With the rapid advancement of visual generative models such as Generative Adversarial Networks(GANs)and stable Diffusion,the creation of highly realistic Deepfake through automated forgery has significantly progressed...With the rapid advancement of visual generative models such as Generative Adversarial Networks(GANs)and stable Diffusion,the creation of highly realistic Deepfake through automated forgery has significantly progressed.This paper examines the advancements inDeepfake detection and defense technologies,emphasizing the shift from passive detection methods to proactive digital watermarking techniques.Passive detection methods,which involve extracting features from images or videos to identify forgeries,encounter challenges such as poor performance against unknown manipulation techniques and susceptibility to counter-forensic tactics.In contrast,proactive digital watermarking techniques embed specificmarkers into images or videos,facilitating real-time detection and traceability,thereby providing a preemptive defense againstDeepfake content.We offer a comprehensive analysis of digitalwatermarking-based forensic techniques,discussing their advantages over passivemethods and highlighting four key benefits:real-time detection,embedded defense,resistance to tampering,and provision of legal evidence.Additionally,the paper identifies gaps in the literature concerning proactive forensic techniques and suggests future research directions,including cross-domain watermarking and adaptive watermarking strategies.By systematically classifying and comparing existing techniques,this review aims to contribute valuable insights for the development of more effective proactive defense strategies in Deepfake forensics.展开更多
The World Health Organization declared Sri Lanka a malaria eliminated country in 2016[1-3].At present,the country is in the phase of preventing the re-establishment of malaria[4].However,travelers who contract the dis...The World Health Organization declared Sri Lanka a malaria eliminated country in 2016[1-3].At present,the country is in the phase of preventing the re-establishment of malaria[4].However,travelers who contract the disease overseas in malaria endemic countries continue to present a constant risk of re-establishing malaria in Sri Lanka,where malaria-transmitting mosquitos is prevalent.In this context,robust measures are being implemented in the country to prevent re-establishment of malaria and to stop travelers infected with malaria progressing into severe disease and death.展开更多
Objective:To investigate the distribution of health literacy(HL)levels and the association of HL with proactive personality in patients with permanent colostomy.Methods:A cross-sectional study was conducted to measure...Objective:To investigate the distribution of health literacy(HL)levels and the association of HL with proactive personality in patients with permanent colostomy.Methods:A cross-sectional study was conducted to measure proactive personality and HL using validated scales.A total of 172 patients with permanent colostomy were selected from January 2021 to May 2022 in Yantai City,China.Descriptive statistics,t-test,ANOVA,Pearson correlation analysis,and multiple linear regression analysis techniques were used.Results:The results obtained from the study showed that the HL status of the participants was moderate.The correlation between participants’total HL scores and proactive personality scores was 0.417(P-value<0.001).In addition,HL showed statistically significant differences according to education level,place of residence,profession,and average monthly household income.Conclusions:This study showed that patients with higher proactive personality scores had higher HL.The key stakeholders require several positive strategies to improve the HL of patients with permanent colostomy by cultivating their proactive personalities,and these important policies will help to improve patient health and quality of life.展开更多
Drawing upon the Conservation of Resources theory,this study investigated the relationship between proactive personality and strengths use,as well as the mediating role of psychological safety and the moderating role ...Drawing upon the Conservation of Resources theory,this study investigated the relationship between proactive personality and strengths use,as well as the mediating role of psychological safety and the moderating role of exploitative leadership within this relationship.Data were collected from 368 employees(females=57.61%;mean age=32.35;SD=6.31)working in various organizations in China at two points in time with a two-week interval.We conducted structural equation modeling and a moderated mediation path analysis to test our hypotheses.The results demonstrated that proactive personality is positively related to strengths use and psychological safety partially mediates the association of proactive personality and strengths use.Furthermore,this study also found that exploitative leadership weakens the direct relationship between proactive personality and psychological safety and the indirect relationship of proactive personality with strengths use through psychological safety.This study identified the underlying mechanisms between proactive personality and strengths use.展开更多
This study investigated proactive personality effects on employment preparation and the mediating roles of self-efficacy and career exploration behaviors in this relationship.The study sample comprised 445 university ...This study investigated proactive personality effects on employment preparation and the mediating roles of self-efficacy and career exploration behaviors in this relationship.The study sample comprised 445 university students(68.3%female;aged 20 to 24)from a university in central China.The participants completed measures to assess proactive personality,employment preparation,self-efficacy,and career exploration behaviors.Structural equation modeling analysis results indicated that proactive personality predicted higher employment preparation;Self-efficacy and career exploration behaviors partially mediated this relationship.Specifically,career exploration behaviors had a stronger mediating effect than self-efficacy on the total effect(34.71%vs.28.89%).The findings suggest proactive personality is key to employment preparation through self-belief and willingness to explore the job market.Higher education career counseling and mental health education programs should provide targeted training to promote career exploration by the student’s personal attributes for best match employment preparation.展开更多
We examined the relationship between social support and career adaptability,as well as the mediating roles of proactive personality and career decision-making self-efficacy in this process.A total of 1354 Chinese coll...We examined the relationship between social support and career adaptability,as well as the mediating roles of proactive personality and career decision-making self-efficacy in this process.A total of 1354 Chinese college students(female=964;mean age=19.53 years,SD=1.33 years)completed an online questionnaire.Path analysis indicated that social support was positively associated with higher levels of career adaptability.Both proactive personality and career decision-making self-efficacy served as parallel mediators,strengthening the relationship between social support and career adaptability.The complete chain mediation analysis revealed that social support influences career adaptability primarily through proactive personality,which in turn enhances career decision-making self-efficacy,further contributing to increased career adaptability.These findings extend career capital theory by demonstrating that social and psychological resources jointly facilitate career adaptability.展开更多
The Internet of Everything(IoE)coupled with Proactive Artificial Intelligence(AI)-Based Learning Agents(PLAs)through a cloud processing system is an idea that connects all computing resources to the Internet,making it...The Internet of Everything(IoE)coupled with Proactive Artificial Intelligence(AI)-Based Learning Agents(PLAs)through a cloud processing system is an idea that connects all computing resources to the Internet,making it possible for these devices to communicate with one another.Technologies featured in the IoE include embedding,networking,and sensing devices.To achieve the intended results of the IoE and ease life for everyone involved,sensing devices and monitoring systems are linked together.The IoE is used in several contexts,including intelligent cars’protection,navigation,security,and fuel efficiency.The Smart Things Monitoring System(STMS)framework,which has been proposed for early occurrence identification and theft prevention,is discussed in this article.The STMS uses technologies based on the IoE and PLAs to continuously and remotely observe,control,and monitor vehicles.The STMS is familiar with the platform used by the global positioning system;as a result,the STMS can maintain a real-time record of current vehicle positions.This information is utilized to locate the vehicle in an accident or theft.The findings of the STMS system are promising for precisely identifying crashes,evaluating incident severity,and locating vehicles after collisions have occurred.Moreover,we formulate an ad hoc STMS network communication scenario to evaluate the efficacy of data communication by utilizing various network parameters,such as round-trip time(RTT),data packet transmission,data packet reception,and loss.From our experimentation,we obtained an improved communication efficiency for STMS across multiple PLAs compared to the standard greedy routing and traditional AODV approaches.Our framework facilitates adaptable solutions with communication competence by deploying Proactive PLAs in a cloud-connected smart vehicular environment.展开更多
This paper studies the proactive spec-trum monitoring with one half-duplex spectrum moni-tor(SM)to cope with the potential suspicious wireless powered communications(SWPC)in dynamic spec-trum sharing networks.The jamm...This paper studies the proactive spec-trum monitoring with one half-duplex spectrum moni-tor(SM)to cope with the potential suspicious wireless powered communications(SWPC)in dynamic spec-trum sharing networks.The jamming-assisted spec-trum monitoring scheme via spectrum monitoring data(SMD)transmission is proposed to maximize the sum ergodic monitoring rate at SM.In SWPC,the suspi-cious communications of each data block occupy mul-tiple independent blocks,with a block dedicated to the wireless energy transfer by the energy-constrained suspicious nodes with locations in a same cluster(symmetric scene)or randomly distributed(asymmet-ric scene)and the remaining blocks used for the in-formation transmission from suspicious transmitters(STs)to suspicious destination(SD).For the sym-metric scene,with a given number of blocks for SMD transmission,namely the jamming operation,we first reveal that SM should transmit SMD signal(jam the SD)with tolerable maximum power in the given blocks.The perceived suspicious signal power at SM could be maximized,and thus so does the correspond-ing sum ergodic monitoring rate.Then,we further reveal one fundamental trade-off in deciding the op-timal number of given blocks for SMD transmission.For the asymmetric scene,a low-complexity greedy block selection scheme is proposed to guarantee the optimal performance.Simulation results show that the jamming-assisted spectrum monitoring schemes via SMD transmission achieve much better perfor-mance than conventional passive spectrum monitor-ing,since the proposed schemes can obtain more accu-rate and effective spectrum characteristic parameters,which provide basic support for fine-grained spectrum management and a solution for spectrum security in dynamic spectrum sharing network.展开更多
With the aim to address the problems presented in knowledge utilization in knowledge-intensive enterprises, the ontology-based proactive knowledge system (OPKS) is put forward to improve knowledge utilization. Proac...With the aim to address the problems presented in knowledge utilization in knowledge-intensive enterprises, the ontology-based proactive knowledge system (OPKS) is put forward to improve knowledge utilization. Proactive knowledge service is taken as the basic idea in the OPKS. The user knowledge requirement is taken as the driving factor and described by the user knowledge requirement. Ontologies are used to present the semantic of heterogeneous knowledge sources and ontology mapping is used to realize the interoperation of heterogeneous knowledge sources. The required knowledge is found by matching the user knowledge requirement with knowledge sources and is provided to the user proactively. System analysis and design of OPKS is carded on by adopting UML. The OPKS is implemented in Java language. Application in a certain institute shows that the OPKS can raise efficiency of knowledge utilization in knowledge-intensive enterprises.展开更多
Although it is becoming increasingly popular for organizations to offer programs of mind–body practices to their employees to improve their physical and mental health,the effects that after-work sessions of mind–bod...Although it is becoming increasingly popular for organizations to offer programs of mind–body practices to their employees to improve their physical and mental health,the effects that after-work sessions of mind–body prac-tices have on employees’work behavior remain unclear.Using the model of proactive motivation and experience sampling,this study explored the relationship between employees’mind–body practices after work and their proactive behavior in the workplace on the following day.A multilevel path analysis of data from 82 employees over seven consecutive workdays showed that employees’mind–body practices after work had a positive effect on their proactive behavior in the workplace on the following day.The relationship was mediated by next-day high-activated positive affect and problem-solving confidence.Furthermore,job control positively moderated the rela-tionship between high-activated positive affect and proactive behavior but not that between problem-solving con-fidence and proactive behavior.We discuss the theoretical and practical implications of thesefindings,and propose future research directions.展开更多
In this paper,an Unmanned Aerial Vehicle(UAV)-assisted relay communication system is studied,where a UAV is served as a flying relay to maintain a communication link between a mobile source node and a remote destinati...In this paper,an Unmanned Aerial Vehicle(UAV)-assisted relay communication system is studied,where a UAV is served as a flying relay to maintain a communication link between a mobile source node and a remote destination node.Specifically,an average outage probability minimization problem is formulated firstly,with the constraints on the transmission power of the source node,the maximum energy consumption budget,the transmission power,the speed and acceleration of the flying UAV relay.Next,the closed-form of outage probability is derived,under the hybrid line-of-sight and non-line-of-sight probability channel model.To deal with the formulated nonconvex optimization,a long-term proactive optimization mechanism is developed.In particular,firstly,an approximation for line-of-sight probability and a reformulation of the primal problem are given,respectively.Then,the reformulated problem is transformed into two subproblems:one is the transmission power optimization with given UAV’s trajectory and the other is the trajectory optimization with given transmission power allocation.Next,two subproblems are tackled via tailoring primal–dual subgradient method and successive convex approximation,respectively.Furthermore,a proactive optimization algorithm is proposed to jointly optimize the transmission power allocation and the three-dimensional trajectory.Finally,simulation results demonstrate the performance of the proposed algorithm under various parameter configurations.展开更多
A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures a...A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures and between different threshold schemes. A point worth mentioning is that this verifiable secret redistribution (VSR) scheme can identify dishonest old shareholders during redistribution without any assumption. A certain technique is adopted to verify the correctness of the old shares of the secret. As a result, the scheme is very efficient. It can be applied to proactive secret sharing (PSS) schemes to construct more flexible and practical proactive secret sharing schemes.展开更多
基金supported by the National Fund Cultivation Project from China People’s Police University(Grant Number:JJPY202402)National Natural Science Foundation of China(Grant Number:62172165).
文摘With the rapid advancement of visual generative models such as Generative Adversarial Networks(GANs)and stable Diffusion,the creation of highly realistic Deepfake through automated forgery has significantly progressed.This paper examines the advancements inDeepfake detection and defense technologies,emphasizing the shift from passive detection methods to proactive digital watermarking techniques.Passive detection methods,which involve extracting features from images or videos to identify forgeries,encounter challenges such as poor performance against unknown manipulation techniques and susceptibility to counter-forensic tactics.In contrast,proactive digital watermarking techniques embed specificmarkers into images or videos,facilitating real-time detection and traceability,thereby providing a preemptive defense againstDeepfake content.We offer a comprehensive analysis of digitalwatermarking-based forensic techniques,discussing their advantages over passivemethods and highlighting four key benefits:real-time detection,embedded defense,resistance to tampering,and provision of legal evidence.Additionally,the paper identifies gaps in the literature concerning proactive forensic techniques and suggests future research directions,including cross-domain watermarking and adaptive watermarking strategies.By systematically classifying and comparing existing techniques,this review aims to contribute valuable insights for the development of more effective proactive defense strategies in Deepfake forensics.
文摘The World Health Organization declared Sri Lanka a malaria eliminated country in 2016[1-3].At present,the country is in the phase of preventing the re-establishment of malaria[4].However,travelers who contract the disease overseas in malaria endemic countries continue to present a constant risk of re-establishing malaria in Sri Lanka,where malaria-transmitting mosquitos is prevalent.In this context,robust measures are being implemented in the country to prevent re-establishment of malaria and to stop travelers infected with malaria progressing into severe disease and death.
文摘Objective:To investigate the distribution of health literacy(HL)levels and the association of HL with proactive personality in patients with permanent colostomy.Methods:A cross-sectional study was conducted to measure proactive personality and HL using validated scales.A total of 172 patients with permanent colostomy were selected from January 2021 to May 2022 in Yantai City,China.Descriptive statistics,t-test,ANOVA,Pearson correlation analysis,and multiple linear regression analysis techniques were used.Results:The results obtained from the study showed that the HL status of the participants was moderate.The correlation between participants’total HL scores and proactive personality scores was 0.417(P-value<0.001).In addition,HL showed statistically significant differences according to education level,place of residence,profession,and average monthly household income.Conclusions:This study showed that patients with higher proactive personality scores had higher HL.The key stakeholders require several positive strategies to improve the HL of patients with permanent colostomy by cultivating their proactive personalities,and these important policies will help to improve patient health and quality of life.
基金supported by Youth Foundation of Beijing Wuzi University(Grant No.2024XJQN26).
文摘Drawing upon the Conservation of Resources theory,this study investigated the relationship between proactive personality and strengths use,as well as the mediating role of psychological safety and the moderating role of exploitative leadership within this relationship.Data were collected from 368 employees(females=57.61%;mean age=32.35;SD=6.31)working in various organizations in China at two points in time with a two-week interval.We conducted structural equation modeling and a moderated mediation path analysis to test our hypotheses.The results demonstrated that proactive personality is positively related to strengths use and psychological safety partially mediates the association of proactive personality and strengths use.Furthermore,this study also found that exploitative leadership weakens the direct relationship between proactive personality and psychological safety and the indirect relationship of proactive personality with strengths use through psychological safety.This study identified the underlying mechanisms between proactive personality and strengths use.
基金the“International Trade”course in the research-based teaching project of undergraduate universities in Henan Province in 2023(project approval number:121)。
文摘This study investigated proactive personality effects on employment preparation and the mediating roles of self-efficacy and career exploration behaviors in this relationship.The study sample comprised 445 university students(68.3%female;aged 20 to 24)from a university in central China.The participants completed measures to assess proactive personality,employment preparation,self-efficacy,and career exploration behaviors.Structural equation modeling analysis results indicated that proactive personality predicted higher employment preparation;Self-efficacy and career exploration behaviors partially mediated this relationship.Specifically,career exploration behaviors had a stronger mediating effect than self-efficacy on the total effect(34.71%vs.28.89%).The findings suggest proactive personality is key to employment preparation through self-belief and willingness to explore the job market.Higher education career counseling and mental health education programs should provide targeted training to promote career exploration by the student’s personal attributes for best match employment preparation.
基金supported by“Planning Subject for the 14th Five Year Plan of National Education Sciences of China(DBA210296)”.
文摘We examined the relationship between social support and career adaptability,as well as the mediating roles of proactive personality and career decision-making self-efficacy in this process.A total of 1354 Chinese college students(female=964;mean age=19.53 years,SD=1.33 years)completed an online questionnaire.Path analysis indicated that social support was positively associated with higher levels of career adaptability.Both proactive personality and career decision-making self-efficacy served as parallel mediators,strengthening the relationship between social support and career adaptability.The complete chain mediation analysis revealed that social support influences career adaptability primarily through proactive personality,which in turn enhances career decision-making self-efficacy,further contributing to increased career adaptability.These findings extend career capital theory by demonstrating that social and psychological resources jointly facilitate career adaptability.
基金funded by the Ministry of Science and Technology,Taiwan,grant number(MOST 111-2221-E167-025-MY2).
文摘The Internet of Everything(IoE)coupled with Proactive Artificial Intelligence(AI)-Based Learning Agents(PLAs)through a cloud processing system is an idea that connects all computing resources to the Internet,making it possible for these devices to communicate with one another.Technologies featured in the IoE include embedding,networking,and sensing devices.To achieve the intended results of the IoE and ease life for everyone involved,sensing devices and monitoring systems are linked together.The IoE is used in several contexts,including intelligent cars’protection,navigation,security,and fuel efficiency.The Smart Things Monitoring System(STMS)framework,which has been proposed for early occurrence identification and theft prevention,is discussed in this article.The STMS uses technologies based on the IoE and PLAs to continuously and remotely observe,control,and monitor vehicles.The STMS is familiar with the platform used by the global positioning system;as a result,the STMS can maintain a real-time record of current vehicle positions.This information is utilized to locate the vehicle in an accident or theft.The findings of the STMS system are promising for precisely identifying crashes,evaluating incident severity,and locating vehicles after collisions have occurred.Moreover,we formulate an ad hoc STMS network communication scenario to evaluate the efficacy of data communication by utilizing various network parameters,such as round-trip time(RTT),data packet transmission,data packet reception,and loss.From our experimentation,we obtained an improved communication efficiency for STMS across multiple PLAs compared to the standard greedy routing and traditional AODV approaches.Our framework facilitates adaptable solutions with communication competence by deploying Proactive PLAs in a cloud-connected smart vehicular environment.
基金the Natural Science Foun-dations of China(No.62171464,61771487)the Defense Science Foundation of China(No.2019-JCJQ-JJ-221).
文摘This paper studies the proactive spec-trum monitoring with one half-duplex spectrum moni-tor(SM)to cope with the potential suspicious wireless powered communications(SWPC)in dynamic spec-trum sharing networks.The jamming-assisted spec-trum monitoring scheme via spectrum monitoring data(SMD)transmission is proposed to maximize the sum ergodic monitoring rate at SM.In SWPC,the suspi-cious communications of each data block occupy mul-tiple independent blocks,with a block dedicated to the wireless energy transfer by the energy-constrained suspicious nodes with locations in a same cluster(symmetric scene)or randomly distributed(asymmet-ric scene)and the remaining blocks used for the in-formation transmission from suspicious transmitters(STs)to suspicious destination(SD).For the sym-metric scene,with a given number of blocks for SMD transmission,namely the jamming operation,we first reveal that SM should transmit SMD signal(jam the SD)with tolerable maximum power in the given blocks.The perceived suspicious signal power at SM could be maximized,and thus so does the correspond-ing sum ergodic monitoring rate.Then,we further reveal one fundamental trade-off in deciding the op-timal number of given blocks for SMD transmission.For the asymmetric scene,a low-complexity greedy block selection scheme is proposed to guarantee the optimal performance.Simulation results show that the jamming-assisted spectrum monitoring schemes via SMD transmission achieve much better perfor-mance than conventional passive spectrum monitor-ing,since the proposed schemes can obtain more accu-rate and effective spectrum characteristic parameters,which provide basic support for fine-grained spectrum management and a solution for spectrum security in dynamic spectrum sharing network.
基金The National Natural Science Foundation of China(No50674086)Specialized Research Fund for the Doctoral Program of Higher Education (No20060290508)
文摘With the aim to address the problems presented in knowledge utilization in knowledge-intensive enterprises, the ontology-based proactive knowledge system (OPKS) is put forward to improve knowledge utilization. Proactive knowledge service is taken as the basic idea in the OPKS. The user knowledge requirement is taken as the driving factor and described by the user knowledge requirement. Ontologies are used to present the semantic of heterogeneous knowledge sources and ontology mapping is used to realize the interoperation of heterogeneous knowledge sources. The required knowledge is found by matching the user knowledge requirement with knowledge sources and is provided to the user proactively. System analysis and design of OPKS is carded on by adopting UML. The OPKS is implemented in Java language. Application in a certain institute shows that the OPKS can raise efficiency of knowledge utilization in knowledge-intensive enterprises.
基金supported by the Natural Science Foundation of Hubei Province(2021CFB297)the Natural Science Foundation of Guangdong Province(2022A1515010563).
文摘Although it is becoming increasingly popular for organizations to offer programs of mind–body practices to their employees to improve their physical and mental health,the effects that after-work sessions of mind–body prac-tices have on employees’work behavior remain unclear.Using the model of proactive motivation and experience sampling,this study explored the relationship between employees’mind–body practices after work and their proactive behavior in the workplace on the following day.A multilevel path analysis of data from 82 employees over seven consecutive workdays showed that employees’mind–body practices after work had a positive effect on their proactive behavior in the workplace on the following day.The relationship was mediated by next-day high-activated positive affect and problem-solving confidence.Furthermore,job control positively moderated the rela-tionship between high-activated positive affect and proactive behavior but not that between problem-solving con-fidence and proactive behavior.We discuss the theoretical and practical implications of thesefindings,and propose future research directions.
基金co-supported by the Natural Science Foundation for Distinguished Young Scholars of Jiangsu Province(No.BK20190030)the National Natural Science Foundation of China(Nos.61871398 and 61931011)the National Key R&D Program of China(No.2018YFB1801103)。
文摘In this paper,an Unmanned Aerial Vehicle(UAV)-assisted relay communication system is studied,where a UAV is served as a flying relay to maintain a communication link between a mobile source node and a remote destination node.Specifically,an average outage probability minimization problem is formulated firstly,with the constraints on the transmission power of the source node,the maximum energy consumption budget,the transmission power,the speed and acceleration of the flying UAV relay.Next,the closed-form of outage probability is derived,under the hybrid line-of-sight and non-line-of-sight probability channel model.To deal with the formulated nonconvex optimization,a long-term proactive optimization mechanism is developed.In particular,firstly,an approximation for line-of-sight probability and a reformulation of the primal problem are given,respectively.Then,the reformulated problem is transformed into two subproblems:one is the transmission power optimization with given UAV’s trajectory and the other is the trajectory optimization with given transmission power allocation.Next,two subproblems are tackled via tailoring primal–dual subgradient method and successive convex approximation,respectively.Furthermore,a proactive optimization algorithm is proposed to jointly optimize the transmission power allocation and the three-dimensional trajectory.Finally,simulation results demonstrate the performance of the proposed algorithm under various parameter configurations.
文摘A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures and between different threshold schemes. A point worth mentioning is that this verifiable secret redistribution (VSR) scheme can identify dishonest old shareholders during redistribution without any assumption. A certain technique is adopted to verify the correctness of the old shares of the secret. As a result, the scheme is very efficient. It can be applied to proactive secret sharing (PSS) schemes to construct more flexible and practical proactive secret sharing schemes.