期刊文献+
共找到53,411篇文章
< 1 2 250 >
每页显示 20 50 100
Estimation of peer pressure in dynamic homogeneous social networks
1
作者 Jie Liu Pengyi Wang +1 位作者 Jiayang Zhao Yu Dong 《中国科学技术大学学报》 北大核心 2025年第5期36-49,35,I0001,I0002,共17页
Social interaction with peer pressure is widely studied in social network analysis.Game theory can be utilized to model dynamic social interaction,and one class of game network models assumes that people’s decision p... Social interaction with peer pressure is widely studied in social network analysis.Game theory can be utilized to model dynamic social interaction,and one class of game network models assumes that people’s decision payoff functions hinge on individual covariates and the choices of their friends.However,peer pressure would be misidentified and induce a non-negligible bias when incomplete covariates are involved in the game model.For this reason,we develop a generalized constant peer effects model based on homogeneity structure in dynamic social networks.The new model can effectively avoid bias through homogeneity pursuit and can be applied to a wider range of scenarios.To estimate peer pressure in the model,we first present two algorithms based on the initialize expand merge method and the polynomial-time twostage method to estimate homogeneity parameters.Then we apply the nested pseudo-likelihood method and obtain consistent estimators of peer pressure.Simulation evaluations show that our proposed methodology can achieve desirable and effective results in terms of the community misclassification rate and parameter estimation error.We also illustrate the advantages of our model in the empirical analysis when compared with a benchmark model. 展开更多
关键词 dynamic network game theory HOMOGENEITY peer pressure social interaction
在线阅读 下载PDF
A Dynamic Social Network Graph Anonymity Scheme with Community Structure Protection
2
作者 Yuanjing Hao Xuemin Wang +2 位作者 Liang Chang Long Li Mingmeng Zhang 《Computers, Materials & Continua》 2025年第2期3131-3159,共29页
Dynamic publishing of social network graphs offers insights into user behavior but brings privacy risks, notably re-identification attacks on evolving data snapshots. Existing methods based on -anonymity can mitigate ... Dynamic publishing of social network graphs offers insights into user behavior but brings privacy risks, notably re-identification attacks on evolving data snapshots. Existing methods based on -anonymity can mitigate these attacks but are cumbersome, neglect dynamic protection of community structure, and lack precise utility measures. To address these challenges, we present a dynamic social network graph anonymity scheme with community structure protection (DSNGA-CSP), which achieves the dynamic anonymization process by incorporating community detection. First, DSNGA-CSP categorizes communities of the original graph into three types at each timestamp, and only partitions community subgraphs for a specific category at each updated timestamp. Then, DSNGA-CSP achieves intra-community and inter-community anonymization separately to retain more of the community structure of the original graph at each timestamp. It anonymizes community subgraphs by the proposed novel -composition method and anonymizes inter-community edges by edge isomorphism. Finally, a novel information loss metric is introduced in DSNGA-CSP to precisely capture the utility of the anonymized graph through original information preservation and anonymous information changes. Extensive experiments conducted on five real-world datasets demonstrate that DSNGA-CSP consistently outperforms existing methods, providing a more effective balance between privacy and utility. Specifically, DSNGA-CSP shows an average utility improvement of approximately 30% compared to TAKG and CTKGA for three dynamic graph datasets, according to the proposed information loss metric IL. 展开更多
关键词 Dynamic social network graph k-composition anonymity community structure protection graph publishing security and privacy
在线阅读 下载PDF
Research on Railway 5G-R Network Security Technology
3
作者 ZHANG Song WANG Wei +3 位作者 TIAN Zhiji MA Jun SUN Bin SHEN Meiying(Translated) 《Chinese Railways》 2025年第1期29-36,共8页
The 5G-R network is on the verge of entering the construction stage.Given that the dedicated network for railways is closely linked to train operation safety,there are extremely high requirements for network security.... The 5G-R network is on the verge of entering the construction stage.Given that the dedicated network for railways is closely linked to train operation safety,there are extremely high requirements for network security.As a result,there is an urgent need to conduct research on 5G-R network security.To comprehensively enhance the end-to-end security protection of the 5G-R network,this study summarized the security requirements of the GSM-R network,analyzed the security risks and requirements faced by the 5G-R network,and proposed an overall 5G-R network security architecture.The security technical schemes were detailed from various aspects:5G-R infrastructure security,terminal access security,networking security,operation and maintenance security,data security,and network boundary security.Additionally,the study proposed leveraging the 5G-R security situation awareness system to achieve a comprehensive upgrade from basic security technologies to endogenous security capabilities within the 5G-R system. 展开更多
关键词 5G-R network security security risks endogenous security situational awareness
原文传递
Exploring the Nuclear Power DCS Network Security Management Method and Its Application
4
作者 Yu Chen Yongjie Fu Yajie Wen 《Journal of Electronic Research and Application》 2025年第3期97-103,共7页
Given the grave local and international network security landscape,a national strategic level analysis indicates that the modernization and advancement within the Industry 4.0 era are closely correlated with overall c... Given the grave local and international network security landscape,a national strategic level analysis indicates that the modernization and advancement within the Industry 4.0 era are closely correlated with overall competitive strength.Consequently,China proposed a strategy for the integration of industrialization and informatization,optimizing and adjusting its industrial structure to swiftly achieve transformation and upgrading in the Industry 4.0 era,thereby enhancing the sophistication of intelligent industrial control systems.The distributed control system in a nuclear power plant functions as an industrial control system,overseeing the operational status of the physical process.Its ability to ensure safe and reliable operation is directly linked to nuclear safety and the cybersecurity of the facility.The management of network security in distributed control systems(DCS)is crucial for achieving this objective.Due to the varying network settings and parameters of the DCS implemented in each nuclear power plant,the network security status of the system sometimes diverges from expectations.During system operation,it will undoubtedly encounter network security issues.Consequently,nuclear power plants utilize the technical criteria outlined in GB/T 22239 to formulate a network security management program aimed at enhancing the operational security of DCS within these facilities.This study utilizes existing network security regulations and standards as a reference to analyze the network security control standards based on the nuclear power plant’s control system.It delineates the fundamental requirements for network security management,facilitating integration with the entire life cycle of the research,development,and application of the nuclear power plant’s distributed control system,thereby establishing a network security management methodology that satisfies the control requirements of the nuclear power plant.Initially,it presents DCS and network security management,outlines current domestic and international network security legislation and standards,and specifies the standards pertinent to the administration of DCS in nuclear power plants.Secondly,the design of network security management for DCS is executed in conjunction with the specific context of nuclear power plants.This encompasses the deployment of network security apparatus,validation of the network security management strategy,and optimization adjustments.Consequently,recommendations beneficial to the network security management of nuclear power plants are compiled,aimed at establishing a management system and incorporating the concept of full life cycle management,which is predicated on system requirements,system design,and both software and hardware considerations.Conversely,it presents the notion of comprehensive life cycle management and suggests network security management strategies encompassing system requirements,system architecture,detailed hardware and software design and implementation,procurement,internal system integration,system validation and acceptance testing,system installation,operational maintenance,system modifications,and decommissioning.We will consistently enhance the performance and functionality of DCS in nuclear power plants,establish a safe and secure operational environment,and thereby facilitate the implementation of DCS in nuclear facilities while ensuring robust network security in the future. 展开更多
关键词 network security DCS Nuclear power plant network security management
在线阅读 下载PDF
Optimization of Park System in Haidian District,Beijing Based on Social Network Analysis
5
作者 WU Haotian CAO Ying 《Journal of Landscape Research》 2025年第2期11-16,共6页
The construction of“park cities”requires a systematic thinking to coordinate the networked development of park system and break through the limitation of emphasizing scale and grade and neglecting dynamic correlatio... The construction of“park cities”requires a systematic thinking to coordinate the networked development of park system and break through the limitation of emphasizing scale and grade and neglecting dynamic correlation in traditional planning.Taking Haidian District of Beijing as an example,the social network analysis method is introduced to construct the network model of park green spaces.Through indicators such as clustering coefficient,network density and node centrality,the characteristics of its spatial structure and hierarchical relationship are analyzed.It is found that the network integrity presents the characteristics of“highly local concentration and global fragmentation”,fragmented park green space network and missing spatial connection,isolated clusters and collaborative failure,as well as the spatial mismatch between population and resource supply and demand.Hierarchical issues include“structural imbalance and functional disorder”,disorder between network hierarchy and park level,misalignment of functional hierarchy leading to weakened network risk resistance capacity,and a relatively dense distribution of core nodes,etc.In response to the above problems,a multi-level spatial intervention strategy should be adopted to solve the overall problem of the network.Meanwhile,it is needed to clarify the positioning of a park itself and improve the hierarchical system,so as to construct a multi-level and multi-scale park green space network,contribute to the construction of a park city,and provide residents with more diverse activity venues. 展开更多
关键词 Urban park system social network analysis Haidian District BEIJING Park network structure
在线阅读 下载PDF
Possible Classifications of Social Network Addiction:A Latent Profile Analysis of Chinese College Students
6
作者 Lin Luo Junfeng Yuan +4 位作者 Yanling Wang Rui Zhu HuilinXu Siyuan Bi Zhongge Zhang 《International Journal of Mental Health Promotion》 2025年第6期863-876,共14页
Objectives:SocialNetworkAddiction(SNA)is becoming increasingly prevalent among college students;however,there remains a lack of consensus regarding the measurement tools and their optimal cutoff score.This study aims ... Objectives:SocialNetworkAddiction(SNA)is becoming increasingly prevalent among college students;however,there remains a lack of consensus regarding the measurement tools and their optimal cutoff score.This study aims to validate the 21-item SocialNetwork Addiction Scale-Chinese(SNAS-C)in its Chinese version and to determine its optimal cutoff score for identifying potential SNA cases within the college student population.Methods:A crosssectional survey was conducted,recruiting 3387 college students.Latent profile analysis(LPA)and receiver operating characteristic(ROC)curve analysis were employed to establish the optimal cutoff score for the validated 21-item SNAS-C.Results:Three profile models were selected based on multiple statistical criteria,classifying participants into low-risk,moderate-risk,and high-risk groups.The highest-risk group was defined as“positive”for SNA,while the remaining groups were considered“negative”,serving as the reference standard for ROC analysis.The optimal cutoff score was determined to be 72(sensitivity:98.2%,specificity:96.86%),with an overall classification accuracy of 97.0%.The“positive”group reported significantly higher frequency of social network usage,greater digitalmedia dependence scores,and a higher incidence of network addiction.Conclusion:This study identified the optimal cutoff score for the SNAS-C as≥72,demonstrating high sensitivity,specificity,and diagnostic accuracy.This threshold effectively distinguishes between high-risk and low-risk SNA. 展开更多
关键词 social network addiction mental health latent profile analysis(LPA) receiver operating characteristic(ROC) social networking addiction scale-Chinese(SNAS-C)
暂未订购
The Fundamental Construction and Social Development of China’s Network Society
7
作者 Xie Jungui 《Contemporary Social Sciences》 2025年第5期122-139,共18页
The idea of a network society was introduced by Western sociologists at the end of the 20th century after in-depth research was conducted from perspectives such as informationalism.Influenced by these developments,the... The idea of a network society was introduced by Western sociologists at the end of the 20th century after in-depth research was conducted from perspectives such as informationalism.Influenced by these developments,the concept of constructing a network society also emerged in China.Over the past 30 years,China has made significant progress and achievements in constructing a network society,both in terms of its fundamental construction and social development.It is important that these advancements be summarized and reviewed.China’s network society construction can be divided into two relatively independent yet interconnected components,based on their focal points:its foundational infrastructure and its social development.These two components of China’s network society are managed by different departments.China has integrated the fundamental construction of its network society with the social development of its network society,thereby achieving unified planning,collaborative advancement,and coordinated development.This approach aims to harmonize two aspects:building China’s cyberspace strength and contributing to Chinese informatization,thereby advancing Chinese modernization. 展开更多
关键词 network society information society INFRASTRUCTURE social development network society construction building China’s cyberspace strength network society planning
在线阅读 下载PDF
Model and service for privacy in decentralized online social networks
8
作者 George Pacheco Pinto JoséRonaldo Leles Jr +3 位作者 Cíntia da Costa Souza Paulo Rde Souza Frederico Araújo Durão Cássio Prazeres 《Journal of Electronic Science and Technology》 2025年第1期76-97,共22页
Intensely using online social networks(OSNs)makes users concerned about privacy of data.Given the centralized nature of these platforms,and since each platform has a particular storage mechanism,authentication,and acc... Intensely using online social networks(OSNs)makes users concerned about privacy of data.Given the centralized nature of these platforms,and since each platform has a particular storage mechanism,authentication,and access control,their users do not have the control and the right over their data.Therefore,users cannot easily switch between similar platforms or transfer data from one platform to another.These issues imply,among other things,a threat to privacy since such users depend on the interests of the service provider responsible for administering OSNs.As a strategy for the decentralization of the OSNs and,consequently,as a solution to the privacy problems in these environments,the so-called decentralized online social networks(DOSNs)have emerged.Unlike OSNs,DOSNs are decentralized content management platforms because they do not use centralized service providers.Although DOSNs address some of the privacy issues encountered in OSNs,DOSNs also pose significant challenges to consider,for example,access control to user profile information with high granularity.This work proposes developing an ontological model and a service to support privacy in DOSNs.The model describes the main concepts of privacy access control in DOSNs and their relationships.In addition,the service will consume the model to apply access control according to the policies represented in the model.Our model was evaluated in two phases to verify its compliance with the proposed domain.Finally,we evaluated our service with a performance evaluation,and the results were satisfactory concerning the response time of access control requests. 展开更多
关键词 Access control Decentralized online social network ONTOLOGY PRIVACY
在线阅读 下载PDF
Effects of impulsive personality on suicide in adolescent depression: The chain mediating of perceived social adversity and security
9
作者 Hua Zhang Hua-Bin Li +2 位作者 Fu-Sheng Sun Xue-Qiong Su Chun-Bo Sun 《World Journal of Psychiatry》 2025年第7期198-206,共9页
BACKGROUND Depression is a common mental disorder among adolescents,characterized by a high rate of suicide and self-harm,which not only is devastating to families but also has a negative impact on society.Psychologic... BACKGROUND Depression is a common mental disorder among adolescents,characterized by a high rate of suicide and self-harm,which not only is devastating to families but also has a negative impact on society.Psychological factors such as impulsive personality,perceived chronic social adversity(PCSA),and sense of security are closely associated with suicide risk in adolescents with depression.Few studies have been conducted on the relationship between these factors.AIM To explore the impact of impulsive personality on suicide risk in adolescents with depression and the chain mediating effect between PCSA and sense of security.METHODS This study is a retrospective study.A total of 200 adolescents with depression who visited the Guangxi Zhuang Autonomous Region Maternal and Child Health Hospital from January 2021 to December 2023 comprised the study cohort.The PCSA scale,Security Questionnaire,Barratt Impulsiveness Scale,and Beck Scale for Suicide Ideation were used to evaluate depression.RESULTS Suicide risk was positively correlated with impulsive personality and PCSA(P<0.05),whereas sense of security was negatively correlated with suicide risk,impulsive personality,and PCSA(P<0.05).The total indirect effect of PCSA and sense of security on impulsive personality and suicide risk was 35.43%,with the mediating effect of PCSA and sense of security contributing 16.53%and 15.75%,respectively.PCSA and sense of security exhibited a chain mediating effect between impulsive personality and suicide risk,accounting for 3.15%.CONCLUSION The suicide risk of adolescents with depression is significantly associated with impulsive personality,PCSA,and sense of security.Impulsive personality affects the suicide risk of adolescents with depression both directly and indirectly,with the latter occurring via PCSA and sense of security. 展开更多
关键词 Adolescents Suicide risk Impulsive personality Perceived chronic social adversity Sense of security
暂未订购
Explosive information spreading in higher-order networks:Effect of social reinforcement
10
作者 Yu Zhou Yingpeng Liu +4 位作者 Liang Yuan Youhao Zhuo Kesheng Xu Jiao Wu Muhua Zheng 《Chinese Physics B》 2025年第3期196-202,共7页
Information spreading has been investigated for many years,but the mechanism of why the information explosively catches on overnight is still under debate.This explosive spreading phenomenon was usually considered dri... Information spreading has been investigated for many years,but the mechanism of why the information explosively catches on overnight is still under debate.This explosive spreading phenomenon was usually considered driven separately by social reinforcement or higher-order interactions.However,due to the limitations of empirical data and theoretical analysis,how the higher-order network structure affects the explosive information spreading under the role of social reinforcement has not been fully explored.In this work,we propose an information-spreading model by considering the social reinforcement in real and synthetic higher-order networks,describable as hypergraphs.Depending on the average group size(hyperedge cardinality)and node membership(hyperdegree),we observe two different spreading behaviors:(i)The spreading progress is not sensitive to social reinforcement,resulting in the information localized in a small part of nodes;(ii)a strong social reinforcement will promote the large-scale spread of information and induce an explosive transition.Moreover,a large average group size and membership would be beneficial to the appearance of the explosive transition.Further,we display that the heterogeneity of the node membership and group size distributions benefit the information spreading.Finally,we extend the group-based approximate master equations to verify the simulation results.Our findings may help us to comprehend the rapidly information-spreading phenomenon in modern society. 展开更多
关键词 explosive information spreading social reinforcement higher-order interactions complex network
原文传递
Security distance analysis of active distribution network considering energy hub demand response
11
作者 Rui Ma Qi Zhou +2 位作者 Shengyang Liu Qin Yan Mo Shi 《Global Energy Interconnection》 2025年第1期160-173,共14页
This study proposes a method for analyzing the security distance of an Active Distribution Network(ADN)by incorporating the demand response of an Energy Hub(EH).Taking into account the impact of stochastic wind-solar ... This study proposes a method for analyzing the security distance of an Active Distribution Network(ADN)by incorporating the demand response of an Energy Hub(EH).Taking into account the impact of stochastic wind-solar power and flexible loads on the EH,an interactive power model was developed to represent the EH’s operation under these influences.Additionally,an ADN security distance model,integrating an EH with flexible loads,was constructed to evaluate the effect of flexible load variations on the ADN’s security distance.By considering scenarios such as air conditioning(AC)load reduction and base station(BS)load transfer,the security distances of phases A,B,and C increased by 17.1%,17.2%,and 17.7%,respectively.Furthermore,a multi-objective optimal power flow model was formulated and solved using the Forward-Backward Power Flow Algorithm,the NSGA-II multi-objective optimization algo-rithm,and the maximum satisfaction method.The simulation results of the IEEE33 node system example demonstrate that after opti-mization,the total energy cost for one day is reduced by 0.026%,and the total security distance limit of the ADN’s three phases is improved by 0.1 MVA.This method effectively enhances the security distance,facilitates BS load transfer and AC load reduction,and contributes to the energy-saving,economical,and safe operation of the power system. 展开更多
关键词 Active distribution network Energy hub security distance Base station load Air-conditioning load
在线阅读 下载PDF
Analysis of Feasible Solutions for Railway 5G Network Security Assessment
12
作者 XU Hang SUN Bin +1 位作者 DING Jianwen WANG Wei 《ZTE Communications》 2025年第3期59-70,共12页
The Fifth Generation of Mobile Communications for Railways(5G-R)brings significant opportunities for the rail industry.However,alongside the potential and benefits of the railway 5G network are complex security challe... The Fifth Generation of Mobile Communications for Railways(5G-R)brings significant opportunities for the rail industry.However,alongside the potential and benefits of the railway 5G network are complex security challenges.Ensuring the security and reliability of railway 5G networks is therefore essential.This paper presents a detailed examination of security assessment techniques for railway 5G networks,focusing on addressing the unique security challenges in this field.In this paper,various security requirements in railway 5G networks are analyzed,and specific processes and methods for conducting comprehensive security risk assessments are presented.This study provides a framework for securing railway 5G network development and ensuring its long-term sustainability. 展开更多
关键词 railway 5G network 5G-R information security risk assessment penetration testing
在线阅读 下载PDF
Protection path and security-metric-based resource allocation algorithm in quantum key distribution optical networks
13
作者 Li Liu Shengtong Zhai +1 位作者 Yao Pu Xu Zhang 《Chinese Physics B》 2025年第9期73-83,共11页
Quantum key distribution(QKD)optical networks can provide more secure communications.However,with the increase of the QKD path requests and key updates,network blocking problems will become severe.The blocking problem... Quantum key distribution(QKD)optical networks can provide more secure communications.However,with the increase of the QKD path requests and key updates,network blocking problems will become severe.The blocking problems in the network can become more severe because each fiber link has limited resources(such as wavelengths and time slots).In addition,QKD optical networks are also affected by external disturbances such as data interception and eavesdropping,resulting in inefficient network communication.In this paper,we exploit the idea of protection path to enhance the anti-interference ability of QKD optical network.By introducing the concept of security metric,we propose a routing wavelength and time slot allocation algorithm(RWTA)based on protection path,which can lessen the blocking problem of QKD optical network.According to simulation analysis,the security-metric-based RWTA algorithm(SM-RWTA)proposed in this paper can substantially improve the success rate of security key(SK)update and significantly reduce the blocking rate of the network.It can also improve the utilization rate of resources such as wavelengths and time slots.Compared with the non-security-metric-based RWTA algorithm(NSM-RWTA),our algorithm is robust and can enhance the anti-interference ability and security of QKD optical networks. 展开更多
关键词 quantum key distribution(QKD) optical network security metric protection path
原文传递
Unveiling the role of social networks: Enhancing rural household livelihood resilience in China's Dabie Mountains
14
作者 TANG Lanyun LIU Chongchong WANG Ying 《Journal of Geographical Sciences》 2025年第2期335-358,共24页
Social networks are vital for building the livelihood resilience of rural households.However,the impact of social networks on rural household livelihood resilience remains em-pirically underexplored,and most existing ... Social networks are vital for building the livelihood resilience of rural households.However,the impact of social networks on rural household livelihood resilience remains em-pirically underexplored,and most existing studies do not disaggregate social networks into different dimensions,which limits the understanding of specific mechanisms.Based on 895 household samples collected in China's Dabie Mountains and structural equation modeling,this paper explored the pathway to enhance livelihood resilience through social networks by dis-aggregating it into five dimensions:network size,interaction intensity,social cohesion,social support,and social learning.The results indicate that:(1)Livelihood assets,adaptive capacity and safety nets significantly contribute to livelihood resilience,whereas sensitivity negatively affects it.Accessibility to basic services has no significant relationship with livelihood resilience in the study area.(2)Social networks and their five dimensions positively impact livelihood re-silience,with network support having the greatest impact.Therefore,both the government and rural households should recognize and enhance the role of social networks in improving liveli-hood resilience under frequent disturbances.These findings have valuable implications for mitigating the risks of poverty recurrence and contributing to rural revitalization. 展开更多
关键词 livelihood resilience social network rural revitalization structural equation modeling Dabie Mountains China
原文传递
Deep Learning-Based Natural Language Processing Model and Optical Character Recognition for Detection of Online Grooming on Social Networking Services
15
作者 Sangmin Kim Byeongcheon Lee +2 位作者 Muazzam Maqsood Jihoon Moon Seungmin Rho 《Computer Modeling in Engineering & Sciences》 2025年第5期2079-2108,共30页
The increased accessibility of social networking services(SNSs)has facilitated communication and information sharing among users.However,it has also heightened concerns about digital safety,particularly for children a... The increased accessibility of social networking services(SNSs)has facilitated communication and information sharing among users.However,it has also heightened concerns about digital safety,particularly for children and adolescents who are increasingly exposed to online grooming crimes.Early and accurate identification of grooming conversations is crucial in preventing long-term harm to victims.However,research on grooming detection in South Korea remains limited,as existing models trained primarily on English text and fail to reflect the unique linguistic features of SNS conversations,leading to inaccurate classifications.To address these issues,this study proposes a novel framework that integrates optical character recognition(OCR)technology with KcELECTRA,a deep learning-based natural language processing(NLP)model that shows excellent performance in processing the colloquial Korean language.In the proposed framework,the KcELECTRA model is fine-tuned by an extensive dataset,including Korean social media conversations,Korean ethical verification data from AI-Hub,and Korean hate speech data from Hug-gingFace,to enable more accurate classification of text extracted from social media conversation images.Experimental results show that the proposed framework achieves an accuracy of 0.953,outperforming existing transformer-based models.Furthermore,OCR technology shows high accuracy in extracting text from images,demonstrating that the proposed framework is effective for online grooming detection.The proposed framework is expected to contribute to the more accurate detection of grooming text and the prevention of grooming-related crimes. 展开更多
关键词 Online grooming KcELECTRA natural language processing optical character recognition social networking service text classification
在线阅读 下载PDF
Exploring the interdependencies among social progress index(SPI)components and their impact on country-level sustainability performance based on Bayesian Belief Network
16
作者 Abroon QAZI 《Regional Sustainability》 2025年第3期87-102,共16页
The social progress index(SPI)measures social and environmental performance beyond traditional economic indicators,providing transparent and actionable insights into the true condition of societies.This study investig... The social progress index(SPI)measures social and environmental performance beyond traditional economic indicators,providing transparent and actionable insights into the true condition of societies.This study investigates the interdependencies among SPI components and their impact on country-level sustainability performance.Using a Bayesian Belief Network(BBN)approach,the analysis explores the interdependencies among 12 SPI components(including advanced education,basic education,environmental quality,freedom and choice,health,housing,inclusive society,information and communications,nutrition and medical care,rights and voice,safety,and water and sanitation)and their collective influence on sustainability performance.Data from the Sustainable Development Report and SPI datasets,covering 162 countries(including Australia,China,United Arab Emirates,United Kingdom,United States,and so on),were used to assess the relative importance of each SPI component.The key findings indicate that advanced education,inclusive society,and freedom and choice make substantial contributions to high sustainability performance,whereas deficiencies in nutrition and medical care,water and sanitation,and freedom and choice are associated with poor sustainability performance.The results reveal that sustainability performance is shaped by a network of interlinked SPI components,with education and inclusion emerging as key levers for progress.The study emphasizes that targeted improvements in specific SPI components can significantly enhance a country’s overall sustainability performance.Rather than visualizing countries’progress through composite indicator-based heat maps,this study explores the interdependencies among SPI components and their role in sustainability performance at the global level.The study underscores the importance of a multidimensional policy approach that addresses social and environmental factors to enhance sustainability.The findings contribute to a deeper understanding of how SPI components interact and shape sustainable development. 展开更多
关键词 Sustainability performance social progress index(SPI) Advanced education Environmental quality Bayesian Belief network(BBN)
在线阅读 下载PDF
System Modeling and Deep Learning-Based Security Analysis of Uplink NOMA Relay Networks with IRS and Fountain Codes
17
作者 Phu Tran Tin Minh-Sang Van Nguyen +2 位作者 Quy-Anh Bui Agbotiname Lucky Imoize Byung-Seo Kim 《Computer Modeling in Engineering & Sciences》 2025年第8期2521-2543,共23页
Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and ... Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and cyberattacks over these networks have become pressing concerns.Therefore,protecting copyrighted content and preventing illegal distribution in wireless communications has garnered significant attention.The Intelligent Reflecting Surface(IRS)is regarded as a promising technology for future wireless and mobile networks due to its ability to reconfigure the radio propagation environment.This study investigates the security performance of an uplink Non-Orthogonal Multiple Access(NOMA)system integrated with an IRS and employing Fountain Codes(FCs).Specifically,two users send signals to the base station at separate distances.A relay receives the signal from the nearby user first and then relays it to the base station.The IRS receives the signal from the distant user and reflects it to the relay,which then sends the reflected signal to the base station.Furthermore,a malevolent eavesdropper intercepts both user and relay communications.We construct mathematical equations for Outage Probability(OP),throughput,diversity evaluation,and Interception Probability(IP),offering quantitative insights to assess system security and performance.Additionally,OP and IP are analyzed using a Deep Neural Network(DNN)model.A deeper comprehension of the security performance of the IRS-assisted NOMA systemin signal transmission is provided by Monte Carlo simulations,which are also carried out to confirm the theoretical conclusions. 展开更多
关键词 Copyright management deep neural network fountain codes intelligent reflecting surface non-orthogonal multiple access physical layer security UPLINK
在线阅读 下载PDF
Using X Social Networks and web news mining to predict Marburg virus disease outbreaks
18
作者 Mohammad Jokar Kia Jahanbin Vahid Rahmanian 《Asian Pacific Journal of Tropical Medicine》 2025年第2期96-98,共3页
Marburg virus disease(MVD)is a highly fatal illness,with a case fatality rate of up to 88%,though this rate can be significantly reduced with prompt and effective patient care.The disease was first identified in 1967 ... Marburg virus disease(MVD)is a highly fatal illness,with a case fatality rate of up to 88%,though this rate can be significantly reduced with prompt and effective patient care.The disease was first identified in 1967 during concurrent outbreaks in Marburg and Frankfurt,Germany,and in Belgrade,Serbia,linked to laboratory use of African green monkeys imported from Uganda.Subsequent outbreaks and isolated cases have been reported in various African countries,including Angola,the Democratic Republic of the Congo,Equatorial Guinea,Ghana,Guinea,Kenya,Rwanda,South Africa(in an individual with recent travel to Zimbabwe),Tanzania,and Uganda.Initial human MVD infections typically occur due to prolonged exposure to mines or caves inhabited by Rousettus aegyptiacus fruit bats,the natural hosts of the virus. 展开更多
关键词 laboratory use marburg virus disease mvd african green monkeys outbreaks social networks marburg virus disease case fatality rate web news mining
暂未订购
Game theory in network security for digital twins in industry 被引量:2
19
作者 Hailin Feng Dongliang Chen +1 位作者 Haibin Lv Zhihan Lv 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1068-1078,共11页
To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion,a series of discussions on network security issues are carried out based on game theory.From ... To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion,a series of discussions on network security issues are carried out based on game theory.From the perspective of the life cycle of network vulnerabilities,mining and repairing vulnerabilities are analyzed by applying evolutionary game theory.The evolution process of knowledge sharing among white hats under various conditions is simulated,and a game model of the vulnerability patch cooperative development strategy among manufacturers is constructed.On this basis,the differential evolution is introduced into the update mechanism of the Wolf Colony Algorithm(WCA)to produce better replacement individuals with greater probability from the perspective of both attack and defense.Through the simulation experiment,it is found that the convergence speed of the probability(X)of white Hat 1 choosing the knowledge sharing policy is related to the probability(x0)of white Hat 2 choosing the knowledge sharing policy initially,and the probability(y0)of white hat 2 choosing the knowledge sharing policy initially.When y0?0.9,X converges rapidly in a relatively short time.When y0 is constant and x0 is small,the probability curve of the“cooperative development”strategy converges to 0.It is concluded that the higher the trust among the white hat members in the temporary team,the stronger their willingness to share knowledge,which is conducive to the mining of loopholes in the system.The greater the probability of a hacker attacking the vulnerability before it is fully disclosed,the lower the willingness of manufacturers to choose the"cooperative development"of vulnerability patches.Applying the improved wolf colonyco-evolution algorithm can obtain the equilibrium solution of the"attack and defense game model",and allocate the security protection resources according to the importance of nodes.This study can provide an effective solution to protect the network security for digital twins in the industry. 展开更多
关键词 Digital twins Industrial internet of things network security Game theory Attack and defense
在线阅读 下载PDF
Predicting Users’ Latent Suicidal Risk in Social Media: An Ensemble Model Based on Social Network Relationships 被引量:1
20
作者 Xiuyang Meng Chunling Wang +3 位作者 Jingran Yang Mairui Li Yue Zhang Luo Wang 《Computers, Materials & Continua》 SCIE EI 2024年第6期4259-4281,共23页
Suicide has become a critical concern,necessitating the development of effective preventative strategies.Social media platforms offer a valuable resource for identifying signs of suicidal ideation.Despite progress in ... Suicide has become a critical concern,necessitating the development of effective preventative strategies.Social media platforms offer a valuable resource for identifying signs of suicidal ideation.Despite progress in detecting suicidal ideation on social media,accurately identifying individuals who express suicidal thoughts less openly or infrequently poses a significant challenge.To tackle this,we have developed a dataset focused on Chinese suicide narratives from Weibo’s Tree Hole feature and introduced an ensemble model named Text Convolutional Neural Network based on Social Network relationships(TCNN-SN).This model enhances predictive performance by leveraging social network relationship features and applying correction factors within a weighted linear fusion framework.It is specifically designed to identify key individuals who can help uncover hidden suicidal users and clusters.Our model,assessed using the bespoke dataset and benchmarked against alternative classification approaches,demonstrates superior accuracy,F1-score and AUC metrics,achieving 88.57%,88.75%and 94.25%,respectively,outperforming traditional TextCNN models by 12.18%,10.84%and 10.85%.We assert that our methodology offers a significant advancement in the predictive identification of individuals at risk,thereby contributing to the prevention and reduction of suicide incidences. 展开更多
关键词 Suicide risk prediction social media social network relationships Weibo Tree Hole deep learning
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部