Nowadays,with the significant growth of the mobile market,security issues on the Android Operation System have also become an urgent matter.Trusted execution environment(TEE)technologies are considered an option for s...Nowadays,with the significant growth of the mobile market,security issues on the Android Operation System have also become an urgent matter.Trusted execution environment(TEE)technologies are considered an option for satisfying the inviolable property by taking advantage of hardware security.However,for Android,TEE technologies still contain restrictions and limitations.The first issue is that non-original equipment manufacturer developers have limited access to the functionality of hardware-based TEE.Another issue of hardware-based TEE is the cross-platform problem.Since every mobile device supports different TEE vendors,it becomes an obstacle for developers to migrate their trusted applications to other Android devices.A software-based TEE solution is a potential approach that allows developers to customize,package and deliver the product efficiently.Motivated by that idea,this paper introduces a VTEE model,a software-based TEE solution,on Android devices.This research contributes to the analysis of the feasibility of using a virtualized TEE on Android devices by considering two metrics:computing performance and security.The experiment shows that the VTEE model can host other software-based TEE services and deliver various cryptography TEE functions on theAndroid environment.The security evaluation shows that adding the VTEE model to the existing Android does not addmore security issues to the traditional design.Overall,this paper shows applicable solutions to adjust the balance between computing performance and security.展开更多
Light levels determine regeneration in stands and a key concern is how to regulate the light environment of different stand types to the requirements of the understory.In this study,we selected three stands typical in...Light levels determine regeneration in stands and a key concern is how to regulate the light environment of different stand types to the requirements of the understory.In this study,we selected three stands typical in south China(a Cryptomeria japonica plantation,a Quercus acutissima plantation,and a mixed stand of both)and three thinning intensities to determine the best understory light environ-ment for 3-year-old Phoebe bournei seedlings.The canopy structure,understory light environment,and photosynthe-sis and growth indicators were assessed following thin-ning.Thinning improved canopy structure and understory light availability of each stand;species composition was the reason for differences in the understory light environ-ment.Under the same thinning intensity,the mixed stand had the greatest light radiation and most balanced spectral composition.P.bournei photosynthesis and growth were closely related to the light environment;all three stands required heavy thinning to create an effective and sustained understory light environment.In a suitable understory light environment,the efficiency of light interception,absorption,and use by seedlings was enhanced,resulting in a higher carbon assimilation the main limiting factor was stomatal conductance.As a shade-avoidance signal,red/far-red radia-tion is a critical factor driving changes in photosynthesis and growth of P.bournei seedlings,and a reduction increased light absorption and use capacity and height:diameter ratios.The growth advantage transformed from diameter to height,enabling seedlings to access more light.Our findings suggest that the regeneration of shade-tolerant species such as P.bournei could be enhanced if a targeted approach to thinning based on stand type was adopted.展开更多
China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the ...China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the environment remains inadequately evaluated.Moreover,although green and low-carbon technologies offer environmental advantages,their widespread adoption is hindered by prohibitively high costs.This study analyzes the impact of removing fertilizer manufacturing subsidies and explores the potential feasibility of redirecting fertilizer manufacturing subsidies to invest in the diffusion of these technologies.Utilizing the China Agricultural University Agri-food Systems model,we analyzed the potential for achieving mutually beneficial outcomes regarding food security and environmental sustainability.The findings indicate that removing fertilizer manufacturing subsidies has reduced greenhouse gas(GHG)emissions from agricultural activities by 3.88 million metric tons,with minimal impact on food production.Redirecting fertilizer manufacturing subsidies to invest in green and low-carbon technologies,including slow and controlled-release fertilizer,organic-inorganic compound fertilizers,and machine deep placement of fertilizer,emerges as a strategy to concurrently curtail GHG emissions,ensure food security,and secure robust economic returns.Finally,we propose a comprehensive set of government interventions,including subsidies,field guidance,and improved extension systems,to promote the widespread adoption of these technologies.展开更多
The development of the Internet of Things has facilitated the rapid development of various industries.With the improvement in people’s living standards,people’s health requirements are steadily improving.However,owi...The development of the Internet of Things has facilitated the rapid development of various industries.With the improvement in people’s living standards,people’s health requirements are steadily improving.However,owing to the scarcity of medical and health care resources in some areas,the demand for remote surgery has gradually increased.In this paper,we investigate remote surgery in the healthcare environment.Surgeons can operate robotic arms to perform remote surgery for patients,which substantially facilitates successful surgeries and saves lives.Recently,Kamil et al.proposed a secure protocol for surgery in the healthcare environment.However,after cryptanalyzing their protocol,we deduced that their protocols are vulnerable to temporary value disclosure and insider attacks.Therefore,we design an improved authentication and key agreement protocol for remote surgeries in the healthcare environment.Accordingly,we adopt the real or random(ROR)model and an automatic verification tool Proverif to verify the security of our protocol.Via security analysis and performance comparison,it is confirmed that our protocol is a relatively secure protocol.展开更多
The research objective of this review is to discuss the rationale that led to the development of Controlled Environment Agriculture (CEA) and investigate this agricultural approach as a potential solution to mitigate ...The research objective of this review is to discuss the rationale that led to the development of Controlled Environment Agriculture (CEA) and investigate this agricultural approach as a potential solution to mitigate the increased pressures on food security. It describes the need for urban cultivation systems using controlled environments and how they can be harnessed to address pressures facing food security. The factors that have contributed to the growth of CEAs, education, environmental justice, and the advantages and disadvantages of growing crops in CEAs in urban areas will be discussed. The article reviews global urban cultivation systems using controlled environments, by identifying the technologies needed to establish them. The practice of CEA is being increasingly adopted worldwide and we describe urban agriculture and compare it with traditional growing systems. Indoor farming systems that integrate into existing urban infrastructure such as vertical farming and plant factories using CEAs are discussed. Indoor farming gives urban areas enhanced access to food sources, but the cost is high, however decreasing due to recent technological advances. The current review extends the literature by incorporating recent research on the topic of agriculture in urban areas and food security. This review seeks to provide additional information regarding the viability of CEA in urban areas.展开更多
Enhancing the sense of presence of participants is an important issue in terms of security awareness for remote collaboration in extended reality.However,conventional methods are insufficient to be aware of remote sit...Enhancing the sense of presence of participants is an important issue in terms of security awareness for remote collaboration in extended reality.However,conventional methods are insufficient to be aware of remote situations and to search for and control remote workspaces.This study pro-poses a spatial multi-presence system that simultaneously provides multiple spaces while rapidly exploring these spaces as users perform collaborative work in an extended reality environment.The proposed system provides methods for arranging and manipulating remote and personal spaces by creating an annular screen that is invisible to the user.The user can freely arrange remote participants and their workspaces on the annular screen.Because users can simultaneously view various spaces arranged on the annular screen,they can perform collaborative work while simultaneously feeling the presence of multiple spaces and can be fully immersed in a specific space.In addition,the personal spaces where users work can also be arranged through the annular screen.According to the results of the performance evaluations,users participating in remote collaborative works can visualize the spaces of multiple users simultaneously and feel their presence,thereby increasing their understanding of the spaces.Moreover,the proposed system reduces the time to perform tasks and gain awareness of the emergency in remote workspaces.展开更多
Attribute-based encryption(ABE)is a technique used to encrypt data,it has the flexibility of access control,high security,and resistance to collusion attacks,and especially it is used in cloud security protection.Howe...Attribute-based encryption(ABE)is a technique used to encrypt data,it has the flexibility of access control,high security,and resistance to collusion attacks,and especially it is used in cloud security protection.However,a large number of bilinear mappings are used in ABE,and the calculation of bilinear pairing is time-consuming.So there is the problem of low efficiency.On the other hand,the decryption key is not uniquely associated with personal identification information,if the decryption key is maliciously sold,ABE is unable to achieve accountability for the user.In practical applications,shared message requires hierarchical sharing in most cases,in this paper,we present a message security hierarchy ABE scheme for this scenario.Firstly,attributes were grouped and weighted according to the importance of attributes,and then an access structure based on a threshold tree was constructed according to attribute weight.This method saved the computing time for decryption while ensuring security and on-demand access to information for users.In addition,with the help of computing power in the cloud,two-step decryption was used to complete the access,which relieved the computing and storage burden on the client side.Finally,we simulated and tested the scheme based on CP-ABE,and selected different security levels to test its performance.The security proof and the experimental simulation result showthat the proposed scheme has high efficiency and good performance,and the solution implements hierarchical access to the shared message.展开更多
In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several ...In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several security-related problems,such as user privacy breaches,data disclosure,data corruption,and so on,during the process of data outsourcing.For addressing and handling the security-related issues on Cloud,several models were proposed.With that concern,this paper develops a Privacy-Preserved Data Security Approach(PP-DSA)to provide the data security and data integrity for the out-sourcing data in Cloud Environment.Privacy preservation is ensured in this work with the Efficient Authentication Technique(EAT)using the Group Signature method that is applied with Third-Party Auditor(TPA).The role of the auditor is to secure the data and guarantee shared data integrity.Additionally,the Cloud Service Provider(CSP)and Data User(DU)can also be the attackers that are to be handled with the EAT.Here,the major objective of the work is to enhance cloud security and thereby,increase Quality of Service(QoS).The results are evaluated based on the model effectiveness,security,and reliability and show that the proposed model provides better results than existing works.展开更多
China attaches great importance to food security.With the strong promotion of the government,Chinas grain output has achieved a great feat from"shortage"to"surplus in bumper years"and then to"...China attaches great importance to food security.With the strong promotion of the government,Chinas grain output has achieved a great feat from"shortage"to"surplus in bumper years"and then to"rising steadily",achieving a record"increase for the tenth consecutive year".From the current balance of food supply and demand in China,the food security situation can be guaranteed on the whole.However,if we analyze the food security in China from the perspective of agricultural sustainable development strategy,there are some difficulties,such as the reduction of cultivated land area,the decline of cultivated land quality,the fragility of agricultural ecological environment,and the transformation of residentsconsumption structure.This paper analyzes the difficulties faced by the development of food security in China under the strategy of sustainable agricultural development,and puts forward that to implement the strategy of sustainable agricultural development,it is necessary to realize the coordinated development of food security,science and technology,ecological environment,resources and society.展开更多
The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual user...The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare.展开更多
In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured L...In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes.展开更多
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering...This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.展开更多
The primary objective of this study was to design and size a sustainable sanitation solution for the Ndiebene Gandiol 1 school located in the eponymous commune in northern Senegal. Field investigations led to the coll...The primary objective of this study was to design and size a sustainable sanitation solution for the Ndiebene Gandiol 1 school located in the eponymous commune in northern Senegal. Field investigations led to the collection of wastewater samples. Their analysis revealed specific pollutant loads, including loads of BOD5 3.6966 kgO<sub>2</sub>/day and COD of 12.8775 kgO<sub>2</sub>/day, which were central to the design phase. Following a rigorous assessment of the existing sanitation infrastructure, constructed wetland (CWs) emerged as the most appropriate ecological solution. This system, valued for its ability to effectively remove contaminants, was tailored to the specific needs of the site. Consequently, the final design of the filter extends over 217.16 m<sup>2</sup>, divided into two cells of 108.58 m<sup>2</sup> each, with dimensions of 12.77 m in length and 8.5 m in width. The depth of the filtering medium is approximately 0.60 m, meeting the standards while ensuring maximized purification. Typha, an indigenous and prolific plant known for its purification abilities, was selected as the filtering agent. Concurrently, non-crushed gravel was chosen for its proven filtration capacity. This study is the result of a combination of scientific rigor and design expertise. It provides a holistic view of sanitation for Ndiebene Gandiol. The technical specifications and dimensions of the constructed wetland filter embody an approach that marries indepth analysis and practical application, all aimed at delivering an effective and long-lasting solution to the local sanitation challenges. By integrating precise scientific data with sanitation design expertise, this study delivers a holistic solution for Ndiebene Gandiol. The detailed dimensions and specifications of the constructed wetland filter reflect a methodology that combines meticulous analysis with practical adaptation, aiming to provide an effective and sustainable response to the challenges of rural and school sanitation in the northern region of Senegal.展开更多
Plantain is a food security crop of significant nutritional value in the global south. Yet there are significant post-harvest losses, especially at the senescent stage. This review seeks to give a general overview of ...Plantain is a food security crop of significant nutritional value in the global south. Yet there are significant post-harvest losses, especially at the senescent stage. This review seeks to give a general overview of the crop, its nutritional significance and the technologies that can be adopted to enhance its utilisation at its senescent stage. In West Africa, plantains are eaten at all ripening stages, yet processing is limited to the unripe and semi-ripe. Adoptable technologies such as foam-mat drying will enhance its utilisation in indigenous meals and other food applications. This review provides useful insight to optimize the use of plantain to prevent food waste.展开更多
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world sof...This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world software.The existing analysis of software security vulnerabilities often focuses on specific features or modules.This partial and arbitrary analysis of the security vulnerabilities makes it challenging to comprehend the overall security vulnerabilities of the software.The key novelty lies in overcoming the constraints of partial approaches.The proposed framework utilizes data from various sources to create a comprehensive functionality profile,facilitating the derivation of real-world security guidelines.Security guidelines are dynamically generated by associating functional security vulnerabilities with the latest Common Vulnerabilities and Exposure(CVE)and Common Vulnerability Scoring System(CVSS)scores,resulting in automated guidelines tailored to each product.These guidelines are not only practical but also applicable in real-world software,allowing for prioritized security responses.The proposed framework is applied to virtual private network(VPN)software,wherein a validated Level 2 data flow diagram is generated using the Spoofing,Tampering,Repudiation,Information Disclosure,Denial of Service,and Elevation of privilege(STRIDE)technique with references to various papers and examples from related software.The analysis resulted in the identification of a total of 121 vulnerabilities.The successful implementation and validation demonstrate the framework’s efficacy in generating customized guidelines for entire systems,subsystems,and selected modules.展开更多
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic method...In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic methods face increasingly sophisticated challenges.This article initiates an exploration into these challenges,focusing on key exchanges(encompassing their variety and subtleties),scalability,and the time metrics associated with various cryptographic processes.We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering.Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity,foundational pillars of information security.Our method employs a phased strategy,beginning with a detailed examination of traditional cryptographic processes,including Elliptic Curve Diffie-Hellman(ECDH)key exchanges.We also delve into encrypt/decrypt paradigms,signature generation modes,and the hashes used for Message Authentication Codes(MACs).Each process is rigorously evaluated for performance and reliability.To gain a comprehensive understanding,a meticulously designed simulation was conducted,revealing the strengths and potential improvement areas of various techniques.Notably,our cryptographic protocol achieved a confidentiality metric of 9.13 in comprehensive simulation runs,marking a significant advancement over existing methods.Furthermore,with integrity metrics at 9.35,the protocol’s resilience is further affirmed.These metrics,derived from stringent testing,underscore the protocol’s efficacy in enhancing data security.展开更多
The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potentia...The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potential security risks that malicious actors can exploit. QR code Phishing, or “Quishing”, is a type of phishing attack that leverages QR codes to deceive individuals into visiting malicious websites or downloading harmful software. These attacks can be particularly effective due to the growing popularity and trust in QR codes. This paper examines the importance of enhancing the security of QR codes through the utilization of artificial intelligence (AI). The abstract investigates the integration of AI methods for identifying and mitigating security threats associated with QR code usage. By assessing the current state of QR code security and evaluating the effectiveness of AI-driven solutions, this research aims to propose comprehensive strategies for strengthening QR code technology’s resilience. The study contributes to discussions on secure data encoding and retrieval, providing valuable insights into the evolving synergy between QR codes and AI for the advancement of secure digital communication.展开更多
The regulating nitrogen content of diamond in a hydrogen-rich high-temperature and high-pressure(HPHT) growth environment was systematically investigated in this work by developing three growth systems,namely, "F...The regulating nitrogen content of diamond in a hydrogen-rich high-temperature and high-pressure(HPHT) growth environment was systematically investigated in this work by developing three growth systems,namely, "FeNi+Ti", "FeNi+G_(3)N_(6)H_(6)",and "FeNi+Ti+C_(3)N_(6)H_(6)".Optical microscopy,infrared spectroscopy,and photoluminescence(PL)spectroscopy measurements were conducted to analyze the spectroscopic characteristics of diamonds grown in these three systems.From our analysis,it was demonstrated that the presence of hydrogen in the sp^(3) hybrid C-H does not directly affect the color of the diamond and facilitates the increase of the nitrogen-vacancy(NV) center concentration in a highnitrogen-content diamond.In addition,titanium plays an important role in nitrogen removal,while its impact on hydrogen doping within the diamond lattice is insignificant.Most importantly,by regulating the ratio of nitrogen impurities that coexist in the nitrogen and hydrogen HPHT environment,the production of hydrogenous Ⅱa-type diamond,hydrogenous Ib-type diamond,and hydrogenous high-nitrogen-type diamonds was achieved with a nitrogen content of less than 1 ppm to 1600 ppm.展开更多
Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the...Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT.展开更多
Introduction: Food security is one of the greatest challenges that most African countries face. It is a concept that considers not only food quantity but also food quality. The objective of this study was to describe ...Introduction: Food security is one of the greatest challenges that most African countries face. It is a concept that considers not only food quantity but also food quality. The objective of this study was to describe dietary diversity and food security status at the individual level in Cameroonian populations. Methods: A total of 1180 men and women aged 20 and over and living in the West, North West, and Littoral regions of Cameroon were recruited. Data on dietary habits were collected through the frequency of consumption of various food groups. Dietary diversity was assessed using a 24-hour dietary recall. Food security status was determined by combining two indicators (food consumption score and individual food diversity score). Results: The mean dietary diversity score of the population was 3.53 ± 1.44, p Conclusion: The diet diversity of adults living in the West, North West, and Littoral regions of Cameroon is medium. Although half of the study population was food secure, there is a need to implement food security policies further to reduce food insecurity among the Cameroonian population.展开更多
基金This work was partly supported by the Institute of Information&Communications Technology Planning&Evaluation(IITP)grant funded by the Korea Government(MSIT),(No.2020-0-00952,Development of 5G edge security technology for ensuring 5G+service stability and availability,50%)the Institute of Information and Communications Technology Planning and Evaluation(IITP)grant funded by the MSIT(Ministry of Science and ICT),Korea(No.IITP-2022-2020-0-01602,ITRC(Information Technology Research Center)support program,50%).
文摘Nowadays,with the significant growth of the mobile market,security issues on the Android Operation System have also become an urgent matter.Trusted execution environment(TEE)technologies are considered an option for satisfying the inviolable property by taking advantage of hardware security.However,for Android,TEE technologies still contain restrictions and limitations.The first issue is that non-original equipment manufacturer developers have limited access to the functionality of hardware-based TEE.Another issue of hardware-based TEE is the cross-platform problem.Since every mobile device supports different TEE vendors,it becomes an obstacle for developers to migrate their trusted applications to other Android devices.A software-based TEE solution is a potential approach that allows developers to customize,package and deliver the product efficiently.Motivated by that idea,this paper introduces a VTEE model,a software-based TEE solution,on Android devices.This research contributes to the analysis of the feasibility of using a virtualized TEE on Android devices by considering two metrics:computing performance and security.The experiment shows that the VTEE model can host other software-based TEE services and deliver various cryptography TEE functions on theAndroid environment.The security evaluation shows that adding the VTEE model to the existing Android does not addmore security issues to the traditional design.Overall,this paper shows applicable solutions to adjust the balance between computing performance and security.
基金This study was supported by the National Natural Science Foundation of China(Grant No.31870613)Guizhou Province High-level Innovative Talents Training Plan Project(2016)5661.
文摘Light levels determine regeneration in stands and a key concern is how to regulate the light environment of different stand types to the requirements of the understory.In this study,we selected three stands typical in south China(a Cryptomeria japonica plantation,a Quercus acutissima plantation,and a mixed stand of both)and three thinning intensities to determine the best understory light environ-ment for 3-year-old Phoebe bournei seedlings.The canopy structure,understory light environment,and photosynthe-sis and growth indicators were assessed following thin-ning.Thinning improved canopy structure and understory light availability of each stand;species composition was the reason for differences in the understory light environ-ment.Under the same thinning intensity,the mixed stand had the greatest light radiation and most balanced spectral composition.P.bournei photosynthesis and growth were closely related to the light environment;all three stands required heavy thinning to create an effective and sustained understory light environment.In a suitable understory light environment,the efficiency of light interception,absorption,and use by seedlings was enhanced,resulting in a higher carbon assimilation the main limiting factor was stomatal conductance.As a shade-avoidance signal,red/far-red radia-tion is a critical factor driving changes in photosynthesis and growth of P.bournei seedlings,and a reduction increased light absorption and use capacity and height:diameter ratios.The growth advantage transformed from diameter to height,enabling seedlings to access more light.Our findings suggest that the regeneration of shade-tolerant species such as P.bournei could be enhanced if a targeted approach to thinning based on stand type was adopted.
基金The authors acknowledge the financial support received from the National Natural Science Foundation of China(72061147002).
文摘China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the environment remains inadequately evaluated.Moreover,although green and low-carbon technologies offer environmental advantages,their widespread adoption is hindered by prohibitively high costs.This study analyzes the impact of removing fertilizer manufacturing subsidies and explores the potential feasibility of redirecting fertilizer manufacturing subsidies to invest in the diffusion of these technologies.Utilizing the China Agricultural University Agri-food Systems model,we analyzed the potential for achieving mutually beneficial outcomes regarding food security and environmental sustainability.The findings indicate that removing fertilizer manufacturing subsidies has reduced greenhouse gas(GHG)emissions from agricultural activities by 3.88 million metric tons,with minimal impact on food production.Redirecting fertilizer manufacturing subsidies to invest in green and low-carbon technologies,including slow and controlled-release fertilizer,organic-inorganic compound fertilizers,and machine deep placement of fertilizer,emerges as a strategy to concurrently curtail GHG emissions,ensure food security,and secure robust economic returns.Finally,we propose a comprehensive set of government interventions,including subsidies,field guidance,and improved extension systems,to promote the widespread adoption of these technologies.
文摘The development of the Internet of Things has facilitated the rapid development of various industries.With the improvement in people’s living standards,people’s health requirements are steadily improving.However,owing to the scarcity of medical and health care resources in some areas,the demand for remote surgery has gradually increased.In this paper,we investigate remote surgery in the healthcare environment.Surgeons can operate robotic arms to perform remote surgery for patients,which substantially facilitates successful surgeries and saves lives.Recently,Kamil et al.proposed a secure protocol for surgery in the healthcare environment.However,after cryptanalyzing their protocol,we deduced that their protocols are vulnerable to temporary value disclosure and insider attacks.Therefore,we design an improved authentication and key agreement protocol for remote surgeries in the healthcare environment.Accordingly,we adopt the real or random(ROR)model and an automatic verification tool Proverif to verify the security of our protocol.Via security analysis and performance comparison,it is confirmed that our protocol is a relatively secure protocol.
文摘The research objective of this review is to discuss the rationale that led to the development of Controlled Environment Agriculture (CEA) and investigate this agricultural approach as a potential solution to mitigate the increased pressures on food security. It describes the need for urban cultivation systems using controlled environments and how they can be harnessed to address pressures facing food security. The factors that have contributed to the growth of CEAs, education, environmental justice, and the advantages and disadvantages of growing crops in CEAs in urban areas will be discussed. The article reviews global urban cultivation systems using controlled environments, by identifying the technologies needed to establish them. The practice of CEA is being increasingly adopted worldwide and we describe urban agriculture and compare it with traditional growing systems. Indoor farming systems that integrate into existing urban infrastructure such as vertical farming and plant factories using CEAs are discussed. Indoor farming gives urban areas enhanced access to food sources, but the cost is high, however decreasing due to recent technological advances. The current review extends the literature by incorporating recent research on the topic of agriculture in urban areas and food security. This review seeks to provide additional information regarding the viability of CEA in urban areas.
基金supported by“Regional Innovation Strategy(RIS)”through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(MOE)(2021RIS-004).
文摘Enhancing the sense of presence of participants is an important issue in terms of security awareness for remote collaboration in extended reality.However,conventional methods are insufficient to be aware of remote situations and to search for and control remote workspaces.This study pro-poses a spatial multi-presence system that simultaneously provides multiple spaces while rapidly exploring these spaces as users perform collaborative work in an extended reality environment.The proposed system provides methods for arranging and manipulating remote and personal spaces by creating an annular screen that is invisible to the user.The user can freely arrange remote participants and their workspaces on the annular screen.Because users can simultaneously view various spaces arranged on the annular screen,they can perform collaborative work while simultaneously feeling the presence of multiple spaces and can be fully immersed in a specific space.In addition,the personal spaces where users work can also be arranged through the annular screen.According to the results of the performance evaluations,users participating in remote collaborative works can visualize the spaces of multiple users simultaneously and feel their presence,thereby increasing their understanding of the spaces.Moreover,the proposed system reduces the time to perform tasks and gain awareness of the emergency in remote workspaces.
基金funded by the Funding of Nanjing Institute of Technology No.JXGG2021017the National Natural Science Foundation of China No.61701221.
文摘Attribute-based encryption(ABE)is a technique used to encrypt data,it has the flexibility of access control,high security,and resistance to collusion attacks,and especially it is used in cloud security protection.However,a large number of bilinear mappings are used in ABE,and the calculation of bilinear pairing is time-consuming.So there is the problem of low efficiency.On the other hand,the decryption key is not uniquely associated with personal identification information,if the decryption key is maliciously sold,ABE is unable to achieve accountability for the user.In practical applications,shared message requires hierarchical sharing in most cases,in this paper,we present a message security hierarchy ABE scheme for this scenario.Firstly,attributes were grouped and weighted according to the importance of attributes,and then an access structure based on a threshold tree was constructed according to attribute weight.This method saved the computing time for decryption while ensuring security and on-demand access to information for users.In addition,with the help of computing power in the cloud,two-step decryption was used to complete the access,which relieved the computing and storage burden on the client side.Finally,we simulated and tested the scheme based on CP-ABE,and selected different security levels to test its performance.The security proof and the experimental simulation result showthat the proposed scheme has high efficiency and good performance,and the solution implements hierarchical access to the shared message.
文摘In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several security-related problems,such as user privacy breaches,data disclosure,data corruption,and so on,during the process of data outsourcing.For addressing and handling the security-related issues on Cloud,several models were proposed.With that concern,this paper develops a Privacy-Preserved Data Security Approach(PP-DSA)to provide the data security and data integrity for the out-sourcing data in Cloud Environment.Privacy preservation is ensured in this work with the Efficient Authentication Technique(EAT)using the Group Signature method that is applied with Third-Party Auditor(TPA).The role of the auditor is to secure the data and guarantee shared data integrity.Additionally,the Cloud Service Provider(CSP)and Data User(DU)can also be the attackers that are to be handled with the EAT.Here,the major objective of the work is to enhance cloud security and thereby,increase Quality of Service(QoS).The results are evaluated based on the model effectiveness,security,and reliability and show that the proposed model provides better results than existing works.
文摘China attaches great importance to food security.With the strong promotion of the government,Chinas grain output has achieved a great feat from"shortage"to"surplus in bumper years"and then to"rising steadily",achieving a record"increase for the tenth consecutive year".From the current balance of food supply and demand in China,the food security situation can be guaranteed on the whole.However,if we analyze the food security in China from the perspective of agricultural sustainable development strategy,there are some difficulties,such as the reduction of cultivated land area,the decline of cultivated land quality,the fragility of agricultural ecological environment,and the transformation of residentsconsumption structure.This paper analyzes the difficulties faced by the development of food security in China under the strategy of sustainable agricultural development,and puts forward that to implement the strategy of sustainable agricultural development,it is necessary to realize the coordinated development of food security,science and technology,ecological environment,resources and society.
文摘The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare.
文摘In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes.
文摘This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.
文摘The primary objective of this study was to design and size a sustainable sanitation solution for the Ndiebene Gandiol 1 school located in the eponymous commune in northern Senegal. Field investigations led to the collection of wastewater samples. Their analysis revealed specific pollutant loads, including loads of BOD5 3.6966 kgO<sub>2</sub>/day and COD of 12.8775 kgO<sub>2</sub>/day, which were central to the design phase. Following a rigorous assessment of the existing sanitation infrastructure, constructed wetland (CWs) emerged as the most appropriate ecological solution. This system, valued for its ability to effectively remove contaminants, was tailored to the specific needs of the site. Consequently, the final design of the filter extends over 217.16 m<sup>2</sup>, divided into two cells of 108.58 m<sup>2</sup> each, with dimensions of 12.77 m in length and 8.5 m in width. The depth of the filtering medium is approximately 0.60 m, meeting the standards while ensuring maximized purification. Typha, an indigenous and prolific plant known for its purification abilities, was selected as the filtering agent. Concurrently, non-crushed gravel was chosen for its proven filtration capacity. This study is the result of a combination of scientific rigor and design expertise. It provides a holistic view of sanitation for Ndiebene Gandiol. The technical specifications and dimensions of the constructed wetland filter embody an approach that marries indepth analysis and practical application, all aimed at delivering an effective and long-lasting solution to the local sanitation challenges. By integrating precise scientific data with sanitation design expertise, this study delivers a holistic solution for Ndiebene Gandiol. The detailed dimensions and specifications of the constructed wetland filter reflect a methodology that combines meticulous analysis with practical adaptation, aiming to provide an effective and sustainable response to the challenges of rural and school sanitation in the northern region of Senegal.
文摘Plantain is a food security crop of significant nutritional value in the global south. Yet there are significant post-harvest losses, especially at the senescent stage. This review seeks to give a general overview of the crop, its nutritional significance and the technologies that can be adopted to enhance its utilisation at its senescent stage. In West Africa, plantains are eaten at all ripening stages, yet processing is limited to the unripe and semi-ripe. Adoptable technologies such as foam-mat drying will enhance its utilisation in indigenous meals and other food applications. This review provides useful insight to optimize the use of plantain to prevent food waste.
基金This work is the result of commissioned research project supported by the Affiliated Institute of ETRI(2022-086)received by Junho AhnThis research was supported by the National Research Foundation of Korea(NRF)Basic Science Research Program funded by the Ministry of Education(No.2020R1A6A1A03040583)this work was supported by Korea Institute for Advancement of Technology(KIAT)Grant funded by the Korea government(MOTIE)(P0008691,HRD Program for Industrial Innovation).
文摘This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world software.The existing analysis of software security vulnerabilities often focuses on specific features or modules.This partial and arbitrary analysis of the security vulnerabilities makes it challenging to comprehend the overall security vulnerabilities of the software.The key novelty lies in overcoming the constraints of partial approaches.The proposed framework utilizes data from various sources to create a comprehensive functionality profile,facilitating the derivation of real-world security guidelines.Security guidelines are dynamically generated by associating functional security vulnerabilities with the latest Common Vulnerabilities and Exposure(CVE)and Common Vulnerability Scoring System(CVSS)scores,resulting in automated guidelines tailored to each product.These guidelines are not only practical but also applicable in real-world software,allowing for prioritized security responses.The proposed framework is applied to virtual private network(VPN)software,wherein a validated Level 2 data flow diagram is generated using the Spoofing,Tampering,Repudiation,Information Disclosure,Denial of Service,and Elevation of privilege(STRIDE)technique with references to various papers and examples from related software.The analysis resulted in the identification of a total of 121 vulnerabilities.The successful implementation and validation demonstrate the framework’s efficacy in generating customized guidelines for entire systems,subsystems,and selected modules.
文摘In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic methods face increasingly sophisticated challenges.This article initiates an exploration into these challenges,focusing on key exchanges(encompassing their variety and subtleties),scalability,and the time metrics associated with various cryptographic processes.We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering.Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity,foundational pillars of information security.Our method employs a phased strategy,beginning with a detailed examination of traditional cryptographic processes,including Elliptic Curve Diffie-Hellman(ECDH)key exchanges.We also delve into encrypt/decrypt paradigms,signature generation modes,and the hashes used for Message Authentication Codes(MACs).Each process is rigorously evaluated for performance and reliability.To gain a comprehensive understanding,a meticulously designed simulation was conducted,revealing the strengths and potential improvement areas of various techniques.Notably,our cryptographic protocol achieved a confidentiality metric of 9.13 in comprehensive simulation runs,marking a significant advancement over existing methods.Furthermore,with integrity metrics at 9.35,the protocol’s resilience is further affirmed.These metrics,derived from stringent testing,underscore the protocol’s efficacy in enhancing data security.
文摘The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potential security risks that malicious actors can exploit. QR code Phishing, or “Quishing”, is a type of phishing attack that leverages QR codes to deceive individuals into visiting malicious websites or downloading harmful software. These attacks can be particularly effective due to the growing popularity and trust in QR codes. This paper examines the importance of enhancing the security of QR codes through the utilization of artificial intelligence (AI). The abstract investigates the integration of AI methods for identifying and mitigating security threats associated with QR code usage. By assessing the current state of QR code security and evaluating the effectiveness of AI-driven solutions, this research aims to propose comprehensive strategies for strengthening QR code technology’s resilience. The study contributes to discussions on secure data encoding and retrieval, providing valuable insights into the evolving synergy between QR codes and AI for the advancement of secure digital communication.
基金supported by the National Natural Science Foundation of China (Grant Nos. 12274373 and 12004341)the Open Project of Inner Mongolia Key Laboratory of High-pressure Phase Functional Materials,Chifeng University (Grant No. cfxygy202301)+1 种基金the Science and Technology Project of Xilinguole Province (Grant No. 202209)the Natural Science Foundation of Henan Province (Grant No. 242300421155)。
文摘The regulating nitrogen content of diamond in a hydrogen-rich high-temperature and high-pressure(HPHT) growth environment was systematically investigated in this work by developing three growth systems,namely, "FeNi+Ti", "FeNi+G_(3)N_(6)H_(6)",and "FeNi+Ti+C_(3)N_(6)H_(6)".Optical microscopy,infrared spectroscopy,and photoluminescence(PL)spectroscopy measurements were conducted to analyze the spectroscopic characteristics of diamonds grown in these three systems.From our analysis,it was demonstrated that the presence of hydrogen in the sp^(3) hybrid C-H does not directly affect the color of the diamond and facilitates the increase of the nitrogen-vacancy(NV) center concentration in a highnitrogen-content diamond.In addition,titanium plays an important role in nitrogen removal,while its impact on hydrogen doping within the diamond lattice is insignificant.Most importantly,by regulating the ratio of nitrogen impurities that coexist in the nitrogen and hydrogen HPHT environment,the production of hydrogenous Ⅱa-type diamond,hydrogenous Ib-type diamond,and hydrogenous high-nitrogen-type diamonds was achieved with a nitrogen content of less than 1 ppm to 1600 ppm.
基金supported in part by the National Natural Science Foundation of China (62072248, 62072247)the Jiangsu Agriculture Science and Technology Innovation Fund (CX(21)3060)。
文摘Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT.
文摘Introduction: Food security is one of the greatest challenges that most African countries face. It is a concept that considers not only food quantity but also food quality. The objective of this study was to describe dietary diversity and food security status at the individual level in Cameroonian populations. Methods: A total of 1180 men and women aged 20 and over and living in the West, North West, and Littoral regions of Cameroon were recruited. Data on dietary habits were collected through the frequency of consumption of various food groups. Dietary diversity was assessed using a 24-hour dietary recall. Food security status was determined by combining two indicators (food consumption score and individual food diversity score). Results: The mean dietary diversity score of the population was 3.53 ± 1.44, p Conclusion: The diet diversity of adults living in the West, North West, and Littoral regions of Cameroon is medium. Although half of the study population was food secure, there is a need to implement food security policies further to reduce food insecurity among the Cameroonian population.