With the rapid development of science and technology,the face of human society has undergone great changes;with the emergence of the Internet era,all kinds of educational technology,equipment,and software in vocationa...With the rapid development of science and technology,the face of human society has undergone great changes;with the emergence of the Internet era,all kinds of educational technology,equipment,and software in vocational colleges have been widely used to carry out education and teaching,and has achieved remarkable results.Based on this,colleges and universities’electronic commerce(e-commerce)professional teachers should try to rely on the Internet to build information teaching classrooms,introduce advanced methods to build efficient classrooms by integrating teaching resources,and optimize the top-level design,so as to activate the classroom atmosphere,mobilize students’emotions,make them immersed in the teaching of electronic commerce courses.In view of this,this paper combines the existing theory and experience,first analyzes the dilemma faced by the current teaching of e-commerce in vocational colleges,then discusses the practical significance of teaching reform based on the Internet era,and lastly puts forward the specific practice path.展开更多
With the rapid development of information technology,the combination of terminal technology,big data and mobile Internet and textbooks has become an irresistible trend in the modern education field.Under the context o...With the rapid development of information technology,the combination of terminal technology,big data and mobile Internet and textbooks has become an irresistible trend in the modern education field.Under the context of the Internet,carrying out education and teaching activities based on digital textbooks can give full play to the rich media,openness and interaction of digital textbooks,broaden students′horizon,enrich students′knowledge,and promote the improvement of students′ability and all-round development.However,in the specific teaching practice,there are also problems such as old compilation ideas,single compilation mode and low efficiency of personalized learning.Therefore,schools and teachers need to constantly innovate the presentation and arrangement of digital textbooks,strengthen technical support,deepen students′understanding of the teaching content of digital textbooks,promote the comprehensive development of students and improve the effectiveness of digital textbook teaching.展开更多
The rapid development and popularization of Internet technology has provided important support for the informatization reform of various industries.University books and materials have the characteristics of large quan...The rapid development and popularization of Internet technology has provided important support for the informatization reform of various industries.University books and materials have the characteristics of large quantities and difficult storage and management.Its digital storage and management platform construction can effectively realize the digital storage and real-time retrieval of books and materials,and help students and teachers to find and use books and materials more quickly.Especially in recent years,with the update of intelligent platforms and other technologies,the resource-sharing platform of university books and materials can realize more convenient book information retrieval without the limitation of time and space.This paper mainly explores the optimization path and platform construction scheme of university libraries and information management under the background of the Internet,hoping to provide some theoretical references for university library managers.展开更多
Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access sig...Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access significantly impacts agricultural production and improves smallholder farmers’income.Beyond these,the Internet can affect other dimensions of social welfare.However,research about the impact of Internet access on dietary quality in rural China remains scarce.This study utilizes multi-period panel data from Fixed Observation Point in rural China from 2009 to 2015 to estimate the impact of Internet access on dietary quality and food consumption of rural households and conducts a causal analysis.Regression models with time and household fixed effects allow robust estimation while reducing potential issues of unobserved heterogeneity.The estimates show that Internet access has significantly increased rural household dietary quality(measured by the Chinese Diet Balance Index).Further research finds that Internet access has increased the consumption of animal products,such as aquatic and dairy products.We also examine the underlying mechanisms.Internet access improves dietary quality and food consumption mainly through increasing household income and food expenditure.These results encourage the promotion of Internet access as a valuable tool for nutritional improvements,especially in rural areas.展开更多
High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency...High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV.展开更多
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accide...The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks.展开更多
The relationship between credit expansion and banking crises is complex and cannot be fully explained by total credit alone.A systematic analysis of the relationship between the amount and structure of total credit an...The relationship between credit expansion and banking crises is complex and cannot be fully explained by total credit alone.A systematic analysis of the relationship between the amount and structure of total credit and banking crises is important for an objective prediction of the influence of potential financial risks.This paper,drawing on data from 15 selected countries,delves into the power of credit indicators in the early warning of banking crises from the perspectives of industrial structure,sector structure,and term structure of credit.Various machine learning methods were used,including Logistic Regression,Random Forest,Decision Tree,Support Vector Machine(SVM),Bagging,and Boosting models.The empirical findings indicate that credit expansion plays a crucial role in triggering banking crises.However,total credit is better suited for the early warning of short-term banking crises,whereas credit structure is more useful for the early warning of long-term banking crises.Moreover,in an early warning system,identifying key early warning indicators is more meaningful than merely increasing the number of indicators.Machine learning can somewhat enhance the early warning power,but it may not always be robust.Therefore,more attention should be paid to potential systemic banking crises resulting from an imbalance in credit structure while regulating the total credit threshold.展开更多
Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible t...Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes.展开更多
This article examines the archetypes related to the divine-human perspective in the Dianshizhai Pictorial and uses the basic theory of“Myth-Archetype Criticism”to analyze the concepts of moral perspective and the vi...This article examines the archetypes related to the divine-human perspective in the Dianshizhai Pictorial and uses the basic theory of“Myth-Archetype Criticism”to analyze the concepts of moral perspective and the view of cause and effect reflected in the text.It summarizes the interactive modes and various archetypes of cause and effect in three contexts:gods to humans,humans to gods,and humans to humans,explores the social reality and the relevant views of moral perspective and causality reflected in the illustrated magazine,and reveals the archetype foundation of the narrative of moral perspective retribution in Dianshizhai Pictorial in the three dimensions of psychology,literature,and society.展开更多
Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is ...Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still thebiggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services providedby an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures,data, and devices. Authentication, as the first line of defense against security threats, becomes the priority ofeveryone. It can either grant or deny users access to resources according to their legitimacy. As a result, studyingand researching authentication issues within IoT is extremely important. As a result, studying and researchingauthentication issues within IoT is extremely important. This article presents a comparative study of recent researchin IoT security;it provides an analysis of recent authentication protocols from2019 to 2023 that cover several areaswithin IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security researchsummary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. Itillustrates that the resistance of protocols against attacks, and their computational and communication cost arelinked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemesand provides some future research directions.展开更多
The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective se...The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λ_(i) of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server S_(j) and members C_(i),with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs.展开更多
The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which ...The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which is essential in smart healthcare.However,Personal Health Records(PHRs)are normally kept in public cloud servers controlled by IoMT service providers,so privacy and security incidents may be frequent.Fortunately,Searchable Encryption(SE),which can be used to execute queries on encrypted data,can address the issue above.Nevertheless,most existing SE schemes cannot solve the vector dominance threshold problem.In response to this,we present a SE scheme called Vector Dominance with Threshold Searchable Encryption(VDTSE)in this study.We use a Lagrangian polynomial technique and convert the vector dominance threshold problem into a constraint that the number of two equal-length vectors’corresponding bits excluding wildcards is not less than a threshold t.Then,we solve the problem using the proposed technique modified in Hidden Vector Encryption(HVE).This technique makes the trapdoor size linear to the number of attributes and thus much smaller than that of other similar SE schemes.A rigorous experimental analysis of a specific application for privacy-preserving diabetes demonstrates the feasibility of the proposed VDTSE scheme.展开更多
Based on China Family Panel Studies(CFPS)2018 data,the multiple linear regression model is used to analyze the effects of Internet use on women’s depression,and to test the robustness of the regression results.At the...Based on China Family Panel Studies(CFPS)2018 data,the multiple linear regression model is used to analyze the effects of Internet use on women’s depression,and to test the robustness of the regression results.At the same time,the effects of Internet use on mental health of women with different residence,age,marital status and physical health status are analyzed.Then,we can obtain that Internet use has a significant promoting effect on women’s mental health,while the degree of Internet use has a significant inhibitory effect on women’s mental health.In addition,the study found that women’s age,education,place of residence,marital status,length of sleep,working status and physical health status are the main factors affecting the mental health of Chinese women.In the heterogeneity investigation of residence,age,marital status and physical health status,Internet use has a greater negative impact on the Center for Epidemiological Studies Depression Scale(CES-D8)scores of women in rural areas,has a significant positive impact on the mental health of middle-aged and elderly women or women with spouses,and has a positive impact on the mental health of physically unhealthy women.Therefore,in view of women’s mental health needs and the problems existing in the use of the Internet,this paper puts forward some suggestions to further improve the overall mental health level of women.展开更多
Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of thi...Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of things (devices) that can be connected through the internet. The purpose: this paper aims to explore the concept of the Internet of Things (IoT) generally and outline the main definitions of IoT. The paper also aims to examine and discuss the obstacles and potential benefits of IoT in Saudi universities. Methodology: the researchers reviewed the previous literature and focused on several databases to use the recent studies and research related to the IoT. Then, the researchers also used quantitative methodology to examine the factors affecting the obstacles and potential benefits of IoT. The data were collected by using a questionnaire distributed online among academic staff and a total of 150 participants completed the survey. Finding: the result of this study reveals there are twelve factors that affect the potential benefits of using IoT such as reducing human errors, increasing business income and worker’s productivity. It also shows the eighteen factors which affect obstacles the IoT use, for example sensors’ cost, data privacy, and data security. These factors have the most influence on using IoT in Saudi universities.展开更多
In recent years,thanks to the vigorous promotion by UNESCO,inclusive education has rapidly developed and spread worldwide.Governments across various nations have responded and implemented this approach,successively in...In recent years,thanks to the vigorous promotion by UNESCO,inclusive education has rapidly developed and spread worldwide.Governments across various nations have responded and implemented this approach,successively introducing laws and policies to ensure that children with special needs are better integrated into society and receive a comprehensive education.This paper begins by exploring the concept and connotation of inclusive education.Through an international comparative perspective,it conducts a comparative analysis of the policy evolution of inclusive education in China and the United Kingdom.Furthermore,it investigates the implications that advanced international policy experiences have for the development of inclusive education in China.展开更多
This paper discusses the innovative ways of history teaching in depth from the unique perspective of art.By analyzing how artistic elements can effectively enrich teaching means and contents,it reveals the important v...This paper discusses the innovative ways of history teaching in depth from the unique perspective of art.By analyzing how artistic elements can effectively enrich teaching means and contents,it reveals the important value of art in history teaching for the improvement of students’comprehensive literacy and further explores the role of art in promoting the modern transformation of history education.At the same time,the article also focuses on the challenges faced in practice,such as the lack of artistic qualities among teachers,the difficulties in integrating art and history,and the differences in students’acceptance.To cope with these challenges,the article proposes specific implementation strategies,including the integration of diversified art resources,innovative teaching methods and approaches,and the construction of a scientific and reasonable evaluation mechanism,aiming to comprehensively optimize the effectiveness of history teaching and further stimulate students’potential for all-round development.展开更多
Universities shoulder the important mission of talent cultivation,scientific research,social service,cultural heritage and innovation,and international exchange and cooperation.International exchange and cooperation h...Universities shoulder the important mission of talent cultivation,scientific research,social service,cultural heritage and innovation,and international exchange and cooperation.International exchange and cooperation have become the fifth major function of universities.Based on the background of the globalization era,undergraduate colleges and universities should pay more attention to the cultivation of students’intercultural communication and understanding ability while cultivating their professional skills,and take expanding students’international vision and enhancing the international competitiveness of China’s education as important tasks.Labor education is an important content of the national education system,which has the comprehensive nurturing value of cultivating morality,increasing intelligence,strengthening physical fitness,and cultivating beauty.Higher education institutions should further optimize the system of labor education,expand students’space and field of thinking in the process of labor education,and broaden students’international perspectives.展开更多
There is an urgent need for high-quality talents with ideological and moral character for the development of higher education and the cultivation of English majors who meet the requirements of the times.The course ref...There is an urgent need for high-quality talents with ideological and moral character for the development of higher education and the cultivation of English majors who meet the requirements of the times.The course reform in English majors from the ideological and political perspective is an important way to improve the comprehensive quality and moral values of students,which helps to cultivate English talents with social responsibility and innovative abilities.This paper analyzes the problems in the current courses through literature review and field research,such as the lack of ideological and political perspective and low interest of students in ideological and political content.Based on these issues,taking the course“Comprehensive English”as an example,various teaching stages were practiced from the aspects of learning objectives,learning content,learning situation,implementation ideas,implementation effects,and teaching evaluation.Additionally,some suggestions are proposed,such as integrating ideological and political content into the entire process of teaching.The teaching staff needs to possess high-level English teaching ability and ideological and political perspective,standardize the evaluation system,and integrate epistemology into the evaluation process of ideological and political education,in order to promote in-depth research and exploration of ideological and political education of English majors.展开更多
This paper explores the opportunities and challenges of college mental health education from the perspective of big data.Firstly,through literature review,the importance of mental health education and the current issu...This paper explores the opportunities and challenges of college mental health education from the perspective of big data.Firstly,through literature review,the importance of mental health education and the current issues are elucidated.Then,from the perspective of big data,the potential opportunities of big data in college mental health education are analyzed,including data-driven personalized education,real-time monitoring and warning systems,and interdisciplinary research and collaboration.At the same time,the challenges faced by college mental health education under the perspective of big data are also pointed out,such as data privacy and security issues,insufficient data analysis and interpretation capabilities,and inadequate technical facilities and talent support.Lastly,the research content of this paper is summarized,and directions and suggestions for future research are proposed.展开更多
This paper investigates the macroeconomic impacts of Internet finance,highlighting its advantages and challenges.Internet finance,a fusion of Internet technology with traditional financial practices,introduces innovat...This paper investigates the macroeconomic impacts of Internet finance,highlighting its advantages and challenges.Internet finance,a fusion of Internet technology with traditional financial practices,introduces innovative models for global asset management,capital financing,payments,investments,and intermediary services.While it enhances the accessibility and efficiency of financial services,it also introduces new risks,such as higher credit default rates.This study explores how Internet finance contributes to financial inclusivity and macroeconomic growth yet poses potential threats to traditional financial stability.The dual aspects of Internet finance are analyzed:its application in existing processes and its capacity to generate novel business models.Furthermore,the paper proposes strategic responses to mitigate the negative impacts of Internet finance,mainly focusing on risk management and regulatory improvements to safeguard economic stability.展开更多
文摘With the rapid development of science and technology,the face of human society has undergone great changes;with the emergence of the Internet era,all kinds of educational technology,equipment,and software in vocational colleges have been widely used to carry out education and teaching,and has achieved remarkable results.Based on this,colleges and universities’electronic commerce(e-commerce)professional teachers should try to rely on the Internet to build information teaching classrooms,introduce advanced methods to build efficient classrooms by integrating teaching resources,and optimize the top-level design,so as to activate the classroom atmosphere,mobilize students’emotions,make them immersed in the teaching of electronic commerce courses.In view of this,this paper combines the existing theory and experience,first analyzes the dilemma faced by the current teaching of e-commerce in vocational colleges,then discusses the practical significance of teaching reform based on the Internet era,and lastly puts forward the specific practice path.
基金supported by Second Batch of Curriculum Assessment Reform Pilot Project of Sanya University,(SYJGKH2023029)。
文摘With the rapid development of information technology,the combination of terminal technology,big data and mobile Internet and textbooks has become an irresistible trend in the modern education field.Under the context of the Internet,carrying out education and teaching activities based on digital textbooks can give full play to the rich media,openness and interaction of digital textbooks,broaden students′horizon,enrich students′knowledge,and promote the improvement of students′ability and all-round development.However,in the specific teaching practice,there are also problems such as old compilation ideas,single compilation mode and low efficiency of personalized learning.Therefore,schools and teachers need to constantly innovate the presentation and arrangement of digital textbooks,strengthen technical support,deepen students′understanding of the teaching content of digital textbooks,promote the comprehensive development of students and improve the effectiveness of digital textbook teaching.
文摘The rapid development and popularization of Internet technology has provided important support for the informatization reform of various industries.University books and materials have the characteristics of large quantities and difficult storage and management.Its digital storage and management platform construction can effectively realize the digital storage and real-time retrieval of books and materials,and help students and teachers to find and use books and materials more quickly.Especially in recent years,with the update of intelligent platforms and other technologies,the resource-sharing platform of university books and materials can realize more convenient book information retrieval without the limitation of time and space.This paper mainly explores the optimization path and platform construction scheme of university libraries and information management under the background of the Internet,hoping to provide some theoretical references for university library managers.
基金This study was supported in part by the National Natural Science Foundation of China(71973136 and 72061147002)the 2115 Talent Development Program of China Agricultural University.
文摘Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access significantly impacts agricultural production and improves smallholder farmers’income.Beyond these,the Internet can affect other dimensions of social welfare.However,research about the impact of Internet access on dietary quality in rural China remains scarce.This study utilizes multi-period panel data from Fixed Observation Point in rural China from 2009 to 2015 to estimate the impact of Internet access on dietary quality and food consumption of rural households and conducts a causal analysis.Regression models with time and household fixed effects allow robust estimation while reducing potential issues of unobserved heterogeneity.The estimates show that Internet access has significantly increased rural household dietary quality(measured by the Chinese Diet Balance Index).Further research finds that Internet access has increased the consumption of animal products,such as aquatic and dairy products.We also examine the underlying mechanisms.Internet access improves dietary quality and food consumption mainly through increasing household income and food expenditure.These results encourage the promotion of Internet access as a valuable tool for nutritional improvements,especially in rural areas.
基金supported in part by the National Natural Science Foundation of China(62371116 and 62231020)in part by the Science and Technology Project of Hebei Province Education Department(ZD2022164)+2 种基金in part by the Fundamental Research Funds for the Central Universities(N2223031)in part by the Open Research Project of Xidian University(ISN24-08)Key Laboratory of Cognitive Radio and Information Processing,Ministry of Education(Guilin University of Electronic Technology,China,CRKL210203)。
文摘High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV.
基金This paper is financed by the European Union-NextGenerationEU,through the National Recovery and Resilience Plan of the Republic of Bulgaria,Project No.BG-RRP-2.004-0001-C01.
文摘The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks.
基金funded by the Chongqing Social Sciences Planning Project (2023NDQN22)the Social Sciences and Philosophy Project of the Chongqing Municipal Education Commission (23SKGH097)the Youth Program of Science and Technology Research of Chongqing Municipal Education Commission (KJQN202300545)。
文摘The relationship between credit expansion and banking crises is complex and cannot be fully explained by total credit alone.A systematic analysis of the relationship between the amount and structure of total credit and banking crises is important for an objective prediction of the influence of potential financial risks.This paper,drawing on data from 15 selected countries,delves into the power of credit indicators in the early warning of banking crises from the perspectives of industrial structure,sector structure,and term structure of credit.Various machine learning methods were used,including Logistic Regression,Random Forest,Decision Tree,Support Vector Machine(SVM),Bagging,and Boosting models.The empirical findings indicate that credit expansion plays a crucial role in triggering banking crises.However,total credit is better suited for the early warning of short-term banking crises,whereas credit structure is more useful for the early warning of long-term banking crises.Moreover,in an early warning system,identifying key early warning indicators is more meaningful than merely increasing the number of indicators.Machine learning can somewhat enhance the early warning power,but it may not always be robust.Therefore,more attention should be paid to potential systemic banking crises resulting from an imbalance in credit structure while regulating the total credit threshold.
文摘Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes.
基金research result of the research project:Beijing University Student Innovation Training Program-Research on the Chinese“Story Archetypes”and Dissemination in Dianshizhai Pictorial(北京市大学生创新训练项目--《点石斋画报》中华“故事原型”与传播研究,Serial NumberS202310015004).
文摘This article examines the archetypes related to the divine-human perspective in the Dianshizhai Pictorial and uses the basic theory of“Myth-Archetype Criticism”to analyze the concepts of moral perspective and the view of cause and effect reflected in the text.It summarizes the interactive modes and various archetypes of cause and effect in three contexts:gods to humans,humans to gods,and humans to humans,explores the social reality and the relevant views of moral perspective and causality reflected in the illustrated magazine,and reveals the archetype foundation of the narrative of moral perspective retribution in Dianshizhai Pictorial in the three dimensions of psychology,literature,and society.
文摘Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still thebiggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services providedby an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures,data, and devices. Authentication, as the first line of defense against security threats, becomes the priority ofeveryone. It can either grant or deny users access to resources according to their legitimacy. As a result, studyingand researching authentication issues within IoT is extremely important. As a result, studying and researchingauthentication issues within IoT is extremely important. This article presents a comparative study of recent researchin IoT security;it provides an analysis of recent authentication protocols from2019 to 2023 that cover several areaswithin IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security researchsummary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. Itillustrates that the resistance of protocols against attacks, and their computational and communication cost arelinked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemesand provides some future research directions.
文摘The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λ_(i) of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server S_(j) and members C_(i),with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs.
基金supported in part by the National Natural Science Foundation of China under Grant Nos.61872289 and 62172266in part by the Henan Key Laboratory of Network Cryptography Technology LNCT2020-A07the Guangxi Key Laboratory of Trusted Software under Grant No.KX202308.
文摘The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which is essential in smart healthcare.However,Personal Health Records(PHRs)are normally kept in public cloud servers controlled by IoMT service providers,so privacy and security incidents may be frequent.Fortunately,Searchable Encryption(SE),which can be used to execute queries on encrypted data,can address the issue above.Nevertheless,most existing SE schemes cannot solve the vector dominance threshold problem.In response to this,we present a SE scheme called Vector Dominance with Threshold Searchable Encryption(VDTSE)in this study.We use a Lagrangian polynomial technique and convert the vector dominance threshold problem into a constraint that the number of two equal-length vectors’corresponding bits excluding wildcards is not less than a threshold t.Then,we solve the problem using the proposed technique modified in Hidden Vector Encryption(HVE).This technique makes the trapdoor size linear to the number of attributes and thus much smaller than that of other similar SE schemes.A rigorous experimental analysis of a specific application for privacy-preserving diabetes demonstrates the feasibility of the proposed VDTSE scheme.
基金funded by the National Social Science Fund of China(Grant No.23BTJ069).
文摘Based on China Family Panel Studies(CFPS)2018 data,the multiple linear regression model is used to analyze the effects of Internet use on women’s depression,and to test the robustness of the regression results.At the same time,the effects of Internet use on mental health of women with different residence,age,marital status and physical health status are analyzed.Then,we can obtain that Internet use has a significant promoting effect on women’s mental health,while the degree of Internet use has a significant inhibitory effect on women’s mental health.In addition,the study found that women’s age,education,place of residence,marital status,length of sleep,working status and physical health status are the main factors affecting the mental health of Chinese women.In the heterogeneity investigation of residence,age,marital status and physical health status,Internet use has a greater negative impact on the Center for Epidemiological Studies Depression Scale(CES-D8)scores of women in rural areas,has a significant positive impact on the mental health of middle-aged and elderly women or women with spouses,and has a positive impact on the mental health of physically unhealthy women.Therefore,in view of women’s mental health needs and the problems existing in the use of the Internet,this paper puts forward some suggestions to further improve the overall mental health level of women.
文摘Internet of Things (IoT) among of all the technology revolutions has been considered the next evolution of the internet. IoT has become a far more popular area in the computing world. IoT combined a huge number of things (devices) that can be connected through the internet. The purpose: this paper aims to explore the concept of the Internet of Things (IoT) generally and outline the main definitions of IoT. The paper also aims to examine and discuss the obstacles and potential benefits of IoT in Saudi universities. Methodology: the researchers reviewed the previous literature and focused on several databases to use the recent studies and research related to the IoT. Then, the researchers also used quantitative methodology to examine the factors affecting the obstacles and potential benefits of IoT. The data were collected by using a questionnaire distributed online among academic staff and a total of 150 participants completed the survey. Finding: the result of this study reveals there are twelve factors that affect the potential benefits of using IoT such as reducing human errors, increasing business income and worker’s productivity. It also shows the eighteen factors which affect obstacles the IoT use, for example sensors’ cost, data privacy, and data security. These factors have the most influence on using IoT in Saudi universities.
文摘In recent years,thanks to the vigorous promotion by UNESCO,inclusive education has rapidly developed and spread worldwide.Governments across various nations have responded and implemented this approach,successively introducing laws and policies to ensure that children with special needs are better integrated into society and receive a comprehensive education.This paper begins by exploring the concept and connotation of inclusive education.Through an international comparative perspective,it conducts a comparative analysis of the policy evolution of inclusive education in China and the United Kingdom.Furthermore,it investigates the implications that advanced international policy experiences have for the development of inclusive education in China.
文摘This paper discusses the innovative ways of history teaching in depth from the unique perspective of art.By analyzing how artistic elements can effectively enrich teaching means and contents,it reveals the important value of art in history teaching for the improvement of students’comprehensive literacy and further explores the role of art in promoting the modern transformation of history education.At the same time,the article also focuses on the challenges faced in practice,such as the lack of artistic qualities among teachers,the difficulties in integrating art and history,and the differences in students’acceptance.To cope with these challenges,the article proposes specific implementation strategies,including the integration of diversified art resources,innovative teaching methods and approaches,and the construction of a scientific and reasonable evaluation mechanism,aiming to comprehensively optimize the effectiveness of history teaching and further stimulate students’potential for all-round development.
基金Key Research Base of Humanities and Social Sciences of Sichuan Province-Sichuan International Education Development Research Center“Research on the Implementation Path of Labor Education in Private Undergraduate Colleges and Universities Under International Perspective”(SCGJ2023-12)。
文摘Universities shoulder the important mission of talent cultivation,scientific research,social service,cultural heritage and innovation,and international exchange and cooperation.International exchange and cooperation have become the fifth major function of universities.Based on the background of the globalization era,undergraduate colleges and universities should pay more attention to the cultivation of students’intercultural communication and understanding ability while cultivating their professional skills,and take expanding students’international vision and enhancing the international competitiveness of China’s education as important tasks.Labor education is an important content of the national education system,which has the comprehensive nurturing value of cultivating morality,increasing intelligence,strengthening physical fitness,and cultivating beauty.Higher education institutions should further optimize the system of labor education,expand students’space and field of thinking in the process of labor education,and broaden students’international perspectives.
文摘There is an urgent need for high-quality talents with ideological and moral character for the development of higher education and the cultivation of English majors who meet the requirements of the times.The course reform in English majors from the ideological and political perspective is an important way to improve the comprehensive quality and moral values of students,which helps to cultivate English talents with social responsibility and innovative abilities.This paper analyzes the problems in the current courses through literature review and field research,such as the lack of ideological and political perspective and low interest of students in ideological and political content.Based on these issues,taking the course“Comprehensive English”as an example,various teaching stages were practiced from the aspects of learning objectives,learning content,learning situation,implementation ideas,implementation effects,and teaching evaluation.Additionally,some suggestions are proposed,such as integrating ideological and political content into the entire process of teaching.The teaching staff needs to possess high-level English teaching ability and ideological and political perspective,standardize the evaluation system,and integrate epistemology into the evaluation process of ideological and political education,in order to promote in-depth research and exploration of ideological and political education of English majors.
文摘This paper explores the opportunities and challenges of college mental health education from the perspective of big data.Firstly,through literature review,the importance of mental health education and the current issues are elucidated.Then,from the perspective of big data,the potential opportunities of big data in college mental health education are analyzed,including data-driven personalized education,real-time monitoring and warning systems,and interdisciplinary research and collaboration.At the same time,the challenges faced by college mental health education under the perspective of big data are also pointed out,such as data privacy and security issues,insufficient data analysis and interpretation capabilities,and inadequate technical facilities and talent support.Lastly,the research content of this paper is summarized,and directions and suggestions for future research are proposed.
文摘This paper investigates the macroeconomic impacts of Internet finance,highlighting its advantages and challenges.Internet finance,a fusion of Internet technology with traditional financial practices,introduces innovative models for global asset management,capital financing,payments,investments,and intermediary services.While it enhances the accessibility and efficiency of financial services,it also introduces new risks,such as higher credit default rates.This study explores how Internet finance contributes to financial inclusivity and macroeconomic growth yet poses potential threats to traditional financial stability.The dual aspects of Internet finance are analyzed:its application in existing processes and its capacity to generate novel business models.Furthermore,the paper proposes strategic responses to mitigate the negative impacts of Internet finance,mainly focusing on risk management and regulatory improvements to safeguard economic stability.