Purpose:For a set of 1,561 Open Access(OA)and non-OA journals in business and economics,this study evaluates the relationships between four citation metrics-five-year Impact Factor(5IF),CiteScore,Article Influence(AI)...Purpose:For a set of 1,561 Open Access(OA)and non-OA journals in business and economics,this study evaluates the relationships between four citation metrics-five-year Impact Factor(5IF),CiteScore,Article Influence(AI)score,and SCImago Journal Rank(SJR)-and the journal ratings assigned by expert reviewers.We expect that the OA journals will have especially high citation impact relative to their perceived quality(reputation).Design/methodology/approach:Regression is used to estimate the ratings assigned by expert reviewers for the 2021 CABS(Chartered Association of Business Schools)journal assessment exercise.The independent variables are the four citation metrics,evaluated separately,and a dummy variable representing the OA/non-OA status of each journal.Findings:Regardless of the citation metric used,OA journals in business and economics have especially high citation impact relative to their perceived quality(reputation).That is,they have especially low perceived quality(reputation)relative to their citation impact.Research limitations:These results are specific to the CABS journal ratings and the four citation metrics.However,there is strong evidence that CABS is closely related to several other expert ratings,and that 5IF,CiteScore,AI,and SJR are representative of the other citation metrics that might have been chosen.Practical implications:There are at least two possible explanations for these results:(1)expert evaluators are biased against OA journals,and(2)OA journals have especially high citation impact due to their increased accessibility.Although this study does not allow us to determine which of these explanations are supported,the results suggest that authors should consider publishing in OA journals whenever overall readership and citation impact are more important than journal reputation within a particular field.Moreover,the OA coefficients provide a useful indicator of the extent to which anti-OA bias(or the citation advantage of OA journals)is diminishing over time.Originality/value:This is apparently the first study to investigate the impact of OA status on the relationships between expert journal ratings and journal citation metrics.展开更多
With the deployment of ultra-dense low earth orbit(LEO)satellite constellations,LEO satellite access network(LEO-SAN)is envisioned to achieve global Internet coverage.Meanwhile,the civil aviation communications have i...With the deployment of ultra-dense low earth orbit(LEO)satellite constellations,LEO satellite access network(LEO-SAN)is envisioned to achieve global Internet coverage.Meanwhile,the civil aviation communications have increased dramatically,especially for providing airborne Internet services.However,due to dynamic service demands and onboard LEO resources over time and space,it poses huge challenges in satellite-aircraft access and service management in ultra-dense LEO satellite networks(UDLSN).In this paper,we propose a deep reinforcement learning-based approach for ultra-dense LEO satellite-aircraft access and service management.Firstly,we develop an airborne Internet architecture based on UDLSN and design a management mechanism including medium earth orbit satellites to guarantee lightweight management.Secondly,considering latency-sensitive and latency-tolerant services,we formulate the problem of satellite-aircraft access and service management for civil aviation to ensure service continuity.Finally,we propose a proximal policy optimization-based access and service management algorithm to solve the formulated problem.Simulation results demonstrate the convergence and effectiveness of the proposed algorithm with satisfying the service continuity when applying to the UDLSN.展开更多
Background:People working outdoors in the Map Ta Phut pollution control area of Thailand require comprehen-sive health monitoring.In the past,studies have been done on the health effects of pollutants.However,there ar...Background:People working outdoors in the Map Ta Phut pollution control area of Thailand require comprehen-sive health monitoring.In the past,studies have been done on the health effects of pollutants.However,there are few studies on musculoskeletal disorders(MSDs),and Thailand is struggling to meet the Sustainable Development Goals.Methods:This cross-sectional study examines access to health services and factors affecting MSDs among outdoor pollution workers(OPWs).The sample group includes OPWs,including local fisherman,street vendors,public car drivers,and traffic police.We studied 50 people from each of these groups,for a total of 200 people.Data were analyzed with inferential statistics using Chi-square test,McNemar test,and Univariate logistic regression.Results:The OPWs reported experiencing significantly more total MSDs pain than they did in the past(P<0.05).Factors affecting current MSDs pain,including occupation and working days per week,were significant(P<0.05).The street vendor group and public car driver group had(odds ratio[OR]=2.253,95%confidence interval[CI]:1.101 to 5.019)and(OR=2.681,95%CI:1.191 to 6.032)times higher risks of MSDs pain,respectively.OPWs who work>5 days per week had a(OR=1.464,95%CI:1.093 to 2.704)times higher risk of MSDs pain.52.7%of OPWs with MSDs,pain(n=110)had received an annual health check-up.In the past year,50.9%had minor illnesses and 21.8%had severe illnesses.OPWs receiving free treatment and visiting health service stations for no cost comprised 77.3%and 51.8%,respectively.60.9%used their right to receive treatment with universal health insurance cards.Conclusions:The study indicates that occupational groups with MSDs pain problems should exercise this right,according to the worker protection law.Local health agencies should organize activities or create accessible media to promote preventive medicine services,as many OPWs believe that health services can only be accessed when illness occurs.展开更多
Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intellig...Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intelligent processing on edge servers(ES).However,securely distributing encrypted data stored in the cloud to terminals that meet decryption requirements has become a prominent research topic.Additionally,managing attributes,including addition,deletion,and modification,is a crucial issue in the access control scheme for RES.To address these security concerns,a trust-based ciphertext-policy attribute-based encryption(CP-ABE)device access control scheme is proposed for RES(TB-CP-ABE).This scheme effectivelymanages the distribution and control of encrypted data on the cloud through robust attribute key management.By introducing trust management mechanisms and outsourced decryption technology,the ES system can effectively assess and manage the trust worthiness of terminal devices,ensuring that only trusted devices can participate in data exchange and access sensitive information.Besides,the ES system dynamically evaluates trust scores to set decryption trust thresholds,thereby regulating device data access permissions and enhancing the system’s security.To validate the security of the proposed TB-CP-ABE against chosen plaintext attacks,a comprehensive formal security analysis is conducted using the widely accepted random oraclemodel under the decisional q-Bilinear Diffie-Hellman Exponent(q-BDHE)assumption.Finally,comparative analysis with other schemes demonstrates that the TB-CP-ABE scheme cuts energy/communication costs by 43%,and scaleswell with rising terminals,maintaining average latency below 50ms,ensuring real-time service feasibility.The proposed scheme not only provides newinsights for the secure management of RES but also lays a foundation for future secure energy solutions.展开更多
Fraction repetition(FR)codes are integral in distributed storage systems(DSS)with exact repair-by-transfer,while pliable fraction repetition codes are vital for DSSs in which both the per-node storage and repetition d...Fraction repetition(FR)codes are integral in distributed storage systems(DSS)with exact repair-by-transfer,while pliable fraction repetition codes are vital for DSSs in which both the per-node storage and repetition degree can easily be adjusted simultaneously.This paper introduces a new type of pliable FR codes,called absolute balanced pliable FR(ABPFR)codes,in which the access balancing in DSS is considered.Additionally,the equivalence between pliable FR codes and resolvable transversal packings in combinatorial design theory is presented.Then constructions of pliable FR codes and ABPFR codes based on resolvable transversal packings are presented.展开更多
High reliability applications in dense access scenarios have become one of the main goals of 6G environments.To solve the access collision of dense Machine Type Communication(MTC)devices in cell-free communication sys...High reliability applications in dense access scenarios have become one of the main goals of 6G environments.To solve the access collision of dense Machine Type Communication(MTC)devices in cell-free communication systems,an intelligent cooperative secure access scheme based on multi-agent reinforcement learning and federated learning is proposed,that is,the Preamble Slice Orderly Queue Access(PSOQA)scheme.In this scheme,the preamble arrangement is combined with the access control.The preamble arrangement is realized by preamble slices which is from the virtual preamble pool.The access devices learn to queue orderly by deep reinforcement learning.The orderly queue weakens the random and avoids collision.A preamble slice is assigned to an orderly access queue at each access time.The orderly queue is determined by interaction information among multiple agents.With the federated reinforcement learning framework,the PSOQA scheme is implemented to guarantee the privacy and security of agents.Finally,the access performance of PSOQA is compared with other random contention schemes in different load scenarios.Simulation results show that PSOQA can not only improve the access success rate but also guarantee low-latency tolerant performances.展开更多
The secured access is studied in this paper for the network of the image remote sensing.Each sensor in this network encounters the information security when uploading information of the images wirelessly from the sens...The secured access is studied in this paper for the network of the image remote sensing.Each sensor in this network encounters the information security when uploading information of the images wirelessly from the sensor to the central collection point.In order to enhance the sensing quality for the remote uploading,the passive reflection surface technique is employed.If one eavesdropper that exists nearby this sensor is keeping on accessing the same networks,he may receive the same image from this sensor.Our goal in this paper is to improve the SNR of legitimate collection unit while cut down the SNR of the eavesdropper as much as possible by adaptively adjust the uploading power from this sensor to enhance the security of the remote sensing images.In order to achieve this goal,the secured energy efficiency performance is theoretically analyzed with respect to the number of the passive reflection elements by calculating the instantaneous performance over the channel fading coefficients.Based on this theoretical result,the secured access is formulated as a mathematical optimization problem by adjusting the sensor uploading power as the unknown variables with the objective of the energy efficiency maximization while satisfying any required maximum data rate of the eavesdropper sensor.Finally,the analytical expression is theoretically derived for the optimum uploading power.Numerical simulations verify the design approach.展开更多
The 6G smart Fog Radio Access Network(F-RAN)is an integration of 6G network intelligence technologies and the F-RAN architecture.Its aim is to provide low-latency and high-performance services for massive access devic...The 6G smart Fog Radio Access Network(F-RAN)is an integration of 6G network intelligence technologies and the F-RAN architecture.Its aim is to provide low-latency and high-performance services for massive access devices.However,the performance of current 6G network intelligence technologies and its level of integration with the architecture,along with the system-level requirements for the number of access devices and limitations on energy consumption,have impeded further improvements in the 6G smart F-RAN.To better analyze the root causes of the network problems and promote the practical development of the network,this study used structured methods such as segmentation to conduct a review of the topic.The research results reveal that there are still many problems in the current 6G smart F-RAN.Future research directions and difficulties are also discussed.展开更多
BACKGROUND Central venous access is essential for administering chemotherapy in patients with gastrointestinal cancer.Peripherally inserted central catheters(PICC)and totally implantable venous access ports(TIVAP)are ...BACKGROUND Central venous access is essential for administering chemotherapy in patients with gastrointestinal cancer.Peripherally inserted central catheters(PICC)and totally implantable venous access ports(TIVAP)are widely used,but comparative data regarding their impact on catheter-related complications and quality of life(QoL)remain limited.AIM To evaluate the impact of TIVAPs compared with PICC on catheter-related complications and QoL in patients with gastrointestinal cancer undergoing chemotherapy.METHODS This retrospective study included adults with gastrointestinal cancer who underwent central venous access device insertion for chemotherapy at our institution between December 2021 and December 2024.Inclusion criteria encompassed indications for intermittent intravenous chemotherapy,anticipated treatment duration of≥12 weeks,an adequate preoperative hematologic profile,accessible upper body veins,and complete medical records.Patients were excluded if they had an anticipated survival of less than three months,active systemic infection,severe thrombosis or coagulopathy,communication barriers,or an urgent need for dialysis access.Patients were assigned to either the PICC or TIVAP group based on device type.Data collected included demographic variables,cancer characteristics,insertion procedure details,complications,and QoL,assessed via the EuroQol 5-Dimensions-3 levels,visual analogue scale,and the European Organization for Research and Treatment of Cancer QoL Questionnaire-Core 30.RESULTS A total of 346 patients were analyzed.Baseline demographic,clinical,and cancer characteristics were similar between groups.The TIVAP group demonstrated a significantly lower incidence of catheter-related complications than the PICC group,with no pneumothorax occurring in either group.QoL assessments at baseline were comparable.At one month,the TIVAP group exhibited significantly higher EuroQoL Five Dimensions health state scores and QLQ-C30 global health status scores.Multivariate analysis identified TIVAP use,catheter tip placement in the distal superior vena cava/right atrium,prophylactic antibiotic administration,and antimicrobial dressing application as independent protective factors associated with reduced complications and improved QoL.CONCLUSION In patients with gastrointestinal cancer undergoing chemotherapy,TIVAPs are associated with a lower incidence of catheter-related complications and improved QoL than PICCs.Optimal device selection,precise catheter tip positioning,and effective perioperative management are critical for minimizing complications and enhancing patient-reported outcomes during treatment.展开更多
Ensuring the provision of accessible,affordable,and high-quality public services to all individuals aligns with one of the paramount aims of the United Nations’Sustainable Development Goals(SDGs).In the face of esca ...Ensuring the provision of accessible,affordable,and high-quality public services to all individuals aligns with one of the paramount aims of the United Nations’Sustainable Development Goals(SDGs).In the face of esca lating urbanization and a dwindling rural populace in China,reconstructing rural settlements to enhance public service accessibility has become a fundamental strategy for achieving the SDGs in rural areas.However,few stud ies have examined the optimal methods for rural settlement reconstruction that ensure accessible and equitable public services while considering multiple existing facilities and service provisions.This paper focuses on rural settlement reconstruction in the context of the SDGs,employing an inverted MCLP-CC(maximal coverage loca tion problem for complementary coverage)model to identify optimal rural settlements and a rank-based method for their relocation.Conducted in Changyuan,a county-level city in Henan Province,China,this study observed significant enhancements in both accessibility and equity following rural settlement reconstruction by utilizing the MH3SFCA(modified Huff 3-step floating catchment area)and the spatial Lorenz curve method.Remarkably,these improvements were achieved without the addition of new facilities,with the accessibility increasing by 44.21%,4.97%,and 3.11%;Gini coefficients decreasing by 19.53%,1.64%,and 3.18%;Ricci-Schutz coef-ficients decreasing by 21.09%,2.09%,and 4.33%for educational,medical,and cultural and sports facilities,respectively.It indicated that rural settlement reconstruction can bolster the accessibility and equity of public ser-vices by leveraging existing facilities.This paper provides a new framework for stakeholders to better reconstruct rural settlements and promote sustainable development in rural areas in China.展开更多
Since the 1970s,a series of international and national sources have supported the principle of accessibility,which slowly has become a statuary norm and a legislative obligation.Each country has implemented accessibil...Since the 1970s,a series of international and national sources have supported the principle of accessibility,which slowly has become a statuary norm and a legislative obligation.Each country has implemented accessibility through a singular policy.But in addition to the accessibility of a place or an activity,to inform about what is accessible is very important as well,and has not really taken off.Indeed,for disabled people,the difficulty lies not only with access to places and the use of resources,but also with the visibility of these resources.This means that information concerning accessibility has to be disclosed and provided effectively to disabled people,those involved with them and the relevant institutions.In different countries all over the world,many labels and pictograms have been created for this purpose and give information relating to accessibility.Using a socio-historical approach,we will present and analyze the different types of icons,symbols,pictograms and labels that have been put in place around the world and in France:what are they used for and for whom are they made?We will show that they are pointers which firstly reflect the diversity and range within the target group concerned by accessibility,and secondly the evolution of accessibility as a dynamic and ecological principle.展开更多
Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of Things.But existing schem...Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of Things.But existing schemes often suffer from privacy breaches due to explicit attachment of access policies or partial hiding of critical attribute content.Additionally,resource-constrained IoT devices,especially those adopting wireless communication,frequently encounter affordability issues regarding decryption costs.In this paper,we propose an efficient and fine-grained access control scheme with fully hidden policies(named FHAC).FHAC conceals all attributes in the policy and utilizes bloom filters to efficiently locate them.A test phase before decryption is applied to assist authorized users in finding matches between their attributes and the access policy.Dictionary attacks are thwarted by providing unauthorized users with invalid values.The heavy computational overhead of both the test phase and most of the decryption phase is outsourced to two cloud servers.Additionally,users can verify the correctness of multiple outsourced decryption results simultaneously.Security analysis and performance comparisons demonstrate FHAC's effectiveness in protecting policy privacy and achieving efficient decryption.展开更多
With increasing density and heterogeneity in unlicensed wireless networks,traditional MAC protocols,such as Carrier Sense Multiple Access with Collision Avoidance(CSMA/CA)in Wi-Fi networks,are experiencing performance...With increasing density and heterogeneity in unlicensed wireless networks,traditional MAC protocols,such as Carrier Sense Multiple Access with Collision Avoidance(CSMA/CA)in Wi-Fi networks,are experiencing performance degradation.This is manifested in increased collisions and extended backoff times,leading to diminished spectrum efficiency and protocol coordination.Addressing these issues,this paper proposes a deep-learning-based MAC paradigm,dubbed DL-MAC,which leverages spectrum data readily available from energy detection modules in wireless devices to achieve the MAC functionalities of channel access,rate adaptation,and channel switch.First,we utilize DL-MAC to realize a joint design of channel access and rate adaptation.Subsequently,we integrate the capability of channel switching into DL-MAC,enhancing its functionality from single-channel to multi-channel operations.Specifically,the DL-MAC protocol incorporates a Deep Neural Network(DNN)for channel selection and a Recurrent Neural Network(RNN)for the joint design of channel access and rate adaptation.We conducted real-world data collection within the 2.4 GHz frequency band to validate the effectiveness of DL-MAC.Experimental results demonstrate that DL-MAC exhibits significantly superior performance compared to traditional algorithms in both single and multi-channel environments,and also outperforms single-function designs.Additionally,the performance of DL-MAC remains robust,unaffected by channel switch overheads within the evaluation range.展开更多
Recently,the Fog-Radio Access Network(F-RAN)has gained considerable attention,because of its flexible architecture that allows rapid response to user requirements.In this paper,computational offloading in F-RAN is con...Recently,the Fog-Radio Access Network(F-RAN)has gained considerable attention,because of its flexible architecture that allows rapid response to user requirements.In this paper,computational offloading in F-RAN is considered,where multiple User Equipments(UEs)offload their computational tasks to the F-RAN through fog nodes.Each UE can select one of the fog nodes to offload its task,and each fog node may serve multiple UEs.The tasks are computed by the fog nodes or further offloaded to the cloud via a capacity-limited fronhaul link.In order to compute all UEs'tasks quickly,joint optimization of UE-Fog association,radio and computation resources of F-RAN is proposed to minimize the maximum latency of all UEs.This min-max problem is formulated as a Mixed Integer Nonlinear Program(MINP).To tackle it,first,MINP is reformulated as a continuous optimization problem,and then the Majorization Minimization(MM)method is used to find a solution.The MM approach that we develop is unconventional in that each MM subproblem is solved inexactly with the same provable convergence guarantee as the exact MM,thereby reducing the complexity of MM iteration.In addition,a cooperative offloading model is considered,where the fog nodes compress-and-forward their received signals to the cloud.Under this model,a similar min-max latency optimization problem is formulated and tackled by the inexact MM.Simulation results show that the proposed algorithms outperform some offloading strategies,and that the cooperative offloading can exploit transmission diversity better than noncooperative offloading to achieve better latency performance.展开更多
In wireless networks,the prioritized transmission scheme is essential for accommodating different priority classes of users sharing a common channel.In this paper,we propose a prioritized random access scheme based on...In wireless networks,the prioritized transmission scheme is essential for accommodating different priority classes of users sharing a common channel.In this paper,we propose a prioritized random access scheme based on compute-and-forward,referred to as expanding window sign-compute diversity slotted ALOHA(EW-SCDSA).We improve the expanding window technique and apply it to a high-throughput random access scheme,i.e.,the signcompute diversity slotted ALOHA(SCDSA)scheme,to implement prioritized random access.We analyze the probability of user resolution in each priority class utilizing a bipartite graph and derive the corresponding lower bounds,the effectiveness of which is validated through simulation experiments.Simulation results demonstrate that the EW-SCDSA scheme can provide heterogeneous reliability performance for various user priority classes and significantly outperforms the existing advanced prioritized random access scheme.展开更多
文摘Purpose:For a set of 1,561 Open Access(OA)and non-OA journals in business and economics,this study evaluates the relationships between four citation metrics-five-year Impact Factor(5IF),CiteScore,Article Influence(AI)score,and SCImago Journal Rank(SJR)-and the journal ratings assigned by expert reviewers.We expect that the OA journals will have especially high citation impact relative to their perceived quality(reputation).Design/methodology/approach:Regression is used to estimate the ratings assigned by expert reviewers for the 2021 CABS(Chartered Association of Business Schools)journal assessment exercise.The independent variables are the four citation metrics,evaluated separately,and a dummy variable representing the OA/non-OA status of each journal.Findings:Regardless of the citation metric used,OA journals in business and economics have especially high citation impact relative to their perceived quality(reputation).That is,they have especially low perceived quality(reputation)relative to their citation impact.Research limitations:These results are specific to the CABS journal ratings and the four citation metrics.However,there is strong evidence that CABS is closely related to several other expert ratings,and that 5IF,CiteScore,AI,and SJR are representative of the other citation metrics that might have been chosen.Practical implications:There are at least two possible explanations for these results:(1)expert evaluators are biased against OA journals,and(2)OA journals have especially high citation impact due to their increased accessibility.Although this study does not allow us to determine which of these explanations are supported,the results suggest that authors should consider publishing in OA journals whenever overall readership and citation impact are more important than journal reputation within a particular field.Moreover,the OA coefficients provide a useful indicator of the extent to which anti-OA bias(or the citation advantage of OA journals)is diminishing over time.Originality/value:This is apparently the first study to investigate the impact of OA status on the relationships between expert journal ratings and journal citation metrics.
基金supported in part by the National Key R&D Program of China under Grant 2020YFB1806104in part by Innovation and Entrepreneurship of Jiangsu Province High-level Talent Program+1 种基金in part by Natural Sciences and Engineering Research Council of Canada (NSERC)the support from Huawei
文摘With the deployment of ultra-dense low earth orbit(LEO)satellite constellations,LEO satellite access network(LEO-SAN)is envisioned to achieve global Internet coverage.Meanwhile,the civil aviation communications have increased dramatically,especially for providing airborne Internet services.However,due to dynamic service demands and onboard LEO resources over time and space,it poses huge challenges in satellite-aircraft access and service management in ultra-dense LEO satellite networks(UDLSN).In this paper,we propose a deep reinforcement learning-based approach for ultra-dense LEO satellite-aircraft access and service management.Firstly,we develop an airborne Internet architecture based on UDLSN and design a management mechanism including medium earth orbit satellites to guarantee lightweight management.Secondly,considering latency-sensitive and latency-tolerant services,we formulate the problem of satellite-aircraft access and service management for civil aviation to ensure service continuity.Finally,we propose a proximal policy optimization-based access and service management algorithm to solve the formulated problem.Simulation results demonstrate the convergence and effectiveness of the proposed algorithm with satisfying the service continuity when applying to the UDLSN.
基金grant Fundamental Fund of National Science Research and Innovation Fund(NSRF)via Burapha University of Thailand(Grant number 52/2024).
文摘Background:People working outdoors in the Map Ta Phut pollution control area of Thailand require comprehen-sive health monitoring.In the past,studies have been done on the health effects of pollutants.However,there are few studies on musculoskeletal disorders(MSDs),and Thailand is struggling to meet the Sustainable Development Goals.Methods:This cross-sectional study examines access to health services and factors affecting MSDs among outdoor pollution workers(OPWs).The sample group includes OPWs,including local fisherman,street vendors,public car drivers,and traffic police.We studied 50 people from each of these groups,for a total of 200 people.Data were analyzed with inferential statistics using Chi-square test,McNemar test,and Univariate logistic regression.Results:The OPWs reported experiencing significantly more total MSDs pain than they did in the past(P<0.05).Factors affecting current MSDs pain,including occupation and working days per week,were significant(P<0.05).The street vendor group and public car driver group had(odds ratio[OR]=2.253,95%confidence interval[CI]:1.101 to 5.019)and(OR=2.681,95%CI:1.191 to 6.032)times higher risks of MSDs pain,respectively.OPWs who work>5 days per week had a(OR=1.464,95%CI:1.093 to 2.704)times higher risk of MSDs pain.52.7%of OPWs with MSDs,pain(n=110)had received an annual health check-up.In the past year,50.9%had minor illnesses and 21.8%had severe illnesses.OPWs receiving free treatment and visiting health service stations for no cost comprised 77.3%and 51.8%,respectively.60.9%used their right to receive treatment with universal health insurance cards.Conclusions:The study indicates that occupational groups with MSDs pain problems should exercise this right,according to the worker protection law.Local health agencies should organize activities or create accessible media to promote preventive medicine services,as many OPWs believe that health services can only be accessed when illness occurs.
基金supported by the Science and Technology Project of the State Grid Corporation of China,Grant number 5700-202223189A-1-1-ZN.
文摘Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intelligent processing on edge servers(ES).However,securely distributing encrypted data stored in the cloud to terminals that meet decryption requirements has become a prominent research topic.Additionally,managing attributes,including addition,deletion,and modification,is a crucial issue in the access control scheme for RES.To address these security concerns,a trust-based ciphertext-policy attribute-based encryption(CP-ABE)device access control scheme is proposed for RES(TB-CP-ABE).This scheme effectivelymanages the distribution and control of encrypted data on the cloud through robust attribute key management.By introducing trust management mechanisms and outsourced decryption technology,the ES system can effectively assess and manage the trust worthiness of terminal devices,ensuring that only trusted devices can participate in data exchange and access sensitive information.Besides,the ES system dynamically evaluates trust scores to set decryption trust thresholds,thereby regulating device data access permissions and enhancing the system’s security.To validate the security of the proposed TB-CP-ABE against chosen plaintext attacks,a comprehensive formal security analysis is conducted using the widely accepted random oraclemodel under the decisional q-Bilinear Diffie-Hellman Exponent(q-BDHE)assumption.Finally,comparative analysis with other schemes demonstrates that the TB-CP-ABE scheme cuts energy/communication costs by 43%,and scaleswell with rising terminals,maintaining average latency below 50ms,ensuring real-time service feasibility.The proposed scheme not only provides newinsights for the secure management of RES but also lays a foundation for future secure energy solutions.
基金Supported in part by the National Key R&D Program of China(No.2020YFA0712300)NSFC(No.61872353)。
文摘Fraction repetition(FR)codes are integral in distributed storage systems(DSS)with exact repair-by-transfer,while pliable fraction repetition codes are vital for DSSs in which both the per-node storage and repetition degree can easily be adjusted simultaneously.This paper introduces a new type of pliable FR codes,called absolute balanced pliable FR(ABPFR)codes,in which the access balancing in DSS is considered.Additionally,the equivalence between pliable FR codes and resolvable transversal packings in combinatorial design theory is presented.Then constructions of pliable FR codes and ABPFR codes based on resolvable transversal packings are presented.
基金supported in part by the National Natural Science Foundation of China under grants 61771255in part by the Provincial and Ministerial Key Laboratory Open Project under grant 20190904in part by the Key Technologies R&D Program of Jiangsu (Prospective and Key Technologies for Industry)under Grants BE2022067,BE2022067-1 and BE2022067-2。
文摘High reliability applications in dense access scenarios have become one of the main goals of 6G environments.To solve the access collision of dense Machine Type Communication(MTC)devices in cell-free communication systems,an intelligent cooperative secure access scheme based on multi-agent reinforcement learning and federated learning is proposed,that is,the Preamble Slice Orderly Queue Access(PSOQA)scheme.In this scheme,the preamble arrangement is combined with the access control.The preamble arrangement is realized by preamble slices which is from the virtual preamble pool.The access devices learn to queue orderly by deep reinforcement learning.The orderly queue weakens the random and avoids collision.A preamble slice is assigned to an orderly access queue at each access time.The orderly queue is determined by interaction information among multiple agents.With the federated reinforcement learning framework,the PSOQA scheme is implemented to guarantee the privacy and security of agents.Finally,the access performance of PSOQA is compared with other random contention schemes in different load scenarios.Simulation results show that PSOQA can not only improve the access success rate but also guarantee low-latency tolerant performances.
基金supported in part by Jiangsu Province High Level“333”Program (0401206044)National Natural Science Foundation of China (61801243,62072255)+4 种基金Program for Scientific Research Foundation for Talented Scholars of Jinling Institute of Technology (JIT-B-202031)University Incubator Foundation of Jinling Institute of Technology (JIT-FHXM-202110)Open Project of Fujian Provincial Key Lab.of Network Security and Cryptology (NSCL-KF2021-02)Open Foundation of National Railway Intelligence Transportation System Engineering Tech.Research Center (RITS2021KF02)China Postdoctoral Science Foundation (2019M651914)。
文摘The secured access is studied in this paper for the network of the image remote sensing.Each sensor in this network encounters the information security when uploading information of the images wirelessly from the sensor to the central collection point.In order to enhance the sensing quality for the remote uploading,the passive reflection surface technique is employed.If one eavesdropper that exists nearby this sensor is keeping on accessing the same networks,he may receive the same image from this sensor.Our goal in this paper is to improve the SNR of legitimate collection unit while cut down the SNR of the eavesdropper as much as possible by adaptively adjust the uploading power from this sensor to enhance the security of the remote sensing images.In order to achieve this goal,the secured energy efficiency performance is theoretically analyzed with respect to the number of the passive reflection elements by calculating the instantaneous performance over the channel fading coefficients.Based on this theoretical result,the secured access is formulated as a mathematical optimization problem by adjusting the sensor uploading power as the unknown variables with the objective of the energy efficiency maximization while satisfying any required maximum data rate of the eavesdropper sensor.Finally,the analytical expression is theoretically derived for the optimum uploading power.Numerical simulations verify the design approach.
基金supported by the National Natural Science Foundation of China(62202215)Liaoning Province Applied Basic Research Program(Youth Special Project,2023JH2/101600038)+2 种基金Shenyang Youth Science and Technology Innovation Talent Support Program(RC220458)Guangxuan Program of Shenyang Ligong University(SYLUGXRC202216)Basic Research Special Funds for Undergraduate Universities in Liaoning Province(LJ212410144067).
文摘The 6G smart Fog Radio Access Network(F-RAN)is an integration of 6G network intelligence technologies and the F-RAN architecture.Its aim is to provide low-latency and high-performance services for massive access devices.However,the performance of current 6G network intelligence technologies and its level of integration with the architecture,along with the system-level requirements for the number of access devices and limitations on energy consumption,have impeded further improvements in the 6G smart F-RAN.To better analyze the root causes of the network problems and promote the practical development of the network,this study used structured methods such as segmentation to conduct a review of the topic.The research results reveal that there are still many problems in the current 6G smart F-RAN.Future research directions and difficulties are also discussed.
文摘BACKGROUND Central venous access is essential for administering chemotherapy in patients with gastrointestinal cancer.Peripherally inserted central catheters(PICC)and totally implantable venous access ports(TIVAP)are widely used,but comparative data regarding their impact on catheter-related complications and quality of life(QoL)remain limited.AIM To evaluate the impact of TIVAPs compared with PICC on catheter-related complications and QoL in patients with gastrointestinal cancer undergoing chemotherapy.METHODS This retrospective study included adults with gastrointestinal cancer who underwent central venous access device insertion for chemotherapy at our institution between December 2021 and December 2024.Inclusion criteria encompassed indications for intermittent intravenous chemotherapy,anticipated treatment duration of≥12 weeks,an adequate preoperative hematologic profile,accessible upper body veins,and complete medical records.Patients were excluded if they had an anticipated survival of less than three months,active systemic infection,severe thrombosis or coagulopathy,communication barriers,or an urgent need for dialysis access.Patients were assigned to either the PICC or TIVAP group based on device type.Data collected included demographic variables,cancer characteristics,insertion procedure details,complications,and QoL,assessed via the EuroQol 5-Dimensions-3 levels,visual analogue scale,and the European Organization for Research and Treatment of Cancer QoL Questionnaire-Core 30.RESULTS A total of 346 patients were analyzed.Baseline demographic,clinical,and cancer characteristics were similar between groups.The TIVAP group demonstrated a significantly lower incidence of catheter-related complications than the PICC group,with no pneumothorax occurring in either group.QoL assessments at baseline were comparable.At one month,the TIVAP group exhibited significantly higher EuroQoL Five Dimensions health state scores and QLQ-C30 global health status scores.Multivariate analysis identified TIVAP use,catheter tip placement in the distal superior vena cava/right atrium,prophylactic antibiotic administration,and antimicrobial dressing application as independent protective factors associated with reduced complications and improved QoL.CONCLUSION In patients with gastrointestinal cancer undergoing chemotherapy,TIVAPs are associated with a lower incidence of catheter-related complications and improved QoL than PICCs.Optimal device selection,precise catheter tip positioning,and effective perioperative management are critical for minimizing complications and enhancing patient-reported outcomes during treatment.
基金funded by the National Nat-ural Science Foundation of China(Grants No.42371433,U2443214)National Key Project of High-Resolution Earth Observation System of China(Grant No.80Y50G19900122/23)Foundation of Key Laboratory of Soil andWater Conservation on the Loess Plateau ofMinistry ofWater Resources(Grant No.WSCLP202301).
文摘Ensuring the provision of accessible,affordable,and high-quality public services to all individuals aligns with one of the paramount aims of the United Nations’Sustainable Development Goals(SDGs).In the face of esca lating urbanization and a dwindling rural populace in China,reconstructing rural settlements to enhance public service accessibility has become a fundamental strategy for achieving the SDGs in rural areas.However,few stud ies have examined the optimal methods for rural settlement reconstruction that ensure accessible and equitable public services while considering multiple existing facilities and service provisions.This paper focuses on rural settlement reconstruction in the context of the SDGs,employing an inverted MCLP-CC(maximal coverage loca tion problem for complementary coverage)model to identify optimal rural settlements and a rank-based method for their relocation.Conducted in Changyuan,a county-level city in Henan Province,China,this study observed significant enhancements in both accessibility and equity following rural settlement reconstruction by utilizing the MH3SFCA(modified Huff 3-step floating catchment area)and the spatial Lorenz curve method.Remarkably,these improvements were achieved without the addition of new facilities,with the accessibility increasing by 44.21%,4.97%,and 3.11%;Gini coefficients decreasing by 19.53%,1.64%,and 3.18%;Ricci-Schutz coef-ficients decreasing by 21.09%,2.09%,and 4.33%for educational,medical,and cultural and sports facilities,respectively.It indicated that rural settlement reconstruction can bolster the accessibility and equity of public ser-vices by leveraging existing facilities.This paper provides a new framework for stakeholders to better reconstruct rural settlements and promote sustainable development in rural areas in China.
文摘Since the 1970s,a series of international and national sources have supported the principle of accessibility,which slowly has become a statuary norm and a legislative obligation.Each country has implemented accessibility through a singular policy.But in addition to the accessibility of a place or an activity,to inform about what is accessible is very important as well,and has not really taken off.Indeed,for disabled people,the difficulty lies not only with access to places and the use of resources,but also with the visibility of these resources.This means that information concerning accessibility has to be disclosed and provided effectively to disabled people,those involved with them and the relevant institutions.In different countries all over the world,many labels and pictograms have been created for this purpose and give information relating to accessibility.Using a socio-historical approach,we will present and analyze the different types of icons,symbols,pictograms and labels that have been put in place around the world and in France:what are they used for and for whom are they made?We will show that they are pointers which firstly reflect the diversity and range within the target group concerned by accessibility,and secondly the evolution of accessibility as a dynamic and ecological principle.
基金supported in part by the National Key R&D Program of China(Grant No.2019YFB2101700)the National Natural Science Foundation of China(Grant No.62272102,No.62172320,No.U21A20466)+4 种基金the Open Research Fund of Key Laboratory of Cryptography of Zhejiang Province(Grant No.ZCL21015)the Qinghai Key R&D and Transformation Projects(Grant No.2021-GX-112)the Natural Science Foundation of Nanjing University of Posts and Telecommunications(Grant No.NY222141)the Natural Science Foundation of Jiangsu Higher Education Institutions of China under Grant(No.22KJB520029)Henan Key Laboratory of Network Cryptography Technology(No.LNCT2022-A10)。
文摘Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of Things.But existing schemes often suffer from privacy breaches due to explicit attachment of access policies or partial hiding of critical attribute content.Additionally,resource-constrained IoT devices,especially those adopting wireless communication,frequently encounter affordability issues regarding decryption costs.In this paper,we propose an efficient and fine-grained access control scheme with fully hidden policies(named FHAC).FHAC conceals all attributes in the policy and utilizes bloom filters to efficiently locate them.A test phase before decryption is applied to assist authorized users in finding matches between their attributes and the access policy.Dictionary attacks are thwarted by providing unauthorized users with invalid values.The heavy computational overhead of both the test phase and most of the decryption phase is outsourced to two cloud servers.Additionally,users can verify the correctness of multiple outsourced decryption results simultaneously.Security analysis and performance comparisons demonstrate FHAC's effectiveness in protecting policy privacy and achieving efficient decryption.
基金supported in part by the National Key R&D Program of China under Grant 2021YFB1714100in part by the Shenzhen Science and Technology Program,China,under Grant JCYJ20220531101015033.
文摘With increasing density and heterogeneity in unlicensed wireless networks,traditional MAC protocols,such as Carrier Sense Multiple Access with Collision Avoidance(CSMA/CA)in Wi-Fi networks,are experiencing performance degradation.This is manifested in increased collisions and extended backoff times,leading to diminished spectrum efficiency and protocol coordination.Addressing these issues,this paper proposes a deep-learning-based MAC paradigm,dubbed DL-MAC,which leverages spectrum data readily available from energy detection modules in wireless devices to achieve the MAC functionalities of channel access,rate adaptation,and channel switch.First,we utilize DL-MAC to realize a joint design of channel access and rate adaptation.Subsequently,we integrate the capability of channel switching into DL-MAC,enhancing its functionality from single-channel to multi-channel operations.Specifically,the DL-MAC protocol incorporates a Deep Neural Network(DNN)for channel selection and a Recurrent Neural Network(RNN)for the joint design of channel access and rate adaptation.We conducted real-world data collection within the 2.4 GHz frequency band to validate the effectiveness of DL-MAC.Experimental results demonstrate that DL-MAC exhibits significantly superior performance compared to traditional algorithms in both single and multi-channel environments,and also outperforms single-function designs.Additionally,the performance of DL-MAC remains robust,unaffected by channel switch overheads within the evaluation range.
基金supported in part by the Natural Science Foundation of China (62171110,U19B2028 and U20B2070)。
文摘Recently,the Fog-Radio Access Network(F-RAN)has gained considerable attention,because of its flexible architecture that allows rapid response to user requirements.In this paper,computational offloading in F-RAN is considered,where multiple User Equipments(UEs)offload their computational tasks to the F-RAN through fog nodes.Each UE can select one of the fog nodes to offload its task,and each fog node may serve multiple UEs.The tasks are computed by the fog nodes or further offloaded to the cloud via a capacity-limited fronhaul link.In order to compute all UEs'tasks quickly,joint optimization of UE-Fog association,radio and computation resources of F-RAN is proposed to minimize the maximum latency of all UEs.This min-max problem is formulated as a Mixed Integer Nonlinear Program(MINP).To tackle it,first,MINP is reformulated as a continuous optimization problem,and then the Majorization Minimization(MM)method is used to find a solution.The MM approach that we develop is unconventional in that each MM subproblem is solved inexactly with the same provable convergence guarantee as the exact MM,thereby reducing the complexity of MM iteration.In addition,a cooperative offloading model is considered,where the fog nodes compress-and-forward their received signals to the cloud.Under this model,a similar min-max latency optimization problem is formulated and tackled by the inexact MM.Simulation results show that the proposed algorithms outperform some offloading strategies,and that the cooperative offloading can exploit transmission diversity better than noncooperative offloading to achieve better latency performance.
基金supported by the National Natural Science Foundation of China under Grant No.62301008China Postdoctoral Science Foundation under Grant No.2022M720272。
文摘In wireless networks,the prioritized transmission scheme is essential for accommodating different priority classes of users sharing a common channel.In this paper,we propose a prioritized random access scheme based on compute-and-forward,referred to as expanding window sign-compute diversity slotted ALOHA(EW-SCDSA).We improve the expanding window technique and apply it to a high-throughput random access scheme,i.e.,the signcompute diversity slotted ALOHA(SCDSA)scheme,to implement prioritized random access.We analyze the probability of user resolution in each priority class utilizing a bipartite graph and derive the corresponding lower bounds,the effectiveness of which is validated through simulation experiments.Simulation results demonstrate that the EW-SCDSA scheme can provide heterogeneous reliability performance for various user priority classes and significantly outperforms the existing advanced prioritized random access scheme.