Severity: Warning
Message: file_get_contents(https://...@gmail.com&api_key=61f08fa0b96a73de8c900d749fcb997acc09&a=1): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests
Filename: helpers/my_audit_helper.php
Line Number: 197
Backtrace:
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 197
Function: file_get_contents
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 271
Function: simplexml_load_file_from_url
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3145
Function: getPubMedXML
File: /var/www/html/application/controllers/Detail.php
Line: 575
Function: pubMedSearch_Global
File: /var/www/html/application/controllers/Detail.php
Line: 489
Function: pubMedGetRelatedKeyword
File: /var/www/html/index.php
Line: 316
Function: require_once
Objective: An information security evaluation model based on the K-Means Clustering (KMC) + Decision Tree (DT) algorithm is constructed, aiming to assess its value in evaluating smart city (SC) security. Additionally, the impact of SCs on individuals' mythical experiences is investigated.
Methods: An information security analysis model based on the combination of KMC and DT algorithms is established. A total of 38 SCs are selected as the research objects for practical analysis. The practical feasibility of the model is assessed using the receiver operating characteristic (ROC) curve, and its performance is compared with that of the Naive Bayes (NB), Logistic Regression (LR), Random Forest (RF), Support Vector Machine (SVM), and Gradient Boosting Machine (GBM) classification methods. Lastly, a questionnaire survey is conducted to obtain and analyze individuals' mythical experiences in SCs.
Results: (1) The area under the ROC curve is significantly higher than 0.9 (0.921 vs. 0.9). (2) Compared to the NB and LR algorithms, the security analysis model based on the combination of KMC and DT algorithms demonstrated higher true positive rate (TPR), accuracy, recall, F-Score, AUC-ROC, and AUC-PR. Additionally, the performance metrics of RF, SVM, and GBM are similar to those of the KMC+DT model. (3) When the attributes are the same, the difference in smart risk levels is small, while when the attributes are different, the difference in risk levels is significant. (4) The support rates for various types of new folk activities are as follows: offline shopping festivals (17.6%), New Year's Eve celebrations (16.7%), Tibet tourism (15.6%), spiritual practices (16.2%), green leisure (16.0%), and suburban/rural tourism (15.8%). (5) High-risk cities (Grade A) showed stronger support for modern activities such as offline shopping festivals and green leisure, while low-risk cities (Grades C and D) tended to favor traditional cultural activities.
Conclusion: The algorithm model constructed in this work is capable of effectively evaluating the information security risks of SCs and has practical value. A good city image and mythological experience are driving the development of cities.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11892831 | PMC |
http://journals.plos.org/plosone/article?id=10.1371/journal.pone.0319620 | PLOS |
Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!