期刊文献+
共找到250,944篇文章
< 1 2 250 >
每页显示 20 50 100
Food Security Problems and Solutions in China Based on the Strategy of Sustainable Agricultural Development
1
作者 Chongzhe JIAO 《Asian Agricultural Research》 2024年第2期16-17,30,共3页
China attaches great importance to food security.With the strong promotion of the government,Chinas grain output has achieved a great feat from"shortage"to"surplus in bumper years"and then to"... China attaches great importance to food security.With the strong promotion of the government,Chinas grain output has achieved a great feat from"shortage"to"surplus in bumper years"and then to"rising steadily",achieving a record"increase for the tenth consecutive year".From the current balance of food supply and demand in China,the food security situation can be guaranteed on the whole.However,if we analyze the food security in China from the perspective of agricultural sustainable development strategy,there are some difficulties,such as the reduction of cultivated land area,the decline of cultivated land quality,the fragility of agricultural ecological environment,and the transformation of residentsconsumption structure.This paper analyzes the difficulties faced by the development of food security in China under the strategy of sustainable agricultural development,and puts forward that to implement the strategy of sustainable agricultural development,it is necessary to realize the coordinated development of food security,science and technology,ecological environment,resources and society. 展开更多
关键词 Sustainable development Food security Ecological environment
下载PDF
Global Change in Agricultural Flash Drought over the 21st Century 被引量:1
2
作者 Emily BLACK 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第2期209-220,I0002-I0019,共30页
Agricultural flash droughts are high-impact phenomena, characterized by rapid soil moisture dry down. The ensuing dry conditions can persist for weeks to months, with detrimental effects on natural ecosystems and crop... Agricultural flash droughts are high-impact phenomena, characterized by rapid soil moisture dry down. The ensuing dry conditions can persist for weeks to months, with detrimental effects on natural ecosystems and crop cultivation. Increases in the frequency of these rare events in a future warmer climate would have significant societal impact. This study uses an ensemble of 10 Coupled Model Intercomparison Project(CMIP) models to investigate the projected change in agricultural flash drought during the 21st century. Comparison across geographical regions and climatic zones indicates that individual events are preceded by anomalously low relative humidity and precipitation, with long-term trends governed by changes in temperature, relative humidity, and soil moisture. As a result of these processes, the frequency of both upperlevel and root-zone flash drought is projected to more than double in the mid-and high latitudes over the 21st century, with hot spots developing in the temperate regions of Europe, and humid regions of South America, Europe, and southern Africa. 展开更多
关键词 flash drought climate change soil moisture agricultural drought CMIP
下载PDF
Repositioning fertilizer manufacturing subsidies for improving food security and reducing greenhouse gas emissions in China 被引量:1
3
作者 Zongyi Wu Xiaolong Feng +1 位作者 Yumei Zhang Shenggen Fan 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第2期430-443,共14页
China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the ... China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the environment remains inadequately evaluated.Moreover,although green and low-carbon technologies offer environmental advantages,their widespread adoption is hindered by prohibitively high costs.This study analyzes the impact of removing fertilizer manufacturing subsidies and explores the potential feasibility of redirecting fertilizer manufacturing subsidies to invest in the diffusion of these technologies.Utilizing the China Agricultural University Agri-food Systems model,we analyzed the potential for achieving mutually beneficial outcomes regarding food security and environmental sustainability.The findings indicate that removing fertilizer manufacturing subsidies has reduced greenhouse gas(GHG)emissions from agricultural activities by 3.88 million metric tons,with minimal impact on food production.Redirecting fertilizer manufacturing subsidies to invest in green and low-carbon technologies,including slow and controlled-release fertilizer,organic-inorganic compound fertilizers,and machine deep placement of fertilizer,emerges as a strategy to concurrently curtail GHG emissions,ensure food security,and secure robust economic returns.Finally,we propose a comprehensive set of government interventions,including subsidies,field guidance,and improved extension systems,to promote the widespread adoption of these technologies. 展开更多
关键词 food security fertilizer manufacturing subsidies agri-food systems greenhouse gas emissions
下载PDF
Security Analysis in Smart Agriculture: Insights from a Cyber-Physical System Application
4
作者 Ahmed Redha Mahlous 《Computers, Materials & Continua》 SCIE EI 2024年第6期4781-4803,共23页
Smart agriculture modifies traditional farming practices,and offers innovative approaches to boost production and sustainability by leveraging contemporary technologies.In today’s world where technology is everything... Smart agriculture modifies traditional farming practices,and offers innovative approaches to boost production and sustainability by leveraging contemporary technologies.In today’s world where technology is everything,these technologies are utilized to streamline regular tasks and procedures in agriculture,one of the largest and most significant industries in every nation.This research paper stands out from existing literature on smart agriculture security by providing a comprehensive analysis and examination of security issues within smart agriculture systems.Divided into three main sections-security analysis,system architecture and design and risk assessment of Cyber-Physical Systems(CPS)applications-the study delves into various elements crucial for smart farming,such as data sources,infrastructure components,communication protocols,and the roles of different stakeholders such as farmers,agricultural scientists and researchers,technology providers,government agencies,consumers and many others.In contrast to earlier research,this work analyzes the resilience of smart agriculture systems using approaches such as threat modeling,penetration testing,and vulnerability assessments.Important discoveries highlight the concerns connected to unsecured communication protocols,possible threats from malevolent actors,and vulnerabilities in IoT devices.Furthermore,the study suggests enhancements for CPS applications,such as strong access controls,intrusion detection systems,and encryption protocols.In addition,risk assessment techniques are applied to prioritize mitigation tactics and detect potential hazards,addressing issues like data breaches,system outages,and automated farming process sabotage.The research sets itself apart even more by presenting a prototype CPS application that makes use of a digital temperature sensor.This application was first created using a Tinkercad simulator and then using actual hardware with Arduino boards.The CPS application’s defenses against potential threats and vulnerabilities are strengthened by this integrated approach,which distinguishes this research for its depth and usefulness in the field of smart agriculture security. 展开更多
关键词 Smart agriculture cyber-physical system IoT security temperature sensor threats VULNERABILITIES
下载PDF
Spatio-temporal variation and relationship between agricultural efficiency and irrigation intensity in a semi-arid region of India
5
作者 Shibu DAS Kaushal Kumar SHARMA +2 位作者 Suranjan MAJUMDER Debabrata DAS Indrajit Roy CHOWDHURY 《Regional Sustainability》 2024年第2期123-139,共17页
A surging population in Karnataka State,a semi-arid region in India,poses a threat to both food security and livelihood sustainability,necessitating a concentrated effort to bolster agricultural efficiency and achieve... A surging population in Karnataka State,a semi-arid region in India,poses a threat to both food security and livelihood sustainability,necessitating a concentrated effort to bolster agricultural efficiency and achieve United Naton’s Sustainable Development Goal 2(zero hunger).Therefore,in order to address the pressing issue of food scarcity in Karnataka,this study meticulously examined the spatio-temporal variation of agricultural efficiency and irrigation intensity in Karnataka,uncovering its significant dependence of agricultural efficiency on irrigation intensity.Specifically,this study used a one-way analysis of variance(ANOVA)to ascertain significant differences in the means of agricultural efficiency and irrigation intensity during 2004-2005 and 2018-2019.This study showed that the maximum improvement in agricultural efficiency index was recorded in Belgaum(40.24),Gulbarga(24.77),and Yadgir districts(22.92)between 2004-2005 and 2018-2019,which indicated the progressing trend and better scope for agriculture extension.On the contrary,some districts expressed threat(a decline of above 20.00 of agricultural efficiency index)and needed special care for the improvement of agricultural efficiency in four northern districts(Bagalkot,Bidar,Raichur,and Bijapur),three southern districts(Chitradurga,Chikballapur and Hassan),and two southern districts(Koppal and Gadag)in Karnataka.During 2004-2005,irrigation intensity varied from 3.19%to 56.39%,with the lowest irrigation intensity in Kodagu District and the highest irrigation intensity in Shimoga District.During 2018-2019,irrigation intensity changed from 0.77%to 72.77%,with the lowest irrigation intensity in Kodagu District and the highest in Dakshin Kannad District.Moreover,the research scrutinized the complex relationship between agricultural efficiency and irrigation intensity,with the correlation coefficient increased from 0.162 during 2004-2005 to 0.255 during 2018-2019.It implies that in both periods,a low positive correlation existed between these two variables.Over time,several factors(high-yield seeds and chemical fertilizers)other than irrigation intensity gradually became essential for agricultural efficiency.This research offers a wealth of valuable insights for regional planners and policy-makers contending with comparable challenges in various regions of India and other developing countries. 展开更多
关键词 agricultural efficiency Irrigation intensity One-way analysis of variance(ANOVA) Food security KARNATAKA
下载PDF
Enhancing Cybersecurity Competency in the Kingdom of Saudi Arabia:A Fuzzy Decision-Making Approach
6
作者 Wajdi Alhakami 《Computers, Materials & Continua》 SCIE EI 2024年第5期3211-3237,共27页
The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual user... The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare. 展开更多
关键词 Cyber security fuzzy DMTAEL security policy cyber crime MCDM
下载PDF
Evolving patterns of agricultural production space in China:A network-based approach
7
作者 Shuhui Yang Zhongkai Li +2 位作者 Jianlin Zhou Yancheng Gao Xuefeng Cui 《Geography and Sustainability》 CSCD 2024年第1期121-134,共14页
The agricultural production space,as where and how much each agricultural product grows,plays a vital role in meeting the increasing and diverse food demands.Previous studies on agricultural production patterns have p... The agricultural production space,as where and how much each agricultural product grows,plays a vital role in meeting the increasing and diverse food demands.Previous studies on agricultural production patterns have predominantly centered on individual or specific crop types,using methods such as remote sensing or statistical metrological analysis.In this study,we characterize the agricultural production space(APS)by bipartite network connecting agricultural products and provinces,to reveal the relatedness between diverse agricultural products and the spatiotemporal characteristic of provincial production capabilities in China.The results show that core products are cereal,pork,melon,and pome fruit;meanwhile the milk,grape,and fiber crop show an upward trend in centrality,which is in line with diet structure changes in China over the past decades.The little changes in community components and structures of agricultural products and provinces reveal that agricultural production patterns in China are relatively stable.Additionally,identified provincial communities closely resemble China's agricultural natural zones.Furthermore,the observed growth in production capabilities in North and Northeast China implies their potential focus areas for future agricultural production.Despite the superior production capa-bilities of southern provinces,recent years have witnessed a notable decline,warranting special attentions.The findings provide a comprehensive perspective for understanding the complex relationship of agricultural prod-ucts'relatedness,production capabilities and production patterns,which serve as a reference for the agricultural spatial optimization and agricultural sustainable development. 展开更多
关键词 agricultural system Complex network agricultural production space Proximity matrix Production capability
下载PDF
A Practical Regular LDPC Coded Scheme for Physical-Layer Information Security
8
作者 Du Junyi 《China Communications》 SCIE CSCD 2024年第5期190-201,共12页
In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured L... In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes. 展开更多
关键词 extrinsic information transfer function physical layer scheme secure open channel security gap
下载PDF
Information Security in the Cloud: Emerging Trends and Challenges
9
作者 Keerthana Chitreddy Andrew Mikhl Anthony +1 位作者 Chinna Manikanta Bandaru Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第5期69-80,共12页
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering... This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective. 展开更多
关键词 Cloud Computing Information security Cloud Infrastructure Offerings Cloud Migration security Measures Data Breaches Cloud Service Providers CYBERsecurity Cloud security Case Studies Cloud Threat Landscape Data Encryption COMPLIANCE Cloud security Tools
下载PDF
Agricultural intensity for sustainable regional development:A case study in peri-urban areas of Karawang Regency,Indonesia
10
作者 Setyardi Pratika MULYA Delik HUDALAH 《Regional Sustainability》 2024年第1期119-136,共18页
Peri-urban areas are playing an increasingly crucial role in the agricultural development and intensification in Indonesia.Peri-urban agriculture is highly vulnerable to change compared with urban and rural agricultur... Peri-urban areas are playing an increasingly crucial role in the agricultural development and intensification in Indonesia.Peri-urban agriculture is highly vulnerable to change compared with urban and rural agriculture,due to its location in transitional areas.Indicators of peri-urban agricultural intensity can help guide regional development.In this study,we assessed the sustainability of peri-urban areas based on agricultural intensity in Karawang Regency,Indonesia.We developed a village-based index to assess the region’s agricultural intensity by rescaling the village agriculture index(VAI)and combining the local sustainability index(LSI)with factor analysis.Since the unit of analysis is the village,we modified the LSI to the village sustainability index(VSI).In addition,we also developed a logical matrix analysis to determine the level of agricultural sustainability(LoAS)of each village.The combined results of the three indices(VAI,VSI,and LoAS)generated information about agricultural sustainability.The results indicated that peri-urban villages with high agricultural intensity tended to exhibit low levels of social welfare,economic development,and disaster risk.Moreover,high agricultural intensity did not necessarily ensure the prosperity of the people.Instead,there was the economic disparity among the villages in the study area.Encouraging diversity of agricultural intensity seems to be more critical than promoting agricultural intensity itself.Overall,this study highlights the distinctive characteristics and dynamic of peri-urban areas.New approaches,variables,and information regarding the combination of agricultural intensity and sustainability need to be developed as valuable tools for regional planning. 展开更多
关键词 agricultural intensity Village agriculture index(VAI) Village sustainability index(VSI) Level of agricultural sustainability(LoAS) Peri-urban areas Indonesia
下载PDF
The Role of Plantain in Promoting Food Security: A Review
11
作者 Doreen Dedo Adi 《Food and Nutrition Sciences》 CAS 2024年第5期313-335,共23页
Plantain is a food security crop of significant nutritional value in the global south. Yet there are significant post-harvest losses, especially at the senescent stage. This review seeks to give a general overview of ... Plantain is a food security crop of significant nutritional value in the global south. Yet there are significant post-harvest losses, especially at the senescent stage. This review seeks to give a general overview of the crop, its nutritional significance and the technologies that can be adopted to enhance its utilisation at its senescent stage. In West Africa, plantains are eaten at all ripening stages, yet processing is limited to the unripe and semi-ripe. Adoptable technologies such as foam-mat drying will enhance its utilisation in indigenous meals and other food applications. This review provides useful insight to optimize the use of plantain to prevent food waste. 展开更多
关键词 Food security PLANTAIN Foam-Mat Drying RIPENING
下载PDF
Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis
12
作者 Dahyeon Kim Namgi Kim Junho Ahn 《Computers, Materials & Continua》 SCIE EI 2024年第3期3867-3889,共23页
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world sof... This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world software.The existing analysis of software security vulnerabilities often focuses on specific features or modules.This partial and arbitrary analysis of the security vulnerabilities makes it challenging to comprehend the overall security vulnerabilities of the software.The key novelty lies in overcoming the constraints of partial approaches.The proposed framework utilizes data from various sources to create a comprehensive functionality profile,facilitating the derivation of real-world security guidelines.Security guidelines are dynamically generated by associating functional security vulnerabilities with the latest Common Vulnerabilities and Exposure(CVE)and Common Vulnerability Scoring System(CVSS)scores,resulting in automated guidelines tailored to each product.These guidelines are not only practical but also applicable in real-world software,allowing for prioritized security responses.The proposed framework is applied to virtual private network(VPN)software,wherein a validated Level 2 data flow diagram is generated using the Spoofing,Tampering,Repudiation,Information Disclosure,Denial of Service,and Elevation of privilege(STRIDE)technique with references to various papers and examples from related software.The analysis resulted in the identification of a total of 121 vulnerabilities.The successful implementation and validation demonstrate the framework’s efficacy in generating customized guidelines for entire systems,subsystems,and selected modules. 展开更多
关键词 FRAMEWORK AUTOMATION vulnerability analysis security GUIDELINES
下载PDF
Enhancing Security in QR Code Technology Using AI: Exploration and Mitigation Strategies
13
作者 Saranya Vaithilingam Santhosh Aradhya Mohan Shankar 《International Journal of Intelligence Science》 2024年第2期49-57,共9页
The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potentia... The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potential security risks that malicious actors can exploit. QR code Phishing, or “Quishing”, is a type of phishing attack that leverages QR codes to deceive individuals into visiting malicious websites or downloading harmful software. These attacks can be particularly effective due to the growing popularity and trust in QR codes. This paper examines the importance of enhancing the security of QR codes through the utilization of artificial intelligence (AI). The abstract investigates the integration of AI methods for identifying and mitigating security threats associated with QR code usage. By assessing the current state of QR code security and evaluating the effectiveness of AI-driven solutions, this research aims to propose comprehensive strategies for strengthening QR code technology’s resilience. The study contributes to discussions on secure data encoding and retrieval, providing valuable insights into the evolving synergy between QR codes and AI for the advancement of secure digital communication. 展开更多
关键词 Artificial Intelligence Cyber security QR Codes Quishing AI Framework Machine Learning AI-Enhanced security
下载PDF
Security and Privacy in Solar Insecticidal Lamps Internet of Things:Requirements and Challenges
14
作者 Qingsong Zhao Lei Shu +3 位作者 Kailiang Li Mohamed Amine Ferrag Ximeng Liu Yanbin Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期58-73,共16页
Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the... Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT. 展开更多
关键词 CHALLENGES Internet of Things(IoT) privacy and security security requirements solar insecticidal lamps(SIL)
下载PDF
A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security
15
作者 Fauziyah Zhaoshun Wang Mujahid Tabassum 《Computers, Materials & Continua》 SCIE EI 2024年第3期4417-4452,共36页
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic method... In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic methods face increasingly sophisticated challenges.This article initiates an exploration into these challenges,focusing on key exchanges(encompassing their variety and subtleties),scalability,and the time metrics associated with various cryptographic processes.We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering.Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity,foundational pillars of information security.Our method employs a phased strategy,beginning with a detailed examination of traditional cryptographic processes,including Elliptic Curve Diffie-Hellman(ECDH)key exchanges.We also delve into encrypt/decrypt paradigms,signature generation modes,and the hashes used for Message Authentication Codes(MACs).Each process is rigorously evaluated for performance and reliability.To gain a comprehensive understanding,a meticulously designed simulation was conducted,revealing the strengths and potential improvement areas of various techniques.Notably,our cryptographic protocol achieved a confidentiality metric of 9.13 in comprehensive simulation runs,marking a significant advancement over existing methods.Furthermore,with integrity metrics at 9.35,the protocol’s resilience is further affirmed.These metrics,derived from stringent testing,underscore the protocol’s efficacy in enhancing data security. 展开更多
关键词 CRYPTOGRAPHIC security privacy preservation DECRYPTION INTEGRITY
下载PDF
NFT Security Matrix:Towards Modeling NFT Ecosystem Threat
16
作者 Peng Liao Chaoge Liu +2 位作者 Jie Yin Zhi Wang Xiang Cui 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期3255-3285,共31页
Digital assets have boomed over the past few years with the emergence of Non-fungible Tokens(NFTs).To be specific,the total trading volume of digital assets reached an astounding$55.5 billion in 2022.Nevertheless,nume... Digital assets have boomed over the past few years with the emergence of Non-fungible Tokens(NFTs).To be specific,the total trading volume of digital assets reached an astounding$55.5 billion in 2022.Nevertheless,numerous security concerns have been raised by the rapid expansion of the NFT ecosystem.NFT holders are exposed to a plethora of scams and traps,putting their digital assets at risk of being lost.However,academic research on NFT security is scarce,and the security issues have aroused rare attention.In this study,the NFT ecological process is comprehensively explored.This process falls into five different stages encompassing the entire lifecycle of NFTs.Subsequently,the security issues regarding the respective stage are elaborated and analyzed in depth.A matrix model is proposed as a novel contribution to the categorization of NFT security issues.Diverse data are collected from social networks,the Ethereum blockchain,and NFT markets to substantiate our claims regarding the severity of security concerns in the NFT ecosystem.From this comprehensive dataset,nine key NFT security issues are identified from the matrix model and then subjected to qualitative and quantitative analysis.This study aims to shed light on the severity of NFT ecosystem security issues.The findings stress the need for increased attention and proactive measures to safeguard the NFT ecosystem. 展开更多
关键词 Non-fungible token blockchain cyber security
下载PDF
A Review on the Security of the Ethereum-Based DeFi Ecosystem
17
作者 Yue Xue Dunqiu Fan +4 位作者 Shen Su Jialu Fu Ning Hu Wenmao Liu Zhihong Tian 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第4期69-101,共33页
Decentralized finance(DeFi)is a general term for a series of financial products and services.It is based on blockchain technology and has attracted people’s attention because of its open,transparent,and intermediary ... Decentralized finance(DeFi)is a general term for a series of financial products and services.It is based on blockchain technology and has attracted people’s attention because of its open,transparent,and intermediary free.Among them,the DeFi ecosystem based on Ethereum-based blockchains attracts the most attention.However,the current decentralized financial system built on the Ethereum architecture has been exposed to many smart contract vulnerabilities during the last few years.Herein,we believe it is time to improve the understanding of the prevailing Ethereum-based DeFi ecosystem security issues.To that end,we investigate the Ethereum-based DeFi security issues:1)inherited from the real-world financial system,which can be solved by macro-control;2)induced by the problems of blockchain architecture,which require a better blockchain platform;3)caused by DeFi invented applications,which should be focused on during the project development.Based on that,we further discuss the current solutions and potential directions ofDeFi security.According to our research,we could provide a comprehensive vision to the research community for the improvement of Ethereum-basedDeFi ecosystem security. 展开更多
关键词 Blockchain smart contract decentralized finance DeFi security
下载PDF
Soybean maize strip intercropping:A solution for maintaining food security in China
18
作者 Jiang Liu Wenyu Yang 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第7期2503-2506,共4页
The practice of intercropping leguminous and gramineous crops is used for promoting sustainable agriculture,optimizing resource utilization,enhancing biodiversity,and reducing reliance on petroleum products.However,pr... The practice of intercropping leguminous and gramineous crops is used for promoting sustainable agriculture,optimizing resource utilization,enhancing biodiversity,and reducing reliance on petroleum products.However,promoting conventional intercropping strategies in modern agriculture can prove challenging.The innovative technology of soybean maize strip intercropping(SMSI)has been proposed as a solution.This system has produced remarkable results in improving domestic soybean and maize production for both food security and sustainable agriculture.In this article,we provide an overview of SMSI and explain how it differs from traditional intercropping.We also discuss the core principles that foster higher yields and the prospects for its future development. 展开更多
关键词 strip intercropping food security SOYBEAN MAIZE spatial arrangement
下载PDF
Intelligent Solution System for Cloud Security Based on Equity Distribution:Model and Algorithms
19
作者 Sarah Mustafa Eljack Mahdi Jemmali +3 位作者 Mohsen Denden Mutasim Al Sadig Abdullah M.Algashami Sadok Turki 《Computers, Materials & Continua》 SCIE EI 2024年第1期1461-1479,共19页
In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding ... In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding the risk of data loss and data overlapping.The development of data flow scheduling approaches in the cloud environment taking security parameters into account is insufficient.In our work,we propose a data scheduling model for the cloud environment.Themodel is made up of three parts that together help dispatch user data flow to the appropriate cloudVMs.The first component is the Collector Agent whichmust periodically collect information on the state of the network links.The second one is the monitoring agent which must then analyze,classify,and make a decision on the state of the link and finally transmit this information to the scheduler.The third one is the scheduler who must consider previous information to transfer user data,including fair distribution and reliable paths.It should be noted that each part of the proposedmodel requires the development of its algorithms.In this article,we are interested in the development of data transfer algorithms,including fairness distribution with the consideration of a stable link state.These algorithms are based on the grouping of transmitted files and the iterative method.The proposed algorithms showthe performances to obtain an approximate solution to the studied problem which is an NP-hard(Non-Polynomial solution)problem.The experimental results show that the best algorithm is the half-grouped minimum excluding(HME),with a percentage of 91.3%,an average deviation of 0.042,and an execution time of 0.001 s. 展开更多
关键词 Cyber-security cloud computing cloud security ALGORITHMS HEURISTICS
下载PDF
Thoughts on Pairing Assistance to Tibet for Promoting Agricultural High-quality Development in Southern Tibet from the Perspective of Agricultural Power
20
作者 Zhiguo SUN Li GAO +3 位作者 Yuanpeng SUN Guangchao CAO Xinying ZHOU Xiaoqiang LI 《Asian Agricultural Research》 2024年第3期18-24,共7页
In the new era,there is an urgent need to further promote pairing assistance to Tibet,promote the simultaneous construction of a strong agriculture in Tibet and the China's Mainland,and compose a Chinese-style mod... In the new era,there is an urgent need to further promote pairing assistance to Tibet,promote the simultaneous construction of a strong agriculture in Tibet and the China's Mainland,and compose a Chinese-style modernization.Southern Tibet,located in the southeastern part of the Tibet Autonomous Region,includes Shannan City and Nyingchi City,is a region assisted by four provincial partners including Hubei Province.This paper introduces the agricultural environment in southern Tibet,studies its agricultural characteristics,and analyzes the main issues of its pairing assistance.Taking forging the strong consciousness of the Chinese national community as the main line,the paper explores strategies for promoting agricultural high-quality development in southern Tibet through pairing assistance to Tibet from the perspective of agricultural power,and proposes some strategies,such as inheriting agricultural cultural heritage,promoting the upgrading of modern seed industry,enhancing the characteristic advantages of highland barley(naked barley)and animal husbandry industries,and developing edible fungi and cold water fish industries. 展开更多
关键词 PAIRING ASSISTANCE to TIBET Southern TIBET Shannan CITY Nyingchi CITY agricultural high-quality development agricultural power
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部