32 research outputs found

    TaxThemis: Interactive mining and exploration of suspicious tax evasion group

    Get PDF
    Tax evasion is a serious economic problem for many countries, as it can undermine the government' s tax system and lead to an unfair business competition environment. Recent research has applied data analytics techniques to analyze and detect tax evasion behaviors of individual taxpayers. However, they failed to support the analysis and exploration of the uprising related party transaction tax evasion (RPTTE) behaviors (e.g., transfer pricing), where a group of taxpayers is involved. In this paper, we present TaxThemis, an interactive visual analytics system to help tax officers mine and explore suspicious tax evasion groups through analyzing heterogeneous tax-related data. A taxpayer network is constructed and fused with the trade network to detect suspicious RPTTE groups. Rich visualizations are designed to facilitate the exploration and investigation of suspicious transactions between related taxpayers with profit and topological data analysis. Specifically, we propose a calendar heatmap with a carefully-designed encoding scheme to intuitively show the evidence of transferring revenue through related party transactions. We demonstrate the usefulness and effectiveness of TaxThemis through two case studies on real-world tax-related data, and interviews with domain experts.Comment: 11 pages, 7 figure

    Mental health status and associated contributing factors among the Hakka elderly in Fujian, China

    Get PDF
    PurposeLittle is known about the mental health of the Hakka elderly. This study explores the status of, and factors associated with mental health among Hakka elderly populations from Fujian, China.MethodsThis is a cross-sectional, community-based survey study containing a total of 1,262 valid samples. The Chinese version Symptom Checklist-90-R (SCL-90-R) was used to assess the mental health status of the Hakka elderly. We used t-tests to compare the differences for 10 dimensions of SCL-90-R scores between the Chinese national norm and the Hakka elderly. Univariate and multivariate analysis were performed by using linear regression analysis to identify the main socio-demographic factors that were most predictive of the total score of SCL-90-R in the Hakka elderly.ResultsThe scores of somatization (1.78 ± 0.55 vs. 1.40 ± 0.46, P < 0.001) and phobic anxiety (1.21 ± 0.36 vs. 1.17 ± 0.31, P < 0.001) for the Hakka elderly in Fujian appeared to be significantly higher than the Chinese norm. The higher total scores of SCL-90-R were found among females (β = 0.030, P = 0.044), widowed persons (β = 0.053, P = 0.021), those with parent(s) alive (β = 0.047, P = 0.019), and those with poorer self-rated health status (β = 0.110, P < 0.001). The lower total scores of SCL-90-R were found among those who were currently living in town, those with lower education level, those with higher average annual household incomes, and those who were living with spouse or children.ConclusionThe worse mental health conditions of the Hakka elderly in somatization and phobic anxiety were detected. The overall mental health status was shown to be worse among females, widowed persons, those who were living in village, those with lower education, and those with father or/and mother alive

    Engineering oxygen vacancies in hierarchically Li-rich layered oxide porous microspheres for high-rate lithium ion battery cathode

    Get PDF
    Abstract(#br)Lithium-rich layered oxides always suffer from low initial Coulombic efficiency, poor rate capability and rapid voltage fading. Herein, engineering oxygen vacancies in hierarchically Li 1.2 Mn 0.54 Ni 0.13 Co 0.13 O 2 porous microspheres (L@S) is carried out to suppress the formation of irreversible Li 2 O during the initial discharge process and improve the Li + diffusion kinetics and structural stability of the cathode mateiral. As a result, the prepared L@S cathode delivers high initial Coulombic efficiency of 92.3% and large specific capacity of 292.6 mA h g −1 at 0.1 C. More importantly, a large reversible capacity of 222 mA h g −1 with a capacity retention of 95.7% can be obtained after 100 cycles at 10 C. Even cycled at ultrahigh rate of 20 C, the L@S cathode can..

    A Multiple Salient Features-Based User Identification across Social Media

    No full text
    Identifying users across social media has practical applications in many research areas, such as user behavior prediction, commercial recommendation systems, and information retrieval. In this paper, we propose a multiple salient features-based user identification across social media (MSF-UI), which extracts and fuses the rich redundant features contained in user display name, network topology, and published content. According to the differences between users’ different features, a multi-module calculation method is used to obtain the similarity between various redundant features. Finally, the bidirectional stable marriage matching algorithm is used for user identification across social media. Experimental results show that: (1) Compared with single-attribute features, the multi-dimensional information generated by users is integrated to optimize the universality of user identification; (2) Compared with baseline methods such as ranking-based cross-matching (RCM) and random forest confirmation algorithm based on stable marriage matching (RFCA-SMM), this method can effectively improve precision rate, recall rate, and comprehensive evaluation index (F1)

    A Multiple Salient Features-Based User Identification across Social Media

    No full text
    Identifying users across social media has practical applications in many research areas, such as user behavior prediction, commercial recommendation systems, and information retrieval. In this paper, we propose a multiple salient features-based user identification across social media (MSF-UI), which extracts and fuses the rich redundant features contained in user display name, network topology, and published content. According to the differences between users’ different features, a multi-module calculation method is used to obtain the similarity between various redundant features. Finally, the bidirectional stable marriage matching algorithm is used for user identification across social media. Experimental results show that: (1) Compared with single-attribute features, the multi-dimensional information generated by users is integrated to optimize the universality of user identification; (2) Compared with baseline methods such as ranking-based cross-matching (RCM) and random forest confirmation algorithm based on stable marriage matching (RFCA-SMM), this method can effectively improve precision rate, recall rate, and comprehensive evaluation index (F1)

    A Survey of Routing Protocols in WBAN for Healthcare Applications

    No full text
    The emergence of wireless body area network (WBAN) technology has brought hope and dawn to solve the problems of population aging, various chronic diseases, and medical facility shortage. The increasing demand for real-time applications in such networks, stimulates many research activities. Designing such a scheme of critical events while preserving the energy efficiency is a challenging task, due to the dynamic of the network topology, severe constraints on the power supply, and the limited computation power. The design of routing protocols becomes an essential part of WBANs and plays an important role in the communication stacks and has a significant impact on the network performance. In this paper, we briefly introduce WBAN and focus on the analysis of the routing protocol, classify, and compare the advantages and disadvantages of various routing protocols. Lastly, we put forward some problems and suggestions, which provides ideas for the follow-up routing design

    Exploiting User Friendship Networks for User Identification across Social Networks

    No full text
    Identifying offline entities corresponding to multiple virtual accounts of users across social networks is crucial for the development of related fields, such as user recommendation system, network security, and user behavior pattern analysis. The data generated by users on multiple social networks has similarities. Thus, the concept of symmetry can be used to analyze user-generated information for user identification. In this paper, we propose a friendship networks-based user identification across social networks algorithm (FNUI), which performs the similarity of multi-hop neighbor nodes of a user to characterize the information redundancy in the friend networks fully. Subsequently, a gradient descent algorithm is used to optimize the contribution of the user’s multi-hop nodes in the user identification process. Ultimately, user identification is achieved in conjunction with the Gale–Shapley matching algorithm. Experimental results show that compared with baselines, such as friend relationship-based user identification (FRUI) and friendship learning-based user identification (FBI): (1) The contribution of single-hop neighbor nodes in the user identification process is higher than other multi-hop neighbor nodes; (2) The redundancy of information contained in multi-hop neighbor nodes has a more significant impact on user identification; (3) The precision rate, recall rate, comprehensive evaluation index (F1), and area under curve (AUC) of user identification have been improved

    Exploiting User Friendship Networks for User Identification across Social Networks

    No full text
    Identifying offline entities corresponding to multiple virtual accounts of users across social networks is crucial for the development of related fields, such as user recommendation system, network security, and user behavior pattern analysis. The data generated by users on multiple social networks has similarities. Thus, the concept of symmetry can be used to analyze user-generated information for user identification. In this paper, we propose a friendship networks-based user identification across social networks algorithm (FNUI), which performs the similarity of multi-hop neighbor nodes of a user to characterize the information redundancy in the friend networks fully. Subsequently, a gradient descent algorithm is used to optimize the contribution of the user’s multi-hop nodes in the user identification process. Ultimately, user identification is achieved in conjunction with the Gale–Shapley matching algorithm. Experimental results show that compared with baselines, such as friend relationship-based user identification (FRUI) and friendship learning-based user identification (FBI): (1) The contribution of single-hop neighbor nodes in the user identification process is higher than other multi-hop neighbor nodes; (2) The redundancy of information contained in multi-hop neighbor nodes has a more significant impact on user identification; (3) The precision rate, recall rate, comprehensive evaluation index (F1), and area under curve (AUC) of user identification have been improved
    corecore