The wide diffusion of mobile devices that natively support ad hoc communication technologies has led to several protocols for enabling and optimizing Mobile Ad Hoc Networks (MANETs). Nevertheless, the actual utilizati...The wide diffusion of mobile devices that natively support ad hoc communication technologies has led to several protocols for enabling and optimizing Mobile Ad Hoc Networks (MANETs). Nevertheless, the actual utilization of MANETs in real life seems limited due to the lack of protocols for the automatic creation and evolution of ad hoc networks. Recently, a novel P2P protocol named Wi-Fi Direct has been proposed and standardized by the Wi-Fi Alliance to facilitate nearby devices’ interconnection. Wi-Fi Direct provides high-performance direct communication among devices, includes different energy management mechanisms, and is now available in most Android mobile devices. However, the current implementation of Wi-Fi Direct on Android has several limitations, making the Wi-Fi Direct network only be a one-hop ad-hoc network. This paper aims to develop a new framework for multi-hop ad hoc networking using Wi-Fi Direct in Android smart devices. The framework includes a connection establishment protocol and a group management protocol. Simulations validate the proposed framework on the OMNeT++ simulator. We analyzed the framework by varying transmission range, number of hops, and buffer size. The results indicate that the framework provides an eventual 100% packet delivery for different transmission ranges and hop count values. The buffer size has enough space for all packets. However, as buffer size decreases, the packet delivery decreases proportionally.展开更多
Popular fermented golden pomfret(Trachinotus ovatus)is prepared via spontaneous fermentation;however,the mechanisms underlying the regulation of its flavor development remain unclear.This study shows the roles of the ...Popular fermented golden pomfret(Trachinotus ovatus)is prepared via spontaneous fermentation;however,the mechanisms underlying the regulation of its flavor development remain unclear.This study shows the roles of the complex microbiota and the dynamic changes in microbial community and flavor compounds during fish fermentation.Single-molecule real-time sequencing and molecular networking analysis revealed the correlations among different microbial genera and the relationships between microbial taxa and volatile compounds.Mechanisms underlying flavor development were also elucidated via KEGG based functional annotations.Clostridium,Shewanella,and Staphylococcus were the dominant microbial genera.Forty-nine volatile compounds were detected in the fermented fish samples,with thirteen identified as characteristic volatile compounds(ROAV>1).Volatile profiles resulted from the interactions among the microorganisms and derived enzymes,with the main metabolic pathways being amino acid biosynthesis/metabolism,carbon metabolism,and glycolysis/gluconeogenesis.This study demonstrated the approaches for distinguishing key microbiota associated with volatile compounds and monitoring the industrial production of high-quality fermented fish products.展开更多
The healthcare sector holds valuable and sensitive data.The amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast pace.Due to their nature,software-defined networks(SDNs)are ...The healthcare sector holds valuable and sensitive data.The amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast pace.Due to their nature,software-defined networks(SDNs)are widely used in healthcare systems,as they ensure effective resource utilization,safety,great network management,and monitoring.In this sector,due to the value of thedata,SDNs faceamajor challengeposed byawide range of attacks,such as distributed denial of service(DDoS)and probe attacks.These attacks reduce network performance,causing the degradation of different key performance indicators(KPIs)or,in the worst cases,a network failure which can threaten human lives.This can be significant,especially with the current expansion of portable healthcare that supports mobile and wireless devices for what is called mobile health,or m-health.In this study,we examine the effectiveness of using SDNs for defense against DDoS,as well as their effects on different network KPIs under various scenarios.We propose a threshold-based DDoS classifier(TBDC)technique to classify DDoS attacks in healthcare SDNs,aiming to block traffic considered a hazard in the form of a DDoS attack.We then evaluate the accuracy and performance of the proposed TBDC approach.Our technique shows outstanding performance,increasing the mean throughput by 190.3%,reducing the mean delay by 95%,and reducing packet loss by 99.7%relative to normal,with DDoS attack traffic.展开更多
Vehicular Ad-hoc Networks(VANETs)make it easy to transfer information between vehicles,and this feature is utilized to enable collaborative decision-making between vehicles to enhance the safety,economy,and entertainm...Vehicular Ad-hoc Networks(VANETs)make it easy to transfer information between vehicles,and this feature is utilized to enable collaborative decision-making between vehicles to enhance the safety,economy,and entertainment of vehicle operation.The high mobility of vehicles leads to a time-varying topology between vehicles,which makes inter-vehicle information transfer challenging in terms of delay control and ensuring the stability of collaborative decision-making among vehicles.The clustering algorithm is a method aimed at improving the efficiency of VANET communication.Currently,most of the research based on this method focuses on maintaining the stability of vehicle clustering,and few methods focus on the information interaction and collaborative decisionmaking of vehicles in the region.In this context,this paper proposes a networking method for intra-regional vehicle information interaction,through an efficient information transmission mechanism,vehicles can quickly obtain the required information and make more accurate decisions.Firstly,this networking method utilizes DBSCAN and the proposed vehicle scoring model to form clusters,ensuring the stability and adaptability of clusters;secondly,in the process of interacting with the information,the cosine similarity is utilized to check the similarity of the information to eliminate the highly similar information,effectively reducing redundant information;and lastly,in the case of a consensus reached by the cluster,the frequency of broadcasting of information between vehicles is reduced as a way to minimize the waste of communication resources.The proposed method is simulated based on Python and Sumo platforms,and several metrics such as cluster clustering situation,information volume,and state change rate are analyzed.The results show that the method maintains better cluster stability with a 60%and 92%reduction in information overhead compared to the FVC and HCAR algorithms,respectively.展开更多
As users’access to the network has evolved into the acquisition of mass contents instead of IP addresses,the IP network architecture based on end-to-end communication cannot meet users’needs.Therefore,the Informatio...As users’access to the network has evolved into the acquisition of mass contents instead of IP addresses,the IP network architecture based on end-to-end communication cannot meet users’needs.Therefore,the Information-Centric Networking(ICN)came into being.From a technical point of view,ICN is a promising future network architecture.Researching and customizing a reasonable pricing mechanism plays a positive role in promoting the deployment of ICN.The current research on ICN pricing mechanism is focused on paid content.Therefore,we study an ICN pricing model for free content,which uses game theory based on Nash equilibrium to analysis.In this work,advertisers are considered,and an advertiser model is established to describe the economic interaction between advertisers and ICN entities.This solution can formulate the best pricing strategy for all ICN entities and maximize the benefits of each entity.Our extensive analysis and numerical results show that the proposed pricing framework is significantly better than existing solutions when it comes to free content.展开更多
Software Defined Networking(SDN)is programmable by separation of forwarding control through the centralization of the controller.The controller plays the role of the‘brain’that dictates the intelligent part of SDN t...Software Defined Networking(SDN)is programmable by separation of forwarding control through the centralization of the controller.The controller plays the role of the‘brain’that dictates the intelligent part of SDN technology.Various versions of SDN controllers exist as a response to the diverse demands and functions expected of them.There are several SDN controllers available in the open market besides a large number of commercial controllers;some are developed tomeet carrier-grade service levels and one of the recent trends in open-source SDN controllers is the Open Network Operating System(ONOS).This paper presents a comparative study between open source SDN controllers,which are known as Network Controller Platform(NOX),Python-based Network Controller(POX),component-based SDN framework(Ryu),Java-based OpenFlow controller(Floodlight),OpenDayLight(ODL)and ONOS.The discussion is further extended into ONOS architecture,as well as,the evolution of ONOS controllers.This article will review use cases based on ONOS controllers in several application deployments.Moreover,the opportunities and challenges of open source SDN controllers will be discussed,exploring carriergrade ONOS for future real-world deployments,ONOS unique features and identifying the suitable choice of SDN controller for service providers.In addition,we attempt to provide answers to several critical questions relating to the implications of the open-source nature of SDN controllers regarding vendor lock-in,interoperability,and standards compliance,Similarly,real-world use cases of organizations using open-source SDN are highlighted and how the open-source community contributes to the development of SDN controllers.Furthermore,challenges faced by open-source projects,and considerations when choosing an open-source SDN controller are underscored.Then the role of Artificial Intelligence(AI)and Machine Learning(ML)in the evolution of open-source SDN controllers in light of recent research is indicated.In addition,the challenges and limitations associated with deploying open-source SDN controllers in production networks,how can they be mitigated,and finally how opensource SDN controllers handle network security and ensure that network configurations and policies are robust and resilient are presented.Potential opportunities and challenges for future Open SDN deployment are outlined to conclude the article.展开更多
Software-Defined Networking(SDN),with segregated data and control planes,provides faster data routing,stability,and enhanced quality metrics,such as throughput(Th),maximum available bandwidth(Bd(max)),data transfer(DT...Software-Defined Networking(SDN),with segregated data and control planes,provides faster data routing,stability,and enhanced quality metrics,such as throughput(Th),maximum available bandwidth(Bd(max)),data transfer(DTransfer),and reduction in end-to-end delay(D(E-E)).This paper explores the critical work of deploying SDN in large-scale Data Center Networks(DCNs)to enhance its Quality of Service(QoS)parameters,using logically distributed control configurations.There is a noticeable increase in Delay(E-E)when adopting SDN with a unified(single)control structure in big DCNs to handle Hypertext Transfer Protocol(HTTP)requests causing a reduction in network quality parameters(Bd(max),Th,DTransfer,D(E-E),etc.).This article examines the network performance in terms of quality matrices(bandwidth,throughput,data transfer,etc.),by establishing a large-scale SDN-based virtual network in the Mininet environment.The SDN network is simulated in three stages:(1)An SDN network with unitary controller-POX to manage the data traffic flow of the network without the server load management algorithm.(2)An SDN network with only one controller to manage the data traffic flow of the network with a server load management algorithm.(3)Deployment of SDN in proposed control arrangement(logically distributed controlled framework)with multiple controllers managing data traffic flow under the proposed Intelligent Sensing Server Load Management(ISSLM)algorithm.As a result of this approach,the network quality parameters in large-scale networks are enhanced.展开更多
This paper presents the networking observation capabilities of Chinese ocean satellites and their diverse applications in ocean disaster prevention,ecological monitoring,and resource development.Since the inaugural la...This paper presents the networking observation capabilities of Chinese ocean satellites and their diverse applications in ocean disaster prevention,ecological monitoring,and resource development.Since the inaugural launch in 2002,China has achieved substantial advancements in ocean satellite technology,forming an observation system composed of the HY-1,HY-2,and HY-3 series satellites.These satellites are integral to global ocean environmental monitoring due to their high resolution,extensive coverage,and frequent observations.Looking forward,China aims to further enhance and expand its ocean satellite capabilities through ongoing projects to support global environmental protection and sustainable development.展开更多
The evolution of smart mobile devices has significantly impacted the way we generate and share contents and introduced a huge volume of Internet traffic.To address this issue and take advantage of the short-range comm...The evolution of smart mobile devices has significantly impacted the way we generate and share contents and introduced a huge volume of Internet traffic.To address this issue and take advantage of the short-range communication capabilities of smart mobile devices,the decentralized content sharing approach has emerged as a suitable and promising alternative.Decentralized content sharing uses a peer-to-peer network among colocated smart mobile device users to fulfil content requests.Several articles have been published to date to address its different aspects including group management,interest extraction,message forwarding,participation incentive,and content replication.This survey paper summarizes and critically analyzes recent advancements in decentralized content sharing and highlights potential research issues that need further consideration.展开更多
Due to the fading characteristics of wireless channels and the burstiness of data traffic,how to deal with congestion in Ad-hoc networks with effective algorithms is still open and challenging.In this paper,we focus o...Due to the fading characteristics of wireless channels and the burstiness of data traffic,how to deal with congestion in Ad-hoc networks with effective algorithms is still open and challenging.In this paper,we focus on enabling congestion control to minimize network transmission delays through flexible power control.To effectively solve the congestion problem,we propose a distributed cross-layer scheduling algorithm,which is empowered by graph-based multi-agent deep reinforcement learning.The transmit power is adaptively adjusted in real-time by our algorithm based only on local information(i.e.,channel state information and queue length)and local communication(i.e.,information exchanged with neighbors).Moreover,the training complexity of the algorithm is low due to the regional cooperation based on the graph attention network.In the evaluation,we show that our algorithm can reduce the transmission delay of data flow under severe signal interference and drastically changing channel states,and demonstrate the adaptability and stability in different topologies.The method is general and can be extended to various types of topologies.展开更多
The paper presents a new protocol called Link Stability and Transmission Delay Aware(LSTDA)for Flying Adhoc Network(FANET)with a focus on network corridors(NC).FANET consists of Unmanned Aerial Vehicles(UAVs)that face...The paper presents a new protocol called Link Stability and Transmission Delay Aware(LSTDA)for Flying Adhoc Network(FANET)with a focus on network corridors(NC).FANET consists of Unmanned Aerial Vehicles(UAVs)that face challenges in avoiding transmission loss and delay while ensuring stable communication.The proposed protocol introduces a novel link stability with network corridors priority node selection to check and ensure fair communication in the entire network.The protocol uses a Red-Black(R-B)tree to achieve maximum channel utilization and an advanced relay approach.The paper evaluates LSTDA in terms of End-to-End Delay(E2ED),Packet Delivery Ratio(PDR),Network Lifetime(NLT),and Transmission Loss(TL),and compares it with existing methods such as Link Stability Estimation-based Routing(LEPR),Distributed Priority Tree-based Routing(DPTR),and Delay and Link Stability Aware(DLSA)using MATLAB simulations.The results show that LSTDA outperforms the other protocols,with lower average delay,higher average PDR,longer average NLT,and comparable average TL.展开更多
Named Data Networking(NDN)is gaining a significant attention in Vehicular Ad-hoc Networks(VANET)due to its in-network content caching,name-based routing,and mobility-supporting characteristics.Nevertheless,existing ND...Named Data Networking(NDN)is gaining a significant attention in Vehicular Ad-hoc Networks(VANET)due to its in-network content caching,name-based routing,and mobility-supporting characteristics.Nevertheless,existing NDN faces three significant challenges,including security,privacy,and routing.In particular,security attacks,such as Content Poisoning Attacks(CPA),can jeopardize legitimate vehicles with malicious content.For instance,attacker host vehicles can serve consumers with invalid information,which has dire consequences,including road accidents.In such a situation,trust in the content-providing vehicles brings a new challenge.On the other hand,ensuring privacy and preventing unauthorized access in vehicular(VNDN)is another challenge.Moreover,NDN’s pull-based content retrieval mechanism is inefficient for delivering emergency messages in VNDN.In this connection,our contribution is threefold.Unlike existing rule-based reputation evaluation,we propose a Machine Learning(ML)-based reputation evaluation mechanism that identifies CPA attackers and legitimate nodes.Based on ML evaluation results,vehicles accept or discard served content.Secondly,we exploit a decentralized blockchain system to ensure vehicles’privacy by maintaining their information in a secure digital ledger.Finally,we improve the default routing mechanism of VNDN from pull to a push-based content dissemination using Publish-Subscribe(Pub-Sub)approach.We implemented and evaluated our ML-based classification model on a publicly accessible BurST-Asutralian dataset for Misbehavior Detection(BurST-ADMA).We used five(05)hybrid ML classifiers,including Logistic Regression,Decision Tree,K-Nearest Neighbors,Random Forest,and Gaussian Naive Bayes.The qualitative results indicate that Random Forest has achieved the highest average accuracy rate of 100%.Our proposed research offers the most accurate solution to detect CPA in VNDN for safe,secure,and reliable vehicle communication.展开更多
Mobile computing is the most powerful application for network com-munication and connectivity,given recent breakthroughs in thefield of wireless networks or Mobile Ad-hoc networks(MANETs).There are several obstacles th...Mobile computing is the most powerful application for network com-munication and connectivity,given recent breakthroughs in thefield of wireless networks or Mobile Ad-hoc networks(MANETs).There are several obstacles that effective networks confront and the networks must be able to transport data from one system to another with adequate precision.For most applications,a frame-work must ensure that the retrieved data reflects the transmitted data.Before driv-ing to other nodes,if the frame between the two nodes is deformed in the data-link layer,it must be repaired.Most link-layer protocols immediately disregard the frame and enable the high-layer protocols to transmit it down.In other words,because of asset information must be secured from threats,information is a valu-able resource.In MANETs,some applications necessitate the use of a network method for detecting and blocking these assaults.Building a secure intrusion detection system in the network,which provides security to the nodes and route paths in the network,is a major difficulty in MANET.Attacks on the network can jeopardize security issues discovered by the intrusion detection system engine,which are then blocked by the network’s intrusion prevention engine.By bringing the Secure Intrusion Detection System(S-IDS)into the network,a new technique for implementing security goals and preventing attacks will be developed.The Secure Energy Routing(SER)protocol for MANETs is introduced in this study.The protocol addresses the issue of network security by detecting and preventing attacks in the network.The data transmission in the MANET is forwarded using Elliptical Curve Cryptography(ECC)with an objective to improve the level of security.Network Simulator–2 is used to simulate the network and experiments are compared with existing methods.展开更多
With the vigorous development of automobile industry,in-vehicle network is also constantly upgraded to meet data transmission requirements of emerging applications.The main transmission requirements are low latency an...With the vigorous development of automobile industry,in-vehicle network is also constantly upgraded to meet data transmission requirements of emerging applications.The main transmission requirements are low latency and certainty especially for autonomous driving.Time sensitive networking(TSN)based on Ethernet gives a possible solution to these requirements.Previous surveys usually investigated TSN from a general perspective,which referred to TSN of various application fields.In this paper,we focus on the application of TSN to the in-vehicle networks.For in-vehicle networks,we discuss all related TSN standards specified by IEEE 802.1 work group up to now.We further overview and analyze recent literature on various aspects of TSN for automotive applications,including synchronization,resource reservation,scheduling,certainty,software and hardware.Application scenarios of TSN for in-vehicle networks are analyzed one by one.Since TSN of in-vehicle network is still at a very initial stage,this paper also gives insights on open issues,future research directions and possible solutions.展开更多
The mega-constellation network has gained significant attention recently due to its great potential in providing ubiquitous and high-capacity connectivity in sixth-generation(6G)wireless communication systems.However,...The mega-constellation network has gained significant attention recently due to its great potential in providing ubiquitous and high-capacity connectivity in sixth-generation(6G)wireless communication systems.However,the high dynamics of network topology and large scale of mega-constellation pose new challenges to the constellation simulation and performance evaluation.In this paper,we introduce UltraStar,a lightweight network simulator,which aims to facilitate the complicated simulation for the emerging mega-constellation of unprecedented scale.Particularly,a systematic and extensible architecture is proposed,where the joint requirement for network simulation,quantitative evaluation,data statistics and visualization is fully considered.For characterizing the network,we make lightweight abstractions of physical entities and models,which contain basic representatives of networking nodes,structures and protocol stacks.Then,to consider the high dynamics of Walker constellations,we give a two-stage topology maintenance method for constellation initialization and orbit prediction.Further,based on the discrete event simulation(DES)theory,a new set of discrete events is specifically designed for basic network processes,so as to maintain network state changes over time.Finally,taking the first-generation Starlink of 11927 low earth orbit(LEO)satellites as an example,we use UltraStar to fully evaluate its network performance for different deployment stages,such as characteristics of constellation topology,performance of end-to-end service and effects of network-wide traffic interaction.The simulation results not only demonstrate its superior performance,but also verify the effectiveness of UltraStar.展开更多
Realizing a lithium sulfide(Li_(2)S)cathode with both high energy density and a long lifespan requires an innovative cathode design that maximizes electrochemical performance and resists electrode deterioration.Herein...Realizing a lithium sulfide(Li_(2)S)cathode with both high energy density and a long lifespan requires an innovative cathode design that maximizes electrochemical performance and resists electrode deterioration.Herein,a high-loading Li_(2)S-based cathode with micrometric Li_(2)S particles composed of two-dimensional graphene(Gr)and one-dimensional carbon nanotubes(CNTs)in a compact geometry is developed,and the role of CNTs in stable cycling of high-capacity Li–S batteries is emphasized.In a dimensionally combined carbon matrix,CNTs embedded within the Gr sheets create robust and sustainable electron diffusion pathways while suppressing the passivation of the active carbon surface.As a unique point,during the first charging process,the proposed cathode is fully activated through the direct conversion of Li_(2)S into S_(8) without inducing lithium polysulfide formation.The direct conversion of Li_(2)S into S_(8) in the composite cathode is ubiquitously investigated using the combined study of in situ Raman spectroscopy,in situ optical microscopy,and cryogenic transmission electron microscopy.The composite cathode demonstrates unprecedented electrochemical properties even with a high Li_(2)S loading of 10 mg cm^(–2);in particular,the practical and safe Li–S full cell coupled with a graphite anode shows ultra-long-term cycling stability over 800 cycles.展开更多
Immune changes and inflammatory responses have been identified as central events in the pathological process of spinal co rd injury.They can greatly affect nerve regeneration and functional recovery.However,there is s...Immune changes and inflammatory responses have been identified as central events in the pathological process of spinal co rd injury.They can greatly affect nerve regeneration and functional recovery.However,there is still limited understanding of the peripheral immune inflammato ry response in spinal cord inju ry.In this study.we obtained microRNA expression profiles from the peripheral blood of patients with spinal co rd injury using high-throughput sequencing.We also obtained the mRNA expression profile of spinal cord injury patients from the Gene Expression Omnibus(GEO)database(GSE151371).We identified 54 differentially expressed microRNAs and 1656 diffe rentially expressed genes using bioinformatics approaches.Functional enrichment analysis revealed that various common immune and inflammation-related signaling pathways,such as neutrophil extracellular trap formation pathway,T cell receptor signaling pathway,and nuclear factor-κB signal pathway,we re abnormally activated or inhibited in spinal cord inju ry patient samples.We applied an integrated strategy that combines weighted gene co-expression network analysis,LASSO logistic regression,and SVM-RFE algorithm and identified three biomarke rs associated with spinal cord injury:ANO10,BST1,and ZFP36L2.We verified the expression levels and diagnostic perfo rmance of these three genes in the original training dataset and clinical samples through the receiver operating characteristic curve.Quantitative polymerase chain reaction results showed that ANO20 and BST1 mRNA levels were increased and ZFP36L2 mRNA was decreased in the peripheral blood of spinal cord injury patients.We also constructed a small RNA-mRNA interaction network using Cytoscape.Additionally,we evaluated the proportion of 22 types of immune cells in the peripheral blood of spinal co rd injury patients using the CIBERSORT tool.The proportions of naive B cells,plasma cells,monocytes,and neutrophils were increased while the proportions of memory B cells,CD8^(+)T cells,resting natural killer cells,resting dendritic cells,and eosinophils were markedly decreased in spinal cord injury patients increased compared with healthy subjects,and ANO10,BST1 and ZFP26L2we re closely related to the proportion of certain immune cell types.The findings from this study provide new directions for the development of treatment strategies related to immune inflammation in spinal co rd inju ry and suggest that ANO10,BST2,and ZFP36L2 are potential biomarkers for spinal cord injury.The study was registe red in the Chinese Clinical Trial Registry(registration No.ChiCTR2200066985,December 12,2022).展开更多
Optical neural networks have significant advantages in terms of power consumption,parallelism,and high computing speed,which has intrigued extensive attention in both academic and engineering communities.It has been c...Optical neural networks have significant advantages in terms of power consumption,parallelism,and high computing speed,which has intrigued extensive attention in both academic and engineering communities.It has been considered as one of the powerful tools in promoting the fields of imaging processing and object recognition.However,the existing optical system architecture cannot be reconstructed to the realization of multi-functional artificial intelligence systems simultaneously.To push the development of this issue,we propose the pluggable diffractive neural networks(P-DNN),a general paradigm resorting to the cascaded metasurfaces,which can be applied to recognize various tasks by switching internal plug-ins.As the proof-of-principle,the recognition functions of six types of handwritten digits and six types of fashions are numerical simulated and experimental demonstrated at near-infrared regimes.Encouragingly,the proposed paradigm not only improves the flexibility of the optical neural networks but paves the new route for achieving high-speed,low-power and versatile artificial intelligence systems.展开更多
Background In early adolescence,youth are highly prone to suicidal behaviours.Identifying modifiable risk factors during this critical phase is a priority to inform effective suicide prevention strategies.Aims To expl...Background In early adolescence,youth are highly prone to suicidal behaviours.Identifying modifiable risk factors during this critical phase is a priority to inform effective suicide prevention strategies.Aims To explore the risk and protective factors of suicidal behaviours(ie,suicidal ideation,plans and attempts)in early adolescence in China using a social-ecological perspective.Methods Using data from the cross-sectional project‘Healthy and Risky Behaviours Among Middle School Students in Anhui Province,China',stratified random cluster sampling was used to select 5724 middle school students who had completed self-report questionnaires in November 2020.Network analysis was employed to examine the correlates of suicidal ideation,plans and attempts at four levels,namely individual(sex,academic performance,serious physical llness/disability,history of self-harm,depression,impulsivity,sleep problems,resilience),family(family economic status,relationship with mother,relationship with father,family violence,childhood abuse,parental mental illness),school(relationship with teachers,relationship with classmates,school-bullying victimisation and perpetration)and social(social support,satisfaction with society).Results In total,37.9%,19.0%and 5.5%of the students reported suicidal ideation,plans and attempts in the past 6 months,respectively.The estimated network revealed that suicidal ideation,plans and attempts were collectively associated with a history of self-harm,sleep problems,childhood abuse,school bullying and victimisation.Centrality analysis indicated that the most influential nodes in the network were history of self-harm and childhood abuse.Notably,the network also showed unique correlates of suicidal ideation(sex,weight=0.60;impulsivity,weight=0.24;family violence,weight=0.17;relationship with teachers,weight=-0.03;school-bullying perpetration,weight=0.22),suicidal plans(social support,weight=-0.15)and suicidal attempts(relationship with mother,weight=-0.10;parental mental llness,weight=0.61).Conclusions This study identified the correlates of suicidal ideation,plans and attempts,and provided practical implications for suicide prevention for young adolescents in China.Firstly,this study highlighted the importance of joint interventions across multiple departments.Secondly,the common risk factors of suicidal ideation,plans and attempts were elucidated.Thirdly,this study proposed target interventions to address the unique influencing factors of suicidal ideation,plans and attempts.展开更多
文摘The wide diffusion of mobile devices that natively support ad hoc communication technologies has led to several protocols for enabling and optimizing Mobile Ad Hoc Networks (MANETs). Nevertheless, the actual utilization of MANETs in real life seems limited due to the lack of protocols for the automatic creation and evolution of ad hoc networks. Recently, a novel P2P protocol named Wi-Fi Direct has been proposed and standardized by the Wi-Fi Alliance to facilitate nearby devices’ interconnection. Wi-Fi Direct provides high-performance direct communication among devices, includes different energy management mechanisms, and is now available in most Android mobile devices. However, the current implementation of Wi-Fi Direct on Android has several limitations, making the Wi-Fi Direct network only be a one-hop ad-hoc network. This paper aims to develop a new framework for multi-hop ad hoc networking using Wi-Fi Direct in Android smart devices. The framework includes a connection establishment protocol and a group management protocol. Simulations validate the proposed framework on the OMNeT++ simulator. We analyzed the framework by varying transmission range, number of hops, and buffer size. The results indicate that the framework provides an eventual 100% packet delivery for different transmission ranges and hop count values. The buffer size has enough space for all packets. However, as buffer size decreases, the packet delivery decreases proportionally.
基金supported by the National Natural Science Foundation of China(32001733)the Earmarked fund for CARS(CARS-47)+3 种基金Guangxi Natural Science Foundation Program(2021GXNSFAA196023)Guangdong Basic and Applied Basic Research Foundation(2021A1515010833)Young Talent Support Project of Guangzhou Association for Science and Technology(QT20220101142)the Special Scientific Research Funds for Central Non-profit Institutes,Chinese Academy of Fishery Sciences(2020TD69)。
文摘Popular fermented golden pomfret(Trachinotus ovatus)is prepared via spontaneous fermentation;however,the mechanisms underlying the regulation of its flavor development remain unclear.This study shows the roles of the complex microbiota and the dynamic changes in microbial community and flavor compounds during fish fermentation.Single-molecule real-time sequencing and molecular networking analysis revealed the correlations among different microbial genera and the relationships between microbial taxa and volatile compounds.Mechanisms underlying flavor development were also elucidated via KEGG based functional annotations.Clostridium,Shewanella,and Staphylococcus were the dominant microbial genera.Forty-nine volatile compounds were detected in the fermented fish samples,with thirteen identified as characteristic volatile compounds(ROAV>1).Volatile profiles resulted from the interactions among the microorganisms and derived enzymes,with the main metabolic pathways being amino acid biosynthesis/metabolism,carbon metabolism,and glycolysis/gluconeogenesis.This study demonstrated the approaches for distinguishing key microbiota associated with volatile compounds and monitoring the industrial production of high-quality fermented fish products.
基金extend their appreciation to Researcher Supporting Project Number(RSPD2023R582)King Saud University,Riyadh,Saudi Arabia.
文摘The healthcare sector holds valuable and sensitive data.The amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast pace.Due to their nature,software-defined networks(SDNs)are widely used in healthcare systems,as they ensure effective resource utilization,safety,great network management,and monitoring.In this sector,due to the value of thedata,SDNs faceamajor challengeposed byawide range of attacks,such as distributed denial of service(DDoS)and probe attacks.These attacks reduce network performance,causing the degradation of different key performance indicators(KPIs)or,in the worst cases,a network failure which can threaten human lives.This can be significant,especially with the current expansion of portable healthcare that supports mobile and wireless devices for what is called mobile health,or m-health.In this study,we examine the effectiveness of using SDNs for defense against DDoS,as well as their effects on different network KPIs under various scenarios.We propose a threshold-based DDoS classifier(TBDC)technique to classify DDoS attacks in healthcare SDNs,aiming to block traffic considered a hazard in the form of a DDoS attack.We then evaluate the accuracy and performance of the proposed TBDC approach.Our technique shows outstanding performance,increasing the mean throughput by 190.3%,reducing the mean delay by 95%,and reducing packet loss by 99.7%relative to normal,with DDoS attack traffic.
基金the National Natural Science Foundation of China(NSFC)under Grant No.52267003.
文摘Vehicular Ad-hoc Networks(VANETs)make it easy to transfer information between vehicles,and this feature is utilized to enable collaborative decision-making between vehicles to enhance the safety,economy,and entertainment of vehicle operation.The high mobility of vehicles leads to a time-varying topology between vehicles,which makes inter-vehicle information transfer challenging in terms of delay control and ensuring the stability of collaborative decision-making among vehicles.The clustering algorithm is a method aimed at improving the efficiency of VANET communication.Currently,most of the research based on this method focuses on maintaining the stability of vehicle clustering,and few methods focus on the information interaction and collaborative decisionmaking of vehicles in the region.In this context,this paper proposes a networking method for intra-regional vehicle information interaction,through an efficient information transmission mechanism,vehicles can quickly obtain the required information and make more accurate decisions.Firstly,this networking method utilizes DBSCAN and the proposed vehicle scoring model to form clusters,ensuring the stability and adaptability of clusters;secondly,in the process of interacting with the information,the cosine similarity is utilized to check the similarity of the information to eliminate the highly similar information,effectively reducing redundant information;and lastly,in the case of a consensus reached by the cluster,the frequency of broadcasting of information between vehicles is reduced as a way to minimize the waste of communication resources.The proposed method is simulated based on Python and Sumo platforms,and several metrics such as cluster clustering situation,information volume,and state change rate are analyzed.The results show that the method maintains better cluster stability with a 60%and 92%reduction in information overhead compared to the FVC and HCAR algorithms,respectively.
基金supported by the Key R&D Program of Anhui Province in 2020 under Grant No.202004a05020078China Environment for Network Innovations(CENI)under Grant No.2016-000052-73-01-000515.
文摘As users’access to the network has evolved into the acquisition of mass contents instead of IP addresses,the IP network architecture based on end-to-end communication cannot meet users’needs.Therefore,the Information-Centric Networking(ICN)came into being.From a technical point of view,ICN is a promising future network architecture.Researching and customizing a reasonable pricing mechanism plays a positive role in promoting the deployment of ICN.The current research on ICN pricing mechanism is focused on paid content.Therefore,we study an ICN pricing model for free content,which uses game theory based on Nash equilibrium to analysis.In this work,advertisers are considered,and an advertiser model is established to describe the economic interaction between advertisers and ICN entities.This solution can formulate the best pricing strategy for all ICN entities and maximize the benefits of each entity.Our extensive analysis and numerical results show that the proposed pricing framework is significantly better than existing solutions when it comes to free content.
基金supported by UniversitiKebangsaan Malaysia,under Dana Impak Perdana 2.0.(Ref:DIP–2022–020).
文摘Software Defined Networking(SDN)is programmable by separation of forwarding control through the centralization of the controller.The controller plays the role of the‘brain’that dictates the intelligent part of SDN technology.Various versions of SDN controllers exist as a response to the diverse demands and functions expected of them.There are several SDN controllers available in the open market besides a large number of commercial controllers;some are developed tomeet carrier-grade service levels and one of the recent trends in open-source SDN controllers is the Open Network Operating System(ONOS).This paper presents a comparative study between open source SDN controllers,which are known as Network Controller Platform(NOX),Python-based Network Controller(POX),component-based SDN framework(Ryu),Java-based OpenFlow controller(Floodlight),OpenDayLight(ODL)and ONOS.The discussion is further extended into ONOS architecture,as well as,the evolution of ONOS controllers.This article will review use cases based on ONOS controllers in several application deployments.Moreover,the opportunities and challenges of open source SDN controllers will be discussed,exploring carriergrade ONOS for future real-world deployments,ONOS unique features and identifying the suitable choice of SDN controller for service providers.In addition,we attempt to provide answers to several critical questions relating to the implications of the open-source nature of SDN controllers regarding vendor lock-in,interoperability,and standards compliance,Similarly,real-world use cases of organizations using open-source SDN are highlighted and how the open-source community contributes to the development of SDN controllers.Furthermore,challenges faced by open-source projects,and considerations when choosing an open-source SDN controller are underscored.Then the role of Artificial Intelligence(AI)and Machine Learning(ML)in the evolution of open-source SDN controllers in light of recent research is indicated.In addition,the challenges and limitations associated with deploying open-source SDN controllers in production networks,how can they be mitigated,and finally how opensource SDN controllers handle network security and ensure that network configurations and policies are robust and resilient are presented.Potential opportunities and challenges for future Open SDN deployment are outlined to conclude the article.
文摘Software-Defined Networking(SDN),with segregated data and control planes,provides faster data routing,stability,and enhanced quality metrics,such as throughput(Th),maximum available bandwidth(Bd(max)),data transfer(DTransfer),and reduction in end-to-end delay(D(E-E)).This paper explores the critical work of deploying SDN in large-scale Data Center Networks(DCNs)to enhance its Quality of Service(QoS)parameters,using logically distributed control configurations.There is a noticeable increase in Delay(E-E)when adopting SDN with a unified(single)control structure in big DCNs to handle Hypertext Transfer Protocol(HTTP)requests causing a reduction in network quality parameters(Bd(max),Th,DTransfer,D(E-E),etc.).This article examines the network performance in terms of quality matrices(bandwidth,throughput,data transfer,etc.),by establishing a large-scale SDN-based virtual network in the Mininet environment.The SDN network is simulated in three stages:(1)An SDN network with unitary controller-POX to manage the data traffic flow of the network without the server load management algorithm.(2)An SDN network with only one controller to manage the data traffic flow of the network with a server load management algorithm.(3)Deployment of SDN in proposed control arrangement(logically distributed controlled framework)with multiple controllers managing data traffic flow under the proposed Intelligent Sensing Server Load Management(ISSLM)algorithm.As a result of this approach,the network quality parameters in large-scale networks are enhanced.
基金Supported by Remote Sensing Support for Offshore Ocean Environment and Polar Sea Ice Early Warning Services(102121201550000009004)。
文摘This paper presents the networking observation capabilities of Chinese ocean satellites and their diverse applications in ocean disaster prevention,ecological monitoring,and resource development.Since the inaugural launch in 2002,China has achieved substantial advancements in ocean satellite technology,forming an observation system composed of the HY-1,HY-2,and HY-3 series satellites.These satellites are integral to global ocean environmental monitoring due to their high resolution,extensive coverage,and frequent observations.Looking forward,China aims to further enhance and expand its ocean satellite capabilities through ongoing projects to support global environmental protection and sustainable development.
文摘The evolution of smart mobile devices has significantly impacted the way we generate and share contents and introduced a huge volume of Internet traffic.To address this issue and take advantage of the short-range communication capabilities of smart mobile devices,the decentralized content sharing approach has emerged as a suitable and promising alternative.Decentralized content sharing uses a peer-to-peer network among colocated smart mobile device users to fulfil content requests.Several articles have been published to date to address its different aspects including group management,interest extraction,message forwarding,participation incentive,and content replication.This survey paper summarizes and critically analyzes recent advancements in decentralized content sharing and highlights potential research issues that need further consideration.
基金supported by Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government(MSIT) (No.RS-2022-00155885, Artificial Intelligence Convergence Innovation Human Resources Development (Hanyang University ERICA))supported by the National Natural Science Foundation of China under Grant No. 61971264the National Natural Science Foundation of China/Research Grants Council Collaborative Research Scheme under Grant No. 62261160390
文摘Due to the fading characteristics of wireless channels and the burstiness of data traffic,how to deal with congestion in Ad-hoc networks with effective algorithms is still open and challenging.In this paper,we focus on enabling congestion control to minimize network transmission delays through flexible power control.To effectively solve the congestion problem,we propose a distributed cross-layer scheduling algorithm,which is empowered by graph-based multi-agent deep reinforcement learning.The transmit power is adaptively adjusted in real-time by our algorithm based only on local information(i.e.,channel state information and queue length)and local communication(i.e.,information exchanged with neighbors).Moreover,the training complexity of the algorithm is low due to the regional cooperation based on the graph attention network.In the evaluation,we show that our algorithm can reduce the transmission delay of data flow under severe signal interference and drastically changing channel states,and demonstrate the adaptability and stability in different topologies.The method is general and can be extended to various types of topologies.
基金supported in part by the Office of Research and Sponsored Programs,Kean University,the RIF Activity Code 23009 of Zayed University,UAE,and the National Natural Science Foundation of China under Grant 62172366.
文摘The paper presents a new protocol called Link Stability and Transmission Delay Aware(LSTDA)for Flying Adhoc Network(FANET)with a focus on network corridors(NC).FANET consists of Unmanned Aerial Vehicles(UAVs)that face challenges in avoiding transmission loss and delay while ensuring stable communication.The proposed protocol introduces a novel link stability with network corridors priority node selection to check and ensure fair communication in the entire network.The protocol uses a Red-Black(R-B)tree to achieve maximum channel utilization and an advanced relay approach.The paper evaluates LSTDA in terms of End-to-End Delay(E2ED),Packet Delivery Ratio(PDR),Network Lifetime(NLT),and Transmission Loss(TL),and compares it with existing methods such as Link Stability Estimation-based Routing(LEPR),Distributed Priority Tree-based Routing(DPTR),and Delay and Link Stability Aware(DLSA)using MATLAB simulations.The results show that LSTDA outperforms the other protocols,with lower average delay,higher average PDR,longer average NLT,and comparable average TL.
基金Supporting Project Number(RSPD2023R553),King Saud University,Riyadh,Saudi Arabia.
文摘Named Data Networking(NDN)is gaining a significant attention in Vehicular Ad-hoc Networks(VANET)due to its in-network content caching,name-based routing,and mobility-supporting characteristics.Nevertheless,existing NDN faces three significant challenges,including security,privacy,and routing.In particular,security attacks,such as Content Poisoning Attacks(CPA),can jeopardize legitimate vehicles with malicious content.For instance,attacker host vehicles can serve consumers with invalid information,which has dire consequences,including road accidents.In such a situation,trust in the content-providing vehicles brings a new challenge.On the other hand,ensuring privacy and preventing unauthorized access in vehicular(VNDN)is another challenge.Moreover,NDN’s pull-based content retrieval mechanism is inefficient for delivering emergency messages in VNDN.In this connection,our contribution is threefold.Unlike existing rule-based reputation evaluation,we propose a Machine Learning(ML)-based reputation evaluation mechanism that identifies CPA attackers and legitimate nodes.Based on ML evaluation results,vehicles accept or discard served content.Secondly,we exploit a decentralized blockchain system to ensure vehicles’privacy by maintaining their information in a secure digital ledger.Finally,we improve the default routing mechanism of VNDN from pull to a push-based content dissemination using Publish-Subscribe(Pub-Sub)approach.We implemented and evaluated our ML-based classification model on a publicly accessible BurST-Asutralian dataset for Misbehavior Detection(BurST-ADMA).We used five(05)hybrid ML classifiers,including Logistic Regression,Decision Tree,K-Nearest Neighbors,Random Forest,and Gaussian Naive Bayes.The qualitative results indicate that Random Forest has achieved the highest average accuracy rate of 100%.Our proposed research offers the most accurate solution to detect CPA in VNDN for safe,secure,and reliable vehicle communication.
文摘Mobile computing is the most powerful application for network com-munication and connectivity,given recent breakthroughs in thefield of wireless networks or Mobile Ad-hoc networks(MANETs).There are several obstacles that effective networks confront and the networks must be able to transport data from one system to another with adequate precision.For most applications,a frame-work must ensure that the retrieved data reflects the transmitted data.Before driv-ing to other nodes,if the frame between the two nodes is deformed in the data-link layer,it must be repaired.Most link-layer protocols immediately disregard the frame and enable the high-layer protocols to transmit it down.In other words,because of asset information must be secured from threats,information is a valu-able resource.In MANETs,some applications necessitate the use of a network method for detecting and blocking these assaults.Building a secure intrusion detection system in the network,which provides security to the nodes and route paths in the network,is a major difficulty in MANET.Attacks on the network can jeopardize security issues discovered by the intrusion detection system engine,which are then blocked by the network’s intrusion prevention engine.By bringing the Secure Intrusion Detection System(S-IDS)into the network,a new technique for implementing security goals and preventing attacks will be developed.The Secure Energy Routing(SER)protocol for MANETs is introduced in this study.The protocol addresses the issue of network security by detecting and preventing attacks in the network.The data transmission in the MANET is forwarded using Elliptical Curve Cryptography(ECC)with an objective to improve the level of security.Network Simulator–2 is used to simulate the network and experiments are compared with existing methods.
文摘With the vigorous development of automobile industry,in-vehicle network is also constantly upgraded to meet data transmission requirements of emerging applications.The main transmission requirements are low latency and certainty especially for autonomous driving.Time sensitive networking(TSN)based on Ethernet gives a possible solution to these requirements.Previous surveys usually investigated TSN from a general perspective,which referred to TSN of various application fields.In this paper,we focus on the application of TSN to the in-vehicle networks.For in-vehicle networks,we discuss all related TSN standards specified by IEEE 802.1 work group up to now.We further overview and analyze recent literature on various aspects of TSN for automotive applications,including synchronization,resource reservation,scheduling,certainty,software and hardware.Application scenarios of TSN for in-vehicle networks are analyzed one by one.Since TSN of in-vehicle network is still at a very initial stage,this paper also gives insights on open issues,future research directions and possible solutions.
基金supported in part by the National Key Research and Development Program of China(2020YFB1806104)the Natural Science Fund for Distinguished Young Scholars of Jiangsu Province(BK20220067)the Natural Sciences and Engineering Research Council of Canada(NSERC)。
文摘The mega-constellation network has gained significant attention recently due to its great potential in providing ubiquitous and high-capacity connectivity in sixth-generation(6G)wireless communication systems.However,the high dynamics of network topology and large scale of mega-constellation pose new challenges to the constellation simulation and performance evaluation.In this paper,we introduce UltraStar,a lightweight network simulator,which aims to facilitate the complicated simulation for the emerging mega-constellation of unprecedented scale.Particularly,a systematic and extensible architecture is proposed,where the joint requirement for network simulation,quantitative evaluation,data statistics and visualization is fully considered.For characterizing the network,we make lightweight abstractions of physical entities and models,which contain basic representatives of networking nodes,structures and protocol stacks.Then,to consider the high dynamics of Walker constellations,we give a two-stage topology maintenance method for constellation initialization and orbit prediction.Further,based on the discrete event simulation(DES)theory,a new set of discrete events is specifically designed for basic network processes,so as to maintain network state changes over time.Finally,taking the first-generation Starlink of 11927 low earth orbit(LEO)satellites as an example,we use UltraStar to fully evaluate its network performance for different deployment stages,such as characteristics of constellation topology,performance of end-to-end service and effects of network-wide traffic interaction.The simulation results not only demonstrate its superior performance,but also verify the effectiveness of UltraStar.
基金Korea Institute of Energy Technology Evaluation and Planning,Grant/Award Number:20214000000320Samsung Research Funding&Incubation Center of Samsung Electronics,Grant/Award Number:SRFC-MA1901-06。
文摘Realizing a lithium sulfide(Li_(2)S)cathode with both high energy density and a long lifespan requires an innovative cathode design that maximizes electrochemical performance and resists electrode deterioration.Herein,a high-loading Li_(2)S-based cathode with micrometric Li_(2)S particles composed of two-dimensional graphene(Gr)and one-dimensional carbon nanotubes(CNTs)in a compact geometry is developed,and the role of CNTs in stable cycling of high-capacity Li–S batteries is emphasized.In a dimensionally combined carbon matrix,CNTs embedded within the Gr sheets create robust and sustainable electron diffusion pathways while suppressing the passivation of the active carbon surface.As a unique point,during the first charging process,the proposed cathode is fully activated through the direct conversion of Li_(2)S into S_(8) without inducing lithium polysulfide formation.The direct conversion of Li_(2)S into S_(8) in the composite cathode is ubiquitously investigated using the combined study of in situ Raman spectroscopy,in situ optical microscopy,and cryogenic transmission electron microscopy.The composite cathode demonstrates unprecedented electrochemical properties even with a high Li_(2)S loading of 10 mg cm^(–2);in particular,the practical and safe Li–S full cell coupled with a graphite anode shows ultra-long-term cycling stability over 800 cycles.
基金supported by the Notional Natural Science Foundation of China,No.81960417 (to JX)Guangxi Key Research and Development Program,No.GuiKeA B20159027 (to JX)the Natural Science Foundation of Guangxi Zhuang Autonomous Region,No.2022GXNSFBA035545 (to YG)。
文摘Immune changes and inflammatory responses have been identified as central events in the pathological process of spinal co rd injury.They can greatly affect nerve regeneration and functional recovery.However,there is still limited understanding of the peripheral immune inflammato ry response in spinal cord inju ry.In this study.we obtained microRNA expression profiles from the peripheral blood of patients with spinal co rd injury using high-throughput sequencing.We also obtained the mRNA expression profile of spinal cord injury patients from the Gene Expression Omnibus(GEO)database(GSE151371).We identified 54 differentially expressed microRNAs and 1656 diffe rentially expressed genes using bioinformatics approaches.Functional enrichment analysis revealed that various common immune and inflammation-related signaling pathways,such as neutrophil extracellular trap formation pathway,T cell receptor signaling pathway,and nuclear factor-κB signal pathway,we re abnormally activated or inhibited in spinal cord inju ry patient samples.We applied an integrated strategy that combines weighted gene co-expression network analysis,LASSO logistic regression,and SVM-RFE algorithm and identified three biomarke rs associated with spinal cord injury:ANO10,BST1,and ZFP36L2.We verified the expression levels and diagnostic perfo rmance of these three genes in the original training dataset and clinical samples through the receiver operating characteristic curve.Quantitative polymerase chain reaction results showed that ANO20 and BST1 mRNA levels were increased and ZFP36L2 mRNA was decreased in the peripheral blood of spinal cord injury patients.We also constructed a small RNA-mRNA interaction network using Cytoscape.Additionally,we evaluated the proportion of 22 types of immune cells in the peripheral blood of spinal co rd injury patients using the CIBERSORT tool.The proportions of naive B cells,plasma cells,monocytes,and neutrophils were increased while the proportions of memory B cells,CD8^(+)T cells,resting natural killer cells,resting dendritic cells,and eosinophils were markedly decreased in spinal cord injury patients increased compared with healthy subjects,and ANO10,BST1 and ZFP26L2we re closely related to the proportion of certain immune cell types.The findings from this study provide new directions for the development of treatment strategies related to immune inflammation in spinal co rd inju ry and suggest that ANO10,BST2,and ZFP36L2 are potential biomarkers for spinal cord injury.The study was registe red in the Chinese Clinical Trial Registry(registration No.ChiCTR2200066985,December 12,2022).
基金The authors acknowledge the funding provided by the National Key R&D Program of China(2021YFA1401200)Beijing Outstanding Young Scientist Program(BJJWZYJH01201910007022)+2 种基金National Natural Science Foundation of China(No.U21A20140,No.92050117,No.62005017)programBeijing Municipal Science&Technology Commission,Administrative Commission of Zhongguancun Science Park(No.Z211100004821009)This work was supported by the Synergetic Extreme Condition User Facility(SECUF).
文摘Optical neural networks have significant advantages in terms of power consumption,parallelism,and high computing speed,which has intrigued extensive attention in both academic and engineering communities.It has been considered as one of the powerful tools in promoting the fields of imaging processing and object recognition.However,the existing optical system architecture cannot be reconstructed to the realization of multi-functional artificial intelligence systems simultaneously.To push the development of this issue,we propose the pluggable diffractive neural networks(P-DNN),a general paradigm resorting to the cascaded metasurfaces,which can be applied to recognize various tasks by switching internal plug-ins.As the proof-of-principle,the recognition functions of six types of handwritten digits and six types of fashions are numerical simulated and experimental demonstrated at near-infrared regimes.Encouragingly,the proposed paradigm not only improves the flexibility of the optical neural networks but paves the new route for achieving high-speed,low-power and versatile artificial intelligence systems.
文摘Background In early adolescence,youth are highly prone to suicidal behaviours.Identifying modifiable risk factors during this critical phase is a priority to inform effective suicide prevention strategies.Aims To explore the risk and protective factors of suicidal behaviours(ie,suicidal ideation,plans and attempts)in early adolescence in China using a social-ecological perspective.Methods Using data from the cross-sectional project‘Healthy and Risky Behaviours Among Middle School Students in Anhui Province,China',stratified random cluster sampling was used to select 5724 middle school students who had completed self-report questionnaires in November 2020.Network analysis was employed to examine the correlates of suicidal ideation,plans and attempts at four levels,namely individual(sex,academic performance,serious physical llness/disability,history of self-harm,depression,impulsivity,sleep problems,resilience),family(family economic status,relationship with mother,relationship with father,family violence,childhood abuse,parental mental illness),school(relationship with teachers,relationship with classmates,school-bullying victimisation and perpetration)and social(social support,satisfaction with society).Results In total,37.9%,19.0%and 5.5%of the students reported suicidal ideation,plans and attempts in the past 6 months,respectively.The estimated network revealed that suicidal ideation,plans and attempts were collectively associated with a history of self-harm,sleep problems,childhood abuse,school bullying and victimisation.Centrality analysis indicated that the most influential nodes in the network were history of self-harm and childhood abuse.Notably,the network also showed unique correlates of suicidal ideation(sex,weight=0.60;impulsivity,weight=0.24;family violence,weight=0.17;relationship with teachers,weight=-0.03;school-bullying perpetration,weight=0.22),suicidal plans(social support,weight=-0.15)and suicidal attempts(relationship with mother,weight=-0.10;parental mental llness,weight=0.61).Conclusions This study identified the correlates of suicidal ideation,plans and attempts,and provided practical implications for suicide prevention for young adolescents in China.Firstly,this study highlighted the importance of joint interventions across multiple departments.Secondly,the common risk factors of suicidal ideation,plans and attempts were elucidated.Thirdly,this study proposed target interventions to address the unique influencing factors of suicidal ideation,plans and attempts.