Burden sharing has been a perennial issue in the transatlantic alliance,primarily entailing cost sharing and responsibility sharing.During the first Trump administration,the dispute over cost sharing had been prominen...Burden sharing has been a perennial issue in the transatlantic alliance,primarily entailing cost sharing and responsibility sharing.During the first Trump administration,the dispute over cost sharing had been prominent,while the Biden administration placed more emphasis on responsibility sharing to facilitate its strategic goal of“outcompeting”China.The Ukraine crisis had prompted a US-Europe consensus on cost sharing,but the urgency of responsibility sharing subsequently increased.The shift from jointly providing the economic resources to extensively sharing the security responsibilities ref lects the recalibration of the US strategic focus and its higher expectations for the role of European allies.Nevertheless,Europe's response to the US call for responsibility sharing has been relatively limited.The responsibility sharing within the US-Europe alliance and their future relationship will be subject to the strategic coordination between the two sides and multiple complex factors.展开更多
The accelerated advancement of the Internet of Things(IoT)has generated substantial data,including sensitive and private information.Consequently,it is imperative to guarantee the security of data sharing.While facili...The accelerated advancement of the Internet of Things(IoT)has generated substantial data,including sensitive and private information.Consequently,it is imperative to guarantee the security of data sharing.While facilitating fine-grained access control,Ciphertext Policy Attribute-Based Encryption(CP-ABE)can effectively ensure the confidentiality of shared data.Nevertheless,the conventional centralized CP-ABE scheme is plagued by the issues of keymisuse,key escrow,and large computation,which will result in security risks.This paper suggests a lightweight IoT data security sharing scheme that integrates blockchain technology and CP-ABE to address the abovementioned issues.The integrity and traceability of shared data are guaranteed by the use of blockchain technology to store and verify access transactions.The encryption and decryption operations of the CP-ABE algorithm have been implemented using elliptic curve scalarmultiplication to accommodate lightweight IoT devices,as opposed to themore arithmetic bilinear pairing found in the traditional CP-ABE algorithm.Additionally,a portion of the computation is delegated to the edge nodes to alleviate the computational burden on users.A distributed key management method is proposed to address the issues of key escrow andmisuse.Thismethod employs the edge blockchain to facilitate the storage and distribution of attribute private keys.Meanwhile,data security sharing is enhanced by combining off-chain and on-chain ciphertext storage.The security and performance analysis indicates that the proposed scheme is more efficient and secure.展开更多
1 In a world filled with more“stuff”than we need,sharing libraries are emerging as a solution to both environmental and economic concerns.Unlike traditional libraries,these“libraries of things”offer a variety of i...1 In a world filled with more“stuff”than we need,sharing libraries are emerging as a solution to both environmental and economic concerns.Unlike traditional libraries,these“libraries of things”offer a variety of items for borrowing,often for free or at a low cost.2 For example,the Oxford Maternity Clothes Library provides expectant mothers with free maternity wear,while the Warwick Toy Library allows locals to borrow toys and even reserve them online.The Tool Library in Wolverhampton offers gardening and DIY equipment,and the Share Shed in Devon has over 350 items available.Nappy libraries also provide parents with reusable cloth nappies(尿布),reducing costs and waste.展开更多
I’m Li hua from class 1.I’m honored to come up with some ideas for the upcoming exchange activities.My idea is to hold a Cultural sharing workshop.First,we can introduce ourselves to others.This helps us get to know...I’m Li hua from class 1.I’m honored to come up with some ideas for the upcoming exchange activities.My idea is to hold a Cultural sharing workshop.First,we can introduce ourselves to others.This helps us get to know each other.Then we can introduce the history,culture and national customs of China with them.展开更多
This paper presents the design of a low-power multi-channel analog front-end(AFE) for bio-potential recording. By using time division multiplexing(TDM), a successive approximation register analog-to-digital converter(...This paper presents the design of a low-power multi-channel analog front-end(AFE) for bio-potential recording. By using time division multiplexing(TDM), a successive approximation register analog-to-digital converter(SAR ADC) is shared among all 20 channels. A charge-sharing multiplexer(MUX) is proposed to transmit the output signals from the respective channels to the ADC. By separately pre sampling the output of each channel, the sampling time of each channel is greatly extended and additional active buffers are avoided. The AFE is fabricated in a 65-nm CMOS process, and the whole system consumes 28.2 μW under 1 V supply. Each analog acquisition channel consumes 1.25 μW and occupies a chip area of 0.14 mm2. Measurement results show that the AFE achieves an input referred noise of 1.8 μV·rms in a 350 Hz bandwidth and a noise efficiency factor(NEF) of 4.1. The 12-bit SAR ADC achieves an ENOB of 9.8 bit operating at 25 k S/s. The AFE is experimented on real-world applications by measuring human ECG and a clear ECG waveform is captured.展开更多
As the information sensing and processing capabilities of IoT devices increase,a large amount of data is being generated at the edge of Industrial IoT(IIoT),which has become a strong foundation for distributed Artific...As the information sensing and processing capabilities of IoT devices increase,a large amount of data is being generated at the edge of Industrial IoT(IIoT),which has become a strong foundation for distributed Artificial Intelligence(AI)applications.However,most users are reluctant to disclose their data due to network bandwidth limitations,device energy consumption,and privacy requirements.To address this issue,this paper introduces an Edge-assisted Federated Learning(EFL)framework,along with an incentive mechanism for lightweight industrial data sharing.In order to reduce the information asymmetry between data owners and users,an EFL model-sharing incentive mechanism based on contract theory is designed.In addition,a weight dispersion evaluation scheme based on Wasserstein distance is proposed.This study models an optimization problem of node selection and sharing incentives to maximize the EFL model consumers'profit and ensure the quality of training services.An incentive-based EFL algorithm with individual rationality and incentive compatibility constraints is proposed.Finally,the experimental results verify the effectiveness of the proposed scheme in terms of positive incentives for contract design and performance analysis of EFL systems.展开更多
With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the...With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the existing data sharing schemes have been difficult to meet the growing demand for data sharing,this paper aims at exploring a secure,efficient and privacy-protecting data sharing scheme under web3.0 applications.Specifically,this paper adopts interplanetary file system(IPFS)technology to realize the storage of large data files to solve the problem of blockchain storage capacity limitation,and utilizes ciphertext policy attribute-based encryption(CP-ABE)and proxy re-encryption(PRE)technology to realize secure multi-party sharing and finegrained access control of data.This paper provides the detailed algorithm design and implementation of data sharing phases and processes,and analyzes the algorithms from the perspectives of security,privacy protection,and performance.展开更多
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social...With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social images.However,most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial domain.In this work,the authors propose a secure social image-sharing method with watermarking/fingerprinting and encryption.First,the fingerprint code with a hierarchical community structure is designed based on social network analysis.Then,discrete wavelet transform(DWT)from block discrete cosine transform(DCT)directly is employed.After that,all codeword segments are embedded into the LL,LH,and HL subbands,respectively.The selected subbands are confused based on Game of Life(GoL),and then all subbands are diffused with singular value decomposition(SVD).Experimental results and security analysis demonstrate the security,invisibility,and robustness of our method.Further,the superiority of the technique is elaborated through comparison with some related image security algorithms.The solution not only performs the fast transformation from block DCT to one-level DWT but also protects users’privacy in multimedia social platforms.With the proposed method,JPEG image secure sharing in multimedia social platforms can be ensured.展开更多
Satellite and terrestrial cellular networks can be integrated together to achieve extended broad-band coverage for,e.g.,maritime communication sce-narios,in the upcoming sixth-generation(6G)era.To counter spectrum sca...Satellite and terrestrial cellular networks can be integrated together to achieve extended broad-band coverage for,e.g.,maritime communication sce-narios,in the upcoming sixth-generation(6G)era.To counter spectrum scarcity,collaborative spectrum sharing is considered for hybrid satellite-terrestrial networks(HSTNs)in this paper.With only slowly-varying large-scale channel state information(CSI),joint power and channel allocation is implemented for terrestrial mobile terminals(MTs)which share the same frequency band with the satellite MTs oppor-tunistically.Specially,strict quality service assurance is adopted for terrestrial MTs under the constraint of leakage interference to satellite MTs.With the tar-get of maximizing both the number of served terres-trial MTs and the average sum transmission rate,a double-target spectrum sharing problem is formulated.To solve the complicated mixed integer programming(MIP)problem efficiently,user-centric channel pools are introduced.Simulations demonstrate that the proposed spectrum sharing scheme could achieve a significant performance gain for the HSTN.展开更多
Corporate environmental sustainability has become a critical concern,particularly in resource-intensive industries such as pharmaceuticals,where regulatory pressures and stakeholder expectations continue to rise.Despi...Corporate environmental sustainability has become a critical concern,particularly in resource-intensive industries such as pharmaceuticals,where regulatory pressures and stakeholder expectations continue to rise.Despite increasing attention to green leadership,limited research has explored how environmentally responsible leadership(ERL)influences corporate environmental performance(CEP)through employee-driven sustainability behaviors.This study addresses this gap by examining the mediating roles of green knowledge-sharing behavior(GKSB),green innovative behavior(GIB),and voluntary green behavior(VGB),as well as the moderating role of green shared vision(GSV)in the ERL-CEP relationship.The study is grounded in Resource-Based View(RBV),Knowledge-Based View(KBV),Environmental-Based View(EBV),and Triple Bottom Line(TBL)theories,which collectively explain how leadership-driven sustainability efforts create long-term competitive advantages,drive environmental responsibility,and balance economic,social,and environmental sustainability.A quantitative research design was employed,using survey data from 384 employees in Bangladesh’s pharmaceutical sector.Data were analyzed using Partial Least Squares Structural Equation Modeling(PLS-SEM)in Smart-PLS 4.0 to assess direct,indirect,and moderating effects.The results confirm that ERL has a significant positive impact on CEP,with GKSB,GIB,and VGB acting as mediators,while GSV strengthens the ERL-CEP relationship.This study provides novel empirical evidence on the mechanisms linking green leadership to corporate sustainability,extending the application of RBV,KBV,EBV,and TBL to leadership-driven environmental management.The findings emphasize the importance of leadership training programs,sustainability-focused organizational cultures,and shared environmental visions.Policymakers should consider incentives for companies adopting ERL practices,ensuring that sustainability becomes a strategic,rather than compliance-driven,priority.This study contributes to leadership and sustainability literature by offering a comprehensive framework for integrating ERL into corporate governance and environmental strategies.展开更多
Blockchain-based spectrum sharing with consensus is the key technology for sixth-generation mobile communication to realize dynamic spectrum management.In order to avoid the waste of computing and communication resour...Blockchain-based spectrum sharing with consensus is the key technology for sixth-generation mobile communication to realize dynamic spectrum management.In order to avoid the waste of computing and communication resources,a spectrum sharing policy-based consensus mechanism is proposed in this paper.Firstly,a spectrum sharing algorithm based on graph neural network is designed in the satelliteterrestrial spectrum sharing networks under the underlay model.It avoids high computational overhead of the traditional iterative optimization algorithm when the wireless channel condition and network topology are highly dynamic.Secondly,a consensus mechanism based on spectrum sharing strategy is designed,which converts the traditional meaningless hash problem into the graph neural network training.Miners compete for accounting rights by training a graph neutral network model that meets the spectrum sharing requirement.Finally,the consensus delay,communication and storage overhead of the proposed consensus mechanism are analyzed theoretically.The simulation results show that the proposed consensus mechanism can effectively improve spectrum efficiency with excellent scalability and generalization performance.展开更多
With the rapid development of medical data sharing,issues of privacy and ownership have become prominent,which have limited the scale of data sharing.To address the above challenges,we propose a blockchainbased data-s...With the rapid development of medical data sharing,issues of privacy and ownership have become prominent,which have limited the scale of data sharing.To address the above challenges,we propose a blockchainbased data-sharing framework to ensure data security and encourage data owners to actively participate in sharing.We introduce a reliable attribute-based searchable encryption scheme that enables fine-grained access control of encrypted data and ensures secure and efficient data sharing.The revenue distribution model is constructed based on Shapley value to motivate participants.Additionally,by integrating the smart contract technology of blockchain,the search operation and incentive mechanism are automatically executed.Through revenue distribution analysis,the incentive effect and rationality of the proposed scheme are verified.Performance evaluation shows that,compared with traditional data-sharing models,our proposed framework not only meets data security requirements but also incentivizes more participants to actively participate in data sharing.展开更多
This study tested a multilevel model of the workplace territorial behaviors and employees’knowledge sharing relationship,with team identification serving as a mediator and task interdependence as a moderator.Data wer...This study tested a multilevel model of the workplace territorial behaviors and employees’knowledge sharing relationship,with team identification serving as a mediator and task interdependence as a moderator.Data were collected from 253 employees(females=128,mean age=28.626,SD=6.470)from 40 work teams from different industries in China.Path analysis results indicated that workplace territorial behaviors were associated with lower employee knowledge sharing.Team identification enhanced employee knowledge sharing and partially mediated the relationship between workplace territorial behaviors and employee knowledge sharing.Task interdependence enhanced knowledge sharing and strengthened the relationship between team identification and knowledge sharing.Thesefindings extend the proposition of social information processing theory by revealing the mediating role of team identification in the relationship between workplace territorial behaviors and knowledge sharing,and clarifying the boundary conditions of team identification.Practical implications of thesefindings include a need for managers to foster collaborative atmospheres,design interdependent tasks,and mitigate territorial behaviors to enhance team identification and knowledge sharing.展开更多
At present,most quantum secret sharing(QSS)protocols are more or less designed with the incorporation of classical secret sharing schemes.With the increasing maturity of quantum technology,QSS protocols based on pure ...At present,most quantum secret sharing(QSS)protocols are more or less designed with the incorporation of classical secret sharing schemes.With the increasing maturity of quantum technology,QSS protocols based on pure quantum mechanics are becoming more important.Classical secret sharing schemes cannot achieve absolute security,and their involvement can compromise the security of QSS protocols.This paper proposes a QSS scheme based on Greenberger-Horn-Zeilinger(GHZ)basis measurement and quantum entanglement exchange.In this protocol,the secret sender stores the secret information using Pauli operations.Participants obtain their shares by measuring the product state sequentially.Finally,participants complete the secret reconstruction through quantum entanglement exchange and other related quantum operations.In addition,the particles held by participants in the protocol do not contain any secret information.Each participant's particles are in a state of maximum entanglement,and no participant can deduce the particle information of other participants through their own particles.At the same time,the protocol is based on pure quantum mechanics and does not involve classical schemes,which avoids the problem of reduced security of the protocol.Security analysis indicates that the protocol is not vulnerable to retransmission interception and collusion attacks.Moreover,it is capable of detecting and terminating the protocol promptly when facing with attacks from dishonest participants.展开更多
This study explores the interaction of responsible leadership,supportive climate,and creative self-efficacy in enhancing knowledge sharing among employees in the banking sector.Data from 314 employees(42%Females,58%Ma...This study explores the interaction of responsible leadership,supportive climate,and creative self-efficacy in enhancing knowledge sharing among employees in the banking sector.Data from 314 employees(42%Females,58%Males)were analyzed using structural equation modeling(SEM)and a time-lagged survey design.The analysis revealed a higher responsible leadership to be associated with both creative self-efficacy and knowledge sharing.Additionally,the study found that supportive climate moderation to significantly,strengthening the relationship between responsible leadership and knowledge sharing.Creative self-efficacy partially mediated this relationship to be stronger.The results indicate that responsible leadership and a supportive climate are crucial socio-cognitive mechanisms for enhancing knowledge sharing in organizations.The banking sector should aim to promote collaborative work partnerships implementing responsible leadership practices and cultivating supportive work environments to bolster organizational growth and competitiveness.展开更多
The advent of the digital age has consistently provided impetus for facilitating global trade,as evidenced by the numerous customs clearance documents and participants involved in the international trade process,inclu...The advent of the digital age has consistently provided impetus for facilitating global trade,as evidenced by the numerous customs clearance documents and participants involved in the international trade process,including enterprises,agents,and government departments.However,the urgent issue that requires immediate attention is how to achieve secure and efficient cross-border data sharing among these government departments and enterprises in complex trade processes.In addressing this need,this paper proposes a data exchange architecture employing Multi-Authority Attribute-Based Encryption(MA-ABE)in combination with blockchain technology.This scheme supports proxy decryption,attribute revocation,and policy update,while allowing each participating entity to manage their keys autonomously,ensuring system security and enhancing trust among participants.In order to enhance system decentralization,a mechanism has been designed in the architecture where multiple institutions interact with smart contracts and jointly participate in the generation of public parameters.Integration with the multi-party process execution engine Caterpillar has been shown to boost the transparency of cross-border information flow and cooperation between different organizations.The scheme ensures the auditability of data access control information and the visualization of on-chain data sharing.The MA-ABE scheme is statically secure under the q-Decisional Parallel Bilinear Diffie-Hellman Exponent(q-DPBDHE2)assumption in the random oracle model,and can resist ciphertext rollback attacks to achieve true backward and forward security.Theoretical analysis and experimental results demonstrate the appropriateness of the scheme for cross-border data collaboration between different institutions.展开更多
Sharing behavior is of great significance to the development of young children.This paper takes 170 middle class children as a sample to explore the influencing factors of sharing behavior in preschool children and it...Sharing behavior is of great significance to the development of young children.This paper takes 170 middle class children as a sample to explore the influencing factors of sharing behavior in preschool children and its age development characteristics.This study shows that the score of willingness to share and the number of shares was inversely proportional to the value of the shared items;When there is an abundance of items to share,children share significantly more in the presence of the sharing partner than in the absence of the partner.Based on the findings,educational recommendations are made from three aspects:cultivating intrinsic motivation in children,enhancing the stability of children’s behavior,and guiding children to form correct values.展开更多
The lifetime of a wireless sensor network(WSN)is crucial for determining the maximum duration for data collection in Internet of Things applications.To extend the WSN's lifetime,we propose deploying an unmanned gr...The lifetime of a wireless sensor network(WSN)is crucial for determining the maximum duration for data collection in Internet of Things applications.To extend the WSN's lifetime,we propose deploying an unmanned ground vehicle(UGV)within the energy-hungry WSN.This allows nodes,including sensors and the UGV,to share their energy using wireless power transfer techniques.To optimize the UGV's trajectory,we have developed a tabu searchbased method for global optimality,followed by a clustering-based method suitable for real-world applications.When the UGV reaches a stopping point,it functions as a regular sensor with ample battery.Accordingly,we have designed optimal data and energy allocation algorithms for both centralized and distributed deployment.Simulation results demonstrate that the UGV and energy-sharing significantly extend the WSN's lifetime.This effect is especially prominent in sparsely connected WSNs compared to highly connected ones,and energy-sharing has a more pronounced impact on network lifetime extension than UGV mobility.展开更多
In this paper,we investigate the problem of fast spectrum sharing in vehicle-to-everything com-munication.In order to improve the spectrum effi-ciency of the whole system,the spectrum of vehicle-to-infrastructure link...In this paper,we investigate the problem of fast spectrum sharing in vehicle-to-everything com-munication.In order to improve the spectrum effi-ciency of the whole system,the spectrum of vehicle-to-infrastructure links is reused by vehicle-to-vehicle links.To this end,we model it as a problem of deep reinforcement learning and tackle it with prox-imal policy optimization.A considerable number of interactions are often required for training an agent with good performance,so simulation-based training is commonly used in communication networks.Nev-ertheless,severe performance degradation may occur when the agent is directly deployed in the real world,even though it can perform well on the simulator,due to the reality gap between the simulation and the real environments.To address this issue,we make prelim-inary efforts by proposing an algorithm based on meta reinforcement learning.This algorithm enables the agent to rapidly adapt to a new task with the knowl-edge extracted from similar tasks,leading to fewer in-teractions and less training time.Numerical results show that our method achieves near-optimal perfor-mance and exhibits rapid convergence.展开更多
China’s healthcare system faces increasing challenges,including surging medical costs,resource allocation imbalances favoring large hospitals,and ineffective referral mechanisms.The lack of a unified strategy integra...China’s healthcare system faces increasing challenges,including surging medical costs,resource allocation imbalances favoring large hospitals,and ineffective referral mechanisms.The lack of a unified strategy integrating standardized coverage with personalized payment compounds these issues.To this end,this study proposes a risk-sharing reform strategy that combines equal coverage for the same disease(ECSD)with an individualized out-of-pocket(I-OOP)model.Specifically,the study employs a Markov model to capture patient transitions across health states and care levels.The findings show that ECSD and I-OOP enhance equity by standardizing disease coverage while tailoring costs to patient income and facility type.This approach alleviates demand on high-tier hospitals,promoting primary care utilization and enabling balanced resource distribution.The study’s findings provide a reference for policymakers and healthcare administrators by presenting a scalable framework that is aligned with China’s development goals with the aim of fostering an efficient,sustainable healthcare system that is adaptable to regional needs.展开更多
文摘Burden sharing has been a perennial issue in the transatlantic alliance,primarily entailing cost sharing and responsibility sharing.During the first Trump administration,the dispute over cost sharing had been prominent,while the Biden administration placed more emphasis on responsibility sharing to facilitate its strategic goal of“outcompeting”China.The Ukraine crisis had prompted a US-Europe consensus on cost sharing,but the urgency of responsibility sharing subsequently increased.The shift from jointly providing the economic resources to extensively sharing the security responsibilities ref lects the recalibration of the US strategic focus and its higher expectations for the role of European allies.Nevertheless,Europe's response to the US call for responsibility sharing has been relatively limited.The responsibility sharing within the US-Europe alliance and their future relationship will be subject to the strategic coordination between the two sides and multiple complex factors.
文摘The accelerated advancement of the Internet of Things(IoT)has generated substantial data,including sensitive and private information.Consequently,it is imperative to guarantee the security of data sharing.While facilitating fine-grained access control,Ciphertext Policy Attribute-Based Encryption(CP-ABE)can effectively ensure the confidentiality of shared data.Nevertheless,the conventional centralized CP-ABE scheme is plagued by the issues of keymisuse,key escrow,and large computation,which will result in security risks.This paper suggests a lightweight IoT data security sharing scheme that integrates blockchain technology and CP-ABE to address the abovementioned issues.The integrity and traceability of shared data are guaranteed by the use of blockchain technology to store and verify access transactions.The encryption and decryption operations of the CP-ABE algorithm have been implemented using elliptic curve scalarmultiplication to accommodate lightweight IoT devices,as opposed to themore arithmetic bilinear pairing found in the traditional CP-ABE algorithm.Additionally,a portion of the computation is delegated to the edge nodes to alleviate the computational burden on users.A distributed key management method is proposed to address the issues of key escrow andmisuse.Thismethod employs the edge blockchain to facilitate the storage and distribution of attribute private keys.Meanwhile,data security sharing is enhanced by combining off-chain and on-chain ciphertext storage.The security and performance analysis indicates that the proposed scheme is more efficient and secure.
文摘1 In a world filled with more“stuff”than we need,sharing libraries are emerging as a solution to both environmental and economic concerns.Unlike traditional libraries,these“libraries of things”offer a variety of items for borrowing,often for free or at a low cost.2 For example,the Oxford Maternity Clothes Library provides expectant mothers with free maternity wear,while the Warwick Toy Library allows locals to borrow toys and even reserve them online.The Tool Library in Wolverhampton offers gardening and DIY equipment,and the Share Shed in Devon has over 350 items available.Nappy libraries also provide parents with reusable cloth nappies(尿布),reducing costs and waste.
文摘I’m Li hua from class 1.I’m honored to come up with some ideas for the upcoming exchange activities.My idea is to hold a Cultural sharing workshop.First,we can introduce ourselves to others.This helps us get to know each other.Then we can introduce the history,culture and national customs of China with them.
基金supported by the National Key R&D Program of China under Grant 2018YFA0701400 and 2018YFA0701401.
文摘This paper presents the design of a low-power multi-channel analog front-end(AFE) for bio-potential recording. By using time division multiplexing(TDM), a successive approximation register analog-to-digital converter(SAR ADC) is shared among all 20 channels. A charge-sharing multiplexer(MUX) is proposed to transmit the output signals from the respective channels to the ADC. By separately pre sampling the output of each channel, the sampling time of each channel is greatly extended and additional active buffers are avoided. The AFE is fabricated in a 65-nm CMOS process, and the whole system consumes 28.2 μW under 1 V supply. Each analog acquisition channel consumes 1.25 μW and occupies a chip area of 0.14 mm2. Measurement results show that the AFE achieves an input referred noise of 1.8 μV·rms in a 350 Hz bandwidth and a noise efficiency factor(NEF) of 4.1. The 12-bit SAR ADC achieves an ENOB of 9.8 bit operating at 25 k S/s. The AFE is experimented on real-world applications by measuring human ECG and a clear ECG waveform is captured.
基金supported by the National Natural Science Foundation of China (No.62071070)Major science and technology special project of Science and Technology Department of Yunnan Province (202002AB080001-8)BUPT innovation&entrepreneurship support program (2023-YC-T031)。
文摘As the information sensing and processing capabilities of IoT devices increase,a large amount of data is being generated at the edge of Industrial IoT(IIoT),which has become a strong foundation for distributed Artificial Intelligence(AI)applications.However,most users are reluctant to disclose their data due to network bandwidth limitations,device energy consumption,and privacy requirements.To address this issue,this paper introduces an Edge-assisted Federated Learning(EFL)framework,along with an incentive mechanism for lightweight industrial data sharing.In order to reduce the information asymmetry between data owners and users,an EFL model-sharing incentive mechanism based on contract theory is designed.In addition,a weight dispersion evaluation scheme based on Wasserstein distance is proposed.This study models an optimization problem of node selection and sharing incentives to maximize the EFL model consumers'profit and ensure the quality of training services.An incentive-based EFL algorithm with individual rationality and incentive compatibility constraints is proposed.Finally,the experimental results verify the effectiveness of the proposed scheme in terms of positive incentives for contract design and performance analysis of EFL systems.
基金supported by the National Natural Science Foundation of China(Grant No.U24B20146)the National Key Research and Development Plan in China(Grant No.2020YFB1005500)Beijing Natural Science Foundation Project(No.M21034).
文摘With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the existing data sharing schemes have been difficult to meet the growing demand for data sharing,this paper aims at exploring a secure,efficient and privacy-protecting data sharing scheme under web3.0 applications.Specifically,this paper adopts interplanetary file system(IPFS)technology to realize the storage of large data files to solve the problem of blockchain storage capacity limitation,and utilizes ciphertext policy attribute-based encryption(CP-ABE)and proxy re-encryption(PRE)technology to realize secure multi-party sharing and finegrained access control of data.This paper provides the detailed algorithm design and implementation of data sharing phases and processes,and analyzes the algorithms from the perspectives of security,privacy protection,and performance.
基金funded by NSFC Grants 61502154,61972136,the NSF of Hubei Province(2023AFB004,2024AFB544)Hubei Provincial Department of Education Project(No.Q20232206)Project of Hubei University of Economics(No.T201410).
文摘With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social images.However,most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial domain.In this work,the authors propose a secure social image-sharing method with watermarking/fingerprinting and encryption.First,the fingerprint code with a hierarchical community structure is designed based on social network analysis.Then,discrete wavelet transform(DWT)from block discrete cosine transform(DCT)directly is employed.After that,all codeword segments are embedded into the LL,LH,and HL subbands,respectively.The selected subbands are confused based on Game of Life(GoL),and then all subbands are diffused with singular value decomposition(SVD).Experimental results and security analysis demonstrate the security,invisibility,and robustness of our method.Further,the superiority of the technique is elaborated through comparison with some related image security algorithms.The solution not only performs the fast transformation from block DCT to one-level DWT but also protects users’privacy in multimedia social platforms.With the proposed method,JPEG image secure sharing in multimedia social platforms can be ensured.
基金supported in part by the National Natural Science Foundation of China under Grant 62425110 and Grant U22A2002in part by the National Key Research and Development Program of China under Grant 2020YFA0711301+2 种基金in part by the Leading Project of Minzu University of China under Grant 2023QNYL23in part by the Key Research and Development Project of Nantong(Special Project for Prospective Technology Innovation)under Grant GZ2024002in part by the Suzhou Science and Technology Project,and in part by the FAW Jiefang Automotive Co.,Ltd.
文摘Satellite and terrestrial cellular networks can be integrated together to achieve extended broad-band coverage for,e.g.,maritime communication sce-narios,in the upcoming sixth-generation(6G)era.To counter spectrum scarcity,collaborative spectrum sharing is considered for hybrid satellite-terrestrial networks(HSTNs)in this paper.With only slowly-varying large-scale channel state information(CSI),joint power and channel allocation is implemented for terrestrial mobile terminals(MTs)which share the same frequency band with the satellite MTs oppor-tunistically.Specially,strict quality service assurance is adopted for terrestrial MTs under the constraint of leakage interference to satellite MTs.With the tar-get of maximizing both the number of served terres-trial MTs and the average sum transmission rate,a double-target spectrum sharing problem is formulated.To solve the complicated mixed integer programming(MIP)problem efficiently,user-centric channel pools are introduced.Simulations demonstrate that the proposed spectrum sharing scheme could achieve a significant performance gain for the HSTN.
文摘Corporate environmental sustainability has become a critical concern,particularly in resource-intensive industries such as pharmaceuticals,where regulatory pressures and stakeholder expectations continue to rise.Despite increasing attention to green leadership,limited research has explored how environmentally responsible leadership(ERL)influences corporate environmental performance(CEP)through employee-driven sustainability behaviors.This study addresses this gap by examining the mediating roles of green knowledge-sharing behavior(GKSB),green innovative behavior(GIB),and voluntary green behavior(VGB),as well as the moderating role of green shared vision(GSV)in the ERL-CEP relationship.The study is grounded in Resource-Based View(RBV),Knowledge-Based View(KBV),Environmental-Based View(EBV),and Triple Bottom Line(TBL)theories,which collectively explain how leadership-driven sustainability efforts create long-term competitive advantages,drive environmental responsibility,and balance economic,social,and environmental sustainability.A quantitative research design was employed,using survey data from 384 employees in Bangladesh’s pharmaceutical sector.Data were analyzed using Partial Least Squares Structural Equation Modeling(PLS-SEM)in Smart-PLS 4.0 to assess direct,indirect,and moderating effects.The results confirm that ERL has a significant positive impact on CEP,with GKSB,GIB,and VGB acting as mediators,while GSV strengthens the ERL-CEP relationship.This study provides novel empirical evidence on the mechanisms linking green leadership to corporate sustainability,extending the application of RBV,KBV,EBV,and TBL to leadership-driven environmental management.The findings emphasize the importance of leadership training programs,sustainability-focused organizational cultures,and shared environmental visions.Policymakers should consider incentives for companies adopting ERL practices,ensuring that sustainability becomes a strategic,rather than compliance-driven,priority.This study contributes to leadership and sustainability literature by offering a comprehensive framework for integrating ERL into corporate governance and environmental strategies.
基金supported in part by the National Natural Science Foundation of China under Grant 62171020.
文摘Blockchain-based spectrum sharing with consensus is the key technology for sixth-generation mobile communication to realize dynamic spectrum management.In order to avoid the waste of computing and communication resources,a spectrum sharing policy-based consensus mechanism is proposed in this paper.Firstly,a spectrum sharing algorithm based on graph neural network is designed in the satelliteterrestrial spectrum sharing networks under the underlay model.It avoids high computational overhead of the traditional iterative optimization algorithm when the wireless channel condition and network topology are highly dynamic.Secondly,a consensus mechanism based on spectrum sharing strategy is designed,which converts the traditional meaningless hash problem into the graph neural network training.Miners compete for accounting rights by training a graph neutral network model that meets the spectrum sharing requirement.Finally,the consensus delay,communication and storage overhead of the proposed consensus mechanism are analyzed theoretically.The simulation results show that the proposed consensus mechanism can effectively improve spectrum efficiency with excellent scalability and generalization performance.
基金supported by the Natural Science Foundation of Hebei Province of China(F2021201052).
文摘With the rapid development of medical data sharing,issues of privacy and ownership have become prominent,which have limited the scale of data sharing.To address the above challenges,we propose a blockchainbased data-sharing framework to ensure data security and encourage data owners to actively participate in sharing.We introduce a reliable attribute-based searchable encryption scheme that enables fine-grained access control of encrypted data and ensures secure and efficient data sharing.The revenue distribution model is constructed based on Shapley value to motivate participants.Additionally,by integrating the smart contract technology of blockchain,the search operation and incentive mechanism are automatically executed.Through revenue distribution analysis,the incentive effect and rationality of the proposed scheme are verified.Performance evaluation shows that,compared with traditional data-sharing models,our proposed framework not only meets data security requirements but also incentivizes more participants to actively participate in data sharing.
文摘This study tested a multilevel model of the workplace territorial behaviors and employees’knowledge sharing relationship,with team identification serving as a mediator and task interdependence as a moderator.Data were collected from 253 employees(females=128,mean age=28.626,SD=6.470)from 40 work teams from different industries in China.Path analysis results indicated that workplace territorial behaviors were associated with lower employee knowledge sharing.Team identification enhanced employee knowledge sharing and partially mediated the relationship between workplace territorial behaviors and employee knowledge sharing.Task interdependence enhanced knowledge sharing and strengthened the relationship between team identification and knowledge sharing.Thesefindings extend the proposition of social information processing theory by revealing the mediating role of team identification in the relationship between workplace territorial behaviors and knowledge sharing,and clarifying the boundary conditions of team identification.Practical implications of thesefindings include a need for managers to foster collaborative atmospheres,design interdependent tasks,and mitigate territorial behaviors to enhance team identification and knowledge sharing.
基金Project supported by the National Natural Science Foundation of China(Grant No.62002105)the Key Research and Development Program of Hubei,China(Grant No.2021BEA163)。
文摘At present,most quantum secret sharing(QSS)protocols are more or less designed with the incorporation of classical secret sharing schemes.With the increasing maturity of quantum technology,QSS protocols based on pure quantum mechanics are becoming more important.Classical secret sharing schemes cannot achieve absolute security,and their involvement can compromise the security of QSS protocols.This paper proposes a QSS scheme based on Greenberger-Horn-Zeilinger(GHZ)basis measurement and quantum entanglement exchange.In this protocol,the secret sender stores the secret information using Pauli operations.Participants obtain their shares by measuring the product state sequentially.Finally,participants complete the secret reconstruction through quantum entanglement exchange and other related quantum operations.In addition,the particles held by participants in the protocol do not contain any secret information.Each participant's particles are in a state of maximum entanglement,and no participant can deduce the particle information of other participants through their own particles.At the same time,the protocol is based on pure quantum mechanics and does not involve classical schemes,which avoids the problem of reduced security of the protocol.Security analysis indicates that the protocol is not vulnerable to retransmission interception and collusion attacks.Moreover,it is capable of detecting and terminating the protocol promptly when facing with attacks from dishonest participants.
文摘This study explores the interaction of responsible leadership,supportive climate,and creative self-efficacy in enhancing knowledge sharing among employees in the banking sector.Data from 314 employees(42%Females,58%Males)were analyzed using structural equation modeling(SEM)and a time-lagged survey design.The analysis revealed a higher responsible leadership to be associated with both creative self-efficacy and knowledge sharing.Additionally,the study found that supportive climate moderation to significantly,strengthening the relationship between responsible leadership and knowledge sharing.Creative self-efficacy partially mediated this relationship to be stronger.The results indicate that responsible leadership and a supportive climate are crucial socio-cognitive mechanisms for enhancing knowledge sharing in organizations.The banking sector should aim to promote collaborative work partnerships implementing responsible leadership practices and cultivating supportive work environments to bolster organizational growth and competitiveness.
基金supported by Hainan Provincial Natural Science Foundation of China Nos.622RC617,624RC485Open Foundation of State Key Laboratory of Networking and Switching Technology(Beijing University of Posts and Telecommunications)(SKLNST-2023-1-07).
文摘The advent of the digital age has consistently provided impetus for facilitating global trade,as evidenced by the numerous customs clearance documents and participants involved in the international trade process,including enterprises,agents,and government departments.However,the urgent issue that requires immediate attention is how to achieve secure and efficient cross-border data sharing among these government departments and enterprises in complex trade processes.In addressing this need,this paper proposes a data exchange architecture employing Multi-Authority Attribute-Based Encryption(MA-ABE)in combination with blockchain technology.This scheme supports proxy decryption,attribute revocation,and policy update,while allowing each participating entity to manage their keys autonomously,ensuring system security and enhancing trust among participants.In order to enhance system decentralization,a mechanism has been designed in the architecture where multiple institutions interact with smart contracts and jointly participate in the generation of public parameters.Integration with the multi-party process execution engine Caterpillar has been shown to boost the transparency of cross-border information flow and cooperation between different organizations.The scheme ensures the auditability of data access control information and the visualization of on-chain data sharing.The MA-ABE scheme is statically secure under the q-Decisional Parallel Bilinear Diffie-Hellman Exponent(q-DPBDHE2)assumption in the random oracle model,and can resist ciphertext rollback attacks to achieve true backward and forward security.Theoretical analysis and experimental results demonstrate the appropriateness of the scheme for cross-border data collaboration between different institutions.
基金Research results of Shandong Provincial Education Science“14^(th) Five-Year Plan”2021,Research on Painting Interpretation and Psychological Intervention of Rural Left-behind Children(Project No.:2021ZD043)。
文摘Sharing behavior is of great significance to the development of young children.This paper takes 170 middle class children as a sample to explore the influencing factors of sharing behavior in preschool children and its age development characteristics.This study shows that the score of willingness to share and the number of shares was inversely proportional to the value of the shared items;When there is an abundance of items to share,children share significantly more in the presence of the sharing partner than in the absence of the partner.Based on the findings,educational recommendations are made from three aspects:cultivating intrinsic motivation in children,enhancing the stability of children’s behavior,and guiding children to form correct values.
基金supported by the National Natural Science Foundation of China(No.62171486 and No.U2001213)the Guangdong Basic and Applied Basic Research Project(2022A1515140166)。
文摘The lifetime of a wireless sensor network(WSN)is crucial for determining the maximum duration for data collection in Internet of Things applications.To extend the WSN's lifetime,we propose deploying an unmanned ground vehicle(UGV)within the energy-hungry WSN.This allows nodes,including sensors and the UGV,to share their energy using wireless power transfer techniques.To optimize the UGV's trajectory,we have developed a tabu searchbased method for global optimality,followed by a clustering-based method suitable for real-world applications.When the UGV reaches a stopping point,it functions as a regular sensor with ample battery.Accordingly,we have designed optimal data and energy allocation algorithms for both centralized and distributed deployment.Simulation results demonstrate that the UGV and energy-sharing significantly extend the WSN's lifetime.This effect is especially prominent in sparsely connected WSNs compared to highly connected ones,and energy-sharing has a more pronounced impact on network lifetime extension than UGV mobility.
基金L.Liang was supported in part by the Natural Science Foundation of Jiangsu Province under Grant BK20220810in part by the National Natural Science Foundation of China under Grant 62201145 and Grant 62231019S.Jin was supported in part by the National Natural Science Foundation of China(NSFC)under Grants 62261160576,62341107,61921004。
文摘In this paper,we investigate the problem of fast spectrum sharing in vehicle-to-everything com-munication.In order to improve the spectrum effi-ciency of the whole system,the spectrum of vehicle-to-infrastructure links is reused by vehicle-to-vehicle links.To this end,we model it as a problem of deep reinforcement learning and tackle it with prox-imal policy optimization.A considerable number of interactions are often required for training an agent with good performance,so simulation-based training is commonly used in communication networks.Nev-ertheless,severe performance degradation may occur when the agent is directly deployed in the real world,even though it can perform well on the simulator,due to the reality gap between the simulation and the real environments.To address this issue,we make prelim-inary efforts by proposing an algorithm based on meta reinforcement learning.This algorithm enables the agent to rapidly adapt to a new task with the knowl-edge extracted from similar tasks,leading to fewer in-teractions and less training time.Numerical results show that our method achieves near-optimal perfor-mance and exhibits rapid convergence.
基金The National Natural Science Foundation of China(No.72071042)。
文摘China’s healthcare system faces increasing challenges,including surging medical costs,resource allocation imbalances favoring large hospitals,and ineffective referral mechanisms.The lack of a unified strategy integrating standardized coverage with personalized payment compounds these issues.To this end,this study proposes a risk-sharing reform strategy that combines equal coverage for the same disease(ECSD)with an individualized out-of-pocket(I-OOP)model.Specifically,the study employs a Markov model to capture patient transitions across health states and care levels.The findings show that ECSD and I-OOP enhance equity by standardizing disease coverage while tailoring costs to patient income and facility type.This approach alleviates demand on high-tier hospitals,promoting primary care utilization and enabling balanced resource distribution.The study’s findings provide a reference for policymakers and healthcare administrators by presenting a scalable framework that is aligned with China’s development goals with the aim of fostering an efficient,sustainable healthcare system that is adaptable to regional needs.