With the rapid development of globalization and information technology,intellectual property has been one of the key drivers of economic growth,and the construction of intellectual property system has become an import...With the rapid development of globalization and information technology,intellectual property has been one of the key drivers of economic growth,and the construction of intellectual property system has become an important criterion for measuring the quality of business environment.This article is intended to explore the current status of intellectual property system construction in China,the challenges,and its relationship with the business environment,to propose the corresponding countermeasures and suggestions.The study finds that the legal system of intellectual property in China is gradually improving,and judicial and administrative protection are continuously strengthened.However,the challenges still remain such as frequent infringements,rights hard to protect and insufficient international cooperation.These issues not only affect the legitimate rights and interests of innovation entities,but also for the market fairness and the level of the business environment.Therefore,this article proposes that strengthening the perfection of the intellectual property legal system,enhancing intellectual property services and support capabilities,strengthening international cooperation and exchanges,and accelerating the cultivation of composite talents.It aims to provide theoretical references for the construction of intellectual property system and the optimization of the business environment,promote the high-quality development of economy and enhance the global competitiveness of the country.展开更多
To effectively perceive network security situation under IOT environment, an Immunity-based IOT Environment Security Situation Awareness (IIESSA) model is proposed. In IIESSA, some formal definitions for self, non-sel...To effectively perceive network security situation under IOT environment, an Immunity-based IOT Environment Security Situation Awareness (IIESSA) model is proposed. In IIESSA, some formal definitions for self, non-self, antigen and detector are given. According to the relationship between the antibody-concentration of memory detectors and the intensity of network attack activities, the security situation evaluation method under IOT environment based on artificial immune system is presented. And then according to the situation time series obtained by the mentioned evaluation method, the security situation prediction method based on grey prediction theory is presented for forecasting the intensity and security situation of network attack activities that the IOT environment will be suffered in next step. The experimental results show that IIESSA provides a novel and effective model for perceiving security situation of IOT environment.展开更多
Nowadays, African cities are subjected to upsets which result from the extraordinary growth of urban populations. The growth of the population of cities has induced some changes in the structure of the activity of tho...Nowadays, African cities are subjected to upsets which result from the extraordinary growth of urban populations. The growth of the population of cities has induced some changes in the structure of the activity of those cities. Agriculture which was formerly confined to the countryside henceforth develops in the urban area and occupies a preponderant place as a strategy of survival, of insertion and of food supplying of the city-dwellers. It has become an activity integrated to the urban tissue through systems of occupying and exploitation of land in the urban area. Population growth (4.81%) between 2002 and 2013 is a critical poverty rate (65%) of the population of Parakou city, entailing a misery perceptible in all its social and economic dimensions. The market-gardening activity has integrated itself to the urban tissue. The objective of this study is to understand how urban agriculture through market-gardening can be a solution for rural farmers who have moved to Parakou city. In this study, documentary research, interviews and field observation are used for data collection. The main results to be signaled among others are: evolution and status of the market-gardening areas in Parakou, the reduction of food insecurity with the permanent availability in quantity and in quality of market-gardening products accessible to the population: the protection of the environment through the drainage of the urban area and the preservation of the diversity of vegetables;the increase of the income of the households of the farmers and the creation of employments.展开更多
Food security, food safety and environmental protection are major livelihood issues in front of the Chinese people. The priorities of the three are different, and there is mutually dependent and contradictory relation...Food security, food safety and environmental protection are major livelihood issues in front of the Chinese people. The priorities of the three are different, and there is mutually dependent and contradictory relationship among them. Facing the triple pressures of food security, food safety, and environmental protection, this paper analyzes the priority of the three from the historical development, then further analyzes the interaction between food security,food safety and environmental protection and finally puts forward the healthy development of food security, food safety and environmental protection, and the proper settlement of the three problems.展开更多
The data and applications in cloud computing reside in cyberspace, that allowing to users access data through any connection device, when you need to transfer information over the cloud, you will lose control of it. T...The data and applications in cloud computing reside in cyberspace, that allowing to users access data through any connection device, when you need to transfer information over the cloud, you will lose control of it. There are multi types of security challenge must be understood and countermeasures. One of the major security challenges is resources of the cloud computing infrastructures are provided as services over the Internet, and entire data in the cloud computing are reside over network resources, that enables the data to be access through VMs. In this work, we describe security techniques for securing a VCCI, VMMs such as Encryption and Key Management (EKM), Access Control Mechanisms (ACMs), Virtual Trusted Platform Module (vTPM), Virtual Firewall (VF), and Trusted Virtual Domains (TVDs). In this paper we focus on security of virtual resources in Virtualized Cloud Computing Infrastructure (VCCI), Virtual Machine Monitor (VMM) by describing types of attacks on VCCI, and vulnerabilities of VMMs and we describe the techniques for securing a VCCI.展开更多
The Wenchuan earthquake in 2008 and geo-hazards triggered by the earthquake caused large injuries and deaths as well as destructive damage for infrastructures like construction, traffic and electricity. It is urgent t...The Wenchuan earthquake in 2008 and geo-hazards triggered by the earthquake caused large injuries and deaths as well as destructive damage for infrastructures like construction, traffic and electricity. It is urgent to select relatively secure areas for townships and cities constructed in high mountainous regions with high magnitude earthquakes. This paper presents the basic thoughts, evaluation indices and evaluation methods of geological security evaluation, water and land resources security demonstration and integrated assessments of geo-environmental suitability for reconstruction in alp and ravine with high magnitude earthquakes, which are applied in the worst-hit areas (12 counties). The integrated assessment shows that: (1) located in the Longmenshan fault zone, the evaluated area is of poor regional crust stability, in which the unstable and second unstable areas account for 79% of the total; (2) the geo-hazards susceptibility is high in the evaluation area. The spots of geo-hazards triggered by earthquake are mainly distributed along the active fault zone with higher distribution in the moderate and high mountains area, in which the areas of high and moderate susceptibility zoning accounts for 40.1% of the total; (3) geological security is poor in the evaluated area, in which the area of the unsuitable construction occupies 73.1%, whereas in the suitable construction area, the areas of geological security, second security and insecurity zoning account for 8.3 %, 9.3% and 9.3 % of the evaluated area respectively; (4) geo-environmentai suitability is poor in the evaluated area, in which the areas of suitability and basic suitability zoning account for 3.5% and 7.3% of the whole evaluation area.展开更多
The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of informati...The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of information technology infrastructure creates the enablement of IT resources to be shared and used on several other devices and applications;this increases the growth of business needs. The environment created by virtualization is not restricted to any configuration physically or execution. The resources of a computer are shared logically. Hypervisors help in virtualization of hardware that is a software interact with the physical system, enabling or providing virtualized hardware environment to support multiple running operating system simultaneously utilizing one physical server. This paper explores the benefits, types and security issues of Virtualization Hypervisor in virtualized hardware environment.展开更多
To some extent, China’s security environment depends on if it has active creation, understanding, attention and vigilance on the common interests of the surrounding areas and groups of states, and if it could take ti...To some extent, China’s security environment depends on if it has active creation, understanding, attention and vigilance on the common interests of the surrounding areas and groups of states, and if it could take timely and proper countermeasures. In my personal view, two principles should be taken into consideration. The first principle is展开更多
[ Objective] The research aimed to study index system of the environmental change and ecological security for a river basin based on DPSIR model. [Method] Based on considering each influence factor of the environmenta...[ Objective] The research aimed to study index system of the environmental change and ecological security for a river basin based on DPSIR model. [Method] Based on considering each influence factor of the environmental change and ecological security for a river basin, DPSIR model as framework, the basic framework, principle and related method of index system of the environmental change and ecological security for a river basin under influence of the multi-level development were put forward. [ ]Result] Index system of the environmental change and ecological se- curity for a river basin based on DPSIR model included driving force indicator, pressure indicator, state indicator, influence indicator and response indicator. Each indicator type also had many sub-indicators. [ Conclusion] The research provided theoretical support and method reference for as- sessment of the ecological security and execution of the ecological environment management for a river basin in China.展开更多
There is a Chinese saying that goes like this, when stormy weather comes, a giant dragon will rise. It is the feature of the present era. When China begins to rise, it will advance at an enormous inertial force. It ha...There is a Chinese saying that goes like this, when stormy weather comes, a giant dragon will rise. It is the feature of the present era. When China begins to rise, it will advance at an enormous inertial force. It has become the important factor that influences world future trend. In the meanwhile, changes in international situation also exerted increasing influence on China. Therefore it is of special significance to discuss and assess the international environment that China faces.展开更多
Environmental security remains a key challenge in the late 19th through to the 21st century,whose solution has attracted a number of initiatives.Sports diplomacy has achieved great strides in achieving international,r...Environmental security remains a key challenge in the late 19th through to the 21st century,whose solution has attracted a number of initiatives.Sports diplomacy has achieved great strides in achieving international,regional,and local unity.However,the use of sports diplomacy in achieving environmental security has received much less research attention.This research examines the role of sports in diplomacy in achieving environmental security in Kenya.This study was anchored on the soft power theory and Conservation of Resources(COR)theory which offer frameworks for explaining the role of sports diplomacy in advancing environmental security.The study adopted exploratory research design.The target population was diplomats,marathoners,coaches,environmentalists,conservationists and government officials,academia as well as Water Resources Authority(WRA).The primary data were obtained through open and closed structured questionnaire.The collected data were analyzed through the use of frequency distribution,and thematic analysis.The study established that sports diplomacy advanced environmental security in Kenya,which was better for athletics and volleyball.Environmental security was also enhanced through training,sensitization,conservation efforts,and environmental education.Sport events also allowed a contact-platform for interaction between various groups involved in environment and forest conservation.This study recommends that sports diplomacy should be used in most of the regions in Kenya experiencing environmental perturbations and the current strategies should be applied in the sports diplomacy and environmental conservation as well as security.Further,the government is also encouraged to appoint more sports ambassadors with proper environmental knowledge to help in environmental management.The role of academicians in sports diplomacy and environmental security was found to be minimal where academicians should be at the forefront as the 21st century diplomats are incorporated into sports to be local ambassadors.Perceiving the significance of sports diplomacy and environmental security,there is need for coordination between various county governments to coordinate their efforts and in the process they should bring on board even the non sports actors to boost the role of sports in diplomacy and environment.展开更多
With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality a...With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality and fine-grained data access control of Cloud Data Storage (CDS) environment, we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Confidentiality Agent (CDConA). CSPA provides a graphical interface to the cloud user that facilitates the access to the services offered by the system. CDConA provides each cloud user by definition and enforcement expressive and flexible access structure as a logic formula over cloud data file attributes. This new access control is named as Formula-Based Cloud Data Access Control (FCDAC). Our proposed FCDAC based on MAS architecture consists of four layers: interface layer, existing access control layer, proposed FCDAC layer and CDS layer as well as four types of entities of Cloud Service Provider (CSP), cloud users, knowledge base and confidentiality policy roles. FCDAC, it’s an access policy determined by our MAS architecture, not by the CSPs. A prototype of our proposed FCDAC scheme is implemented using the Java Agent Development Framework Security (JADE-S). Our results in the practical scenario defined formally in this paper, show the Round Trip Time (RTT) for an agent to travel in our system and measured by the times required for an agent to travel around different number of cloud users before and after implementing FCDAC.展开更多
Nowadays,with the significant growth of the mobile market,security issues on the Android Operation System have also become an urgent matter.Trusted execution environment(TEE)technologies are considered an option for s...Nowadays,with the significant growth of the mobile market,security issues on the Android Operation System have also become an urgent matter.Trusted execution environment(TEE)technologies are considered an option for satisfying the inviolable property by taking advantage of hardware security.However,for Android,TEE technologies still contain restrictions and limitations.The first issue is that non-original equipment manufacturer developers have limited access to the functionality of hardware-based TEE.Another issue of hardware-based TEE is the cross-platform problem.Since every mobile device supports different TEE vendors,it becomes an obstacle for developers to migrate their trusted applications to other Android devices.A software-based TEE solution is a potential approach that allows developers to customize,package and deliver the product efficiently.Motivated by that idea,this paper introduces a VTEE model,a software-based TEE solution,on Android devices.This research contributes to the analysis of the feasibility of using a virtualized TEE on Android devices by considering two metrics:computing performance and security.The experiment shows that the VTEE model can host other software-based TEE services and deliver various cryptography TEE functions on theAndroid environment.The security evaluation shows that adding the VTEE model to the existing Android does not addmore security issues to the traditional design.Overall,this paper shows applicable solutions to adjust the balance between computing performance and security.展开更多
We analyze data security technologies, and find out some defects of technologies and then propose a method of data security using protocol check under special environments and make some necessary analysis.
Modern vehicles are equipped with sensors,communication,and computation units that make them capable of providing monitoring services and analysis of real-time traffic information to improve road safety.The main aim o...Modern vehicles are equipped with sensors,communication,and computation units that make them capable of providing monitoring services and analysis of real-time traffic information to improve road safety.The main aim of communication in vehicular networks is to achieve an autonomous driving environment that is accident-free alongside increasing road use quality.However,the demanding specifications such as high data rate,low latency,and high reliability in vehicular networks make 5G an emerging solution for addressing the current vehicular network challenges.In the 5G IoV environment,various technologies and models are deployed,making the environment open to attacks such as Sybil,Denial of Service(DoS)and jamming.This paper presents the security and privacy challenges in an IoV 5G environment.Different categories of vehicular network attacks and possible solutions are presented from the technical point of view.展开更多
New technologies that take advantage of the emergence of massive Internet of Things(IoT)and a hyper-connected network environment have rapidly increased in recent years.These technologies are used in diverse environme...New technologies that take advantage of the emergence of massive Internet of Things(IoT)and a hyper-connected network environment have rapidly increased in recent years.These technologies are used in diverse environments,such as smart factories,digital healthcare,and smart grids,with increased security concerns.We intend to operate Security Orchestration,Automation and Response(SOAR)in various environments through new concept definitions as the need to detect and respond automatically to rapidly increasing security incidents without the intervention of security personnel has emerged.To facilitate the understanding of the security concern involved in this newly emerging area,we offer the definition of Internet of Blended Environment(IoBE)where various convergence environments are interconnected and the data analyzed in automation.We define Blended Threat(BT)as a security threat that exploits security vulnerabilities through various attack surfaces in the IoBE.We propose a novel SOAR-CUBE architecture to respond to security incidents with minimal human intervention by automating the BT response process.The Security Orchestration,Automation,and Response(SOAR)part of our architecture is used to link heterogeneous security technologies and the threat intelligence function that collects threat data and performs a correlation analysis of the data.SOAR is operated under Collaborative Units of Blended Environment(CUBE)which facilitates dynamic exchanges of data according to the environment applied to the IoBE by distributing and deploying security technologies for each BT type and dynamically combining them according to the cyber kill chain stage to minimize the damage and respond efficiently to BT.展开更多
New attacks are emerging rapidly in Information Security; hence the tools and technologies available for securing the information needs substantial upgradation as well as skills for operationalization to mitigate thes...New attacks are emerging rapidly in Information Security; hence the tools and technologies available for securing the information needs substantial upgradation as well as skills for operationalization to mitigate these attacks. It requires creation of practical training environment with tools and technologies available for Information Security. The design of Information Security courses involves scenario based hands-on-labs with real time security incidents and problems with global reach which could be customized quickly as per the scenario and user's requirement. In order to understand the underlying concepts as well as to learn the practical aspects of network and system security environment, an initiative has been taken and a Virtual Test Bed has been developed to meet the above objectives. It is an essential component in Information Security training concept which could be used to perform actual security attacks and remedial measures as well as to test the effectiveness of protection mechanisms and help in handling the security incidents effectively. This paper discusses the development of this Test Bed for Information Security skill development with virtual training environment using which Information Security concepts, attacks on networks/systems and practical scenarios are simulated for imparting hands on training to participants.展开更多
Light levels determine regeneration in stands and a key concern is how to regulate the light environment of different stand types to the requirements of the understory.In this study,we selected three stands typical in...Light levels determine regeneration in stands and a key concern is how to regulate the light environment of different stand types to the requirements of the understory.In this study,we selected three stands typical in south China(a Cryptomeria japonica plantation,a Quercus acutissima plantation,and a mixed stand of both)and three thinning intensities to determine the best understory light environ-ment for 3-year-old Phoebe bournei seedlings.The canopy structure,understory light environment,and photosynthe-sis and growth indicators were assessed following thin-ning.Thinning improved canopy structure and understory light availability of each stand;species composition was the reason for differences in the understory light environ-ment.Under the same thinning intensity,the mixed stand had the greatest light radiation and most balanced spectral composition.P.bournei photosynthesis and growth were closely related to the light environment;all three stands required heavy thinning to create an effective and sustained understory light environment.In a suitable understory light environment,the efficiency of light interception,absorption,and use by seedlings was enhanced,resulting in a higher carbon assimilation the main limiting factor was stomatal conductance.As a shade-avoidance signal,red/far-red radia-tion is a critical factor driving changes in photosynthesis and growth of P.bournei seedlings,and a reduction increased light absorption and use capacity and height:diameter ratios.The growth advantage transformed from diameter to height,enabling seedlings to access more light.Our findings suggest that the regeneration of shade-tolerant species such as P.bournei could be enhanced if a targeted approach to thinning based on stand type was adopted.展开更多
Grapevine (Vitis vinifera L.) is one of important economic fruit crops found in Hebron of Palestine. Climate is one of the key controlling factors in grape and wine production. Materials & Method: We analyzed grap...Grapevine (Vitis vinifera L.) is one of important economic fruit crops found in Hebron of Palestine. Climate is one of the key controlling factors in grape and wine production. Materials & Method: We analyzed grape production in Hebron region, and studied the correlation analyses between productions and climatic, bioclimatic factors. The bioclimate, climatic factors were obtained according to Rivas-Martinez to classification of the earth. However, the independent variables were examined: the bioclimate factors as compensated thermicity index, annual ombrothermic index, water deficit and simple continentality index;and following climate factors: mean monthly temperature, precipitation and soil water reserve. The data used were from one meteorological station of the Palestinian Meteorological Department for the years 1993 to 2009 (16 years), and to the same years of grape production (rain-fed) from the Palestinian Central Bureau of Statistics (PCBS).?Result & Discussion: When we applied a Principal Component Analysis (PCA), and observed that the Hebron type plots are located at the left of axis 1 during 1999-2004 negatively affected by the bioclimate factors as compensated thermicity index, with a large proportion of the variance explained by axes 1 (76.66%), but precipitation was positive influenced on grape yield for the years (2004-2009), with a proportion of the variance explained by axes 2 (23.34%);Hebron type plots are located at the right of axis1during 1993-1999 positive affected by the bioclimate factor as a simple continentality index and annual ombrothermic index, and climate factors as water deficit, soil water reserve and mean monthly temperature, with a large proportion of the variance explained by axes 1 & 2 (100%). Conclusions: Grapes are sensitive climate and the surrounding environment factors, and in order to get a high production and high-quality grapes, mean monthly temperature must be between 15°C - 20°C, and 20°C - 30°C (27°C) in the last two months of the maturation process, the value of simple continentality index is 15 - 18, compensated thermicity index is 220 - 350, and annual ombrothermic index is more than 3.展开更多
基金Guizhou Provincial University Humanities and Social Sciences Research Project in 2024"Enhancing the Development of New Productive Forces through University Technological Innovation and Intellectual Property Management"(2024RW256)Guizhou University of Commerce Research Project in 2022"Study on the Ideas and Pathways to Drive Agricultural Powerhouse through Digital Economy"(2022XJZX315)。
文摘With the rapid development of globalization and information technology,intellectual property has been one of the key drivers of economic growth,and the construction of intellectual property system has become an important criterion for measuring the quality of business environment.This article is intended to explore the current status of intellectual property system construction in China,the challenges,and its relationship with the business environment,to propose the corresponding countermeasures and suggestions.The study finds that the legal system of intellectual property in China is gradually improving,and judicial and administrative protection are continuously strengthened.However,the challenges still remain such as frequent infringements,rights hard to protect and insufficient international cooperation.These issues not only affect the legitimate rights and interests of innovation entities,but also for the market fairness and the level of the business environment.Therefore,this article proposes that strengthening the perfection of the intellectual property legal system,enhancing intellectual property services and support capabilities,strengthening international cooperation and exchanges,and accelerating the cultivation of composite talents.It aims to provide theoretical references for the construction of intellectual property system and the optimization of the business environment,promote the high-quality development of economy and enhance the global competitiveness of the country.
文摘To effectively perceive network security situation under IOT environment, an Immunity-based IOT Environment Security Situation Awareness (IIESSA) model is proposed. In IIESSA, some formal definitions for self, non-self, antigen and detector are given. According to the relationship between the antibody-concentration of memory detectors and the intensity of network attack activities, the security situation evaluation method under IOT environment based on artificial immune system is presented. And then according to the situation time series obtained by the mentioned evaluation method, the security situation prediction method based on grey prediction theory is presented for forecasting the intensity and security situation of network attack activities that the IOT environment will be suffered in next step. The experimental results show that IIESSA provides a novel and effective model for perceiving security situation of IOT environment.
文摘Nowadays, African cities are subjected to upsets which result from the extraordinary growth of urban populations. The growth of the population of cities has induced some changes in the structure of the activity of those cities. Agriculture which was formerly confined to the countryside henceforth develops in the urban area and occupies a preponderant place as a strategy of survival, of insertion and of food supplying of the city-dwellers. It has become an activity integrated to the urban tissue through systems of occupying and exploitation of land in the urban area. Population growth (4.81%) between 2002 and 2013 is a critical poverty rate (65%) of the population of Parakou city, entailing a misery perceptible in all its social and economic dimensions. The market-gardening activity has integrated itself to the urban tissue. The objective of this study is to understand how urban agriculture through market-gardening can be a solution for rural farmers who have moved to Parakou city. In this study, documentary research, interviews and field observation are used for data collection. The main results to be signaled among others are: evolution and status of the market-gardening areas in Parakou, the reduction of food insecurity with the permanent availability in quantity and in quality of market-gardening products accessible to the population: the protection of the environment through the drainage of the urban area and the preservation of the diversity of vegetables;the increase of the income of the households of the farmers and the creation of employments.
基金one of the research fruits of“A Study of the Public Interest Litigation and Security Mechanism for the Quality and Safety of Agricultural Products”(15BGL135)general project granted by the National Social Sciences Planning Office
文摘Food security, food safety and environmental protection are major livelihood issues in front of the Chinese people. The priorities of the three are different, and there is mutually dependent and contradictory relationship among them. Facing the triple pressures of food security, food safety, and environmental protection, this paper analyzes the priority of the three from the historical development, then further analyzes the interaction between food security,food safety and environmental protection and finally puts forward the healthy development of food security, food safety and environmental protection, and the proper settlement of the three problems.
文摘The data and applications in cloud computing reside in cyberspace, that allowing to users access data through any connection device, when you need to transfer information over the cloud, you will lose control of it. There are multi types of security challenge must be understood and countermeasures. One of the major security challenges is resources of the cloud computing infrastructures are provided as services over the Internet, and entire data in the cloud computing are reside over network resources, that enables the data to be access through VMs. In this work, we describe security techniques for securing a VCCI, VMMs such as Encryption and Key Management (EKM), Access Control Mechanisms (ACMs), Virtual Trusted Platform Module (vTPM), Virtual Firewall (VF), and Trusted Virtual Domains (TVDs). In this paper we focus on security of virtual resources in Virtualized Cloud Computing Infrastructure (VCCI), Virtual Machine Monitor (VMM) by describing types of attacks on VCCI, and vulnerabilities of VMMs and we describe the techniques for securing a VCCI.
文摘The Wenchuan earthquake in 2008 and geo-hazards triggered by the earthquake caused large injuries and deaths as well as destructive damage for infrastructures like construction, traffic and electricity. It is urgent to select relatively secure areas for townships and cities constructed in high mountainous regions with high magnitude earthquakes. This paper presents the basic thoughts, evaluation indices and evaluation methods of geological security evaluation, water and land resources security demonstration and integrated assessments of geo-environmental suitability for reconstruction in alp and ravine with high magnitude earthquakes, which are applied in the worst-hit areas (12 counties). The integrated assessment shows that: (1) located in the Longmenshan fault zone, the evaluated area is of poor regional crust stability, in which the unstable and second unstable areas account for 79% of the total; (2) the geo-hazards susceptibility is high in the evaluation area. The spots of geo-hazards triggered by earthquake are mainly distributed along the active fault zone with higher distribution in the moderate and high mountains area, in which the areas of high and moderate susceptibility zoning accounts for 40.1% of the total; (3) geological security is poor in the evaluated area, in which the area of the unsuitable construction occupies 73.1%, whereas in the suitable construction area, the areas of geological security, second security and insecurity zoning account for 8.3 %, 9.3% and 9.3 % of the evaluated area respectively; (4) geo-environmentai suitability is poor in the evaluated area, in which the areas of suitability and basic suitability zoning account for 3.5% and 7.3% of the whole evaluation area.
文摘The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of information technology infrastructure creates the enablement of IT resources to be shared and used on several other devices and applications;this increases the growth of business needs. The environment created by virtualization is not restricted to any configuration physically or execution. The resources of a computer are shared logically. Hypervisors help in virtualization of hardware that is a software interact with the physical system, enabling or providing virtualized hardware environment to support multiple running operating system simultaneously utilizing one physical server. This paper explores the benefits, types and security issues of Virtualization Hypervisor in virtualized hardware environment.
文摘To some extent, China’s security environment depends on if it has active creation, understanding, attention and vigilance on the common interests of the surrounding areas and groups of states, and if it could take timely and proper countermeasures. In my personal view, two principles should be taken into consideration. The first principle is
文摘[ Objective] The research aimed to study index system of the environmental change and ecological security for a river basin based on DPSIR model. [Method] Based on considering each influence factor of the environmental change and ecological security for a river basin, DPSIR model as framework, the basic framework, principle and related method of index system of the environmental change and ecological security for a river basin under influence of the multi-level development were put forward. [ ]Result] Index system of the environmental change and ecological se- curity for a river basin based on DPSIR model included driving force indicator, pressure indicator, state indicator, influence indicator and response indicator. Each indicator type also had many sub-indicators. [ Conclusion] The research provided theoretical support and method reference for as- sessment of the ecological security and execution of the ecological environment management for a river basin in China.
文摘There is a Chinese saying that goes like this, when stormy weather comes, a giant dragon will rise. It is the feature of the present era. When China begins to rise, it will advance at an enormous inertial force. It has become the important factor that influences world future trend. In the meanwhile, changes in international situation also exerted increasing influence on China. Therefore it is of special significance to discuss and assess the international environment that China faces.
文摘Environmental security remains a key challenge in the late 19th through to the 21st century,whose solution has attracted a number of initiatives.Sports diplomacy has achieved great strides in achieving international,regional,and local unity.However,the use of sports diplomacy in achieving environmental security has received much less research attention.This research examines the role of sports in diplomacy in achieving environmental security in Kenya.This study was anchored on the soft power theory and Conservation of Resources(COR)theory which offer frameworks for explaining the role of sports diplomacy in advancing environmental security.The study adopted exploratory research design.The target population was diplomats,marathoners,coaches,environmentalists,conservationists and government officials,academia as well as Water Resources Authority(WRA).The primary data were obtained through open and closed structured questionnaire.The collected data were analyzed through the use of frequency distribution,and thematic analysis.The study established that sports diplomacy advanced environmental security in Kenya,which was better for athletics and volleyball.Environmental security was also enhanced through training,sensitization,conservation efforts,and environmental education.Sport events also allowed a contact-platform for interaction between various groups involved in environment and forest conservation.This study recommends that sports diplomacy should be used in most of the regions in Kenya experiencing environmental perturbations and the current strategies should be applied in the sports diplomacy and environmental conservation as well as security.Further,the government is also encouraged to appoint more sports ambassadors with proper environmental knowledge to help in environmental management.The role of academicians in sports diplomacy and environmental security was found to be minimal where academicians should be at the forefront as the 21st century diplomats are incorporated into sports to be local ambassadors.Perceiving the significance of sports diplomacy and environmental security,there is need for coordination between various county governments to coordinate their efforts and in the process they should bring on board even the non sports actors to boost the role of sports in diplomacy and environment.
文摘With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality and fine-grained data access control of Cloud Data Storage (CDS) environment, we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Confidentiality Agent (CDConA). CSPA provides a graphical interface to the cloud user that facilitates the access to the services offered by the system. CDConA provides each cloud user by definition and enforcement expressive and flexible access structure as a logic formula over cloud data file attributes. This new access control is named as Formula-Based Cloud Data Access Control (FCDAC). Our proposed FCDAC based on MAS architecture consists of four layers: interface layer, existing access control layer, proposed FCDAC layer and CDS layer as well as four types of entities of Cloud Service Provider (CSP), cloud users, knowledge base and confidentiality policy roles. FCDAC, it’s an access policy determined by our MAS architecture, not by the CSPs. A prototype of our proposed FCDAC scheme is implemented using the Java Agent Development Framework Security (JADE-S). Our results in the practical scenario defined formally in this paper, show the Round Trip Time (RTT) for an agent to travel in our system and measured by the times required for an agent to travel around different number of cloud users before and after implementing FCDAC.
基金This work was partly supported by the Institute of Information&Communications Technology Planning&Evaluation(IITP)grant funded by the Korea Government(MSIT),(No.2020-0-00952,Development of 5G edge security technology for ensuring 5G+service stability and availability,50%)the Institute of Information and Communications Technology Planning and Evaluation(IITP)grant funded by the MSIT(Ministry of Science and ICT),Korea(No.IITP-2022-2020-0-01602,ITRC(Information Technology Research Center)support program,50%).
文摘Nowadays,with the significant growth of the mobile market,security issues on the Android Operation System have also become an urgent matter.Trusted execution environment(TEE)technologies are considered an option for satisfying the inviolable property by taking advantage of hardware security.However,for Android,TEE technologies still contain restrictions and limitations.The first issue is that non-original equipment manufacturer developers have limited access to the functionality of hardware-based TEE.Another issue of hardware-based TEE is the cross-platform problem.Since every mobile device supports different TEE vendors,it becomes an obstacle for developers to migrate their trusted applications to other Android devices.A software-based TEE solution is a potential approach that allows developers to customize,package and deliver the product efficiently.Motivated by that idea,this paper introduces a VTEE model,a software-based TEE solution,on Android devices.This research contributes to the analysis of the feasibility of using a virtualized TEE on Android devices by considering two metrics:computing performance and security.The experiment shows that the VTEE model can host other software-based TEE services and deliver various cryptography TEE functions on theAndroid environment.The security evaluation shows that adding the VTEE model to the existing Android does not addmore security issues to the traditional design.Overall,this paper shows applicable solutions to adjust the balance between computing performance and security.
文摘We analyze data security technologies, and find out some defects of technologies and then propose a method of data security using protocol check under special environments and make some necessary analysis.
基金supported by the National Natural Science Foundation of China(Grant No.61602252)the Natural Science Foundation of Jiangsu Province of China(Grant No.BK20160967)Project through the Priority Academic Program Development(PAPD)of Jiangsu Higher Education Institutions.
文摘Modern vehicles are equipped with sensors,communication,and computation units that make them capable of providing monitoring services and analysis of real-time traffic information to improve road safety.The main aim of communication in vehicular networks is to achieve an autonomous driving environment that is accident-free alongside increasing road use quality.However,the demanding specifications such as high data rate,low latency,and high reliability in vehicular networks make 5G an emerging solution for addressing the current vehicular network challenges.In the 5G IoV environment,various technologies and models are deployed,making the environment open to attacks such as Sybil,Denial of Service(DoS)and jamming.This paper presents the security and privacy challenges in an IoV 5G environment.Different categories of vehicular network attacks and possible solutions are presented from the technical point of view.
基金This work was supported by the National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT)(No.2021R1A2C2011391)and was supported by the Ajou University research fund.
文摘New technologies that take advantage of the emergence of massive Internet of Things(IoT)and a hyper-connected network environment have rapidly increased in recent years.These technologies are used in diverse environments,such as smart factories,digital healthcare,and smart grids,with increased security concerns.We intend to operate Security Orchestration,Automation and Response(SOAR)in various environments through new concept definitions as the need to detect and respond automatically to rapidly increasing security incidents without the intervention of security personnel has emerged.To facilitate the understanding of the security concern involved in this newly emerging area,we offer the definition of Internet of Blended Environment(IoBE)where various convergence environments are interconnected and the data analyzed in automation.We define Blended Threat(BT)as a security threat that exploits security vulnerabilities through various attack surfaces in the IoBE.We propose a novel SOAR-CUBE architecture to respond to security incidents with minimal human intervention by automating the BT response process.The Security Orchestration,Automation,and Response(SOAR)part of our architecture is used to link heterogeneous security technologies and the threat intelligence function that collects threat data and performs a correlation analysis of the data.SOAR is operated under Collaborative Units of Blended Environment(CUBE)which facilitates dynamic exchanges of data according to the environment applied to the IoBE by distributing and deploying security technologies for each BT type and dynamically combining them according to the cyber kill chain stage to minimize the damage and respond efficiently to BT.
文摘New attacks are emerging rapidly in Information Security; hence the tools and technologies available for securing the information needs substantial upgradation as well as skills for operationalization to mitigate these attacks. It requires creation of practical training environment with tools and technologies available for Information Security. The design of Information Security courses involves scenario based hands-on-labs with real time security incidents and problems with global reach which could be customized quickly as per the scenario and user's requirement. In order to understand the underlying concepts as well as to learn the practical aspects of network and system security environment, an initiative has been taken and a Virtual Test Bed has been developed to meet the above objectives. It is an essential component in Information Security training concept which could be used to perform actual security attacks and remedial measures as well as to test the effectiveness of protection mechanisms and help in handling the security incidents effectively. This paper discusses the development of this Test Bed for Information Security skill development with virtual training environment using which Information Security concepts, attacks on networks/systems and practical scenarios are simulated for imparting hands on training to participants.
基金This study was supported by the National Natural Science Foundation of China(Grant No.31870613)Guizhou Province High-level Innovative Talents Training Plan Project(2016)5661.
文摘Light levels determine regeneration in stands and a key concern is how to regulate the light environment of different stand types to the requirements of the understory.In this study,we selected three stands typical in south China(a Cryptomeria japonica plantation,a Quercus acutissima plantation,and a mixed stand of both)and three thinning intensities to determine the best understory light environ-ment for 3-year-old Phoebe bournei seedlings.The canopy structure,understory light environment,and photosynthe-sis and growth indicators were assessed following thin-ning.Thinning improved canopy structure and understory light availability of each stand;species composition was the reason for differences in the understory light environ-ment.Under the same thinning intensity,the mixed stand had the greatest light radiation and most balanced spectral composition.P.bournei photosynthesis and growth were closely related to the light environment;all three stands required heavy thinning to create an effective and sustained understory light environment.In a suitable understory light environment,the efficiency of light interception,absorption,and use by seedlings was enhanced,resulting in a higher carbon assimilation the main limiting factor was stomatal conductance.As a shade-avoidance signal,red/far-red radia-tion is a critical factor driving changes in photosynthesis and growth of P.bournei seedlings,and a reduction increased light absorption and use capacity and height:diameter ratios.The growth advantage transformed from diameter to height,enabling seedlings to access more light.Our findings suggest that the regeneration of shade-tolerant species such as P.bournei could be enhanced if a targeted approach to thinning based on stand type was adopted.
文摘Grapevine (Vitis vinifera L.) is one of important economic fruit crops found in Hebron of Palestine. Climate is one of the key controlling factors in grape and wine production. Materials & Method: We analyzed grape production in Hebron region, and studied the correlation analyses between productions and climatic, bioclimatic factors. The bioclimate, climatic factors were obtained according to Rivas-Martinez to classification of the earth. However, the independent variables were examined: the bioclimate factors as compensated thermicity index, annual ombrothermic index, water deficit and simple continentality index;and following climate factors: mean monthly temperature, precipitation and soil water reserve. The data used were from one meteorological station of the Palestinian Meteorological Department for the years 1993 to 2009 (16 years), and to the same years of grape production (rain-fed) from the Palestinian Central Bureau of Statistics (PCBS).?Result & Discussion: When we applied a Principal Component Analysis (PCA), and observed that the Hebron type plots are located at the left of axis 1 during 1999-2004 negatively affected by the bioclimate factors as compensated thermicity index, with a large proportion of the variance explained by axes 1 (76.66%), but precipitation was positive influenced on grape yield for the years (2004-2009), with a proportion of the variance explained by axes 2 (23.34%);Hebron type plots are located at the right of axis1during 1993-1999 positive affected by the bioclimate factor as a simple continentality index and annual ombrothermic index, and climate factors as water deficit, soil water reserve and mean monthly temperature, with a large proportion of the variance explained by axes 1 & 2 (100%). Conclusions: Grapes are sensitive climate and the surrounding environment factors, and in order to get a high production and high-quality grapes, mean monthly temperature must be between 15°C - 20°C, and 20°C - 30°C (27°C) in the last two months of the maturation process, the value of simple continentality index is 15 - 18, compensated thermicity index is 220 - 350, and annual ombrothermic index is more than 3.