Signals from multi-sensor systems are often mixtures of (statistically) independent sources by unknown mixing method. Blind source separation(BSS) and independent component analysis(ICA) are the methods to ident...Signals from multi-sensor systems are often mixtures of (statistically) independent sources by unknown mixing method. Blind source separation(BSS) and independent component analysis(ICA) are the methods to identify/recover the channels and the sources. BSS/ICA of nonlinear mixing models are difficult problems. For instance, the post-nonlinear model has been studied by several authors. It is noticed that in most cases, the proposed models are always with an invertible mixing. According to this fact there is an interesting question, how about the situation of the non-invertible non-linear mixing in BSS or ICA? A new simple non-linear mixing model is proposed with a kind of non-invertible mixing, the folding mixing, and method to identify its channel, blindly.展开更多
To identify the unsteady°uid dynamic model for a solid moving in the°uid,a new identication method that operates in the continuous time domain is proposed.It is illustrated that this new identication method ...To identify the unsteady°uid dynamic model for a solid moving in the°uid,a new identication method that operates in the continuous time domain is proposed.It is illustrated that this new identication method is more accurate and appropriate for identifying unsteady°uid dynamic model in incompressible°ow in comparison with the classical frequency domain or discrete domain method.This new method is applied to identify the unsteady°uid dynamic models of a NACA0012 airfoil and the e®ect of the°uid viscosity on the model parameter is analyzed.The result shows that the added mass in viscous°ow is dependent on the input signal frequency and is exactly the added mass in inviscid°ow when the frequency approaches innity.Based on this discovery,the long controversy on the relationship of added mass between viscous and inviscid°ow is solved.Then,the enlightenment of this discovery on the identication of both linear and nonlinear unsteady aerodynamic model in incompressible°ow is illustrated.At last,the advantage of the new acquired unsteady°uid dynamic model is discussed in comparison with the classical quasi-steady aerodynamic model.展开更多
The developing Sixth-Generation(6G)network aims to establish seamless global connectivity for billions of humans,machines,and devices.However,the rich digital service and the explosive heterogeneous connection between...The developing Sixth-Generation(6G)network aims to establish seamless global connectivity for billions of humans,machines,and devices.However,the rich digital service and the explosive heterogeneous connection between various entities in 6G networks can not only induce increasing complications of digital identity management,but also raise material concerns about the security and privacy of the user identity.In this paper,we design a user-centric identity management that returns the sole control to the user self and achieves identity sovereignty toward 6G networks.Specifically,we propose a blockchain-based Identity Management(IDM)architecture for 6G networks,which provides a practical method to secure digital identity management.Subsequently,we develop a fully privacy-preserving identity attribute management scheme by using zero-knowledge proof to protect the privacy-sensitive identity attribute.In particular,the scheme achieves an identity attribute hiding and verification protocol to support users in obtaining and applying their identity attributes without revealing concrete data.Finally,we analyze the security of the proposed architecture and implement a prototype system to evaluate its performance.The results demonstrate that our architecture ensures effective user digital identity management in 6G networks.展开更多
With the growing deployment of unmanned aerial vehicles(UAVs)swarms in national defense,military operations,and emergency response,secure and reliable intra-swarm identity authentication has become critical for ensuri...With the growing deployment of unmanned aerial vehicles(UAVs)swarms in national defense,military operations,and emergency response,secure and reliable intra-swarm identity authentication has become critical for ensuring coordinated action and mission reliability.To address the drawbacks of public key infrastructure(PKI)based authentication in UAV swarms,namely,complex certificate management,strong dependence on centralized authorities,and authentication latency.We propose a certificateless identity authentication scheme for UAV swarms built on blockchain sharding.The scheme leverages sharding to execute authentication in parallel across multiple shards,significantly improving efficiency.Each UAV locally generates its public/private key pair and then adopts a registration-based encryption(RBE)mechanism:A registration algorithm binds the device identity to its key on the blockchain,ensuring public verifiability and immutability of identity mapping.On this basis,an authentication algorithm runs in which the initiator produces an authentication signature using a common reference string(CRS),on-chain public-key registration information,and its local private key,and the verifier rapidly validates the authentication message using the on-chain registration data and the identity of the initiator.The experimental results demonstrate that the proposed scheme achieves low-latency and high-throughput identity authentication in large-scale UAV swarm environments,providing a solid technical foundation and broad application prospects for trustworthy UAV swarm identity authentication.展开更多
How is a nation’s embrace of snow and ice shaping a new cultural identity and igniting a multi-trillion-yuan economic boom?ADRIAAN Smit now cannot imagine a life without snowboarding,a passion that has become central...How is a nation’s embrace of snow and ice shaping a new cultural identity and igniting a multi-trillion-yuan economic boom?ADRIAAN Smit now cannot imagine a life without snowboarding,a passion that has become central to his world.He is excited to witness how winter sports are fostering a new winter culture in China.Listening to Smit speaking so enthusiastically about the slopes,one might assume he was raised in a region where snow sports are a way of life,but the fact is quite the contrary.展开更多
Within contemporary healthcare systems, professional identity among specialized nurses serves as a pivotal intrinsic factor influencing the development of their core competencies. This review synthesizes existing rese...Within contemporary healthcare systems, professional identity among specialized nurses serves as a pivotal intrinsic factor influencing the development of their core competencies. This review synthesizes existing research, revealing that professional identity positively impacts the development of core competencies through multiple pathways, including psychological drive, behavioral facilitation, teamwork, and career stability. Building on this analysis, this paper proposes systematic enhancement strategies from four dimensions: education and training, organizational environment, cultural development, and individual growth, aiming to provide a reference for nursing practice and professional development.展开更多
The current study examined the roles of collective self-esteem and personal self-esteem in the relationship between national identity and subjective well-being.Participants were 583 Chinese college students(females=49...The current study examined the roles of collective self-esteem and personal self-esteem in the relationship between national identity and subjective well-being.Participants were 583 Chinese college students(females=49%;mean age=19.25±1.85 years).They completed measures of national identity,collective self-esteem,personal self-esteem,and subjective well-being.Path analysis findings result indicated national identity to influence the students’subjective wellbeing through three pathways:(1)national identity→collective self-esteem→subjective well-being,meaning higher subjective wellbeing with collective self-esteem.(2)national identity→personal self-esteem→subjective well-being,to suggest higher personal self-esteem was associated with subjective wellbeing;(3)national identity→collective selfesteem→personal self-esteem→subjective well-being.Compared to simple mediation models constructed with only personal self-esteem or collective self-esteem as a single mediating variable,the chain mediation model better explains the mediating mechanism of national identity on subjective well-being(the variance explained by the mediating variables increased by 65.38%and 59.26%,respectively).The collective self-esteem and personal self-esteem mediation is consistent with social identity theory,whereby national identity enhances collective self-evaluation,which in turn bolsters personal self-worth and subjective well-being.These findings of the current study offer new insights into how national identity affects subjective well-being in collectivistic culture.展开更多
Recognizing frontal faces from non-frontal or profile images is a major problem due to pose changes,self-occlusions,and the complete loss of important structural and textural components,depressing recognition accuracy...Recognizing frontal faces from non-frontal or profile images is a major problem due to pose changes,self-occlusions,and the complete loss of important structural and textural components,depressing recognition accuracy and visual fidelity.This paper introduces a new deep generative framework,Modified Multi-Scale Fused CycleGAN(MMF-CycleGAN),for robust and photo-realistic profile-to-frontal face synthesis.The MMF-CycleGAN framework utilizes pre-processing and then the generator employs a Deep Dilated DenseNet encoder-based hierarchical feature extraction along with a transformer and decoder.The proposed Multi-Scale Fusion PatchGAN discriminator enforces consistency at multiple spatial resolutions,leading to sharper textures and improved global facial geometry.Also,GAN training stability and identity preservation are improved through the Ranger optimizer,which effectively balances adversarial,identity,and cycle-consistency losses.Experiments on three benchmark datasets show that MMFCycleGAN achieves accuracy of 0.9541,0.9455,and 0.9422,F1-scores of 0.9654,0.9641,and 0.9614,and AUC values of 0.9742,0.9714,and 0.9698,respectively,and the extreme-pose accuracy(yaw>60°)reaches 0.92.Despite its enhanced architecture,the framework maintains an efficient inference time of 0.042 s per image,making it suitable for real-time biometric authentication,surveillance,and security applications in unconstrained environments.展开更多
This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the fi...This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the first proposal to integrate IOTA’s Directed Acyclic Graph(DAG)-based identity framework into satellite IoT environments,enabling lightweight and distributed authentication under intermittent connectivity.The system leverages Decentralized Identifiers(DIDs)and Verifiable Credentials(VCs)over the Tangle,eliminating the need for mining and sequential blocks.An identity management workflow is implemented that supports the creation,validation,deactivation,and reactivation of IoT devices,and is experimentally validated on the Shimmer Testnet.Three metrics are defined and measured:resolution time,deactivation time,and reactivation time.To improve robustness,an algorithmic optimization is introduced that minimizes communication overhead and reduces latency during deactivation.The experimental results are compared with orbital simulations of satellite revisit times to assess operational feasibility.Unlike blockchain-based approaches,which typically suffer from high confirmation delays and scalability constraints,the proposed DAG architecture provides fast,cost-free operations suitable for resource-constrained IoT devices.The results show that authentication can be efficiently performed within satellite connectivity windows,positioning IOTA Identity as a viable solution for secure and scalable IoT authentication in LEO satellite networks.展开更多
Objectives:Psychological resilience is a critical resource for vocational high school students navigating social biases and fostering mental well-being.This six-month longitudinal study investigated the developmental ...Objectives:Psychological resilience is a critical resource for vocational high school students navigating social biases and fostering mental well-being.This six-month longitudinal study investigated the developmental trajectories of discrimination perception,vocational identity,and psychological resilience in this population.It further examined the longitudinal mediating role of vocational identity in the relationship between discrimination perception and psychological resilience.Methods:A total of 526 students from five vocational high schools in Guangdong,China,were assessed via convenience sampling at two time points:baseline(T1,September 2023)and six-month follow-up(T2,March 2024).Measures of discrimination perception,psychological resilience,and vocational identity were administered.Data were analyzed using a cross-lagged panel model to test for bidirectional relationships.Results:Over the six-month period,students showed significant decreases in discrimination perception and vocational identity,but a significant increase in psychological resilience.The cross-lagged model revealed significant bidirectional relationships:discrimination perception and psychological resilience negatively predicted each other over time(β=−0.124,p<0.01;β=−0.200,p<0.001),while psychological resilience and vocational identity positively predicted each other(β=0.084,p<0.05;β=0.076,p<0.05).The mediation analysis revealed a dual-pathway mechanism.T1 discrimination perception exerted both a significant direct negative effect on T2 psychological resilience(β=−0.332,p<0.001)and a significant indirect positive effect via T1 vocational identity(indirect effect=0.020,95%CI[0.001,0.046]).This confirms a partial mediating role,indicating that vocational identity functions as a compensatory mechanism,transforming the experience of discrimination perception into a potential source of psychological resilience.Conclusions:For vocational high school students,perception of discrimination directly undermines psychological resilience,but also indirectly fosters it through the positive development of vocational identity.These findings highlight vocational identity as a pivotal mechanism in the complex relationship between social adversity and mental resilience.展开更多
Background:Emerging adulthood is a critical period for ego identity exploration and consolidation,and self-presentation on social media constitutes a salient online context for this developmental process.However,limit...Background:Emerging adulthood is a critical period for ego identity exploration and consolidation,and self-presentation on social media constitutes a salient online context for this developmental process.However,limited research has explored the associations between self-presentation on WeChat Moments and ego identity.This study aims to examine these associations,focusing on the mediating role of online positive feedback and the moderating role of gender.Methods:Using a three-wave longitudinal design,this study followed 767 Chinese college students(Mean age=18.96 years)through cluster sampling.Participants completed self-report questionnaires assessing self-presentation on WeChat Moments,online positive feedback,and ego identity status.Data analyses were conducted using mediation modeling and multi-group structural equation modeling.Results:Authentic self-presentation was positively associated with identity achievement and negatively associated with identity diffusion,whereas positive self-presentation was linked to higher levels of identity foreclosure.Online positive feedback played a significant mediating role in the associations between self-presentation strategies and identity statuses,and gender differences were observed in this mediating pathway.For both males and females,authentic self-presentation was associated with higher identity achievement through online positive feedback.However,indirect associations with identity foreclosure and diffusion were observed only among females:authentic self-presentation was linked to lower levels,whereas positive self-presentation was linked to higher levels of foreclosure and diffusion through online positive feedback.No comparable indirect associations were detected among males.Conclusions:Online positive feedback is closely linked to self-presentation strategies and ego identity statuses,with these associations varying by gender.展开更多
Federated learning often experiences slow and unstable convergence due to edge-side data heterogeneity.This problem becomes more severe when edge participation rate is low,as the information collected from different e...Federated learning often experiences slow and unstable convergence due to edge-side data heterogeneity.This problem becomes more severe when edge participation rate is low,as the information collected from different edge devices varies significantly.As a result,communication overhead increases,which further slows down the convergence process.To address this challenge,we propose a simple yet effective federated learning framework that improves consistency among edge devices.The core idea is clusters the lookahead gradients collected from edge devices on the cloud server to obtain personalized momentum for steering local updates.In parallel,a global momentum is applied during model aggregation,enabling faster convergence while preserving personalization.This strategy enables efficient propagation of the estimated global update direction to all participating edge devices and maintains alignment in local training,without introducing extra memory or communication overhead.We conduct extensive experiments on benchmark datasets such as Cifar100 and Tiny-ImageNet.The results confirm the effectiveness of our framework.On CIFAR-100,our method reaches 55%accuracy with 37 fewer rounds and achieves a competitive final accuracy of 65.46%.Even under extreme non-IID scenarios,it delivers significant improvements in both accuracy and communication efficiency.The implementation is publicly available at https://github.com/sjmp525/CollaborativeComputing/tree/FedCCM(accessed on 20 October 2025).展开更多
User identity linkage(UIL)across online social networks seeks to match accounts belonging to the same real-world individual.This cross-platformmapping enables accurate user modeling but also raises serious privacy ris...User identity linkage(UIL)across online social networks seeks to match accounts belonging to the same real-world individual.This cross-platformmapping enables accurate user modeling but also raises serious privacy risks.Over the past decade,the research community has developed a wide range of UIL methods,from structural embeddings tomultimodal fusion architectures.However,corresponding adversarial and defensive approaches remain fragmented and comparatively understudied.In this survey,we provide a unified overview of both mapping and antimappingmethods for UIL.We categorize representativemappingmodels by learning paradigmand datamodality,and systematically compare them with emerging countermeasures including adversarial injection,structural perturbation,and identity obfuscation.To bridge these two threads,we introduce amodality-oriented taxonomy and a formal gametheoretic framing that casts cross-network mapping as a contest between mappers and anti-mappers.This framing allows us to construct a cross-modality dependency matrix,which reveals structural information as themost contested signal,identifies node injection as the most robust defensive strategy,and points to multimodal integration as a promising direction.Our survey underscores the need for balanced,privacy-preserving identity inference and provides a foundation for future research on the adversarial dynamics of social identity mapping and defense.展开更多
In non-independent and identically distributed(non-IID)data environments,model performance often degrades significantly.To address this issue,two improvement methods are proposed:FedReg and FedReg^(*).FedReg is a meth...In non-independent and identically distributed(non-IID)data environments,model performance often degrades significantly.To address this issue,two improvement methods are proposed:FedReg and FedReg^(*).FedReg is a method based on hybrid regularization aimed at enhancing federated learning in non-IID scenarios.It introduces hybrid regularization to replace traditional L2 regularization,combining the advantages of L1 and L2 regularization to enable feature selection while preventing overfitting.This method better adapts to the diverse data distributions of different clients,improving the overall model performance.FedReg^(*)combines hybrid regularization with weighted model aggregation.In addition to the benefits of hybrid regularization,FedReg^(*)applies a weighted averaging method in the model aggregation process,calculating weights based on the cosine similarity between each client gradient and the global gradient to more reasonably distribute client contributions.By considering variations in data quality and quantity among clients,FedReg^(*)highlights the importance of key clients and enhances the model’s generalization performance.These improvement methods enhance model accuracy and communication efficiency.展开更多
It is well known that the inhomogeneous Calderón-Zygmund convolution operators are bounded on the local Hardy spaces.In this paper,we prove that these operators are bounded on the local product Hardy spaces and t...It is well known that the inhomogeneous Calderón-Zygmund convolution operators are bounded on the local Hardy spaces.In this paper,we prove that these operators are bounded on the local product Hardy spaces and the Lipschitz spaces.The key ideas used here are the discrete local Calderón identity and a density argument for the inhomogeneous product Lipschitz spaces in the weak sense.展开更多
Pancreatic cancer is a highly malignant tumor with low early detection rates and poor prognoses,reflected in a five-year survival rate below 10.The morbidity and mortality rates for this cancer type are nearly identic...Pancreatic cancer is a highly malignant tumor with low early detection rates and poor prognoses,reflected in a five-year survival rate below 10.The morbidity and mortality rates for this cancer type are nearly identical,indicating a substantial disease burden[1].In China,pancreatic cancer ranks as the sixth leading cause of cancer deaths for both sexes.In 2019,approximately 114,964 cases were recorded,resulting in an incidence rate of 5.78 per 100,000,reflecting an increase of 329.40%in cases and 82.11%in incidence since 1990[2].展开更多
In this paper,we study the existence of least energy solutions for the following nonlinear fractional Schrodinger–Poisson system{(−∆)^(s)u+V(x)u+φu=f(u)in R^(3),(−∆)^(t)φ=u^(2)in R^(3),where s∈(3/4,1),t∈(0,1).Und...In this paper,we study the existence of least energy solutions for the following nonlinear fractional Schrodinger–Poisson system{(−∆)^(s)u+V(x)u+φu=f(u)in R^(3),(−∆)^(t)φ=u^(2)in R^(3),where s∈(3/4,1),t∈(0,1).Under some assumptions on V(x)and f,using Nehari–Pohozaev identity and the arguments of Brezis–Nirenberg,the monotonic trick and global compactness lemma,we prove the existence of a nontrivial least energy solution.展开更多
基金This project was supported by the Talent Foundation of Anhui Province(2004Z025)
文摘Signals from multi-sensor systems are often mixtures of (statistically) independent sources by unknown mixing method. Blind source separation(BSS) and independent component analysis(ICA) are the methods to identify/recover the channels and the sources. BSS/ICA of nonlinear mixing models are difficult problems. For instance, the post-nonlinear model has been studied by several authors. It is noticed that in most cases, the proposed models are always with an invertible mixing. According to this fact there is an interesting question, how about the situation of the non-invertible non-linear mixing in BSS or ICA? A new simple non-linear mixing model is proposed with a kind of non-invertible mixing, the folding mixing, and method to identify its channel, blindly.
文摘To identify the unsteady°uid dynamic model for a solid moving in the°uid,a new identication method that operates in the continuous time domain is proposed.It is illustrated that this new identication method is more accurate and appropriate for identifying unsteady°uid dynamic model in incompressible°ow in comparison with the classical frequency domain or discrete domain method.This new method is applied to identify the unsteady°uid dynamic models of a NACA0012 airfoil and the e®ect of the°uid viscosity on the model parameter is analyzed.The result shows that the added mass in viscous°ow is dependent on the input signal frequency and is exactly the added mass in inviscid°ow when the frequency approaches innity.Based on this discovery,the long controversy on the relationship of added mass between viscous and inviscid°ow is solved.Then,the enlightenment of this discovery on the identication of both linear and nonlinear unsteady aerodynamic model in incompressible°ow is illustrated.At last,the advantage of the new acquired unsteady°uid dynamic model is discussed in comparison with the classical quasi-steady aerodynamic model.
文摘The developing Sixth-Generation(6G)network aims to establish seamless global connectivity for billions of humans,machines,and devices.However,the rich digital service and the explosive heterogeneous connection between various entities in 6G networks can not only induce increasing complications of digital identity management,but also raise material concerns about the security and privacy of the user identity.In this paper,we design a user-centric identity management that returns the sole control to the user self and achieves identity sovereignty toward 6G networks.Specifically,we propose a blockchain-based Identity Management(IDM)architecture for 6G networks,which provides a practical method to secure digital identity management.Subsequently,we develop a fully privacy-preserving identity attribute management scheme by using zero-knowledge proof to protect the privacy-sensitive identity attribute.In particular,the scheme achieves an identity attribute hiding and verification protocol to support users in obtaining and applying their identity attributes without revealing concrete data.Finally,we analyze the security of the proposed architecture and implement a prototype system to evaluate its performance.The results demonstrate that our architecture ensures effective user digital identity management in 6G networks.
基金supported by the National Natural Science Foundation of China under Grant No.62472075the Innovation Theory and Technology Group Fund of the Southwest China Institute of Electronic Technology under Grant No.2024jsq0207.
文摘With the growing deployment of unmanned aerial vehicles(UAVs)swarms in national defense,military operations,and emergency response,secure and reliable intra-swarm identity authentication has become critical for ensuring coordinated action and mission reliability.To address the drawbacks of public key infrastructure(PKI)based authentication in UAV swarms,namely,complex certificate management,strong dependence on centralized authorities,and authentication latency.We propose a certificateless identity authentication scheme for UAV swarms built on blockchain sharding.The scheme leverages sharding to execute authentication in parallel across multiple shards,significantly improving efficiency.Each UAV locally generates its public/private key pair and then adopts a registration-based encryption(RBE)mechanism:A registration algorithm binds the device identity to its key on the blockchain,ensuring public verifiability and immutability of identity mapping.On this basis,an authentication algorithm runs in which the initiator produces an authentication signature using a common reference string(CRS),on-chain public-key registration information,and its local private key,and the verifier rapidly validates the authentication message using the on-chain registration data and the identity of the initiator.The experimental results demonstrate that the proposed scheme achieves low-latency and high-throughput identity authentication in large-scale UAV swarm environments,providing a solid technical foundation and broad application prospects for trustworthy UAV swarm identity authentication.
文摘How is a nation’s embrace of snow and ice shaping a new cultural identity and igniting a multi-trillion-yuan economic boom?ADRIAAN Smit now cannot imagine a life without snowboarding,a passion that has become central to his world.He is excited to witness how winter sports are fostering a new winter culture in China.Listening to Smit speaking so enthusiastically about the slopes,one might assume he was raised in a region where snow sports are a way of life,but the fact is quite the contrary.
文摘Within contemporary healthcare systems, professional identity among specialized nurses serves as a pivotal intrinsic factor influencing the development of their core competencies. This review synthesizes existing research, revealing that professional identity positively impacts the development of core competencies through multiple pathways, including psychological drive, behavioral facilitation, teamwork, and career stability. Building on this analysis, this paper proposes systematic enhancement strategies from four dimensions: education and training, organizational environment, cultural development, and individual growth, aiming to provide a reference for nursing practice and professional development.
文摘The current study examined the roles of collective self-esteem and personal self-esteem in the relationship between national identity and subjective well-being.Participants were 583 Chinese college students(females=49%;mean age=19.25±1.85 years).They completed measures of national identity,collective self-esteem,personal self-esteem,and subjective well-being.Path analysis findings result indicated national identity to influence the students’subjective wellbeing through three pathways:(1)national identity→collective self-esteem→subjective well-being,meaning higher subjective wellbeing with collective self-esteem.(2)national identity→personal self-esteem→subjective well-being,to suggest higher personal self-esteem was associated with subjective wellbeing;(3)national identity→collective selfesteem→personal self-esteem→subjective well-being.Compared to simple mediation models constructed with only personal self-esteem or collective self-esteem as a single mediating variable,the chain mediation model better explains the mediating mechanism of national identity on subjective well-being(the variance explained by the mediating variables increased by 65.38%and 59.26%,respectively).The collective self-esteem and personal self-esteem mediation is consistent with social identity theory,whereby national identity enhances collective self-evaluation,which in turn bolsters personal self-worth and subjective well-being.These findings of the current study offer new insights into how national identity affects subjective well-being in collectivistic culture.
文摘Recognizing frontal faces from non-frontal or profile images is a major problem due to pose changes,self-occlusions,and the complete loss of important structural and textural components,depressing recognition accuracy and visual fidelity.This paper introduces a new deep generative framework,Modified Multi-Scale Fused CycleGAN(MMF-CycleGAN),for robust and photo-realistic profile-to-frontal face synthesis.The MMF-CycleGAN framework utilizes pre-processing and then the generator employs a Deep Dilated DenseNet encoder-based hierarchical feature extraction along with a transformer and decoder.The proposed Multi-Scale Fusion PatchGAN discriminator enforces consistency at multiple spatial resolutions,leading to sharper textures and improved global facial geometry.Also,GAN training stability and identity preservation are improved through the Ranger optimizer,which effectively balances adversarial,identity,and cycle-consistency losses.Experiments on three benchmark datasets show that MMFCycleGAN achieves accuracy of 0.9541,0.9455,and 0.9422,F1-scores of 0.9654,0.9641,and 0.9614,and AUC values of 0.9742,0.9714,and 0.9698,respectively,and the extreme-pose accuracy(yaw>60°)reaches 0.92.Despite its enhanced architecture,the framework maintains an efficient inference time of 0.042 s per image,making it suitable for real-time biometric authentication,surveillance,and security applications in unconstrained environments.
基金This work is part of the‘Intelligent and Cyber-Secure Platform for Adaptive Optimization in the Simultaneous Operation of Heterogeneous Autonomous Robots(PICRAH4.0)’with reference MIG-20232082,funded by MCIN/AEI/10.13039/501100011033supported by the Universidad Internacional de La Rioja(UNIR)through the Precompetitive Research Project entitled“Nuevos Horizontes en Internet de las Cosas y NewSpace(NEWIOT)”,reference PP-2024-13,funded under the 2024 Call for Research Projects.
文摘This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the first proposal to integrate IOTA’s Directed Acyclic Graph(DAG)-based identity framework into satellite IoT environments,enabling lightweight and distributed authentication under intermittent connectivity.The system leverages Decentralized Identifiers(DIDs)and Verifiable Credentials(VCs)over the Tangle,eliminating the need for mining and sequential blocks.An identity management workflow is implemented that supports the creation,validation,deactivation,and reactivation of IoT devices,and is experimentally validated on the Shimmer Testnet.Three metrics are defined and measured:resolution time,deactivation time,and reactivation time.To improve robustness,an algorithmic optimization is introduced that minimizes communication overhead and reduces latency during deactivation.The experimental results are compared with orbital simulations of satellite revisit times to assess operational feasibility.Unlike blockchain-based approaches,which typically suffer from high confirmation delays and scalability constraints,the proposed DAG architecture provides fast,cost-free operations suitable for resource-constrained IoT devices.The results show that authentication can be efficiently performed within satellite connectivity windows,positioning IOTA Identity as a viable solution for secure and scalable IoT authentication in LEO satellite networks.
基金supported by the Guangdong Provincial Philosophy and Social Science“14th Five-Year Plan”Discipline Co-Construction Project(Grant No.GD22XJY14)the 2022 Guangdong Provincial Higher Education Teaching Reform Project(Grant No.Yue Jiao Gao[2023]4)Guangdong Polytechnic Normal University’s Project for Enhancing the Research Capacity of Doctoral Application Institution(Grant No.22GPNUZDJS48).
文摘Objectives:Psychological resilience is a critical resource for vocational high school students navigating social biases and fostering mental well-being.This six-month longitudinal study investigated the developmental trajectories of discrimination perception,vocational identity,and psychological resilience in this population.It further examined the longitudinal mediating role of vocational identity in the relationship between discrimination perception and psychological resilience.Methods:A total of 526 students from five vocational high schools in Guangdong,China,were assessed via convenience sampling at two time points:baseline(T1,September 2023)and six-month follow-up(T2,March 2024).Measures of discrimination perception,psychological resilience,and vocational identity were administered.Data were analyzed using a cross-lagged panel model to test for bidirectional relationships.Results:Over the six-month period,students showed significant decreases in discrimination perception and vocational identity,but a significant increase in psychological resilience.The cross-lagged model revealed significant bidirectional relationships:discrimination perception and psychological resilience negatively predicted each other over time(β=−0.124,p<0.01;β=−0.200,p<0.001),while psychological resilience and vocational identity positively predicted each other(β=0.084,p<0.05;β=0.076,p<0.05).The mediation analysis revealed a dual-pathway mechanism.T1 discrimination perception exerted both a significant direct negative effect on T2 psychological resilience(β=−0.332,p<0.001)and a significant indirect positive effect via T1 vocational identity(indirect effect=0.020,95%CI[0.001,0.046]).This confirms a partial mediating role,indicating that vocational identity functions as a compensatory mechanism,transforming the experience of discrimination perception into a potential source of psychological resilience.Conclusions:For vocational high school students,perception of discrimination directly undermines psychological resilience,but also indirectly fosters it through the positive development of vocational identity.These findings highlight vocational identity as a pivotal mechanism in the complex relationship between social adversity and mental resilience.
基金supported by the National Social Science Fund of China(No.23BSH123).
文摘Background:Emerging adulthood is a critical period for ego identity exploration and consolidation,and self-presentation on social media constitutes a salient online context for this developmental process.However,limited research has explored the associations between self-presentation on WeChat Moments and ego identity.This study aims to examine these associations,focusing on the mediating role of online positive feedback and the moderating role of gender.Methods:Using a three-wave longitudinal design,this study followed 767 Chinese college students(Mean age=18.96 years)through cluster sampling.Participants completed self-report questionnaires assessing self-presentation on WeChat Moments,online positive feedback,and ego identity status.Data analyses were conducted using mediation modeling and multi-group structural equation modeling.Results:Authentic self-presentation was positively associated with identity achievement and negatively associated with identity diffusion,whereas positive self-presentation was linked to higher levels of identity foreclosure.Online positive feedback played a significant mediating role in the associations between self-presentation strategies and identity statuses,and gender differences were observed in this mediating pathway.For both males and females,authentic self-presentation was associated with higher identity achievement through online positive feedback.However,indirect associations with identity foreclosure and diffusion were observed only among females:authentic self-presentation was linked to lower levels,whereas positive self-presentation was linked to higher levels of foreclosure and diffusion through online positive feedback.No comparable indirect associations were detected among males.Conclusions:Online positive feedback is closely linked to self-presentation strategies and ego identity statuses,with these associations varying by gender.
基金supported by the National Natural Science Foundation of China(62462040)the Yunnan Fundamental Research Projects(202501AT070345)the Major Science and Technology Projects in Yunnan Province(202202AD080013).
文摘Federated learning often experiences slow and unstable convergence due to edge-side data heterogeneity.This problem becomes more severe when edge participation rate is low,as the information collected from different edge devices varies significantly.As a result,communication overhead increases,which further slows down the convergence process.To address this challenge,we propose a simple yet effective federated learning framework that improves consistency among edge devices.The core idea is clusters the lookahead gradients collected from edge devices on the cloud server to obtain personalized momentum for steering local updates.In parallel,a global momentum is applied during model aggregation,enabling faster convergence while preserving personalization.This strategy enables efficient propagation of the estimated global update direction to all participating edge devices and maintains alignment in local training,without introducing extra memory or communication overhead.We conduct extensive experiments on benchmark datasets such as Cifar100 and Tiny-ImageNet.The results confirm the effectiveness of our framework.On CIFAR-100,our method reaches 55%accuracy with 37 fewer rounds and achieves a competitive final accuracy of 65.46%.Even under extreme non-IID scenarios,it delivers significant improvements in both accuracy and communication efficiency.The implementation is publicly available at https://github.com/sjmp525/CollaborativeComputing/tree/FedCCM(accessed on 20 October 2025).
基金funded by the National Key R&D Program of China under Grant(No.2022YFB3102901)National Natural Science Foundation of China(Nos.62072115,62102094)Shanghai Science and Technology Innovation Action Plan Project(No.22510713600).
文摘User identity linkage(UIL)across online social networks seeks to match accounts belonging to the same real-world individual.This cross-platformmapping enables accurate user modeling but also raises serious privacy risks.Over the past decade,the research community has developed a wide range of UIL methods,from structural embeddings tomultimodal fusion architectures.However,corresponding adversarial and defensive approaches remain fragmented and comparatively understudied.In this survey,we provide a unified overview of both mapping and antimappingmethods for UIL.We categorize representativemappingmodels by learning paradigmand datamodality,and systematically compare them with emerging countermeasures including adversarial injection,structural perturbation,and identity obfuscation.To bridge these two threads,we introduce amodality-oriented taxonomy and a formal gametheoretic framing that casts cross-network mapping as a contest between mappers and anti-mappers.This framing allows us to construct a cross-modality dependency matrix,which reveals structural information as themost contested signal,identifies node injection as the most robust defensive strategy,and points to multimodal integration as a promising direction.Our survey underscores the need for balanced,privacy-preserving identity inference and provides a foundation for future research on the adversarial dynamics of social identity mapping and defense.
文摘In non-independent and identically distributed(non-IID)data environments,model performance often degrades significantly.To address this issue,two improvement methods are proposed:FedReg and FedReg^(*).FedReg is a method based on hybrid regularization aimed at enhancing federated learning in non-IID scenarios.It introduces hybrid regularization to replace traditional L2 regularization,combining the advantages of L1 and L2 regularization to enable feature selection while preventing overfitting.This method better adapts to the diverse data distributions of different clients,improving the overall model performance.FedReg^(*)combines hybrid regularization with weighted model aggregation.In addition to the benefits of hybrid regularization,FedReg^(*)applies a weighted averaging method in the model aggregation process,calculating weights based on the cosine similarity between each client gradient and the global gradient to more reasonably distribute client contributions.By considering variations in data quality and quantity among clients,FedReg^(*)highlights the importance of key clients and enhances the model’s generalization performance.These improvement methods enhance model accuracy and communication efficiency.
基金supported by the NSFC(12301115)the Natural Science Foundation of Huzhou(2023YZ11,2024YZ37)the second author was supported by the NSFC(12071437).
文摘It is well known that the inhomogeneous Calderón-Zygmund convolution operators are bounded on the local Hardy spaces.In this paper,we prove that these operators are bounded on the local product Hardy spaces and the Lipschitz spaces.The key ideas used here are the discrete local Calderón identity and a density argument for the inhomogeneous product Lipschitz spaces in the weak sense.
文摘Pancreatic cancer is a highly malignant tumor with low early detection rates and poor prognoses,reflected in a five-year survival rate below 10.The morbidity and mortality rates for this cancer type are nearly identical,indicating a substantial disease burden[1].In China,pancreatic cancer ranks as the sixth leading cause of cancer deaths for both sexes.In 2019,approximately 114,964 cases were recorded,resulting in an incidence rate of 5.78 per 100,000,reflecting an increase of 329.40%in cases and 82.11%in incidence since 1990[2].
基金Supported by NSFC(No.12561023)partly by the Provincial Natural Science Foundation of Jiangxi,China(Nos.20232BAB201001,20202BAB211004)。
文摘In this paper,we study the existence of least energy solutions for the following nonlinear fractional Schrodinger–Poisson system{(−∆)^(s)u+V(x)u+φu=f(u)in R^(3),(−∆)^(t)φ=u^(2)in R^(3),where s∈(3/4,1),t∈(0,1).Under some assumptions on V(x)and f,using Nehari–Pohozaev identity and the arguments of Brezis–Nirenberg,the monotonic trick and global compactness lemma,we prove the existence of a nontrivial least energy solution.