Air pollution negatively impacts food security. This paper reviews the current literature on the relationship between air pollution and food security from the perspective of food system. It highlights that agricultura...Air pollution negatively impacts food security. This paper reviews the current literature on the relationship between air pollution and food security from the perspective of food system. It highlights that agricultural emissions which substantially contribute to air pollution could happen at every stage along the food supply chain. Meanwhile, air pollution can not only affect plant growth and animal health but also shift market equilibrium of both agro-inputs and outputs in the food supply chain and thereby affect food security indirectly. Furthermore, this study evaluates the effects of agricultural policy and energy policy on food security and air pollution, respectively, and provides an overview of potential policy instruments to reduce air pollution while ensuring food security. Finally, we identify the remaining research and policy issues for further studies, mainly focusing on the study of household's bounded rational behaviors and the issue of rural aging population.展开更多
In order to overcome defects in existing ASCTS(Agricultural Supply Chain Traceability System,a new traceability system based on Multi-Agent System(MAS) is put forward.By qualitative method,I analyze problems of applic...In order to overcome defects in existing ASCTS(Agricultural Supply Chain Traceability System,a new traceability system based on Multi-Agent System(MAS) is put forward.By qualitative method,I analyze problems of application of Agent technology in tracing quality of agricultural products.Physical model is built for this system and structure of traceability system is determined.Finally,algorithm is presented for major entities.From analysis of algorithm,it is proved that this system has some reference value in improving breadth and depth of product traceability.展开更多
During the 11th Five-year Plan period, China's agricultural productivity improved on all levels; the contribution rate of technologies to agriculture rose steadily, the agricultural service system was gradually resto...During the 11th Five-year Plan period, China's agricultural productivity improved on all levels; the contribution rate of technologies to agriculture rose steadily, the agricultural service system was gradually restored and agricultural policy regimes were consummated. However, China's sustainable agricultural development faces severe tests such as agri-tech "short slabs" and poor collaborative operation. The 12'h Five- year Plan period will bring both strategic opportunities and challenges. Brisker market demands and more agricultural inputs, a higher technical level and better policy regimes will drive development. On the other hand, agriculture will be confronted with more resource and environment constraints, fewer traditional comparative advantages and hidden hazards, etc. Over the next five years, China should stay its course to agricultural modernization based on its national conditions and the sustainable development concept and establish a "broad interpretation of grain security" to improve the productivity, risk- resistance capabilities and market competitiveness of its agricultural industry.展开更多
A secure scalar product protocol is a type of specific secure multi-party computation problem. Using this kind of protocol, two involved parties are able to jointly compute the scalar product of their private vectors...A secure scalar product protocol is a type of specific secure multi-party computation problem. Using this kind of protocol, two involved parties are able to jointly compute the scalar product of their private vectors:, but no party will reveal any information about his/her private vector to another one. The secure scalar product protocol is of great importance in many privacy-preserving applications such as privacy-preserving data mining, privacy-preserving cooperative statistical analysis, and privacy-preserving geometry computation. In this paper, we give an efficient and secure scalar product protocol in the presence of malicious adversaries based on two important tools: the proof of knowledge of a discrete logarithm and the verifiable encryption. The security of the new protocol is proved under the standard simulation-based definitions. Compared with the existing schemes, our scheme offers higher efficiency because of avoiding inefficient cut-and-choose proofs.展开更多
基金funding supports from the National Natural Science Foundation of China (NSFC, 71473123 and 71633005)the German Research Foundation (DFG, RTG1666)
文摘Air pollution negatively impacts food security. This paper reviews the current literature on the relationship between air pollution and food security from the perspective of food system. It highlights that agricultural emissions which substantially contribute to air pollution could happen at every stage along the food supply chain. Meanwhile, air pollution can not only affect plant growth and animal health but also shift market equilibrium of both agro-inputs and outputs in the food supply chain and thereby affect food security indirectly. Furthermore, this study evaluates the effects of agricultural policy and energy policy on food security and air pollution, respectively, and provides an overview of potential policy instruments to reduce air pollution while ensuring food security. Finally, we identify the remaining research and policy issues for further studies, mainly focusing on the study of household's bounded rational behaviors and the issue of rural aging population.
基金Supported by National Natural Science Foundation of China(71071001)
文摘In order to overcome defects in existing ASCTS(Agricultural Supply Chain Traceability System,a new traceability system based on Multi-Agent System(MAS) is put forward.By qualitative method,I analyze problems of application of Agent technology in tracing quality of agricultural products.Physical model is built for this system and structure of traceability system is determined.Finally,algorithm is presented for major entities.From analysis of algorithm,it is proved that this system has some reference value in improving breadth and depth of product traceability.
文摘During the 11th Five-year Plan period, China's agricultural productivity improved on all levels; the contribution rate of technologies to agriculture rose steadily, the agricultural service system was gradually restored and agricultural policy regimes were consummated. However, China's sustainable agricultural development faces severe tests such as agri-tech "short slabs" and poor collaborative operation. The 12'h Five- year Plan period will bring both strategic opportunities and challenges. Brisker market demands and more agricultural inputs, a higher technical level and better policy regimes will drive development. On the other hand, agriculture will be confronted with more resource and environment constraints, fewer traditional comparative advantages and hidden hazards, etc. Over the next five years, China should stay its course to agricultural modernization based on its national conditions and the sustainable development concept and establish a "broad interpretation of grain security" to improve the productivity, risk- resistance capabilities and market competitiveness of its agricultural industry.
基金This work was supported by the National Natural Science Foundation of China under Grant Nos. 60973134, 61173164, 61003232, and the Natural Science Foundation of Guangdong Province of China under Grant No. 10351806001000000.
文摘A secure scalar product protocol is a type of specific secure multi-party computation problem. Using this kind of protocol, two involved parties are able to jointly compute the scalar product of their private vectors:, but no party will reveal any information about his/her private vector to another one. The secure scalar product protocol is of great importance in many privacy-preserving applications such as privacy-preserving data mining, privacy-preserving cooperative statistical analysis, and privacy-preserving geometry computation. In this paper, we give an efficient and secure scalar product protocol in the presence of malicious adversaries based on two important tools: the proof of knowledge of a discrete logarithm and the verifiable encryption. The security of the new protocol is proved under the standard simulation-based definitions. Compared with the existing schemes, our scheme offers higher efficiency because of avoiding inefficient cut-and-choose proofs.