In this paper,we propose a neural network approach to learn the parameters of a class of stochastic Lotka-Volterra systems.Approximations of the mean and covariance matrix of the observational variables are obtained f...In this paper,we propose a neural network approach to learn the parameters of a class of stochastic Lotka-Volterra systems.Approximations of the mean and covariance matrix of the observational variables are obtained from the Euler-Maruyama discretization of the underlying stochastic differential equations(SDEs),based on which the loss function is built.The stochastic gradient descent method is applied in the neural network training.Numerical experiments demonstrate the effectiveness of our method.展开更多
Maintaining the integrity and longevity of structures is essential in many industries,such as aerospace,nuclear,and petroleum.To achieve the cost-effectiveness of large-scale systems in petroleum drilling,a strong emp...Maintaining the integrity and longevity of structures is essential in many industries,such as aerospace,nuclear,and petroleum.To achieve the cost-effectiveness of large-scale systems in petroleum drilling,a strong emphasis on structural durability and monitoring is required.This study focuses on the mechanical vibrations that occur in rotary drilling systems,which have a substantial impact on the structural integrity of drilling equipment.The study specifically investigates axial,torsional,and lateral vibrations,which might lead to negative consequences such as bit-bounce,chaotic whirling,and high-frequency stick-slip.These events not only hinder the efficiency of drilling but also lead to exhaustion and harm to the system’s components since they are difficult to be detected and controlled in real time.The study investigates the dynamic interactions of these vibrations,specifically in their high-frequency modes,usingfield data obtained from measurement while drilling.Thefindings have demonstrated the effect of strong coupling between the high-frequency modes of these vibrations on drilling sys-tem performance.The obtained results highlight the importance of considering the interconnected impacts of these vibrations when designing and implementing robust control systems.Therefore,integrating these compo-nents can increase the durability of drill bits and drill strings,as well as improve the ability to monitor and detect damage.Moreover,by exploiting thesefindings,the assessment of structural resilience in rotary drilling systems can be enhanced.Furthermore,the study demonstrates the capacity of structural health monitoring to improve the quality,dependability,and efficiency of rotary drilling systems in the petroleum industry.展开更多
The conditions for the emergence of the non-Hermitian skin effect, as a unique physical response of non-Hermitian systems, have now become one of the hot research topics. In this paper, we study the novel physical res...The conditions for the emergence of the non-Hermitian skin effect, as a unique physical response of non-Hermitian systems, have now become one of the hot research topics. In this paper, we study the novel physical responses of nonHermitian systems with anomalous time-reversal symmetry, in both one dimension and two dimensions. Specifically, we focus on whether the systems will exhibit a non-Hermitian skin effect. We employ the theory of generalized Brillouin zone and also numerical methods to show that the anomalous time-reversal symmetry can prevent the skin effect in onedimensional non-Hermitian systems, but is unable to exert the same effectiveness in two-dimensional cases.展开更多
Numerical simulation is employed to investigate the initial state of avalanche in polydisperse particle systems.Nucleation and propagation processes are illustrated for pentadisperse and triadisperse particle systems,...Numerical simulation is employed to investigate the initial state of avalanche in polydisperse particle systems.Nucleation and propagation processes are illustrated for pentadisperse and triadisperse particle systems,respectively.In these processes,particles involved in the avalanche grow slowly in the early stage and explosively in the later stage,which is clearly different from the continuous and steady growth trend in the monodisperse system.By examining the avalanche propagation,the number growth of particles involved in the avalanche and the slope of the number growth,the initial state can be divided into three stages:T1(nucleation stage),T2(propagation stage),T3(overall avalanche stage).We focus on the characteristics of the avalanche in the T2 stage,and find that propagation distances increase almost linearly in both axial and radial directions in polydisperse systems.We also consider the distribution characteristics of the average coordination number and average velocity for the moving particles.The results support that the polydisperse particle systems are more stable in the T2 stage.展开更多
Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store.Despite the increasing reliance on database management systems,this field continues...Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store.Despite the increasing reliance on database management systems,this field continues to face numerous cyber-attacks.Database management systems serve as the foundation of any information system or application.Any cyber-attack can result in significant damage to the database system and loss of sensitive data.Consequently,cyber risk classifications and assessments play a crucial role in risk management and establish an essential framework for identifying and responding to cyber threats.Risk assessment aids in understanding the impact of cyber threats and developing appropriate security controls to mitigate risks.The primary objective of this study is to conduct a comprehensive analysis of cyber risks in database management systems,including classifying threats,vulnerabilities,impacts,and countermeasures.This classification helps to identify suitable security controls to mitigate cyber risks for each type of threat.Additionally,this research aims to explore technical countermeasures to protect database systems from cyber threats.This study employs the content analysis method to collect,analyze,and classify data in terms of types of threats,vulnerabilities,and countermeasures.The results indicate that SQL injection attacks and Denial of Service(DoS)attacks were the most prevalent technical threats in database systems,each accounting for 9%of incidents.Vulnerable audit trails,intrusion attempts,and ransomware attacks were classified as the second level of technical threats in database systems,comprising 7%and 5%of incidents,respectively.Furthermore,the findings reveal that insider threats were the most common non-technical threats in database systems,accounting for 5%of incidents.Moreover,the results indicate that weak authentication,unpatched databases,weak audit trails,and multiple usage of an account were the most common technical vulnerabilities in database systems,each accounting for 9%of vulnerabilities.Additionally,software bugs,insecure coding practices,weak security controls,insecure networks,password misuse,weak encryption practices,and weak data masking were classified as the second level of security vulnerabilities in database systems,each accounting for 4%of vulnerabilities.The findings from this work can assist organizations in understanding the types of cyber threats and developing robust strategies against cyber-attacks.展开更多
We present a large deviation theory that characterizes the exponential estimate for rare events in stochastic dynamical systems in the limit of weak noise.We aim to consider a next-to-leading-order approximation for m...We present a large deviation theory that characterizes the exponential estimate for rare events in stochastic dynamical systems in the limit of weak noise.We aim to consider a next-to-leading-order approximation for more accurate calculation of the mean exit time by computing large deviation prefactors with the aid of machine learning.More specifically,we design a neural network framework to compute quasipotential,most probable paths and prefactors based on the orthogonal decomposition of a vector field.We corroborate the higher effectiveness and accuracy of our algorithm with two toy models.Numerical experiments demonstrate its powerful functionality in exploring the internal mechanism of rare events triggered by weak random fluctuations.展开更多
The ever-growing network traffic threat landscape necessitates adopting accurate and robust intrusion detection systems(IDSs).IDSs have become a research hotspot and have seen remarkable performance improvements.Gener...The ever-growing network traffic threat landscape necessitates adopting accurate and robust intrusion detection systems(IDSs).IDSs have become a research hotspot and have seen remarkable performance improvements.Generative adversarial networks(GANs)have also garnered increasing research interest recently due to their remarkable ability to generate data.This paper investigates the application of(GANs)in(IDS)and explores their current use within this research field.We delve into the adoption of GANs within signature-based,anomaly-based,and hybrid IDSs,focusing on their objectives,methodologies,and advantages.Overall,GANs have been widely employed,mainly focused on solving the class imbalance issue by generating realistic attack samples.While GANs have shown significant potential in addressing the class imbalance issue,there are still open opportunities and challenges to be addressed.Little attention has been paid to their applicability in distributed and decentralized domains,such as IoT networks.Efficiency and scalability have been mostly overlooked,and thus,future works must aim at addressing these gaps.展开更多
Maximum power point tracking(MPPT)technology plays a key role in improving the energy conversion efficiency of photovoltaic(PV)systems,especially when multiple local maximum power points(LMPPs)occur under partial shad...Maximum power point tracking(MPPT)technology plays a key role in improving the energy conversion efficiency of photovoltaic(PV)systems,especially when multiple local maximum power points(LMPPs)occur under partial shading conditions(PSC).It is necessary to modify the operating point efficiently and accurately with the help of MPPT technology to maximize the collected power.Even though a lot of research has been carried out and impressive progress achieved for MPPT technology,it still faces some challenges and dilemmas.Firstly,the mathematical model established for PV cells is not precise enough.Second,the existing algorithms are often optimized for specific conditions and lack comprehensive adaptability to the actual operating environment.Besides,a single algorithm may not be able to give full play to its advantages.In the end,the selection criteria for choosing the suitable MPPT algorithm/converter combination to achieve better performance in a given scenario is very limited.Therefore,this paper systematically discusses the current research status and challenges faced by PV MPPT technology around the three aspects of MPPT models,algorithms,and hardware implementation.Through in-depth thinking and discussion,it also puts forward positive perspectives on future development,and five forward-looking solutions to improve the performance of PV systems MPPT are suggested.展开更多
The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundes...The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundesirablepassive attacks suchas eavesdroppingor jamming.Recently,the inefficiencyof traditional cryptography-based techniques has led to the addition of Physical Layer Security(PLS).This study focuses on the advanced PLS method for passive eavesdropping in UAV-aided vehicular environments,proposing a solution to complement the conventional cryptography approach.Initially,we present a performance analysis of first-order secrecy metrics in 6G-enabled UAV systems,namely hybrid outage probability(HOP)and secrecy outage probability(SOP)over 2×2 Nakagami-m channels.Later,we propose a novel technique for mitigating passive eavesdropping,which considers first-order secrecy metrics as an optimization problem and determines their lower and upper bounds.Finally,we conduct an analysis of bounded HOP and SOP using the interactive Nakagami-m channel,considering the multiple-input-multiple-output configuration of the UAV system.The findings indicate that 2×2 Nakagami-mis a suitable fadingmodel under constant velocity for trustworthy receivers and eavesdroppers.The results indicate that UAV mobility has some influence on an eavesdropper’s intrusion during line-of-sight-enabled communication and can play an important role in improving security against passive eavesdroppers.展开更多
Rice production is crucial for food security in China,and its relationship with rural labor migration has been studied extensively.Labor migration in rural China has taken new forms in recent years.There has been a di...Rice production is crucial for food security in China,and its relationship with rural labor migration has been studied extensively.Labor migration in rural China has taken new forms in recent years.There has been a discernible trend wherein adult children have started migrating to cities while their elderly parents return to villages to re-engage in on-farm work.The phenomenon has notably shaped the intergenerational division of labor(IDL)within households.However,it remains to be seen how farmers adjust their rice production systems in response to the IDL.The age of 60 years for employment injury insurance is the eligibility threshold for off-farm employment and is used to obtain a source of exogenous variation in the IDL.Based on a representative household survey of 1,752 rice farmers in the Hubei Province of Central China,our fuzzy regression discontinuity analysis reveals that farmers in IDL households are more likely to adopt ratoon rice(RR)than single cropping rice(SR)or double cropping rice(DR).The effect of the IDL varies under different levels of operational scales and specialized agricultural service availability.Further analysis suggests that farmers’arrangements are associated with two potential mechanisms of downward intergenerational transfer.Monetary transfer for urban housing purchases increases RR in IDL households,and time transfer for intergenerational childcare significantly promotes SR in IDL households.This study enhances the understanding of the relationship between rural labor migration and rice production in China,providing a reference for adjusting rice production systems to ensure food security.展开更多
In this paper,we review the development of a phase theory for systems and networks in its first five years,represented by a trilogy:Matrix phases and their properties;The MIMO LTI system phase response,its physical in...In this paper,we review the development of a phase theory for systems and networks in its first five years,represented by a trilogy:Matrix phases and their properties;The MIMO LTI system phase response,its physical interpretations,the small phase theorem,and the sectored real lemma;The synchronization of a multi-agent network using phase alignment.Towards the end,we also summarize a list of ongoing research on the phase theory and speculate what will happen in the next five years.展开更多
The integration of wearable technologies and artificial intelligence (AI) has revolutionized healthcare, enabling advanced personal health monitoring systems. This article explores the transformative impact of wearabl...The integration of wearable technologies and artificial intelligence (AI) has revolutionized healthcare, enabling advanced personal health monitoring systems. This article explores the transformative impact of wearable technologies and AI on healthcare, highlighting the development and theoretical application of the Integrated Personal Health Monitoring System (IPHMS). By integrating data from various wearable devices, such as smartphones, Apple Watches, and Oura Rings, the IPHMS framework aims to revolutionize personal health monitoring through real-time alerts, comprehensive tracking, and personalized insights. Despite its potential, the practical implementation faces challenges, including data privacy, system interoperability, and scalability. The evolution of healthcare technology from traditional methods to AI-enhanced wearables underscores a significant advancement towards personalized care, necessitating further research and innovation to address existing limitations and fully realize the benefits of such integrated health monitoring systems.展开更多
Drug delivery systems(DDS)have recently emerged as a promising approach for the unique advantages of drug protection and targeted delivery.However,the access of nanoparticles/drugs to the central nervous system(CNS)re...Drug delivery systems(DDS)have recently emerged as a promising approach for the unique advantages of drug protection and targeted delivery.However,the access of nanoparticles/drugs to the central nervous system(CNS)remains a challenge mainly due to the obstruction from brain barriers.Immune cells infiltrating the CNS in the pathological state have inspired the development of strategies for CNS foundation drug delivery.Herein,we outline the three major brain barriers in the CNS and the mechanisms by which immune cells migrate across the blood–brain barrier.We subsequently review biomimetic strategies utilizing immune cell-based nanoparticles for the delivery of nanoparticles/drugs to the CNS,as well as recent progress in rationally engineering immune cell-based DDS for CNS diseases.Finally,we discuss the challenges and opportunities of immune cell-based DDS in CNS diseases to promote their clinical development.展开更多
This article examines the determinants of the adoption of solar pumping systems (PV) by vegetable farmers in the Niayes area of Senegal. To measure the determinants, we used a sequential logit model to translate the a...This article examines the determinants of the adoption of solar pumping systems (PV) by vegetable farmers in the Niayes area of Senegal. To measure the determinants, we used a sequential logit model to translate the adoption process from becoming aware of solar pumping systems to testing them, i.e. using them at least once, and then continuing to use them over time. The results show that the main variables affecting awareness of the use of solar pumping systems (PV) are age, marital status, experience, access to credit, the farmer’s knowledge of climate change, the farmer’s origin in the Thiès region and length of time in the Niayes area. The first use of PVs is influenced by factors such as the size of the plot, the distance of the plot from the main road or from the market. Finally, the decision to adopt or continue use is influenced by gender, experience, household size and access to credit. Surprisingly, access to credit does not affect the first use of solar pumping systems, but plays a key role in their continued use.展开更多
Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intellig...Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intelligent processing on edge servers(ES).However,securely distributing encrypted data stored in the cloud to terminals that meet decryption requirements has become a prominent research topic.Additionally,managing attributes,including addition,deletion,and modification,is a crucial issue in the access control scheme for RES.To address these security concerns,a trust-based ciphertext-policy attribute-based encryption(CP-ABE)device access control scheme is proposed for RES(TB-CP-ABE).This scheme effectivelymanages the distribution and control of encrypted data on the cloud through robust attribute key management.By introducing trust management mechanisms and outsourced decryption technology,the ES system can effectively assess and manage the trust worthiness of terminal devices,ensuring that only trusted devices can participate in data exchange and access sensitive information.Besides,the ES system dynamically evaluates trust scores to set decryption trust thresholds,thereby regulating device data access permissions and enhancing the system’s security.To validate the security of the proposed TB-CP-ABE against chosen plaintext attacks,a comprehensive formal security analysis is conducted using the widely accepted random oraclemodel under the decisional q-Bilinear Diffie-Hellman Exponent(q-BDHE)assumption.Finally,comparative analysis with other schemes demonstrates that the TB-CP-ABE scheme cuts energy/communication costs by 43%,and scaleswell with rising terminals,maintaining average latency below 50ms,ensuring real-time service feasibility.The proposed scheme not only provides newinsights for the secure management of RES but also lays a foundation for future secure energy solutions.展开更多
基金Supported by the National Natural Science Foundation of China(11971458,11471310)。
文摘In this paper,we propose a neural network approach to learn the parameters of a class of stochastic Lotka-Volterra systems.Approximations of the mean and covariance matrix of the observational variables are obtained from the Euler-Maruyama discretization of the underlying stochastic differential equations(SDEs),based on which the loss function is built.The stochastic gradient descent method is applied in the neural network training.Numerical experiments demonstrate the effectiveness of our method.
文摘Maintaining the integrity and longevity of structures is essential in many industries,such as aerospace,nuclear,and petroleum.To achieve the cost-effectiveness of large-scale systems in petroleum drilling,a strong emphasis on structural durability and monitoring is required.This study focuses on the mechanical vibrations that occur in rotary drilling systems,which have a substantial impact on the structural integrity of drilling equipment.The study specifically investigates axial,torsional,and lateral vibrations,which might lead to negative consequences such as bit-bounce,chaotic whirling,and high-frequency stick-slip.These events not only hinder the efficiency of drilling but also lead to exhaustion and harm to the system’s components since they are difficult to be detected and controlled in real time.The study investigates the dynamic interactions of these vibrations,specifically in their high-frequency modes,usingfield data obtained from measurement while drilling.Thefindings have demonstrated the effect of strong coupling between the high-frequency modes of these vibrations on drilling sys-tem performance.The obtained results highlight the importance of considering the interconnected impacts of these vibrations when designing and implementing robust control systems.Therefore,integrating these compo-nents can increase the durability of drill bits and drill strings,as well as improve the ability to monitor and detect damage.Moreover,by exploiting thesefindings,the assessment of structural resilience in rotary drilling systems can be enhanced.Furthermore,the study demonstrates the capacity of structural health monitoring to improve the quality,dependability,and efficiency of rotary drilling systems in the petroleum industry.
基金Project supported by the National Natural Science Foundation of China (Grant No. 12304201)。
文摘The conditions for the emergence of the non-Hermitian skin effect, as a unique physical response of non-Hermitian systems, have now become one of the hot research topics. In this paper, we study the novel physical responses of nonHermitian systems with anomalous time-reversal symmetry, in both one dimension and two dimensions. Specifically, we focus on whether the systems will exhibit a non-Hermitian skin effect. We employ the theory of generalized Brillouin zone and also numerical methods to show that the anomalous time-reversal symmetry can prevent the skin effect in onedimensional non-Hermitian systems, but is unable to exert the same effectiveness in two-dimensional cases.
基金Project supported by the Qingdao National Laboratory for Marine Science and Technology(Grant No.2015ASKJ01)the National Natural Science Foundation of China(Grant Nos.11972212,12072200,and 12002213).
文摘Numerical simulation is employed to investigate the initial state of avalanche in polydisperse particle systems.Nucleation and propagation processes are illustrated for pentadisperse and triadisperse particle systems,respectively.In these processes,particles involved in the avalanche grow slowly in the early stage and explosively in the later stage,which is clearly different from the continuous and steady growth trend in the monodisperse system.By examining the avalanche propagation,the number growth of particles involved in the avalanche and the slope of the number growth,the initial state can be divided into three stages:T1(nucleation stage),T2(propagation stage),T3(overall avalanche stage).We focus on the characteristics of the avalanche in the T2 stage,and find that propagation distances increase almost linearly in both axial and radial directions in polydisperse systems.We also consider the distribution characteristics of the average coordination number and average velocity for the moving particles.The results support that the polydisperse particle systems are more stable in the T2 stage.
基金supported by the Deanship of Scientific Research,Vice Presidency for Graduate Studies and Scientific Research,King Faisal University,Saudi Arabia(Grant No.KFU242068).
文摘Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store.Despite the increasing reliance on database management systems,this field continues to face numerous cyber-attacks.Database management systems serve as the foundation of any information system or application.Any cyber-attack can result in significant damage to the database system and loss of sensitive data.Consequently,cyber risk classifications and assessments play a crucial role in risk management and establish an essential framework for identifying and responding to cyber threats.Risk assessment aids in understanding the impact of cyber threats and developing appropriate security controls to mitigate risks.The primary objective of this study is to conduct a comprehensive analysis of cyber risks in database management systems,including classifying threats,vulnerabilities,impacts,and countermeasures.This classification helps to identify suitable security controls to mitigate cyber risks for each type of threat.Additionally,this research aims to explore technical countermeasures to protect database systems from cyber threats.This study employs the content analysis method to collect,analyze,and classify data in terms of types of threats,vulnerabilities,and countermeasures.The results indicate that SQL injection attacks and Denial of Service(DoS)attacks were the most prevalent technical threats in database systems,each accounting for 9%of incidents.Vulnerable audit trails,intrusion attempts,and ransomware attacks were classified as the second level of technical threats in database systems,comprising 7%and 5%of incidents,respectively.Furthermore,the findings reveal that insider threats were the most common non-technical threats in database systems,accounting for 5%of incidents.Moreover,the results indicate that weak authentication,unpatched databases,weak audit trails,and multiple usage of an account were the most common technical vulnerabilities in database systems,each accounting for 9%of vulnerabilities.Additionally,software bugs,insecure coding practices,weak security controls,insecure networks,password misuse,weak encryption practices,and weak data masking were classified as the second level of security vulnerabilities in database systems,each accounting for 4%of vulnerabilities.The findings from this work can assist organizations in understanding the types of cyber threats and developing robust strategies against cyber-attacks.
基金Project supported by the Natural Science Foundation of Jiangsu Province (Grant No.BK20220917)the National Natural Science Foundation of China (Grant Nos.12001213 and 12302035)。
文摘We present a large deviation theory that characterizes the exponential estimate for rare events in stochastic dynamical systems in the limit of weak noise.We aim to consider a next-to-leading-order approximation for more accurate calculation of the mean exit time by computing large deviation prefactors with the aid of machine learning.More specifically,we design a neural network framework to compute quasipotential,most probable paths and prefactors based on the orthogonal decomposition of a vector field.We corroborate the higher effectiveness and accuracy of our algorithm with two toy models.Numerical experiments demonstrate its powerful functionality in exploring the internal mechanism of rare events triggered by weak random fluctuations.
文摘The ever-growing network traffic threat landscape necessitates adopting accurate and robust intrusion detection systems(IDSs).IDSs have become a research hotspot and have seen remarkable performance improvements.Generative adversarial networks(GANs)have also garnered increasing research interest recently due to their remarkable ability to generate data.This paper investigates the application of(GANs)in(IDS)and explores their current use within this research field.We delve into the adoption of GANs within signature-based,anomaly-based,and hybrid IDSs,focusing on their objectives,methodologies,and advantages.Overall,GANs have been widely employed,mainly focused on solving the class imbalance issue by generating realistic attack samples.While GANs have shown significant potential in addressing the class imbalance issue,there are still open opportunities and challenges to be addressed.Little attention has been paid to their applicability in distributed and decentralized domains,such as IoT networks.Efficiency and scalability have been mostly overlooked,and thus,future works must aim at addressing these gaps.
基金funding from the Open Fund Project of Intelligent Electric Power Grid Key Laboratory of Sichuan Province under Grant(2023-IEPGKLSP-KFYB03)Yunnan Provincial Basic Research Project(202301AT070443).
文摘Maximum power point tracking(MPPT)technology plays a key role in improving the energy conversion efficiency of photovoltaic(PV)systems,especially when multiple local maximum power points(LMPPs)occur under partial shading conditions(PSC).It is necessary to modify the operating point efficiently and accurately with the help of MPPT technology to maximize the collected power.Even though a lot of research has been carried out and impressive progress achieved for MPPT technology,it still faces some challenges and dilemmas.Firstly,the mathematical model established for PV cells is not precise enough.Second,the existing algorithms are often optimized for specific conditions and lack comprehensive adaptability to the actual operating environment.Besides,a single algorithm may not be able to give full play to its advantages.In the end,the selection criteria for choosing the suitable MPPT algorithm/converter combination to achieve better performance in a given scenario is very limited.Therefore,this paper systematically discusses the current research status and challenges faced by PV MPPT technology around the three aspects of MPPT models,algorithms,and hardware implementation.Through in-depth thinking and discussion,it also puts forward positive perspectives on future development,and five forward-looking solutions to improve the performance of PV systems MPPT are suggested.
基金funded by Taif University,Taif,Saudi Arabia,Project No.(TUDSPP-2024-139).
文摘The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundesirablepassive attacks suchas eavesdroppingor jamming.Recently,the inefficiencyof traditional cryptography-based techniques has led to the addition of Physical Layer Security(PLS).This study focuses on the advanced PLS method for passive eavesdropping in UAV-aided vehicular environments,proposing a solution to complement the conventional cryptography approach.Initially,we present a performance analysis of first-order secrecy metrics in 6G-enabled UAV systems,namely hybrid outage probability(HOP)and secrecy outage probability(SOP)over 2×2 Nakagami-m channels.Later,we propose a novel technique for mitigating passive eavesdropping,which considers first-order secrecy metrics as an optimization problem and determines their lower and upper bounds.Finally,we conduct an analysis of bounded HOP and SOP using the interactive Nakagami-m channel,considering the multiple-input-multiple-output configuration of the UAV system.The findings indicate that 2×2 Nakagami-mis a suitable fadingmodel under constant velocity for trustworthy receivers and eavesdroppers.The results indicate that UAV mobility has some influence on an eavesdropper’s intrusion during line-of-sight-enabled communication and can play an important role in improving security against passive eavesdroppers.
基金supported by the National Natural Science Foundation of China(42207529)the China Postdoctoral Science Foundation(2022M721289).
文摘Rice production is crucial for food security in China,and its relationship with rural labor migration has been studied extensively.Labor migration in rural China has taken new forms in recent years.There has been a discernible trend wherein adult children have started migrating to cities while their elderly parents return to villages to re-engage in on-farm work.The phenomenon has notably shaped the intergenerational division of labor(IDL)within households.However,it remains to be seen how farmers adjust their rice production systems in response to the IDL.The age of 60 years for employment injury insurance is the eligibility threshold for off-farm employment and is used to obtain a source of exogenous variation in the IDL.Based on a representative household survey of 1,752 rice farmers in the Hubei Province of Central China,our fuzzy regression discontinuity analysis reveals that farmers in IDL households are more likely to adopt ratoon rice(RR)than single cropping rice(SR)or double cropping rice(DR).The effect of the IDL varies under different levels of operational scales and specialized agricultural service availability.Further analysis suggests that farmers’arrangements are associated with two potential mechanisms of downward intergenerational transfer.Monetary transfer for urban housing purchases increases RR in IDL households,and time transfer for intergenerational childcare significantly promotes SR in IDL households.This study enhances the understanding of the relationship between rural labor migration and rice production in China,providing a reference for adjusting rice production systems to ensure food security.
基金supported in part by the National Natural Science Foundation of China(62073003,72131001)Hong Hong Research Grants Council under GRF grants(16200619,16201120,16205421,1620-3922)Shenzhen-Hong Kong-Macao Science and Technology Innovation Fund(SGDX20201103094600006)。
文摘In this paper,we review the development of a phase theory for systems and networks in its first five years,represented by a trilogy:Matrix phases and their properties;The MIMO LTI system phase response,its physical interpretations,the small phase theorem,and the sectored real lemma;The synchronization of a multi-agent network using phase alignment.Towards the end,we also summarize a list of ongoing research on the phase theory and speculate what will happen in the next five years.
文摘The integration of wearable technologies and artificial intelligence (AI) has revolutionized healthcare, enabling advanced personal health monitoring systems. This article explores the transformative impact of wearable technologies and AI on healthcare, highlighting the development and theoretical application of the Integrated Personal Health Monitoring System (IPHMS). By integrating data from various wearable devices, such as smartphones, Apple Watches, and Oura Rings, the IPHMS framework aims to revolutionize personal health monitoring through real-time alerts, comprehensive tracking, and personalized insights. Despite its potential, the practical implementation faces challenges, including data privacy, system interoperability, and scalability. The evolution of healthcare technology from traditional methods to AI-enhanced wearables underscores a significant advancement towards personalized care, necessitating further research and innovation to address existing limitations and fully realize the benefits of such integrated health monitoring systems.
基金supported by the National Natural Science Foundation of China(82204634,82174047,81622051)the Zhejiang Provincial Natural Science Foundation of China(LQ22H280010)the Foundation of Zhejiang Chinese Medical University(2021ZR03).
文摘Drug delivery systems(DDS)have recently emerged as a promising approach for the unique advantages of drug protection and targeted delivery.However,the access of nanoparticles/drugs to the central nervous system(CNS)remains a challenge mainly due to the obstruction from brain barriers.Immune cells infiltrating the CNS in the pathological state have inspired the development of strategies for CNS foundation drug delivery.Herein,we outline the three major brain barriers in the CNS and the mechanisms by which immune cells migrate across the blood–brain barrier.We subsequently review biomimetic strategies utilizing immune cell-based nanoparticles for the delivery of nanoparticles/drugs to the CNS,as well as recent progress in rationally engineering immune cell-based DDS for CNS diseases.Finally,we discuss the challenges and opportunities of immune cell-based DDS in CNS diseases to promote their clinical development.
文摘This article examines the determinants of the adoption of solar pumping systems (PV) by vegetable farmers in the Niayes area of Senegal. To measure the determinants, we used a sequential logit model to translate the adoption process from becoming aware of solar pumping systems to testing them, i.e. using them at least once, and then continuing to use them over time. The results show that the main variables affecting awareness of the use of solar pumping systems (PV) are age, marital status, experience, access to credit, the farmer’s knowledge of climate change, the farmer’s origin in the Thiès region and length of time in the Niayes area. The first use of PVs is influenced by factors such as the size of the plot, the distance of the plot from the main road or from the market. Finally, the decision to adopt or continue use is influenced by gender, experience, household size and access to credit. Surprisingly, access to credit does not affect the first use of solar pumping systems, but plays a key role in their continued use.
基金supported by the Science and Technology Project of the State Grid Corporation of China,Grant number 5700-202223189A-1-1-ZN.
文摘Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intelligent processing on edge servers(ES).However,securely distributing encrypted data stored in the cloud to terminals that meet decryption requirements has become a prominent research topic.Additionally,managing attributes,including addition,deletion,and modification,is a crucial issue in the access control scheme for RES.To address these security concerns,a trust-based ciphertext-policy attribute-based encryption(CP-ABE)device access control scheme is proposed for RES(TB-CP-ABE).This scheme effectivelymanages the distribution and control of encrypted data on the cloud through robust attribute key management.By introducing trust management mechanisms and outsourced decryption technology,the ES system can effectively assess and manage the trust worthiness of terminal devices,ensuring that only trusted devices can participate in data exchange and access sensitive information.Besides,the ES system dynamically evaluates trust scores to set decryption trust thresholds,thereby regulating device data access permissions and enhancing the system’s security.To validate the security of the proposed TB-CP-ABE against chosen plaintext attacks,a comprehensive formal security analysis is conducted using the widely accepted random oraclemodel under the decisional q-Bilinear Diffie-Hellman Exponent(q-BDHE)assumption.Finally,comparative analysis with other schemes demonstrates that the TB-CP-ABE scheme cuts energy/communication costs by 43%,and scaleswell with rising terminals,maintaining average latency below 50ms,ensuring real-time service feasibility.The proposed scheme not only provides newinsights for the secure management of RES but also lays a foundation for future secure energy solutions.