)and frames per second(FPS)exhibit an increase of 1.7%and more than 3 times,respectively,compared to the CAA_YOLO algorithm.Finally,the evaluation indexes on the visible light data set have shown an average improvement of 4.5%.展开更多
Optical image-based ship detection can ensure the safety of ships and promote the orderly management of ships in offshore waters.Current deep learning researches on optical image-based ship detection mainly focus on i...Optical image-based ship detection can ensure the safety of ships and promote the orderly management of ships in offshore waters.Current deep learning researches on optical image-based ship detection mainly focus on improving one-stage detectors for real-time ship detection but sacrifices the accuracy of detection.To solve this problem,we present a hybrid ship detection framework which is named EfficientShip in this paper.The core parts of the EfficientShip are DLA-backboned object location(DBOL)and CascadeRCNN-guided object classification(CROC).The DBOL is responsible for finding potential ship objects,and the CROC is used to categorize the potential ship objects.We also design a pixel-spatial-level data augmentation(PSDA)to reduce the risk of detection model overfitting.We compare the proposed EfficientShip with state-of-the-art(SOTA)literature on a ship detection dataset called Seaships.Experiments show our ship detection framework achieves a result of 99.63%(mAP)at 45 fps,which is much better than 8 SOTA approaches on detection accuracy and can also meet the requirements of real-time application scenarios.展开更多
Fine-grained recognition of ships based on remote sensing images is crucial to safeguarding maritime rights and interests and maintaining national security.Currently,with the emergence of massive high-resolution multi...Fine-grained recognition of ships based on remote sensing images is crucial to safeguarding maritime rights and interests and maintaining national security.Currently,with the emergence of massive high-resolution multi-modality images,the use of multi-modality images for fine-grained recognition has become a promising technology.Fine-grained recognition of multi-modality images imposes higher requirements on the dataset samples.The key to the problem is how to extract and fuse the complementary features of multi-modality images to obtain more discriminative fusion features.The attention mechanism helps the model to pinpoint the key information in the image,resulting in a significant improvement in the model’s performance.In this paper,a dataset for fine-grained recognition of ships based on visible and near-infrared multi-modality remote sensing images has been proposed first,named Dataset for Multimodal Fine-grained Recognition of Ships(DMFGRS).It includes 1,635 pairs of visible and near-infrared remote sensing images divided into 20 categories,collated from digital orthophotos model provided by commercial remote sensing satellites.DMFGRS provides two types of annotation format files,as well as segmentation mask images corresponding to the ship targets.Then,a Multimodal Information Cross-Enhancement Network(MICE-Net)fusing features of visible and near-infrared remote sensing images,has been proposed.In the network,a dual-branch feature extraction and fusion module has been designed to obtain more expressive features.The Feature Cross Enhancement Module(FCEM)achieves the fusion enhancement of the two modal features by making the channel attention and spatial attention work cross-functionally on the feature map.A benchmark is established by evaluating state-of-the-art object recognition algorithms on DMFGRS.MICE-Net conducted experiments on DMFGRS,and the precision,recall,mAP0.5 and mAP0.5:0.95 reached 87%,77.1%,83.8%and 63.9%,respectively.Extensive experiments demonstrate that the proposed MICE-Net has more excellent performance on DMFGRS.Built on lightweight network YOLO,the model has excellent generalizability,and thus has good potential for application in real-life scenarios.展开更多
The constant panel method within the framework of potential flow theory in the time domain is developed for solving the hydrodynamic interactions between two parallel ships with forward speed.When solving problems wit...The constant panel method within the framework of potential flow theory in the time domain is developed for solving the hydrodynamic interactions between two parallel ships with forward speed.When solving problems within a time domain framework,the free water surface needs to simultaneously satisfy both the kinematic and dynamic boundary conditions of the free water surface.This provides conditions for adding artificial damping layers.Using the Runge−Kutta method to solve equations related to time.An upwind differential scheme is used in the present method to deal with the convection terms on the free surface to prevent waves upstream.Through the comparison with the available experimental data and other numerical methods,the present method is proved to have good mesh convergence,and satisfactory results can be obtained.The constant panel method is applied to calculate the hydrodynamic interaction responses of two parallel ships advancing in head waves.Numerical simulations are conducted on the effects of forward speed,different longitudinal and lateral distances on the motion response of two modified Wigley ships in head waves.Then further investigations are conducted on the effects of different ship types on the motion response.展开更多
The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasingdemands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device has...The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasingdemands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device hascaught the attention of cyber hackers, as it provides them with expanded avenues to access valuable data. Thishas resulted in a myriad of security challenges, including information leakage, malware propagation, and financialloss, among others. Consequently, developing an intrusion detection system to identify both active and potentialintrusion traffic in IoT networks is of paramount importance. In this paper, we propose ResNeSt-biGRU, a practicalintrusion detection model that combines the strengths of ResNeSt, a variant of Residual Neural Network, andbidirectionalGated RecurrentUnitNetwork (biGRU).Our ResNeSt-biGRUframework diverges fromconventionalintrusion detection systems (IDS) by employing this dual-layeredmechanism that exploits the temporal continuityand spatial feature within network data streams, a methodological innovation that enhances detection accuracy.In conjunction with this, we introduce the PreIoT dataset, a compilation of prevalent IoT network behaviors, totrain and evaluate IDSmodels with a focus on identifying potential intrusion traffics. The effectiveness of proposedscheme is demonstrated through testing, wherein it achieved an average accuracy of 99.90% on theN-BaIoT datasetas well as on the PreIoT dataset and 94.45% on UNSW-NB15 dataset. The outcomes of this research reveal thepotential of ResNeSt-biGRU to bolster security measures, diminish intrusion-related vulnerabilities, and preservethe overall security of IoT ecosystems.展开更多
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accide...The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks.展开更多
Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible t...Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes.展开更多
Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enh...Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enhance the range of network information services accessible to humans.With the transition of terrestrial mobile communication networks from the 5G era,which provides access to information anywhere,to the 6G era,which seeks to connect everything,the construction of satellite Internet,which promises a"network reaching everywhere and service is ubiquitous",has become the consensus of the industry's development and the focus of global scientific and technological innovation.展开更多
This paper focuses on the optimization method for multi-skilled painting personnel scheduling.The budget working time analysis is carried out considering the influence of operating area,difficulty of spraying area,mul...This paper focuses on the optimization method for multi-skilled painting personnel scheduling.The budget working time analysis is carried out considering the influence of operating area,difficulty of spraying area,multi-skilled workers,and worker’s efficiency,then a mathematical model is established to minimize the completion time. The constraints of task priority,paint preparation,pump management,and neighbor avoidance in the ship block painting production are considered. Based on this model,an improved scatter search(ISS)algorithm is designed,and the hybrid approximate dynamic programming(ADP)algorithm is used to improve search efficiency. In addition,the two solution combination methods of path-relinking and task sequence combination are used to enhance the search breadth and depth. The numerical experimental results show that ISS has a significant advantage in solving efficiency compared with the solver in small scale instances;Compared with the scatter search algorithm and genetic algorithm,ISS can stably improve the solution quality. Verified by the production example,ISS effectively shortens the total completion time of the production,which is suitable for scheduling problems in the actual painting production of the shipyard.展开更多
“The sky is dark,and it is about to rain,”goes a lyric from China’s coastal Minnan(southern Fujian)region.“The king ship is leaving the bay,papa is going out to sea,and mama is sending the ship off.May it bring us...“The sky is dark,and it is about to rain,”goes a lyric from China’s coastal Minnan(southern Fujian)region.“The king ship is leaving the bay,papa is going out to sea,and mama is sending the ship off.May it bring us wealth,food,and the gods’protection.”The 600-year-old custom is called Ong Chun,Wangchuan,Wangkang,or“Sending the King Ship.”展开更多
Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is ...Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still thebiggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services providedby an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures,data, and devices. Authentication, as the first line of defense against security threats, becomes the priority ofeveryone. It can either grant or deny users access to resources according to their legitimacy. As a result, studyingand researching authentication issues within IoT is extremely important. As a result, studying and researchingauthentication issues within IoT is extremely important. This article presents a comparative study of recent researchin IoT security;it provides an analysis of recent authentication protocols from2019 to 2023 that cover several areaswithin IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security researchsummary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. Itillustrates that the resistance of protocols against attacks, and their computational and communication cost arelinked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemesand provides some future research directions.展开更多
The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective se...The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λ_(i) of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server S_(j) and members C_(i),with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs.展开更多
文摘This study aims to investigate whether Corporate Social Responsibility(CSR)activities reduce supply chain disruptions by examining the impact of the Suez Canal obstruction on the Ever Given container ship in March 2021.This study conclude that the more responsible companies have higher returns and are less affected by this event than the less responsible companies;the less responsible companies have lower returns.The companies with better CSR have a lower impact on their supply chains when faced with disruptions in the supply chain.
文摘Background In the recent digital era,individuals with internet gaming disorder(IGD)have reported a much higher prevalence of poor sleep quality,perceived stress and suicidal behaviour.However,the underlying mechanisms for these psychological problems remain unknown.Aims The primary aims of this study were to explore the mediating role of sleep quality on the relationship between IGD and the health outcomes of perceived stress and suicidal behaviour and to assess the prevalence and risk factors for IGD among medical students.Methods A cross-sectional study enrolling 795 medical students from two medical colleges in a rural area of North India was conducted from April to May 2022.The study participants were chosen using a stratified random sampling approach.A self-administered questionnaire was used to collect data,including sociodemographic and personal information and gaming characteristics.The study also included the Gaming Disorder and Hazardous Gaming Scale,the Pittsburgh Sleep Quality Index,the Perceived Stress Scale-10 and the Suicide Behaviors Questionnaire-Revised to measure IGD,sleep quality,perceived stress and suicidal behaviour,respectively.Multiple logistic regression for the risk factors and Pearson's correlation test for the relationship between variables were used.Hayes'PROCESS macro for SPSS was employed to carry out mediation analysis.Results Among the 348 gamers with a mean age of 21.03(SD 3.27)years,the prevalence of IGD was 15.23%(95%confidence interval:11.6%to 19.4%).In the correlational analysis,small to large(r:0.32-0.72)significant relationships between scores of IGD and other health outcomes were established.The indirect effect(B=0.300)via sleep quality accounted for 30.55%of the total effect(B=0.982)of IGD on perceived stress(partially mediated),while sleep quality(B=0.174)accounted for 27.93%of the total effect(B=0.623)of IGD on suicidal behaviour(partially mediated).The factors of being male,living in a single-parent family,using the internet for other than academic purposes(1-3 hours and more than 3 hours/day),playing games for more than 3 hours/day and playing games with violent content were associated with IGD symptoms.
基金supported by the Social Sciences Research Funding of Jiangsu Province(Grant No.19JYC002)Humanities and Social Sciences Research Funding of Minister of Education in China(Grant No.20YJC880104)+1 种基金Postdoctoral Research Funding of Jiangsu Province(Grant No.2021K460C)Shenzhen Education Science Planning Project(Grant No.zdzz22008).
文摘Internet addiction and cyberbullying have emerged as significant global mental health concerns in recent years.Although previous studies have shown a close association between Internet addiction and cyberbullying,the underlying mechanisms connecting these two phenomena remain unclear.Therefore,this study aimed to reveal the mechanisms involved between Internet addiction and cyberbullying perpetration from the perspective of cognition function.This study recruited 976 Chinese youth through online survey,using the short version of Internet Addiction Test(s-IAT),Chinese Cyberbullying Intervention Project Questionnaire(C-CIPQ),Cyberbullying Moral Disengagement Scale(CMDS),and Internet Literacy Questionnaire(ILQ)to investigate the relationship between Internet addiction,moral disengagement,Internet literacy and cyberbullying perpetration.The keyfindings of this study were as follows:after controlling gender and age,(1)Internet addiction had a significant positive predictive effect on cyberbullying perpetration;(2)moral disengagement acted as a mediator between Internet addiction and cyberbullying perpetration;and(3)Internet literacy played a moderating role between moral disengagement and cyberbullying perpetration.In conclusion,there was a moderated mediating effect between Internet addiction and cyberbullying perpetration,contributing to a better understanding of the relationship between these two phenomena.
基金This study was supported in part by the National Natural Science Foundation of China(71973136 and 72061147002)the 2115 Talent Development Program of China Agricultural University.
文摘Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access significantly impacts agricultural production and improves smallholder farmers’income.Beyond these,the Internet can affect other dimensions of social welfare.However,research about the impact of Internet access on dietary quality in rural China remains scarce.This study utilizes multi-period panel data from Fixed Observation Point in rural China from 2009 to 2015 to estimate the impact of Internet access on dietary quality and food consumption of rural households and conducts a causal analysis.Regression models with time and household fixed effects allow robust estimation while reducing potential issues of unobserved heterogeneity.The estimates show that Internet access has significantly increased rural household dietary quality(measured by the Chinese Diet Balance Index).Further research finds that Internet access has increased the consumption of animal products,such as aquatic and dairy products.We also examine the underlying mechanisms.Internet access improves dietary quality and food consumption mainly through increasing household income and food expenditure.These results encourage the promotion of Internet access as a valuable tool for nutritional improvements,especially in rural areas.
文摘The opening of the Panama Canal in 1913 increased the availability of internationally traded goods and transformed ocean-shipping by shortening travel time between the Atlantic Ocean and Pacific Ocean. The canal sparked the growth of port authorities and increased ship tonnage on both coasts of Panama. Since the construction of the Panama Canal, in the 1910s, pesticides, herbicides and chemicals, including arsenic, have been essential for controlling wetland vegetation, including hyacinth, which blocked rivers, lakes, and the canal as well as managing mosquitoes. Pesticides and chemicals flowed into Lake Gatun (reservoir) either attached to sediment or in solution during the monsoon season. Lake Gatun was the drinking water source for most of the people living in the Panama Canal Zone. The United States military base commanders had the ability to order and use cacodylic acid (arsenic based) from the Naval Depot Supply Federal and Stock Catalog and the later Federal Supply Catalog on the military base grounds in the Panama Canal Zone. Cacodylic acid was shipped to Panama Canal Zone ports, including Balboa and Cristobal, and distributed to the military bases by rail or truck. The objective of this study is to determine the fate of arsenic: 1) applied between 1914 and 1935 to Panama Canal shipping lane hyacinth and other wetland vegetation and 2) cacodylic acid (arsenic) sprayed from 1948 to 1999 on the US military base grounds in the Panama Canal Zone.
基金supported by“An Empirical Study on the Relationship between Mobile Phone Dependence and Social Anxiety among Adolescents in the Post-COVID-19 Era”(LJKMR20221512)"LiaoNing Revitalization Talents Program"(grant no.XLYC2007134).
文摘Theoretical models have predicted a positive association between anxiety and Internet use disorders.However,thefindings of previous studies are conflicting,with some reporting a positive association and others proposing no relationship between the two.To explore the true relationship between the two and analyze the reasons for the differences,100 primary studies involving 108,539 subjects were entered into a meta-analysis.The results showed that(1)there was a significant positive correlation between students’anxiety and Internet use disorder(r=0.330);(2)the moderating effect of anxiety type was significant.(3)The moderating effects of the measurement instrument for Internet use disorder,the measurement instrument for anxiety,the subject’s grade level,the subject’s region,and the type of publication were not significant.The question of how the different anxiety types of students and IUD have different mechanisms of action needs to be further explored.
基金supported in part by the National Natural Science Foundation of China(62371116 and 62231020)in part by the Science and Technology Project of Hebei Province Education Department(ZD2022164)+2 种基金in part by the Fundamental Research Funds for the Central Universities(N2223031)in part by the Open Research Project of Xidian University(ISN24-08)Key Laboratory of Cognitive Radio and Information Processing,Ministry of Education(Guilin University of Electronic Technology,China,CRKL210203)。
文摘High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV.
文摘How to build an international maritime GHG(greenhouse gas)emission reduction cooperation mechanism is an important international issue at present.Firstly,we describe the current situation of maritime transport GHG emission reduction and analyze the problems that still exist in international maritime transport emission reduction from four aspects:political,economic,legal and technical.For example,geopolitical aggravation hinders the solution of the FOC(Flag of Convenience)issue;maritime emissions are not included in the carbon emission trading system;the synergy of maritime emission reduction principles under the IMO(International Maritime Organization)framework and the technical level of maritime emission reduction needs to be improved.The motivation and essence of the divergent international actions on maritime emission reduction are discussed.Finally,it is proposed to implement the“true linkage principle”to solve the problem of FOCs;to promote the development of regional carbon markets and link them to the international maritime carbon emission trading market economically;to implement the CBDR(the common but differentiated responsibilities)principle legally to promote the international emission reduction work in an orderly manner;and the technical innovation of ships and increase the technical support.
文摘Aiming at defects such as low contrast in infrared ship images,uneven distribution of ship size,and lack of texture details,which will lead to unmanned ship leakage misdetection and slow detection,this paper proposes an infrared ship detection model based on the improved YOLOv8 algorithm(R_YOLO).The algorithm incorporates the Efficient Multi-Scale Attention mechanism(EMA),the efficient Reparameterized Generalized-feature extraction module(CSPStage),the small target detection header,the Repulsion Loss function,and the context aggregation block(CABlock),which are designed to improve the model’s ability to detect targets at multiple scales and the speed of model inference.The algorithm is validated in detail on two vessel datasets.The comprehensive experimental results demonstrate that,in the infrared dataset,the YOLOv8s algorithm exhibits improvements in various performance metrics.Specifically,compared to the baseline algorithm,there is a 3.1%increase in mean average precision at a threshold of 0.5(mAP(0.5)),a 5.4%increase in recall rate,and a 2.2%increase in mAP(0.5:0.95).Simultaneously,while less than 5 times parameters,the mAP(0.5)and frames per second(FPS)exhibit an increase of 1.7%and more than 3 times,respectively,compared to the CAA_YOLO algorithm.Finally,the evaluation indexes on the visible light data set have shown an average improvement of 4.5%.
基金This work was supported by the Outstanding Youth Science and Technology Innovation Team Project of Colleges and Universities in Hubei Province(Grant No.T201923)Key Science and Technology Project of Jingmen(Grant Nos.2021ZDYF024,2022ZDYF019)+2 种基金LIAS Pioneering Partnerships Award,UK(Grant No.P202ED10)Data Science Enhancement Fund,UK(Grant No.P202RE237)Cultivation Project of Jingchu University of Technology(Grant No.PY201904).
文摘Optical image-based ship detection can ensure the safety of ships and promote the orderly management of ships in offshore waters.Current deep learning researches on optical image-based ship detection mainly focus on improving one-stage detectors for real-time ship detection but sacrifices the accuracy of detection.To solve this problem,we present a hybrid ship detection framework which is named EfficientShip in this paper.The core parts of the EfficientShip are DLA-backboned object location(DBOL)and CascadeRCNN-guided object classification(CROC).The DBOL is responsible for finding potential ship objects,and the CROC is used to categorize the potential ship objects.We also design a pixel-spatial-level data augmentation(PSDA)to reduce the risk of detection model overfitting.We compare the proposed EfficientShip with state-of-the-art(SOTA)literature on a ship detection dataset called Seaships.Experiments show our ship detection framework achieves a result of 99.63%(mAP)at 45 fps,which is much better than 8 SOTA approaches on detection accuracy and can also meet the requirements of real-time application scenarios.
文摘Fine-grained recognition of ships based on remote sensing images is crucial to safeguarding maritime rights and interests and maintaining national security.Currently,with the emergence of massive high-resolution multi-modality images,the use of multi-modality images for fine-grained recognition has become a promising technology.Fine-grained recognition of multi-modality images imposes higher requirements on the dataset samples.The key to the problem is how to extract and fuse the complementary features of multi-modality images to obtain more discriminative fusion features.The attention mechanism helps the model to pinpoint the key information in the image,resulting in a significant improvement in the model’s performance.In this paper,a dataset for fine-grained recognition of ships based on visible and near-infrared multi-modality remote sensing images has been proposed first,named Dataset for Multimodal Fine-grained Recognition of Ships(DMFGRS).It includes 1,635 pairs of visible and near-infrared remote sensing images divided into 20 categories,collated from digital orthophotos model provided by commercial remote sensing satellites.DMFGRS provides two types of annotation format files,as well as segmentation mask images corresponding to the ship targets.Then,a Multimodal Information Cross-Enhancement Network(MICE-Net)fusing features of visible and near-infrared remote sensing images,has been proposed.In the network,a dual-branch feature extraction and fusion module has been designed to obtain more expressive features.The Feature Cross Enhancement Module(FCEM)achieves the fusion enhancement of the two modal features by making the channel attention and spatial attention work cross-functionally on the feature map.A benchmark is established by evaluating state-of-the-art object recognition algorithms on DMFGRS.MICE-Net conducted experiments on DMFGRS,and the precision,recall,mAP0.5 and mAP0.5:0.95 reached 87%,77.1%,83.8%and 63.9%,respectively.Extensive experiments demonstrate that the proposed MICE-Net has more excellent performance on DMFGRS.Built on lightweight network YOLO,the model has excellent generalizability,and thus has good potential for application in real-life scenarios.
基金supported by the National Natural Science Foundation of China(Grant Nos.52271278 and 52111530137)the Natural Science Found of Jiangsu Province(Grant No.BK20221389)the Newton Advanced Fellowships(Grant No.NAF\R1\180304)by the Royal Society.
文摘The constant panel method within the framework of potential flow theory in the time domain is developed for solving the hydrodynamic interactions between two parallel ships with forward speed.When solving problems within a time domain framework,the free water surface needs to simultaneously satisfy both the kinematic and dynamic boundary conditions of the free water surface.This provides conditions for adding artificial damping layers.Using the Runge−Kutta method to solve equations related to time.An upwind differential scheme is used in the present method to deal with the convection terms on the free surface to prevent waves upstream.Through the comparison with the available experimental data and other numerical methods,the present method is proved to have good mesh convergence,and satisfactory results can be obtained.The constant panel method is applied to calculate the hydrodynamic interaction responses of two parallel ships advancing in head waves.Numerical simulations are conducted on the effects of forward speed,different longitudinal and lateral distances on the motion response of two modified Wigley ships in head waves.Then further investigations are conducted on the effects of different ship types on the motion response.
基金the National Natural Science Foundation of China(No.61662004).
文摘The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasingdemands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device hascaught the attention of cyber hackers, as it provides them with expanded avenues to access valuable data. Thishas resulted in a myriad of security challenges, including information leakage, malware propagation, and financialloss, among others. Consequently, developing an intrusion detection system to identify both active and potentialintrusion traffic in IoT networks is of paramount importance. In this paper, we propose ResNeSt-biGRU, a practicalintrusion detection model that combines the strengths of ResNeSt, a variant of Residual Neural Network, andbidirectionalGated RecurrentUnitNetwork (biGRU).Our ResNeSt-biGRUframework diverges fromconventionalintrusion detection systems (IDS) by employing this dual-layeredmechanism that exploits the temporal continuityand spatial feature within network data streams, a methodological innovation that enhances detection accuracy.In conjunction with this, we introduce the PreIoT dataset, a compilation of prevalent IoT network behaviors, totrain and evaluate IDSmodels with a focus on identifying potential intrusion traffics. The effectiveness of proposedscheme is demonstrated through testing, wherein it achieved an average accuracy of 99.90% on theN-BaIoT datasetas well as on the PreIoT dataset and 94.45% on UNSW-NB15 dataset. The outcomes of this research reveal thepotential of ResNeSt-biGRU to bolster security measures, diminish intrusion-related vulnerabilities, and preservethe overall security of IoT ecosystems.
基金This paper is financed by the European Union-NextGenerationEU,through the National Recovery and Resilience Plan of the Republic of Bulgaria,Project No.BG-RRP-2.004-0001-C01.
文摘The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks.
文摘Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes.
文摘Satellite Internet,as a strategic public information infrastructure,can effectively bridge the limitations of traditional terrestrial network coverage,support global coverage and deep space exploration,and greatly enhance the range of network information services accessible to humans.With the transition of terrestrial mobile communication networks from the 5G era,which provides access to information anywhere,to the 6G era,which seeks to connect everything,the construction of satellite Internet,which promises a"network reaching everywhere and service is ubiquitous",has become the consensus of the industry's development and the focus of global scientific and technological innovation.
基金Sponsored by the Ministry of Industry and Information Technology of China(Grant No.MIIT[2019]359)。
文摘This paper focuses on the optimization method for multi-skilled painting personnel scheduling.The budget working time analysis is carried out considering the influence of operating area,difficulty of spraying area,multi-skilled workers,and worker’s efficiency,then a mathematical model is established to minimize the completion time. The constraints of task priority,paint preparation,pump management,and neighbor avoidance in the ship block painting production are considered. Based on this model,an improved scatter search(ISS)algorithm is designed,and the hybrid approximate dynamic programming(ADP)algorithm is used to improve search efficiency. In addition,the two solution combination methods of path-relinking and task sequence combination are used to enhance the search breadth and depth. The numerical experimental results show that ISS has a significant advantage in solving efficiency compared with the solver in small scale instances;Compared with the scatter search algorithm and genetic algorithm,ISS can stably improve the solution quality. Verified by the production example,ISS effectively shortens the total completion time of the production,which is suitable for scheduling problems in the actual painting production of the shipyard.
文摘“The sky is dark,and it is about to rain,”goes a lyric from China’s coastal Minnan(southern Fujian)region.“The king ship is leaving the bay,papa is going out to sea,and mama is sending the ship off.May it bring us wealth,food,and the gods’protection.”The 600-year-old custom is called Ong Chun,Wangchuan,Wangkang,or“Sending the King Ship.”
文摘Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still thebiggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services providedby an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures,data, and devices. Authentication, as the first line of defense against security threats, becomes the priority ofeveryone. It can either grant or deny users access to resources according to their legitimacy. As a result, studyingand researching authentication issues within IoT is extremely important. As a result, studying and researchingauthentication issues within IoT is extremely important. This article presents a comparative study of recent researchin IoT security;it provides an analysis of recent authentication protocols from2019 to 2023 that cover several areaswithin IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security researchsummary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. Itillustrates that the resistance of protocols against attacks, and their computational and communication cost arelinked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemesand provides some future research directions.
文摘The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λ_(i) of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server S_(j) and members C_(i),with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs.