Food sharing is a prosocial behavior consisting of the unresisted transfer of monopolizable food from a possessor to another individual(Feistner and McGrew 1989;Stevens and Gilby 2004).Despite the cost for donors(i.e....Food sharing is a prosocial behavior consisting of the unresisted transfer of monopolizable food from a possessor to another individual(Feistner and McGrew 1989;Stevens and Gilby 2004).Despite the cost for donors(i.e.,loss of the food),intraspecifc food sharing occurs in various insects,fsh,birds,and aquatic,terrestrial,and arboreal mammals(Liévin‐Bazin et al.2019;Carter et al.2020).By far,most food sharing is intraspecifc,and takes place while possessors are in the process of eating.Here,we describe the remarkable case of a captive chimpanzee,Pan troglodytes,regularly dispensing food to another primate species(baboons,Papio hamadryas)in a neighboring enclosure.We discuss likely causes and functions of this interspecifc altruistic act.Observations were made in Xi’an Qinling Wildlife Park,Shaanxi Province,China(34°02ʹ56.22″N,108°51ʹ48.60″E),where two adult chimpanzees and a group of around 40-50 baboons lived in adjacent enclosures.The female chimpanzee(AiAi)was the elderly mother of the male(DuoDuo,or DD).At feeding times,AiAi usually ate near the door to the chimpanzees’indoor area,and she almost never interacted with the baboon group.The baboon group consisted of two one-male units.We recorded behaviors using focal-animal sampling(for information about subjects and methods,see Supplementary Materials).展开更多
In clustering algorithms,the selection of neighbors significantly affects the quality of the final clustering results.While various neighbor relationships exist,such as K-nearest neighbors,natural neighbors,and shared...In clustering algorithms,the selection of neighbors significantly affects the quality of the final clustering results.While various neighbor relationships exist,such as K-nearest neighbors,natural neighbors,and shared neighbors,most neighbor relationships can only handle single structural relationships,and the identification accuracy is low for datasets with multiple structures.In life,people’s first instinct for complex things is to divide them into multiple parts to complete.Partitioning the dataset into more sub-graphs is a good idea approach to identifying complex structures.Taking inspiration from this,we propose a novel neighbor method:Shared Natural Neighbors(SNaN).To demonstrate the superiority of this neighbor method,we propose a shared natural neighbors-based hierarchical clustering algorithm for discovering arbitrary-shaped clusters(HC-SNaN).Our algorithm excels in identifying both spherical clusters and manifold clusters.Tested on synthetic datasets and real-world datasets,HC-SNaN demonstrates significant advantages over existing clustering algorithms,particularly when dealing with datasets containing arbitrary shapes.展开更多
Background:Shared decision-making(SDM)implementation is a priority for Australian health systems,including general practices but it remains complex for specific groups like older rural Australians.We initiated a quali...Background:Shared decision-making(SDM)implementation is a priority for Australian health systems,including general practices but it remains complex for specific groups like older rural Australians.We initiated a qualitative study with older rural Australians to explore barriers to and facilitators of SDM in local general practices.Methods:We conducted a patient-oriented research,partnering with older rural Australians,families,and health service providers in research design.Participants who visited general practices were purposively sampled from five small rural towns in South Australia.A semi-structured interview guide was used for interviews and reflexive thematic coding was conducted.Results:Telephone interviews were held with 27 participants.Four themes were identified around older rural adults’involvement in SDM:(1)Understanding of"patient involvement";(2)Positive and negative outcomes;(3)Barriers to SDM;and(4)Facilitators to SDM.Understanding of patient involvement in SDM considerably varied among participants,with some reporting their involvement was contingent on the“opportunity to ask questions”and the“treatment choices”offered to them.Alongside the opportunity for involvement,barriers such as avoidance of cultural care and a lack of continuity of care are new findings.Challenges encountered in SDM implementation also included resource constraints and time limitations in general practices.Rural knowledge of general practitioners and technology integration in consultations were viewed as potential enablers..Conclusion:Adequate resources and well-defined guidelines about the process should accompany the implementation of SDM in rural general practices of South Australia.Innovative strategies by general practitioners promoting health literacy and culturally-tailored communication approaches could increase older rural Australians'involvement in general.展开更多
The idea of a human community with a shared future was proposed by the Communist Party of China(CPC)Central Committee with Comrade Xi Jinping at its core for the future development of human beings to face up to the mo...The idea of a human community with a shared future was proposed by the Communist Party of China(CPC)Central Committee with Comrade Xi Jinping at its core for the future development of human beings to face up to the most important question in today's world:“What is happening to the world and what should we do?”It profoundly answers the question of the world,history,and the times.The theory of a human community with a shared future is an innovative theory with a multidimensional formation logic that guides humanity toward continually seeking common interests and values.This paper dives into the profound motivations behind building a human community with a shared future from historical,cultural,and practical dimensions and analyzes its epochal value from both domestic and international perspectives.This not only helps exert China's role in the international community,contributing Chinese strength to the construction of a peaceful,stable,and prosperous human society,but also enhances the influence of the idea of a human community with a shared future in the international community,accelerating the building of a human community with a shared future that considers the legitimate concerns of all countries,and aiding in solving the crises facing the world.展开更多
This study examines the influencing factors of rural tourism in promoting shared prosperity among households,using the case study of Yinan County in Shandong province,China.The research aims to provide insights into t...This study examines the influencing factors of rural tourism in promoting shared prosperity among households,using the case study of Yinan County in Shandong province,China.The research aims to provide insights into the economic benefits experienced by low-income households in the context of rural tourism development.Based on field research conducted from April 8,2023,to May 17,2023,including interviews and site visits,the study constructs an evaluation index system to assess the influencing factors.Through expert scoring and the application of a weighted set-valued mathematical statistical model,the importance and quantification of each factor are determined.The results indicate that the current stage of promoting shared prosperity through rural tourism in Yinan County is primarily influenced by the scale of tourist consumption of external visitors.This factor outweighs others such as the participation capacity and willingness of low-income households,the capacity of investment enterprises,and the policies and financial allocation of the local government.The findings emphasize the significance of external visitor spending and highlight the need to address the obstacles faced by low-income households in accessing economic benefits.The evaluation index system and measurement model presented in this study offer a scientific basis for assessing and improving the income situation of low-income households in rural tourism development initiatives.However,it is crucial to note that the importance of these influencing factors may evolve with the lifecycle of the tourism destination.Future research should include long-term tracking and consider a broader range of indicators to deepen our understanding of their mechanisms and significance.Furthermore,alternative approaches and theories may provide valuable perspectives for further exploration in this field.展开更多
Contemporary World Magazine,which is affiliated to the International Department of the CPC Central Committee(IDCPC),held an exchange act ivi ty themed on“Harmony for Shared Prosperity”in Beijing on May 7,2024.
Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since...Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display.展开更多
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all...For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks.展开更多
Modern shared-memory multi-core processors typically have shared Level 2(L2)or Level 3(L3)caches.Cache bottlenecks and replacement strategies are the main problems of such architectures,where multiple cores try to acc...Modern shared-memory multi-core processors typically have shared Level 2(L2)or Level 3(L3)caches.Cache bottlenecks and replacement strategies are the main problems of such architectures,where multiple cores try to access the shared cache simultaneously.The main problem in improving memory performance is the shared cache architecture and cache replacement.This paper documents the implementation of a Dual-Port Content Addressable Memory(DPCAM)and a modified Near-Far Access Replacement Algorithm(NFRA),which was previously proposed as a shared L2 cache layer in a multi-core processor.Standard Performance Evaluation Corporation(SPEC)Central Processing Unit(CPU)2006 benchmark workloads are used to evaluate the benefit of the shared L2 cache layer.Results show improved performance of the multicore processor’s DPCAM and NFRA algorithms,corresponding to a higher number of concurrent accesses to shared memory.The new architecture significantly increases system throughput and records performance improvements of up to 8.7%on various types of SPEC 2006 benchmarks.The miss rate is also improved by about 13%,with some exceptions in the sphinx3 and bzip2 benchmarks.These results could open a new window for solving the long-standing problems with shared cache in multi-core processors.展开更多
A concurrency control mechanism for collaborative work is akey element in a mixed reality environment. However, conventional lockingmechanisms restrict potential tasks or the support of non-owners, thusincreasing the ...A concurrency control mechanism for collaborative work is akey element in a mixed reality environment. However, conventional lockingmechanisms restrict potential tasks or the support of non-owners, thusincreasing the working time because of waiting to avoid conflicts. Herein, wepropose an adaptive concurrency control approach that can reduce conflictsand work time. We classify shared object manipulation in mixed reality intodetailed goals and tasks. Then, we model the relationships among goal,task, and ownership. As the collaborative work progresses, the proposedsystem adapts the different concurrency control mechanisms of shared objectmanipulation according to the modeling of goal–task–ownership. With theproposed concurrency control scheme, users can hold shared objects andmove and rotate together in a mixed reality environment similar to realindustrial sites. Additionally, this system provides MS Hololens and Myosensors to recognize inputs from a user and provides results in a mixed realityenvironment. The proposed method is applied to install an air conditioneras a case study. Experimental results and user studies show that, comparedwith the conventional approach, the proposed method reduced the number ofconflicts, waiting time, and total working time.展开更多
According to the historical records of prehistoric civilisation in China and the existing theories of prehistoric history within the academic community,it can be inferred that all human civilisations on Earth have the...According to the historical records of prehistoric civilisation in China and the existing theories of prehistoric history within the academic community,it can be inferred that all human civilisations on Earth have their origins in the period following the Great Flood,during which human civilisation was rebuilt.Furthermore,there are notable parallels between the figure of“Nuwa”in Chinese prehistoric civilisation and that of“Noah”in Western accounts.By treating the prehistoric flood event as a research approach in historical compilation,scholars can extract valuable insights into“building a community of a shared future for mankind”and use it as a symbol of global diplomatic relations.This approach can foster common values of mutual learning and exchange among nations,ultimately creating a more promising future for developing a new form of human civilisation.展开更多
Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The m...Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The main challenge at this stage is to integrate the blockchain from the resourceconstrained Io T devices and ensure the data of Io T system is credible. We provide a general framework for intelligent Io T data acquisition and sharing in an untrusted environment based on the blockchain, where gateways become Oracles. A distributed Oracle network based on Byzantine Fault Tolerant algorithm is used to provide trusted data for the blockchain to make intelligent Io T data trustworthy. An aggregation contract is deployed to collect data from various Oracle and share the credible data to all on-chain users. We also propose a gateway data aggregation scheme based on the REST API event publishing/subscribing mechanism which uses SQL to achieve flexible data aggregation. The experimental results show that the proposed scheme can alleviate the problem of limited performance of Io T equipment, make data reliable, and meet the diverse data needs on the chain.展开更多
In this paper, the problem of abnormal spectrum usage between satellite spectrum sharing systems is investigated to support multi-satellite spectrum coexistence. Given the cost of monitoring, the mobility of low-orbit...In this paper, the problem of abnormal spectrum usage between satellite spectrum sharing systems is investigated to support multi-satellite spectrum coexistence. Given the cost of monitoring, the mobility of low-orbit satellites, and the directional nature of their signals, traditional monitoring methods are no longer suitable, especially in the case of multiple power level. Mobile crowdsensing(MCS), as a new technology, can make full use of idle resources to complete a variety of perceptual tasks. However, traditional MCS heavily relies on a centralized server and is vulnerable to single point of failure attacks. Therefore, we replace the original centralized server with a blockchain-based distributed service provider to enable its security. Therefore, in this work, we propose a blockchain-based MCS framework, in which we explain in detail how this framework can achieve abnormal frequency behavior monitoring in an inter-satellite spectrum sharing system. Then, under certain false alarm probability, we propose an abnormal spectrum detection algorithm based on mixed hypothesis test to maximize detection probability in single power level and multiple power level scenarios, respectively. Finally, a Bad out of Good(BooG) detector is proposed to ease the computational pressure on the blockchain nodes. Simulation results show the effectiveness of the proposed framework.展开更多
With its untameable and traceable properties,blockchain technology has been widely used in the field of data sharing.How to preserve individual privacy while enabling efficient data queries is one of the primary issue...With its untameable and traceable properties,blockchain technology has been widely used in the field of data sharing.How to preserve individual privacy while enabling efficient data queries is one of the primary issues with secure data sharing.In this paper,we study verifiable keyword frequency(KF)queries with local differential privacy in blockchain.Both the numerical and the keyword attributes are present in data objects;the latter are sensitive and require privacy protection.However,prior studies in blockchain have the problem of trilemma in privacy protection and are unable to handle KF queries.We propose an efficient framework that protects data owners’privacy on keyword attributes while enabling quick and verifiable query processing for KF queries.The framework computes an estimate of a keyword’s frequency and is efficient in query time and verification object(VO)size.A utility-optimized local differential privacy technique is used for privacy protection.The data owner adds noise locally into data based on local differential privacy so that the attacker cannot infer the owner of the keywords while keeping the difference in the probability distribution of the KF within the privacy budget.We propose the VB-cm tree as the authenticated data structure(ADS).The VB-cm tree combines the Verkle tree and the Count-Min sketch(CM-sketch)to lower the VO size and query time.The VB-cm tree uses the vector commitment to verify the query results.The fixed-size CM-sketch,which summarizes the frequency of multiple keywords,is used to estimate the KF via hashing operations.We conduct an extensive evaluation of the proposed framework.The experimental results show that compared to theMerkle B+tree,the query time is reduced by 52.38%,and the VO size is reduced by more than one order of magnitude.展开更多
Cooperative utilization of multidimensional resources including cache, power and spectrum in satellite-terrestrial integrated networks(STINs) can provide a feasible approach for massive streaming media content deliver...Cooperative utilization of multidimensional resources including cache, power and spectrum in satellite-terrestrial integrated networks(STINs) can provide a feasible approach for massive streaming media content delivery over the seamless global coverage area. However, the on-board supportable resources of a single satellite are extremely limited and lack of interaction with others. In this paper, we design a network model with two-layered cache deployment, i.e., satellite layer and ground base station layer, and two types of sharing links, i.e., terrestrial-satellite sharing(TSS) links and inter-satellite sharing(ISS) links, to enhance the capability of cooperative delivery over STINs. Thus, we use rateless codes for the content divided-packet transmission, and derive the total energy efficiency(EE) in the whole transmission procedure, which is defined as the ratio of traffic offloading and energy consumption. We formulate two optimization problems about maximizing EE in different sharing scenarios(only TSS and TSS-ISS),and propose two optimized algorithms to obtain the optimal content placement matrixes, respectively.Simulation results demonstrate that, enabling sharing links with optimized cache placement have more than 2 times improvement of EE performance than other traditional placement schemes. Particularly, TSS-ISS schemes have the higher EE performance than only TSS schemes under the conditions of enough number of satellites and smaller inter-satellite distances.展开更多
In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propos...In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.展开更多
Generalized Additive Models(GAMs)are widely employed in ecological research,serving as a powerful tool for ecologists to explore complex nonlinear relationships between a response variable and predictors.Nevertheless,...Generalized Additive Models(GAMs)are widely employed in ecological research,serving as a powerful tool for ecologists to explore complex nonlinear relationships between a response variable and predictors.Nevertheless,evaluating the relative importance of predictors with concurvity(analogous to collinearity)on response variables in GAMs remains a challenge.To address this challenge,we developed an R package named gam.hp.gam.hp calculates individual R^(2) values for predictors,based on the concept of'average shared variance',a method previously introduced for multiple regression and canonical analyses.Through these individual R^(2)s,which add up to the overall R^(2),researchers can evaluate the relative importance of each predictor within GAMs.We illustrate the utility of the gam.hp package by evaluating the relative importance of emission sources and meteorological factors in explaining ozone concentration variability in air quality data from London,UK.We believe that the gam.hp package will improve the interpretation of results obtained from GAMs.展开更多
Objectives Renal replacement therapy(RRT)is increasingly adopted for critically ill patients diagnosed with acute kidney injury,but the optimal time for initiation remains unclear and prognosis is uncertain,leading to...Objectives Renal replacement therapy(RRT)is increasingly adopted for critically ill patients diagnosed with acute kidney injury,but the optimal time for initiation remains unclear and prognosis is uncertain,leading to medical complexity,ethical conflicts,and decision dilemmas in intensive care unit(ICU)settings.This study aimed to develop a decision aid(DA)for the family surrogate of critically ill patients to support their engagement in shared decision-making process with clinicians.Methods Development of DA employed a systematic process with user-centered design(UCD)principle,which included:(i)competitive analysis:searched,screened,and assessed the existing DAs to gather insights for design strategies,developmental techniques,and functionalities;(ii)user needs assessment:interviewed family surrogates in our hospital to explore target user group's decision-making experience and identify their unmet needs;(iii)evidence syntheses:integrate latest clinical evidence and pertinent information to inform the content development of DA.Results The competitive analysis included 16 relevant DAs,from which we derived valuable insights using existing resources.User decision needs were explored among a cohort of 15 family surrogates,revealing four thematic issues in decision-making,including stuck into dilemmas,sense of uncertainty,limited capacity,and delayed decision confirmation.A total of 27 articles were included for evidence syntheses.Relevant decision making knowledge on disease and treatment,as delineated in the literature sourced from decision support system or clinical guidelines,were formatted as the foundational knowledge base.Twenty-one items of evidence were extracted and integrated into the content panels of benefits and risks of RRT,possible outcomes,and reasons to choose.The DA was drafted into a web-based phototype using the elements of UCD.This platform could guide users in their preparation of decision-making through a sequential four-step process:identifying treatment options,weighing the benefits and risks,clarifying personal preferences and values,and formulating a schedule for formal shared decision-making with clinicians.Conclusions We developed a rapid prototype of DA tailored for family surrogate decision makers of critically ill patients in need of RRT in ICU setting.Future studies are needed to evaluate its usability,feasibility,and clinical effects of this intervention.展开更多
Objective:Analyze the research hotspots and frontiers of shared outpatient service,and provide a reference for researchers in this field to carry out follow-up research.Methods:Search the Web of Science core collectio...Objective:Analyze the research hotspots and frontiers of shared outpatient service,and provide a reference for researchers in this field to carry out follow-up research.Methods:Search the Web of Science core collection database until 2022 and visually analyzekeywords in this field through CiteSpace5.8.R3 software,Results:A total of 261 iteratures were included.The research focuses mainly on advanced care planning,diabetes care,andgroup prenatal care,The research trend tends to be telemedicine and nursing provided by specialized nurses.Conclusion:Scholars can learn from the research hotspots of foreign shared medical appointments,pay attention to the research trend,expand its application scope in combination with China's national conditions,and further promote thedevelopment of shared medical appointments in China.展开更多
基金supported by the Strategic Priority Research Program of the Chinese Academy of Sciences(XDB31020302)the Natural Science Foundation of China(32271564,31730104)“Western Young Scholars”Project of the Chinese Academy of Sciences(XAB2020YW02).
文摘Food sharing is a prosocial behavior consisting of the unresisted transfer of monopolizable food from a possessor to another individual(Feistner and McGrew 1989;Stevens and Gilby 2004).Despite the cost for donors(i.e.,loss of the food),intraspecifc food sharing occurs in various insects,fsh,birds,and aquatic,terrestrial,and arboreal mammals(Liévin‐Bazin et al.2019;Carter et al.2020).By far,most food sharing is intraspecifc,and takes place while possessors are in the process of eating.Here,we describe the remarkable case of a captive chimpanzee,Pan troglodytes,regularly dispensing food to another primate species(baboons,Papio hamadryas)in a neighboring enclosure.We discuss likely causes and functions of this interspecifc altruistic act.Observations were made in Xi’an Qinling Wildlife Park,Shaanxi Province,China(34°02ʹ56.22″N,108°51ʹ48.60″E),where two adult chimpanzees and a group of around 40-50 baboons lived in adjacent enclosures.The female chimpanzee(AiAi)was the elderly mother of the male(DuoDuo,or DD).At feeding times,AiAi usually ate near the door to the chimpanzees’indoor area,and she almost never interacted with the baboon group.The baboon group consisted of two one-male units.We recorded behaviors using focal-animal sampling(for information about subjects and methods,see Supplementary Materials).
基金This work was supported by Science and Technology Research Program of Chongqing Municipal Education Commission(KJZD-M202300502,KJQN201800539).
文摘In clustering algorithms,the selection of neighbors significantly affects the quality of the final clustering results.While various neighbor relationships exist,such as K-nearest neighbors,natural neighbors,and shared neighbors,most neighbor relationships can only handle single structural relationships,and the identification accuracy is low for datasets with multiple structures.In life,people’s first instinct for complex things is to divide them into multiple parts to complete.Partitioning the dataset into more sub-graphs is a good idea approach to identifying complex structures.Taking inspiration from this,we propose a novel neighbor method:Shared Natural Neighbors(SNaN).To demonstrate the superiority of this neighbor method,we propose a shared natural neighbors-based hierarchical clustering algorithm for discovering arbitrary-shaped clusters(HC-SNaN).Our algorithm excels in identifying both spherical clusters and manifold clusters.Tested on synthetic datasets and real-world datasets,HC-SNaN demonstrates significant advantages over existing clustering algorithms,particularly when dealing with datasets containing arbitrary shapes.
基金financed by the Flinders University College of Business,Government and Law Large Project Grant(Grant number:100031.21).
文摘Background:Shared decision-making(SDM)implementation is a priority for Australian health systems,including general practices but it remains complex for specific groups like older rural Australians.We initiated a qualitative study with older rural Australians to explore barriers to and facilitators of SDM in local general practices.Methods:We conducted a patient-oriented research,partnering with older rural Australians,families,and health service providers in research design.Participants who visited general practices were purposively sampled from five small rural towns in South Australia.A semi-structured interview guide was used for interviews and reflexive thematic coding was conducted.Results:Telephone interviews were held with 27 participants.Four themes were identified around older rural adults’involvement in SDM:(1)Understanding of"patient involvement";(2)Positive and negative outcomes;(3)Barriers to SDM;and(4)Facilitators to SDM.Understanding of patient involvement in SDM considerably varied among participants,with some reporting their involvement was contingent on the“opportunity to ask questions”and the“treatment choices”offered to them.Alongside the opportunity for involvement,barriers such as avoidance of cultural care and a lack of continuity of care are new findings.Challenges encountered in SDM implementation also included resource constraints and time limitations in general practices.Rural knowledge of general practitioners and technology integration in consultations were viewed as potential enablers..Conclusion:Adequate resources and well-defined guidelines about the process should accompany the implementation of SDM in rural general practices of South Australia.Innovative strategies by general practitioners promoting health literacy and culturally-tailored communication approaches could increase older rural Australians'involvement in general.
文摘The idea of a human community with a shared future was proposed by the Communist Party of China(CPC)Central Committee with Comrade Xi Jinping at its core for the future development of human beings to face up to the most important question in today's world:“What is happening to the world and what should we do?”It profoundly answers the question of the world,history,and the times.The theory of a human community with a shared future is an innovative theory with a multidimensional formation logic that guides humanity toward continually seeking common interests and values.This paper dives into the profound motivations behind building a human community with a shared future from historical,cultural,and practical dimensions and analyzes its epochal value from both domestic and international perspectives.This not only helps exert China's role in the international community,contributing Chinese strength to the construction of a peaceful,stable,and prosperous human society,but also enhances the influence of the idea of a human community with a shared future in the international community,accelerating the building of a human community with a shared future that considers the legitimate concerns of all countries,and aiding in solving the crises facing the world.
基金This research is supported by the National Social Science Fund of China(Grant No.21BGL150).
文摘This study examines the influencing factors of rural tourism in promoting shared prosperity among households,using the case study of Yinan County in Shandong province,China.The research aims to provide insights into the economic benefits experienced by low-income households in the context of rural tourism development.Based on field research conducted from April 8,2023,to May 17,2023,including interviews and site visits,the study constructs an evaluation index system to assess the influencing factors.Through expert scoring and the application of a weighted set-valued mathematical statistical model,the importance and quantification of each factor are determined.The results indicate that the current stage of promoting shared prosperity through rural tourism in Yinan County is primarily influenced by the scale of tourist consumption of external visitors.This factor outweighs others such as the participation capacity and willingness of low-income households,the capacity of investment enterprises,and the policies and financial allocation of the local government.The findings emphasize the significance of external visitor spending and highlight the need to address the obstacles faced by low-income households in accessing economic benefits.The evaluation index system and measurement model presented in this study offer a scientific basis for assessing and improving the income situation of low-income households in rural tourism development initiatives.However,it is crucial to note that the importance of these influencing factors may evolve with the lifecycle of the tourism destination.Future research should include long-term tracking and consider a broader range of indicators to deepen our understanding of their mechanisms and significance.Furthermore,alternative approaches and theories may provide valuable perspectives for further exploration in this field.
文摘Contemporary World Magazine,which is affiliated to the International Department of the CPC Central Committee(IDCPC),held an exchange act ivi ty themed on“Harmony for Shared Prosperity”in Beijing on May 7,2024.
基金support from the National Natural Science Foundation of China (No.62005164,62222507,62175101,and 62005166)the Shanghai Natural Science Foundation (23ZR1443700)+3 种基金Shuguang Program of Shanghai Education Development Foundation and Shanghai Municipal Education Commission (23SG41)the Young Elite Scientist Sponsorship Program by CAST (No.20220042)Science and Technology Commission of Shanghai Municipality (Grant No.21DZ1100500)the Shanghai Municipal Science and Technology Major Project,and the Shanghai Frontiers Science Center Program (2021-2025 No.20).
文摘Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display.
基金partially supported by the National Natural Science Foundation of China under grant no.62372245the Foundation of Yunnan Key Laboratory of Blockchain Application Technology under Grant 202105AG070005+1 种基金in part by the Foundation of State Key Laboratory of Public Big Datain part by the Foundation of Key Laboratory of Computational Science and Application of Hainan Province under Grant JSKX202202。
文摘For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks.
文摘Modern shared-memory multi-core processors typically have shared Level 2(L2)or Level 3(L3)caches.Cache bottlenecks and replacement strategies are the main problems of such architectures,where multiple cores try to access the shared cache simultaneously.The main problem in improving memory performance is the shared cache architecture and cache replacement.This paper documents the implementation of a Dual-Port Content Addressable Memory(DPCAM)and a modified Near-Far Access Replacement Algorithm(NFRA),which was previously proposed as a shared L2 cache layer in a multi-core processor.Standard Performance Evaluation Corporation(SPEC)Central Processing Unit(CPU)2006 benchmark workloads are used to evaluate the benefit of the shared L2 cache layer.Results show improved performance of the multicore processor’s DPCAM and NFRA algorithms,corresponding to a higher number of concurrent accesses to shared memory.The new architecture significantly increases system throughput and records performance improvements of up to 8.7%on various types of SPEC 2006 benchmarks.The miss rate is also improved by about 13%,with some exceptions in the sphinx3 and bzip2 benchmarks.These results could open a new window for solving the long-standing problems with shared cache in multi-core processors.
基金supported by“Regional Innovation Strategy (RIS)”through the National Research Foundation of Korea (NRF)funded by the Ministry of Education (MOE) (2021RIS-004).
文摘A concurrency control mechanism for collaborative work is akey element in a mixed reality environment. However, conventional lockingmechanisms restrict potential tasks or the support of non-owners, thusincreasing the working time because of waiting to avoid conflicts. Herein, wepropose an adaptive concurrency control approach that can reduce conflictsand work time. We classify shared object manipulation in mixed reality intodetailed goals and tasks. Then, we model the relationships among goal,task, and ownership. As the collaborative work progresses, the proposedsystem adapts the different concurrency control mechanisms of shared objectmanipulation according to the modeling of goal–task–ownership. With theproposed concurrency control scheme, users can hold shared objects andmove and rotate together in a mixed reality environment similar to realindustrial sites. Additionally, this system provides MS Hololens and Myosensors to recognize inputs from a user and provides results in a mixed realityenvironment. The proposed method is applied to install an air conditioneras a case study. Experimental results and user studies show that, comparedwith the conventional approach, the proposed method reduced the number ofconflicts, waiting time, and total working time.
文摘According to the historical records of prehistoric civilisation in China and the existing theories of prehistoric history within the academic community,it can be inferred that all human civilisations on Earth have their origins in the period following the Great Flood,during which human civilisation was rebuilt.Furthermore,there are notable parallels between the figure of“Nuwa”in Chinese prehistoric civilisation and that of“Noah”in Western accounts.By treating the prehistoric flood event as a research approach in historical compilation,scholars can extract valuable insights into“building a community of a shared future for mankind”and use it as a symbol of global diplomatic relations.This approach can foster common values of mutual learning and exchange among nations,ultimately creating a more promising future for developing a new form of human civilisation.
基金supported by the open research fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology(Nanjing University of Posts and Telecommunications),Ministry of Education(No.JZNY202114)Postgraduate Research&Practice Innovation Program of Jiangsu Province(No.KYCX210734).
文摘Traditional Io T systems suffer from high equipment management costs and difficulty in trustworthy data sharing caused by centralization.Blockchain provides a feasible research direction to solve these problems. The main challenge at this stage is to integrate the blockchain from the resourceconstrained Io T devices and ensure the data of Io T system is credible. We provide a general framework for intelligent Io T data acquisition and sharing in an untrusted environment based on the blockchain, where gateways become Oracles. A distributed Oracle network based on Byzantine Fault Tolerant algorithm is used to provide trusted data for the blockchain to make intelligent Io T data trustworthy. An aggregation contract is deployed to collect data from various Oracle and share the credible data to all on-chain users. We also propose a gateway data aggregation scheme based on the REST API event publishing/subscribing mechanism which uses SQL to achieve flexible data aggregation. The experimental results show that the proposed scheme can alleviate the problem of limited performance of Io T equipment, make data reliable, and meet the diverse data needs on the chain.
文摘In this paper, the problem of abnormal spectrum usage between satellite spectrum sharing systems is investigated to support multi-satellite spectrum coexistence. Given the cost of monitoring, the mobility of low-orbit satellites, and the directional nature of their signals, traditional monitoring methods are no longer suitable, especially in the case of multiple power level. Mobile crowdsensing(MCS), as a new technology, can make full use of idle resources to complete a variety of perceptual tasks. However, traditional MCS heavily relies on a centralized server and is vulnerable to single point of failure attacks. Therefore, we replace the original centralized server with a blockchain-based distributed service provider to enable its security. Therefore, in this work, we propose a blockchain-based MCS framework, in which we explain in detail how this framework can achieve abnormal frequency behavior monitoring in an inter-satellite spectrum sharing system. Then, under certain false alarm probability, we propose an abnormal spectrum detection algorithm based on mixed hypothesis test to maximize detection probability in single power level and multiple power level scenarios, respectively. Finally, a Bad out of Good(BooG) detector is proposed to ease the computational pressure on the blockchain nodes. Simulation results show the effectiveness of the proposed framework.
文摘With its untameable and traceable properties,blockchain technology has been widely used in the field of data sharing.How to preserve individual privacy while enabling efficient data queries is one of the primary issues with secure data sharing.In this paper,we study verifiable keyword frequency(KF)queries with local differential privacy in blockchain.Both the numerical and the keyword attributes are present in data objects;the latter are sensitive and require privacy protection.However,prior studies in blockchain have the problem of trilemma in privacy protection and are unable to handle KF queries.We propose an efficient framework that protects data owners’privacy on keyword attributes while enabling quick and verifiable query processing for KF queries.The framework computes an estimate of a keyword’s frequency and is efficient in query time and verification object(VO)size.A utility-optimized local differential privacy technique is used for privacy protection.The data owner adds noise locally into data based on local differential privacy so that the attacker cannot infer the owner of the keywords while keeping the difference in the probability distribution of the KF within the privacy budget.We propose the VB-cm tree as the authenticated data structure(ADS).The VB-cm tree combines the Verkle tree and the Count-Min sketch(CM-sketch)to lower the VO size and query time.The VB-cm tree uses the vector commitment to verify the query results.The fixed-size CM-sketch,which summarizes the frequency of multiple keywords,is used to estimate the KF via hashing operations.We conduct an extensive evaluation of the proposed framework.The experimental results show that compared to theMerkle B+tree,the query time is reduced by 52.38%,and the VO size is reduced by more than one order of magnitude.
基金supported by National Natural Sciences Foundation of China(No.62271165,62027802,61831008)the Guangdong Basic and Applied Basic Research Foundation(No.2023A1515030297,2021A1515011572)Shenzhen Science and Technology Program ZDSYS20210623091808025,Stable Support Plan Program GXWD20231129102638002.
文摘Cooperative utilization of multidimensional resources including cache, power and spectrum in satellite-terrestrial integrated networks(STINs) can provide a feasible approach for massive streaming media content delivery over the seamless global coverage area. However, the on-board supportable resources of a single satellite are extremely limited and lack of interaction with others. In this paper, we design a network model with two-layered cache deployment, i.e., satellite layer and ground base station layer, and two types of sharing links, i.e., terrestrial-satellite sharing(TSS) links and inter-satellite sharing(ISS) links, to enhance the capability of cooperative delivery over STINs. Thus, we use rateless codes for the content divided-packet transmission, and derive the total energy efficiency(EE) in the whole transmission procedure, which is defined as the ratio of traffic offloading and energy consumption. We formulate two optimization problems about maximizing EE in different sharing scenarios(only TSS and TSS-ISS),and propose two optimized algorithms to obtain the optimal content placement matrixes, respectively.Simulation results demonstrate that, enabling sharing links with optimized cache placement have more than 2 times improvement of EE performance than other traditional placement schemes. Particularly, TSS-ISS schemes have the higher EE performance than only TSS schemes under the conditions of enough number of satellites and smaller inter-satellite distances.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61971348 and 61201194)。
文摘In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.
基金supported by the National Natural Science Foundation of China (32271551)National Key Research and Development Program of China (2023YFF0805803)the Metasequoia funding of Nanjing Forestry University。
文摘Generalized Additive Models(GAMs)are widely employed in ecological research,serving as a powerful tool for ecologists to explore complex nonlinear relationships between a response variable and predictors.Nevertheless,evaluating the relative importance of predictors with concurvity(analogous to collinearity)on response variables in GAMs remains a challenge.To address this challenge,we developed an R package named gam.hp.gam.hp calculates individual R^(2) values for predictors,based on the concept of'average shared variance',a method previously introduced for multiple regression and canonical analyses.Through these individual R^(2)s,which add up to the overall R^(2),researchers can evaluate the relative importance of each predictor within GAMs.We illustrate the utility of the gam.hp package by evaluating the relative importance of emission sources and meteorological factors in explaining ozone concentration variability in air quality data from London,UK.We believe that the gam.hp package will improve the interpretation of results obtained from GAMs.
文摘Objectives Renal replacement therapy(RRT)is increasingly adopted for critically ill patients diagnosed with acute kidney injury,but the optimal time for initiation remains unclear and prognosis is uncertain,leading to medical complexity,ethical conflicts,and decision dilemmas in intensive care unit(ICU)settings.This study aimed to develop a decision aid(DA)for the family surrogate of critically ill patients to support their engagement in shared decision-making process with clinicians.Methods Development of DA employed a systematic process with user-centered design(UCD)principle,which included:(i)competitive analysis:searched,screened,and assessed the existing DAs to gather insights for design strategies,developmental techniques,and functionalities;(ii)user needs assessment:interviewed family surrogates in our hospital to explore target user group's decision-making experience and identify their unmet needs;(iii)evidence syntheses:integrate latest clinical evidence and pertinent information to inform the content development of DA.Results The competitive analysis included 16 relevant DAs,from which we derived valuable insights using existing resources.User decision needs were explored among a cohort of 15 family surrogates,revealing four thematic issues in decision-making,including stuck into dilemmas,sense of uncertainty,limited capacity,and delayed decision confirmation.A total of 27 articles were included for evidence syntheses.Relevant decision making knowledge on disease and treatment,as delineated in the literature sourced from decision support system or clinical guidelines,were formatted as the foundational knowledge base.Twenty-one items of evidence were extracted and integrated into the content panels of benefits and risks of RRT,possible outcomes,and reasons to choose.The DA was drafted into a web-based phototype using the elements of UCD.This platform could guide users in their preparation of decision-making through a sequential four-step process:identifying treatment options,weighing the benefits and risks,clarifying personal preferences and values,and formulating a schedule for formal shared decision-making with clinicians.Conclusions We developed a rapid prototype of DA tailored for family surrogate decision makers of critically ill patients in need of RRT in ICU setting.Future studies are needed to evaluate its usability,feasibility,and clinical effects of this intervention.
文摘Objective:Analyze the research hotspots and frontiers of shared outpatient service,and provide a reference for researchers in this field to carry out follow-up research.Methods:Search the Web of Science core collection database until 2022 and visually analyzekeywords in this field through CiteSpace5.8.R3 software,Results:A total of 261 iteratures were included.The research focuses mainly on advanced care planning,diabetes care,andgroup prenatal care,The research trend tends to be telemedicine and nursing provided by specialized nurses.Conclusion:Scholars can learn from the research hotspots of foreign shared medical appointments,pay attention to the research trend,expand its application scope in combination with China's national conditions,and further promote thedevelopment of shared medical appointments in China.