Because images are vulnerable to external attacks in the process of network transmission and traditional image encryption algorithms have limitations such as long encryption time, insufficient ...entropy or poor diffusion of cipher image information when encrypting color images, a fast image encryption algorithm based on logistics-sine-cosine mapping is proposed. The algorithm first generates five sets of encrypted sequences from the logistics-sine-cosine mapping, then uses the order of the encryption sequence to scramble the image pixels and designs a new pixel diffusion network to further improve the key sensitivity and plain-image sensitivity of the encryption algorithm. Finally, in a series of security analysis experiments, the experimental image Lena was tested 100 times, and the average encryption time was 0.479 s. The average value of the information entropy, pixel change rate and uniform average change intensity of the cipher image reached 7.9994, 99.62% and 33.48%, respectively. The experimental results show that the fast image encryption algorithm based on logistics-sine-cosine mapping takes less time to encrypt, and the cipher image has good information entropy and diffusivity. It is a safe and effective fast image encryption algorithm.
We use industry valuation differentials across European countries to study the impact of membership in the European Union as well as the Eurozone on both economic and financial integration. In ...integrated markets, discount rates and expected growth opportunities should be similar within one industry, irrespective of the country, implying narrowing valuation differentials as countries become more integrated. Our analysis of the 1990–2007 period shows that membership in the EU significantly lowered discount rate and expected earnings growth differentials across countries. In contrast, the adoption of the Euro was not associated with increased integration. Our results do not change when the sample is extended to include the recent crisis period.
A cyber-physical system (CPS) integrates communication and automation technologies into the operational processes of physical systems. Nowadays, as a complex CPS, an intelligent connected vehicle ...(ICV) may be exposed to accidental functional failures and malicious attacks. Therefore, ensuring the ICV's safety and security is crucial. Traditional safety/security analysis methods, such as failure mode and effect analysis and attack tree analysis, cannot provide a comprehensive analysis for the interactions between the system components of the ICV. In this work, we merge system-theoretic process analysis (STPA) with the concept phase of ISO 26262 and ISO/SAE 21434. We focus on the interactions between components while analyzing the safety and security of ICVs to reduce redundant efforts and inconsistencies in determining safety and security requirements. To conquer STPA's abstraction in describing causal scenarios, we improved the physical component diagram of STPA-SafeSec by adding interface elements. In addition, we proposed the loss scenario tree to describe specific scenarios that lead to unsafe/unsecure control actions. After hazard/threat analysis, a unified risk assessment process is proposed to ensure consistency in assessment criteria and to streamline the process. A case study is implemented on the autonomous emergency braking system to demonstrate the validation of the proposed method.
To sustain or repair cooperation during a social exchange, adaptive creatures must understand social gestures and the consequences when shared expectations about fair exchange are violated by ...accident or intent. We recruited 55 individuals afflicted with borderline personality disorder (BPD) to play a multiround economic exchange game with healthy partners. Behaviorally, individuals with BPD showed a profound incapacity to maintain cooperation, and were impaired in their ability to repair broken cooperation on the basis of a quantitative measure of coaxing. Neurally, activity in the anterior insula, a region known to respond to norm violations across affective, interoceptive, economic, and social dimensions, strongly differentiated healthy participants from individuals with BPD. Healthy subjects showed a strong linear relation between anterior insula response and both magnitude of monetary offer received from their partner (input) and the amount of money repaid to their partner (output). In stark contrast, activity in the anterior insula of BPD participants was related only to the magnitude of repayment sent back to their partner (output), not to the magnitude of offers received (input). These neural and behavioral data suggest that norms used in perception of social gestures are pathologically perturbed or missing altogether among individuals with BPD. This game-theoretic approach to psychopathology may open doors to new ways of characterizing and studying a range of mental illnesses.
Electric vehicles are one of the effective tools for pollution reduction and sustainable transportation in emerging markets. In this paper, we investigate the optimal locations and electricity prices ...for dynamic wireless charging links of electric vehicles to minimize total social cost within a given budget while ensuring nonnegative operating profit to alleviate a government’s operational pressure. A logit-based stochastic user equilibrium model is proposed to capture drivers’ routing and recharging behavior, and a linear programming approach is developed to determine a path recharging plan. The problem is rendered as a bi-level formulation and solved using an efficient surrogate model-based algorithm.
The Internet of Things (IoT) and cloud technologies have significantly facilitated healthcare. In such a context, medical data are collected by the terminals from the patients, manipulated, and ...stored on the cloud by hospitals (doctors). This brings asymmetry problems in medical data access control, processing, and storage between doctors and patients, which results in medical data sharing face many challenges such as privacy leakage and malicious feedback from cloud servers on queries. To solve these asymmetry problems, this paper proposes a medical data sharing scheme with cloud-chain cooperation and policy fusion in the IoT. Regarding asymmetrical access control rights, a conflict resolution and fusion algorithm that enables co-authorization of medical data by the doctor and the patient is introduced. To balance the symmetry of medical data storage and processing, a cloud-chain cooperation ciphertext retrieval method is proposed by means of two-stage joint searching from cloud servers and the blockchain, which can not only detect malicious medical data feedback from cloud servers, but also improve the data search efficiency. The security analysis showed that this scheme satisfies the confidentiality and verifiability of the retrieved information, and the feasibility of the proposed scheme was demonstrated through experiments.
•Optimization method to locate focal charging hubs in regional air transport networks.•Bi-objective formulation trading-off charging hubs and regional connectivity.•A kernel-search heuristic is ...proposed to handle large-scale real-world-like instances.•Computational experiments demonstrate the benefits of the proposed algorithm.•Real-world case study of Sweden demonstrates the strategic insights of the model.
The uptake of electric aircraft appears faster today than predicted. Given the prominent electric aircraft technologies, short- and medium-haul routes are the ones that will benefit first, with the promise to revolutionize regional aviation at short notice. This paper proposes an optimization model to support the strategic design of charging networks for electric aircraft as a key enabling factor to prepare for and take full advantage of aviation electrification. The model, named Electric Aircraft Charging Network for Regional Routes, defines a network of airports and flight paths to optimally trade-off the number of charging bases (and associated investment costs) with connectivity and population coverage targets typical of regional routes serving remote regions. Due to computational challenges in large problem instances, we propose a Kernel Search heuristic and illustrate how it can deliver high quality solutions for large cases in a shorter computational time than the branch-and-cut algorithms. A real-world application to Sweden then demonstrates the practical insights of the proposed approach. We find that leveraging the many currently under-utilized regional airports has connectivity and investment benefits (on average +12.1% in number of origins covered, +5.8% in population coverage, and −7.3% reduction of travel times). Furthermore, increasing the maximum aircraft range on a single charge implies significantly fewer charging bases and more feasible travel options, thus favoring network resilience and granting higher flexibility for later planning stages.
Ensuring security for modern IoT systems requires the use of complex methods to analyze their software. One of the most in-demand methods that has repeatedly been proven to be effective is static ...analysis. However, the progressive complication of the connections in IoT systems, the increase in their scale, and the heterogeneity of elements requires the automation and intellectualization of manual experts' work. A hypothesis to this end is posed that assumes the applicability of machine-learning solutions for IoT system static analysis. A scheme of this research, which is aimed at confirming the hypothesis and reflecting the ontology of the study, is given. The main contributions to the work are as follows: systematization of static analysis stages for IoT systems and decisions of machine-learning problems in the form of formalized models; review of the entire subject area publications with analysis of the results; confirmation of the machine-learning instrumentaries applicability for each static analysis stage; and the proposal of an intelligent framework concept for the static analysis of IoT systems. The novelty of the results obtained is a consideration of the entire process of static analysis (from the beginning of IoT system research to the final delivery of the results), consideration of each stage from the entirely given set of machine-learning solutions perspective, as well as formalization of the stages and solutions in the form of "Form and Content" data transformations.
Amid growing interest in China’s role in financing and building infrastructure in Africa, there is still little research on how Chinese-financed infrastructures are negotiated and realised at the ...city and metropolitan scale. We compare the Light Rail Transit in Addis Ababa, Ethiopia with the expressway linking Kampala to Entebbe airport in Uganda, examining the processes of bargaining behind these transport infrastructures and their emergent effects on urban land use and city-dwellers’ mobility. We find that both projects were designed and implemented through opaque negotiations between African national elites and Chinese agencies, with little or no engagement from city authorities, leading to haphazard outcomes that are poorly integrated with broader planning. Yet we also suggest that despite being enabled and mediated by Chinese agencies, such projects do not embody a Chinese global vision. They instead reflect the entrepreneurial activities of Chinese contractors and the varying ways in which these connect with African national governments’ shifting priorities. Moreover, as they are subsumed into the urban context, these transposed infrastructures have been rapidly repurposed and their ‘Chineseness’ diluted, with one morphing into an infrastructure for the poor and the other into a site of private value extraction. We thus argue that, far from representing a domineering or neo-colonial influence, Chinese-financed infrastructures that land in institutionally complex African city-regions can be rapidly swallowed up into the political-economic landscape, producing contingent benefits and disbenefits that are far removed from the visions of any planners – Chinese or African, past or present.