自主智能系统(英文)Pub Date : 2025-03-20DOI: 10.1007/s43684-025-00095-z
Qiang Mei, Rui Huang, Duo Li, Jingyi Li, Nan Shi, Mei Du, Yingkang Zhong, Chunqi Tian
{"title":"Intelligent hierarchical federated learning system based on semi-asynchronous and scheduled synchronous control strategies in satellite network","authors":"Qiang Mei, Rui Huang, Duo Li, Jingyi Li, Nan Shi, Mei Du, Yingkang Zhong, Chunqi Tian","doi":"10.1007/s43684-025-00095-z","DOIUrl":"10.1007/s43684-025-00095-z","url":null,"abstract":"<div><p>Federated learning (FL) is a technology that allows multiple devices to collaboratively train a global model without sharing original data, which is a hot topic in distributed intelligent systems. Combined with satellite network, FL can overcome the geographical limitation and achieve broader applications. However, it also faces the issues such as straggler effect, unreliable network environments and non-independent and identically distributed (Non-IID) samples. To address these problems, we propose an intelligent hierarchical FL system based on semi-asynchronous and scheduled synchronous control strategies in cloud-edge-client structure for satellite network. Our intelligent system effectively handles multiple client requests by distributing the communication load of the central cloud to various edge clouds. Additionally, the cloud server selection algorithm and the edge-client semi-asynchronous control strategy minimize clients’ waiting time, improving the overall efficiency of the FL process. Furthermore, the center-edge scheduled synchronous control strategy ensures the timeliness of partial models. Based on the experiment results, our proposed intelligent hierarchical FL system demonstrates a distinct advantage in global accuracy over traditional FedAvg, achieving 2% higher global accuracy within the same time frame and reducing 52% training time to achieve the target accuracy.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-025-00095-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143655326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A glance over the past decade: road scene parsing towards safe and comfortable autonomous driving","authors":"Rui Fan, Jiahang Li, Jiaqi Li, Jiale Wang, Ziwei Long, Ning Jia, Yanan Liu, Wenshuo Wang, Mohammud J. Bocus, Sergey Vityazev, Xieyuanli Chen, Junhao Xiao, Stepan Andreev, Huimin Lu, Alexander Dvorkovich","doi":"10.1007/s43684-025-00096-y","DOIUrl":"10.1007/s43684-025-00096-y","url":null,"abstract":"<div><p>Road scene parsing is a crucial capability for self-driving vehicles and intelligent road inspection systems. Recent research has increasingly focused on enhancing driving safety and comfort by improving the detection of both drivable areas and road defects. This article reviews state-of-the-art networks developed over the past decade for both general-purpose semantic segmentation and specialized road scene parsing tasks. It also includes extensive experimental comparisons of these networks across five public datasets. Additionally, we explore the key challenges and emerging trends in the field, aiming to guide researchers toward developing next-generation models for more effective and reliable road scene parsing.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-025-00096-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143602382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
自主智能系统(英文)Pub Date : 2025-03-05DOI: 10.1007/s43684-025-00089-x
Kezhou Chen, Tao Wang, Huimin Zhuo, Lianglun Cheng
{"title":"WGO: a similarly encoded whale-goshawk optimization algorithm for uncertain cloud manufacturing service composition","authors":"Kezhou Chen, Tao Wang, Huimin Zhuo, Lianglun Cheng","doi":"10.1007/s43684-025-00089-x","DOIUrl":"10.1007/s43684-025-00089-x","url":null,"abstract":"<div><p>Service Composition and Optimization Selection (SCOS) is crucial in Cloud Manufacturing (CMfg), but the uncertainties in service states and working environments pose challenges for existing QoS-based methods. Recently, digital twins have gained prominence in CMfg due to their predictive capabilities, enhancing the reliability of service composition. Heuristic algorithms are widely used in this field for their flexibility and compatibility with uncertain environments. This paper proposes the Whale-Goshawk Optimization Algorithm (WGO), which combines the Whale Optimization Algorithm (WOA) and Northern Goshawk Optimization Algorithm (NGO). A novel similar integer coding method, incorporating spatial feature information, addresses the limitations of traditional integer coding, while a whale-optimized prey generation strategy improves NGO’s global optimization efficiency. Additionally, a local search method based on similar integer coding enhances WGO’s local search ability. Experimental results demonstrate the effectiveness of the proposed approach.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-025-00089-x.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
自主智能系统(英文)Pub Date : 2025-03-03DOI: 10.1007/s43684-025-00092-2
Binchuan Qi, Wei Gong, Li Li
{"title":"Explanation framework for industrial recommendation systems based on the generative adversarial network with embedding constraints","authors":"Binchuan Qi, Wei Gong, Li Li","doi":"10.1007/s43684-025-00092-2","DOIUrl":"10.1007/s43684-025-00092-2","url":null,"abstract":"<div><p>The explainability of recommendation systems refers to the ability to explain the logic that guides the system’s decision to endorse or exclude an item. In industrial-grade recommendation systems, the high complexity of features, the presence of embedding layers, the existence of adversarial samples and the requirements for explanation accuracy and efficiency pose significant challenges to current explanation methods. This paper proposes a novel framework AdvLIME (Adversarial Local Interpretable Model-agnostic Explanation) that leverages Generative Adversarial Networks (GANs) with Embedding Constraints to enhance explainability. This method utilizes adversarial samples as references to explain recommendation decisions, generating these samples in accordance with realistic distributions and ensuring they meet the structural constraints of the embedding module. AdvLIME requires no modifications to the existing model architecture and needs only a single training session for global explanation, making it ideal for industrial applications. This work contributes two significant advancements. First, it develops a model-independent global explanation method via adversarial generation. Second, it introduces a model discrimination method to guarantee that the generated samples adhere to the embedding constraints. We evaluate the AdvLIME framework on the Behavior Sequence Transformer (BST) model using the MovieLens 20 M dataset. The experimental results show that AdvLIME outperforms traditional methods such as LIME and DLIME, reducing the approximation error of real samples by 50% and demonstrating improved stability and accuracy.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-025-00092-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143529968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The individual readiness and risk-related concerns of IT professionals for blockchain adoption","authors":"Cigdem Turhan , Ibrahim Akman","doi":"10.1016/j.bcra.2024.100254","DOIUrl":"10.1016/j.bcra.2024.100254","url":null,"abstract":"<div><div>Blockchain has gained remarkable momentum since its introduction in 2008, drawing the attention of industries, individuals, and governments on a global scale. This technology has been studied in the literature, with a focus on technical aspects, application areas, and emerging research challenges. However, few studies address individuals’ perceptions of and concerns with respect to blockchain adoption. This study aims to investigate the attributes affecting blockchain adoption intention. A sample of IT professionals was used for this purpose since they are expected to have earlier and greater awareness of new digital technologies. The perceptions of this group of users regarding attributes such as innovativeness, self-efficacy, social pressure, and awareness, as well as their perceptions of privacy, security, and complexity, were examined through a survey of 208 responses. The results indicate that among the individual attributes, personal innovativeness, awareness, and social pressure positively affect blockchain acceptance, whereas security and privacy concerns fuel the reluctance to adopt blockchain. The findings hopefully provide insight for developers and management of enterprises to ensure a smooth transition into blockchain and present evidence to forecast its future.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 1","pages":"Article 100254"},"PeriodicalIF":6.9,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143683328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-platform wallet for privacy protection and key recovery in decentralized applications","authors":"Cristòfol Daudén-Esmel, Jordi Castellà-Roca, Alexandre Viejo, Ignacio Miguel-Rodríguez","doi":"10.1016/j.bcra.2024.100243","DOIUrl":"10.1016/j.bcra.2024.100243","url":null,"abstract":"<div><div>In recent years, the rise of blockchain technology and its applications has led the software development industry to consider blockchain-powered Decentralized Applications (dApps) as serverless REST APIs. However, to engage with dApps, users require a blockchain wallet. This tool facilitates the generation and secure storage of a user's private key and verifies their identity, among other functionalities. Despite their utility, blockchain wallets present significant challenges, such as reliance on trusted third parties, vulnerability to adversaries observing and potentially linking user interactions, key recovery issues, and synchronization of cryptographic keys across multiple devices. This paper addresses these challenges by introducing a fully decentralized multi-platform wallet that leverages blockchain and InterPlanetary File System (IPFS) technologies for managing asymmetric keys and enabling key recovery. This novel approach empowers users to interact with dApps built on blockchain smart contracts while preserving their privacy and ensuring seamless key recovery in the case of device theft or damage. The proposed system is economically viable, with in-depth cost analysis, and demonstrates resilience against security and privacy attacks. A comparative analysis highlights the advantages of the new scheme over existing mainstream and state-of-the-art solutions. Finally, a preliminary prototype implementation is presented to validate the system's feasibility.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 1","pages":"Article 100243"},"PeriodicalIF":6.9,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143580550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adel A. Nasser , Abed Saif Ahmed Alghawli , S. Saleh , Amani A.K. Elsayed
{"title":"Health security disparities in the Eastern Mediterranean Region: A comparative analysis using an integrated MCDM and clustering approach","authors":"Adel A. Nasser , Abed Saif Ahmed Alghawli , S. Saleh , Amani A.K. Elsayed","doi":"10.1016/j.jobb.2025.01.001","DOIUrl":"10.1016/j.jobb.2025.01.001","url":null,"abstract":"<div><h3>Objectives</h3><div>This study aimed to analyze and compare health security performance (HSP) between Gulf Cooperation Council and non-Gulf Cooperation Council countries within the Eastern Mediterranean Region (EMR) for 2019 and 2021, recognizing the critical role of health security in managing global health threats.</div></div><div><h3>Methods</h3><div>The study utilized data from the Global Health Security Index (GHSI) for 2019 and 2021. Key health security priorities were identified using the entropy objective weighting method. The VIKOR (VIseKriterijumska Optimizacija I Kompromisno Resenje) method was employed to rank countries based on overall performance. K-means clustering was applied to group countries with similar health security profiles. Pearson’s and Spearman’s rank correlation coefficients were used to assess relationships between independent HSP indicators and overall performance scores.</div></div><div><h3>Results</h3><div>A significant shift in health security priorities within the EMR was observed between 2019 and 2021, with prevention gaining prominence. Gulf Cooperation Council countries emphasized detection and reporting, while non-Gulf Cooperation Council countries prioritized health systems and prevention. Gulf Cooperation Council countries, particularly Qatar and Saudi Arabia, consistently demonstrated strong HSP. Conversely, non-Gulf Cooperation Council countries facing conflict and instability, such as Yemen, Somalia, and Syria, exhibited weaker performance. Health system capacity, prevention, detection and reporting, and risk environment showed robust correlations with overall HSP.</div></div><div><h3>Conclusion</h3><div>This study underscores the necessity for tailored, adaptive policies to address HSP disparities across regions, highlighting investment in prevention, detection, and reporting. It stresses international collaboration, improved policy implementation, and ongoing research to enhance global health security systems across diverse contexts.</div></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":"7 1","pages":"Pages 38-51"},"PeriodicalIF":0.0,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143519743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TRADE-5G: A blockchain-based transparent and secure resource exchange for 5G network slicing","authors":"El-hacen Diallo, Khaldoun Al Agha, Steven Martin","doi":"10.1016/j.bcra.2024.100246","DOIUrl":"10.1016/j.bcra.2024.100246","url":null,"abstract":"<div><div>The advent of 5G technology has revolutionized network communication by introducing network slicing (NS) and virtualization to allow multiple network service providers (NSPs) to share infrastructure, thereby reducing deployment costs and accelerating 5G adoption. While this new open marketplace enables NSPs to trade resources dynamically, it also exposes the system to security concerns, such as front-running and selfish-validation attacks, which can lead to market manipulation and strategy leakage. This paper presents TRADE-5G, a secure blockchain-based marketplace for 5G resource trading that mitigates these attacks and ensures fair, transparent resource allocation while preserving the confidentiality of NSP strategies. Through extensive simulations, TRADE-5G demonstrates a substantial 18% improvement in user satisfaction and a 36% reduction in wasted resources compared to traditional models. Additionally, it opens new profit opportunities for NSPs through unused resources, establishing a more competitive, secure, and transparent 5G trading environment that exceeds the capabilities of traditional mobile networks.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 1","pages":"Article 100246"},"PeriodicalIF":6.9,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143683322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lingfeng Bao , Ruidong Zhang , Xiaohu Yang , Chunming Rong
{"title":"Editorials of BCRA 2024","authors":"Lingfeng Bao , Ruidong Zhang , Xiaohu Yang , Chunming Rong","doi":"10.1016/j.bcra.2024.100270","DOIUrl":"10.1016/j.bcra.2024.100270","url":null,"abstract":"","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 1","pages":"Article 100270"},"PeriodicalIF":6.9,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143683327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}