Majid Bani-Yaghoub, Kamel Rekab, Julia Pluta, Said Tabharit
Spatial, temporal, and space-time scan statistics can be used for geographical surveillance, identifying temporal and spatial patterns, and detecting outliers. While statistical cluster analysis is a valuable tool for identifying patterns, optimizing resource allocation, and supporting decision-making, accurately predicting future spatial clusters remains a significant challenge. Given the known relative risks of spatial clusters over the past time intervals, the main objective of the present study is to predict the relative risks for the subsequent interval, . Building on our prior research, we propose a predictive Markov chain model with an embedded corrector component. This corrector utilizes either multiple linear regression or exponential smoothing method, selecting the one that minimizes the relative distance between observed and predicted values in the -th interval. To test the proposed method, we first calculated the relative risks of statistically significant spatial clusters of COVID-19 mortality in the U.S. over seven time intervals from May 2020 to March 2023. Then, for each time interval, we selected the top 25 clusters with the highest relative risks and iteratively predicted the relative risks of clusters from intervals three to seven. The predictive accuracies ranged from moderate to high, indicating the potential applicability of this method for predictive disease analytics and future pandemic preparedness.
空间、时间和时空扫描统计可用于地理监控、识别时空模式和检测异常值。虽然统计聚类分析是识别模式、优化资源分配和支持决策的重要工具,但准确预测未来的空间聚类仍然是一项重大挑战。鉴于已知过去 k 个时间间隔内空间聚类的相对风险,本研究的主要目标是预测随后 k + 1 个时间间隔内的相对风险。在先前研究的基础上,我们提出了一个带有嵌入式校正器组件的预测马尔可夫链模型。该校正器采用多元线性回归法或指数平滑法,选择能使第 k 个区间的观测值与预测值之间的相对距离最小的方法。为了测试所提出的方法,我们首先计算了从 2020 年 5 月到 2023 年 3 月七个时间区间内美国 COVID-19 死亡率具有统计学意义的空间集群的相对风险。然后,在每个时间间隔内,我们选择相对风险最高的前 25 个聚类,并迭代预测第三至第七间隔内聚类的相对风险。预测准确度从中度到高度不等,表明这种方法可能适用于疾病预测分析和未来的大流行病防备。
{"title":"Estimating the Relative Risks of Spatial Clusters Using a Predictor-Corrector Method.","authors":"Majid Bani-Yaghoub, Kamel Rekab, Julia Pluta, Said Tabharit","doi":"10.3390/math13020180","DOIUrl":"10.3390/math13020180","url":null,"abstract":"<p><p>Spatial, temporal, and space-time scan statistics can be used for geographical surveillance, identifying temporal and spatial patterns, and detecting outliers. While statistical cluster analysis is a valuable tool for identifying patterns, optimizing resource allocation, and supporting decision-making, accurately predicting future spatial clusters remains a significant challenge. Given the known relative risks of spatial clusters over the past <math><mi>k</mi></math> time intervals, the main objective of the present study is to predict the relative risks for the subsequent interval, <math><mi>k</mi> <mo>+</mo> <mn>1</mn></math> . Building on our prior research, we propose a predictive Markov chain model with an embedded corrector component. This corrector utilizes either multiple linear regression or exponential smoothing method, selecting the one that minimizes the relative distance between observed and predicted values in the <math><mi>k</mi></math> -th interval. To test the proposed method, we first calculated the relative risks of statistically significant spatial clusters of COVID-19 mortality in the U.S. over seven time intervals from May 2020 to March 2023. Then, for each time interval, we selected the top 25 clusters with the highest relative risks and iteratively predicted the relative risks of clusters from intervals three to seven. The predictive accuracies ranged from moderate to high, indicating the potential applicability of this method for predictive disease analytics and future pandemic preparedness.</p>","PeriodicalId":18303,"journal":{"name":"Mathematics","volume":"13 2","pages":""},"PeriodicalIF":2.3,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11827645/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143433472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we deal with a strongly singular problem involving a non-local operator, a critical nonlinearity, and a subcritical perturbation. We apply techniques from non-smooth analysis to the energy functional, in combination with the study of the topological properties of the sublevels of its smooth part, to prove the existence of three weak solutions: two points of local minimum and a third one as a mountain pass critical point.
{"title":"Three Weak Solutions for a Critical Non-Local Problem with Strong Singularity in High Dimension","authors":"Gabriel Neves Cunha, Francesca Faraci, Kaye Silva","doi":"10.3390/math12182910","DOIUrl":"https://doi.org/10.3390/math12182910","url":null,"abstract":"In this paper, we deal with a strongly singular problem involving a non-local operator, a critical nonlinearity, and a subcritical perturbation. We apply techniques from non-smooth analysis to the energy functional, in combination with the study of the topological properties of the sublevels of its smooth part, to prove the existence of three weak solutions: two points of local minimum and a third one as a mountain pass critical point.","PeriodicalId":18303,"journal":{"name":"Mathematics","volume":"2 1","pages":""},"PeriodicalIF":2.4,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142249100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Secure instant communication is an important topic of information security. A group chat is a highly convenient mode of instant communication. Increasingly, companies are adopting group chats as a daily office communication tool. However, a large volume of messages in group chat communication can lead to message overload, causing group members to miss important information. Additionally, the communication operator’s server may engage in the unreliable behavior of stealing information from the group chat. To address these issues, this paper proposes an attribute-based end-to-end policy-controlled signcryption scheme, aimed at establishing a secure and user-friendly group chat communication mode. By using the linear secret sharing scheme (LSSS) with strong expressive power to construct the access structure in the signcryption technology, the sender can precisely control the recipients of the group chat information to avoid message overload. To minimize computational cost, a signcryption step with constant computational overhead is designed. Additionally, a message-sending mechanism combining “signcryption + encryption” is employed to prevent the operator server from maliciously stealing group chat information. Rigorous analysis shows that PCE-EtoE can resist adaptive chosen-ciphertext attacks under the standard model. Simulation results demonstrate that our theoretical derivation is correct, and that the PCE-EtoE scheme outperforms existing schemes in terms of computational cost, making it suitable for group chat communication.
{"title":"An Attribute-Based End-to-End Policy-Controlled Signcryption Scheme for Secure Group Chat Communication","authors":"Feng Yu, Linghui Meng, Xianxian Li, Daicen Jiang, Weidong Zhu, Zhihua Zeng","doi":"10.3390/math12182906","DOIUrl":"https://doi.org/10.3390/math12182906","url":null,"abstract":"Secure instant communication is an important topic of information security. A group chat is a highly convenient mode of instant communication. Increasingly, companies are adopting group chats as a daily office communication tool. However, a large volume of messages in group chat communication can lead to message overload, causing group members to miss important information. Additionally, the communication operator’s server may engage in the unreliable behavior of stealing information from the group chat. To address these issues, this paper proposes an attribute-based end-to-end policy-controlled signcryption scheme, aimed at establishing a secure and user-friendly group chat communication mode. By using the linear secret sharing scheme (LSSS) with strong expressive power to construct the access structure in the signcryption technology, the sender can precisely control the recipients of the group chat information to avoid message overload. To minimize computational cost, a signcryption step with constant computational overhead is designed. Additionally, a message-sending mechanism combining “signcryption + encryption” is employed to prevent the operator server from maliciously stealing group chat information. Rigorous analysis shows that PCE-EtoE can resist adaptive chosen-ciphertext attacks under the standard model. Simulation results demonstrate that our theoretical derivation is correct, and that the PCE-EtoE scheme outperforms existing schemes in terms of computational cost, making it suitable for group chat communication.","PeriodicalId":18303,"journal":{"name":"Mathematics","volume":"88 1","pages":""},"PeriodicalIF":2.4,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142249420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Event argument extraction is a crucial subtask of event extraction, which aims at extracting arguments that correspond to argument roles when given event types. The majority of current document-level event argument extraction works focus on extracting information for only one event at a time without considering the association among events; this is known as document-level single-event extraction. However, the interrelationship among arguments can yield mutual gains in their extraction. Therefore, in this paper, we propose AssocKD, an Association-aware Knowledge Distillation Method for Document-level Event Argument Extraction, which enables the enhancement of document-level multi-event extraction with event association knowledge. Firstly, we introduce an association-aware training task to extract unknown arguments with the given privileged knowledge of relevant arguments, obtaining an association-aware model that can construct both intra-event and inter-event relationships. Secondly, we adopt multi-teacher knowledge distillation to transfer such event association knowledge from the association-aware teacher models to the event argument extraction student model. Our proposed method, AssocKD, is capable of explicitly modeling and efficiently leveraging event association to enhance the extraction of multi-event arguments at the document level. We conduct experiments on RAMS and WIKIEVENTS datasets and observe a significant improvement, thus demonstrating the effectiveness of our method.
{"title":"AssocKD: An Association-Aware Knowledge Distillation Method for Document-Level Event Argument Extraction","authors":"Lijun Tan, Yanli Hu, Jianwei Cao, Zhen Tan","doi":"10.3390/math12182901","DOIUrl":"https://doi.org/10.3390/math12182901","url":null,"abstract":"Event argument extraction is a crucial subtask of event extraction, which aims at extracting arguments that correspond to argument roles when given event types. The majority of current document-level event argument extraction works focus on extracting information for only one event at a time without considering the association among events; this is known as document-level single-event extraction. However, the interrelationship among arguments can yield mutual gains in their extraction. Therefore, in this paper, we propose AssocKD, an Association-aware Knowledge Distillation Method for Document-level Event Argument Extraction, which enables the enhancement of document-level multi-event extraction with event association knowledge. Firstly, we introduce an association-aware training task to extract unknown arguments with the given privileged knowledge of relevant arguments, obtaining an association-aware model that can construct both intra-event and inter-event relationships. Secondly, we adopt multi-teacher knowledge distillation to transfer such event association knowledge from the association-aware teacher models to the event argument extraction student model. Our proposed method, AssocKD, is capable of explicitly modeling and efficiently leveraging event association to enhance the extraction of multi-event arguments at the document level. We conduct experiments on RAMS and WIKIEVENTS datasets and observe a significant improvement, thus demonstrating the effectiveness of our method.","PeriodicalId":18303,"journal":{"name":"Mathematics","volume":"12 1","pages":""},"PeriodicalIF":2.4,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142249415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, using the symmetrizing operator δe1e22−l, we derive new generating functions of the products of p,q-modified Pell numbers with various bivariate polynomials, including Mersenne and Mersenne Lucas polynomials, Fibonacci and Lucas polynomials, bivariate Pell and bivariate Pell Lucas polynomials, bivariate Jacobsthal and bivariate Jacobsthal Lucas polynomials, bivariate Vieta–Fibonacci and bivariate Vieta–Lucas polynomials, and bivariate complex Fibonacci and bivariate complex Lucas polynomials.
{"title":"Novel Classes on Generating Functions of the Products of (p,q)-Modified Pell Numbers with Several Bivariate Polynomials","authors":"Ali Boussayoud, Salah Boulaaras, Ali Allahem","doi":"10.3390/math12182902","DOIUrl":"https://doi.org/10.3390/math12182902","url":null,"abstract":"In this paper, using the symmetrizing operator δe1e22−l, we derive new generating functions of the products of p,q-modified Pell numbers with various bivariate polynomials, including Mersenne and Mersenne Lucas polynomials, Fibonacci and Lucas polynomials, bivariate Pell and bivariate Pell Lucas polynomials, bivariate Jacobsthal and bivariate Jacobsthal Lucas polynomials, bivariate Vieta–Fibonacci and bivariate Vieta–Lucas polynomials, and bivariate complex Fibonacci and bivariate complex Lucas polynomials.","PeriodicalId":18303,"journal":{"name":"Mathematics","volume":"9 1","pages":""},"PeriodicalIF":2.4,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142249416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The classical Cox model is the most popular procedure for studying right-censored data in survival analysis. However, it is based on the fundamental assumption of proportional hazards (PH). Modified Cox models, stratified and extended, have been widely employed as solutions when the PH assumption is violated. Nevertheless, prior comparisons of the modified Cox models did not employ comprehensive Monte-Carlo simulations to carry out a comparative analysis between the two models. In this paper, we conducted extensive Monte-Carlo simulation to compare the performance of the stratified and extended Cox models under varying censoring rates, sample sizes, and survival distributions. Our results suggest that the models’ performance at varying censoring rates and sample sizes is robust to the distribution of survival times. Thus, their performance under Weibull survival times was comparable to that of exponential survival times. Furthermore, we found that the extended Cox model outperformed other models under every combination of censoring, sample size and survival distribution.
{"title":"Modified Cox Models: A Simulation Study on Different Survival Distributions, Censoring Rates, and Sample Sizes","authors":"Iketle Aretha Maharela, Lizelle Fletcher, Ding-Geng Chen","doi":"10.3390/math12182903","DOIUrl":"https://doi.org/10.3390/math12182903","url":null,"abstract":"The classical Cox model is the most popular procedure for studying right-censored data in survival analysis. However, it is based on the fundamental assumption of proportional hazards (PH). Modified Cox models, stratified and extended, have been widely employed as solutions when the PH assumption is violated. Nevertheless, prior comparisons of the modified Cox models did not employ comprehensive Monte-Carlo simulations to carry out a comparative analysis between the two models. In this paper, we conducted extensive Monte-Carlo simulation to compare the performance of the stratified and extended Cox models under varying censoring rates, sample sizes, and survival distributions. Our results suggest that the models’ performance at varying censoring rates and sample sizes is robust to the distribution of survival times. Thus, their performance under Weibull survival times was comparable to that of exponential survival times. Furthermore, we found that the extended Cox model outperformed other models under every combination of censoring, sample size and survival distribution.","PeriodicalId":18303,"journal":{"name":"Mathematics","volume":"44 1","pages":""},"PeriodicalIF":2.4,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142249418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Álvaro Otero Sánchez, Daniel Camazón Portela, Juan Antonio López-Ramos
The aim of this article is to solve the system XA=Y, where A=(ai,j)∈Mn×m(S), Y∈Sm and X is an unknown vector of a size n, with S being an additively idempotent semiring. If the system has solutions, then we completely characterize its maximal one, and in the particular case where S is a generalized tropical semiring, a complete characterization of its solutions is provided as well as an explicit bound of the computational cost associated with its computation. Finally, we show how to apply this method to cryptanalyze two different key exchange protocols defined for a finite case and the tropical semiring, respectively.
本文的目的是求解系统 XA=Y,其中 A=(ai,j)∈Mn×m(S),Y∈Sm,X 是一个大小为 n 的未知向量,S 是一个可加可幂半iring。如果系统有解,那么我们就能完全描述其最大解,而在 S 是广义热带配线的特殊情况下,我们就能提供其解的完整描述,以及与其计算相关的计算成本的明确约束。最后,我们展示了如何应用这种方法对分别为有限情况和热带配子定义的两种不同密钥交换协议进行加密分析。
{"title":"On the Solutions of Linear Systems over Additively Idempotent Semirings","authors":"Álvaro Otero Sánchez, Daniel Camazón Portela, Juan Antonio López-Ramos","doi":"10.3390/math12182904","DOIUrl":"https://doi.org/10.3390/math12182904","url":null,"abstract":"The aim of this article is to solve the system XA=Y, where A=(ai,j)∈Mn×m(S), Y∈Sm and X is an unknown vector of a size n, with S being an additively idempotent semiring. If the system has solutions, then we completely characterize its maximal one, and in the particular case where S is a generalized tropical semiring, a complete characterization of its solutions is provided as well as an explicit bound of the computational cost associated with its computation. Finally, we show how to apply this method to cryptanalyze two different key exchange protocols defined for a finite case and the tropical semiring, respectively.","PeriodicalId":18303,"journal":{"name":"Mathematics","volume":"5 1","pages":""},"PeriodicalIF":2.4,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142249419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rongjiang Cai, Tao Zhang, Xi Wang, Qiaoran Jia, Shufang Zhao, Nana Liu, Xiaoguang Wang
In China, new-energy vehicles are viewed as the ultimate goal for the automobile industry, given the current focus on the “dual-carbon” target. Therefore, it is important to promote the sustainable development of this new-energy market and ensure a smooth transition from fuel-driven vehicles to new-energy vehicles. This study constructs a tripartite evolutionary game model involving vehicle enterprises, consumers, and the government. It improves the tripartite evolutionary game through the mechanisms of dynamic and static rewards and punishments, respectively, using real-world data. The results show the following. (1) A fluctuation is present in the sales of new-energy vehicles by enterprises and the active promotional behavior of the government. This fluctuation leads to instability, and the behavior is difficult to accurately predict, which is not conducive new-energy vehicles’ promotion and sales. (2) A static reward and punishment mechanism can change the fluctuation threshold or peak value. Nevertheless, the stability of the system’s strategy is not the main reason that the government has been actively promoting it for a long time. However, enterprises are still wavering between new-energy and fuel vehicles. (3) The linear dynamic reward and punishment mechanism also has its defects. Although they are considered the stability control strategy of the system, they are still not conducive to stability. (4) The nonlinear dynamic reward and punishment mechanism can help the system to achieve the ideal stabilization strategy.
{"title":"Evolutionary Game and Simulation Analysis of New-Energy Vehicle Promotion in China Based on Reward and Punishment Mechanisms","authors":"Rongjiang Cai, Tao Zhang, Xi Wang, Qiaoran Jia, Shufang Zhao, Nana Liu, Xiaoguang Wang","doi":"10.3390/math12182900","DOIUrl":"https://doi.org/10.3390/math12182900","url":null,"abstract":"In China, new-energy vehicles are viewed as the ultimate goal for the automobile industry, given the current focus on the “dual-carbon” target. Therefore, it is important to promote the sustainable development of this new-energy market and ensure a smooth transition from fuel-driven vehicles to new-energy vehicles. This study constructs a tripartite evolutionary game model involving vehicle enterprises, consumers, and the government. It improves the tripartite evolutionary game through the mechanisms of dynamic and static rewards and punishments, respectively, using real-world data. The results show the following. (1) A fluctuation is present in the sales of new-energy vehicles by enterprises and the active promotional behavior of the government. This fluctuation leads to instability, and the behavior is difficult to accurately predict, which is not conducive new-energy vehicles’ promotion and sales. (2) A static reward and punishment mechanism can change the fluctuation threshold or peak value. Nevertheless, the stability of the system’s strategy is not the main reason that the government has been actively promoting it for a long time. However, enterprises are still wavering between new-energy and fuel vehicles. (3) The linear dynamic reward and punishment mechanism also has its defects. Although they are considered the stability control strategy of the system, they are still not conducive to stability. (4) The nonlinear dynamic reward and punishment mechanism can help the system to achieve the ideal stabilization strategy.","PeriodicalId":18303,"journal":{"name":"Mathematics","volume":"16 1","pages":""},"PeriodicalIF":2.4,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142249417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The electromagnetic spectrum is a limited resource. With the widespread application of the electromagnetic spectrum in various fields, the contradiction between the demand for the electromagnetic spectrum and electromagnetic spectrum resources has become increasingly prominent. Spectrum sharing is an effective way to improve the utilization of the electromagnetic spectrum. However, there are many challenges in existing distributed electromagnetic spectrum trading based on blockchain technology. Since a blockchain does not provide privacy protection, the risk of privacy leakage during the trading process makes electromagnetic spectrum owners unwilling to share. In addition, a blockchain only guarantees integrity, and the imperfect trading dispute resolution mechanism causes electromagnetic spectrum owners to be afraid to share. Therefore, we propose a privacy-preserving electromagnetic-spectrum-sharing trading scheme based on blockchain and ABE. The scheme not only designs an ABE fine-grained access control model in ciphertext form but also constructs a re-encryption algorithm that supports trading arbitration to achieve privacy protection for electromagnetic spectrum trading. Finally, we experimentally evaluated the efficiency of the proposed electromagnetic spectrum trading scheme. The experimental results show that the electromagnetic spectrum trading scheme we propose was highly efficient.
{"title":"A Privacy-Preserving Electromagnetic-Spectrum-Sharing Trading Scheme Based on ABE and Blockchain","authors":"Xing Pu, Ruixian Wang, Xin Lu","doi":"10.3390/math12182908","DOIUrl":"https://doi.org/10.3390/math12182908","url":null,"abstract":"The electromagnetic spectrum is a limited resource. With the widespread application of the electromagnetic spectrum in various fields, the contradiction between the demand for the electromagnetic spectrum and electromagnetic spectrum resources has become increasingly prominent. Spectrum sharing is an effective way to improve the utilization of the electromagnetic spectrum. However, there are many challenges in existing distributed electromagnetic spectrum trading based on blockchain technology. Since a blockchain does not provide privacy protection, the risk of privacy leakage during the trading process makes electromagnetic spectrum owners unwilling to share. In addition, a blockchain only guarantees integrity, and the imperfect trading dispute resolution mechanism causes electromagnetic spectrum owners to be afraid to share. Therefore, we propose a privacy-preserving electromagnetic-spectrum-sharing trading scheme based on blockchain and ABE. The scheme not only designs an ABE fine-grained access control model in ciphertext form but also constructs a re-encryption algorithm that supports trading arbitration to achieve privacy protection for electromagnetic spectrum trading. Finally, we experimentally evaluated the efficiency of the proposed electromagnetic spectrum trading scheme. The experimental results show that the electromagnetic spectrum trading scheme we propose was highly efficient.","PeriodicalId":18303,"journal":{"name":"Mathematics","volume":"15 1","pages":""},"PeriodicalIF":2.4,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142249099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Digital footprints provide crucial insights into individuals’ behaviors and preferences. Their role in credit scoring is becoming increasingly significant. Therefore, it is crucial to combine digital footprint data with traditional data for personal credit scoring. This paper proposes a novel credit-scoring model. First, lasso-logistic regression is used to select key variables that significantly impact the prediction results. Then, digital footprint variables are categorized based on business understanding, and candidate models are constructed from various combinations of these groups. Finally, the optimal weight is selected by minimizing the Kullback–Leibler loss. Subsequently, the final prediction model is constructed. Empirical analysis validates the advantages and feasibility of the proposed method in variable selection, coefficient estimation, and predictive accuracy. Furthermore, the model-averaging method provides the weights for each candidate model, providing managerial implications to identify beneficial variable combinations for credit scoring.
{"title":"Incorporating Digital Footprints into Credit-Scoring Models through Model Averaging","authors":"Linhui Wang, Jianping Zhu, Chenlu Zheng, Zhiyuan Zhang","doi":"10.3390/math12182907","DOIUrl":"https://doi.org/10.3390/math12182907","url":null,"abstract":"Digital footprints provide crucial insights into individuals’ behaviors and preferences. Their role in credit scoring is becoming increasingly significant. Therefore, it is crucial to combine digital footprint data with traditional data for personal credit scoring. This paper proposes a novel credit-scoring model. First, lasso-logistic regression is used to select key variables that significantly impact the prediction results. Then, digital footprint variables are categorized based on business understanding, and candidate models are constructed from various combinations of these groups. Finally, the optimal weight is selected by minimizing the Kullback–Leibler loss. Subsequently, the final prediction model is constructed. Empirical analysis validates the advantages and feasibility of the proposed method in variable selection, coefficient estimation, and predictive accuracy. Furthermore, the model-averaging method provides the weights for each candidate model, providing managerial implications to identify beneficial variable combinations for credit scoring.","PeriodicalId":18303,"journal":{"name":"Mathematics","volume":"1 1","pages":""},"PeriodicalIF":2.4,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142249421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}