This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schem...This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schemes like tf-idf and BM25.These conventional methods often struggle with accurately capturing document relevance,leading to inefficiencies in both retrieval performance and index size management.OWS proposes a dynamic weighting mechanism that evaluates the significance of terms based on their orbital position within the vector space,emphasizing term relationships and distribution patterns overlooked by existing models.Our research focuses on evaluating OWS’s impact on model accuracy using Information Retrieval metrics like Recall,Precision,InterpolatedAverage Precision(IAP),andMeanAverage Precision(MAP).Additionally,we assessOWS’s effectiveness in reducing the inverted index size,crucial for model efficiency.We compare OWS-based retrieval models against others using different schemes,including tf-idf variations and BM25Delta.Results reveal OWS’s superiority,achieving a 54%Recall and 81%MAP,and a notable 38%reduction in the inverted index size.This highlights OWS’s potential in optimizing retrieval processes and underscores the need for further research in this underrepresented area to fully leverage OWS’s capabilities in information retrieval methodologies.展开更多
This paper investigates the age of information(AoI)-based multi-user mobile edge computing(MEC)network with partial offloading mode.The weighted sum AoI(WSA)is first analyzed and derived,and then a WSA minimization pr...This paper investigates the age of information(AoI)-based multi-user mobile edge computing(MEC)network with partial offloading mode.The weighted sum AoI(WSA)is first analyzed and derived,and then a WSA minimization problem is formulated by jointly optimizing the user scheduling and data assignment.Due to the non-analytic expression of the WSA w.r.t.the optimization variables and the unknowability of future network information,the problem cannot be solved with known solution methods.Therefore,an online Joint Partial Offloading and User Scheduling Optimization(JPOUSO)algorithm is proposed by transforming the original problem into a single-slot data assignment subproblem and a single-slot user scheduling sub-problem and solving the two sub-problems separately.We analyze the computational complexity of the presented JPO-USO algorithm,which is of O(N),with N being the number of users.Simulation results show that the proposed JPO-USO algorithm is able to achieve better AoI performance compared with various baseline methods.It is shown that both the user’s data assignment and the user’s AoI should be jointly taken into account to decrease the system WSA when scheduling users.展开更多
Electronic Medical Records (EMRs) play a crucial role in healthcare systems, providing secure, comprehensive medical information and reducing errors. However, they are often fragmented and stored in separate databases...Electronic Medical Records (EMRs) play a crucial role in healthcare systems, providing secure, comprehensive medical information and reducing errors. However, they are often fragmented and stored in separate databases owned by different institutions (e.g., hospitals, labs, clinics), posing challenges for healthcare professionals in sharing, preserving, and monitoring patients’ EMRs. To address the aforementioned challenges, this paper proposes a framework integrating many new emerging technologies and underscores their pivotal role in revolutionizing EMR systems. In particular, Hyperledger Indy empowers patients with complete authority over their EMRs, while Hyperledger Fabric manages authentication, authorization, and traceability. The InterPlanetary File System (IPFS) is used for secure sharing of EMRs. The Internet of Medical Things (IoMT) achieves real-time monitoring of patients’ health characteristics. Finally, WebAuthn provides strong protection for used cryptographic keys and cryptographic operations.展开更多
Mental health is a significant issue worldwide,and the utilization of technology to assist mental health has seen a growing trend.This aims to alleviate the workload on healthcare professionals and aid individuals.Num...Mental health is a significant issue worldwide,and the utilization of technology to assist mental health has seen a growing trend.This aims to alleviate the workload on healthcare professionals and aid individuals.Numerous applications have been developed to support the challenges in intelligent healthcare systems.However,because mental health data is sensitive,privacy concerns have emerged.Federated learning has gotten some attention.This research reviews the studies on federated learning and mental health related to solving the issue of intelligent healthcare systems.It explores various dimensions of federated learning in mental health,such as datasets(their types and sources),applications categorized based on mental health symptoms,federated mental health frameworks,federated machine learning,federated deep learning,and the benefits of federated learning in mental health applications.This research conducts surveys to evaluate the current state of mental health applications,mainly focusing on the role of Federated Learning(FL)and related privacy and data security concerns.The survey provides valuable insights into how these applications are emerging and evolving,specifically emphasizing FL’s impact.展开更多
For detailed study of complex chemical reactions mechanisms experiment is conducted for selected private reactions. This causes a problem of kinetic parameters getting--the same set of rate constants must describe bot...For detailed study of complex chemical reactions mechanisms experiment is conducted for selected private reactions. This causes a problem of kinetic parameters getting--the same set of rate constants must describe both public and private reaction stages, and also a general mechanism. In this paper, solution of this problem for a reaction of olefins hydroalumination is proposed. To optimize the computational process a methodology of parallelization is elaborated. On the base of parallel computations, a kinetic model for the reaction assigned is constructed, and on its base, the physical and chemical conclusions about reaction mechanism are done.展开更多
The development of precision agriculture demands high accuracy and efficiency of cultivated land information extraction. As a new means of monitoring the ground in recent years, unmanned aerial vehicle (UAV) low-hei...The development of precision agriculture demands high accuracy and efficiency of cultivated land information extraction. As a new means of monitoring the ground in recent years, unmanned aerial vehicle (UAV) low-height remote sensing technique, which is flexible, efficient with low cost and with high resolution, is widely applied to investing various resources. Based on this, a novel extraction method for cultivated land information based on Deep Convolutional Neural Network and Transfer Learning (DTCLE) was proposed. First, linear features (roads and ridges etc.) were excluded based on Deep Convolutional Neural Network (DCNN). Next, feature extraction method learned from DCNN was used to cultivated land information extraction by introducing transfer learning mechanism. Last, cultivated land information extraction results were completed by the DTCLE and eCognifion for cultivated land information extraction (ECLE). The location of the Pengzhou County and Guanghan County, Sichuan Province were selected for the experimental purpose. The experimental results showed that the overall precision for the experimental image 1, 2 and 3 (of extracting cultivated land) with the DTCLE method was 91.7%, 88.1% and 88.2% respectively, and the overall precision of ECLE is 9o.7%, 90.5% and 87.0%, respectively. Accuracy of DTCLE was equivalent to that of ECLE, and also outperformed ECLE in terms of integrity and continuity.展开更多
Based on the analysis of impedance tensor data, tipper data, and the conjugate gradient algorithm, we develop a three-dimensional (3D) conjugate gradient algorithm for inverting magnetotelluric full information data...Based on the analysis of impedance tensor data, tipper data, and the conjugate gradient algorithm, we develop a three-dimensional (3D) conjugate gradient algorithm for inverting magnetotelluric full information data determined from five electric and magnetic field components and discuss the method to use the full information data for quantitative interpretation of 3D inversion results. Results from the 3D inversion of synthetic data indicate that the results from inverting full information data which combine the impedance tensor and tipper data are better than results from inverting only the impedance tensor data (or tipper data) in improving resolution and reliability. The synthetic examples also demonstrate the validity and stability of this 3D inversion algorithm.展开更多
We analyse a process of remote information concentration achieved by the W state. The result turns out to be neither as good as performed by the GHZ state nor as by the Smolin bound entangled state. Based on this part...We analyse a process of remote information concentration achieved by the W state. The result turns out to be neither as good as performed by the GHZ state nor as by the Smolin bound entangled state. Based on this particular phenomenon, the properties of the three entangled states are realized.展开更多
Collaborative filtering is the most popular and successful information recommendation technique. However, it can suffer from data sparsity issue in cases where the systems do not have sufficient domain information. Tr...Collaborative filtering is the most popular and successful information recommendation technique. However, it can suffer from data sparsity issue in cases where the systems do not have sufficient domain information. Transfer learning, which enables information to be transferred from source domains to target domain, presents an unprecedented opportunity to alleviate this issue. A few recent works focus on transferring user-item rating information from a dense domain to a sparse target domain, while almost all methods need that each rating matrix in source domain to be extracted should be complete. To address this issue, in this paper we propose a novel multiple incomplete domains transfer learning model for cross-domain collaborative filtering. The transfer learning process consists of two steps. First, the user-item ratings information in incomplete source domains are compressed into multiple informative compact cluster-level matrixes, which are referred as codebooks. Second, we reconstruct the target matrix based on the codebooks. Specifically, for the purpose of maximizing the knowledge transfer, we design a new algorithm to learn the rating knowledge efficiently from multiple incomplete domains. Extensive experiments on real datasets demonstrate that our proposed approach significantly outperforms existing methods.展开更多
This paper investigates the simultaneous wireless information and powertransfer(SWIPT) for network-coded two-way relay network from an information-theoretic perspective, where two sources exchange information via an S...This paper investigates the simultaneous wireless information and powertransfer(SWIPT) for network-coded two-way relay network from an information-theoretic perspective, where two sources exchange information via an SWIPT-aware energy harvesting(EH) relay. We present a power splitting(PS)-based two-way relaying(PS-TWR) protocol by employing the PS receiver architecture. To explore the system sum rate limit with data rate fairness, an optimization problem under total power constraint is formulated. Then, some explicit solutions are derived for the problem. Numerical results show that due to the path loss effect on energy transfer, with the same total available power, PS-TWR losses some system performance compared with traditional non-EH two-way relaying, where at relatively low and relatively high signalto-noise ratio(SNR), the performance loss is relatively small. Another observation is that, in relatively high SNR regime, PS-TWR outperforms time switching-based two-way relaying(TS-TWR) while in relatively low SNR regime TS-TWR outperforms PS-TWR. It is also shown that with individual available power at the two sources, PS-TWR outperforms TS-TWR in both relatively low and high SNR regimes.展开更多
Traffic classification research has been suffering from a trouble of collecting accurate samples with ground truth.A model named Traffic Labeller(TL) is proposed to solve this problem.TL system captures all user socke...Traffic classification research has been suffering from a trouble of collecting accurate samples with ground truth.A model named Traffic Labeller(TL) is proposed to solve this problem.TL system captures all user socket calls and their corresponding application process information in the user mode on a Windows host.Once a sending data call has been captured,its 5-tuple {source IP,destination IP,source port,destination port and transport layer protocol},associated with its application information,is sent to an intermediate NDIS driver in the kernel mode.Then the intermediate driver writes application type information on TOS field of the IP packets which match the 5-tuple.In this way,each IP packet sent from the Windows host carries their application information.Therefore,traffic samples collected on the network have been labelled with the accurate application information and can be used for training effective traffic classification models.展开更多
The basic unit in life is cell.?It contains many protein molecules located at its different organelles. The growth and reproduction of a cell as well as most of its other biological functions are performed via these p...The basic unit in life is cell.?It contains many protein molecules located at its different organelles. The growth and reproduction of a cell as well as most of its other biological functions are performed via these proteins. But proteins in different organelles or subcellular locations have different functions. Facing?the avalanche of protein sequences generated in the postgenomic age, we are challenged to develop high throughput tools for identifying the subcellular localization of proteins based on their sequence information alone. Although considerable efforts have been made in this regard, the problem is far apart from being solved yet. Most existing methods can be used to deal with single-location proteins only. Actually, proteins with multi-locations may have some special biological functions that are particularly important for drug targets. Using the ML-GKR (Multi-Label Gaussian Kernel Regression) method,?we developed a new predictor called “pLoc-mGpos” by in-depth extracting the key information from GO (Gene Ontology) into the Chou’s general PseAAC (Pseudo Amino Acid Composition)?for predicting the subcellular localization of Gram-positive bacterial proteins with both single and multiple location sites. Rigorous cross-validation on a same stringent benchmark dataset indicated that the proposed pLoc-mGpos predictor is remarkably superior to “iLoc-Gpos”, the state-of-the-art predictor for the same purpose.?To maximize the convenience of most experimental scientists, a user-friendly web-server for the new powerful predictor has been established at http://www.jci-bioinfo.cn/pLoc-mGpos/, by which users can easily get their desired results without the need to go through the complicated mathematics involved.展开更多
5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and ...5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances.展开更多
The information leakage problem often exists in bidirectional quantum secure direct communication or quantum dialogue. In this work, we find that this problem also exists in the one-way quantum secure communication pr...The information leakage problem often exists in bidirectional quantum secure direct communication or quantum dialogue. In this work, we find that this problem also exists in the one-way quantum secure communication protocol [Chin. Phys. Lett. 32 (2015) 050301]. Specifically, the first bit of every four-bit message block is leaked out without awareness. A way to improve the information leakage problem is given.展开更多
In this paper, introducing new remote sensing and geographic information technology to solve the problem of data collection and analysis, this makes the study of ecological risk assessment very quick and accurate. Tak...In this paper, introducing new remote sensing and geographic information technology to solve the problem of data collection and analysis, this makes the study of ecological risk assessment very quick and accurate. Taking the Shan Xin mining area of the tin mine in Lengshuijiang of Hunan Province as the research object, using the remote sensing image data of three periods in 2005, 2010 and 2015, the remote sensing image is classified carefully and the landscape classification map of the mining area is obtained. The ecological risk index is introduced and the ecological risk values are sampled and interpolated on the ArcGIS platform. The ecological risk spatial distribution map based on the landscape pattern index was obtained. The ecological risk was divided into 5 levels by using the Jenks natural classification method, and each ecological risk grade area was counted. The research results show that: from year 2005 to year 2010, landscape ecological risk trend of the mining area is growing up;the trend rising area of landscape ecological risk is mainly in the southwest and northeast of the Shan Xin mining field;the area of higher and high ecological risk is increasing year by year;and the trend of dispersed development in space is obvious;the development trend of ecological risk in the mining area is rapidly increasing;in 2010 - 2015, the higher and high ecological risk area decrease slightly with the increasing of area of grassland and residential low vulnerability of landscape types;the ecological risk area showed a slow decreasing trend. The research results provide an objective reference for decision making of ecological environment governance.展开更多
Aims:To identify virtual healthcare services and digital health technologies deployed in South Africa during coronavirus disease 2019(COVID-19)and the challenges associated with their use.Metiiods:To determine the sta...Aims:To identify virtual healthcare services and digital health technologies deployed in South Africa during coronavirus disease 2019(COVID-19)and the challenges associated with their use.Metiiods:To determine the status of digital health utilization during COVID-19 in South Africa,the preferred reporting items for systematic reviews and meta-analyses model was used to perform a systematic and in-depth critical analysis of previously published studies in well-known and trusted online electronic databases using specific search keywords words that are relevant to this study.We selected published peer-reviewed articles available from the onset of COVID-19 to July 2021.Results:Total of 24 articles were included into this study.This study revealed that South Africa adopted digital technologies such as SMS-based solutions,mobile health applications,telemedicine and telehealth,WhatsApp-based systems,artificial intelligence and chatbots and robotics to provide healthcare services during COVID-19 pandemic.These innovative technologies have been used for various purposes including screening infectious and non-infectious diseases,disease surveillance and monitoring,medication and treatment compliance,creating awareness and communication.The study also revealed that teleconsultation and e-prescription,telelaboratory and telepharmacy,teleeducation and teletraining,teledermatology,teleradiology,telecardiology,teleophthalmology,teleneurology,telerehabilitation,teleoncology and telepsychiatry are among virtual healthcare services delivered through digital health technologies during COVID-19 in South Africa.However,these smart digital health technologies face several impediments such as infrastructural and technological barriers,organization and financial barriers,policy and regulatory barriers as well as cultural barriers.Conclusion:Although COVID-19 has invigorated the use of digital health technologies,there are still some shortcomings.The outbreak of pandemics like COVID-19 in the future is not inevitable.Therefore,we recommend increasing community networks in rural areas to bridge the digital divide and the modification of mHealth policy to advocate for the effective use of innovative technologies in healthcare and the development of sustainable strategies for resources mobilization through private-public partnerships as well as joining available international initiatives advocating for smart digital health.展开更多
Information security is the backbone of current intelligent systems,such as the Internet of Things(IoT),smart grids,and Machine-to-Machine(M2M)communication.The increasing threat of information security requires new m...Information security is the backbone of current intelligent systems,such as the Internet of Things(IoT),smart grids,and Machine-to-Machine(M2M)communication.The increasing threat of information security requires new models to ensure the safe transmission of information through such systems.Recently,quantum systems have drawn much attention since they are expected to have a significant impact on the research in information security.This paper proposes a quantum teleportation scheme based on controlled multi-users to ensure the secure information transmission among users.Quantum teleportation is an original key element in a variety of quantum information tasks as well as quantum-based technologies,which plays a pivotal role in the current progress of quantum computing and communication.In the proposed scheme,the sender transmits the information to the receiver under the control of a third user or controller.Here,we show that the efficiency of the proposed scheme depends on the properties of the transmission channel and the honesty of the controller.Compared with various teleportation scheme presented recently in the literature,the most important difference in the proposed scheme is the possibility of suspicion about the honesty of the controller and,consequently,taking proper precautions.展开更多
With the purpose to smooth the way of a correct understanding of information concepts and their evolution,in this paper,is discussed the evolution and development of the concept of information in biological systems,sh...With the purpose to smooth the way of a correct understanding of information concepts and their evolution,in this paper,is discussed the evolution and development of the concept of information in biological systems,showing that this concept was intuitively perceived even since ancient times by our predecessors,and described according to their language level of that times,but the crystallization of the real meaning of information is an achievement of our nowadays,by successive contribution of various scientific branches and personalities of the scientific community of the world,leading to a modern description/modeling of reality,in which information plays a fundamental role.It is shown that our reality can be understood as a contribution of matter/energy/information and represented/discussed as the model of the Universal Triangle of Reality(UTR),where various previous models can be suggestively inserted,as a function of their basic concern.The modern concepts on information starting from a theoretic experiment which would infringe the thermodynamics laws and reaching the theory of information and modern philosophic concepts on the world structuration allow us to show that information is a fundamental component of the material world and of the biological structures,in correlation with the structuration/destructuration processes of matter,involving absorption/release of information.Based on these concepts,is discussed the functionality of the biologic structures and is presented the informational model of the human body and living structures,as a general model of info-organization on the entire biological scale,showing that a rudimentary proto-consciousness should be operative even at the low-scale biological systems,because they work on the same principles,like the most developed bio-systems.The operability of biologic structures as informational devices is also pointed out.展开更多
In general,topographic shadow may reduce performance of forest mapping over mountainous regions in remotely sensed images.In this paper,information in shadow was synthesized by using two filling techniques,namely,roif...In general,topographic shadow may reduce performance of forest mapping over mountainous regions in remotely sensed images.In this paper,information in shadow was synthesized by using two filling techniques,namely,roifill and imfill,in order to improve the accuracy of forest mapping over mountainous regions.These two methods were applied to Landsat Enhanced Thematic Mapper (ETM +) multispectral image from Dong Yang County,Zhejiang Province,China.The performance of these methods was compared with two conventional techniques,including cosine correction and multisource classification.The results showed that by applying filling approaches,average overall accuracy of classification was improved by 14 percent.However,through conventional methods this value increased only by 9 percent.The results also revealed that estimated forest area on the basis of shadow-corrected images by 'roifill' technique was much closer to the survey data compared to traditional algorithms.Apart from this finding,our finding indicated that topographic shadow was an accentuated problem in medium resolution images such as Landsat ETM+ over mountainous regions.展开更多
Map is one of the communication means created by human being.Cartographers have been making efforts on the comparison of maps to natural languages so as to establish a"cartographic language"or"map langu...Map is one of the communication means created by human being.Cartographers have been making efforts on the comparison of maps to natural languages so as to establish a"cartographic language"or"map language".One of such efforts is to adopt the Shannon’s Information Theory originated in digital communication into cartography so as to establish an entropy-based cartographic communication theory.However,success has been very limited although research work had started as early as the mid-1960 s.It is then found that the bottleneck problem was the lack of appropriate measures for the spatial(configurational)information of(graphic and image)maps,as the classic Shannon entropy is only capable of characterizing statistical information but fails to capture the configurational information of(graphic and image)maps.Fortunately,after over 40-year development,some bottleneck problems have been solved.More precisely,generalized Shannon entropies for metric and thematic information of(graphic)maps have been developed and the first feasible solution for computing the Boltzmann entropy of image maps has been invented,which is capable of measuring the spatial information of not only numerical images but also categorical maps.With such progress,it is now feasible to build the"Information Theory of Cartography".In this paper,a framework for such a theory is proposed and some key issues are identified.For these issues,some have already been tackled while others still need efforts.As a result,a research agenda is set for future action.After all these issues are tackled,the theory will become matured so as to become a theoretic basis of cartography.It is expected that the Information Theory of Cartography will play an increasingly important role in the discipline of cartography because more and more researchers have advocated that information is more fundamental than matter and energy.展开更多
文摘This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schemes like tf-idf and BM25.These conventional methods often struggle with accurately capturing document relevance,leading to inefficiencies in both retrieval performance and index size management.OWS proposes a dynamic weighting mechanism that evaluates the significance of terms based on their orbital position within the vector space,emphasizing term relationships and distribution patterns overlooked by existing models.Our research focuses on evaluating OWS’s impact on model accuracy using Information Retrieval metrics like Recall,Precision,InterpolatedAverage Precision(IAP),andMeanAverage Precision(MAP).Additionally,we assessOWS’s effectiveness in reducing the inverted index size,crucial for model efficiency.We compare OWS-based retrieval models against others using different schemes,including tf-idf variations and BM25Delta.Results reveal OWS’s superiority,achieving a 54%Recall and 81%MAP,and a notable 38%reduction in the inverted index size.This highlights OWS’s potential in optimizing retrieval processes and underscores the need for further research in this underrepresented area to fully leverage OWS’s capabilities in information retrieval methodologies.
基金supported in part by the Fundamental Research Funds for the Central Universities under Grant 2022JBGP003in part by the National Natural Science Foundation of China(NSFC)under Grant 62071033in part by ZTE IndustryUniversity-Institute Cooperation Funds under Grant No.IA20230217003。
文摘This paper investigates the age of information(AoI)-based multi-user mobile edge computing(MEC)network with partial offloading mode.The weighted sum AoI(WSA)is first analyzed and derived,and then a WSA minimization problem is formulated by jointly optimizing the user scheduling and data assignment.Due to the non-analytic expression of the WSA w.r.t.the optimization variables and the unknowability of future network information,the problem cannot be solved with known solution methods.Therefore,an online Joint Partial Offloading and User Scheduling Optimization(JPOUSO)algorithm is proposed by transforming the original problem into a single-slot data assignment subproblem and a single-slot user scheduling sub-problem and solving the two sub-problems separately.We analyze the computational complexity of the presented JPO-USO algorithm,which is of O(N),with N being the number of users.Simulation results show that the proposed JPO-USO algorithm is able to achieve better AoI performance compared with various baseline methods.It is shown that both the user’s data assignment and the user’s AoI should be jointly taken into account to decrease the system WSA when scheduling users.
文摘Electronic Medical Records (EMRs) play a crucial role in healthcare systems, providing secure, comprehensive medical information and reducing errors. However, they are often fragmented and stored in separate databases owned by different institutions (e.g., hospitals, labs, clinics), posing challenges for healthcare professionals in sharing, preserving, and monitoring patients’ EMRs. To address the aforementioned challenges, this paper proposes a framework integrating many new emerging technologies and underscores their pivotal role in revolutionizing EMR systems. In particular, Hyperledger Indy empowers patients with complete authority over their EMRs, while Hyperledger Fabric manages authentication, authorization, and traceability. The InterPlanetary File System (IPFS) is used for secure sharing of EMRs. The Internet of Medical Things (IoMT) achieves real-time monitoring of patients’ health characteristics. Finally, WebAuthn provides strong protection for used cryptographic keys and cryptographic operations.
文摘Mental health is a significant issue worldwide,and the utilization of technology to assist mental health has seen a growing trend.This aims to alleviate the workload on healthcare professionals and aid individuals.Numerous applications have been developed to support the challenges in intelligent healthcare systems.However,because mental health data is sensitive,privacy concerns have emerged.Federated learning has gotten some attention.This research reviews the studies on federated learning and mental health related to solving the issue of intelligent healthcare systems.It explores various dimensions of federated learning in mental health,such as datasets(their types and sources),applications categorized based on mental health symptoms,federated mental health frameworks,federated machine learning,federated deep learning,and the benefits of federated learning in mental health applications.This research conducts surveys to evaluate the current state of mental health applications,mainly focusing on the role of Federated Learning(FL)and related privacy and data security concerns.The survey provides valuable insights into how these applications are emerging and evolving,specifically emphasizing FL’s impact.
文摘For detailed study of complex chemical reactions mechanisms experiment is conducted for selected private reactions. This causes a problem of kinetic parameters getting--the same set of rate constants must describe both public and private reaction stages, and also a general mechanism. In this paper, solution of this problem for a reaction of olefins hydroalumination is proposed. To optimize the computational process a methodology of parallelization is elaborated. On the base of parallel computations, a kinetic model for the reaction assigned is constructed, and on its base, the physical and chemical conclusions about reaction mechanism are done.
基金supported by the Fundamental Research Funds for the Central Universities of China(Grant No.2013SCU11006)the Key Laboratory of Digital Mapping and Land Information Application of National Administration of Surveying,Mapping and Geoinformation of China(Grant NO.DM2014SC02)the Key Laboratory of Geospecial Information Technology,Ministry of Land and Resources of China(Grant NO.KLGSIT201504)
文摘The development of precision agriculture demands high accuracy and efficiency of cultivated land information extraction. As a new means of monitoring the ground in recent years, unmanned aerial vehicle (UAV) low-height remote sensing technique, which is flexible, efficient with low cost and with high resolution, is widely applied to investing various resources. Based on this, a novel extraction method for cultivated land information based on Deep Convolutional Neural Network and Transfer Learning (DTCLE) was proposed. First, linear features (roads and ridges etc.) were excluded based on Deep Convolutional Neural Network (DCNN). Next, feature extraction method learned from DCNN was used to cultivated land information extraction by introducing transfer learning mechanism. Last, cultivated land information extraction results were completed by the DTCLE and eCognifion for cultivated land information extraction (ECLE). The location of the Pengzhou County and Guanghan County, Sichuan Province were selected for the experimental purpose. The experimental results showed that the overall precision for the experimental image 1, 2 and 3 (of extracting cultivated land) with the DTCLE method was 91.7%, 88.1% and 88.2% respectively, and the overall precision of ECLE is 9o.7%, 90.5% and 87.0%, respectively. Accuracy of DTCLE was equivalent to that of ECLE, and also outperformed ECLE in terms of integrity and continuity.
基金supported by the National Hi-tech Research and Development Program of China(863Program)(No.2007AA09Z310) National Natural Science Foundation of China(Grant No.40774029 40374024)+1 种基金 the Fundamental Research Funds for the Central Universities(Grant No.2010ZY53) the Program for New Century Excellent Talents in University(NCET)
文摘Based on the analysis of impedance tensor data, tipper data, and the conjugate gradient algorithm, we develop a three-dimensional (3D) conjugate gradient algorithm for inverting magnetotelluric full information data determined from five electric and magnetic field components and discuss the method to use the full information data for quantitative interpretation of 3D inversion results. Results from the 3D inversion of synthetic data indicate that the results from inverting full information data which combine the impedance tensor and tipper data are better than results from inverting only the impedance tensor data (or tipper data) in improving resolution and reliability. The synthetic examples also demonstrate the validity and stability of this 3D inversion algorithm.
基金Supported by the National Natural Science Foundation of China under Grant Nos 10404007 and 60578055.
文摘We analyse a process of remote information concentration achieved by the W state. The result turns out to be neither as good as performed by the GHZ state nor as by the Smolin bound entangled state. Based on this particular phenomenon, the properties of the three entangled states are realized.
基金supported by the National Natural Science Foundation of China (No. 91546111, 91646201)the Key Project of Beijing Municipal Education Commission (No. KZ201610005009)the General Project of Beijing Municipal Education Commission (No. KM201710005023)
文摘Collaborative filtering is the most popular and successful information recommendation technique. However, it can suffer from data sparsity issue in cases where the systems do not have sufficient domain information. Transfer learning, which enables information to be transferred from source domains to target domain, presents an unprecedented opportunity to alleviate this issue. A few recent works focus on transferring user-item rating information from a dense domain to a sparse target domain, while almost all methods need that each rating matrix in source domain to be extracted should be complete. To address this issue, in this paper we propose a novel multiple incomplete domains transfer learning model for cross-domain collaborative filtering. The transfer learning process consists of two steps. First, the user-item ratings information in incomplete source domains are compressed into multiple informative compact cluster-level matrixes, which are referred as codebooks. Second, we reconstruct the target matrix based on the codebooks. Specifically, for the purpose of maximizing the knowledge transfer, we design a new algorithm to learn the rating knowledge efficiently from multiple incomplete domains. Extensive experiments on real datasets demonstrate that our proposed approach significantly outperforms existing methods.
基金supported by the National Natural Science Foundation of China ( No . 61602034 )the Beijing Natural Science Foundation (No. 4162049)+2 种基金the Open Research Fund of National Mobile Communications Research Laboratory,Southeast University (No. 2014D03)the Fundamental Research Funds for the Central Universities Beijing Jiaotong University (No. 2016JBM015)the NationalHigh Technology Research and Development Program of China (863 Program) (No. 2015AA015702)
文摘This paper investigates the simultaneous wireless information and powertransfer(SWIPT) for network-coded two-way relay network from an information-theoretic perspective, where two sources exchange information via an SWIPT-aware energy harvesting(EH) relay. We present a power splitting(PS)-based two-way relaying(PS-TWR) protocol by employing the PS receiver architecture. To explore the system sum rate limit with data rate fairness, an optimization problem under total power constraint is formulated. Then, some explicit solutions are derived for the problem. Numerical results show that due to the path loss effect on energy transfer, with the same total available power, PS-TWR losses some system performance compared with traditional non-EH two-way relaying, where at relatively low and relatively high signalto-noise ratio(SNR), the performance loss is relatively small. Another observation is that, in relatively high SNR regime, PS-TWR outperforms time switching-based two-way relaying(TS-TWR) while in relatively low SNR regime TS-TWR outperforms PS-TWR. It is also shown that with individual available power at the two sources, PS-TWR outperforms TS-TWR in both relatively low and high SNR regimes.
基金ACKNOWLEDGEMENT This research was partially supported by the National Basic Research Program of China (973 Program) under Grant No. 2011CB30- 2605 the National High Technology Research and Development Program of China (863 Pro- gram) under Grant No. 2012AA012502+3 种基金 the National Key Technology Research and Dev- elopment Program of China under Grant No. 2012BAH37B00 the Program for New Cen- tury Excellent Talents in University under Gr- ant No. NCET-10-0863 the National Natural Science Foundation of China under Grants No 61173078, No. 61203105, No. 61173079, No. 61070130, No. 60903176 and the Provincial Natural Science Foundation of Shandong under Grants No. ZR2012FM010, No. ZR2011FZ001, No. ZR2010FM047, No. ZR2010FQ028, No. ZR2012FQ016.
文摘Traffic classification research has been suffering from a trouble of collecting accurate samples with ground truth.A model named Traffic Labeller(TL) is proposed to solve this problem.TL system captures all user socket calls and their corresponding application process information in the user mode on a Windows host.Once a sending data call has been captured,its 5-tuple {source IP,destination IP,source port,destination port and transport layer protocol},associated with its application information,is sent to an intermediate NDIS driver in the kernel mode.Then the intermediate driver writes application type information on TOS field of the IP packets which match the 5-tuple.In this way,each IP packet sent from the Windows host carries their application information.Therefore,traffic samples collected on the network have been labelled with the accurate application information and can be used for training effective traffic classification models.
文摘The basic unit in life is cell.?It contains many protein molecules located at its different organelles. The growth and reproduction of a cell as well as most of its other biological functions are performed via these proteins. But proteins in different organelles or subcellular locations have different functions. Facing?the avalanche of protein sequences generated in the postgenomic age, we are challenged to develop high throughput tools for identifying the subcellular localization of proteins based on their sequence information alone. Although considerable efforts have been made in this regard, the problem is far apart from being solved yet. Most existing methods can be used to deal with single-location proteins only. Actually, proteins with multi-locations may have some special biological functions that are particularly important for drug targets. Using the ML-GKR (Multi-Label Gaussian Kernel Regression) method,?we developed a new predictor called “pLoc-mGpos” by in-depth extracting the key information from GO (Gene Ontology) into the Chou’s general PseAAC (Pseudo Amino Acid Composition)?for predicting the subcellular localization of Gram-positive bacterial proteins with both single and multiple location sites. Rigorous cross-validation on a same stringent benchmark dataset indicated that the proposed pLoc-mGpos predictor is remarkably superior to “iLoc-Gpos”, the state-of-the-art predictor for the same purpose.?To maximize the convenience of most experimental scientists, a user-friendly web-server for the new powerful predictor has been established at http://www.jci-bioinfo.cn/pLoc-mGpos/, by which users can easily get their desired results without the need to go through the complicated mathematics involved.
文摘5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances.
基金Supported by the National Natural Science Foundation of China under Grant Nos 61502101 and 61170321the Natural Science Foundation of Jiangsu Province under Grant No BK20140651+1 种基金Funded by PAPDCICAEET
文摘The information leakage problem often exists in bidirectional quantum secure direct communication or quantum dialogue. In this work, we find that this problem also exists in the one-way quantum secure communication protocol [Chin. Phys. Lett. 32 (2015) 050301]. Specifically, the first bit of every four-bit message block is leaked out without awareness. A way to improve the information leakage problem is given.
文摘In this paper, introducing new remote sensing and geographic information technology to solve the problem of data collection and analysis, this makes the study of ecological risk assessment very quick and accurate. Taking the Shan Xin mining area of the tin mine in Lengshuijiang of Hunan Province as the research object, using the remote sensing image data of three periods in 2005, 2010 and 2015, the remote sensing image is classified carefully and the landscape classification map of the mining area is obtained. The ecological risk index is introduced and the ecological risk values are sampled and interpolated on the ArcGIS platform. The ecological risk spatial distribution map based on the landscape pattern index was obtained. The ecological risk was divided into 5 levels by using the Jenks natural classification method, and each ecological risk grade area was counted. The research results show that: from year 2005 to year 2010, landscape ecological risk trend of the mining area is growing up;the trend rising area of landscape ecological risk is mainly in the southwest and northeast of the Shan Xin mining field;the area of higher and high ecological risk is increasing year by year;and the trend of dispersed development in space is obvious;the development trend of ecological risk in the mining area is rapidly increasing;in 2010 - 2015, the higher and high ecological risk area decrease slightly with the increasing of area of grassland and residential low vulnerability of landscape types;the ecological risk area showed a slow decreasing trend. The research results provide an objective reference for decision making of ecological environment governance.
文摘Aims:To identify virtual healthcare services and digital health technologies deployed in South Africa during coronavirus disease 2019(COVID-19)and the challenges associated with their use.Metiiods:To determine the status of digital health utilization during COVID-19 in South Africa,the preferred reporting items for systematic reviews and meta-analyses model was used to perform a systematic and in-depth critical analysis of previously published studies in well-known and trusted online electronic databases using specific search keywords words that are relevant to this study.We selected published peer-reviewed articles available from the onset of COVID-19 to July 2021.Results:Total of 24 articles were included into this study.This study revealed that South Africa adopted digital technologies such as SMS-based solutions,mobile health applications,telemedicine and telehealth,WhatsApp-based systems,artificial intelligence and chatbots and robotics to provide healthcare services during COVID-19 pandemic.These innovative technologies have been used for various purposes including screening infectious and non-infectious diseases,disease surveillance and monitoring,medication and treatment compliance,creating awareness and communication.The study also revealed that teleconsultation and e-prescription,telelaboratory and telepharmacy,teleeducation and teletraining,teledermatology,teleradiology,telecardiology,teleophthalmology,teleneurology,telerehabilitation,teleoncology and telepsychiatry are among virtual healthcare services delivered through digital health technologies during COVID-19 in South Africa.However,these smart digital health technologies face several impediments such as infrastructural and technological barriers,organization and financial barriers,policy and regulatory barriers as well as cultural barriers.Conclusion:Although COVID-19 has invigorated the use of digital health technologies,there are still some shortcomings.The outbreak of pandemics like COVID-19 in the future is not inevitable.Therefore,we recommend increasing community networks in rural areas to bridge the digital divide and the modification of mHealth policy to advocate for the effective use of innovative technologies in healthcare and the development of sustainable strategies for resources mobilization through private-public partnerships as well as joining available international initiatives advocating for smart digital health.
文摘Information security is the backbone of current intelligent systems,such as the Internet of Things(IoT),smart grids,and Machine-to-Machine(M2M)communication.The increasing threat of information security requires new models to ensure the safe transmission of information through such systems.Recently,quantum systems have drawn much attention since they are expected to have a significant impact on the research in information security.This paper proposes a quantum teleportation scheme based on controlled multi-users to ensure the secure information transmission among users.Quantum teleportation is an original key element in a variety of quantum information tasks as well as quantum-based technologies,which plays a pivotal role in the current progress of quantum computing and communication.In the proposed scheme,the sender transmits the information to the receiver under the control of a third user or controller.Here,we show that the efficiency of the proposed scheme depends on the properties of the transmission channel and the honesty of the controller.Compared with various teleportation scheme presented recently in the literature,the most important difference in the proposed scheme is the possibility of suspicion about the honesty of the controller and,consequently,taking proper precautions.
文摘With the purpose to smooth the way of a correct understanding of information concepts and their evolution,in this paper,is discussed the evolution and development of the concept of information in biological systems,showing that this concept was intuitively perceived even since ancient times by our predecessors,and described according to their language level of that times,but the crystallization of the real meaning of information is an achievement of our nowadays,by successive contribution of various scientific branches and personalities of the scientific community of the world,leading to a modern description/modeling of reality,in which information plays a fundamental role.It is shown that our reality can be understood as a contribution of matter/energy/information and represented/discussed as the model of the Universal Triangle of Reality(UTR),where various previous models can be suggestively inserted,as a function of their basic concern.The modern concepts on information starting from a theoretic experiment which would infringe the thermodynamics laws and reaching the theory of information and modern philosophic concepts on the world structuration allow us to show that information is a fundamental component of the material world and of the biological structures,in correlation with the structuration/destructuration processes of matter,involving absorption/release of information.Based on these concepts,is discussed the functionality of the biologic structures and is presented the informational model of the human body and living structures,as a general model of info-organization on the entire biological scale,showing that a rudimentary proto-consciousness should be operative even at the low-scale biological systems,because they work on the same principles,like the most developed bio-systems.The operability of biologic structures as informational devices is also pointed out.
基金supported by the funding from National Natural Science Foundation of China(Grant No 30671212)partially by NASA projects NNX08AH50G and G05GD49G at Michigan State University
文摘In general,topographic shadow may reduce performance of forest mapping over mountainous regions in remotely sensed images.In this paper,information in shadow was synthesized by using two filling techniques,namely,roifill and imfill,in order to improve the accuracy of forest mapping over mountainous regions.These two methods were applied to Landsat Enhanced Thematic Mapper (ETM +) multispectral image from Dong Yang County,Zhejiang Province,China.The performance of these methods was compared with two conventional techniques,including cosine correction and multisource classification.The results showed that by applying filling approaches,average overall accuracy of classification was improved by 14 percent.However,through conventional methods this value increased only by 9 percent.The results also revealed that estimated forest area on the basis of shadow-corrected images by 'roifill' technique was much closer to the survey data compared to traditional algorithms.Apart from this finding,our finding indicated that topographic shadow was an accentuated problem in medium resolution images such as Landsat ETM+ over mountainous regions.
基金National Natural Science Foundation of China(Nos.41930104,41971330)Hong Kong Research Grants Council General Research Fund(No.152219/18E)。
文摘Map is one of the communication means created by human being.Cartographers have been making efforts on the comparison of maps to natural languages so as to establish a"cartographic language"or"map language".One of such efforts is to adopt the Shannon’s Information Theory originated in digital communication into cartography so as to establish an entropy-based cartographic communication theory.However,success has been very limited although research work had started as early as the mid-1960 s.It is then found that the bottleneck problem was the lack of appropriate measures for the spatial(configurational)information of(graphic and image)maps,as the classic Shannon entropy is only capable of characterizing statistical information but fails to capture the configurational information of(graphic and image)maps.Fortunately,after over 40-year development,some bottleneck problems have been solved.More precisely,generalized Shannon entropies for metric and thematic information of(graphic)maps have been developed and the first feasible solution for computing the Boltzmann entropy of image maps has been invented,which is capable of measuring the spatial information of not only numerical images but also categorical maps.With such progress,it is now feasible to build the"Information Theory of Cartography".In this paper,a framework for such a theory is proposed and some key issues are identified.For these issues,some have already been tackled while others still need efforts.As a result,a research agenda is set for future action.After all these issues are tackled,the theory will become matured so as to become a theoretic basis of cartography.It is expected that the Information Theory of Cartography will play an increasingly important role in the discipline of cartography because more and more researchers have advocated that information is more fundamental than matter and energy.