Traditional agricultural irrigation systems waste significant amounts of water and energy due to inefficient scheduling and the absence of real-time monitoring capabilities.This research developed a comprehensive IoT-...Traditional agricultural irrigation systems waste significant amounts of water and energy due to inefficient scheduling and the absence of real-time monitoring capabilities.This research developed a comprehensive IoT-based smart irrigation control systemto optimize water and energy management in agricultural greenhouses while enhancing crop productivity.The system employs a sophisticated four-layer Internet ofThings(IoT)architecture based on an ESP32 microcontroller,integrated with multiple environmental sensors,including soil moisture,temperature,humidity,and light intensity sensors,for comprehensive environmental monitoring.The system utilizes the Message Queuing Telemetry Transport(MQTT)communication protocol for reliable data transmission and incorporates a Random Forest machine learning algorithm for automated irrigation decision-making processes.The Random Forest model achieved exceptional performance with 99.3%overall accuracy,demonstrating high model reliability.Six operational modules were developed and implemented with three distinct control methods:manual operation,condition-based automatic control,and AI-driven intelligent control systems.A comprehensive one-month comparative analysis demonstrated remarkable improvements across multiple performance metrics:a 50%reduction in both water consumption(from 140 to 70 L/day)and energy usage(from 7.00 to 3.50 kWh/day),a substantial 130%increase in water use efficiency,and a significant 50%decrease in CO_(2) emissions.Furthermore,detailed factor importance analysis revealed soil moisture as the primary decision factor(38.6%),followed by temporal factors(20.3%)and light intensity(18.4%).The system demonstrates exceptional potential for annual energy conservation of 1277.5 kWh and CO_(2) emission reduction of 638.75 kg,contributing substantially to sustainable development goals and advancing smart agriculture technologies.展开更多
In daily life,keyword spotting plays an important role in human-computer interaction.However,noise often interferes with the extraction of time-frequency information,and achieving both computational efficiency and rec...In daily life,keyword spotting plays an important role in human-computer interaction.However,noise often interferes with the extraction of time-frequency information,and achieving both computational efficiency and recognition accuracy on resource-constrained devices such as mobile terminals remains a major challenge.To address this,we propose a novel time-frequency dual-branch parallel residual network,which integrates a Dual-Branch Broadcast Residual module and a Time-Frequency Coordinate Attention module.The time-domain and frequency-domain branches are designed in parallel to independently extract temporal and spectral features,effectively avoiding the potential information loss caused by serial stacking,while enhancing information flow and multi-scale feature fusion.In terms of training strategy,a curriculum learning approach is introduced to progressively improve model robustness fromeasy to difficult tasks.Experimental results demonstrate that the proposed method consistently outperforms existing lightweight models under various signal-to-noise ratio(SNR)conditions,achieving superior far-field recognition performance on the Google Speech Commands V2 dataset.Notably,the model maintains stable performance even in low-SNR environments such as–10 dB,and generalizes well to unseen SNR conditions during training,validating its robustness to novel noise scenarios.Furthermore,the proposed model exhibits significantly fewer parameters,making it highly suitable for deployment on resource-limited devices.Overall,the model achieves a favorable balance between performance and parameter efficiency,demonstrating strong potential for practical applications.展开更多
Hepatitis B Virus(HBV)infection and heavy alcohol consumption are the two primary pathogenic causes of liver cirrhosis.In this paper,we proposed a deterministic mathematical model and a logistic equation to investigat...Hepatitis B Virus(HBV)infection and heavy alcohol consumption are the two primary pathogenic causes of liver cirrhosis.In this paper,we proposed a deterministic mathematical model and a logistic equation to investigate the dynamics of liver cirrhosis progression as well as to explain the implications of variations in alcohol consumption on chronic hepatitis B patients,respectively.The intricate interactions between liver cirrhosis,recovery,and treatment dynamics are captured by the model.This study aims to show that alcohol consumption by Hepatitis B-infected individuals accelerates liver cirrhosis progression while treatment of acutely infected individuals reduces it.We proved that a unique solution of the proposed model exists,which is positive and bounded.Using the next-generation matrix approach,two basic reproductive numbers R_(A_(0))and R_(A_(max))are calculated to identify future recurrence.The equilibrium points are calculated,and both equilibria are proved locally and globally asymptotically stable when R_(0)is below and above one,respectively.It is shown that bifurcation exists at R_(0)=1 and a detailed proof for forward bifurcation is given.Furthermore,we performed the sensitivity analysis of the model parameters on R_(0).For the confirmation of analytical work,we performed numerical simulations,and the results indicate that the treatment and the inhibitory effects reduce the risk of developing liver cirrhosis in individuals,while heavy alcohol consumption accelerates markedly the liver cirrhosis progression in patients with chronic hepatitis B.展开更多
The cloud-fog computing paradigm has emerged as a novel hybrid computing model that integrates computational resources at both fog nodes and cloud servers to address the challenges posed by dynamic and heterogeneous c...The cloud-fog computing paradigm has emerged as a novel hybrid computing model that integrates computational resources at both fog nodes and cloud servers to address the challenges posed by dynamic and heterogeneous computing networks.Finding an optimal computational resource for task offloading and then executing efficiently is a critical issue to achieve a trade-off between energy consumption and transmission delay.In this network,the task processed at fog nodes reduces transmission delay.Still,it increases energy consumption,while routing tasks to the cloud server saves energy at the cost of higher communication delay.Moreover,the order in which offloaded tasks are executed affects the system’s efficiency.For instance,executing lower-priority tasks before higher-priority jobs can disturb the reliability and stability of the system.Therefore,an efficient strategy of optimal computation offloading and task scheduling is required for operational efficacy.In this paper,we introduced a multi-objective and enhanced version of Cheeta Optimizer(CO),namely(MoECO),to jointly optimize the computation offloading and task scheduling in cloud-fog networks to minimize two competing objectives,i.e.,energy consumption and communication delay.MoECO first assigns tasks to the optimal computational nodes and then the allocated tasks are scheduled for processing based on the task priority.The mathematical modelling of CO needs improvement in computation time and convergence speed.Therefore,MoECO is proposed to increase the search capability of agents by controlling the search strategy based on a leader’s location.The adaptive step length operator is adjusted to diversify the solution and thus improves the exploration phase,i.e.,global search strategy.Consequently,this prevents the algorithm from getting trapped in the local optimal solution.Moreover,the interaction factor during the exploitation phase is also adjusted based on the location of the prey instead of the adjacent Cheetah.This increases the exploitation capability of agents,i.e.,local search capability.Furthermore,MoECO employs a multi-objective Pareto-optimal front to simultaneously minimize designated objectives.Comprehensive simulations in MATLAB demonstrate that the proposed algorithm obtains multiple solutions via a Pareto-optimal front and achieves an efficient trade-off between optimization objectives compared to baseline methods.展开更多
In Human–Robot Interaction(HRI),generating robot trajectories that accurately reflect user intentions while ensuring physical realism remains challenging,especially in unstructured environments.In this study,we devel...In Human–Robot Interaction(HRI),generating robot trajectories that accurately reflect user intentions while ensuring physical realism remains challenging,especially in unstructured environments.In this study,we develop a multimodal framework that integrates symbolic task reasoning with continuous trajectory generation.The approach employs transformer models and adversarial training to map high-level intent to robotic motion.Information from multiple data sources,such as voice traits,hand and body keypoints,visual observations,and recorded paths,is integrated simultaneously.These signals are mapped into a shared representation that supports interpretable reasoning while enabling smooth and realistic motion generation.Based on this design,two different learning strategies are investigated.In the first step,grammar-constrained Linear Temporal Logic(LTL)expressions are created from multimodal human inputs.These expressions are subsequently decoded into robot trajectories.The second method generates trajectories directly from symbolic intent and linguistic data,bypassing an intermediate logical representation.Transformer encoders combine multiple types of information,and autoregressive transformer decoders generate motion sequences.Adding smoothness and speed limits during training increases the likelihood of physical feasibility.To improve the realism and stability of the generated trajectories during training,an adversarial discriminator is also included to guide them toward the distribution of actual robot motion.Tests on the NATSGLD dataset indicate that the complete system exhibits stable training behaviour and performance.In normalised coordinates,the logic-based pipeline has an Average Displacement Error(ADE)of 0.040 and a Final Displacement Error(FDE)of 0.036.The adversarial generator makes substantially more progress,reducing ADE to 0.021 and FDE to 0.018.Visual examination confirms that the generated trajectories closely align with observed motion patterns while preserving smooth temporal dynamics.展开更多
The Yuncheng Basin,located in the southern part of the Fenwei Rift,North China,exhibits obvious crust thinning(Moho uplift of 6-8 km)and shallow Curie point depth(less than 18 km)and hence holds great potential for ge...The Yuncheng Basin,located in the southern part of the Fenwei Rift,North China,exhibits obvious crust thinning(Moho uplift of 6-8 km)and shallow Curie point depth(less than 18 km)and hence holds great potential for geothermal resources.However,geothermal exploration within the Yuncheng Basin typically faces significant challenges due to civil and industrial noise from dense populations and industrial activities.To address these challenges,both Controlled-Source Audio-frequency Magnetotellurics(CSAMT)and radon measurements were employed in Baozigou village to investigate the geothermal structures and identify potential geothermal targets.The CSAMT method effectively delineated the structure of the subsurface hydrothermal system,identifying the reservoir as Paleogene sandstones and Ordovician and Cambrian limestones at elevations ranging from−800 m to−2500 m.In particular,two concealed normal faults(F_(a)and F_(b))were newly revealed by the combination of CSAMT and radon profiling;these previously undetected faults,which exhibit different scales and opposing dips,are likely to be responsible for controlling the convection of thermal water within the Basin’s subsurface hydrothermal system.Moreover,this study developed a preliminary conceptual geothermal model for the Fen River Depression within the Yuncheng Basin,which encompasses geothermal heat sources,cap rocks,reservoirs,and fluid pathways,providing valuable insights for future geothermal exploration.In conjunction with the 3D geological model constructed from CSAMT resistivity structures beneath Baozigou village,test drilling is recommended in the northwestern region of the Baozigou area to intersect the potentially deep fractured carbonates that may contain temperature-elevated geothermal water.This study establishes a good set of guidelines for future geothermal exploration in this region,indicating that high-permeability faults in the central segments of the Fen River Depression are promising targets.展开更多
Geographic information technologies(GIT)have matured,have become pervasive throughout many types of organizations over recent decades and gained a wide range of attention in diverse sectors of society.The goal of this...Geographic information technologies(GIT)have matured,have become pervasive throughout many types of organizations over recent decades and gained a wide range of attention in diverse sectors of society.The goal of this paper is to identify the main drivers and uses of GIT in organizations and to give an overview of GIT uses in developing countries with a focus on a case study developed for Mozambique by analyzing the results of a survey of 123 Mozambican organizations that are current GIT users.The results show that the main drivers behind are compatibility,complexity,competitive pressure,donor pressure,government policy,intention to adopt,innovation,relative advantage,security,and technology competence.Organizations of the public and private sectors use GIT for customer/resource/risk management,decision support,education,research,monitoring,prediction,simulation,suitability analysis,sustainability,use and access.展开更多
An e-tag used on the freeway is a kind of passive sensors composed of sensors and radio- frequency identification (RFID) tags. The principle of the electronic toll collection system is that the sensor emits radio wa...An e-tag used on the freeway is a kind of passive sensors composed of sensors and radio- frequency identification (RFID) tags. The principle of the electronic toll collection system is that the sensor emits radio waves touching the e-tag within a certain range, the e-tag will respond to the radio waves by induction, and the sensor will read and write information of the vehicles. Although the RFID technology is popularly used in campus management systems, there is no e-tag technology application used in a campus parking system. In this paper, we use the e-tag technology on a campus parking management system based on the cloud-based construction. By this, it helps to achieve automated and standardized management of the campus parking system, enhance management efficiency, reduce the residence time of the vehicles at the entrances and exits, and improve the efficiency of vehicles parked at the same time.展开更多
On the basis of expounding connotation and significance of expansion of agricultural industrial chain,coupled with the connotation of rural informatization connotation,this article analyses the role of rural informati...On the basis of expounding connotation and significance of expansion of agricultural industrial chain,coupled with the connotation of rural informatization connotation,this article analyses the role of rural informatization in expanding agricultural industrial chain:it can enhance market competitiveness of industry chain,improve the operational efficiency of industry chain,and promote the income and quality of farmers in industry chain.Under the perspective of expanding agricultural industrial chain,this article puts forwards thinking about the construction of rural informatization as follows:first,give full play to the leading role of the government;second,strengthen the construction of information-based network facility;third,integrate information resources in rural areas,and improve the quality of information;fourth,build comprehensive information service platform in rural areas;fifth,improve organizational level of production and management of individual farmers;sixth,strengthen the construction of information-based personnel in rural areas;seventh,strengthen publicity and training,promote overall cultural quality and information awareness of farmers.展开更多
Purpose: This study investigates how online user intention in searching health information is affected by problematic situations.Design/methodology/approach: Based on the Theory of Reasoned Action, the Technology Ac...Purpose: This study investigates how online user intention in searching health information is affected by problematic situations.Design/methodology/approach: Based on the Theory of Reasoned Action, the Technology Acceptance Model, and Sense-making theory, we propose two dimensions of problematic situations: urgency and severity of health issues being searched online. Data were collected through a questionnaire survey among 214 Wuhan University students and analyzed using hierarchical regression analysis.Findings: Perceived usefulness, perceived ease of use, and subjective norm can influence user intention to seek health information online. The urgency of problematic situations has a negative moderating effect on the relationship between perceived ease of use and user intention and the relationship between subjective norm and user intention. The severity of problematic situations has a negative moderating effect on the relationship between subjective norm and user intention.Research limitations: The respondents of the survey are limited to students in one Chinese university, so whether this study's results can be applied to another population or not remains to be verified. In addition, only two dimensions of problematic situations are considered in this study. Practical implications: The paper puts forward the moderating effect of problematic situations and verifies it, which is the compensation for online health information-seeking behavior research. Besides, our analyses have implications for professional design of health care systems and related consumer information searches, and improve their performance. Originality/value: Previous work has reported the effects of problematic situation on user intention to seek health information online, ignoring its influence on other factors. This empirical study extends that work to identify the influence of problematic situation when seeking intention-behavior data in two dimensions, urgency and severity.展开更多
With the popularity of 5G and the rapid development of mobile terminals,an endless stream of short video software exists.Browsing short-form mobile video in fragmented time has become the mainstream of user’s life.He...With the popularity of 5G and the rapid development of mobile terminals,an endless stream of short video software exists.Browsing short-form mobile video in fragmented time has become the mainstream of user’s life.Hence,designing an efficient short video recommendation method has become important for major network platforms to attract users and satisfy their requirements.Nevertheless,the explosive growth of data leads to the low efficiency of the algorithm,which fails to distill users’points of interest on one hand effectively.On the other hand,integrating user preferences and the content of items urgently intensify the requirements for platform recommendation.In this paper,we propose a collaborative filtering algorithm,integrating time context information and user context,which pours attention into expanding and discovering user interest.In the first place,we introduce the temporal context information into the typical collaborative filtering algorithm,and leverage the popularity penalty function to weight the similarity between recommended short videos and the historical short videos.There remains one more point.We also introduce the user situation into the traditional collaborative filtering recommendation algorithm,considering the context information of users in the generation recommendation stage,and weight the recommended short-formvideos of candidates.At last,a diverse approach is used to generate a Top-K recommendation list for users.And through a case study,we illustrate the accuracy and diversity of the proposed method.展开更多
Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed ...Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA.展开更多
Based on the technology of Internet of things, for the issues of large amount data acquisition and difficult real time transport in the data acquisition of crop growth environment, this paper designs one information c...Based on the technology of Internet of things, for the issues of large amount data acquisition and difficult real time transport in the data acquisition of crop growth environment, this paper designs one information collection system for crop growth environment. Utilizing the range free location mechanism which defines the node position and GEAR routing mechanism give solutions to the problems of node location, routing protocol applications and so on. This system can realize accurate and automatic real time collection, aggregation and transmission of crop growth environment information, and can achieve the automation of agricultural production, to the maximum extent.展开更多
‘Empowerment’is the result of pursuing special capabilities under a specific value orientation.The changes in related object capabilities triggered by scientific and technical information activities in the new envir...‘Empowerment’is the result of pursuing special capabilities under a specific value orientation.The changes in related object capabilities triggered by scientific and technical information activities in the new environment are important to the national scientific and technical(S&T)information governance.Based on the empowerment theories and evaluation practices,this study attempts to construct an empowerment evaluation framework for national S&T information governance and takes the participatory technology assessment and Altmetrics methods as examples to demonstrate its advantages:1)The capability changes and development potential are regarded as important basis for evaluation;2)The multi-person participation and multi-indicator comprehensive evaluation method is conducive to the democratic and objective nature of science and technology information governance policy formulation.展开更多
Quality, Health, Safety and Environmental (QHSE) management is an integral part of company management system. PetroChina Company Limited(PetroChina) has all along regarded QHSE business as the consistent standpoin...Quality, Health, Safety and Environmental (QHSE) management is an integral part of company management system. PetroChina Company Limited(PetroChina) has all along regarded QHSE business as the consistent standpoint of self-developing. One of its most important tasks is to safeguard its staff's health, take precautions against accidents and protect the environment. Nowadays, information system has been recognizing as one of the most magic way to enhance management through out in the world leading oil company. In order to build an effective HSE system easily to implement and maintain, in January 2004, PetroChina invited IBM to help on conducting a feasibility study for Health, Safety and Environment (HSE) system. In March 2005, PetroChina kicked off the pilot phase of first enterprise-wide QHSE software implementation project. A very comprehensive selection of Essential SuiteTM (ESS), the fully integrated, browser-based solution by ESS has been chosen for the implementation. PetroChina is collaborating with IBM Global Services and ESS on the pilot project.展开更多
With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat...With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy.展开更多
Purpose: This paper introduces an approach to technology evolution analysis using patent information based on Subject-Action-Object(SAO) structures.Design/methodology/approach: First, SAO structures were extracted fro...Purpose: This paper introduces an approach to technology evolution analysis using patent information based on Subject-Action-Object(SAO) structures.Design/methodology/approach: First, SAO structures were extracted from patent documents and were cleaned. Second, several dimension-reduction techniques were used to generate technology topics. Then, the hierarchical relationships between technology topics were calculated based on patent clustering. Finally, technology evolution maps were drawn by adding a timeline.Findings: This approach can reveal technology evolution processes from multiple perspectives than other approaches.Research limitations: The semantic annotation of an SAO type is not very accurate and the semantic types of technology topics need to be enriched.Practical implications: The approach can be applied to draw technology evolution maps using different types of technology topics such as problem or solution.Originality/value: This approach offers an analytical dimension and more details than existing techniques, and it helps identify fundamental and emerging technologies more accurately and comprehensively.展开更多
Purpose: This paper intends to explore a quantitative method for investigating the characteristics of information diffusion through social media like weblogs and microblogs.By using the social network analysis methods...Purpose: This paper intends to explore a quantitative method for investigating the characteristics of information diffusion through social media like weblogs and microblogs.By using the social network analysis methods,we attempt to analyze the different characteristics of information diffusion in weblogs and microblogs as well as the possible reasons of these differences.Design/methodology/approach: Using the social network analysis methods,this paper carries out an empirical study by taking the Chinese weblogs and microblogs in the field of Library and Information Science(LIS) as the research sample and employing measures such as network density,core/peripheral structure and centrality.Findings: Firstly,both bloggers and microbloggers maintain weak ties,and both of their social networks display a small-world effect. Secondly,compared with weblog users,microblog users are more interconnected,more equal and more capable of developing relationships with people outside their own social networks. Thirdly,the microblogging social network is more conducive to information diffusion than the blogging network,because of their differences in functions and the information flow mechanism. Finally,the communication mode emerged with microblogging,with the characteristics of micro-content,multi-channel information dissemination,dense and decentralized social network and content aggregation,will be one of the trends in the development of the information exchange platform in the future.Research limitations: The sample size needs to be increased so that samples are more representative. Errors may exist during the data collection. Moreover,the individual-level characteristics of the samples as well as the types of information exchanged need to be further studied.Practical implications: This preliminary study explores the characteristics of information diffusion in the network environment and verifies the feasibility of conducting a quantitative analysis of information diffusion through social media. In addition,it provides insight into the characteristics of information diffusion in weblogs and microblogs and the possible reasons of these differences.Originality/value: We have analyzed the characteristics of information diffusion in weblogs and microblogs by using the social network analysis methods. This research will be useful for a quantitative analysis of the underlying mechanisms of information flow through social media in the network environment.展开更多
Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is ab...Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is about n times as much as the quantity of real network information (Ir). According to this theoretical model, we give a uniform explanation to all kinds of information growth models in existence, and put forward some proposals, such as "forbidding information transfer" and "building up the central information base", to control the repeated information flooding on the network and facilitate the full use of network information.展开更多
文摘Traditional agricultural irrigation systems waste significant amounts of water and energy due to inefficient scheduling and the absence of real-time monitoring capabilities.This research developed a comprehensive IoT-based smart irrigation control systemto optimize water and energy management in agricultural greenhouses while enhancing crop productivity.The system employs a sophisticated four-layer Internet ofThings(IoT)architecture based on an ESP32 microcontroller,integrated with multiple environmental sensors,including soil moisture,temperature,humidity,and light intensity sensors,for comprehensive environmental monitoring.The system utilizes the Message Queuing Telemetry Transport(MQTT)communication protocol for reliable data transmission and incorporates a Random Forest machine learning algorithm for automated irrigation decision-making processes.The Random Forest model achieved exceptional performance with 99.3%overall accuracy,demonstrating high model reliability.Six operational modules were developed and implemented with three distinct control methods:manual operation,condition-based automatic control,and AI-driven intelligent control systems.A comprehensive one-month comparative analysis demonstrated remarkable improvements across multiple performance metrics:a 50%reduction in both water consumption(from 140 to 70 L/day)and energy usage(from 7.00 to 3.50 kWh/day),a substantial 130%increase in water use efficiency,and a significant 50%decrease in CO_(2) emissions.Furthermore,detailed factor importance analysis revealed soil moisture as the primary decision factor(38.6%),followed by temporal factors(20.3%)and light intensity(18.4%).The system demonstrates exceptional potential for annual energy conservation of 1277.5 kWh and CO_(2) emission reduction of 638.75 kg,contributing substantially to sustainable development goals and advancing smart agriculture technologies.
文摘In daily life,keyword spotting plays an important role in human-computer interaction.However,noise often interferes with the extraction of time-frequency information,and achieving both computational efficiency and recognition accuracy on resource-constrained devices such as mobile terminals remains a major challenge.To address this,we propose a novel time-frequency dual-branch parallel residual network,which integrates a Dual-Branch Broadcast Residual module and a Time-Frequency Coordinate Attention module.The time-domain and frequency-domain branches are designed in parallel to independently extract temporal and spectral features,effectively avoiding the potential information loss caused by serial stacking,while enhancing information flow and multi-scale feature fusion.In terms of training strategy,a curriculum learning approach is introduced to progressively improve model robustness fromeasy to difficult tasks.Experimental results demonstrate that the proposed method consistently outperforms existing lightweight models under various signal-to-noise ratio(SNR)conditions,achieving superior far-field recognition performance on the Google Speech Commands V2 dataset.Notably,the model maintains stable performance even in low-SNR environments such as–10 dB,and generalizes well to unseen SNR conditions during training,validating its robustness to novel noise scenarios.Furthermore,the proposed model exhibits significantly fewer parameters,making it highly suitable for deployment on resource-limited devices.Overall,the model achieves a favorable balance between performance and parameter efficiency,demonstrating strong potential for practical applications.
文摘Hepatitis B Virus(HBV)infection and heavy alcohol consumption are the two primary pathogenic causes of liver cirrhosis.In this paper,we proposed a deterministic mathematical model and a logistic equation to investigate the dynamics of liver cirrhosis progression as well as to explain the implications of variations in alcohol consumption on chronic hepatitis B patients,respectively.The intricate interactions between liver cirrhosis,recovery,and treatment dynamics are captured by the model.This study aims to show that alcohol consumption by Hepatitis B-infected individuals accelerates liver cirrhosis progression while treatment of acutely infected individuals reduces it.We proved that a unique solution of the proposed model exists,which is positive and bounded.Using the next-generation matrix approach,two basic reproductive numbers R_(A_(0))and R_(A_(max))are calculated to identify future recurrence.The equilibrium points are calculated,and both equilibria are proved locally and globally asymptotically stable when R_(0)is below and above one,respectively.It is shown that bifurcation exists at R_(0)=1 and a detailed proof for forward bifurcation is given.Furthermore,we performed the sensitivity analysis of the model parameters on R_(0).For the confirmation of analytical work,we performed numerical simulations,and the results indicate that the treatment and the inhibitory effects reduce the risk of developing liver cirrhosis in individuals,while heavy alcohol consumption accelerates markedly the liver cirrhosis progression in patients with chronic hepatitis B.
基金appreciation to the Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2025R384)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘The cloud-fog computing paradigm has emerged as a novel hybrid computing model that integrates computational resources at both fog nodes and cloud servers to address the challenges posed by dynamic and heterogeneous computing networks.Finding an optimal computational resource for task offloading and then executing efficiently is a critical issue to achieve a trade-off between energy consumption and transmission delay.In this network,the task processed at fog nodes reduces transmission delay.Still,it increases energy consumption,while routing tasks to the cloud server saves energy at the cost of higher communication delay.Moreover,the order in which offloaded tasks are executed affects the system’s efficiency.For instance,executing lower-priority tasks before higher-priority jobs can disturb the reliability and stability of the system.Therefore,an efficient strategy of optimal computation offloading and task scheduling is required for operational efficacy.In this paper,we introduced a multi-objective and enhanced version of Cheeta Optimizer(CO),namely(MoECO),to jointly optimize the computation offloading and task scheduling in cloud-fog networks to minimize two competing objectives,i.e.,energy consumption and communication delay.MoECO first assigns tasks to the optimal computational nodes and then the allocated tasks are scheduled for processing based on the task priority.The mathematical modelling of CO needs improvement in computation time and convergence speed.Therefore,MoECO is proposed to increase the search capability of agents by controlling the search strategy based on a leader’s location.The adaptive step length operator is adjusted to diversify the solution and thus improves the exploration phase,i.e.,global search strategy.Consequently,this prevents the algorithm from getting trapped in the local optimal solution.Moreover,the interaction factor during the exploitation phase is also adjusted based on the location of the prey instead of the adjacent Cheetah.This increases the exploitation capability of agents,i.e.,local search capability.Furthermore,MoECO employs a multi-objective Pareto-optimal front to simultaneously minimize designated objectives.Comprehensive simulations in MATLAB demonstrate that the proposed algorithm obtains multiple solutions via a Pareto-optimal front and achieves an efficient trade-off between optimization objectives compared to baseline methods.
基金The authors extend their appreciation to Prince Sattam bin Abdulaziz University for funding this research work through the project number(PSAU/2024/01/32082).
文摘In Human–Robot Interaction(HRI),generating robot trajectories that accurately reflect user intentions while ensuring physical realism remains challenging,especially in unstructured environments.In this study,we develop a multimodal framework that integrates symbolic task reasoning with continuous trajectory generation.The approach employs transformer models and adversarial training to map high-level intent to robotic motion.Information from multiple data sources,such as voice traits,hand and body keypoints,visual observations,and recorded paths,is integrated simultaneously.These signals are mapped into a shared representation that supports interpretable reasoning while enabling smooth and realistic motion generation.Based on this design,two different learning strategies are investigated.In the first step,grammar-constrained Linear Temporal Logic(LTL)expressions are created from multimodal human inputs.These expressions are subsequently decoded into robot trajectories.The second method generates trajectories directly from symbolic intent and linguistic data,bypassing an intermediate logical representation.Transformer encoders combine multiple types of information,and autoregressive transformer decoders generate motion sequences.Adding smoothness and speed limits during training increases the likelihood of physical feasibility.To improve the realism and stability of the generated trajectories during training,an adversarial discriminator is also included to guide them toward the distribution of actual robot motion.Tests on the NATSGLD dataset indicate that the complete system exhibits stable training behaviour and performance.In normalised coordinates,the logic-based pipeline has an Average Displacement Error(ADE)of 0.040 and a Final Displacement Error(FDE)of 0.036.The adversarial generator makes substantially more progress,reducing ADE to 0.021 and FDE to 0.018.Visual examination confirms that the generated trajectories closely align with observed motion patterns while preserving smooth temporal dynamics.
基金supported by the Shanxi Province Basic Research Program(No.20210302123374)Yuncheng University Doctoral Research Initiation Fund(No.YQ-2021008)+3 种基金Excellent doctors come to Shanxi to reward scientific research projects(No.QZX-2023020)Open Fund of State Key Laboratory of Precision Geodesy(No.SKLPG2025-1-1)Joint Open Fund of the Research Platforms of School of Computer Science,China University of Geosciences,Wuhan(No.PTLH2024-B-03)Hubei Provincial Natural Science Foundation Project(No.2025AFC095).
文摘The Yuncheng Basin,located in the southern part of the Fenwei Rift,North China,exhibits obvious crust thinning(Moho uplift of 6-8 km)and shallow Curie point depth(less than 18 km)and hence holds great potential for geothermal resources.However,geothermal exploration within the Yuncheng Basin typically faces significant challenges due to civil and industrial noise from dense populations and industrial activities.To address these challenges,both Controlled-Source Audio-frequency Magnetotellurics(CSAMT)and radon measurements were employed in Baozigou village to investigate the geothermal structures and identify potential geothermal targets.The CSAMT method effectively delineated the structure of the subsurface hydrothermal system,identifying the reservoir as Paleogene sandstones and Ordovician and Cambrian limestones at elevations ranging from−800 m to−2500 m.In particular,two concealed normal faults(F_(a)and F_(b))were newly revealed by the combination of CSAMT and radon profiling;these previously undetected faults,which exhibit different scales and opposing dips,are likely to be responsible for controlling the convection of thermal water within the Basin’s subsurface hydrothermal system.Moreover,this study developed a preliminary conceptual geothermal model for the Fen River Depression within the Yuncheng Basin,which encompasses geothermal heat sources,cap rocks,reservoirs,and fluid pathways,providing valuable insights for future geothermal exploration.In conjunction with the 3D geological model constructed from CSAMT resistivity structures beneath Baozigou village,test drilling is recommended in the northwestern region of the Baozigou area to intersect the potentially deep fractured carbonates that may contain temperature-elevated geothermal water.This study establishes a good set of guidelines for future geothermal exploration in this region,indicating that high-permeability faults in the central segments of the Fen River Depression are promising targets.
基金This research was partially funded by NUFFIC,the Dutch organization for internationalization in education,through a doctoral grant[grant number:NICHE-MOZ-136].
文摘Geographic information technologies(GIT)have matured,have become pervasive throughout many types of organizations over recent decades and gained a wide range of attention in diverse sectors of society.The goal of this paper is to identify the main drivers and uses of GIT in organizations and to give an overview of GIT uses in developing countries with a focus on a case study developed for Mozambique by analyzing the results of a survey of 123 Mozambican organizations that are current GIT users.The results show that the main drivers behind are compatibility,complexity,competitive pressure,donor pressure,government policy,intention to adopt,innovation,relative advantage,security,and technology competence.Organizations of the public and private sectors use GIT for customer/resource/risk management,decision support,education,research,monitoring,prediction,simulation,suitability analysis,sustainability,use and access.
文摘An e-tag used on the freeway is a kind of passive sensors composed of sensors and radio- frequency identification (RFID) tags. The principle of the electronic toll collection system is that the sensor emits radio waves touching the e-tag within a certain range, the e-tag will respond to the radio waves by induction, and the sensor will read and write information of the vehicles. Although the RFID technology is popularly used in campus management systems, there is no e-tag technology application used in a campus parking system. In this paper, we use the e-tag technology on a campus parking management system based on the cloud-based construction. By this, it helps to achieve automated and standardized management of the campus parking system, enhance management efficiency, reduce the residence time of the vehicles at the entrances and exits, and improve the efficiency of vehicles parked at the same time.
文摘On the basis of expounding connotation and significance of expansion of agricultural industrial chain,coupled with the connotation of rural informatization connotation,this article analyses the role of rural informatization in expanding agricultural industrial chain:it can enhance market competitiveness of industry chain,improve the operational efficiency of industry chain,and promote the income and quality of farmers in industry chain.Under the perspective of expanding agricultural industrial chain,this article puts forwards thinking about the construction of rural informatization as follows:first,give full play to the leading role of the government;second,strengthen the construction of information-based network facility;third,integrate information resources in rural areas,and improve the quality of information;fourth,build comprehensive information service platform in rural areas;fifth,improve organizational level of production and management of individual farmers;sixth,strengthen the construction of information-based personnel in rural areas;seventh,strengthen publicity and training,promote overall cultural quality and information awareness of farmers.
基金supported in part by the Key Projects of Philosophy and Social Sciences Research supported by the Ministry of Education of the People’s Republic of China(Grant No.:15JJD870001)Luo Jia Youth Scholar of Wuhan University
文摘Purpose: This study investigates how online user intention in searching health information is affected by problematic situations.Design/methodology/approach: Based on the Theory of Reasoned Action, the Technology Acceptance Model, and Sense-making theory, we propose two dimensions of problematic situations: urgency and severity of health issues being searched online. Data were collected through a questionnaire survey among 214 Wuhan University students and analyzed using hierarchical regression analysis.Findings: Perceived usefulness, perceived ease of use, and subjective norm can influence user intention to seek health information online. The urgency of problematic situations has a negative moderating effect on the relationship between perceived ease of use and user intention and the relationship between subjective norm and user intention. The severity of problematic situations has a negative moderating effect on the relationship between subjective norm and user intention.Research limitations: The respondents of the survey are limited to students in one Chinese university, so whether this study's results can be applied to another population or not remains to be verified. In addition, only two dimensions of problematic situations are considered in this study. Practical implications: The paper puts forward the moderating effect of problematic situations and verifies it, which is the compensation for online health information-seeking behavior research. Besides, our analyses have implications for professional design of health care systems and related consumer information searches, and improve their performance. Originality/value: Previous work has reported the effects of problematic situation on user intention to seek health information online, ignoring its influence on other factors. This empirical study extends that work to identify the influence of problematic situation when seeking intention-behavior data in two dimensions, urgency and severity.
文摘With the popularity of 5G and the rapid development of mobile terminals,an endless stream of short video software exists.Browsing short-form mobile video in fragmented time has become the mainstream of user’s life.Hence,designing an efficient short video recommendation method has become important for major network platforms to attract users and satisfy their requirements.Nevertheless,the explosive growth of data leads to the low efficiency of the algorithm,which fails to distill users’points of interest on one hand effectively.On the other hand,integrating user preferences and the content of items urgently intensify the requirements for platform recommendation.In this paper,we propose a collaborative filtering algorithm,integrating time context information and user context,which pours attention into expanding and discovering user interest.In the first place,we introduce the temporal context information into the typical collaborative filtering algorithm,and leverage the popularity penalty function to weight the similarity between recommended short videos and the historical short videos.There remains one more point.We also introduce the user situation into the traditional collaborative filtering recommendation algorithm,considering the context information of users in the generation recommendation stage,and weight the recommended short-formvideos of candidates.At last,a diverse approach is used to generate a Top-K recommendation list for users.And through a case study,we illustrate the accuracy and diversity of the proposed method.
基金National Natural Science Foundation of China(No.61271152)Natural Science Foundation of Hebei Province,China(No.F2012506008)the Original Innovation Foundation of Ordnance Engineering College,China(No.YSCX0903)
文摘Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA.
文摘Based on the technology of Internet of things, for the issues of large amount data acquisition and difficult real time transport in the data acquisition of crop growth environment, this paper designs one information collection system for crop growth environment. Utilizing the range free location mechanism which defines the node position and GEAR routing mechanism give solutions to the problems of node location, routing protocol applications and so on. This system can realize accurate and automatic real time collection, aggregation and transmission of crop growth environment information, and can achieve the automation of agricultural production, to the maximum extent.
基金Supported by the National Social Science Fund of China(No.16BTQ058)
文摘‘Empowerment’is the result of pursuing special capabilities under a specific value orientation.The changes in related object capabilities triggered by scientific and technical information activities in the new environment are important to the national scientific and technical(S&T)information governance.Based on the empowerment theories and evaluation practices,this study attempts to construct an empowerment evaluation framework for national S&T information governance and takes the participatory technology assessment and Altmetrics methods as examples to demonstrate its advantages:1)The capability changes and development potential are regarded as important basis for evaluation;2)The multi-person participation and multi-indicator comprehensive evaluation method is conducive to the democratic and objective nature of science and technology information governance policy formulation.
文摘Quality, Health, Safety and Environmental (QHSE) management is an integral part of company management system. PetroChina Company Limited(PetroChina) has all along regarded QHSE business as the consistent standpoint of self-developing. One of its most important tasks is to safeguard its staff's health, take precautions against accidents and protect the environment. Nowadays, information system has been recognizing as one of the most magic way to enhance management through out in the world leading oil company. In order to build an effective HSE system easily to implement and maintain, in January 2004, PetroChina invited IBM to help on conducting a feasibility study for Health, Safety and Environment (HSE) system. In March 2005, PetroChina kicked off the pilot phase of first enterprise-wide QHSE software implementation project. A very comprehensive selection of Essential SuiteTM (ESS), the fully integrated, browser-based solution by ESS has been chosen for the implementation. PetroChina is collaborating with IBM Global Services and ESS on the pilot project.
文摘With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy.
文摘Purpose: This paper introduces an approach to technology evolution analysis using patent information based on Subject-Action-Object(SAO) structures.Design/methodology/approach: First, SAO structures were extracted from patent documents and were cleaned. Second, several dimension-reduction techniques were used to generate technology topics. Then, the hierarchical relationships between technology topics were calculated based on patent clustering. Finally, technology evolution maps were drawn by adding a timeline.Findings: This approach can reveal technology evolution processes from multiple perspectives than other approaches.Research limitations: The semantic annotation of an SAO type is not very accurate and the semantic types of technology topics need to be enriched.Practical implications: The approach can be applied to draw technology evolution maps using different types of technology topics such as problem or solution.Originality/value: This approach offers an analytical dimension and more details than existing techniques, and it helps identify fundamental and emerging technologies more accurately and comprehensively.
基金supported by Sun Yat-sen University Cultivation Fund for Young Teachers(Grant No.:20000-3161102)the National Social Science Fundation of China(Grant No.:08CTQ015)
文摘Purpose: This paper intends to explore a quantitative method for investigating the characteristics of information diffusion through social media like weblogs and microblogs.By using the social network analysis methods,we attempt to analyze the different characteristics of information diffusion in weblogs and microblogs as well as the possible reasons of these differences.Design/methodology/approach: Using the social network analysis methods,this paper carries out an empirical study by taking the Chinese weblogs and microblogs in the field of Library and Information Science(LIS) as the research sample and employing measures such as network density,core/peripheral structure and centrality.Findings: Firstly,both bloggers and microbloggers maintain weak ties,and both of their social networks display a small-world effect. Secondly,compared with weblog users,microblog users are more interconnected,more equal and more capable of developing relationships with people outside their own social networks. Thirdly,the microblogging social network is more conducive to information diffusion than the blogging network,because of their differences in functions and the information flow mechanism. Finally,the communication mode emerged with microblogging,with the characteristics of micro-content,multi-channel information dissemination,dense and decentralized social network and content aggregation,will be one of the trends in the development of the information exchange platform in the future.Research limitations: The sample size needs to be increased so that samples are more representative. Errors may exist during the data collection. Moreover,the individual-level characteristics of the samples as well as the types of information exchanged need to be further studied.Practical implications: This preliminary study explores the characteristics of information diffusion in the network environment and verifies the feasibility of conducting a quantitative analysis of information diffusion through social media. In addition,it provides insight into the characteristics of information diffusion in weblogs and microblogs and the possible reasons of these differences.Originality/value: We have analyzed the characteristics of information diffusion in weblogs and microblogs by using the social network analysis methods. This research will be useful for a quantitative analysis of the underlying mechanisms of information flow through social media in the network environment.
基金This work was supported by the National Natural Science Foundation of China (Grant No. 70273032).
文摘Based on the assumptions of "information transfer" and "information creation", this paper educes the multiplied growth mechanism of network information: that the gross quantity of network information (Im) is about n times as much as the quantity of real network information (Ir). According to this theoretical model, we give a uniform explanation to all kinds of information growth models in existence, and put forward some proposals, such as "forbidding information transfer" and "building up the central information base", to control the repeated information flooding on the network and facilitate the full use of network information.