Figure S1. Forest carbon stocks (including aboveground and belowground) across Southeast Asia circa 2000. a, Mean forest carbon stocks at different elevations (black line) and slopes (red line). Inset bars show regional mean carbon stocks in lowlands and mountains. Error bars represent the standard deviation of mean carbon stocks. b, Map of mean carbon stocks in 0.25° cells. Black dots indicate mountain regions.
With the booming development of medical informatization and the ubiquitous connections in the fifth generation mobile communication technology (5G) era, the heterogeneity and explosive growth of medical data have brought huge challenges to data access, security and privacy, as well as information processing in Internet of Medical Things (IoMT). This article provides a comprehensive review of how to realize the timely processing and analysis of medical big data and the sinking of high-quality medical resources under the constraints of the existing medical environment and medical-related equipment. We mainly focus on the advantages brought by the cloud computing, edge computing and artificial intelligence technologies to the IoMT. We also explore how to rationalize the use of medical resources and the security and privacy of medical data, so that high-quality medical services can be provided to patients. Finally, we discuss the current challenges and possible future research directions in the edge-cloud computing and artificial intelligence related IoMT. INDEX TERMS Internet of medical things (IoMT), deep learning, edge of computing, computation offloading.
Road network extraction is one of the significant assignments for disaster emergency response, intelligent transportation systems, and real-time updating road network. Road extraction base on high-resolution remote sensing images has become a hot topic. Presently, most of the researches are based on traditional machine learning algorithms, which are complex and computational because of impervious surfaces such as roads and buildings that are discernible in the images. Given the above problems, we propose a new method to extract the road network from remote sensing images using a DenseUNet model with few parameters and robust characteristics. DenseUNet consists of dense connection units and skips connections, which strengthens the fusion of different scales by connections at various network layers. The performance of the advanced method is validated on two datasets of high-resolution images by comparison with three classical semantic segmentation methods. The experimental results show that the method can be used for road extraction in complex scenes.
Previous estimates of tropical forest carbon loss in the twenty-first century using satellite data typically focus on its magnitude, whereas regional loss trajectories and associated drivers are rarely reported. Here we used different high-resolution satellite datasets to show a doubling of gross tropical forest carbon loss worldwide from 0.97 ± 0.16 PgC yr−1 in 2001–2005 to 1.99 ± 0.13 PgC yr−1 in 2015–2019. This increase in carbon loss from forest conversion is higher than in bookkeeping models forced by land-use statistical data, which show no trend or a slight decline in land-use emissions in the early twenty-first century. Most (82%) of the forest carbon loss is at some stages associated with large-scale commodity or small-scale agriculture activities, particularly in Africa and Southeast Asia. We find that ~70% of former forest lands converted to agriculture in 2001–2019 remained so in 2020, confirming a dominant role of agriculture in long-term pan-tropical carbon reductions on formerly forested landscapes. The acceleration and high rate of forest carbon loss in the twenty-first century suggest that existing strategies to reduce forest loss are not successful; and this failure underscores the importance of monitoring deforestation trends following the new pledges made in Glasgow.
Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bots that generate huge volumes of spam or launch Distributed Denial of Service (DDoS) attacks on victim hosts. New emerging botnet attacks degrade the status of Internet security further. To address these problems, a practical collaborative network security management system is proposed with an effective collaborative Unified Threat Management (UTM) and traffic probers. A distributed security overlay network with a centralized security center leverages a peer-to-peer communication protocol used in the UTMs collaborative module and connects them virtually to exchange network events and security rules. Security functions for the UTM are retrofitted to share security rules. In this paper, we propose a design and implementation of a cloud-based security center for network security forensic analysis. We propose using cloud storage to keep collected traffic data and then processing it with cloud computing platforms to find the malicious attacks. As a practical example, phishing attack forensic analysis is presented and the required computing and storage resources are evaluated based on real trace data. The cloudbased security center can instruct each collaborative UTM and prober to collect events and raw traffic, send them back for deep analysis, and generate new security rules. These new security rules are enforced by collaborative UTM and the feedback events of such rules are returned to the security center. By this type of close-loop control, the collaborative network security management system can identify and address new distributed attacks more quickly and effectively.
During the outbreak of the Coronavirus disease 2019 (COVID-19), while bringing various serious threats to the world, it reminds us that we need to take precautions to control the transmission of the virus. The rise of the Internet of Medical Things (IoMT) has made related data collection and processing, including healthcare monitoring systems, more convenient on the one hand, and requirements of public health prevention are also changing and more challengeable on the other hand. One of the most effective nonpharmaceutical medical intervention measures is mask wearing. Therefore, there is an urgent need for an automatic real-time mask detection method to help prevent the public epidemic. In this article, we put forward an edge computingbased mask (ECMask) identification framework to help public health precautions, which can ensure real-time performance on the low-power camera devices of buses. Our ECMask consists of three main stages: 1) video restoration; 2) face detection; and 3) mask identification. The related models are trained and evaluated on our bus drive monitoring data set and public data set. We construct extensive experiments to validate the good performance based on real video data, in consideration of detection accuracy and execution time efficiency of the whole video analysis, which have valuable application in COVID-19 prevention.
In recent years, an increasing number of university students are found to be at high risk of depression. Through a large scale depression screening, this paper finds that around 6.5% of the university postgraduate students in China experience depression. We then investigate whether the gait patterns of these individuals have already changed as depression is suggested to associate with gait abnormality. Significant differences are found in several spatiotemporal, kinematic and postural gait parameters such as walking speed, stride length, head movement, vertical head posture, arm swing, and body sway, between the depressed and non-depressed groups. Applying these features to classifiers with different machine learning algorithms, we examine whether natural gait analysis may serve as a convenient and objective tool to assist in depression recognition. The results show that when using a random forest classifier, the two groups can be classified automatically with a maximum accuracy of 91.58%. Furthermore, a reasonable accuracy can already be achieved by using parameters from the upper body alone, indicating that upper body postures and movements can effectively contribute to depression analysis.
In order to deploy a secure WLAN mesh network, authentication of both users and APs is needed, and a secure authentication mechanism should be employed. However, some additional configurations of trusted third party agencies are still needed on-site to deploy a secure authentication system. This paper proposes a new block chain-based authentication protocol for WLAN mesh security access, to reduce the deployment costs and resolve the issues of requiring key delivery and central server during IEEE 802.11X authentication. This method takes the user's authentication request as a transaction, considers all the authentication records in the mesh network as the public ledger and realizes the effective monitoring of the malicious attack. Finally, this paper analyzes the security of the protocol in detail, and proves that the new method can solve the dependence of the authentication node on PKI and CA.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
334 Leonard St
Brooklyn, NY 11211
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.