Based on improved Cournot model and Stackelberg model,this paper analyzes the firstmover advantage of China Mobile which is in a dominant position;then,by using complete information dynamic game,this paper analyzes th...Based on improved Cournot model and Stackelberg model,this paper analyzes the firstmover advantage of China Mobile which is in a dominant position;then,by using complete information dynamic game,this paper analyzes the market shares of the oligarchic monopoly market of the mobile communications industry before the restructuring of the telecom industry and tests the analysis conclusion;at the same time,this paper analyzes the market shares in initial stage and mature stage of the mobile communications market after the restructuring.According to the analysis of this paper,China Mobile's market share will drop after the restructuring,the restructuring has a certain effect,but China Mobile is still in a leading position.Whether the duopoly market before the restructuring or the three oligopoly market after the restructuring,every mobile operator has a relatively fixed market share under stable condition.This shows that mobile operators in China should cooperate on the basis of competition when developing the domestic market,and explore the international market to achieve greater development.展开更多
ZTE Corporation, a leading global provider of telecommunications equipment and network solutions revealed on April 12, 2010 that Infonetics, a leading market research firm, has recently released a 2G/3G Mobile Infrast...ZTE Corporation, a leading global provider of telecommunications equipment and network solutions revealed on April 12, 2010 that Infonetics, a leading market research firm, has recently released a 2G/3G Mobile Infrastructure and Subscribers Report on the global wireless communication equipment market in 2009. According to the report, major changes have occurred in the shares of the global wireless communication market.展开更多
The employee shares of Guilin Jiqi became tradable in stock exchanges from June 2000. The firm coincidently made up her profit disclosed in the semi-annual report. After ruling out other explanations, we find that the...The employee shares of Guilin Jiqi became tradable in stock exchanges from June 2000. The firm coincidently made up her profit disclosed in the semi-annual report. After ruling out other explanations, we find that the fraud of Guilin Jiqi seems to be intended to help her employees (not including top managers) to reap profits at the expense of misled investors. Our findings offer a potential insight into relating employee shares to insider selling.展开更多
We study the sample of 311 non-outstanding shares transfers from 2003 to 2004. The object of this study is to determine the extent to which premium can be explained by financial factors of firms. The intrinsic value o...We study the sample of 311 non-outstanding shares transfers from 2003 to 2004. The object of this study is to determine the extent to which premium can be explained by financial factors of firms. The intrinsic value of transferred shares with control right is different from the others. We find that the larger percent of share transferred, the higher premium will be paid. Current liability ratio interpreting the premium of non-outstanding shares transfers is negative related to short term debt. Price ratio can determine the premium level when the ratio of transfer share under 30 percent展开更多
After analyzing 262 corporations when their inner employees' shares (IES) become tradable from 1999 to 2003, we find that under-line items and probability of issuing stock dividend are significantly higher for firm...After analyzing 262 corporations when their inner employees' shares (IES) become tradable from 1999 to 2003, we find that under-line items and probability of issuing stock dividend are significantly higher for firms with IES than firms without IES. In the two years before IES become tradable, corporations with IES tend to manipulate profit through under-line items and are more probable to issue stock dividend.展开更多
With the implementation of China’s reform and opening up policy and China’s successful accession to the World Trade Organization,more and more overseas financial institutions are participating in various Chinese ban...With the implementation of China’s reform and opening up policy and China’s successful accession to the World Trade Organization,more and more overseas financial institutions are participating in various Chinese banks,and the amount of investment is also expanding.Therefore,it is particularly important to study the impact of overseas financial institutions participating in the Chinese Banks on the operating efficiency of the China’s banking industry.Therefore,based on the previous literature research,this paper constructs six models to explore whether foreign financial institutions participate in shares and the impact of shareholding ratio on the operating efficiency of China’s banking industry.展开更多
Since the Third Plenary Session of the 18 th Central Committee of the Communist Party of China, the concept of the mixed ownership economy has received extensive attention from all sectors of society, which has effect...Since the Third Plenary Session of the 18 th Central Committee of the Communist Party of China, the concept of the mixed ownership economy has received extensive attention from all sectors of society, which has effect on a coming new round of reformation on enterprise property. However, in order to take control of the state-owned shares in the end making the state ownership economy become the principal position and to enlarge the scale of state-owned shares, which guides the common development with the non-public sectors of the economy, how to determine the proportion of state-owned shares? Under the background of the mixed ownership reformation, the article explains the mixed ownership by explaining how to enlarge the state-owned assets controlling scale and how to improve the stateowned company 'economic effi ciency and how to protect the interests of small shareholders. The final conclusion is that the SASAC should use the thinking of relative holdings, instead of the absolute control thinking, and should make use of the games among the large shareholders and the pyramidal ownership structure to make the pattern of ownership diversify.展开更多
Theory and practice of full social security funds have been more concerned about the Chinese enterprise reform in particular lack of social security funds are insufficient pension fund problem has been of great concer...Theory and practice of full social security funds have been more concerned about the Chinese enterprise reform in particular lack of social security funds are insufficient pension fund problem has been of great concern. But with the aging of the population has become increasingly prominent, personal accounts empty account, insufficient co-ordination of social security funds and other funds in the account more and more pronounced. By analyzing the necessity and rationality of state-owned shares transfer, we can see that the use of state-owned shares transfer is a good way to supplement pension fund.展开更多
With a view to standardizing the business operationsrelating to foreign investment of domestic and overseas secu-rities organizations and protecting the legitimate rights andinterests of investors,the China Security R...With a view to standardizing the business operationsrelating to foreign investment of domestic and overseas secu-rities organizations and protecting the legitimate rights andinterests of investors,the China Security Regulatory Commis-sion has promulgated the Provisional Regulations on theManagement of the Qualification of Domestic and OverseasSecurities Organizations to Engage in the Business Opera-tions concerning Shares Owned by Foreign Investors.TheseRegulations enter into force on December 1.1996.The wholetext is as follows:Chapter 1 General PrinciplesArticle 1 With a view to standardizing the businessoperations of domestic and overseas securities organizationswhich relate to shares owned by foreign investors and pro-展开更多
This paper studies the web third-person effect (WTPE) hypothesis in the context of news websites and social media. Specifically, the study examines the role of social media metrics (i.e., shares and likes of news a...This paper studies the web third-person effect (WTPE) hypothesis in the context of news websites and social media. Specifically, the study examines the role of social media metrics (i.e., shares and likes of news articles) in shaping users' opinion about the websites. Users' news sharing intention in social media is also investigated. Based on a structured online questionnaire (N = 7,404), the results confirm that WTPE can be found in social media metrics without the presence of specific message content. It should be noted that the effect was found at three perceptual levels, self, friends, and other users. Regarding intention for news sharing, text was indicated as the most important reason among Internet users. Finally, the work demonstrates significant correlations between WTPE and article characteristics that influence people's attitudes to share news online.展开更多
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i...Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods.展开更多
High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency...High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV.展开更多
Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since...Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display.展开更多
In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ...In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ISAC, we propose a design scheme based on spectrum sharing, that is,to maximize the mutual information(MI) of radar sensing while ensuring certain communication rate and transmission power constraints. In the proposed scheme, three cases are considered for the scattering off the target due to the communication signals,as negligible signal, beneficial signal, and interference signal to radar sensing, respectively, thus requiring three power allocation schemes. However,the corresponding power allocation schemes are nonconvex and their closed-form solutions are unavailable as a consequence. Motivated by this, alternating optimization(AO), sequence convex programming(SCP) and Lagrange multiplier are individually combined for three suboptimal solutions corresponding with three power allocation schemes. By combining the three algorithms, we transform the non-convex problem which is difficult to deal with into a convex problem which is easy to solve and obtain the suboptimal solution of the corresponding optimization problem. Numerical results show that, compared with the allocation results of the existing algorithms, the proposed joint design algorithm significantly improves the radar performance.展开更多
In the information age,electronic documents(e-documents)have become a popular alternative to paper documents due to their lower costs,higher dissemination rates,and ease of knowledge sharing.However,digital copyright ...In the information age,electronic documents(e-documents)have become a popular alternative to paper documents due to their lower costs,higher dissemination rates,and ease of knowledge sharing.However,digital copyright infringements occur frequently due to the ease of copying,which not only infringes on the rights of creators but also weakens their creative enthusiasm.Therefore,it is crucial to establish an e-document sharing system that enforces copyright protection.However,the existing centralized system has outstanding vulnerabilities,and the plagiarism detection algorithm used cannot fully detect the context,semantics,style,and other factors of the text.Digital watermark technology is only used as a means of infringement tracing.This paper proposes a decentralized framework for e-document sharing based on decentralized autonomous organization(DAO)and non-fungible token(NFT)in blockchain.The use of blockchain as a distributed credit base resolves the vulnerabilities inherent in traditional centralized systems.The e-document evaluation and plagiarism detection mechanisms based on the DAO model effectively address challenges in comprehensive text information checks,thereby promoting the enhancement of e-document quality.The mechanism for protecting and circulating e-document copyrights using NFT technology ensures effective safeguarding of users’e-document copyrights and facilitates e-document sharing.Moreover,recognizing the security issues within the DAO governance mechanism,we introduce an innovative optimization solution.Through experimentation,we validate the enhanced security of the optimized governance mechanism,reducing manipulation risks by up to 51%.Additionally,by utilizing evolutionary game analysis to deduce the equilibrium strategies of the framework,we discovered that adjusting the reward and penalty parameters of the incentive mechanism motivates creators to generate superior quality and unique e-documents,while evaluators are more likely to engage in assessments.展开更多
In this paper, the problem of abnormal spectrum usage between satellite spectrum sharing systems is investigated to support multi-satellite spectrum coexistence. Given the cost of monitoring, the mobility of low-orbit...In this paper, the problem of abnormal spectrum usage between satellite spectrum sharing systems is investigated to support multi-satellite spectrum coexistence. Given the cost of monitoring, the mobility of low-orbit satellites, and the directional nature of their signals, traditional monitoring methods are no longer suitable, especially in the case of multiple power level. Mobile crowdsensing(MCS), as a new technology, can make full use of idle resources to complete a variety of perceptual tasks. However, traditional MCS heavily relies on a centralized server and is vulnerable to single point of failure attacks. Therefore, we replace the original centralized server with a blockchain-based distributed service provider to enable its security. Therefore, in this work, we propose a blockchain-based MCS framework, in which we explain in detail how this framework can achieve abnormal frequency behavior monitoring in an inter-satellite spectrum sharing system. Then, under certain false alarm probability, we propose an abnormal spectrum detection algorithm based on mixed hypothesis test to maximize detection probability in single power level and multiple power level scenarios, respectively. Finally, a Bad out of Good(BooG) detector is proposed to ease the computational pressure on the blockchain nodes. Simulation results show the effectiveness of the proposed framework.展开更多
文摘Based on improved Cournot model and Stackelberg model,this paper analyzes the firstmover advantage of China Mobile which is in a dominant position;then,by using complete information dynamic game,this paper analyzes the market shares of the oligarchic monopoly market of the mobile communications industry before the restructuring of the telecom industry and tests the analysis conclusion;at the same time,this paper analyzes the market shares in initial stage and mature stage of the mobile communications market after the restructuring.According to the analysis of this paper,China Mobile's market share will drop after the restructuring,the restructuring has a certain effect,but China Mobile is still in a leading position.Whether the duopoly market before the restructuring or the three oligopoly market after the restructuring,every mobile operator has a relatively fixed market share under stable condition.This shows that mobile operators in China should cooperate on the basis of competition when developing the domestic market,and explore the international market to achieve greater development.
文摘ZTE Corporation, a leading global provider of telecommunications equipment and network solutions revealed on April 12, 2010 that Infonetics, a leading market research firm, has recently released a 2G/3G Mobile Infrastructure and Subscribers Report on the global wireless communication equipment market in 2009. According to the report, major changes have occurred in the shares of the global wireless communication market.
文摘The employee shares of Guilin Jiqi became tradable in stock exchanges from June 2000. The firm coincidently made up her profit disclosed in the semi-annual report. After ruling out other explanations, we find that the fraud of Guilin Jiqi seems to be intended to help her employees (not including top managers) to reap profits at the expense of misled investors. Our findings offer a potential insight into relating employee shares to insider selling.
文摘We study the sample of 311 non-outstanding shares transfers from 2003 to 2004. The object of this study is to determine the extent to which premium can be explained by financial factors of firms. The intrinsic value of transferred shares with control right is different from the others. We find that the larger percent of share transferred, the higher premium will be paid. Current liability ratio interpreting the premium of non-outstanding shares transfers is negative related to short term debt. Price ratio can determine the premium level when the ratio of transfer share under 30 percent
文摘After analyzing 262 corporations when their inner employees' shares (IES) become tradable from 1999 to 2003, we find that under-line items and probability of issuing stock dividend are significantly higher for firms with IES than firms without IES. In the two years before IES become tradable, corporations with IES tend to manipulate profit through under-line items and are more probable to issue stock dividend.
文摘With the implementation of China’s reform and opening up policy and China’s successful accession to the World Trade Organization,more and more overseas financial institutions are participating in various Chinese banks,and the amount of investment is also expanding.Therefore,it is particularly important to study the impact of overseas financial institutions participating in the Chinese Banks on the operating efficiency of the China’s banking industry.Therefore,based on the previous literature research,this paper constructs six models to explore whether foreign financial institutions participate in shares and the impact of shareholding ratio on the operating efficiency of China’s banking industry.
文摘Since the Third Plenary Session of the 18 th Central Committee of the Communist Party of China, the concept of the mixed ownership economy has received extensive attention from all sectors of society, which has effect on a coming new round of reformation on enterprise property. However, in order to take control of the state-owned shares in the end making the state ownership economy become the principal position and to enlarge the scale of state-owned shares, which guides the common development with the non-public sectors of the economy, how to determine the proportion of state-owned shares? Under the background of the mixed ownership reformation, the article explains the mixed ownership by explaining how to enlarge the state-owned assets controlling scale and how to improve the stateowned company 'economic effi ciency and how to protect the interests of small shareholders. The final conclusion is that the SASAC should use the thinking of relative holdings, instead of the absolute control thinking, and should make use of the games among the large shareholders and the pyramidal ownership structure to make the pattern of ownership diversify.
文摘Theory and practice of full social security funds have been more concerned about the Chinese enterprise reform in particular lack of social security funds are insufficient pension fund problem has been of great concern. But with the aging of the population has become increasingly prominent, personal accounts empty account, insufficient co-ordination of social security funds and other funds in the account more and more pronounced. By analyzing the necessity and rationality of state-owned shares transfer, we can see that the use of state-owned shares transfer is a good way to supplement pension fund.
文摘With a view to standardizing the business operationsrelating to foreign investment of domestic and overseas secu-rities organizations and protecting the legitimate rights andinterests of investors,the China Security Regulatory Commis-sion has promulgated the Provisional Regulations on theManagement of the Qualification of Domestic and OverseasSecurities Organizations to Engage in the Business Opera-tions concerning Shares Owned by Foreign Investors.TheseRegulations enter into force on December 1.1996.The wholetext is as follows:Chapter 1 General PrinciplesArticle 1 With a view to standardizing the businessoperations of domestic and overseas securities organizationswhich relate to shares owned by foreign investors and pro-
文摘This paper studies the web third-person effect (WTPE) hypothesis in the context of news websites and social media. Specifically, the study examines the role of social media metrics (i.e., shares and likes of news articles) in shaping users' opinion about the websites. Users' news sharing intention in social media is also investigated. Based on a structured online questionnaire (N = 7,404), the results confirm that WTPE can be found in social media metrics without the presence of specific message content. It should be noted that the effect was found at three perceptual levels, self, friends, and other users. Regarding intention for news sharing, text was indicated as the most important reason among Internet users. Finally, the work demonstrates significant correlations between WTPE and article characteristics that influence people's attitudes to share news online.
基金supported by RUSA PHASE 2.0,Alagappa University,Karaikudi,India。
文摘Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods.
基金supported in part by the National Natural Science Foundation of China(62371116 and 62231020)in part by the Science and Technology Project of Hebei Province Education Department(ZD2022164)+2 种基金in part by the Fundamental Research Funds for the Central Universities(N2223031)in part by the Open Research Project of Xidian University(ISN24-08)Key Laboratory of Cognitive Radio and Information Processing,Ministry of Education(Guilin University of Electronic Technology,China,CRKL210203)。
文摘High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV.
基金support from the National Natural Science Foundation of China (No.62005164,62222507,62175101,and 62005166)the Shanghai Natural Science Foundation (23ZR1443700)+3 种基金Shuguang Program of Shanghai Education Development Foundation and Shanghai Municipal Education Commission (23SG41)the Young Elite Scientist Sponsorship Program by CAST (No.20220042)Science and Technology Commission of Shanghai Municipality (Grant No.21DZ1100500)the Shanghai Municipal Science and Technology Major Project,and the Shanghai Frontiers Science Center Program (2021-2025 No.20).
文摘Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display.
文摘In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ISAC, we propose a design scheme based on spectrum sharing, that is,to maximize the mutual information(MI) of radar sensing while ensuring certain communication rate and transmission power constraints. In the proposed scheme, three cases are considered for the scattering off the target due to the communication signals,as negligible signal, beneficial signal, and interference signal to radar sensing, respectively, thus requiring three power allocation schemes. However,the corresponding power allocation schemes are nonconvex and their closed-form solutions are unavailable as a consequence. Motivated by this, alternating optimization(AO), sequence convex programming(SCP) and Lagrange multiplier are individually combined for three suboptimal solutions corresponding with three power allocation schemes. By combining the three algorithms, we transform the non-convex problem which is difficult to deal with into a convex problem which is easy to solve and obtain the suboptimal solution of the corresponding optimization problem. Numerical results show that, compared with the allocation results of the existing algorithms, the proposed joint design algorithm significantly improves the radar performance.
基金This work is supported by the National Key Research and Development Program(2022YFB2702300)National Natural Science Foundation of China(Grant No.62172115)+2 种基金Innovation Fund Program of the Engineering Research Center for Integration and Application of Digital Learning Technology of Ministry of Education under Grant Number No.1331005Guangdong Higher Education Innovation Group 2020KCXTD007Guangzhou Fundamental Research Plan of Municipal-School Jointly Funded Projects(No.202102010445).
文摘In the information age,electronic documents(e-documents)have become a popular alternative to paper documents due to their lower costs,higher dissemination rates,and ease of knowledge sharing.However,digital copyright infringements occur frequently due to the ease of copying,which not only infringes on the rights of creators but also weakens their creative enthusiasm.Therefore,it is crucial to establish an e-document sharing system that enforces copyright protection.However,the existing centralized system has outstanding vulnerabilities,and the plagiarism detection algorithm used cannot fully detect the context,semantics,style,and other factors of the text.Digital watermark technology is only used as a means of infringement tracing.This paper proposes a decentralized framework for e-document sharing based on decentralized autonomous organization(DAO)and non-fungible token(NFT)in blockchain.The use of blockchain as a distributed credit base resolves the vulnerabilities inherent in traditional centralized systems.The e-document evaluation and plagiarism detection mechanisms based on the DAO model effectively address challenges in comprehensive text information checks,thereby promoting the enhancement of e-document quality.The mechanism for protecting and circulating e-document copyrights using NFT technology ensures effective safeguarding of users’e-document copyrights and facilitates e-document sharing.Moreover,recognizing the security issues within the DAO governance mechanism,we introduce an innovative optimization solution.Through experimentation,we validate the enhanced security of the optimized governance mechanism,reducing manipulation risks by up to 51%.Additionally,by utilizing evolutionary game analysis to deduce the equilibrium strategies of the framework,we discovered that adjusting the reward and penalty parameters of the incentive mechanism motivates creators to generate superior quality and unique e-documents,while evaluators are more likely to engage in assessments.
文摘In this paper, the problem of abnormal spectrum usage between satellite spectrum sharing systems is investigated to support multi-satellite spectrum coexistence. Given the cost of monitoring, the mobility of low-orbit satellites, and the directional nature of their signals, traditional monitoring methods are no longer suitable, especially in the case of multiple power level. Mobile crowdsensing(MCS), as a new technology, can make full use of idle resources to complete a variety of perceptual tasks. However, traditional MCS heavily relies on a centralized server and is vulnerable to single point of failure attacks. Therefore, we replace the original centralized server with a blockchain-based distributed service provider to enable its security. Therefore, in this work, we propose a blockchain-based MCS framework, in which we explain in detail how this framework can achieve abnormal frequency behavior monitoring in an inter-satellite spectrum sharing system. Then, under certain false alarm probability, we propose an abnormal spectrum detection algorithm based on mixed hypothesis test to maximize detection probability in single power level and multiple power level scenarios, respectively. Finally, a Bad out of Good(BooG) detector is proposed to ease the computational pressure on the blockchain nodes. Simulation results show the effectiveness of the proposed framework.