The vision of building a global community of shared future is a core tenet of Xi Jinping thought on diplomacy.Since it was first proposed in 2013,this concept has exhibited tremendous vitality,evolving from a conceptu...The vision of building a global community of shared future is a core tenet of Xi Jinping thought on diplomacy.Since it was first proposed in 2013,this concept has exhibited tremendous vitality,evolving from a conceptual proposition to a well-conceived system,from a promising vision to practical outcomes.展开更多
As the information sensing and processing capabilities of IoT devices increase,a large amount of data is being generated at the edge of Industrial IoT(IIoT),which has become a strong foundation for distributed Artific...As the information sensing and processing capabilities of IoT devices increase,a large amount of data is being generated at the edge of Industrial IoT(IIoT),which has become a strong foundation for distributed Artificial Intelligence(AI)applications.However,most users are reluctant to disclose their data due to network bandwidth limitations,device energy consumption,and privacy requirements.To address this issue,this paper introduces an Edge-assisted Federated Learning(EFL)framework,along with an incentive mechanism for lightweight industrial data sharing.In order to reduce the information asymmetry between data owners and users,an EFL model-sharing incentive mechanism based on contract theory is designed.In addition,a weight dispersion evaluation scheme based on Wasserstein distance is proposed.This study models an optimization problem of node selection and sharing incentives to maximize the EFL model consumers'profit and ensure the quality of training services.An incentive-based EFL algorithm with individual rationality and incentive compatibility constraints is proposed.Finally,the experimental results verify the effectiveness of the proposed scheme in terms of positive incentives for contract design and performance analysis of EFL systems.展开更多
With the increasing popularity of blockchain applications, the security of data sources on the blockchain is gradually receiving attention. Providing reliable data for the blockchain safely and efficiently has become ...With the increasing popularity of blockchain applications, the security of data sources on the blockchain is gradually receiving attention. Providing reliable data for the blockchain safely and efficiently has become a research hotspot, and the security of the oracle responsible for providing reliable data has attracted much attention. The most widely used centralized oracles in blockchain, such as Provable and Town Crier, all rely on a single oracle to obtain data, which suffers from a single point of failure and limits the large-scale development of blockchain. To this end, the distributed oracle scheme is put forward, but the existing distributed oracle schemes such as Chainlink and Augur generally have low execution efficiency and high communication overhead, which leads to their poor applicability. To solve the above problems, this paper proposes a trusted distributed oracle scheme based on a share recovery threshold signature. First, a data verification method of distributed oracles is designed based on threshold signature. By aggregating the signatures of oracles, data from different data sources can be mutually verified, leading to a more efficient data verification and aggregation process. Then, a credibility-based cluster head election algorithm is designed, which reduces the communication overhead by clarifying the function distribution and building a hierarchical structure. Considering the good performance of the BLS threshold signature in large-scale applications, this paper combines it with distributed oracle technology and proposes a BLS threshold signature algorithm that supports share recovery in distributed oracles. The share recovery mechanism enables the proposed scheme to solve the key loss issue, and the setting of the threshold value enables the proposed scheme to complete signature aggregation with only a threshold number of oracles, making the scheme more robust. Finally, experimental results indicate that, by using the threshold signature technology and the cluster head election algorithm, our scheme effectively improves the execution efficiency of oracles and solves the problem of a single point of failure, leading to higher scalability and robustness.展开更多
At present,most quantum secret sharing(QSS)protocols are more or less designed with the incorporation of classical secret sharing schemes.With the increasing maturity of quantum technology,QSS protocols based on pure ...At present,most quantum secret sharing(QSS)protocols are more or less designed with the incorporation of classical secret sharing schemes.With the increasing maturity of quantum technology,QSS protocols based on pure quantum mechanics are becoming more important.Classical secret sharing schemes cannot achieve absolute security,and their involvement can compromise the security of QSS protocols.This paper proposes a QSS scheme based on Greenberger-Horn-Zeilinger(GHZ)basis measurement and quantum entanglement exchange.In this protocol,the secret sender stores the secret information using Pauli operations.Participants obtain their shares by measuring the product state sequentially.Finally,participants complete the secret reconstruction through quantum entanglement exchange and other related quantum operations.In addition,the particles held by participants in the protocol do not contain any secret information.Each participant's particles are in a state of maximum entanglement,and no participant can deduce the particle information of other participants through their own particles.At the same time,the protocol is based on pure quantum mechanics and does not involve classical schemes,which avoids the problem of reduced security of the protocol.Security analysis indicates that the protocol is not vulnerable to retransmission interception and collusion attacks.Moreover,it is capable of detecting and terminating the protocol promptly when facing with attacks from dishonest participants.展开更多
The advent of the digital age has consistently provided impetus for facilitating global trade,as evidenced by the numerous customs clearance documents and participants involved in the international trade process,inclu...The advent of the digital age has consistently provided impetus for facilitating global trade,as evidenced by the numerous customs clearance documents and participants involved in the international trade process,including enterprises,agents,and government departments.However,the urgent issue that requires immediate attention is how to achieve secure and efficient cross-border data sharing among these government departments and enterprises in complex trade processes.In addressing this need,this paper proposes a data exchange architecture employing Multi-Authority Attribute-Based Encryption(MA-ABE)in combination with blockchain technology.This scheme supports proxy decryption,attribute revocation,and policy update,while allowing each participating entity to manage their keys autonomously,ensuring system security and enhancing trust among participants.In order to enhance system decentralization,a mechanism has been designed in the architecture where multiple institutions interact with smart contracts and jointly participate in the generation of public parameters.Integration with the multi-party process execution engine Caterpillar has been shown to boost the transparency of cross-border information flow and cooperation between different organizations.The scheme ensures the auditability of data access control information and the visualization of on-chain data sharing.The MA-ABE scheme is statically secure under the q-Decisional Parallel Bilinear Diffie-Hellman Exponent(q-DPBDHE2)assumption in the random oracle model,and can resist ciphertext rollback attacks to achieve true backward and forward security.Theoretical analysis and experimental results demonstrate the appropriateness of the scheme for cross-border data collaboration between different institutions.展开更多
Since the establishment of diplomatic relations between China and Indonesia in April 1950,the relations between the two countries have undergone rapid development and withstood numerous tests.Since the resumption of d...Since the establishment of diplomatic relations between China and Indonesia in April 1950,the relations between the two countries have undergone rapid development and withstood numerous tests.Since the resumption of diplomatic relations in 1990,the two countries have deepened cooperation in all fields and continuously upgraded political relations.展开更多
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social...With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social images.However,most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial domain.In this work,the authors propose a secure social image-sharing method with watermarking/fingerprinting and encryption.First,the fingerprint code with a hierarchical community structure is designed based on social network analysis.Then,discrete wavelet transform(DWT)from block discrete cosine transform(DCT)directly is employed.After that,all codeword segments are embedded into the LL,LH,and HL subbands,respectively.The selected subbands are confused based on Game of Life(GoL),and then all subbands are diffused with singular value decomposition(SVD).Experimental results and security analysis demonstrate the security,invisibility,and robustness of our method.Further,the superiority of the technique is elaborated through comparison with some related image security algorithms.The solution not only performs the fast transformation from block DCT to one-level DWT but also protects users’privacy in multimedia social platforms.With the proposed method,JPEG image secure sharing in multimedia social platforms can be ensured.展开更多
Objectives:This study examined the levels of shared leadership and missed nursing care and their relationship among nurses in Egypt.Methods:A cross-sectional survey was conducted.From February to April 2024,340 nurses...Objectives:This study examined the levels of shared leadership and missed nursing care and their relationship among nurses in Egypt.Methods:A cross-sectional survey was conducted.From February to April 2024,340 nurses worked in all inpatient care units at Alexandria Main University Hospital.The Shared Leadership and Missed Nursing Care Survey was used for evaluation.Results:The overall score of shared leadership was(72.62±4.30),which imitates a high perception of shared leadership among nurses;the dimension of delegation achieved the highest average mean score(3.66±0.26),followed by collaboration(3.64±0.31),the vision dimension scored the lowest mean score(3.59±0.33).The elements of missed nursing care had a total score of(46.72±5.69),and the dimension of secondary care achieved the highest average mean score(3.74±0.31).The reasons for missed nursing care had a total mean score of(22.40±1.59),and the dimension of labor resources achieved the highest average mean score(3.20±0.22).Male nurses,less than 30 years old,married,held a bachelor’s degree in nursing sciences,less than five years of experience in the nursing profession,and less than five years of experience in the current working unit had higher total scores of the shared leadership and lower total scores of missed nursing care(P<0.001).A negative correlation existed between shared leadership and two dimentisons(the elements of nursing care[r=-0.383],the reasons for missing nursing care[r=-0.047])(P<0.001).Conclusions:The study’s findings can help as a theoretical underpinning for nursing leaders to stand in an environment that reduces the incidence of missed nursing care by encouraging teamwork,responsibility,workload management,and empowerment among nurses.展开更多
Sham acupuncture,as a control intervention in acupuncture studies,has been widely conducted to eval-uate the specific effect of acupuncture.However,there was no relevant particular reporting guideline,so the reporting...Sham acupuncture,as a control intervention in acupuncture studies,has been widely conducted to eval-uate the specific effect of acupuncture.However,there was no relevant particular reporting guideline,so the reporting quality of sham acupuncture was low,which could hinder the precise understanding and interpretation of details and implementation background of sham acupuncture by researchers.In order to standardize the reporting of sham acupuncture and improve its quality,SHam Acupuncture REporting guidelines and a checklist in clinical trials(SHARE)was developed by a research team from Beijing Univer-sity of Chinese Medicine.The SAHRE standardizes the reporting of sham acupuncture from 10 categories,including brief name,rationales,details of sham acupuncture,treatment regimen of sham acupuncture,the information informed or explained to patients,practitioner information,modifications of protocol,communication between practitioner and patient,practitioner adherence and blinding.This article elab-orates the development process and key content of SHARE in order to facilitate its application by re-searchers.展开更多
The year 2025 marks the 75th anniversary of the establishment of diplomatic relations between China and Indonesia.Over the past 75 years,the bilateral relationship has made significant progress across various fields,l...The year 2025 marks the 75th anniversary of the establishment of diplomatic relations between China and Indonesia.Over the past 75 years,the bilateral relationship has made significant progress across various fields,laying a solid foundation for regional stability.China Report ASEAN interviewed Indonesian Ambassador to China Djauhari Oratmangun to reflect on the remarkable journey of Indonesia-China relations over the past 75 years.展开更多
China’s healthcare system faces increasing challenges,including surging medical costs,resource allocation imbalances favoring large hospitals,and ineffective referral mechanisms.The lack of a unified strategy integra...China’s healthcare system faces increasing challenges,including surging medical costs,resource allocation imbalances favoring large hospitals,and ineffective referral mechanisms.The lack of a unified strategy integrating standardized coverage with personalized payment compounds these issues.To this end,this study proposes a risk-sharing reform strategy that combines equal coverage for the same disease(ECSD)with an individualized out-of-pocket(I-OOP)model.Specifically,the study employs a Markov model to capture patient transitions across health states and care levels.The findings show that ECSD and I-OOP enhance equity by standardizing disease coverage while tailoring costs to patient income and facility type.This approach alleviates demand on high-tier hospitals,promoting primary care utilization and enabling balanced resource distribution.The study’s findings provide a reference for policymakers and healthcare administrators by presenting a scalable framework that is aligned with China’s development goals with the aim of fostering an efficient,sustainable healthcare system that is adaptable to regional needs.展开更多
The lifetime of a wireless sensor network(WSN)is crucial for determining the maximum duration for data collection in Internet of Things applications.To extend the WSN's lifetime,we propose deploying an unmanned gr...The lifetime of a wireless sensor network(WSN)is crucial for determining the maximum duration for data collection in Internet of Things applications.To extend the WSN's lifetime,we propose deploying an unmanned ground vehicle(UGV)within the energy-hungry WSN.This allows nodes,including sensors and the UGV,to share their energy using wireless power transfer techniques.To optimize the UGV's trajectory,we have developed a tabu searchbased method for global optimality,followed by a clustering-based method suitable for real-world applications.When the UGV reaches a stopping point,it functions as a regular sensor with ample battery.Accordingly,we have designed optimal data and energy allocation algorithms for both centralized and distributed deployment.Simulation results demonstrate that the UGV and energy-sharing significantly extend the WSN's lifetime.This effect is especially prominent in sparsely connected WSNs compared to highly connected ones,and energy-sharing has a more pronounced impact on network lifetime extension than UGV mobility.展开更多
Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHo...Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHorne -Zeilinger(GHZ) states.This protocol is robust against eavesdropping and could be used for the circumstance of many parties.展开更多
This paper examines an under-researched phenomenon of mock impoliteness in Chinese online interaction,namely,the practice of hudui(lit.reciprocal jocular abuse)as a solidarity enhancing device among acquaintances.Draw...This paper examines an under-researched phenomenon of mock impoliteness in Chinese online interaction,namely,the practice of hudui(lit.reciprocal jocular abuse)as a solidarity enhancing device among acquaintances.Drawing on data from Qzone interaction among Chinese university students,this study focuses on ritual features,sequential patterns and interpersonal functions of hudui through the lens of Kádár’s(2013,2017)interpersonal ritual theory.The results show that hudui is co-constructed by the online participants with the symmetric pattern of mutual abuse,which distinguishes it from previous studies of jocular abuse(i.e.,the asymmetric pattern of abuser–recipient).They also reveal that hudui accomplishes various kinds of relational work,including fostering intimacy,enhancing mutual affection-based face and creating amusement.展开更多
Based on the interpretation of the Child-Friendly Cities Initiative(CFCI),this paper empirically demonstrates an effective action mechanism for building child-friendly communities in the policy context of multi-party ...Based on the interpretation of the Child-Friendly Cities Initiative(CFCI),this paper empirically demonstrates an effective action mechanism for building child-friendly communities in the policy context of multi-party co-construction by taking urban communities in Changsha as a longterm practice base.Through analyzing the characteristics of roles and action mechanisms of participants in three different types of child-friendly communities,namely Fengquan Gujing Community,Xingfuli Community,and Baziqiang Community in Changsha,it finds that social forces,such as the community Party organization,enterprises,universities,social organizations,elementary and secondary schools of the community,and mass organizations,are"participants"in building child-friendly communities and mobilizing residents(including children).In addition,the three necessary conditions for building a child-friendly community are"core guideline,""awareness consensus,"and"action coordination."All parties involved need to act together based on one platform,with one party playing a central role in connecting the top and the bottom and integrating resources.Among the three communities which have benefited from Changsha’s child-friendly city policy environment,Fengquan Gujing Community stands out in terms of the effectiveness of multi-party co-construction by giving full play to the central role of the community Party organization and the university’s role in improving awareness consensus.展开更多
Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since...Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display.展开更多
文摘The vision of building a global community of shared future is a core tenet of Xi Jinping thought on diplomacy.Since it was first proposed in 2013,this concept has exhibited tremendous vitality,evolving from a conceptual proposition to a well-conceived system,from a promising vision to practical outcomes.
基金supported by the National Natural Science Foundation of China (No.62071070)Major science and technology special project of Science and Technology Department of Yunnan Province (202002AB080001-8)BUPT innovation&entrepreneurship support program (2023-YC-T031)。
文摘As the information sensing and processing capabilities of IoT devices increase,a large amount of data is being generated at the edge of Industrial IoT(IIoT),which has become a strong foundation for distributed Artificial Intelligence(AI)applications.However,most users are reluctant to disclose their data due to network bandwidth limitations,device energy consumption,and privacy requirements.To address this issue,this paper introduces an Edge-assisted Federated Learning(EFL)framework,along with an incentive mechanism for lightweight industrial data sharing.In order to reduce the information asymmetry between data owners and users,an EFL model-sharing incentive mechanism based on contract theory is designed.In addition,a weight dispersion evaluation scheme based on Wasserstein distance is proposed.This study models an optimization problem of node selection and sharing incentives to maximize the EFL model consumers'profit and ensure the quality of training services.An incentive-based EFL algorithm with individual rationality and incentive compatibility constraints is proposed.Finally,the experimental results verify the effectiveness of the proposed scheme in terms of positive incentives for contract design and performance analysis of EFL systems.
基金supported by the National Natural Science Foundation of China(Grant No.62102449)the Central Plains Talent Program under Grant No.224200510003.
文摘With the increasing popularity of blockchain applications, the security of data sources on the blockchain is gradually receiving attention. Providing reliable data for the blockchain safely and efficiently has become a research hotspot, and the security of the oracle responsible for providing reliable data has attracted much attention. The most widely used centralized oracles in blockchain, such as Provable and Town Crier, all rely on a single oracle to obtain data, which suffers from a single point of failure and limits the large-scale development of blockchain. To this end, the distributed oracle scheme is put forward, but the existing distributed oracle schemes such as Chainlink and Augur generally have low execution efficiency and high communication overhead, which leads to their poor applicability. To solve the above problems, this paper proposes a trusted distributed oracle scheme based on a share recovery threshold signature. First, a data verification method of distributed oracles is designed based on threshold signature. By aggregating the signatures of oracles, data from different data sources can be mutually verified, leading to a more efficient data verification and aggregation process. Then, a credibility-based cluster head election algorithm is designed, which reduces the communication overhead by clarifying the function distribution and building a hierarchical structure. Considering the good performance of the BLS threshold signature in large-scale applications, this paper combines it with distributed oracle technology and proposes a BLS threshold signature algorithm that supports share recovery in distributed oracles. The share recovery mechanism enables the proposed scheme to solve the key loss issue, and the setting of the threshold value enables the proposed scheme to complete signature aggregation with only a threshold number of oracles, making the scheme more robust. Finally, experimental results indicate that, by using the threshold signature technology and the cluster head election algorithm, our scheme effectively improves the execution efficiency of oracles and solves the problem of a single point of failure, leading to higher scalability and robustness.
基金Project supported by the National Natural Science Foundation of China(Grant No.62002105)the Key Research and Development Program of Hubei,China(Grant No.2021BEA163)。
文摘At present,most quantum secret sharing(QSS)protocols are more or less designed with the incorporation of classical secret sharing schemes.With the increasing maturity of quantum technology,QSS protocols based on pure quantum mechanics are becoming more important.Classical secret sharing schemes cannot achieve absolute security,and their involvement can compromise the security of QSS protocols.This paper proposes a QSS scheme based on Greenberger-Horn-Zeilinger(GHZ)basis measurement and quantum entanglement exchange.In this protocol,the secret sender stores the secret information using Pauli operations.Participants obtain their shares by measuring the product state sequentially.Finally,participants complete the secret reconstruction through quantum entanglement exchange and other related quantum operations.In addition,the particles held by participants in the protocol do not contain any secret information.Each participant's particles are in a state of maximum entanglement,and no participant can deduce the particle information of other participants through their own particles.At the same time,the protocol is based on pure quantum mechanics and does not involve classical schemes,which avoids the problem of reduced security of the protocol.Security analysis indicates that the protocol is not vulnerable to retransmission interception and collusion attacks.Moreover,it is capable of detecting and terminating the protocol promptly when facing with attacks from dishonest participants.
基金supported by Hainan Provincial Natural Science Foundation of China Nos.622RC617,624RC485Open Foundation of State Key Laboratory of Networking and Switching Technology(Beijing University of Posts and Telecommunications)(SKLNST-2023-1-07).
文摘The advent of the digital age has consistently provided impetus for facilitating global trade,as evidenced by the numerous customs clearance documents and participants involved in the international trade process,including enterprises,agents,and government departments.However,the urgent issue that requires immediate attention is how to achieve secure and efficient cross-border data sharing among these government departments and enterprises in complex trade processes.In addressing this need,this paper proposes a data exchange architecture employing Multi-Authority Attribute-Based Encryption(MA-ABE)in combination with blockchain technology.This scheme supports proxy decryption,attribute revocation,and policy update,while allowing each participating entity to manage their keys autonomously,ensuring system security and enhancing trust among participants.In order to enhance system decentralization,a mechanism has been designed in the architecture where multiple institutions interact with smart contracts and jointly participate in the generation of public parameters.Integration with the multi-party process execution engine Caterpillar has been shown to boost the transparency of cross-border information flow and cooperation between different organizations.The scheme ensures the auditability of data access control information and the visualization of on-chain data sharing.The MA-ABE scheme is statically secure under the q-Decisional Parallel Bilinear Diffie-Hellman Exponent(q-DPBDHE2)assumption in the random oracle model,and can resist ciphertext rollback attacks to achieve true backward and forward security.Theoretical analysis and experimental results demonstrate the appropriateness of the scheme for cross-border data collaboration between different institutions.
文摘Since the establishment of diplomatic relations between China and Indonesia in April 1950,the relations between the two countries have undergone rapid development and withstood numerous tests.Since the resumption of diplomatic relations in 1990,the two countries have deepened cooperation in all fields and continuously upgraded political relations.
基金funded by NSFC Grants 61502154,61972136,the NSF of Hubei Province(2023AFB004,2024AFB544)Hubei Provincial Department of Education Project(No.Q20232206)Project of Hubei University of Economics(No.T201410).
文摘With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social images.However,most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial domain.In this work,the authors propose a secure social image-sharing method with watermarking/fingerprinting and encryption.First,the fingerprint code with a hierarchical community structure is designed based on social network analysis.Then,discrete wavelet transform(DWT)from block discrete cosine transform(DCT)directly is employed.After that,all codeword segments are embedded into the LL,LH,and HL subbands,respectively.The selected subbands are confused based on Game of Life(GoL),and then all subbands are diffused with singular value decomposition(SVD).Experimental results and security analysis demonstrate the security,invisibility,and robustness of our method.Further,the superiority of the technique is elaborated through comparison with some related image security algorithms.The solution not only performs the fast transformation from block DCT to one-level DWT but also protects users’privacy in multimedia social platforms.With the proposed method,JPEG image secure sharing in multimedia social platforms can be ensured.
文摘Objectives:This study examined the levels of shared leadership and missed nursing care and their relationship among nurses in Egypt.Methods:A cross-sectional survey was conducted.From February to April 2024,340 nurses worked in all inpatient care units at Alexandria Main University Hospital.The Shared Leadership and Missed Nursing Care Survey was used for evaluation.Results:The overall score of shared leadership was(72.62±4.30),which imitates a high perception of shared leadership among nurses;the dimension of delegation achieved the highest average mean score(3.66±0.26),followed by collaboration(3.64±0.31),the vision dimension scored the lowest mean score(3.59±0.33).The elements of missed nursing care had a total score of(46.72±5.69),and the dimension of secondary care achieved the highest average mean score(3.74±0.31).The reasons for missed nursing care had a total mean score of(22.40±1.59),and the dimension of labor resources achieved the highest average mean score(3.20±0.22).Male nurses,less than 30 years old,married,held a bachelor’s degree in nursing sciences,less than five years of experience in the nursing profession,and less than five years of experience in the current working unit had higher total scores of the shared leadership and lower total scores of missed nursing care(P<0.001).A negative correlation existed between shared leadership and two dimentisons(the elements of nursing care[r=-0.383],the reasons for missing nursing care[r=-0.047])(P<0.001).Conclusions:The study’s findings can help as a theoretical underpinning for nursing leaders to stand in an environment that reduces the incidence of missed nursing care by encouraging teamwork,responsibility,workload management,and empowerment among nurses.
文摘Sham acupuncture,as a control intervention in acupuncture studies,has been widely conducted to eval-uate the specific effect of acupuncture.However,there was no relevant particular reporting guideline,so the reporting quality of sham acupuncture was low,which could hinder the precise understanding and interpretation of details and implementation background of sham acupuncture by researchers.In order to standardize the reporting of sham acupuncture and improve its quality,SHam Acupuncture REporting guidelines and a checklist in clinical trials(SHARE)was developed by a research team from Beijing Univer-sity of Chinese Medicine.The SAHRE standardizes the reporting of sham acupuncture from 10 categories,including brief name,rationales,details of sham acupuncture,treatment regimen of sham acupuncture,the information informed or explained to patients,practitioner information,modifications of protocol,communication between practitioner and patient,practitioner adherence and blinding.This article elab-orates the development process and key content of SHARE in order to facilitate its application by re-searchers.
文摘The year 2025 marks the 75th anniversary of the establishment of diplomatic relations between China and Indonesia.Over the past 75 years,the bilateral relationship has made significant progress across various fields,laying a solid foundation for regional stability.China Report ASEAN interviewed Indonesian Ambassador to China Djauhari Oratmangun to reflect on the remarkable journey of Indonesia-China relations over the past 75 years.
基金The National Natural Science Foundation of China(No.72071042)。
文摘China’s healthcare system faces increasing challenges,including surging medical costs,resource allocation imbalances favoring large hospitals,and ineffective referral mechanisms.The lack of a unified strategy integrating standardized coverage with personalized payment compounds these issues.To this end,this study proposes a risk-sharing reform strategy that combines equal coverage for the same disease(ECSD)with an individualized out-of-pocket(I-OOP)model.Specifically,the study employs a Markov model to capture patient transitions across health states and care levels.The findings show that ECSD and I-OOP enhance equity by standardizing disease coverage while tailoring costs to patient income and facility type.This approach alleviates demand on high-tier hospitals,promoting primary care utilization and enabling balanced resource distribution.The study’s findings provide a reference for policymakers and healthcare administrators by presenting a scalable framework that is aligned with China’s development goals with the aim of fostering an efficient,sustainable healthcare system that is adaptable to regional needs.
基金supported by the National Natural Science Foundation of China(No.62171486 and No.U2001213)the Guangdong Basic and Applied Basic Research Project(2022A1515140166)。
文摘The lifetime of a wireless sensor network(WSN)is crucial for determining the maximum duration for data collection in Internet of Things applications.To extend the WSN's lifetime,we propose deploying an unmanned ground vehicle(UGV)within the energy-hungry WSN.This allows nodes,including sensors and the UGV,to share their energy using wireless power transfer techniques.To optimize the UGV's trajectory,we have developed a tabu searchbased method for global optimality,followed by a clustering-based method suitable for real-world applications.When the UGV reaches a stopping point,it functions as a regular sensor with ample battery.Accordingly,we have designed optimal data and energy allocation algorithms for both centralized and distributed deployment.Simulation results demonstrate that the UGV and energy-sharing significantly extend the WSN's lifetime.This effect is especially prominent in sparsely connected WSNs compared to highly connected ones,and energy-sharing has a more pronounced impact on network lifetime extension than UGV mobility.
基金Supported by National Natural Science Foundation of China under Grant Nos.60878059,11004033Natural Science Foundation of Fujian Province under Grant No.2010J01002
文摘Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHorne -Zeilinger(GHZ) states.This protocol is robust against eavesdropping and could be used for the circumstance of many parties.
基金support the Department of Education of Guangdong Province and Center for Linguistics and Applied Linguistics at Guangdong University of Foreign Studies, China, for the project (2018WZDXM006) on the frontier research and theoretical innovations in interpersonal pragmaticsthe Youth Fund Project (Project No.: 19QN34) of Guangdong University of Foreign Studiesthe support from the Chinese Ministry of Education Research Project of Humanities and Social Science (Project No.: 16JJD740006) conducted by the Center for Linguistics and Applied Linguistics, Guangdong University of Foreign Studies.
文摘This paper examines an under-researched phenomenon of mock impoliteness in Chinese online interaction,namely,the practice of hudui(lit.reciprocal jocular abuse)as a solidarity enhancing device among acquaintances.Drawing on data from Qzone interaction among Chinese university students,this study focuses on ritual features,sequential patterns and interpersonal functions of hudui through the lens of Kádár’s(2013,2017)interpersonal ritual theory.The results show that hudui is co-constructed by the online participants with the symmetric pattern of mutual abuse,which distinguishes it from previous studies of jocular abuse(i.e.,the asymmetric pattern of abuser–recipient).They also reveal that hudui accomplishes various kinds of relational work,including fostering intimacy,enhancing mutual affection-based face and creating amusement.
文摘Based on the interpretation of the Child-Friendly Cities Initiative(CFCI),this paper empirically demonstrates an effective action mechanism for building child-friendly communities in the policy context of multi-party co-construction by taking urban communities in Changsha as a longterm practice base.Through analyzing the characteristics of roles and action mechanisms of participants in three different types of child-friendly communities,namely Fengquan Gujing Community,Xingfuli Community,and Baziqiang Community in Changsha,it finds that social forces,such as the community Party organization,enterprises,universities,social organizations,elementary and secondary schools of the community,and mass organizations,are"participants"in building child-friendly communities and mobilizing residents(including children).In addition,the three necessary conditions for building a child-friendly community are"core guideline,""awareness consensus,"and"action coordination."All parties involved need to act together based on one platform,with one party playing a central role in connecting the top and the bottom and integrating resources.Among the three communities which have benefited from Changsha’s child-friendly city policy environment,Fengquan Gujing Community stands out in terms of the effectiveness of multi-party co-construction by giving full play to the central role of the community Party organization and the university’s role in improving awareness consensus.
基金support from the National Natural Science Foundation of China (No.62005164,62222507,62175101,and 62005166)the Shanghai Natural Science Foundation (23ZR1443700)+3 种基金Shuguang Program of Shanghai Education Development Foundation and Shanghai Municipal Education Commission (23SG41)the Young Elite Scientist Sponsorship Program by CAST (No.20220042)Science and Technology Commission of Shanghai Municipality (Grant No.21DZ1100500)the Shanghai Municipal Science and Technology Major Project,and the Shanghai Frontiers Science Center Program (2021-2025 No.20).
文摘Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display.