Under the influence of human activities,landscape fragmentation in the Wei River Basin(WRB)has become increasingly severe.Upstream development has intensified soil erosion,and industrial and agricultural pollution in ...Under the influence of human activities,landscape fragmentation in the Wei River Basin(WRB)has become increasingly severe.Upstream development has intensified soil erosion,and industrial and agricultural pollution in the middle reaches has degraded water quality.Rapid urbanization has further caused habitat fragmentation and biodiversity loss.Collectively,these challenges threaten human well-being and hinder sustainable development,making the construction and optimization of an ecological security pattern(ESP)urgently necessary.However,existing studies often fail to systematically integrate future landscape ecological risk(LER)assessment with ESP optimization.This study evaluated regional LER using the“ecological patches-ecological resistance surface(ERS)-ecological corridor”framework,combined with land-use predictions under three development scenarios,and optimized the ESP by adjusting the ERS and extracting ecological corridors.The results indicate that the LER in the WRB follows an“inverted N”distribution,with low-risk areas concentrated in forested mountain regions and high-risk areas mainly in cultivated land subject to intensive human activity.Across future scenarios,ESPs showed fewer ecological breakpoints and improved landscape connectivity than the 2020 baseline.Scenario-based differences emerged in the spatial configuration of ERS adjustments,with the ecological protection scenario yielding the lowest LER and most favorable ESP.This study demonstrates the deep integration of multi-scenario simulation with LER assessment,providing a new framework for ESP optimization.The findings have guiding significance for ecological protection and coordinated development in the WRB and offer a novel paradigm for sustainable development in ecologically fragile basins worldwide.展开更多
The simultaneous transmitting and reflecting reconfigurable intelligent surface(STAR-RIS)can independently adjust surface’s reflection and transmission coefficients so as to enhance space coverage.For a multiple-inpu...The simultaneous transmitting and reflecting reconfigurable intelligent surface(STAR-RIS)can independently adjust surface’s reflection and transmission coefficients so as to enhance space coverage.For a multiple-input multiple-output(MIMO)communication system with a STAR-RIS,a base station(BS),an eavesdropper,and multiple users,the system security rate is studied.A joint design of the power allocation at the transmitter and phase shift matrices for reflection and transmission at the STAR-RIS is conducted,in order to maximize the worst achievable security data rate(ASDR).Since the problem is nonconvex and hence challenging,a particle swarm optimization(PSO)based algorithm is developed to tackle the problem.Both the cases of continuous and discrete phase shift matrices at the STAR-RIS are considered.Simulation results demonstrate the effectiveness of the proposed algorithm and shows the benefits of using STAR-RIS in MIMO mutliuser systems.展开更多
In the rapidly evolving technological landscape,state-owned enterprises(SOEs)encounter significant challenges in sustaining their competitiveness through efficient R&D management.Integrated Product Development(IPD...In the rapidly evolving technological landscape,state-owned enterprises(SOEs)encounter significant challenges in sustaining their competitiveness through efficient R&D management.Integrated Product Development(IPD),with its emphasis on cross-functional teamwork,concurrent engineering,and data-driven decision-making,has been widely recognized for enhancing R&D efficiency and product quality.However,the unique characteristics of SOEs pose challenges to the effective implementation of IPD.The advancement of big data and artificial intelligence technologies offers new opportunities for optimizing IPD R&D management through data-driven decision-making models.This paper constructs and validates a data-driven decision-making model tailored to the IPD R&D management of SOEs.By integrating data mining,machine learning,and other advanced analytical techniques,the model serves as a scientific and efficient decision-making tool.It aids SOEs in optimizing R&D resource allocation,shortening product development cycles,reducing R&D costs,and improving product quality and innovation.Moreover,this study contributes to a deeper theoretical understanding of the value of data-driven decision-making in the context of IPD.展开更多
In tunnel construction,tunnel boring machine(TBM)tunnelling typically relies on manual experience with sub-optimal control parameters,which can easily lead to inefficiency and high costs.This study proposed an intelli...In tunnel construction,tunnel boring machine(TBM)tunnelling typically relies on manual experience with sub-optimal control parameters,which can easily lead to inefficiency and high costs.This study proposed an intelligent decision-making method for TBM tunnelling control parameters based on multiobjective optimization(MOO).First,the effective TBM operation dataset is obtained through data preprocessing of the Songhua River(YS)tunnel project in China.Next,the proposed method begins with developing machine learning models for predicting TBM tunnelling performance parameters(i.e.total thrust and cutterhead torque),rock mass classification,and hazard risks(i.e.tunnel collapse and shield jamming).Then,considering three optimal objectives,(i.e.,penetration rate,rock-breaking energy consumption,and cutterhead hob wear),the MOO framework and corresponding mathematical expression are established.The Pareto optimal front is solved using DE-NSGA-II algorithm.Finally,the optimal control parameters(i.e.,advance rate and cutterhead rotation speed)are obtained by the satisfactory solution determination criterion,which can balance construction safety and efficiency with satisfaction.Furthermore,the proposed method is validated through 50 cases of TBM tunnelling,showing promising potential of application.展开更多
The blockchain trilemma—balancing decentralization,security,and scalability—remains a critical challenge in distributed ledger technology.Despite significant advancements,achieving all three attributes simultaneousl...The blockchain trilemma—balancing decentralization,security,and scalability—remains a critical challenge in distributed ledger technology.Despite significant advancements,achieving all three attributes simultaneously continues to elude most blockchain systems,often forcing trade-offs that limit their real-world applicability.This review paper synthesizes current research efforts aimed at resolving the trilemma,focusing on innovative consensus mechanisms,sharding techniques,layer-2 protocols,and hybrid architectural models.We critically analyze recent breakthroughs,including Directed Acyclic Graph(DAG)-based structures,cross-chain interoperability frameworks,and zero-knowledge proof(ZKP)enhancements,which aimto reconcile scalability with robust security and decentralization.Furthermore,we evaluate the trade-offs inherent in these approaches,highlighting their practical implications for enterprise adoption,decentralized finance(DeFi),and Web3 ecosystems.By mapping the evolving landscape of solutions,this review identifies gaps in currentmethodologies and proposes future research directions,such as adaptive consensus algorithms and artificial intelligence-driven(AI-driven)governance models.Our analysis underscores that while no universal solution exists,interdisciplinary innovations are progressively narrowing the trilemma’s constraints,paving the way for next-generation blockchain infrastructures.展开更多
The rapid evolution of wireless technologies and the advent of 6G networks present new challenges and opportunities for Internet ofThings(IoT)applications,particularly in terms of ultra-reliable,secure,and energyeffic...The rapid evolution of wireless technologies and the advent of 6G networks present new challenges and opportunities for Internet ofThings(IoT)applications,particularly in terms of ultra-reliable,secure,and energyefficient communication.This study explores the integration of Reconfigurable Intelligent Surfaces(RIS)into IoT networks to enhance communication performance.Unlike traditional passive reflector-based approaches,RIS is leveraged as an active optimization tool to improve both backscatter and direct communication modes,addressing critical IoT challenges such as energy efficiency,limited communication range,and double-fading effects in backscatter communication.We propose a novel computational framework that combines RIS functionality with Physical Layer Security(PLS)mechanisms,optimized through the algorithm known as Deep Deterministic Policy Gradient(DDPG).This framework adaptively adapts RIS configurations and transmitter beamforming to reduce key challenges,including imperfect channel state information(CSI)and hardware limitations like quantized RIS phase shifts.By optimizing both RIS settings and beamforming in real-time,our approach outperforms traditional methods by significantly increasing secrecy rates,improving spectral efficiency,and enhancing energy efficiency.Notably,this framework adapts more effectively to the dynamic nature of wireless channels compared to conventional optimization techniques,providing scalable solutions for large-scale RIS deployments.Our results demonstrate substantial improvements in communication performance setting a new benchmark for secure,efficient and scalable 6G communication.This work offers valuable insights for the future of IoT networks,with a focus on computational optimization,high spectral efficiency and energy-aware operations.展开更多
The rapid advancement of quantum computing has sparked a considerable increase in research attention to quantum technologies.These advances span fundamental theoretical inquiries into quantum information and the explo...The rapid advancement of quantum computing has sparked a considerable increase in research attention to quantum technologies.These advances span fundamental theoretical inquiries into quantum information and the exploration of diverse applications arising from this evolving quantum computing paradigm.The scope of the related research is notably diverse.This paper consolidates and presents quantum computing research related to the financial sector.The finance applications considered in this study include portfolio optimization,fraud detection,and Monte Carlo methods for derivative pricing and risk calculation.In addition,we provide a comprehensive analysis of quantum computing’s applications and effects on blockchain technologies,particularly in relation to cryptocurrencies,which are central to financial technology research.As discussed in this study,quantum computing applications in finance are based on fundamental quantum physics principles and key quantum algorithms.This review aims to bridge the research gap between quantum computing and finance.We adopt a two-fold methodology,involving an analysis of quantum algorithms,followed by a discussion of their applications in specific financial contexts.Our study is based on an extensive review of online academic databases,search tools,online journal repositories,and whitepapers from 1952 to 2023,including CiteSeerX,DBLP,Research-Gate,Semantic Scholar,and scientific conference publications.We present state-of-theart findings at the intersection of finance and quantum technology and highlight open research questions that will be valuable for industry practitioners and academicians as they shape future research agendas.展开更多
Combining the heuristic algorithm (HA) developed based on the specific knowledge of the cooperative multiple target attack (CMTA) tactics and the particle swarm optimization (PSO), a heuristic particle swarm opt...Combining the heuristic algorithm (HA) developed based on the specific knowledge of the cooperative multiple target attack (CMTA) tactics and the particle swarm optimization (PSO), a heuristic particle swarm optimization (HPSO) algorithm is proposed to solve the decision-making (DM) problem. HA facilitates to search the local optimum in the neighborhood of a solution, while the PSO algorithm tends to explore the search space for possible solutions. Combining the advantages of HA and PSO, HPSO algorithms can find out the global optimum quickly and efficiently. It obtains the DM solution by seeking for the optimal assignment of missiles of friendly fighter aircrafts (FAs) to hostile FAs. Simulation results show that the proposed algorithm is superior to the general PSO algorithm and two GA based algorithms in searching for the best solution to the DM problem.展开更多
Reinforcement learning(RL)has been widely studied as an efficient class of machine learning methods for adaptive optimal control under uncertainties.In recent years,the applications of RL in optimised decision-making ...Reinforcement learning(RL)has been widely studied as an efficient class of machine learning methods for adaptive optimal control under uncertainties.In recent years,the applications of RL in optimised decision-making and motion control of intelligent vehicles have received increasing attention.Due to the complex and dynamic operating environments of intelligent vehicles,it is necessary to improve the learning efficiency and generalisation ability of RL-based decision and control algorithms under different conditions.This survey systematically examines the theoretical foundations,algorithmic advancements and practical challenges of applying RL to intelligent vehicle systems operating in complex and dynamic environments.The major algorithm frameworks of RL are first introduced,and the recent advances in RL-based decision-making and control of intelligent vehicles are overviewed.In addition to self-learning decision and control approaches using state measurements,the developments of DRL methods for end-to-end driving control of intelligent vehicles are summarised.The open problems and directions for further research works are also discussed.展开更多
Ecological security is a vital problem that people all over the world today have to face and solve, and the situation of ecological security is getting more and more severe and has begun to impede heavily the sustaina...Ecological security is a vital problem that people all over the world today have to face and solve, and the situation of ecological security is getting more and more severe and has begun to impede heavily the sustainable development of social economy. Ecological environment pre-warning has become a hotspot for the modern environment science. This paper introduces the theories of ecological security pre-warning and tries to constitute a pre-warning model of ecological security. In terms of pressure-state-response model, the pre-warning guide line of ecological security is constructed while the pre-warning degree judging model of ecological security is established based on fuzzy optimization. As a case, the model is used to assess the present condition pre-warning of the ecological security of Anhui Province. The result is in correspondence with the real condition: the ecological security situations of 8 cities are dangerous and 9 cities are secure. The result shows that this model is scientific and effective for regional ecological security pre-warning.展开更多
Protecting Supervisory Control and Data Acquisition-Industrial Internet of Things(SCADA-IIoT)systems against intruders has become essential since industrial control systems now oversee critical infrastructure,and cybe...Protecting Supervisory Control and Data Acquisition-Industrial Internet of Things(SCADA-IIoT)systems against intruders has become essential since industrial control systems now oversee critical infrastructure,and cyber attackers more frequently target these systems.Due to their connection of physical assets with digital networks,SCADA-IIoT systems face substantial risks from multiple attack types,including Distributed Denial of Service(DDoS),spoofing,and more advanced intrusion methods.Previous research in this field faces challenges due to insufficient solutions,as current intrusion detection systems lack the necessary accuracy,scalability,and adaptability needed for IIoT environments.This paper introduces CyberFortis,a novel cybersecurity framework aimed at detecting and preventing cyber threats in SCADA-IIoT systems.CyberFortis presents two key innovations:Firstly,Siamese Double Deep Q-Network with Autoencoders(Siamdqn-AE)FusionNet,which enhances intrusion detection by combining deep Q-Networks with autoencoders for improved attack detection and feature extraction;and secondly,the PopHydra Optimiser,an innovative solution to compute reinforcement learning discount factors for better model performance and convergence.This method combines Siamese deep Q-Networks with autoencoders to create a system that can detect different types of attacks more effectively and adapt to new challenges.CyberFortis is better than current top attack detection systems,showing higher scores in important areas like accuracy,precision,recall,and F1-score,based on data from CICIoT 2023,UNSW-NB 15,and WUSTL-IIoT datasets.Results from the proposed framework show a 97.5%accuracy rate,indicating its potential as an effective solution for SCADA-IIoT cybersecurity against emerging threats.The research confirms that the proposed security and resilience methods are successful in protecting vital industrial control systems within their operational environments.展开更多
Cyber-physical systems(CPS)represent a sophisticated integration of computational and physical components that power critical applications such as smart manufacturing,healthcare,and autonomous infrastructure.However,t...Cyber-physical systems(CPS)represent a sophisticated integration of computational and physical components that power critical applications such as smart manufacturing,healthcare,and autonomous infrastructure.However,their extensive reliance on internet connectivity makes them increasingly susceptible to cyber threats,potentially leading to operational failures and data breaches.Furthermore,CPS faces significant threats related to unauthorized access,improper management,and tampering of the content it generates.In this paper,we propose an intrusion detection system(IDS)optimized for CPS environments using a hybrid approach by combining a natureinspired feature selection scheme,such as Grey Wolf Optimization(GWO),in connection with the emerging Light Gradient Boosting Machine(LightGBM)classifier,named as GWO-LightGBM.While gradient boosting methods have been explored in prior IDS research,our novelty lies in proposing a hybrid approach targeting CPS-specific operational constraints,such as low-latency response and accurate detection of rare and critical attack types.We evaluate GWO-LightGBM against GWO-XGBoost,GWO-CatBoost,and an artificial neural network(ANN)baseline using the NSL-KDD and CIC-IDS-2017 benchmark datasets.The proposed models are assessed across multiple metrics,including accuracy,precision,recall,and F1-score,with an emphasis on class-wise performance and training efficiency.The proposed GWO-LightGBM model achieves the highest overall accuracy(99.73%)for NSL-KDD and(99.61%)for CIC-IDS-2017,demonstrating superior performance in detecting minority classes such as Remote-to-Local(R2L)and Other attacks—commonly overlooked by other classifiers.Moreover,the proposed model consumes lower training time,highlighting its practical feasibility and scalability for real-time CPS deployment.展开更多
Security is an important component in the process of developing healthcare web applications.We need to ensure security maintenance;therefore the analysis of healthcare web application’s security risk is of utmost imp...Security is an important component in the process of developing healthcare web applications.We need to ensure security maintenance;therefore the analysis of healthcare web application’s security risk is of utmost importance.Properties must be considered to minimise the security risk.Additionally,security risk management activities are revised,prepared,implemented,tracked,and regularly set up efficiently to design the security of healthcare web applications.Managing the security risk of a healthcare web application must be considered as the key component.Security is,in specific,seen as an add-on during the development process of healthcare web applications,but not as the key problem.Researchers must ensure that security is taken into account right from the earlier developmental stages of the healthcare web application.In this row,the authors of this study have used the hesitant fuzzy-based AHP-TOPSIS technique to estimate the risks of various healthcare web applications for improving security-durability.This approach would help to design and incorporate security features in healthcare web applications that would be able to battle threats on their own,and not depend solely on the external security of healthcare web applications.Furthermore,in terms of healthcare web application’s security-durability,the security risk variable is measured,and vice versa.Hence,the findings of our study will also be useful in improving the durability of several web applications in healthcare.展开更多
Unmanned aerial vehicles(UAVs)bring more innovation and attraction to outdoor mobile high-definition(HD)live streaming with its unique perspective.Due to the heavy computational requirements of HD live broadcast tasks...Unmanned aerial vehicles(UAVs)bring more innovation and attraction to outdoor mobile high-definition(HD)live streaming with its unique perspective.Due to the heavy computational requirements of HD live broadcast tasks and the limited hardware performance of UAV equipment,how to reduce the system response delay and improve the energy efficiency of terminal equipment directly affects the secure broadcast of the system.Secure task offloading in this scenario is considered a promising solution and has received academic attention.In this paper,we simulate the UAV-aided outdoor mobile HD live streaming scenarios and optimize the relevant task offloading strategies.First,we design the total cost function of task offloading that jointly optimizes secure time latency and energy consumption.Additionally,we propose a collaborative computing model for multi-UAV task offloading.This model combines the idea of simulated annealing(SA)and introduces the compression factor to enhance the particle swarm optimization(PSO)to realize secure task offloading.The simulation results show that the proposed strategy has better performance in balancing network latency and energy consumption.Compared with the discrete teaching–learning-based optimization(DTLBO)and quantum PSO(QPSO)task offloading strategies,the fitness value of the proposed strategy is decreased by an average of 26.73%and 16.42%,respectively.展开更多
Digital image security is a fundamental and tedious process on shared communication channels.Several methods have been employed for accomplishing security on digital image transmission,such as encryption,steganography...Digital image security is a fundamental and tedious process on shared communication channels.Several methods have been employed for accomplishing security on digital image transmission,such as encryption,steganography,and watermarking.Image stenography and encryption are commonly used models to achieve improved security.Besides,optimal pixel selection process(OPSP)acts as a vital role in the encryption process.With this motivation,this study designs a new competitive swarmoptimization with encryption based stenographic technique for digital image security,named CSOES-DIS technique.The proposed CSOES-DIS model aims to encrypt the secret image prior to the embedding process.In addition,the CSOES-DIS model applies a double chaotic digital image encryption(DCDIE)technique to encrypt the secret image,and then embedding method was implemented.Also,the OPSP can be carried out by the design of CSO algorithm and thereby increases the secrecy level.In order to portray the enhanced outcomes of the CSOES-DIS model,a comparative examination with recent methods is performed and the results reported the betterment of the CSOES-DIS model based on different measures.展开更多
Energy consumption in data centers has grown out of proportion in regard to the state of energy that’s available in the universe. Technology has improved services and its application. The need for eco-friendly energy...Energy consumption in data centers has grown out of proportion in regard to the state of energy that’s available in the universe. Technology has improved services and its application. The need for eco-friendly energy and increase in data centers performance brought about Green Computing into the energy consumption of data centers. Information technology has grown and eaten deep into the society that almost all the sectors if not all are dependent on information technology to move on. The consumption of power has increased greatly. In this research paper the techniques for optimizing energy in data centers for Green Computing would be discussed. This study intends to expose the limitations of existing security solutions for securing data centers by taking into consideration of limitations of existing security frameworks that cannot enhance the security of data centers.展开更多
Using the dynamic optimization theory, we described a decision-making model for farmer choosing land use when there are several different kinds of uses for land. To obtain an empirical model that could be easily appli...Using the dynamic optimization theory, we described a decision-making model for farmer choosing land use when there are several different kinds of uses for land. To obtain an empirical model that could be easily applied, decision rules for farmer with a single static expectation were given.展开更多
This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)node...This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)nodes harvest energy from radio frequency signals of a multi-antenna power beacon.Two SN sources exchange their messages via a SN decode-and-forward relay in the presence of a multiantenna eavesdropper by using a four-phase time division broadcast protocol,and the hardware impairments of SN nodes and eavesdropper are modeled.To alleviate eavesdropping attacks,the artificial noise is applied by SN nodes.The physical layer security performance of SN is analyzed and evaluated by the exact closed-form expressions of outage probability(OP),intercept probability(IP),and OP+IP over quasistatic Rayleigh fading channel.Additionally,due to the complexity of OP+IP expression,a self-adaptive chaotic quantum particle swarm optimization-based resource allocation algorithm is proposed to jointly optimize energy harvesting ratio and power allocation factor,which can achieve security-reliability tradeoff for SN.Extensive simulations demonstrate the correctness of theoretical analysis and the effectiveness of the proposed optimization algorithm.展开更多
The main aim of this work is to improve the security of data hiding forsecret image sharing. The privacy and security of digital information have becomea primary concern nowadays due to the enormous usage of digital t...The main aim of this work is to improve the security of data hiding forsecret image sharing. The privacy and security of digital information have becomea primary concern nowadays due to the enormous usage of digital technology.The security and the privacy of users’ images are ensured through reversible datahiding techniques. The efficiency of the existing data hiding techniques did notprovide optimum performance with multiple end nodes. These issues are solvedby using Separable Data Hiding and Adaptive Particle Swarm Optimization(SDHAPSO) algorithm to attain optimal performance. Image encryption, dataembedding, data extraction/image recovery are the main phases of the proposedapproach. DFT is generally used to extract the transform coefficient matrix fromthe original image. DFT coefficients are in float format, which assists in transforming the image to integral format using the round function. After obtainingthe encrypted image by data-hider, additional data embedding is formulated intohigh-frequency coefficients. The proposed SDHAPSO is mainly utilized for performance improvement through optimal pixel location selection within the imagefor secret bits concealment. In addition, the secret data embedding capacityenhancement is focused on image visual quality maintenance. Hence, it isobserved from the simulation results that the proposed SDHAPSO techniqueoffers high-level security outcomes with respect to higher PSNR, security level,lesser MSE and higher correlation than existing techniques. Hence, enhancedsensitive information protection is attained, which improves the overall systemperformance.展开更多
In the real situations of supply chain, there are different parts such as facilities, logistics warehouses and retail stores and they handle common kinds of products. In this research, these situations are focused on ...In the real situations of supply chain, there are different parts such as facilities, logistics warehouses and retail stores and they handle common kinds of products. In this research, these situations are focused on as the background of this research. They deal with the common quantities of their products, but due to their different environments, the optimal production quantity of one part can be unacceptable to another part and it may suffer a heavy loss. To avoid that kind of unacceptable situations, the common production quantities should be acceptable to all parts in one supply chain. Therefore, the motivation of this research is the necessity of the method to find the production quantities that make all decision makers acceptable is needed. However, it is difficult to find the production quantities that make all decision makers acceptable. Moreover, their acceptable ranges do not always have common ranges. In the decision making of car design, there are similar situations to this type of decision making. The performance of a car consists of purposes such as fuel efficiency, size and so on. Improving one purpose makes another worse and the relationship between these purposes is tradeoff. In these cases, Suriawase process is applied. This process consists of negotiations and reviews of the requirements of the purposes. In the step of negotiations, the requirements of the purposes are share among all decision makers and the solution that makes them as satisfied as possible. In the step of reviews of the requirements, they are reviewed based on the result of the negotiation if the result is unacceptable to some of decision makers. Therefore, through the iterations of the two steps, the solution that makes all decision makers satisfied is obtained. However, in the previous research, the effects that one decision maker reviews requirements in Suriawase process are quantified, but the mathematical model to modify the ranges of production quantities of all decision makers simultaneously is not shown. Therefore, in this research, based on Suriawase process, the mathematical model of multi-player multi-objective decision making is proposed. The mathematical model of multi-player multi-objective decision making by using linear physical programming (LPP) and robust optimization (RO) in the previous research is the basis of the methods of this research. LPP is one of the multi-objective optimization methods and RO is used to make the balance of the preference levels among decision makers. In LPP, the preference ranges of all objective functions are needed, so as the hypothesis of this research. In the research referred in this research, the method to control the effect of RO is not shown. If the effect of RO is too big, the average of the preference level becomes worse. The purpose of this research is to reproduce the mathematical model of multi-player multi-objective decision making based on Suriawase process and propose the method to control the effect of RO. In the proposed model, a set of the solutions of the negotiation problem is obtained and it is proved by the result of the numerical experiment. Therefore, the conclusion that the proposed model is available to obtain a set of the solutions of the negotiation problems in supply chain.展开更多
基金supported by the National Natural Science Foundation of China[Grant No.42361040].
文摘Under the influence of human activities,landscape fragmentation in the Wei River Basin(WRB)has become increasingly severe.Upstream development has intensified soil erosion,and industrial and agricultural pollution in the middle reaches has degraded water quality.Rapid urbanization has further caused habitat fragmentation and biodiversity loss.Collectively,these challenges threaten human well-being and hinder sustainable development,making the construction and optimization of an ecological security pattern(ESP)urgently necessary.However,existing studies often fail to systematically integrate future landscape ecological risk(LER)assessment with ESP optimization.This study evaluated regional LER using the“ecological patches-ecological resistance surface(ERS)-ecological corridor”framework,combined with land-use predictions under three development scenarios,and optimized the ESP by adjusting the ERS and extracting ecological corridors.The results indicate that the LER in the WRB follows an“inverted N”distribution,with low-risk areas concentrated in forested mountain regions and high-risk areas mainly in cultivated land subject to intensive human activity.Across future scenarios,ESPs showed fewer ecological breakpoints and improved landscape connectivity than the 2020 baseline.Scenario-based differences emerged in the spatial configuration of ERS adjustments,with the ecological protection scenario yielding the lowest LER and most favorable ESP.This study demonstrates the deep integration of multi-scenario simulation with LER assessment,providing a new framework for ESP optimization.The findings have guiding significance for ecological protection and coordinated development in the WRB and offer a novel paradigm for sustainable development in ecologically fragile basins worldwide.
文摘The simultaneous transmitting and reflecting reconfigurable intelligent surface(STAR-RIS)can independently adjust surface’s reflection and transmission coefficients so as to enhance space coverage.For a multiple-input multiple-output(MIMO)communication system with a STAR-RIS,a base station(BS),an eavesdropper,and multiple users,the system security rate is studied.A joint design of the power allocation at the transmitter and phase shift matrices for reflection and transmission at the STAR-RIS is conducted,in order to maximize the worst achievable security data rate(ASDR).Since the problem is nonconvex and hence challenging,a particle swarm optimization(PSO)based algorithm is developed to tackle the problem.Both the cases of continuous and discrete phase shift matrices at the STAR-RIS are considered.Simulation results demonstrate the effectiveness of the proposed algorithm and shows the benefits of using STAR-RIS in MIMO mutliuser systems.
文摘In the rapidly evolving technological landscape,state-owned enterprises(SOEs)encounter significant challenges in sustaining their competitiveness through efficient R&D management.Integrated Product Development(IPD),with its emphasis on cross-functional teamwork,concurrent engineering,and data-driven decision-making,has been widely recognized for enhancing R&D efficiency and product quality.However,the unique characteristics of SOEs pose challenges to the effective implementation of IPD.The advancement of big data and artificial intelligence technologies offers new opportunities for optimizing IPD R&D management through data-driven decision-making models.This paper constructs and validates a data-driven decision-making model tailored to the IPD R&D management of SOEs.By integrating data mining,machine learning,and other advanced analytical techniques,the model serves as a scientific and efficient decision-making tool.It aids SOEs in optimizing R&D resource allocation,shortening product development cycles,reducing R&D costs,and improving product quality and innovation.Moreover,this study contributes to a deeper theoretical understanding of the value of data-driven decision-making in the context of IPD.
基金supported by the National Natural Science Foundation of China(Grant No.52179105)China Postdoctoral Science Foundation(Grant No.2024M762193)。
文摘In tunnel construction,tunnel boring machine(TBM)tunnelling typically relies on manual experience with sub-optimal control parameters,which can easily lead to inefficiency and high costs.This study proposed an intelligent decision-making method for TBM tunnelling control parameters based on multiobjective optimization(MOO).First,the effective TBM operation dataset is obtained through data preprocessing of the Songhua River(YS)tunnel project in China.Next,the proposed method begins with developing machine learning models for predicting TBM tunnelling performance parameters(i.e.total thrust and cutterhead torque),rock mass classification,and hazard risks(i.e.tunnel collapse and shield jamming).Then,considering three optimal objectives,(i.e.,penetration rate,rock-breaking energy consumption,and cutterhead hob wear),the MOO framework and corresponding mathematical expression are established.The Pareto optimal front is solved using DE-NSGA-II algorithm.Finally,the optimal control parameters(i.e.,advance rate and cutterhead rotation speed)are obtained by the satisfactory solution determination criterion,which can balance construction safety and efficiency with satisfaction.Furthermore,the proposed method is validated through 50 cases of TBM tunnelling,showing promising potential of application.
文摘The blockchain trilemma—balancing decentralization,security,and scalability—remains a critical challenge in distributed ledger technology.Despite significant advancements,achieving all three attributes simultaneously continues to elude most blockchain systems,often forcing trade-offs that limit their real-world applicability.This review paper synthesizes current research efforts aimed at resolving the trilemma,focusing on innovative consensus mechanisms,sharding techniques,layer-2 protocols,and hybrid architectural models.We critically analyze recent breakthroughs,including Directed Acyclic Graph(DAG)-based structures,cross-chain interoperability frameworks,and zero-knowledge proof(ZKP)enhancements,which aimto reconcile scalability with robust security and decentralization.Furthermore,we evaluate the trade-offs inherent in these approaches,highlighting their practical implications for enterprise adoption,decentralized finance(DeFi),and Web3 ecosystems.By mapping the evolving landscape of solutions,this review identifies gaps in currentmethodologies and proposes future research directions,such as adaptive consensus algorithms and artificial intelligence-driven(AI-driven)governance models.Our analysis underscores that while no universal solution exists,interdisciplinary innovations are progressively narrowing the trilemma’s constraints,paving the way for next-generation blockchain infrastructures.
基金funded by the deanship of scientific research(DSR),King Abdukaziz University,Jeddah,under grant No.(G-1436-611-225)。
文摘The rapid evolution of wireless technologies and the advent of 6G networks present new challenges and opportunities for Internet ofThings(IoT)applications,particularly in terms of ultra-reliable,secure,and energyefficient communication.This study explores the integration of Reconfigurable Intelligent Surfaces(RIS)into IoT networks to enhance communication performance.Unlike traditional passive reflector-based approaches,RIS is leveraged as an active optimization tool to improve both backscatter and direct communication modes,addressing critical IoT challenges such as energy efficiency,limited communication range,and double-fading effects in backscatter communication.We propose a novel computational framework that combines RIS functionality with Physical Layer Security(PLS)mechanisms,optimized through the algorithm known as Deep Deterministic Policy Gradient(DDPG).This framework adaptively adapts RIS configurations and transmitter beamforming to reduce key challenges,including imperfect channel state information(CSI)and hardware limitations like quantized RIS phase shifts.By optimizing both RIS settings and beamforming in real-time,our approach outperforms traditional methods by significantly increasing secrecy rates,improving spectral efficiency,and enhancing energy efficiency.Notably,this framework adapts more effectively to the dynamic nature of wireless channels compared to conventional optimization techniques,providing scalable solutions for large-scale RIS deployments.Our results demonstrate substantial improvements in communication performance setting a new benchmark for secure,efficient and scalable 6G communication.This work offers valuable insights for the future of IoT networks,with a focus on computational optimization,high spectral efficiency and energy-aware operations.
基金Gerhard Hellstern is partly funded by the Ministry of Economic Affairs,Labour and Tourism Baden-Württemberg in the frame of the Competence Center Quantum Computing Baden-Württemberg(QORA Ⅱ).
文摘The rapid advancement of quantum computing has sparked a considerable increase in research attention to quantum technologies.These advances span fundamental theoretical inquiries into quantum information and the exploration of diverse applications arising from this evolving quantum computing paradigm.The scope of the related research is notably diverse.This paper consolidates and presents quantum computing research related to the financial sector.The finance applications considered in this study include portfolio optimization,fraud detection,and Monte Carlo methods for derivative pricing and risk calculation.In addition,we provide a comprehensive analysis of quantum computing’s applications and effects on blockchain technologies,particularly in relation to cryptocurrencies,which are central to financial technology research.As discussed in this study,quantum computing applications in finance are based on fundamental quantum physics principles and key quantum algorithms.This review aims to bridge the research gap between quantum computing and finance.We adopt a two-fold methodology,involving an analysis of quantum algorithms,followed by a discussion of their applications in specific financial contexts.Our study is based on an extensive review of online academic databases,search tools,online journal repositories,and whitepapers from 1952 to 2023,including CiteSeerX,DBLP,Research-Gate,Semantic Scholar,and scientific conference publications.We present state-of-theart findings at the intersection of finance and quantum technology and highlight open research questions that will be valuable for industry practitioners and academicians as they shape future research agendas.
文摘Combining the heuristic algorithm (HA) developed based on the specific knowledge of the cooperative multiple target attack (CMTA) tactics and the particle swarm optimization (PSO), a heuristic particle swarm optimization (HPSO) algorithm is proposed to solve the decision-making (DM) problem. HA facilitates to search the local optimum in the neighborhood of a solution, while the PSO algorithm tends to explore the search space for possible solutions. Combining the advantages of HA and PSO, HPSO algorithms can find out the global optimum quickly and efficiently. It obtains the DM solution by seeking for the optimal assignment of missiles of friendly fighter aircrafts (FAs) to hostile FAs. Simulation results show that the proposed algorithm is superior to the general PSO algorithm and two GA based algorithms in searching for the best solution to the DM problem.
基金supported by the National Natural Science Foundation of China under Grant T2521006,Grant 62403483,Grant 62533021 and Grant U24A20279.
文摘Reinforcement learning(RL)has been widely studied as an efficient class of machine learning methods for adaptive optimal control under uncertainties.In recent years,the applications of RL in optimised decision-making and motion control of intelligent vehicles have received increasing attention.Due to the complex and dynamic operating environments of intelligent vehicles,it is necessary to improve the learning efficiency and generalisation ability of RL-based decision and control algorithms under different conditions.This survey systematically examines the theoretical foundations,algorithmic advancements and practical challenges of applying RL to intelligent vehicle systems operating in complex and dynamic environments.The major algorithm frameworks of RL are first introduced,and the recent advances in RL-based decision-making and control of intelligent vehicles are overviewed.In addition to self-learning decision and control approaches using state measurements,the developments of DRL methods for end-to-end driving control of intelligent vehicles are summarised.The open problems and directions for further research works are also discussed.
基金Undertheauspicesof China Postdoctoral Science Foundation (No.2004035175), and the Natural Science Founda-tionof Anhui Provincial Bureau of Education (No.2003KJ043ZD)
文摘Ecological security is a vital problem that people all over the world today have to face and solve, and the situation of ecological security is getting more and more severe and has begun to impede heavily the sustainable development of social economy. Ecological environment pre-warning has become a hotspot for the modern environment science. This paper introduces the theories of ecological security pre-warning and tries to constitute a pre-warning model of ecological security. In terms of pressure-state-response model, the pre-warning guide line of ecological security is constructed while the pre-warning degree judging model of ecological security is established based on fuzzy optimization. As a case, the model is used to assess the present condition pre-warning of the ecological security of Anhui Province. The result is in correspondence with the real condition: the ecological security situations of 8 cities are dangerous and 9 cities are secure. The result shows that this model is scientific and effective for regional ecological security pre-warning.
基金financially supported by the Ongoing Research Funding Program(ORF-2025-846),King Saud University,Riyadh,Saudi Arabia.
文摘Protecting Supervisory Control and Data Acquisition-Industrial Internet of Things(SCADA-IIoT)systems against intruders has become essential since industrial control systems now oversee critical infrastructure,and cyber attackers more frequently target these systems.Due to their connection of physical assets with digital networks,SCADA-IIoT systems face substantial risks from multiple attack types,including Distributed Denial of Service(DDoS),spoofing,and more advanced intrusion methods.Previous research in this field faces challenges due to insufficient solutions,as current intrusion detection systems lack the necessary accuracy,scalability,and adaptability needed for IIoT environments.This paper introduces CyberFortis,a novel cybersecurity framework aimed at detecting and preventing cyber threats in SCADA-IIoT systems.CyberFortis presents two key innovations:Firstly,Siamese Double Deep Q-Network with Autoencoders(Siamdqn-AE)FusionNet,which enhances intrusion detection by combining deep Q-Networks with autoencoders for improved attack detection and feature extraction;and secondly,the PopHydra Optimiser,an innovative solution to compute reinforcement learning discount factors for better model performance and convergence.This method combines Siamese deep Q-Networks with autoencoders to create a system that can detect different types of attacks more effectively and adapt to new challenges.CyberFortis is better than current top attack detection systems,showing higher scores in important areas like accuracy,precision,recall,and F1-score,based on data from CICIoT 2023,UNSW-NB 15,and WUSTL-IIoT datasets.Results from the proposed framework show a 97.5%accuracy rate,indicating its potential as an effective solution for SCADA-IIoT cybersecurity against emerging threats.The research confirms that the proposed security and resilience methods are successful in protecting vital industrial control systems within their operational environments.
基金supported by Culture,Sports and Tourism R&D Program through the Korea Creative Content Agency grant funded by the Ministry of Culture,Sports and Tourism in 2024(Project Name:Global Talent Training Program for Copyright Management Technology in Game Contents,Project Number:RS-2024-00396709,Contribution Rate:100%).
文摘Cyber-physical systems(CPS)represent a sophisticated integration of computational and physical components that power critical applications such as smart manufacturing,healthcare,and autonomous infrastructure.However,their extensive reliance on internet connectivity makes them increasingly susceptible to cyber threats,potentially leading to operational failures and data breaches.Furthermore,CPS faces significant threats related to unauthorized access,improper management,and tampering of the content it generates.In this paper,we propose an intrusion detection system(IDS)optimized for CPS environments using a hybrid approach by combining a natureinspired feature selection scheme,such as Grey Wolf Optimization(GWO),in connection with the emerging Light Gradient Boosting Machine(LightGBM)classifier,named as GWO-LightGBM.While gradient boosting methods have been explored in prior IDS research,our novelty lies in proposing a hybrid approach targeting CPS-specific operational constraints,such as low-latency response and accurate detection of rare and critical attack types.We evaluate GWO-LightGBM against GWO-XGBoost,GWO-CatBoost,and an artificial neural network(ANN)baseline using the NSL-KDD and CIC-IDS-2017 benchmark datasets.The proposed models are assessed across multiple metrics,including accuracy,precision,recall,and F1-score,with an emphasis on class-wise performance and training efficiency.The proposed GWO-LightGBM model achieves the highest overall accuracy(99.73%)for NSL-KDD and(99.61%)for CIC-IDS-2017,demonstrating superior performance in detecting minority classes such as Remote-to-Local(R2L)and Other attacks—commonly overlooked by other classifiers.Moreover,the proposed model consumes lower training time,highlighting its practical feasibility and scalability for real-time CPS deployment.
基金Funding for this study was received from the Ministry of Education and Deanship of Scientific Research at King Abdulaziz University,Kingdom of Saudi Arabia under Grant No.IFPHI-286-611-2020.
文摘Security is an important component in the process of developing healthcare web applications.We need to ensure security maintenance;therefore the analysis of healthcare web application’s security risk is of utmost importance.Properties must be considered to minimise the security risk.Additionally,security risk management activities are revised,prepared,implemented,tracked,and regularly set up efficiently to design the security of healthcare web applications.Managing the security risk of a healthcare web application must be considered as the key component.Security is,in specific,seen as an add-on during the development process of healthcare web applications,but not as the key problem.Researchers must ensure that security is taken into account right from the earlier developmental stages of the healthcare web application.In this row,the authors of this study have used the hesitant fuzzy-based AHP-TOPSIS technique to estimate the risks of various healthcare web applications for improving security-durability.This approach would help to design and incorporate security features in healthcare web applications that would be able to battle threats on their own,and not depend solely on the external security of healthcare web applications.Furthermore,in terms of healthcare web application’s security-durability,the security risk variable is measured,and vice versa.Hence,the findings of our study will also be useful in improving the durability of several web applications in healthcare.
基金supported in part by the National Natural Science Foundation of China(Nos.62271454 and 62171119).
文摘Unmanned aerial vehicles(UAVs)bring more innovation and attraction to outdoor mobile high-definition(HD)live streaming with its unique perspective.Due to the heavy computational requirements of HD live broadcast tasks and the limited hardware performance of UAV equipment,how to reduce the system response delay and improve the energy efficiency of terminal equipment directly affects the secure broadcast of the system.Secure task offloading in this scenario is considered a promising solution and has received academic attention.In this paper,we simulate the UAV-aided outdoor mobile HD live streaming scenarios and optimize the relevant task offloading strategies.First,we design the total cost function of task offloading that jointly optimizes secure time latency and energy consumption.Additionally,we propose a collaborative computing model for multi-UAV task offloading.This model combines the idea of simulated annealing(SA)and introduces the compression factor to enhance the particle swarm optimization(PSO)to realize secure task offloading.The simulation results show that the proposed strategy has better performance in balancing network latency and energy consumption.Compared with the discrete teaching–learning-based optimization(DTLBO)and quantum PSO(QPSO)task offloading strategies,the fitness value of the proposed strategy is decreased by an average of 26.73%and 16.42%,respectively.
基金Taif University Researchers Supporting Project Number(TURSP-2020/154),Taif University,Taif,Saudi Arabia.
文摘Digital image security is a fundamental and tedious process on shared communication channels.Several methods have been employed for accomplishing security on digital image transmission,such as encryption,steganography,and watermarking.Image stenography and encryption are commonly used models to achieve improved security.Besides,optimal pixel selection process(OPSP)acts as a vital role in the encryption process.With this motivation,this study designs a new competitive swarmoptimization with encryption based stenographic technique for digital image security,named CSOES-DIS technique.The proposed CSOES-DIS model aims to encrypt the secret image prior to the embedding process.In addition,the CSOES-DIS model applies a double chaotic digital image encryption(DCDIE)technique to encrypt the secret image,and then embedding method was implemented.Also,the OPSP can be carried out by the design of CSO algorithm and thereby increases the secrecy level.In order to portray the enhanced outcomes of the CSOES-DIS model,a comparative examination with recent methods is performed and the results reported the betterment of the CSOES-DIS model based on different measures.
文摘Energy consumption in data centers has grown out of proportion in regard to the state of energy that’s available in the universe. Technology has improved services and its application. The need for eco-friendly energy and increase in data centers performance brought about Green Computing into the energy consumption of data centers. Information technology has grown and eaten deep into the society that almost all the sectors if not all are dependent on information technology to move on. The consumption of power has increased greatly. In this research paper the techniques for optimizing energy in data centers for Green Computing would be discussed. This study intends to expose the limitations of existing security solutions for securing data centers by taking into consideration of limitations of existing security frameworks that cannot enhance the security of data centers.
文摘Using the dynamic optimization theory, we described a decision-making model for farmer choosing land use when there are several different kinds of uses for land. To obtain an empirical model that could be easily applied, decision rules for farmer with a single static expectation were given.
基金supported in part by the National Natural Science Foundation of China under Grant 61971450in part by the Hunan Provincial Science and Technology Project Foundation under Grant 2018TP1018+1 种基金in part by the Natural Science Foundation of Hunan Province under Grant 2018JJ2533in part by Hunan Province College Students Research Learning and Innovative Experiment Project under Grant S202110542056。
文摘This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network.In the network,energy-constrained secondary network(SN)nodes harvest energy from radio frequency signals of a multi-antenna power beacon.Two SN sources exchange their messages via a SN decode-and-forward relay in the presence of a multiantenna eavesdropper by using a four-phase time division broadcast protocol,and the hardware impairments of SN nodes and eavesdropper are modeled.To alleviate eavesdropping attacks,the artificial noise is applied by SN nodes.The physical layer security performance of SN is analyzed and evaluated by the exact closed-form expressions of outage probability(OP),intercept probability(IP),and OP+IP over quasistatic Rayleigh fading channel.Additionally,due to the complexity of OP+IP expression,a self-adaptive chaotic quantum particle swarm optimization-based resource allocation algorithm is proposed to jointly optimize energy harvesting ratio and power allocation factor,which can achieve security-reliability tradeoff for SN.Extensive simulations demonstrate the correctness of theoretical analysis and the effectiveness of the proposed optimization algorithm.
文摘The main aim of this work is to improve the security of data hiding forsecret image sharing. The privacy and security of digital information have becomea primary concern nowadays due to the enormous usage of digital technology.The security and the privacy of users’ images are ensured through reversible datahiding techniques. The efficiency of the existing data hiding techniques did notprovide optimum performance with multiple end nodes. These issues are solvedby using Separable Data Hiding and Adaptive Particle Swarm Optimization(SDHAPSO) algorithm to attain optimal performance. Image encryption, dataembedding, data extraction/image recovery are the main phases of the proposedapproach. DFT is generally used to extract the transform coefficient matrix fromthe original image. DFT coefficients are in float format, which assists in transforming the image to integral format using the round function. After obtainingthe encrypted image by data-hider, additional data embedding is formulated intohigh-frequency coefficients. The proposed SDHAPSO is mainly utilized for performance improvement through optimal pixel location selection within the imagefor secret bits concealment. In addition, the secret data embedding capacityenhancement is focused on image visual quality maintenance. Hence, it isobserved from the simulation results that the proposed SDHAPSO techniqueoffers high-level security outcomes with respect to higher PSNR, security level,lesser MSE and higher correlation than existing techniques. Hence, enhancedsensitive information protection is attained, which improves the overall systemperformance.
文摘In the real situations of supply chain, there are different parts such as facilities, logistics warehouses and retail stores and they handle common kinds of products. In this research, these situations are focused on as the background of this research. They deal with the common quantities of their products, but due to their different environments, the optimal production quantity of one part can be unacceptable to another part and it may suffer a heavy loss. To avoid that kind of unacceptable situations, the common production quantities should be acceptable to all parts in one supply chain. Therefore, the motivation of this research is the necessity of the method to find the production quantities that make all decision makers acceptable is needed. However, it is difficult to find the production quantities that make all decision makers acceptable. Moreover, their acceptable ranges do not always have common ranges. In the decision making of car design, there are similar situations to this type of decision making. The performance of a car consists of purposes such as fuel efficiency, size and so on. Improving one purpose makes another worse and the relationship between these purposes is tradeoff. In these cases, Suriawase process is applied. This process consists of negotiations and reviews of the requirements of the purposes. In the step of negotiations, the requirements of the purposes are share among all decision makers and the solution that makes them as satisfied as possible. In the step of reviews of the requirements, they are reviewed based on the result of the negotiation if the result is unacceptable to some of decision makers. Therefore, through the iterations of the two steps, the solution that makes all decision makers satisfied is obtained. However, in the previous research, the effects that one decision maker reviews requirements in Suriawase process are quantified, but the mathematical model to modify the ranges of production quantities of all decision makers simultaneously is not shown. Therefore, in this research, based on Suriawase process, the mathematical model of multi-player multi-objective decision making is proposed. The mathematical model of multi-player multi-objective decision making by using linear physical programming (LPP) and robust optimization (RO) in the previous research is the basis of the methods of this research. LPP is one of the multi-objective optimization methods and RO is used to make the balance of the preference levels among decision makers. In LPP, the preference ranges of all objective functions are needed, so as the hypothesis of this research. In the research referred in this research, the method to control the effect of RO is not shown. If the effect of RO is too big, the average of the preference level becomes worse. The purpose of this research is to reproduce the mathematical model of multi-player multi-objective decision making based on Suriawase process and propose the method to control the effect of RO. In the proposed model, a set of the solutions of the negotiation problem is obtained and it is proved by the result of the numerical experiment. Therefore, the conclusion that the proposed model is available to obtain a set of the solutions of the negotiation problems in supply chain.