How is a nation’s embrace of snow and ice shaping a new cultural identity and igniting a multi-trillion-yuan economic boom?ADRIAAN Smit now cannot imagine a life without snowboarding,a passion that has become central...How is a nation’s embrace of snow and ice shaping a new cultural identity and igniting a multi-trillion-yuan economic boom?ADRIAAN Smit now cannot imagine a life without snowboarding,a passion that has become central to his world.He is excited to witness how winter sports are fostering a new winter culture in China.Listening to Smit speaking so enthusiastically about the slopes,one might assume he was raised in a region where snow sports are a way of life,but the fact is quite the contrary.展开更多
The current study examined the roles of collective self-esteem and personal self-esteem in the relationship between national identity and subjective well-being.Participants were 583 Chinese college students(females=49...The current study examined the roles of collective self-esteem and personal self-esteem in the relationship between national identity and subjective well-being.Participants were 583 Chinese college students(females=49%;mean age=19.25±1.85 years).They completed measures of national identity,collective self-esteem,personal self-esteem,and subjective well-being.Path analysis findings result indicated national identity to influence the students’subjective wellbeing through three pathways:(1)national identity→collective self-esteem→subjective well-being,meaning higher subjective wellbeing with collective self-esteem.(2)national identity→personal self-esteem→subjective well-being,to suggest higher personal self-esteem was associated with subjective wellbeing;(3)national identity→collective selfesteem→personal self-esteem→subjective well-being.Compared to simple mediation models constructed with only personal self-esteem or collective self-esteem as a single mediating variable,the chain mediation model better explains the mediating mechanism of national identity on subjective well-being(the variance explained by the mediating variables increased by 65.38%and 59.26%,respectively).The collective self-esteem and personal self-esteem mediation is consistent with social identity theory,whereby national identity enhances collective self-evaluation,which in turn bolsters personal self-worth and subjective well-being.These findings of the current study offer new insights into how national identity affects subjective well-being in collectivistic culture.展开更多
This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the fi...This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the first proposal to integrate IOTA’s Directed Acyclic Graph(DAG)-based identity framework into satellite IoT environments,enabling lightweight and distributed authentication under intermittent connectivity.The system leverages Decentralized Identifiers(DIDs)and Verifiable Credentials(VCs)over the Tangle,eliminating the need for mining and sequential blocks.An identity management workflow is implemented that supports the creation,validation,deactivation,and reactivation of IoT devices,and is experimentally validated on the Shimmer Testnet.Three metrics are defined and measured:resolution time,deactivation time,and reactivation time.To improve robustness,an algorithmic optimization is introduced that minimizes communication overhead and reduces latency during deactivation.The experimental results are compared with orbital simulations of satellite revisit times to assess operational feasibility.Unlike blockchain-based approaches,which typically suffer from high confirmation delays and scalability constraints,the proposed DAG architecture provides fast,cost-free operations suitable for resource-constrained IoT devices.The results show that authentication can be efficiently performed within satellite connectivity windows,positioning IOTA Identity as a viable solution for secure and scalable IoT authentication in LEO satellite networks.展开更多
User identity linkage(UIL)across online social networks seeks to match accounts belonging to the same real-world individual.This cross-platformmapping enables accurate user modeling but also raises serious privacy ris...User identity linkage(UIL)across online social networks seeks to match accounts belonging to the same real-world individual.This cross-platformmapping enables accurate user modeling but also raises serious privacy risks.Over the past decade,the research community has developed a wide range of UIL methods,from structural embeddings tomultimodal fusion architectures.However,corresponding adversarial and defensive approaches remain fragmented and comparatively understudied.In this survey,we provide a unified overview of both mapping and antimappingmethods for UIL.We categorize representativemappingmodels by learning paradigmand datamodality,and systematically compare them with emerging countermeasures including adversarial injection,structural perturbation,and identity obfuscation.To bridge these two threads,we introduce amodality-oriented taxonomy and a formal gametheoretic framing that casts cross-network mapping as a contest between mappers and anti-mappers.This framing allows us to construct a cross-modality dependency matrix,which reveals structural information as themost contested signal,identifies node injection as the most robust defensive strategy,and points to multimodal integration as a promising direction.Our survey underscores the need for balanced,privacy-preserving identity inference and provides a foundation for future research on the adversarial dynamics of social identity mapping and defense.展开更多
It is well known that the inhomogeneous Calderón-Zygmund convolution operators are bounded on the local Hardy spaces.In this paper,we prove that these operators are bounded on the local product Hardy spaces and t...It is well known that the inhomogeneous Calderón-Zygmund convolution operators are bounded on the local Hardy spaces.In this paper,we prove that these operators are bounded on the local product Hardy spaces and the Lipschitz spaces.The key ideas used here are the discrete local Calderón identity and a density argument for the inhomogeneous product Lipschitz spaces in the weak sense.展开更多
In this paper,we study the existence of least energy solutions for the following nonlinear fractional Schrodinger–Poisson system{(−∆)^(s)u+V(x)u+φu=f(u)in R^(3),(−∆)^(t)φ=u^(2)in R^(3),where s∈(3/4,1),t∈(0,1).Und...In this paper,we study the existence of least energy solutions for the following nonlinear fractional Schrodinger–Poisson system{(−∆)^(s)u+V(x)u+φu=f(u)in R^(3),(−∆)^(t)φ=u^(2)in R^(3),where s∈(3/4,1),t∈(0,1).Under some assumptions on V(x)and f,using Nehari–Pohozaev identity and the arguments of Brezis–Nirenberg,the monotonic trick and global compactness lemma,we prove the existence of a nontrivial least energy solution.展开更多
Sustainable land management is a pressing challenge in Morocco,where environmental pressures,rapid urbanization,and informal land practices undermine legal frameworks and planning efforts.Despite progress in service d...Sustainable land management is a pressing challenge in Morocco,where environmental pressures,rapid urbanization,and informal land practices undermine legal frameworks and planning efforts.Despite progress in service digitization,land governance remains weakened by inefficiency,overlapping claims,limited environmental oversight,and poor integration between cadastral data and ecological regulations.This paper examines the environmental and institutional shortcomings of Morocco’s land management system and advocates for a shift toward digitally enabled environmental governance.Current weaknesses in administration contribute to urban sprawl,land degradation,and climate vulnerability,particularly in peri-urban and rural zones.A review of legal frameworks and planning instruments reveals gaps in enforcing environmental regulations,protecting sensitive ecosystems,and securing tenure in high-risk areas.To address these challenges,we propose a governance-centered strategy that leverages digital tools—not as technical ends,but as enablers of sustainability.Innovations such as automated verification,spatial planning systems,and simplified registration workflows can enhance the enforcement of zoning laws,prevent unauthorized construction,and facilitate climate-resilient planning.We also assess Morocco’s commitments to environmental goals,including Nationally Determined Contributions and SDGs 11,13,and 15,demonstrating the central role of sustainable land governance in achieving them.The study concludes with a roadmap for institutional reform that balances tenure security,ecological resilience,and equitable land access.Findings aim to guide policymakers,land managers,and planners in Morocco and across the MENA region,offering an integrated and adaptable model that bridges land administration with environmental protection.展开更多
With the evolution of next-generation communication networks,ensuring robust Core Network(CN)architecture and data security has become paramount.This paper addresses critical vulnerabilities in the architecture of CN ...With the evolution of next-generation communication networks,ensuring robust Core Network(CN)architecture and data security has become paramount.This paper addresses critical vulnerabilities in the architecture of CN and data security by proposing a novel framework based on blockchain technology that is specifically designed for communication networks.Traditional centralized network architectures are vulnerable to Distributed Denial of Service(DDoS)attacks,particularly in roaming scenarios where there is also a risk of private data leakage,which imposes significant operational demands.To address these issues,we introduce the Blockchain-Enhanced Core Network Architecture(BECNA)and the Secure Decentralized Identity Authentication Scheme(SDIDAS).The BECNA utilizes blockchain technology to decentralize data storage,enhancing network security,stability,and reliability by mitigating Single Points of Failure(SPoF).The SDIDAS utilizes Decentralized Identity(DID)technology to secure user identity data and streamline authentication in roaming scenarios,significantly reducing the risk of data breaches during cross-network transmissions.Our framework employs Ethereum,free5GC,Wireshark,and UERANSIM tools to create a robust,tamper-evident system model.A comprehensive security analysis confirms substantial improvements in user privacy and network security.Simulation results indicate that our approach enhances communication CNs security and reliability,while also ensuring data security.展开更多
This paper discusses the Bible in relation to the history and culture of the Jewish people along with its place in world culture.Through translation and Christianity its influence extended into the development of lite...This paper discusses the Bible in relation to the history and culture of the Jewish people along with its place in world culture.Through translation and Christianity its influence extended into the development of literacy among many of the language’s world.The biblical promise to Abraham continues today in the reemergence of the Jewish people as a sovereign nation in the land of Israel after two millennia of wandering.While Bible stories and poetry,primarily through the Psalms,inspired creativity in the visual arts,literature,and music throughout in the Western world.展开更多
This paper examines the complex relationship between secular and religious communities in Israel,highlighting the socio-political tensions that arise from competing cultural norms and governance frameworks.Secular Jew...This paper examines the complex relationship between secular and religious communities in Israel,highlighting the socio-political tensions that arise from competing cultural norms and governance frameworks.Secular Jews,who constitute a significant portion of the population,advocate for civil liberties,the separation of religion and state,and the integration of ultra-Orthodox communities into broader society.In contrast,religious groups exert substantial influence within coalition governments,often obstructing the implementation of secular policies and exacerbating political instability.The discussion emphasizes the challenges posed by Israel’s unique legal framework,which intertwines Jewish identity with state governance,thereby complicating the principles of democracy and religious freedom.Key legislation,such as the Law of Return and the Law of the Rabbinical Courts,grants religious authorities substantial control over personal status issues,leading to ongoing disputes over rights and representation.The paper argues for the necessity of egalitarian pluralism as a framework for dialogue,aiming to bridge the divide between secular and religious communities.Fostering mutual respect and understanding is essential for achieving social cohesion and strengthening Israel’s commitment to being both a Jewish and democratic state.展开更多
主题语境:志愿服务篇幅:337词建议用时:6分钟。1 Life after retirement can be isolating,especially for older men who built their identities around their jobs.Jim Isenberg,in his late 70s,experienced this first-hand.He had...主题语境:志愿服务篇幅:337词建议用时:6分钟。1 Life after retirement can be isolating,especially for older men who built their identities around their jobs.Jim Isenberg,in his late 70s,experienced this first-hand.He had a varied career in transportation and family services in White Plains,New York.When he became a grandfather,he wanted to connect with other men at the same stage of life,but found few options for grandfathers.So,he and his friend Frank Williams founded Grandpas United in 2018.展开更多
This work provides a descriptive analysis of the so-called Black American community whose practical consciousness is a result of adopting,and reacting to,both white values and discriminatory terms to constitute their ...This work provides a descriptive analysis of the so-called Black American community whose practical consciousness is a result of adopting,and reacting to,both white values and discriminatory terms to constitute their practical activities and so-called cultural identity.Outside of the practices associated with these values and discriminatory terms,there is no sui generis Black American identity and community with its own form of system and social integration that is different from,or diametrically opposes,the Protestant Ethic and the spirit of capitalism of their white counterparts,which would emerge out of that relationship.展开更多
This study focuses on Chinese social media platforms(Weibo and Douyin),adopting a mixed-methods approach combining quantitative and qualitative research to explore patterns of code-switching in online language and its...This study focuses on Chinese social media platforms(Weibo and Douyin),adopting a mixed-methods approach combining quantitative and qualitative research to explore patterns of code-switching in online language and its role in identity negotiation among internet users.Quantitative analysis of 208 valid questionnaires and subsequent qualitative discourse analysis reveal that 83%of users unconsciously engage in Chinese-English code-switching,primarily demonstrating intra-sentential switching patterns where English words embed as salient“figures”against the Chinese“ground.”Results of the Chi-square test indicate significant correlations between code-switching frequency,types,and users’identity dimensions(p<0.05).Data identified three identity functions:cultural belonging,in-group signaling,and persona curation.The study confirms that code-switching in digital contexts has transcended the level of linguistic efficiency to become an important social infrastructure for internet users to construct their identities.展开更多
This study investigates community identity in Nanjing’s historic Hehuatang community during urban renewal,revealing tensions between heritage preservation and modernization.Through ethnographic research,three key fac...This study investigates community identity in Nanjing’s historic Hehuatang community during urban renewal,revealing tensions between heritage preservation and modernization.Through ethnographic research,three key factors are identified shaping identity:(i)material conditions including series of spatial conflicts around overcrowding,(ii)social tensions such as tenant-aborigine divides and generational misunderstanding,and(iii)institutional governance as top-down policies would exacerbate distrust.Despite 82%of residents expressing place attachment,67%desire relocation due to deteriorating liveability—a paradox highlighting the failure of China’s contemporary performative participation models.The adapted three-layer creativity model underscores the need to reconcile physical renewal with social equity.Findings advocate for co-design processes that integrate resident agency,offering lessons for sustainable urban renewal in rapidly developing contexts.展开更多
A recent study of patient-centered perspectives by Zhao et al,published in the World Journal of Psychiatry,identified key facilitators and barriers that influence insomnia patients’choice of acupuncture therapy,offer...A recent study of patient-centered perspectives by Zhao et al,published in the World Journal of Psychiatry,identified key facilitators and barriers that influence insomnia patients’choice of acupuncture therapy,offering insights for clinical practice and policy-making to enhance the integration of acupuncture therapy into comprehensive insomnia management.While acupuncture demonstrates unique advantages as a complementary medical approach,its broader adoption is hindered by complex multidimensional factors.This paper proposes a“dynamic balance model”encompassing the cultural,economic,and patient-provider trust dimensions,and emphasizes the need for synergistic optimization through cultural narrative transformation,institutional innovation,and digital empowerment.These strategies aim to facilitate the promotion of acupuncture for insomnia treatment and its global expansion.展开更多
Background:The rapid integration of generative artificial intelligence(genAI)into medical education offers significant opportunities for personalized learning,efficiency,and access.However,its implementation also rais...Background:The rapid integration of generative artificial intelligence(genAI)into medical education offers significant opportunities for personalized learning,efficiency,and access.However,its implementation also raises complex ethical concerns that,if unaddressed,may compromise academic integrity,professional identity,and learner equity.This review aimed to identify the primary ethical risks associated with genAI use in medical education and propose solid measures to mitigate these issues.Methods:A structured narrative review was conducted in accordance with the Scale for the Assessment of Narrative Review Articles(SANRA).A focused literature search was performed across PubMed/MEDLINE and Google Scholar for peer-reviewed,English-language articles published from January 2023 to May 2025.Studies were included if they addressed ethical issues in the use of genAI in undergraduate or postgraduate medical education.Data were extracted into related themes,and findings were synthesized into risk and mitigation categories.Results:A total of 27 records were included.Eight principal categories of ethical risks associated with genAI in medical education emerged:(1)academic integrity erosion,(2)cognitive deskilling,(3)algorithmic bias and opacity,(4)privacy and surveillance concerns,(5)moral and humanistic diminishment,(6)faculty role displacement,(7)commercialization and inequity,and(8)legal-regulatory ambiguity.Each risk was matched with targeted mitigation strategies proposed in the literature,including institutional genAI governance frameworks,genAI literacy training,reinforcement of humanistic pedagogy,establishment of ethical oversight bodies,curricular integration of ethical reflexivity,equity-centered implementation policies,faculty development for genAI integration,and transparent data governance protocols.Conclusion:Generative AI presents both transformative promise and substantial ethical risks in medical education.Proactive,ethically grounded integration-guided by institutional oversight,curriculum reform,and equity safeguards-is essential to realize its benefits while protecting the integrity and humanity of medical training.展开更多
We evaluate some series with summands involving a single binomial coefficient(^6k 3k).For example,we prove that■Motivated by Galois theory,we introduce the so-called Duality Principle for irrational series of Ramanu...We evaluate some series with summands involving a single binomial coefficient(^6k 3k).For example,we prove that■Motivated by Galois theory,we introduce the so-called Duality Principle for irrational series of Ramanujan’s type or Zeilberger’s type,and apply it to find 26 new irrational series identities.For example,we conjecture that■where ■for any integer d≡0,1 (mod 4) with (d/k) the Kronecker symbol.展开更多
Automated behavior monitoring of macaques offers transformative potential for advancing biomedical research and animal welfare.However,reliably identifying individual macaques in group environments remains a significa...Automated behavior monitoring of macaques offers transformative potential for advancing biomedical research and animal welfare.However,reliably identifying individual macaques in group environments remains a significant challenge.This study introduces ACE-YOLOX,a lightweight facial recognition model tailored for captive macaques.ACE-YOLOX incorporates Efficient Channel Attention(ECA),Complete Intersection over Union loss(CIoU),and Adaptive Spatial Feature Fusion(ASFF)into the YOLOX framework,enhancing prediction accuracy while reducing computational complexity.These integrated approaches enable effective multiscale feature extraction.Using a dataset comprising 179400 labeled facial images from 1196 macaques,ACE-YOLOX surpassed the performance of classical object detection models,demonstrating superior accuracy and real-time processing capabilities.An Android application was also developed to deploy ACE-YOLOX on smartphones,enabling on-device,real-time macaque recognition.Our experimental results highlight the potential of ACE-YOLOX as a non-invasive identification tool,offering an important foundation for future studies in macaque facial expression recognition,cognitive psychology,and social behavior.展开更多
文摘How is a nation’s embrace of snow and ice shaping a new cultural identity and igniting a multi-trillion-yuan economic boom?ADRIAAN Smit now cannot imagine a life without snowboarding,a passion that has become central to his world.He is excited to witness how winter sports are fostering a new winter culture in China.Listening to Smit speaking so enthusiastically about the slopes,one might assume he was raised in a region where snow sports are a way of life,but the fact is quite the contrary.
文摘The current study examined the roles of collective self-esteem and personal self-esteem in the relationship between national identity and subjective well-being.Participants were 583 Chinese college students(females=49%;mean age=19.25±1.85 years).They completed measures of national identity,collective self-esteem,personal self-esteem,and subjective well-being.Path analysis findings result indicated national identity to influence the students’subjective wellbeing through three pathways:(1)national identity→collective self-esteem→subjective well-being,meaning higher subjective wellbeing with collective self-esteem.(2)national identity→personal self-esteem→subjective well-being,to suggest higher personal self-esteem was associated with subjective wellbeing;(3)national identity→collective selfesteem→personal self-esteem→subjective well-being.Compared to simple mediation models constructed with only personal self-esteem or collective self-esteem as a single mediating variable,the chain mediation model better explains the mediating mechanism of national identity on subjective well-being(the variance explained by the mediating variables increased by 65.38%and 59.26%,respectively).The collective self-esteem and personal self-esteem mediation is consistent with social identity theory,whereby national identity enhances collective self-evaluation,which in turn bolsters personal self-worth and subjective well-being.These findings of the current study offer new insights into how national identity affects subjective well-being in collectivistic culture.
基金This work is part of the‘Intelligent and Cyber-Secure Platform for Adaptive Optimization in the Simultaneous Operation of Heterogeneous Autonomous Robots(PICRAH4.0)’with reference MIG-20232082,funded by MCIN/AEI/10.13039/501100011033supported by the Universidad Internacional de La Rioja(UNIR)through the Precompetitive Research Project entitled“Nuevos Horizontes en Internet de las Cosas y NewSpace(NEWIOT)”,reference PP-2024-13,funded under the 2024 Call for Research Projects.
文摘This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the first proposal to integrate IOTA’s Directed Acyclic Graph(DAG)-based identity framework into satellite IoT environments,enabling lightweight and distributed authentication under intermittent connectivity.The system leverages Decentralized Identifiers(DIDs)and Verifiable Credentials(VCs)over the Tangle,eliminating the need for mining and sequential blocks.An identity management workflow is implemented that supports the creation,validation,deactivation,and reactivation of IoT devices,and is experimentally validated on the Shimmer Testnet.Three metrics are defined and measured:resolution time,deactivation time,and reactivation time.To improve robustness,an algorithmic optimization is introduced that minimizes communication overhead and reduces latency during deactivation.The experimental results are compared with orbital simulations of satellite revisit times to assess operational feasibility.Unlike blockchain-based approaches,which typically suffer from high confirmation delays and scalability constraints,the proposed DAG architecture provides fast,cost-free operations suitable for resource-constrained IoT devices.The results show that authentication can be efficiently performed within satellite connectivity windows,positioning IOTA Identity as a viable solution for secure and scalable IoT authentication in LEO satellite networks.
基金funded by the National Key R&D Program of China under Grant(No.2022YFB3102901)National Natural Science Foundation of China(Nos.62072115,62102094)Shanghai Science and Technology Innovation Action Plan Project(No.22510713600).
文摘User identity linkage(UIL)across online social networks seeks to match accounts belonging to the same real-world individual.This cross-platformmapping enables accurate user modeling but also raises serious privacy risks.Over the past decade,the research community has developed a wide range of UIL methods,from structural embeddings tomultimodal fusion architectures.However,corresponding adversarial and defensive approaches remain fragmented and comparatively understudied.In this survey,we provide a unified overview of both mapping and antimappingmethods for UIL.We categorize representativemappingmodels by learning paradigmand datamodality,and systematically compare them with emerging countermeasures including adversarial injection,structural perturbation,and identity obfuscation.To bridge these two threads,we introduce amodality-oriented taxonomy and a formal gametheoretic framing that casts cross-network mapping as a contest between mappers and anti-mappers.This framing allows us to construct a cross-modality dependency matrix,which reveals structural information as themost contested signal,identifies node injection as the most robust defensive strategy,and points to multimodal integration as a promising direction.Our survey underscores the need for balanced,privacy-preserving identity inference and provides a foundation for future research on the adversarial dynamics of social identity mapping and defense.
基金supported by the NSFC(12301115)the Natural Science Foundation of Huzhou(2023YZ11,2024YZ37)the second author was supported by the NSFC(12071437).
文摘It is well known that the inhomogeneous Calderón-Zygmund convolution operators are bounded on the local Hardy spaces.In this paper,we prove that these operators are bounded on the local product Hardy spaces and the Lipschitz spaces.The key ideas used here are the discrete local Calderón identity and a density argument for the inhomogeneous product Lipschitz spaces in the weak sense.
基金Supported by NSFC(No.12561023)partly by the Provincial Natural Science Foundation of Jiangxi,China(Nos.20232BAB201001,20202BAB211004)。
文摘In this paper,we study the existence of least energy solutions for the following nonlinear fractional Schrodinger–Poisson system{(−∆)^(s)u+V(x)u+φu=f(u)in R^(3),(−∆)^(t)φ=u^(2)in R^(3),where s∈(3/4,1),t∈(0,1).Under some assumptions on V(x)and f,using Nehari–Pohozaev identity and the arguments of Brezis–Nirenberg,the monotonic trick and global compactness lemma,we prove the existence of a nontrivial least energy solution.
文摘Sustainable land management is a pressing challenge in Morocco,where environmental pressures,rapid urbanization,and informal land practices undermine legal frameworks and planning efforts.Despite progress in service digitization,land governance remains weakened by inefficiency,overlapping claims,limited environmental oversight,and poor integration between cadastral data and ecological regulations.This paper examines the environmental and institutional shortcomings of Morocco’s land management system and advocates for a shift toward digitally enabled environmental governance.Current weaknesses in administration contribute to urban sprawl,land degradation,and climate vulnerability,particularly in peri-urban and rural zones.A review of legal frameworks and planning instruments reveals gaps in enforcing environmental regulations,protecting sensitive ecosystems,and securing tenure in high-risk areas.To address these challenges,we propose a governance-centered strategy that leverages digital tools—not as technical ends,but as enablers of sustainability.Innovations such as automated verification,spatial planning systems,and simplified registration workflows can enhance the enforcement of zoning laws,prevent unauthorized construction,and facilitate climate-resilient planning.We also assess Morocco’s commitments to environmental goals,including Nationally Determined Contributions and SDGs 11,13,and 15,demonstrating the central role of sustainable land governance in achieving them.The study concludes with a roadmap for institutional reform that balances tenure security,ecological resilience,and equitable land access.Findings aim to guide policymakers,land managers,and planners in Morocco and across the MENA region,offering an integrated and adaptable model that bridges land administration with environmental protection.
基金supported by the Beijing Natural Science Foundation(L223025,4242003)Qin Xin Talents Cultivation Program of Beijing Information Science&Technology University(QXTCP B202405)。
文摘With the evolution of next-generation communication networks,ensuring robust Core Network(CN)architecture and data security has become paramount.This paper addresses critical vulnerabilities in the architecture of CN and data security by proposing a novel framework based on blockchain technology that is specifically designed for communication networks.Traditional centralized network architectures are vulnerable to Distributed Denial of Service(DDoS)attacks,particularly in roaming scenarios where there is also a risk of private data leakage,which imposes significant operational demands.To address these issues,we introduce the Blockchain-Enhanced Core Network Architecture(BECNA)and the Secure Decentralized Identity Authentication Scheme(SDIDAS).The BECNA utilizes blockchain technology to decentralize data storage,enhancing network security,stability,and reliability by mitigating Single Points of Failure(SPoF).The SDIDAS utilizes Decentralized Identity(DID)technology to secure user identity data and streamline authentication in roaming scenarios,significantly reducing the risk of data breaches during cross-network transmissions.Our framework employs Ethereum,free5GC,Wireshark,and UERANSIM tools to create a robust,tamper-evident system model.A comprehensive security analysis confirms substantial improvements in user privacy and network security.Simulation results indicate that our approach enhances communication CNs security and reliability,while also ensuring data security.
文摘This paper discusses the Bible in relation to the history and culture of the Jewish people along with its place in world culture.Through translation and Christianity its influence extended into the development of literacy among many of the language’s world.The biblical promise to Abraham continues today in the reemergence of the Jewish people as a sovereign nation in the land of Israel after two millennia of wandering.While Bible stories and poetry,primarily through the Psalms,inspired creativity in the visual arts,literature,and music throughout in the Western world.
文摘This paper examines the complex relationship between secular and religious communities in Israel,highlighting the socio-political tensions that arise from competing cultural norms and governance frameworks.Secular Jews,who constitute a significant portion of the population,advocate for civil liberties,the separation of religion and state,and the integration of ultra-Orthodox communities into broader society.In contrast,religious groups exert substantial influence within coalition governments,often obstructing the implementation of secular policies and exacerbating political instability.The discussion emphasizes the challenges posed by Israel’s unique legal framework,which intertwines Jewish identity with state governance,thereby complicating the principles of democracy and religious freedom.Key legislation,such as the Law of Return and the Law of the Rabbinical Courts,grants religious authorities substantial control over personal status issues,leading to ongoing disputes over rights and representation.The paper argues for the necessity of egalitarian pluralism as a framework for dialogue,aiming to bridge the divide between secular and religious communities.Fostering mutual respect and understanding is essential for achieving social cohesion and strengthening Israel’s commitment to being both a Jewish and democratic state.
文摘主题语境:志愿服务篇幅:337词建议用时:6分钟。1 Life after retirement can be isolating,especially for older men who built their identities around their jobs.Jim Isenberg,in his late 70s,experienced this first-hand.He had a varied career in transportation and family services in White Plains,New York.When he became a grandfather,he wanted to connect with other men at the same stage of life,but found few options for grandfathers.So,he and his friend Frank Williams founded Grandpas United in 2018.
文摘This work provides a descriptive analysis of the so-called Black American community whose practical consciousness is a result of adopting,and reacting to,both white values and discriminatory terms to constitute their practical activities and so-called cultural identity.Outside of the practices associated with these values and discriminatory terms,there is no sui generis Black American identity and community with its own form of system and social integration that is different from,or diametrically opposes,the Protestant Ethic and the spirit of capitalism of their white counterparts,which would emerge out of that relationship.
文摘This study focuses on Chinese social media platforms(Weibo and Douyin),adopting a mixed-methods approach combining quantitative and qualitative research to explore patterns of code-switching in online language and its role in identity negotiation among internet users.Quantitative analysis of 208 valid questionnaires and subsequent qualitative discourse analysis reveal that 83%of users unconsciously engage in Chinese-English code-switching,primarily demonstrating intra-sentential switching patterns where English words embed as salient“figures”against the Chinese“ground.”Results of the Chi-square test indicate significant correlations between code-switching frequency,types,and users’identity dimensions(p<0.05).Data identified three identity functions:cultural belonging,in-group signaling,and persona curation.The study confirms that code-switching in digital contexts has transcended the level of linguistic efficiency to become an important social infrastructure for internet users to construct their identities.
基金Sponsored by The National Social Science Fundation of China(24BGL216).
文摘This study investigates community identity in Nanjing’s historic Hehuatang community during urban renewal,revealing tensions between heritage preservation and modernization.Through ethnographic research,three key factors are identified shaping identity:(i)material conditions including series of spatial conflicts around overcrowding,(ii)social tensions such as tenant-aborigine divides and generational misunderstanding,and(iii)institutional governance as top-down policies would exacerbate distrust.Despite 82%of residents expressing place attachment,67%desire relocation due to deteriorating liveability—a paradox highlighting the failure of China’s contemporary performative participation models.The adapted three-layer creativity model underscores the need to reconcile physical renewal with social equity.Findings advocate for co-design processes that integrate resident agency,offering lessons for sustainable urban renewal in rapidly developing contexts.
基金Supported by the National Natural Science Foundation of China,No.82474207 and No.82405087Guangdong Basic and Applied Basic Research Foundation of China,No.2024A1515011014,No.2025A1515010371 and No.2025A1515012912+2 种基金Youth Science and Technology Talent Support Project of Jinan University Science and Technology Association,No.21624222the Fundamental Research Funds for the Central Universities,No.21624360the Research Fund Program of Guangdong Provincial Key Laboratory of Speed Capability Research,No.2023B1212010009.
文摘A recent study of patient-centered perspectives by Zhao et al,published in the World Journal of Psychiatry,identified key facilitators and barriers that influence insomnia patients’choice of acupuncture therapy,offering insights for clinical practice and policy-making to enhance the integration of acupuncture therapy into comprehensive insomnia management.While acupuncture demonstrates unique advantages as a complementary medical approach,its broader adoption is hindered by complex multidimensional factors.This paper proposes a“dynamic balance model”encompassing the cultural,economic,and patient-provider trust dimensions,and emphasizes the need for synergistic optimization through cultural narrative transformation,institutional innovation,and digital empowerment.These strategies aim to facilitate the promotion of acupuncture for insomnia treatment and its global expansion.
文摘Background:The rapid integration of generative artificial intelligence(genAI)into medical education offers significant opportunities for personalized learning,efficiency,and access.However,its implementation also raises complex ethical concerns that,if unaddressed,may compromise academic integrity,professional identity,and learner equity.This review aimed to identify the primary ethical risks associated with genAI use in medical education and propose solid measures to mitigate these issues.Methods:A structured narrative review was conducted in accordance with the Scale for the Assessment of Narrative Review Articles(SANRA).A focused literature search was performed across PubMed/MEDLINE and Google Scholar for peer-reviewed,English-language articles published from January 2023 to May 2025.Studies were included if they addressed ethical issues in the use of genAI in undergraduate or postgraduate medical education.Data were extracted into related themes,and findings were synthesized into risk and mitigation categories.Results:A total of 27 records were included.Eight principal categories of ethical risks associated with genAI in medical education emerged:(1)academic integrity erosion,(2)cognitive deskilling,(3)algorithmic bias and opacity,(4)privacy and surveillance concerns,(5)moral and humanistic diminishment,(6)faculty role displacement,(7)commercialization and inequity,and(8)legal-regulatory ambiguity.Each risk was matched with targeted mitigation strategies proposed in the literature,including institutional genAI governance frameworks,genAI literacy training,reinforcement of humanistic pedagogy,establishment of ethical oversight bodies,curricular integration of ethical reflexivity,equity-centered implementation policies,faculty development for genAI integration,and transparent data governance protocols.Conclusion:Generative AI presents both transformative promise and substantial ethical risks in medical education.Proactive,ethically grounded integration-guided by institutional oversight,curriculum reform,and equity safeguards-is essential to realize its benefits while protecting the integrity and humanity of medical training.
基金Supported by the National Natural Science Foundation of China(Grant No.12371004)。
文摘We evaluate some series with summands involving a single binomial coefficient(^6k 3k).For example,we prove that■Motivated by Galois theory,we introduce the so-called Duality Principle for irrational series of Ramanujan’s type or Zeilberger’s type,and apply it to find 26 new irrational series identities.For example,we conjecture that■where ■for any integer d≡0,1 (mod 4) with (d/k) the Kronecker symbol.
基金supported by the grants from Yunnan Province(202305AH340006,202305AH340007)CAS Light of West China Program(xbzg-zdsys-202213)。
文摘Automated behavior monitoring of macaques offers transformative potential for advancing biomedical research and animal welfare.However,reliably identifying individual macaques in group environments remains a significant challenge.This study introduces ACE-YOLOX,a lightweight facial recognition model tailored for captive macaques.ACE-YOLOX incorporates Efficient Channel Attention(ECA),Complete Intersection over Union loss(CIoU),and Adaptive Spatial Feature Fusion(ASFF)into the YOLOX framework,enhancing prediction accuracy while reducing computational complexity.These integrated approaches enable effective multiscale feature extraction.Using a dataset comprising 179400 labeled facial images from 1196 macaques,ACE-YOLOX surpassed the performance of classical object detection models,demonstrating superior accuracy and real-time processing capabilities.An Android application was also developed to deploy ACE-YOLOX on smartphones,enabling on-device,real-time macaque recognition.Our experimental results highlight the potential of ACE-YOLOX as a non-invasive identification tool,offering an important foundation for future studies in macaque facial expression recognition,cognitive psychology,and social behavior.