Internet of Things (IoT) devices are increasingly being fotmd in civilian and military contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of-Vehicles, Internet-of-Military-Th...Internet of Things (IoT) devices are increasingly being fotmd in civilian and military contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of-Vehicles, Internet-of-Military-Things, Internet-of- Battlefield-Things, etc. In this paper, we survey articles presenting IoT security solutions published in English since January 2016. We make a nmnber of observations, including the lack of publicly available loT datasets that can be used by the research and practitioner communities. Given the potentially sensitive nature of IoT datasets, there is a need to develop a standard for sharing IoT datasets among the research and practitioner communities and other relevant stakeholders. Thus, we posit the potential for blockehain technology in facilitating secure sharing of IoT datasets (e.g., using blockchain to ensure the integrity of shared datasets) and securing loT systems, before presenting two conceptual blockchain-based approaches. We then conclude this paper with nine potential research questions.展开更多
This paper has examined how the resources of the White Volta River are enhancing food availability for riparian communities in northern Ghana despite climate change and its associated effects on food security. Using p...This paper has examined how the resources of the White Volta River are enhancing food availability for riparian communities in northern Ghana despite climate change and its associated effects on food security. Using participatory methods such as focus group discussions and interviews, data was collected from households and institutions in three riparian communities. The result of the study indicates that, all things been equal, cultivation of food crops along the river bank in the rainy season gives significantly high yields as compared to yields from farms farthest from the river under rain fed agriculture. Higher organic content and moisture retention capacity of river bank soils explains the yield differential and adaptability to climate change. In addition, farmers now irrigate cereal crops which were hitherto, reserved for only rainy season production. However, inappropriate irrigation practices are accelerating erosion and sedimentation of the river and thus, threaten the sustainability of agriculture and food security in the White Volta Basin. The paper therefore, recommends the adoption of IWRM (integrated water resources management) and the participation of local communities, Government and Civil Society organisations for sustaining the productive capacity of the White Volta Basin for enabling adaptation of agriculture to climate change in the riparian communities of the basin.展开更多
The present article examines the livelihood benefits associated with agrobiodiversity in Veracruz, Mexico. Citrus-based agriculture is the principal economic activity in the agricultural sector of the state of Veracru...The present article examines the livelihood benefits associated with agrobiodiversity in Veracruz, Mexico. Citrus-based agriculture is the principal economic activity in the agricultural sector of the state of Veracruz. It is practiced in mono-crop plantations by the majority of farmers, who are rendered vulnerable to price depreciation resulting from simultaneous harvest and over-supply of a single commodity. Some farmers have associated multiple crops in citrus farms (agroforestry techniques) as a strategy to improve their livelihoods. Farmers who increased agrobiodiversity in their farms have significantly improved their livelihoods compared to mono-crop plantation owners. The research shows that increased agro-biodiversity can be a strategy to improve the livelihoods of citrus producers in the state of Veracruz, with significant economic benefits depending on the crop combination: maize-citrus is the least economically profitable combination (providing 21% in terms of internal rate of return), while pineapple-citrus, banana-citrus and vanilla-citrus give higher returns (41%, 44% and 221% respectively). The citrus-vanilla crop combination also has the highest benefit-cost ratio, relative to citrus monocrop (1.91) as well as the highest net present value (MX$579,635.73). The choice of crop ultimately depends on the farmer's priorities. The associated benefits can be classified in three ways which correspond to the tripartite goal of sustainable development: (i) ecological sustainability (through increased ecosystem resilience), (ii) economic stability (through diversified, less risk-prone sources of income), and (iii) social well-being (through lower).展开更多
The issues of food security are an important aspect of every country for its social and economic growth and the eradication of poverty. It is particularly crucial for satisfying the needs of the ever-growing populatio...The issues of food security are an important aspect of every country for its social and economic growth and the eradication of poverty. It is particularly crucial for satisfying the needs of the ever-growing population in developing countries. Agriculture is the backbone of the people and the economy for developing countries, particularly in highly populated countries such as India, China and South East Asia. The world population is anticipated to rise to 8.3 billion by 2030 and to 9.2 billion by 2050. By that time, to feed the growing population, food production must double to keep pace with the escalating food demand. Agricultural commodities showed increases of 58.9% in import dependency ratio (IDR) as compared to 32.2% in 2013. Thus, this study attempts to review and explore the challenges of food security as well as the opportunities of the seed industry in Malaysia.展开更多
National security implications (The White House, 2015; CNA, 2014) of global climate change currently radiate throughout the U.S. government. These implications are critically acute for three federal departments most...National security implications (The White House, 2015; CNA, 2014) of global climate change currently radiate throughout the U.S. government. These implications are critically acute for three federal departments most responsible for U.S. national security: the Department of Defense (DoD), the Department of State (DOS), and the Department of Homeland Security (DHS). However, the effect on these federal departments is understudied and poorly specified. This research intends to rectify the dearth of academic studies. Comparative analysis (Collier, 1993) of the institutional cultures and leadership of the DoD, DoS, and DHS was conducted determining how these agencies are responding to multiple vulnerabilities created by climate change (The White House, 2013a). Research revealed significant differences in how the DoD, DoS, and DHS are responding. The analysis discovered the DoD has institutionalized, or "mainstreamed" (Leggett, 2015, p. 16) planning for climate change and planning is driven mainly through hierarchical cultural organizations. The DoD bureaucratic leadership is multi-faceted with some transactional, transformational, and charismatic leadership elements. The DoS has also mainstreamed adaptation planning to a lesser extent and planning is driven primarily by an ad-hoc culture with a top-down/bottom-up, charismatic/transformational leadership emphasis. In contrast, the DHS has been unable to mainstream planning into their organizational culture due to the presence of several internal clans. The DHS bureaucratic leadership is somewhat chaotic with little top-down, transformational, or entrepreneurial direction. Overall, the knowledge gained from this comparative analysis provides valuable insights into how governmental institutions adapt to a multi-faceted national security threat.展开更多
Not only necessary for survival, food plays an important social, economic, and cultural role in our lives. Globally in the 21 st century, food security faces many challenges including climate change and changing attit...Not only necessary for survival, food plays an important social, economic, and cultural role in our lives. Globally in the 21 st century, food security faces many challenges including climate change and changing attitudes surrounding food and agriculture. In Canada over the past 150 years, the role of food in society has changed. In the early 20th century, a third of Canada's population lived on and derived their livelihoods from agriculture (Statistics Canada, 2009). Agriculture played a central role in the daily lives of Canadians. Urbanization and mechanization has allowed for more food to be produced in Canada with fewer people, to the extent that today only two percent of the population now lives on a farm. Only seven percent of Canadian land is suitable for agriculture production, yet Canada remains one of the few countries expected to continue to produce more food than it consumes in the next 50 years. The disassociation between the average Canadian and the source of their food creates unique challenges for food security that must be addressed moving forward as Canada celebrates its 150th birthday.展开更多
Water plays an important role in food production especially rice. Rice productivity depends greatly on sufficient water to meet evaporative demand and soil moisture. It is certain thalL rice, the most important crop o...Water plays an important role in food production especially rice. Rice productivity depends greatly on sufficient water to meet evaporative demand and soil moisture. It is certain thalL rice, the most important crop of Thailand and Vietnam, is vulnerable to climate change. This paper proposes an analysis on the impact of climate on rice water requirement and food security in Thailand and Vietnam. Water demand, yield and production of rice were computed under the changed surface air temperature for three time slices, namely 2020s, 2050s and 2080s. Food security was analyzed from rice supply (calculated milled-rice product, rice stock, and imports) and demand (domestic uses from population growth, exports to world market, domestic seed and other uses). The result showed that, under the higher surface air temperature scenario, water requirement office in Thailand and Vietnam could increase by 1.8 times in the end of the 21 st century. Production of rice dropped by declined yield. Thailand and Vietnam which is the world largest rice exporter in last decades will face the rice shortage in 2080s and 2030s respectively.展开更多
The purpose of this study is to elicit how investments in agricultural development and food security would safeguard the Virgin Islands (BVI) and the Caribbean, by extension, from future global crisis. History shows...The purpose of this study is to elicit how investments in agricultural development and food security would safeguard the Virgin Islands (BVI) and the Caribbean, by extension, from future global crisis. History shows that agriculture played a significant role in the rise of civilization globally and was the main contributor to the Caribbean economy before the 1950's. Overall, it was determined that the BVI population, in general, is desirous of more investment opportunities within the agricultural sector, to assist with the alleviation of poverty at the national level, to advance economic development and trade across the region and to make sustainable development more attainable for the Caribbean, as a whole. To do this, agricultural development and food security must become the focal point of the BVI and other Caribbean economies. Accordingly, the paper recommends that investment within the agricultural sector be undertaken more aggressively across the region. The mixed research approach method was used to validate these claims.展开更多
China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the ...China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the environment remains inadequately evaluated.Moreover,although green and low-carbon technologies offer environmental advantages,their widespread adoption is hindered by prohibitively high costs.This study analyzes the impact of removing fertilizer manufacturing subsidies and explores the potential feasibility of redirecting fertilizer manufacturing subsidies to invest in the diffusion of these technologies.Utilizing the China Agricultural University Agri-food Systems model,we analyzed the potential for achieving mutually beneficial outcomes regarding food security and environmental sustainability.The findings indicate that removing fertilizer manufacturing subsidies has reduced greenhouse gas(GHG)emissions from agricultural activities by 3.88 million metric tons,with minimal impact on food production.Redirecting fertilizer manufacturing subsidies to invest in green and low-carbon technologies,including slow and controlled-release fertilizer,organic-inorganic compound fertilizers,and machine deep placement of fertilizer,emerges as a strategy to concurrently curtail GHG emissions,ensure food security,and secure robust economic returns.Finally,we propose a comprehensive set of government interventions,including subsidies,field guidance,and improved extension systems,to promote the widespread adoption of these technologies.展开更多
Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this r...Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this regard. The findings have shown that many challenges are linked to edge computing, such as privacy concerns, security breaches, high costs, low efficiency, etc. Therefore, there is a need to implement proper security measures to overcome these issues. Using emerging trends, like machine learning, encryption, artificial intelligence, real-time monitoring, etc., can help mitigate security issues. They can also develop a secure and safe future in cloud computing. It was concluded that the security implications of edge computing can easily be covered with the help of new technologies and techniques.展开更多
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Rece...The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Recently,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs.By disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network automation.However,this openness introduces new security challenges compared to traditional RANs.Many existing studies overlook these security requirements of the O-RAN networks.To gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G applications.We then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities effectively.By providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security.展开更多
Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing s...Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant challenges.In response,various protection approaches have been developed to secure,authenticate,and ensure the integrity of digital videos.This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality,integrity,and availability of video content,and examining how it can be manipulated.It then investigates current developments in the field of video security by exploring two critical research questions.First,it examine the techniques used by adversaries to compromise video data and evaluate their impact.Understanding these attack methodologies is crucial for developing effective defense mechanisms.Second,it explores the various security approaches that can be employed to protect video data,enhancing its transparency,integrity,and trustworthiness.It compares the effectiveness of these approaches across different use cases,including surveillance,video on demand(VoD),and medical videos related to disease diagnostics.Finally,it identifies potential research opportunities to enhance video data protection in response to the evolving threat landscape.Through this investigation,this study aims to contribute to the ongoing efforts in securing video data,providing insights that are vital for researchers,practitioners,and policymakers dedicated to enhancing the safety and reliability of video content in our digital world.展开更多
The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual user...The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare.展开更多
The practice of intercropping leguminous and gramineous crops is used for promoting sustainable agriculture,optimizing resource utilization,enhancing biodiversity,and reducing reliance on petroleum products.However,pr...The practice of intercropping leguminous and gramineous crops is used for promoting sustainable agriculture,optimizing resource utilization,enhancing biodiversity,and reducing reliance on petroleum products.However,promoting conventional intercropping strategies in modern agriculture can prove challenging.The innovative technology of soybean maize strip intercropping(SMSI)has been proposed as a solution.This system has produced remarkable results in improving domestic soybean and maize production for both food security and sustainable agriculture.In this article,we provide an overview of SMSI and explain how it differs from traditional intercropping.We also discuss the core principles that foster higher yields and the prospects for its future development.展开更多
Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the...Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT.展开更多
Food security has been long understudied in the context of Central Asia.We present an analysis examining household-level food demand for Tajikistan and assessing the magnitude of its food security changes during the C...Food security has been long understudied in the context of Central Asia.We present an analysis examining household-level food demand for Tajikistan and assessing the magnitude of its food security changes during the COVID-19 pandemic.Based on an extensive household survey data set from Tajikistan,we estimate the expenditure,income,and price elasticities for nine food categories using the QUAIDS model.Then,we develop a microsimulation model using the estimated elasticities to assess the dual impact of declining remittance income and rising food prices stemming from the pandemic shock.There are significant differences in demand elasticities across food groups,with high elasticities observed for nutritious foods,such as meat,fruit,eggs,and milk,in rural households.Moreover,our findings show that changes in remittance income and food prices significantly negatively affected food security for rural households during the COVID-19 pandemic.These findings have important implications for policymakers concerned about rural livelihoods and food security in remittance-receiving economies during the post-pandemic period.展开更多
Smart agriculture modifies traditional farming practices,and offers innovative approaches to boost production and sustainability by leveraging contemporary technologies.In today’s world where technology is everything...Smart agriculture modifies traditional farming practices,and offers innovative approaches to boost production and sustainability by leveraging contemporary technologies.In today’s world where technology is everything,these technologies are utilized to streamline regular tasks and procedures in agriculture,one of the largest and most significant industries in every nation.This research paper stands out from existing literature on smart agriculture security by providing a comprehensive analysis and examination of security issues within smart agriculture systems.Divided into three main sections-security analysis,system architecture and design and risk assessment of Cyber-Physical Systems(CPS)applications-the study delves into various elements crucial for smart farming,such as data sources,infrastructure components,communication protocols,and the roles of different stakeholders such as farmers,agricultural scientists and researchers,technology providers,government agencies,consumers and many others.In contrast to earlier research,this work analyzes the resilience of smart agriculture systems using approaches such as threat modeling,penetration testing,and vulnerability assessments.Important discoveries highlight the concerns connected to unsecured communication protocols,possible threats from malevolent actors,and vulnerabilities in IoT devices.Furthermore,the study suggests enhancements for CPS applications,such as strong access controls,intrusion detection systems,and encryption protocols.In addition,risk assessment techniques are applied to prioritize mitigation tactics and detect potential hazards,addressing issues like data breaches,system outages,and automated farming process sabotage.The research sets itself apart even more by presenting a prototype CPS application that makes use of a digital temperature sensor.This application was first created using a Tinkercad simulator and then using actual hardware with Arduino boards.The CPS application’s defenses against potential threats and vulnerabilities are strengthened by this integrated approach,which distinguishes this research for its depth and usefulness in the field of smart agriculture security.展开更多
The safety and longevity of key blast furnace(BF)equipment determine the stable and low-carbon production of iron.This pa-per presents an analysis of the heat transfer characteristics of these components and the uneve...The safety and longevity of key blast furnace(BF)equipment determine the stable and low-carbon production of iron.This pa-per presents an analysis of the heat transfer characteristics of these components and the uneven distribution of cooling water in parallel pipes based on hydrodynamic principles,discusses the feasible methods for the improvement of BF cooling intensity,and reviews the pre-paration process,performance,and damage characteristics of three key equipment pieces:coolers,tuyeres,and hearth refractories.Fur-thermoere,to attain better control of these critical components under high-temperature working conditions,we propose the application of optimized technologies,such as BF operation and maintenance technology,self-repair technology,and full-lifecycle management techno-logy.Finally,we propose further researches on safety assessments and predictions for key BF equipment under new operating conditions.展开更多
Nowadays,theuse of Avatars that are unique digital depictions has increased by users to access Metaverse—a virtual reality environment—through multiple devices and for various purposes.Therefore,the Avatar and Metav...Nowadays,theuse of Avatars that are unique digital depictions has increased by users to access Metaverse—a virtual reality environment—through multiple devices and for various purposes.Therefore,the Avatar and Metaverse are being developed with a new theory,application,and design,necessitating the association of more personal data and devices of targeted users every day.This Avatar and Metaverse technology explosion raises privacy and security concerns,leading to cyber attacks.MV-Honeypot,or Metaverse-Honeypot,as a commercial off-the-shelf solution that can counter these cyber attack-causing vulnerabilities,should be developed.To fill this gap,we study user’s engagements with Avatars in Metaverse,analyze possible security vulnerabilities,and create a model named Simplified Avatar Relationship Association with Non-linear Gradient(SARANG)that draws the full diagram of infrastructure components and data flow through accessing Metaverse in this paper.We also determine the most significant threat for each component’s cyberattacks that will affect user data and Avatars.As a result,the commercial off-the-shelf(COTS)of the MV-Honeypot must be established.展开更多
Decentralized finance(DeFi)is a general term for a series of financial products and services.It is based on blockchain technology and has attracted people’s attention because of its open,transparent,and intermediary ...Decentralized finance(DeFi)is a general term for a series of financial products and services.It is based on blockchain technology and has attracted people’s attention because of its open,transparent,and intermediary free.Among them,the DeFi ecosystem based on Ethereum-based blockchains attracts the most attention.However,the current decentralized financial system built on the Ethereum architecture has been exposed to many smart contract vulnerabilities during the last few years.Herein,we believe it is time to improve the understanding of the prevailing Ethereum-based DeFi ecosystem security issues.To that end,we investigate the Ethereum-based DeFi security issues:1)inherited from the real-world financial system,which can be solved by macro-control;2)induced by the problems of blockchain architecture,which require a better blockchain platform;3)caused by DeFi invented applications,which should be focused on during the project development.Based on that,we further discuss the current solutions and potential directions ofDeFi security.According to our research,we could provide a comprehensive vision to the research community for the improvement of Ethereum-basedDeFi ecosystem security.展开更多
文摘Internet of Things (IoT) devices are increasingly being fotmd in civilian and military contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of-Vehicles, Internet-of-Military-Things, Internet-of- Battlefield-Things, etc. In this paper, we survey articles presenting IoT security solutions published in English since January 2016. We make a nmnber of observations, including the lack of publicly available loT datasets that can be used by the research and practitioner communities. Given the potentially sensitive nature of IoT datasets, there is a need to develop a standard for sharing IoT datasets among the research and practitioner communities and other relevant stakeholders. Thus, we posit the potential for blockehain technology in facilitating secure sharing of IoT datasets (e.g., using blockchain to ensure the integrity of shared datasets) and securing loT systems, before presenting two conceptual blockchain-based approaches. We then conclude this paper with nine potential research questions.
文摘This paper has examined how the resources of the White Volta River are enhancing food availability for riparian communities in northern Ghana despite climate change and its associated effects on food security. Using participatory methods such as focus group discussions and interviews, data was collected from households and institutions in three riparian communities. The result of the study indicates that, all things been equal, cultivation of food crops along the river bank in the rainy season gives significantly high yields as compared to yields from farms farthest from the river under rain fed agriculture. Higher organic content and moisture retention capacity of river bank soils explains the yield differential and adaptability to climate change. In addition, farmers now irrigate cereal crops which were hitherto, reserved for only rainy season production. However, inappropriate irrigation practices are accelerating erosion and sedimentation of the river and thus, threaten the sustainability of agriculture and food security in the White Volta Basin. The paper therefore, recommends the adoption of IWRM (integrated water resources management) and the participation of local communities, Government and Civil Society organisations for sustaining the productive capacity of the White Volta Basin for enabling adaptation of agriculture to climate change in the riparian communities of the basin.
文摘The present article examines the livelihood benefits associated with agrobiodiversity in Veracruz, Mexico. Citrus-based agriculture is the principal economic activity in the agricultural sector of the state of Veracruz. It is practiced in mono-crop plantations by the majority of farmers, who are rendered vulnerable to price depreciation resulting from simultaneous harvest and over-supply of a single commodity. Some farmers have associated multiple crops in citrus farms (agroforestry techniques) as a strategy to improve their livelihoods. Farmers who increased agrobiodiversity in their farms have significantly improved their livelihoods compared to mono-crop plantation owners. The research shows that increased agro-biodiversity can be a strategy to improve the livelihoods of citrus producers in the state of Veracruz, with significant economic benefits depending on the crop combination: maize-citrus is the least economically profitable combination (providing 21% in terms of internal rate of return), while pineapple-citrus, banana-citrus and vanilla-citrus give higher returns (41%, 44% and 221% respectively). The citrus-vanilla crop combination also has the highest benefit-cost ratio, relative to citrus monocrop (1.91) as well as the highest net present value (MX$579,635.73). The choice of crop ultimately depends on the farmer's priorities. The associated benefits can be classified in three ways which correspond to the tripartite goal of sustainable development: (i) ecological sustainability (through increased ecosystem resilience), (ii) economic stability (through diversified, less risk-prone sources of income), and (iii) social well-being (through lower).
文摘The issues of food security are an important aspect of every country for its social and economic growth and the eradication of poverty. It is particularly crucial for satisfying the needs of the ever-growing population in developing countries. Agriculture is the backbone of the people and the economy for developing countries, particularly in highly populated countries such as India, China and South East Asia. The world population is anticipated to rise to 8.3 billion by 2030 and to 9.2 billion by 2050. By that time, to feed the growing population, food production must double to keep pace with the escalating food demand. Agricultural commodities showed increases of 58.9% in import dependency ratio (IDR) as compared to 32.2% in 2013. Thus, this study attempts to review and explore the challenges of food security as well as the opportunities of the seed industry in Malaysia.
文摘National security implications (The White House, 2015; CNA, 2014) of global climate change currently radiate throughout the U.S. government. These implications are critically acute for three federal departments most responsible for U.S. national security: the Department of Defense (DoD), the Department of State (DOS), and the Department of Homeland Security (DHS). However, the effect on these federal departments is understudied and poorly specified. This research intends to rectify the dearth of academic studies. Comparative analysis (Collier, 1993) of the institutional cultures and leadership of the DoD, DoS, and DHS was conducted determining how these agencies are responding to multiple vulnerabilities created by climate change (The White House, 2013a). Research revealed significant differences in how the DoD, DoS, and DHS are responding. The analysis discovered the DoD has institutionalized, or "mainstreamed" (Leggett, 2015, p. 16) planning for climate change and planning is driven mainly through hierarchical cultural organizations. The DoD bureaucratic leadership is multi-faceted with some transactional, transformational, and charismatic leadership elements. The DoS has also mainstreamed adaptation planning to a lesser extent and planning is driven primarily by an ad-hoc culture with a top-down/bottom-up, charismatic/transformational leadership emphasis. In contrast, the DHS has been unable to mainstream planning into their organizational culture due to the presence of several internal clans. The DHS bureaucratic leadership is somewhat chaotic with little top-down, transformational, or entrepreneurial direction. Overall, the knowledge gained from this comparative analysis provides valuable insights into how governmental institutions adapt to a multi-faceted national security threat.
文摘Not only necessary for survival, food plays an important social, economic, and cultural role in our lives. Globally in the 21 st century, food security faces many challenges including climate change and changing attitudes surrounding food and agriculture. In Canada over the past 150 years, the role of food in society has changed. In the early 20th century, a third of Canada's population lived on and derived their livelihoods from agriculture (Statistics Canada, 2009). Agriculture played a central role in the daily lives of Canadians. Urbanization and mechanization has allowed for more food to be produced in Canada with fewer people, to the extent that today only two percent of the population now lives on a farm. Only seven percent of Canadian land is suitable for agriculture production, yet Canada remains one of the few countries expected to continue to produce more food than it consumes in the next 50 years. The disassociation between the average Canadian and the source of their food creates unique challenges for food security that must be addressed moving forward as Canada celebrates its 150th birthday.
文摘Water plays an important role in food production especially rice. Rice productivity depends greatly on sufficient water to meet evaporative demand and soil moisture. It is certain thalL rice, the most important crop of Thailand and Vietnam, is vulnerable to climate change. This paper proposes an analysis on the impact of climate on rice water requirement and food security in Thailand and Vietnam. Water demand, yield and production of rice were computed under the changed surface air temperature for three time slices, namely 2020s, 2050s and 2080s. Food security was analyzed from rice supply (calculated milled-rice product, rice stock, and imports) and demand (domestic uses from population growth, exports to world market, domestic seed and other uses). The result showed that, under the higher surface air temperature scenario, water requirement office in Thailand and Vietnam could increase by 1.8 times in the end of the 21 st century. Production of rice dropped by declined yield. Thailand and Vietnam which is the world largest rice exporter in last decades will face the rice shortage in 2080s and 2030s respectively.
文摘The purpose of this study is to elicit how investments in agricultural development and food security would safeguard the Virgin Islands (BVI) and the Caribbean, by extension, from future global crisis. History shows that agriculture played a significant role in the rise of civilization globally and was the main contributor to the Caribbean economy before the 1950's. Overall, it was determined that the BVI population, in general, is desirous of more investment opportunities within the agricultural sector, to assist with the alleviation of poverty at the national level, to advance economic development and trade across the region and to make sustainable development more attainable for the Caribbean, as a whole. To do this, agricultural development and food security must become the focal point of the BVI and other Caribbean economies. Accordingly, the paper recommends that investment within the agricultural sector be undertaken more aggressively across the region. The mixed research approach method was used to validate these claims.
基金The authors acknowledge the financial support received from the National Natural Science Foundation of China(72061147002).
文摘China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the environment remains inadequately evaluated.Moreover,although green and low-carbon technologies offer environmental advantages,their widespread adoption is hindered by prohibitively high costs.This study analyzes the impact of removing fertilizer manufacturing subsidies and explores the potential feasibility of redirecting fertilizer manufacturing subsidies to invest in the diffusion of these technologies.Utilizing the China Agricultural University Agri-food Systems model,we analyzed the potential for achieving mutually beneficial outcomes regarding food security and environmental sustainability.The findings indicate that removing fertilizer manufacturing subsidies has reduced greenhouse gas(GHG)emissions from agricultural activities by 3.88 million metric tons,with minimal impact on food production.Redirecting fertilizer manufacturing subsidies to invest in green and low-carbon technologies,including slow and controlled-release fertilizer,organic-inorganic compound fertilizers,and machine deep placement of fertilizer,emerges as a strategy to concurrently curtail GHG emissions,ensure food security,and secure robust economic returns.Finally,we propose a comprehensive set of government interventions,including subsidies,field guidance,and improved extension systems,to promote the widespread adoption of these technologies.
文摘Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this regard. The findings have shown that many challenges are linked to edge computing, such as privacy concerns, security breaches, high costs, low efficiency, etc. Therefore, there is a need to implement proper security measures to overcome these issues. Using emerging trends, like machine learning, encryption, artificial intelligence, real-time monitoring, etc., can help mitigate security issues. They can also develop a secure and safe future in cloud computing. It was concluded that the security implications of edge computing can easily be covered with the help of new technologies and techniques.
基金supported by the Research Program funded by the SeoulTech(Seoul National University of Science and Technology).
文摘The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Recently,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs.By disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network automation.However,this openness introduces new security challenges compared to traditional RANs.Many existing studies overlook these security requirements of the O-RAN networks.To gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G applications.We then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities effectively.By providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security.
基金funded by the European Union’s Horizon 2020 Research and Innovation Programme under the Marie Skłodowska-Curie Action(MSCA)grant agreement No.101109961.
文摘Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant challenges.In response,various protection approaches have been developed to secure,authenticate,and ensure the integrity of digital videos.This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality,integrity,and availability of video content,and examining how it can be manipulated.It then investigates current developments in the field of video security by exploring two critical research questions.First,it examine the techniques used by adversaries to compromise video data and evaluate their impact.Understanding these attack methodologies is crucial for developing effective defense mechanisms.Second,it explores the various security approaches that can be employed to protect video data,enhancing its transparency,integrity,and trustworthiness.It compares the effectiveness of these approaches across different use cases,including surveillance,video on demand(VoD),and medical videos related to disease diagnostics.Finally,it identifies potential research opportunities to enhance video data protection in response to the evolving threat landscape.Through this investigation,this study aims to contribute to the ongoing efforts in securing video data,providing insights that are vital for researchers,practitioners,and policymakers dedicated to enhancing the safety and reliability of video content in our digital world.
文摘The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare.
基金supported by the National Natural Science Foundation of China(31971853)。
文摘The practice of intercropping leguminous and gramineous crops is used for promoting sustainable agriculture,optimizing resource utilization,enhancing biodiversity,and reducing reliance on petroleum products.However,promoting conventional intercropping strategies in modern agriculture can prove challenging.The innovative technology of soybean maize strip intercropping(SMSI)has been proposed as a solution.This system has produced remarkable results in improving domestic soybean and maize production for both food security and sustainable agriculture.In this article,we provide an overview of SMSI and explain how it differs from traditional intercropping.We also discuss the core principles that foster higher yields and the prospects for its future development.
基金supported in part by the National Natural Science Foundation of China (62072248, 62072247)the Jiangsu Agriculture Science and Technology Innovation Fund (CX(21)3060)。
文摘Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT.
基金the National Natural Science Foundation of China(71961147001)the Agricultural Science and Technology Innovation Project of the Chinese Academy of Agricultural Sciences(10-IAED-04-2023)。
文摘Food security has been long understudied in the context of Central Asia.We present an analysis examining household-level food demand for Tajikistan and assessing the magnitude of its food security changes during the COVID-19 pandemic.Based on an extensive household survey data set from Tajikistan,we estimate the expenditure,income,and price elasticities for nine food categories using the QUAIDS model.Then,we develop a microsimulation model using the estimated elasticities to assess the dual impact of declining remittance income and rising food prices stemming from the pandemic shock.There are significant differences in demand elasticities across food groups,with high elasticities observed for nutritious foods,such as meat,fruit,eggs,and milk,in rural households.Moreover,our findings show that changes in remittance income and food prices significantly negatively affected food security for rural households during the COVID-19 pandemic.These findings have important implications for policymakers concerned about rural livelihoods and food security in remittance-receiving economies during the post-pandemic period.
文摘Smart agriculture modifies traditional farming practices,and offers innovative approaches to boost production and sustainability by leveraging contemporary technologies.In today’s world where technology is everything,these technologies are utilized to streamline regular tasks and procedures in agriculture,one of the largest and most significant industries in every nation.This research paper stands out from existing literature on smart agriculture security by providing a comprehensive analysis and examination of security issues within smart agriculture systems.Divided into three main sections-security analysis,system architecture and design and risk assessment of Cyber-Physical Systems(CPS)applications-the study delves into various elements crucial for smart farming,such as data sources,infrastructure components,communication protocols,and the roles of different stakeholders such as farmers,agricultural scientists and researchers,technology providers,government agencies,consumers and many others.In contrast to earlier research,this work analyzes the resilience of smart agriculture systems using approaches such as threat modeling,penetration testing,and vulnerability assessments.Important discoveries highlight the concerns connected to unsecured communication protocols,possible threats from malevolent actors,and vulnerabilities in IoT devices.Furthermore,the study suggests enhancements for CPS applications,such as strong access controls,intrusion detection systems,and encryption protocols.In addition,risk assessment techniques are applied to prioritize mitigation tactics and detect potential hazards,addressing issues like data breaches,system outages,and automated farming process sabotage.The research sets itself apart even more by presenting a prototype CPS application that makes use of a digital temperature sensor.This application was first created using a Tinkercad simulator and then using actual hardware with Arduino boards.The CPS application’s defenses against potential threats and vulnerabilities are strengthened by this integrated approach,which distinguishes this research for its depth and usefulness in the field of smart agriculture security.
基金supported by the National Natural Science Foundation of China(No.52174296)the Key Laboratory of Metallurgical Industry Safety&Risk Prevention and Control,Ministry of Emergency Management,China.
文摘The safety and longevity of key blast furnace(BF)equipment determine the stable and low-carbon production of iron.This pa-per presents an analysis of the heat transfer characteristics of these components and the uneven distribution of cooling water in parallel pipes based on hydrodynamic principles,discusses the feasible methods for the improvement of BF cooling intensity,and reviews the pre-paration process,performance,and damage characteristics of three key equipment pieces:coolers,tuyeres,and hearth refractories.Fur-thermoere,to attain better control of these critical components under high-temperature working conditions,we propose the application of optimized technologies,such as BF operation and maintenance technology,self-repair technology,and full-lifecycle management techno-logy.Finally,we propose further researches on safety assessments and predictions for key BF equipment under new operating conditions.
基金supported by the Institute of Information&Communications Technology Planning&Evaluation(IITP)(Project Nos.2022-0-00701,10%,RS-2023-00228996,10%,RS-2022-00165794,10%)the ICTR&DProgram of MSIT/IITP(ProjectNo.2021-0-01816,10%)a National Research Foundation of Korea(NRF)grant funded by the Korean Government(Project No.RS2023-00208460,60%).
文摘Nowadays,theuse of Avatars that are unique digital depictions has increased by users to access Metaverse—a virtual reality environment—through multiple devices and for various purposes.Therefore,the Avatar and Metaverse are being developed with a new theory,application,and design,necessitating the association of more personal data and devices of targeted users every day.This Avatar and Metaverse technology explosion raises privacy and security concerns,leading to cyber attacks.MV-Honeypot,or Metaverse-Honeypot,as a commercial off-the-shelf solution that can counter these cyber attack-causing vulnerabilities,should be developed.To fill this gap,we study user’s engagements with Avatars in Metaverse,analyze possible security vulnerabilities,and create a model named Simplified Avatar Relationship Association with Non-linear Gradient(SARANG)that draws the full diagram of infrastructure components and data flow through accessing Metaverse in this paper.We also determine the most significant threat for each component’s cyberattacks that will affect user data and Avatars.As a result,the commercial off-the-shelf(COTS)of the MV-Honeypot must be established.
基金supported by the Key-Area Research and Development Program of Guangdong Province 2020B0101090003CCF-NSFOCUS Kunpeng Scientific Research Fund (CCFNSFOCUS 2021010)+4 种基金Innovation Fund Program of the Engineering Research Center for Integration and Application of Digital Learning Technology of Ministry of Education under Grant No.1221027National Natural Science Foundation of China (Grant Nos.61902083,62172115,61976064)Guangdong Higher Education Innovation Group 2020KCXTD007 and Guangzhou Higher Education Innovation Group (No.202032854)Guangzhou Fundamental Research Plan of“Municipal-School”Jointly Funded Projects (No.202102010445)Guangdong Province Science and Technology Planning Project (No.2020A1414010370).
文摘Decentralized finance(DeFi)is a general term for a series of financial products and services.It is based on blockchain technology and has attracted people’s attention because of its open,transparent,and intermediary free.Among them,the DeFi ecosystem based on Ethereum-based blockchains attracts the most attention.However,the current decentralized financial system built on the Ethereum architecture has been exposed to many smart contract vulnerabilities during the last few years.Herein,we believe it is time to improve the understanding of the prevailing Ethereum-based DeFi ecosystem security issues.To that end,we investigate the Ethereum-based DeFi security issues:1)inherited from the real-world financial system,which can be solved by macro-control;2)induced by the problems of blockchain architecture,which require a better blockchain platform;3)caused by DeFi invented applications,which should be focused on during the project development.Based on that,we further discuss the current solutions and potential directions ofDeFi security.According to our research,we could provide a comprehensive vision to the research community for the improvement of Ethereum-basedDeFi ecosystem security.