Burden sharing has been a perennial issue in the transatlantic alliance,primarily entailing cost sharing and responsibility sharing.During the first Trump administration,the dispute over cost sharing had been prominen...Burden sharing has been a perennial issue in the transatlantic alliance,primarily entailing cost sharing and responsibility sharing.During the first Trump administration,the dispute over cost sharing had been prominent,while the Biden administration placed more emphasis on responsibility sharing to facilitate its strategic goal of“outcompeting”China.The Ukraine crisis had prompted a US-Europe consensus on cost sharing,but the urgency of responsibility sharing subsequently increased.The shift from jointly providing the economic resources to extensively sharing the security responsibilities ref lects the recalibration of the US strategic focus and its higher expectations for the role of European allies.Nevertheless,Europe's response to the US call for responsibility sharing has been relatively limited.The responsibility sharing within the US-Europe alliance and their future relationship will be subject to the strategic coordination between the two sides and multiple complex factors.展开更多
The accelerated advancement of the Internet of Things(IoT)has generated substantial data,including sensitive and private information.Consequently,it is imperative to guarantee the security of data sharing.While facili...The accelerated advancement of the Internet of Things(IoT)has generated substantial data,including sensitive and private information.Consequently,it is imperative to guarantee the security of data sharing.While facilitating fine-grained access control,Ciphertext Policy Attribute-Based Encryption(CP-ABE)can effectively ensure the confidentiality of shared data.Nevertheless,the conventional centralized CP-ABE scheme is plagued by the issues of keymisuse,key escrow,and large computation,which will result in security risks.This paper suggests a lightweight IoT data security sharing scheme that integrates blockchain technology and CP-ABE to address the abovementioned issues.The integrity and traceability of shared data are guaranteed by the use of blockchain technology to store and verify access transactions.The encryption and decryption operations of the CP-ABE algorithm have been implemented using elliptic curve scalarmultiplication to accommodate lightweight IoT devices,as opposed to themore arithmetic bilinear pairing found in the traditional CP-ABE algorithm.Additionally,a portion of the computation is delegated to the edge nodes to alleviate the computational burden on users.A distributed key management method is proposed to address the issues of key escrow andmisuse.Thismethod employs the edge blockchain to facilitate the storage and distribution of attribute private keys.Meanwhile,data security sharing is enhanced by combining off-chain and on-chain ciphertext storage.The security and performance analysis indicates that the proposed scheme is more efficient and secure.展开更多
China’s healthcare system faces increasing challenges,including surging medical costs,resource allocation imbalances favoring large hospitals,and ineffective referral mechanisms.The lack of a unified strategy integra...China’s healthcare system faces increasing challenges,including surging medical costs,resource allocation imbalances favoring large hospitals,and ineffective referral mechanisms.The lack of a unified strategy integrating standardized coverage with personalized payment compounds these issues.To this end,this study proposes a risk-sharing reform strategy that combines equal coverage for the same disease(ECSD)with an individualized out-of-pocket(I-OOP)model.Specifically,the study employs a Markov model to capture patient transitions across health states and care levels.The findings show that ECSD and I-OOP enhance equity by standardizing disease coverage while tailoring costs to patient income and facility type.This approach alleviates demand on high-tier hospitals,promoting primary care utilization and enabling balanced resource distribution.The study’s findings provide a reference for policymakers and healthcare administrators by presenting a scalable framework that is aligned with China’s development goals with the aim of fostering an efficient,sustainable healthcare system that is adaptable to regional needs.展开更多
1 In a world filled with more“stuff”than we need,sharing libraries are emerging as a solution to both environmental and economic concerns.Unlike traditional libraries,these“libraries of things”offer a variety of i...1 In a world filled with more“stuff”than we need,sharing libraries are emerging as a solution to both environmental and economic concerns.Unlike traditional libraries,these“libraries of things”offer a variety of items for borrowing,often for free or at a low cost.2 For example,the Oxford Maternity Clothes Library provides expectant mothers with free maternity wear,while the Warwick Toy Library allows locals to borrow toys and even reserve them online.The Tool Library in Wolverhampton offers gardening and DIY equipment,and the Share Shed in Devon has over 350 items available.Nappy libraries also provide parents with reusable cloth nappies(尿布),reducing costs and waste.展开更多
I’m Li hua from class 1.I’m honored to come up with some ideas for the upcoming exchange activities.My idea is to hold a Cultural sharing workshop.First,we can introduce ourselves to others.This helps us get to know...I’m Li hua from class 1.I’m honored to come up with some ideas for the upcoming exchange activities.My idea is to hold a Cultural sharing workshop.First,we can introduce ourselves to others.This helps us get to know each other.Then we can introduce the history,culture and national customs of China with them.展开更多
This paper presents the design of a low-power multi-channel analog front-end(AFE) for bio-potential recording. By using time division multiplexing(TDM), a successive approximation register analog-to-digital converter(...This paper presents the design of a low-power multi-channel analog front-end(AFE) for bio-potential recording. By using time division multiplexing(TDM), a successive approximation register analog-to-digital converter(SAR ADC) is shared among all 20 channels. A charge-sharing multiplexer(MUX) is proposed to transmit the output signals from the respective channels to the ADC. By separately pre sampling the output of each channel, the sampling time of each channel is greatly extended and additional active buffers are avoided. The AFE is fabricated in a 65-nm CMOS process, and the whole system consumes 28.2 μW under 1 V supply. Each analog acquisition channel consumes 1.25 μW and occupies a chip area of 0.14 mm2. Measurement results show that the AFE achieves an input referred noise of 1.8 μV·rms in a 350 Hz bandwidth and a noise efficiency factor(NEF) of 4.1. The 12-bit SAR ADC achieves an ENOB of 9.8 bit operating at 25 k S/s. The AFE is experimented on real-world applications by measuring human ECG and a clear ECG waveform is captured.展开更多
As the information sensing and processing capabilities of IoT devices increase,a large amount of data is being generated at the edge of Industrial IoT(IIoT),which has become a strong foundation for distributed Artific...As the information sensing and processing capabilities of IoT devices increase,a large amount of data is being generated at the edge of Industrial IoT(IIoT),which has become a strong foundation for distributed Artificial Intelligence(AI)applications.However,most users are reluctant to disclose their data due to network bandwidth limitations,device energy consumption,and privacy requirements.To address this issue,this paper introduces an Edge-assisted Federated Learning(EFL)framework,along with an incentive mechanism for lightweight industrial data sharing.In order to reduce the information asymmetry between data owners and users,an EFL model-sharing incentive mechanism based on contract theory is designed.In addition,a weight dispersion evaluation scheme based on Wasserstein distance is proposed.This study models an optimization problem of node selection and sharing incentives to maximize the EFL model consumers'profit and ensure the quality of training services.An incentive-based EFL algorithm with individual rationality and incentive compatibility constraints is proposed.Finally,the experimental results verify the effectiveness of the proposed scheme in terms of positive incentives for contract design and performance analysis of EFL systems.展开更多
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social...With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social images.However,most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial domain.In this work,the authors propose a secure social image-sharing method with watermarking/fingerprinting and encryption.First,the fingerprint code with a hierarchical community structure is designed based on social network analysis.Then,discrete wavelet transform(DWT)from block discrete cosine transform(DCT)directly is employed.After that,all codeword segments are embedded into the LL,LH,and HL subbands,respectively.The selected subbands are confused based on Game of Life(GoL),and then all subbands are diffused with singular value decomposition(SVD).Experimental results and security analysis demonstrate the security,invisibility,and robustness of our method.Further,the superiority of the technique is elaborated through comparison with some related image security algorithms.The solution not only performs the fast transformation from block DCT to one-level DWT but also protects users’privacy in multimedia social platforms.With the proposed method,JPEG image secure sharing in multimedia social platforms can be ensured.展开更多
With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the...With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the existing data sharing schemes have been difficult to meet the growing demand for data sharing,this paper aims at exploring a secure,efficient and privacy-protecting data sharing scheme under web3.0 applications.Specifically,this paper adopts interplanetary file system(IPFS)technology to realize the storage of large data files to solve the problem of blockchain storage capacity limitation,and utilizes ciphertext policy attribute-based encryption(CP-ABE)and proxy re-encryption(PRE)technology to realize secure multi-party sharing and finegrained access control of data.This paper provides the detailed algorithm design and implementation of data sharing phases and processes,and analyzes the algorithms from the perspectives of security,privacy protection,and performance.展开更多
Purpose:Explore the factors affecting medical data sharing in clinical research scenarios from the user’s perspective,reveal the differences between different user groups,and deepen the understanding of medical data ...Purpose:Explore the factors affecting medical data sharing in clinical research scenarios from the user’s perspective,reveal the differences between different user groups,and deepen the understanding of medical data sharing mechanisms.Design/methodology/approach:By integrating the UTAUT model,trust theory and self-efficacy theory,introducing the concepts of data transparency and individual innovation,and combining internal and external motivators,we constructed a conceptual model of medical data users’sharing behavior in clinical research scenarios.We conducted empirical research by collecting 360 pieces of first-hand data from clinical researchers.Findings:Among the internal motivators,effort expectation had a higher impact on sharing intention than performance expectation,individual innovation and self-efficacy had a higher impact on sharing behavior than trust.Trust does not show a significant impact on sharing intention,but it has a significant positive influence on sharing behavior.Among the external motivators,community influence and data transparency both positively affect sharing intention.In addition,users with different working years,professional status,data level needs,and different sharing experiences showed significant differences in healthcare data sharing.Research limitations:Our sample of clinical researchers from China was used as empirical data.Further research is needed to examine the generality of the study findings.Practical implications:The findings enhance healthcare data stakeholders’understanding of healthcare data sharing in clinical research scenarios and provide theoretical and practical insights for relevant researchers.Originality/value:In this study,the UTAUT model,trust theory and self-efficacy theory were integrated and applied to clinical research scenarios for the first time,and the concepts of data transparency and individual innovation were introduced,and the CRS-USB conceptual model was constructed and validated to extend the UTAUT model.展开更多
The integration of satellite communication network and cellular network has a great potential to enable ubiquitous connectivity in future communication networks.Among numerous related application scenarios,the direct ...The integration of satellite communication network and cellular network has a great potential to enable ubiquitous connectivity in future communication networks.Among numerous related application scenarios,the direct connection of mobile phone to satellite has attracted increasing attention.However,the spectrum scarcity in the sub-6 GHz band and low spectrum utilization prevents its popularity.To address these problem,in this paper,we propose a dynamic spectrum sharing method for satellite network and cellular network based on beam-hopping.Specifically,we first develop a centralized dynamic spectrum sharing architecture based on beam-hopping,and propose a delay pre-compensation scheme for beam hopping pattern.Then,an optimization problem is formulated to maximize the overall capacity of the integrated network,with considering the service requirements,the fairness between beam positions and mixed co-channel interference,etc.To solve this problem,a polling-based dynamic resource allocation algorithm is proposed.Simulation results confirm that the proposed algorithm can effectively reduce the serious cochannel interference between different beams or different systems,and improve the spectrum utilization rate as well as system capacity.展开更多
Satellite and terrestrial cellular networks can be integrated together to achieve extended broad-band coverage for,e.g.,maritime communication sce-narios,in the upcoming sixth-generation(6G)era.To counter spectrum sca...Satellite and terrestrial cellular networks can be integrated together to achieve extended broad-band coverage for,e.g.,maritime communication sce-narios,in the upcoming sixth-generation(6G)era.To counter spectrum scarcity,collaborative spectrum sharing is considered for hybrid satellite-terrestrial networks(HSTNs)in this paper.With only slowly-varying large-scale channel state information(CSI),joint power and channel allocation is implemented for terrestrial mobile terminals(MTs)which share the same frequency band with the satellite MTs oppor-tunistically.Specially,strict quality service assurance is adopted for terrestrial MTs under the constraint of leakage interference to satellite MTs.With the tar-get of maximizing both the number of served terres-trial MTs and the average sum transmission rate,a double-target spectrum sharing problem is formulated.To solve the complicated mixed integer programming(MIP)problem efficiently,user-centric channel pools are introduced.Simulations demonstrate that the proposed spectrum sharing scheme could achieve a significant performance gain for the HSTN.展开更多
Blockchain-based spectrum sharing with consensus is the key technology for sixth-generation mobile communication to realize dynamic spectrum management.In order to avoid the waste of computing and communication resour...Blockchain-based spectrum sharing with consensus is the key technology for sixth-generation mobile communication to realize dynamic spectrum management.In order to avoid the waste of computing and communication resources,a spectrum sharing policy-based consensus mechanism is proposed in this paper.Firstly,a spectrum sharing algorithm based on graph neural network is designed in the satelliteterrestrial spectrum sharing networks under the underlay model.It avoids high computational overhead of the traditional iterative optimization algorithm when the wireless channel condition and network topology are highly dynamic.Secondly,a consensus mechanism based on spectrum sharing strategy is designed,which converts the traditional meaningless hash problem into the graph neural network training.Miners compete for accounting rights by training a graph neutral network model that meets the spectrum sharing requirement.Finally,the consensus delay,communication and storage overhead of the proposed consensus mechanism are analyzed theoretically.The simulation results show that the proposed consensus mechanism can effectively improve spectrum efficiency with excellent scalability and generalization performance.展开更多
Corporate environmental sustainability has become a critical concern,particularly in resource-intensive industries such as pharmaceuticals,where regulatory pressures and stakeholder expectations continue to rise.Despi...Corporate environmental sustainability has become a critical concern,particularly in resource-intensive industries such as pharmaceuticals,where regulatory pressures and stakeholder expectations continue to rise.Despite increasing attention to green leadership,limited research has explored how environmentally responsible leadership(ERL)influences corporate environmental performance(CEP)through employee-driven sustainability behaviors.This study addresses this gap by examining the mediating roles of green knowledge-sharing behavior(GKSB),green innovative behavior(GIB),and voluntary green behavior(VGB),as well as the moderating role of green shared vision(GSV)in the ERL-CEP relationship.The study is grounded in Resource-Based View(RBV),Knowledge-Based View(KBV),Environmental-Based View(EBV),and Triple Bottom Line(TBL)theories,which collectively explain how leadership-driven sustainability efforts create long-term competitive advantages,drive environmental responsibility,and balance economic,social,and environmental sustainability.A quantitative research design was employed,using survey data from 384 employees in Bangladesh’s pharmaceutical sector.Data were analyzed using Partial Least Squares Structural Equation Modeling(PLS-SEM)in Smart-PLS 4.0 to assess direct,indirect,and moderating effects.The results confirm that ERL has a significant positive impact on CEP,with GKSB,GIB,and VGB acting as mediators,while GSV strengthens the ERL-CEP relationship.This study provides novel empirical evidence on the mechanisms linking green leadership to corporate sustainability,extending the application of RBV,KBV,EBV,and TBL to leadership-driven environmental management.The findings emphasize the importance of leadership training programs,sustainability-focused organizational cultures,and shared environmental visions.Policymakers should consider incentives for companies adopting ERL practices,ensuring that sustainability becomes a strategic,rather than compliance-driven,priority.This study contributes to leadership and sustainability literature by offering a comprehensive framework for integrating ERL into corporate governance and environmental strategies.展开更多
With the rapid development of medical data sharing,issues of privacy and ownership have become prominent,which have limited the scale of data sharing.To address the above challenges,we propose a blockchainbased data-s...With the rapid development of medical data sharing,issues of privacy and ownership have become prominent,which have limited the scale of data sharing.To address the above challenges,we propose a blockchainbased data-sharing framework to ensure data security and encourage data owners to actively participate in sharing.We introduce a reliable attribute-based searchable encryption scheme that enables fine-grained access control of encrypted data and ensures secure and efficient data sharing.The revenue distribution model is constructed based on Shapley value to motivate participants.Additionally,by integrating the smart contract technology of blockchain,the search operation and incentive mechanism are automatically executed.Through revenue distribution analysis,the incentive effect and rationality of the proposed scheme are verified.Performance evaluation shows that,compared with traditional data-sharing models,our proposed framework not only meets data security requirements but also incentivizes more participants to actively participate in data sharing.展开更多
This study tested a multilevel model of the workplace territorial behaviors and employees’knowledge sharing relationship,with team identification serving as a mediator and task interdependence as a moderator.Data wer...This study tested a multilevel model of the workplace territorial behaviors and employees’knowledge sharing relationship,with team identification serving as a mediator and task interdependence as a moderator.Data were collected from 253 employees(females=128,mean age=28.626,SD=6.470)from 40 work teams from different industries in China.Path analysis results indicated that workplace territorial behaviors were associated with lower employee knowledge sharing.Team identification enhanced employee knowledge sharing and partially mediated the relationship between workplace territorial behaviors and employee knowledge sharing.Task interdependence enhanced knowledge sharing and strengthened the relationship between team identification and knowledge sharing.Thesefindings extend the proposition of social information processing theory by revealing the mediating role of team identification in the relationship between workplace territorial behaviors and knowledge sharing,and clarifying the boundary conditions of team identification.Practical implications of thesefindings include a need for managers to foster collaborative atmospheres,design interdependent tasks,and mitigate territorial behaviors to enhance team identification and knowledge sharing.展开更多
At present,most quantum secret sharing(QSS)protocols are more or less designed with the incorporation of classical secret sharing schemes.With the increasing maturity of quantum technology,QSS protocols based on pure ...At present,most quantum secret sharing(QSS)protocols are more or less designed with the incorporation of classical secret sharing schemes.With the increasing maturity of quantum technology,QSS protocols based on pure quantum mechanics are becoming more important.Classical secret sharing schemes cannot achieve absolute security,and their involvement can compromise the security of QSS protocols.This paper proposes a QSS scheme based on Greenberger-Horn-Zeilinger(GHZ)basis measurement and quantum entanglement exchange.In this protocol,the secret sender stores the secret information using Pauli operations.Participants obtain their shares by measuring the product state sequentially.Finally,participants complete the secret reconstruction through quantum entanglement exchange and other related quantum operations.In addition,the particles held by participants in the protocol do not contain any secret information.Each participant's particles are in a state of maximum entanglement,and no participant can deduce the particle information of other participants through their own particles.At the same time,the protocol is based on pure quantum mechanics and does not involve classical schemes,which avoids the problem of reduced security of the protocol.Security analysis indicates that the protocol is not vulnerable to retransmission interception and collusion attacks.Moreover,it is capable of detecting and terminating the protocol promptly when facing with attacks from dishonest participants.展开更多
This study explores the interaction of responsible leadership,supportive climate,and creative self-efficacy in enhancing knowledge sharing among employees in the banking sector.Data from 314 employees(42%Females,58%Ma...This study explores the interaction of responsible leadership,supportive climate,and creative self-efficacy in enhancing knowledge sharing among employees in the banking sector.Data from 314 employees(42%Females,58%Males)were analyzed using structural equation modeling(SEM)and a time-lagged survey design.The analysis revealed a higher responsible leadership to be associated with both creative self-efficacy and knowledge sharing.Additionally,the study found that supportive climate moderation to significantly,strengthening the relationship between responsible leadership and knowledge sharing.Creative self-efficacy partially mediated this relationship to be stronger.The results indicate that responsible leadership and a supportive climate are crucial socio-cognitive mechanisms for enhancing knowledge sharing in organizations.The banking sector should aim to promote collaborative work partnerships implementing responsible leadership practices and cultivating supportive work environments to bolster organizational growth and competitiveness.展开更多
The advent of the digital age has consistently provided impetus for facilitating global trade,as evidenced by the numerous customs clearance documents and participants involved in the international trade process,inclu...The advent of the digital age has consistently provided impetus for facilitating global trade,as evidenced by the numerous customs clearance documents and participants involved in the international trade process,including enterprises,agents,and government departments.However,the urgent issue that requires immediate attention is how to achieve secure and efficient cross-border data sharing among these government departments and enterprises in complex trade processes.In addressing this need,this paper proposes a data exchange architecture employing Multi-Authority Attribute-Based Encryption(MA-ABE)in combination with blockchain technology.This scheme supports proxy decryption,attribute revocation,and policy update,while allowing each participating entity to manage their keys autonomously,ensuring system security and enhancing trust among participants.In order to enhance system decentralization,a mechanism has been designed in the architecture where multiple institutions interact with smart contracts and jointly participate in the generation of public parameters.Integration with the multi-party process execution engine Caterpillar has been shown to boost the transparency of cross-border information flow and cooperation between different organizations.The scheme ensures the auditability of data access control information and the visualization of on-chain data sharing.The MA-ABE scheme is statically secure under the q-Decisional Parallel Bilinear Diffie-Hellman Exponent(q-DPBDHE2)assumption in the random oracle model,and can resist ciphertext rollback attacks to achieve true backward and forward security.Theoretical analysis and experimental results demonstrate the appropriateness of the scheme for cross-border data collaboration between different institutions.展开更多
Sharing behavior is of great significance to the development of young children.This paper takes 170 middle class children as a sample to explore the influencing factors of sharing behavior in preschool children and it...Sharing behavior is of great significance to the development of young children.This paper takes 170 middle class children as a sample to explore the influencing factors of sharing behavior in preschool children and its age development characteristics.This study shows that the score of willingness to share and the number of shares was inversely proportional to the value of the shared items;When there is an abundance of items to share,children share significantly more in the presence of the sharing partner than in the absence of the partner.Based on the findings,educational recommendations are made from three aspects:cultivating intrinsic motivation in children,enhancing the stability of children’s behavior,and guiding children to form correct values.展开更多
文摘Burden sharing has been a perennial issue in the transatlantic alliance,primarily entailing cost sharing and responsibility sharing.During the first Trump administration,the dispute over cost sharing had been prominent,while the Biden administration placed more emphasis on responsibility sharing to facilitate its strategic goal of“outcompeting”China.The Ukraine crisis had prompted a US-Europe consensus on cost sharing,but the urgency of responsibility sharing subsequently increased.The shift from jointly providing the economic resources to extensively sharing the security responsibilities ref lects the recalibration of the US strategic focus and its higher expectations for the role of European allies.Nevertheless,Europe's response to the US call for responsibility sharing has been relatively limited.The responsibility sharing within the US-Europe alliance and their future relationship will be subject to the strategic coordination between the two sides and multiple complex factors.
文摘The accelerated advancement of the Internet of Things(IoT)has generated substantial data,including sensitive and private information.Consequently,it is imperative to guarantee the security of data sharing.While facilitating fine-grained access control,Ciphertext Policy Attribute-Based Encryption(CP-ABE)can effectively ensure the confidentiality of shared data.Nevertheless,the conventional centralized CP-ABE scheme is plagued by the issues of keymisuse,key escrow,and large computation,which will result in security risks.This paper suggests a lightweight IoT data security sharing scheme that integrates blockchain technology and CP-ABE to address the abovementioned issues.The integrity and traceability of shared data are guaranteed by the use of blockchain technology to store and verify access transactions.The encryption and decryption operations of the CP-ABE algorithm have been implemented using elliptic curve scalarmultiplication to accommodate lightweight IoT devices,as opposed to themore arithmetic bilinear pairing found in the traditional CP-ABE algorithm.Additionally,a portion of the computation is delegated to the edge nodes to alleviate the computational burden on users.A distributed key management method is proposed to address the issues of key escrow andmisuse.Thismethod employs the edge blockchain to facilitate the storage and distribution of attribute private keys.Meanwhile,data security sharing is enhanced by combining off-chain and on-chain ciphertext storage.The security and performance analysis indicates that the proposed scheme is more efficient and secure.
基金The National Natural Science Foundation of China(No.72071042)。
文摘China’s healthcare system faces increasing challenges,including surging medical costs,resource allocation imbalances favoring large hospitals,and ineffective referral mechanisms.The lack of a unified strategy integrating standardized coverage with personalized payment compounds these issues.To this end,this study proposes a risk-sharing reform strategy that combines equal coverage for the same disease(ECSD)with an individualized out-of-pocket(I-OOP)model.Specifically,the study employs a Markov model to capture patient transitions across health states and care levels.The findings show that ECSD and I-OOP enhance equity by standardizing disease coverage while tailoring costs to patient income and facility type.This approach alleviates demand on high-tier hospitals,promoting primary care utilization and enabling balanced resource distribution.The study’s findings provide a reference for policymakers and healthcare administrators by presenting a scalable framework that is aligned with China’s development goals with the aim of fostering an efficient,sustainable healthcare system that is adaptable to regional needs.
文摘1 In a world filled with more“stuff”than we need,sharing libraries are emerging as a solution to both environmental and economic concerns.Unlike traditional libraries,these“libraries of things”offer a variety of items for borrowing,often for free or at a low cost.2 For example,the Oxford Maternity Clothes Library provides expectant mothers with free maternity wear,while the Warwick Toy Library allows locals to borrow toys and even reserve them online.The Tool Library in Wolverhampton offers gardening and DIY equipment,and the Share Shed in Devon has over 350 items available.Nappy libraries also provide parents with reusable cloth nappies(尿布),reducing costs and waste.
文摘I’m Li hua from class 1.I’m honored to come up with some ideas for the upcoming exchange activities.My idea is to hold a Cultural sharing workshop.First,we can introduce ourselves to others.This helps us get to know each other.Then we can introduce the history,culture and national customs of China with them.
基金supported by the National Key R&D Program of China under Grant 2018YFA0701400 and 2018YFA0701401.
文摘This paper presents the design of a low-power multi-channel analog front-end(AFE) for bio-potential recording. By using time division multiplexing(TDM), a successive approximation register analog-to-digital converter(SAR ADC) is shared among all 20 channels. A charge-sharing multiplexer(MUX) is proposed to transmit the output signals from the respective channels to the ADC. By separately pre sampling the output of each channel, the sampling time of each channel is greatly extended and additional active buffers are avoided. The AFE is fabricated in a 65-nm CMOS process, and the whole system consumes 28.2 μW under 1 V supply. Each analog acquisition channel consumes 1.25 μW and occupies a chip area of 0.14 mm2. Measurement results show that the AFE achieves an input referred noise of 1.8 μV·rms in a 350 Hz bandwidth and a noise efficiency factor(NEF) of 4.1. The 12-bit SAR ADC achieves an ENOB of 9.8 bit operating at 25 k S/s. The AFE is experimented on real-world applications by measuring human ECG and a clear ECG waveform is captured.
基金supported by the National Natural Science Foundation of China (No.62071070)Major science and technology special project of Science and Technology Department of Yunnan Province (202002AB080001-8)BUPT innovation&entrepreneurship support program (2023-YC-T031)。
文摘As the information sensing and processing capabilities of IoT devices increase,a large amount of data is being generated at the edge of Industrial IoT(IIoT),which has become a strong foundation for distributed Artificial Intelligence(AI)applications.However,most users are reluctant to disclose their data due to network bandwidth limitations,device energy consumption,and privacy requirements.To address this issue,this paper introduces an Edge-assisted Federated Learning(EFL)framework,along with an incentive mechanism for lightweight industrial data sharing.In order to reduce the information asymmetry between data owners and users,an EFL model-sharing incentive mechanism based on contract theory is designed.In addition,a weight dispersion evaluation scheme based on Wasserstein distance is proposed.This study models an optimization problem of node selection and sharing incentives to maximize the EFL model consumers'profit and ensure the quality of training services.An incentive-based EFL algorithm with individual rationality and incentive compatibility constraints is proposed.Finally,the experimental results verify the effectiveness of the proposed scheme in terms of positive incentives for contract design and performance analysis of EFL systems.
基金funded by NSFC Grants 61502154,61972136,the NSF of Hubei Province(2023AFB004,2024AFB544)Hubei Provincial Department of Education Project(No.Q20232206)Project of Hubei University of Economics(No.T201410).
文摘With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social images.However,most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial domain.In this work,the authors propose a secure social image-sharing method with watermarking/fingerprinting and encryption.First,the fingerprint code with a hierarchical community structure is designed based on social network analysis.Then,discrete wavelet transform(DWT)from block discrete cosine transform(DCT)directly is employed.After that,all codeword segments are embedded into the LL,LH,and HL subbands,respectively.The selected subbands are confused based on Game of Life(GoL),and then all subbands are diffused with singular value decomposition(SVD).Experimental results and security analysis demonstrate the security,invisibility,and robustness of our method.Further,the superiority of the technique is elaborated through comparison with some related image security algorithms.The solution not only performs the fast transformation from block DCT to one-level DWT but also protects users’privacy in multimedia social platforms.With the proposed method,JPEG image secure sharing in multimedia social platforms can be ensured.
基金supported by the National Natural Science Foundation of China(Grant No.U24B20146)the National Key Research and Development Plan in China(Grant No.2020YFB1005500)Beijing Natural Science Foundation Project(No.M21034).
文摘With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the existing data sharing schemes have been difficult to meet the growing demand for data sharing,this paper aims at exploring a secure,efficient and privacy-protecting data sharing scheme under web3.0 applications.Specifically,this paper adopts interplanetary file system(IPFS)technology to realize the storage of large data files to solve the problem of blockchain storage capacity limitation,and utilizes ciphertext policy attribute-based encryption(CP-ABE)and proxy re-encryption(PRE)technology to realize secure multi-party sharing and finegrained access control of data.This paper provides the detailed algorithm design and implementation of data sharing phases and processes,and analyzes the algorithms from the perspectives of security,privacy protection,and performance.
基金supported by the National Natural Science Foundation of China(Grant No.72374081)the Key Research and Development Project of the Department of Science and Technology of Jilin Province(Grant No.20240304164SF).
文摘Purpose:Explore the factors affecting medical data sharing in clinical research scenarios from the user’s perspective,reveal the differences between different user groups,and deepen the understanding of medical data sharing mechanisms.Design/methodology/approach:By integrating the UTAUT model,trust theory and self-efficacy theory,introducing the concepts of data transparency and individual innovation,and combining internal and external motivators,we constructed a conceptual model of medical data users’sharing behavior in clinical research scenarios.We conducted empirical research by collecting 360 pieces of first-hand data from clinical researchers.Findings:Among the internal motivators,effort expectation had a higher impact on sharing intention than performance expectation,individual innovation and self-efficacy had a higher impact on sharing behavior than trust.Trust does not show a significant impact on sharing intention,but it has a significant positive influence on sharing behavior.Among the external motivators,community influence and data transparency both positively affect sharing intention.In addition,users with different working years,professional status,data level needs,and different sharing experiences showed significant differences in healthcare data sharing.Research limitations:Our sample of clinical researchers from China was used as empirical data.Further research is needed to examine the generality of the study findings.Practical implications:The findings enhance healthcare data stakeholders’understanding of healthcare data sharing in clinical research scenarios and provide theoretical and practical insights for relevant researchers.Originality/value:In this study,the UTAUT model,trust theory and self-efficacy theory were integrated and applied to clinical research scenarios for the first time,and the concepts of data transparency and individual innovation were introduced,and the CRS-USB conceptual model was constructed and validated to extend the UTAUT model.
基金supported in part by the National Key Research and Development Program of China under Grant 2018YFA0701601in part by the National Natural Science Foundation of China under Grant 61922049 and Grant 61941104in part by the Tsinghua University-China Mobile Communications Group Company Ltd.,Joint Institute.
文摘The integration of satellite communication network and cellular network has a great potential to enable ubiquitous connectivity in future communication networks.Among numerous related application scenarios,the direct connection of mobile phone to satellite has attracted increasing attention.However,the spectrum scarcity in the sub-6 GHz band and low spectrum utilization prevents its popularity.To address these problem,in this paper,we propose a dynamic spectrum sharing method for satellite network and cellular network based on beam-hopping.Specifically,we first develop a centralized dynamic spectrum sharing architecture based on beam-hopping,and propose a delay pre-compensation scheme for beam hopping pattern.Then,an optimization problem is formulated to maximize the overall capacity of the integrated network,with considering the service requirements,the fairness between beam positions and mixed co-channel interference,etc.To solve this problem,a polling-based dynamic resource allocation algorithm is proposed.Simulation results confirm that the proposed algorithm can effectively reduce the serious cochannel interference between different beams or different systems,and improve the spectrum utilization rate as well as system capacity.
基金supported in part by the National Natural Science Foundation of China under Grant 62425110 and Grant U22A2002in part by the National Key Research and Development Program of China under Grant 2020YFA0711301+2 种基金in part by the Leading Project of Minzu University of China under Grant 2023QNYL23in part by the Key Research and Development Project of Nantong(Special Project for Prospective Technology Innovation)under Grant GZ2024002in part by the Suzhou Science and Technology Project,and in part by the FAW Jiefang Automotive Co.,Ltd.
文摘Satellite and terrestrial cellular networks can be integrated together to achieve extended broad-band coverage for,e.g.,maritime communication sce-narios,in the upcoming sixth-generation(6G)era.To counter spectrum scarcity,collaborative spectrum sharing is considered for hybrid satellite-terrestrial networks(HSTNs)in this paper.With only slowly-varying large-scale channel state information(CSI),joint power and channel allocation is implemented for terrestrial mobile terminals(MTs)which share the same frequency band with the satellite MTs oppor-tunistically.Specially,strict quality service assurance is adopted for terrestrial MTs under the constraint of leakage interference to satellite MTs.With the tar-get of maximizing both the number of served terres-trial MTs and the average sum transmission rate,a double-target spectrum sharing problem is formulated.To solve the complicated mixed integer programming(MIP)problem efficiently,user-centric channel pools are introduced.Simulations demonstrate that the proposed spectrum sharing scheme could achieve a significant performance gain for the HSTN.
基金supported in part by the National Natural Science Foundation of China under Grant 62171020.
文摘Blockchain-based spectrum sharing with consensus is the key technology for sixth-generation mobile communication to realize dynamic spectrum management.In order to avoid the waste of computing and communication resources,a spectrum sharing policy-based consensus mechanism is proposed in this paper.Firstly,a spectrum sharing algorithm based on graph neural network is designed in the satelliteterrestrial spectrum sharing networks under the underlay model.It avoids high computational overhead of the traditional iterative optimization algorithm when the wireless channel condition and network topology are highly dynamic.Secondly,a consensus mechanism based on spectrum sharing strategy is designed,which converts the traditional meaningless hash problem into the graph neural network training.Miners compete for accounting rights by training a graph neutral network model that meets the spectrum sharing requirement.Finally,the consensus delay,communication and storage overhead of the proposed consensus mechanism are analyzed theoretically.The simulation results show that the proposed consensus mechanism can effectively improve spectrum efficiency with excellent scalability and generalization performance.
文摘Corporate environmental sustainability has become a critical concern,particularly in resource-intensive industries such as pharmaceuticals,where regulatory pressures and stakeholder expectations continue to rise.Despite increasing attention to green leadership,limited research has explored how environmentally responsible leadership(ERL)influences corporate environmental performance(CEP)through employee-driven sustainability behaviors.This study addresses this gap by examining the mediating roles of green knowledge-sharing behavior(GKSB),green innovative behavior(GIB),and voluntary green behavior(VGB),as well as the moderating role of green shared vision(GSV)in the ERL-CEP relationship.The study is grounded in Resource-Based View(RBV),Knowledge-Based View(KBV),Environmental-Based View(EBV),and Triple Bottom Line(TBL)theories,which collectively explain how leadership-driven sustainability efforts create long-term competitive advantages,drive environmental responsibility,and balance economic,social,and environmental sustainability.A quantitative research design was employed,using survey data from 384 employees in Bangladesh’s pharmaceutical sector.Data were analyzed using Partial Least Squares Structural Equation Modeling(PLS-SEM)in Smart-PLS 4.0 to assess direct,indirect,and moderating effects.The results confirm that ERL has a significant positive impact on CEP,with GKSB,GIB,and VGB acting as mediators,while GSV strengthens the ERL-CEP relationship.This study provides novel empirical evidence on the mechanisms linking green leadership to corporate sustainability,extending the application of RBV,KBV,EBV,and TBL to leadership-driven environmental management.The findings emphasize the importance of leadership training programs,sustainability-focused organizational cultures,and shared environmental visions.Policymakers should consider incentives for companies adopting ERL practices,ensuring that sustainability becomes a strategic,rather than compliance-driven,priority.This study contributes to leadership and sustainability literature by offering a comprehensive framework for integrating ERL into corporate governance and environmental strategies.
基金supported by the Natural Science Foundation of Hebei Province of China(F2021201052).
文摘With the rapid development of medical data sharing,issues of privacy and ownership have become prominent,which have limited the scale of data sharing.To address the above challenges,we propose a blockchainbased data-sharing framework to ensure data security and encourage data owners to actively participate in sharing.We introduce a reliable attribute-based searchable encryption scheme that enables fine-grained access control of encrypted data and ensures secure and efficient data sharing.The revenue distribution model is constructed based on Shapley value to motivate participants.Additionally,by integrating the smart contract technology of blockchain,the search operation and incentive mechanism are automatically executed.Through revenue distribution analysis,the incentive effect and rationality of the proposed scheme are verified.Performance evaluation shows that,compared with traditional data-sharing models,our proposed framework not only meets data security requirements but also incentivizes more participants to actively participate in data sharing.
文摘This study tested a multilevel model of the workplace territorial behaviors and employees’knowledge sharing relationship,with team identification serving as a mediator and task interdependence as a moderator.Data were collected from 253 employees(females=128,mean age=28.626,SD=6.470)from 40 work teams from different industries in China.Path analysis results indicated that workplace territorial behaviors were associated with lower employee knowledge sharing.Team identification enhanced employee knowledge sharing and partially mediated the relationship between workplace territorial behaviors and employee knowledge sharing.Task interdependence enhanced knowledge sharing and strengthened the relationship between team identification and knowledge sharing.Thesefindings extend the proposition of social information processing theory by revealing the mediating role of team identification in the relationship between workplace territorial behaviors and knowledge sharing,and clarifying the boundary conditions of team identification.Practical implications of thesefindings include a need for managers to foster collaborative atmospheres,design interdependent tasks,and mitigate territorial behaviors to enhance team identification and knowledge sharing.
基金Project supported by the National Natural Science Foundation of China(Grant No.62002105)the Key Research and Development Program of Hubei,China(Grant No.2021BEA163)。
文摘At present,most quantum secret sharing(QSS)protocols are more or less designed with the incorporation of classical secret sharing schemes.With the increasing maturity of quantum technology,QSS protocols based on pure quantum mechanics are becoming more important.Classical secret sharing schemes cannot achieve absolute security,and their involvement can compromise the security of QSS protocols.This paper proposes a QSS scheme based on Greenberger-Horn-Zeilinger(GHZ)basis measurement and quantum entanglement exchange.In this protocol,the secret sender stores the secret information using Pauli operations.Participants obtain their shares by measuring the product state sequentially.Finally,participants complete the secret reconstruction through quantum entanglement exchange and other related quantum operations.In addition,the particles held by participants in the protocol do not contain any secret information.Each participant's particles are in a state of maximum entanglement,and no participant can deduce the particle information of other participants through their own particles.At the same time,the protocol is based on pure quantum mechanics and does not involve classical schemes,which avoids the problem of reduced security of the protocol.Security analysis indicates that the protocol is not vulnerable to retransmission interception and collusion attacks.Moreover,it is capable of detecting and terminating the protocol promptly when facing with attacks from dishonest participants.
文摘This study explores the interaction of responsible leadership,supportive climate,and creative self-efficacy in enhancing knowledge sharing among employees in the banking sector.Data from 314 employees(42%Females,58%Males)were analyzed using structural equation modeling(SEM)and a time-lagged survey design.The analysis revealed a higher responsible leadership to be associated with both creative self-efficacy and knowledge sharing.Additionally,the study found that supportive climate moderation to significantly,strengthening the relationship between responsible leadership and knowledge sharing.Creative self-efficacy partially mediated this relationship to be stronger.The results indicate that responsible leadership and a supportive climate are crucial socio-cognitive mechanisms for enhancing knowledge sharing in organizations.The banking sector should aim to promote collaborative work partnerships implementing responsible leadership practices and cultivating supportive work environments to bolster organizational growth and competitiveness.
基金supported by Hainan Provincial Natural Science Foundation of China Nos.622RC617,624RC485Open Foundation of State Key Laboratory of Networking and Switching Technology(Beijing University of Posts and Telecommunications)(SKLNST-2023-1-07).
文摘The advent of the digital age has consistently provided impetus for facilitating global trade,as evidenced by the numerous customs clearance documents and participants involved in the international trade process,including enterprises,agents,and government departments.However,the urgent issue that requires immediate attention is how to achieve secure and efficient cross-border data sharing among these government departments and enterprises in complex trade processes.In addressing this need,this paper proposes a data exchange architecture employing Multi-Authority Attribute-Based Encryption(MA-ABE)in combination with blockchain technology.This scheme supports proxy decryption,attribute revocation,and policy update,while allowing each participating entity to manage their keys autonomously,ensuring system security and enhancing trust among participants.In order to enhance system decentralization,a mechanism has been designed in the architecture where multiple institutions interact with smart contracts and jointly participate in the generation of public parameters.Integration with the multi-party process execution engine Caterpillar has been shown to boost the transparency of cross-border information flow and cooperation between different organizations.The scheme ensures the auditability of data access control information and the visualization of on-chain data sharing.The MA-ABE scheme is statically secure under the q-Decisional Parallel Bilinear Diffie-Hellman Exponent(q-DPBDHE2)assumption in the random oracle model,and can resist ciphertext rollback attacks to achieve true backward and forward security.Theoretical analysis and experimental results demonstrate the appropriateness of the scheme for cross-border data collaboration between different institutions.
基金Research results of Shandong Provincial Education Science“14^(th) Five-Year Plan”2021,Research on Painting Interpretation and Psychological Intervention of Rural Left-behind Children(Project No.:2021ZD043)。
文摘Sharing behavior is of great significance to the development of young children.This paper takes 170 middle class children as a sample to explore the influencing factors of sharing behavior in preschool children and its age development characteristics.This study shows that the score of willingness to share and the number of shares was inversely proportional to the value of the shared items;When there is an abundance of items to share,children share significantly more in the presence of the sharing partner than in the absence of the partner.Based on the findings,educational recommendations are made from three aspects:cultivating intrinsic motivation in children,enhancing the stability of children’s behavior,and guiding children to form correct values.