Dear Editor,This letter deals with state estimation issues of discrete-time nonlinear systems subject to denial-of-service(DoS)attacks under the try-once-discard(TOD)protocol.More specifically,to reduce the communicat...Dear Editor,This letter deals with state estimation issues of discrete-time nonlinear systems subject to denial-of-service(DoS)attacks under the try-once-discard(TOD)protocol.More specifically,to reduce the communication burden,a TOD protocol with novel update rules on protocol weights is designed for scheduling measurement outputs.In addition,unknown nonlinear functions vulnerable to DoS attacks are considered due to the openness and vulnerability of the network.展开更多
Emerging mobile edge computing(MEC)is considered a feasible solution for offloading the computation-intensive request tasks generated from mobile wireless equipment(MWE)with limited computational resources and energy....Emerging mobile edge computing(MEC)is considered a feasible solution for offloading the computation-intensive request tasks generated from mobile wireless equipment(MWE)with limited computational resources and energy.Due to the homogeneity of request tasks from one MWE during a longterm time period,it is vital to predeploy the particular service cachings required by the request tasks at the MEC server.In this paper,we model a service caching-assisted MEC framework that takes into account the constraint on the number of service cachings hosted by each edge server and the migration of request tasks from the current edge server to another edge server with service caching required by tasks.Furthermore,we propose a multiagent deep reinforcement learning-based computation offloading and task migrating decision-making scheme(MBOMS)to minimize the long-term average weighted cost.The proposed MBOMS can learn the near-optimal offloading and migrating decision-making policy by centralized training and decentralized execution.Systematic and comprehensive simulation results reveal that our proposed MBOMS can converge well after training and outperforms the other five baseline algorithms.展开更多
The primary concern of modern technology is cyber attacks targeting the Internet of Things.As it is one of the most widely used networks today and vulnerable to attacks.Real-time threats pose with modern cyber attacks...The primary concern of modern technology is cyber attacks targeting the Internet of Things.As it is one of the most widely used networks today and vulnerable to attacks.Real-time threats pose with modern cyber attacks that pose a great danger to the Internet of Things(IoT)networks,as devices can be monitored or service isolated from them and affect users in one way or another.Securing Internet of Things networks is an important matter,as it requires the use of modern technologies and methods,and real and up-to-date data to design and train systems to keep pace with the modernity that attackers use to confront these attacks.One of the most common types of attacks against IoT devices is Distributed Denial-of-Service(DDoS)attacks.Our paper makes a unique contribution that differs from existing studies,in that we use recent data that contains real traffic and real attacks on IoT networks.And a hybrid method for selecting relevant features,And also how to choose highly efficient algorithms.What gives the model a high ability to detect distributed denial-of-service attacks.the model proposed is based on a two-stage process:selecting essential features and constructing a detection model using the K-neighbors algorithm with two classifier algorithms logistic regression and Stochastic Gradient Descent classifier(SGD),combining these classifiers through ensemble machine learning(stacking),and optimizing parameters through Grid Search-CV to enhance system accuracy.Experiments were conducted to evaluate the effectiveness of the proposed model using the CIC-IoT2023 and CIC-DDoS2019 datasets.Performance evaluation demonstrated the potential of our model in robust intrusion detection in IoT networks,achieving an accuracy of 99.965%and a detection time of 0.20 s for the CIC-IoT2023 dataset,and 99.968%accuracy with a detection time of 0.23 s for the CIC-DDoS 2019 dataset.Furthermore,a comparative analysis with recent related works highlighted the superiority of our methodology in intrusion detection,showing improvements in accuracy,recall,and detection time.展开更多
In 2024,the China International Fair for Trade in Services (hereinafter referred to as CIFTIS) opened in the China National Convention Center and Shougang Park on September 12th.The theme of the CIFTIS this time was&q...In 2024,the China International Fair for Trade in Services (hereinafter referred to as CIFTIS) opened in the China National Convention Center and Shougang Park on September 12th.The theme of the CIFTIS this time was"global services,shared prosperity",which is not only a window for allowing the world to discover the development of China's service trade,but is also a bridge for promoting global cooperation with regards to the service trade.As one of the world-famous service trade events,the CIFTIS has become an important business card allowing China to open up.The CIFTIS has attracted the attention of the whole world and become a bridge for all parties to share development opportunities,promote industrial growth,and strengthen communication.展开更多
Understanding stakeholders’differences in perceptions of ecosystem services(ES)is crucial for guiding ecolog-ical conservation and planning.However,the variations of ES perception amongst different types of residents...Understanding stakeholders’differences in perceptions of ecosystem services(ES)is crucial for guiding ecolog-ical conservation and planning.However,the variations of ES perception amongst different types of residents in urbanizing areas along an urban-rural gradient are still poorly understood.Combining a questionnaire-based survey,redundancy analysis,and statistical tests,we delineated the urban-rural gradient according to local res-idents’socio-economic characteristics,and investigated the differences in local residents’perceptions of ES and potential factors affecting them in the Guanting Reservoir basin,a rapidly urbanizing basin in China.The results showed that residents living in urban-rural transitional areas attached great importance to provisioning services of providing food and domestic water,regulating services of carbon sequestration and air purification,and cul-tural services of providing education and training,which were 0.7%-13.1%,0.7%-9.1%and 2.5%-21.2%higher than that of residents in other areas,respectively.Age and occupation were major factors affecting residents’perceptions.In terms of land-use types that deliver ES,the difference in perceptions of ES delivered by grassland was the greatest amongst residents.Our results support recommendations for policymakers to take into account the stakeholders’diverse perceptions,thus promoting residents’sense of gain on ES.展开更多
The global ionosphere maps(GIM)provided by the International GNSS Service(IGS)are extensively utilized for ionospheric morphology monitoring,scientific research,and practical application.Assessing the credibility of G...The global ionosphere maps(GIM)provided by the International GNSS Service(IGS)are extensively utilized for ionospheric morphology monitoring,scientific research,and practical application.Assessing the credibility of GIM products in data-sparse regions is of paramount importance.In this study,measurements from the Crustal Movement Observation Network of China(CMONOC)are leveraged to evaluate the suitability of IGS-GIM products over China region in 2013-2014.The indices of mean error(ME),root mean square error(RMSE),and normalized RMSE(NRMSE)are then utilized to quantify the accuracy of IGS-GIM products.Results revealed distinct local time and latitudinal dependencies in IGS-GIM errors,with substantially high errors at nighttime(NRMSE:39%)and above 40°latitude(NRMSE:49%).Seasonal differences also emerged,with larger equinoctial deviations(NRMSE:33.5%)compared with summer(20%).A preliminary analysis implied that the irregular assimilation of sparse IGS observations,compounded by China’s distinct geomagnetic topology,may manifest as error variations.These results suggest that modeling based solely on IGS-GIM observations engenders inadequate representations across China and that a thorough examination would proffer the necessary foundation for advancing regional total electron content(TEC)constructions.展开更多
The distribution of continuous service time in call centers is investigated.A non-Maxwellian collision kernel combining two different value functions in the interaction rule are used to describe the evolution of conti...The distribution of continuous service time in call centers is investigated.A non-Maxwellian collision kernel combining two different value functions in the interaction rule are used to describe the evolution of continuous service time,respectively.Using the statistical mechanical and asymptotic limit methods,Fokker–Planck equations are derived from the corresponding Boltzmann-type equations with non-Maxwellian collision kernels.The steady-state solutions of the Fokker–Planck equation are obtained in exact form.Numerical experiments are provided to support our results under different parameters.展开更多
The safety and longevity of key blast furnace(BF)equipment determine the stable and low-carbon production of iron.This pa-per presents an analysis of the heat transfer characteristics of these components and the uneve...The safety and longevity of key blast furnace(BF)equipment determine the stable and low-carbon production of iron.This pa-per presents an analysis of the heat transfer characteristics of these components and the uneven distribution of cooling water in parallel pipes based on hydrodynamic principles,discusses the feasible methods for the improvement of BF cooling intensity,and reviews the pre-paration process,performance,and damage characteristics of three key equipment pieces:coolers,tuyeres,and hearth refractories.Fur-thermoere,to attain better control of these critical components under high-temperature working conditions,we propose the application of optimized technologies,such as BF operation and maintenance technology,self-repair technology,and full-lifecycle management techno-logy.Finally,we propose further researches on safety assessments and predictions for key BF equipment under new operating conditions.展开更多
In an attempt to assess the Kenyan healthcare system, this study looks at the current efforts that are already in place, what challenges they face, and what strategies can be put into practice to foster interoperabili...In an attempt to assess the Kenyan healthcare system, this study looks at the current efforts that are already in place, what challenges they face, and what strategies can be put into practice to foster interoperability. By reviewing a variety of literature and using statistics, the paper ascertains notable impediments such as the absence of standard protocols, lack of adequate technological infrastructure, and weak regulatory frameworks. Resultant effects from these challenges regarding health provision target enhanced data sharing and merging for better patient outcomes and allocation of resources. It also highlights several opportunities that include the adoption of emerging technologies, and the establishment of public-private partnerships to strengthen the healthcare framework among others. In this regard, the article provides recommendations based on stakeholder views and global best practices addressed to policymakers, medical practitioners, and IT specialists concerned with achieving effective interoperability within Kenya’s health system. This research is relevant because it adds knowledge to the existing literature on how healthcare quality can be improved to make it more patient-centered especially in Kenya.展开更多
This paper discusses a queueing system with a retrial orbit and batch service, in which the quantity of customers’ rooms in the queue is finite and the space of retrial orbit is infinite. When the server starts servi...This paper discusses a queueing system with a retrial orbit and batch service, in which the quantity of customers’ rooms in the queue is finite and the space of retrial orbit is infinite. When the server starts serving, it serves all customers in the queue in a single batch, which is the so-called batch service. If a new customer or a retrial customer finds all the customers’ rooms are occupied, he will decide whether or not to join the retrial orbit. By using the censoring technique and the matrix analysis method, we first obtain the decay function of the stationary distribution for the quantity of customers in the retrial orbit and the quantity of customers in the queue. Then based on the form of decay rate function and the Karamata Tauberian theorem, we finally get the exact tail asymptotics of the stationary distribution.展开更多
基金supported in part by the Shandong Provincial Natural Science Foundation(ZR2021QF057)Taishan Scholars Program(tsqn202211203)+3 种基金Shandong Provincial Higher Education Youth Innovation Team Development Project(2022KJ 290)“20 New Universities”Project of Jinan City(202228077)QLU/SDAS Computer Science and Technology Fundamental Research Enhancement Program(2021JC02023)QLU/SDAS Pilot Project for Integrated Innovation of Science,Education,and Industry(2022JBZ01-01).
文摘Dear Editor,This letter deals with state estimation issues of discrete-time nonlinear systems subject to denial-of-service(DoS)attacks under the try-once-discard(TOD)protocol.More specifically,to reduce the communication burden,a TOD protocol with novel update rules on protocol weights is designed for scheduling measurement outputs.In addition,unknown nonlinear functions vulnerable to DoS attacks are considered due to the openness and vulnerability of the network.
基金supported by Jilin Provincial Science and Technology Department Natural Science Foundation of China(20210101415JC)Jilin Provincial Science and Technology Department Free exploration research project of China(YDZJ202201ZYTS642).
文摘Emerging mobile edge computing(MEC)is considered a feasible solution for offloading the computation-intensive request tasks generated from mobile wireless equipment(MWE)with limited computational resources and energy.Due to the homogeneity of request tasks from one MWE during a longterm time period,it is vital to predeploy the particular service cachings required by the request tasks at the MEC server.In this paper,we model a service caching-assisted MEC framework that takes into account the constraint on the number of service cachings hosted by each edge server and the migration of request tasks from the current edge server to another edge server with service caching required by tasks.Furthermore,we propose a multiagent deep reinforcement learning-based computation offloading and task migrating decision-making scheme(MBOMS)to minimize the long-term average weighted cost.The proposed MBOMS can learn the near-optimal offloading and migrating decision-making policy by centralized training and decentralized execution.Systematic and comprehensive simulation results reveal that our proposed MBOMS can converge well after training and outperforms the other five baseline algorithms.
文摘The primary concern of modern technology is cyber attacks targeting the Internet of Things.As it is one of the most widely used networks today and vulnerable to attacks.Real-time threats pose with modern cyber attacks that pose a great danger to the Internet of Things(IoT)networks,as devices can be monitored or service isolated from them and affect users in one way or another.Securing Internet of Things networks is an important matter,as it requires the use of modern technologies and methods,and real and up-to-date data to design and train systems to keep pace with the modernity that attackers use to confront these attacks.One of the most common types of attacks against IoT devices is Distributed Denial-of-Service(DDoS)attacks.Our paper makes a unique contribution that differs from existing studies,in that we use recent data that contains real traffic and real attacks on IoT networks.And a hybrid method for selecting relevant features,And also how to choose highly efficient algorithms.What gives the model a high ability to detect distributed denial-of-service attacks.the model proposed is based on a two-stage process:selecting essential features and constructing a detection model using the K-neighbors algorithm with two classifier algorithms logistic regression and Stochastic Gradient Descent classifier(SGD),combining these classifiers through ensemble machine learning(stacking),and optimizing parameters through Grid Search-CV to enhance system accuracy.Experiments were conducted to evaluate the effectiveness of the proposed model using the CIC-IoT2023 and CIC-DDoS2019 datasets.Performance evaluation demonstrated the potential of our model in robust intrusion detection in IoT networks,achieving an accuracy of 99.965%and a detection time of 0.20 s for the CIC-IoT2023 dataset,and 99.968%accuracy with a detection time of 0.23 s for the CIC-DDoS 2019 dataset.Furthermore,a comparative analysis with recent related works highlighted the superiority of our methodology in intrusion detection,showing improvements in accuracy,recall,and detection time.
文摘In 2024,the China International Fair for Trade in Services (hereinafter referred to as CIFTIS) opened in the China National Convention Center and Shougang Park on September 12th.The theme of the CIFTIS this time was"global services,shared prosperity",which is not only a window for allowing the world to discover the development of China's service trade,but is also a bridge for promoting global cooperation with regards to the service trade.As one of the world-famous service trade events,the CIFTIS has become an important business card allowing China to open up.The CIFTIS has attracted the attention of the whole world and become a bridge for all parties to share development opportunities,promote industrial growth,and strengthen communication.
基金supported by the National Natural Science Foundation of China(Grant No.42361144859)Beijing Nova Pro-gram(Grant No.20220484163)Beijing Normal University Tang Scholar.
文摘Understanding stakeholders’differences in perceptions of ecosystem services(ES)is crucial for guiding ecolog-ical conservation and planning.However,the variations of ES perception amongst different types of residents in urbanizing areas along an urban-rural gradient are still poorly understood.Combining a questionnaire-based survey,redundancy analysis,and statistical tests,we delineated the urban-rural gradient according to local res-idents’socio-economic characteristics,and investigated the differences in local residents’perceptions of ES and potential factors affecting them in the Guanting Reservoir basin,a rapidly urbanizing basin in China.The results showed that residents living in urban-rural transitional areas attached great importance to provisioning services of providing food and domestic water,regulating services of carbon sequestration and air purification,and cul-tural services of providing education and training,which were 0.7%-13.1%,0.7%-9.1%and 2.5%-21.2%higher than that of residents in other areas,respectively.Age and occupation were major factors affecting residents’perceptions.In terms of land-use types that deliver ES,the difference in perceptions of ES delivered by grassland was the greatest amongst residents.Our results support recommendations for policymakers to take into account the stakeholders’diverse perceptions,thus promoting residents’sense of gain on ES.
基金the National Key R&D Program of China(Grant No.2022YFF0503702)the National Natural Science Foundation of China(Grant Nos.42074186,41831071,42004136,and 42274195)+1 种基金the Natural Science Foundation of Jiangsu Province(Grant No.BK20211036)the Specialized Research Fund for State Key Laboratories,and the University of Science and Technology of China Research Funds of the Double First-Class Initiative(Grant No.YD2080002013).
文摘The global ionosphere maps(GIM)provided by the International GNSS Service(IGS)are extensively utilized for ionospheric morphology monitoring,scientific research,and practical application.Assessing the credibility of GIM products in data-sparse regions is of paramount importance.In this study,measurements from the Crustal Movement Observation Network of China(CMONOC)are leveraged to evaluate the suitability of IGS-GIM products over China region in 2013-2014.The indices of mean error(ME),root mean square error(RMSE),and normalized RMSE(NRMSE)are then utilized to quantify the accuracy of IGS-GIM products.Results revealed distinct local time and latitudinal dependencies in IGS-GIM errors,with substantially high errors at nighttime(NRMSE:39%)and above 40°latitude(NRMSE:49%).Seasonal differences also emerged,with larger equinoctial deviations(NRMSE:33.5%)compared with summer(20%).A preliminary analysis implied that the irregular assimilation of sparse IGS observations,compounded by China’s distinct geomagnetic topology,may manifest as error variations.These results suggest that modeling based solely on IGS-GIM observations engenders inadequate representations across China and that a thorough examination would proffer the necessary foundation for advancing regional total electron content(TEC)constructions.
基金the Special Project of Yili Normal University(to improve comprehensive strength of disciplines)(Grant No.22XKZZ18)Yili Normal University Scientific Research Innovation Team Plan Project(Grant No.CXZK2021015)Yili Science and Technology Planning Project(Grant No.YZ2022B036).
文摘The distribution of continuous service time in call centers is investigated.A non-Maxwellian collision kernel combining two different value functions in the interaction rule are used to describe the evolution of continuous service time,respectively.Using the statistical mechanical and asymptotic limit methods,Fokker–Planck equations are derived from the corresponding Boltzmann-type equations with non-Maxwellian collision kernels.The steady-state solutions of the Fokker–Planck equation are obtained in exact form.Numerical experiments are provided to support our results under different parameters.
基金supported by the National Natural Science Foundation of China(No.52174296)the Key Laboratory of Metallurgical Industry Safety&Risk Prevention and Control,Ministry of Emergency Management,China.
文摘The safety and longevity of key blast furnace(BF)equipment determine the stable and low-carbon production of iron.This pa-per presents an analysis of the heat transfer characteristics of these components and the uneven distribution of cooling water in parallel pipes based on hydrodynamic principles,discusses the feasible methods for the improvement of BF cooling intensity,and reviews the pre-paration process,performance,and damage characteristics of three key equipment pieces:coolers,tuyeres,and hearth refractories.Fur-thermoere,to attain better control of these critical components under high-temperature working conditions,we propose the application of optimized technologies,such as BF operation and maintenance technology,self-repair technology,and full-lifecycle management techno-logy.Finally,we propose further researches on safety assessments and predictions for key BF equipment under new operating conditions.
文摘In an attempt to assess the Kenyan healthcare system, this study looks at the current efforts that are already in place, what challenges they face, and what strategies can be put into practice to foster interoperability. By reviewing a variety of literature and using statistics, the paper ascertains notable impediments such as the absence of standard protocols, lack of adequate technological infrastructure, and weak regulatory frameworks. Resultant effects from these challenges regarding health provision target enhanced data sharing and merging for better patient outcomes and allocation of resources. It also highlights several opportunities that include the adoption of emerging technologies, and the establishment of public-private partnerships to strengthen the healthcare framework among others. In this regard, the article provides recommendations based on stakeholder views and global best practices addressed to policymakers, medical practitioners, and IT specialists concerned with achieving effective interoperability within Kenya’s health system. This research is relevant because it adds knowledge to the existing literature on how healthcare quality can be improved to make it more patient-centered especially in Kenya.
文摘This paper discusses a queueing system with a retrial orbit and batch service, in which the quantity of customers’ rooms in the queue is finite and the space of retrial orbit is infinite. When the server starts serving, it serves all customers in the queue in a single batch, which is the so-called batch service. If a new customer or a retrial customer finds all the customers’ rooms are occupied, he will decide whether or not to join the retrial orbit. By using the censoring technique and the matrix analysis method, we first obtain the decay function of the stationary distribution for the quantity of customers in the retrial orbit and the quantity of customers in the queue. Then based on the form of decay rate function and the Karamata Tauberian theorem, we finally get the exact tail asymptotics of the stationary distribution.