The third plenary session of the 20th Central Committee of the Communist Party of China(CPC)stressed that,to further deepen reform,we must adhere to systematic thinking and properly handle the relationship between dev...The third plenary session of the 20th Central Committee of the Communist Party of China(CPC)stressed that,to further deepen reform,we must adhere to systematic thinking and properly handle the relationship between development and security;furthermore,we must achieve positive interplay between high-quality development and high-level security to effectively ensure China's long-term stability.Ensuring both development and security is a major principle underlying the CPC's governance.This principle has been gradually established and enriched in the CPC's struggle to promote socio-economic development and safeguard national security.It is an important component of Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era,encapsulating the worldview and methodology of the CPC's innovative theories in the new era and realizing the dialectical unity of political security and economic security,a people-centered development philosophy and a people-oriented security philosophy,the fundamental approaches to development and the fundamental requirements of security,high-quality development and high-level security,and maintaining the initiative for development and enhancing security preparedness.Since the 18th CPC National Congress,the principle of ensuring both development and security has demonstrated great strength in guiding our thinking and promoting practical creativity,showing that the CPC's understanding of the dialectical relationship between development and security and its capacity to enhance security through development and ensure development through security have reached new heights.展开更多
Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"...Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"dark functions"such as system vulnerabilities and backdoors,and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels;rather,it is necessary to develop or utilize the endogenous security functions of the system architecture itself.In addition,this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace,introduces endogenous safety and security mechanisms and characteristics based on dynamic heterogeneous redundancy(DHR)architecture,and describes the theoretical implications of a coding channel based on DHR.展开更多
The weighing system designed for large structure object is mainly composed of three parts. The part of hydraulic system is made up of hydraulic cylinders, high pressure hydraulic hoses and electric pumps; the part of ...The weighing system designed for large structure object is mainly composed of three parts. The part of hydraulic system is made up of hydraulic cylinders, high pressure hydraulic hoses and electric pumps; the part of computer controlling system comprises pressure sensors, displacement sensors, data acquisitions, RS 485 network and the computer controlling model; the part of loading system is composed of the fulcrum structure and the concrete girder. The measurement principle and composition of the weighing system are discussed in this paper. Credibility and security of the weighing system are fully considered during the design phase. The hydraulic system is controlled by pilot operated check valves in case of the sudden loss of system pressure. The states of all gauges and RS485 network are monitored by computer controlling system functioning in different modules. When the system is running incorrectly, it will be switched to manual mode and give alarm. The finite element method is employed to analyze fulcrum structure so that the system has enough intensity to be lifted. Hence the reliability of the whole system is enhanced.展开更多
Important Dates Submission due November 15, 2005 Notification of acceptance December 30, 2005 Camera-ready copy due January 10, 2006 Workshop Scope Intelligence and Security Informatics (ISI) can be broadly defined as...Important Dates Submission due November 15, 2005 Notification of acceptance December 30, 2005 Camera-ready copy due January 10, 2006 Workshop Scope Intelligence and Security Informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications. The First and Second Symposiums on ISI were held in Tucson,Arizona,in 2003 and 2004,respectively. In 2005,the IEEE International Conference on ISI was held in Atlanta,Georgia. These ISI conferences have brought together academic researchers,law enforcement and intelligence experts,information technology consultant and practitioners to discuss their research and practice related to various ISI topics including ISI data management,data and text mining for ISI applications,terrorism informatics,deception detection,terrorist and criminal social network analysis,crime analysis,monitoring and surveillance,policy studies and evaluation,information assurance,among others. We continue this stream of ISI conferences by organizing the Workshop on Intelligence and Security Informatics (WISI’06) in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD’06). WISI’06 will provide a stimulating forum for ISI researchers in Pacific Asia and other regions of the world to exchange ideas and report research progress. The workshop also welcomes contributions dealing with ISI challenges specific to the Pacific Asian region.展开更多
The African economy,with average annual growth of 5%during 1995 to 2014,greatly interests investors but the current security situation hampers regional development and foreign direct investment.Investment in Africa ha...The African economy,with average annual growth of 5%during 1995 to 2014,greatly interests investors but the current security situation hampers regional development and foreign direct investment.Investment in Africa has featured high return and high risk historically,and it remains clear that no single entity can properly solve current security challenges that Africa faces.The moment calls for international joint collaboration and concerted effort on the part of China,the US and African countries.展开更多
The United States is launching an all-out crackdown against China in the name of competition,which has posed increasingly severe challenges to development and security in China.The strategic competition between China ...The United States is launching an all-out crackdown against China in the name of competition,which has posed increasingly severe challenges to development and security in China.The strategic competition between China and the United States is becoming an essential part of once-in-a-century changes that is shaping the world today.Under such circumstances,the Communist Party of China applies a holistic approach to national security,which aims to balance development and security as well as opening up and security.Furthermore,it intends to implement the national rejuvenation strategy within the wider context of once-ina-century global changes.Managing China’s affairs well to achieve a dynamic balance and positive interaction among high-quality development,high-level security,and high-standard opening-up can provide the basis for realizing the rejuvenation of the Chinese nation and response to containment by the United States.While fostering a new development paradigm,China advances scientific and technological innovation and pursues common prosperity.Moreover,it defends national security through firm but flexible struggles and promotes safe development by accelerating domestic circulation.However,China needs to control the costs of its security investment,pay equal attention to the risks and gains brought about by its opening-up policy,and,thus,enhance its capability to compete with the United States in the long term.展开更多
China has always placed great importance on the relationship between development and security. Since the founding of the People’s Republic in 1949, China has been modifying its approach to security and development to...China has always placed great importance on the relationship between development and security. Since the founding of the People’s Republic in 1949, China has been modifying its approach to security and development to keep pace with domestic and international changes. It has gone through three periods in terms of its approach to development and security—prioritizing security before the launch of the reform and opening-up policy in 1978, prioritizing development between 1978 and the 18th National Congress of the Communist Party of China(CPC), and gradually enhancing both these two imperatives after the 18th CPC National Congress. Currently, with the once-in-a-century global changes and the increase in traditional and non-traditional security threats, China is confronted with unprecedented external challenges. However, its capability to preserve national security still needs improvement. Based on a clear understanding of the situation, the CPC Central Committee with Comrade Xi Jinping at its core has proposed a holistic approach to national security, highlighting “ensuring both development and security” as a guideline for China’s socio-economic development and a major principle underlying the CPC’s governance. Thus, it provides guidance, both in theory and in practice, for pursuing the path of national security with Chinese characteristics.展开更多
Sino-US relations are complex relations with multi-aspects between the two bigcountries in the world. It has three levels: the global level, the Asia-Pacificlevel and the bilateral level. The critical relationship bet...Sino-US relations are complex relations with multi-aspects between the two bigcountries in the world. It has three levels: the global level, the Asia-Pacificlevel and the bilateral level. The critical relationship between China and the US isembodied in the regional and bilateral levels that are more specific and essential.Beyond the field of economy and trade, their relationship is mainly embodied in thestrategic and security field.展开更多
The aim of the study is to examine the technical and security conditions of state vessels traveling to Bushehr ports. This research is filled out through a 22-item questionnaire by 40 security and controlling off...The aim of the study is to examine the technical and security conditions of state vessels traveling to Bushehr ports. This research is filled out through a 22-item questionnaire by 40 security and controlling officers of Bushehrvessels. The results of Kolmogrov-Smirinov test suggest that the data are normal and T-test has been used for questionnaire analysis. The findings indicate that failure in technical and security certificates, failure of qualification certificate, failure of machinery and electrical appliances, structural safety defects, failure of telecommunication equipment, failure of security in under 500 tons motor boats and traditional and metal vessels [1]. As well, above 500 tons vessels traveling to Bushehr waters (state vessels) have suitable conditions.展开更多
Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the...Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT.展开更多
The landscape of cybersecurity is rapidly evolving due to the advancement and integration of Artificial Intelligence (AI) and Machine Learning (ML). This paper explores the crucial role of AI and ML in enhancing cyber...The landscape of cybersecurity is rapidly evolving due to the advancement and integration of Artificial Intelligence (AI) and Machine Learning (ML). This paper explores the crucial role of AI and ML in enhancing cybersecurity defenses against increasingly sophisticated cyber threats, while also highlighting the new vulnerabilities introduced by these technologies. Through a comprehensive analysis that includes historical trends, technological evaluations, and predictive modeling, the dual-edged nature of AI and ML in cybersecurity is examined. Significant challenges such as data privacy, continuous training of AI models, manipulation risks, and ethical concerns are addressed. The paper emphasizes a balanced approach that leverages technological innovation alongside rigorous ethical standards and robust cybersecurity practices. This approach facilitates collaboration among various stakeholders to develop guidelines that ensure responsible and effective use of AI in cybersecurity, aiming to enhance system integrity and privacy without compromising security.展开更多
The discussions of U.S.return to Asia-Pacific unfold more around the state to state relationship,and are lack of studies based on regions.This paper intends to analyze the connections between regional security dilemma...The discussions of U.S.return to Asia-Pacific unfold more around the state to state relationship,and are lack of studies based on regions.This paper intends to analyze the connections between regional security dilemma and regional security ownership,and further examine how it is possible for the United States to return to Asia-Pacific.Although the United States during the early years of the end of the Cold War overlooked the importance of its Asia-Pacific strategy,however,the Asia-Pacific countries in short of consensus on regional security and a post-Cold War extensive security dilemma enable the United States to return to Asia-Pacific,improve and upgrade its U.S.-led regional security system.But,as far as China is concerned,the U.S.return to Asia-Pacific itself is both a challenge and an opportunity.展开更多
The analysis of pesticide residues in Citrus from Yichang, Danjiangkou, Zigui and Xingshan in Hubei Province was accomplished by UPLC-MS and GC-MS. The results showed that the detection rate of pesticide residues in C...The analysis of pesticide residues in Citrus from Yichang, Danjiangkou, Zigui and Xingshan in Hubei Province was accomplished by UPLC-MS and GC-MS. The results showed that the detection rate of pesticide residues in Citrus reticulate was 91.9%. The detection rate of banned pesticides was 1.6%. The detection rate of restricted pesticides was 9.5%. The detection rate of allowed pesticides was 68.3%. The detection rate of unregistered pesticides was 15.9%. The pesticide used in citrus was relatively common. Because of the banned and restricted pesticides were both in the control degree, on the whole, the quality and security of Citrus reticulata was safe.展开更多
1 Introduction The United States,Japan,Canada,the European Union,and other developed countries and regions have all formulated climate strategies and pledged to achieve net-zero CO_(2) emissions by 2050.China,meanwhil...1 Introduction The United States,Japan,Canada,the European Union,and other developed countries and regions have all formulated climate strategies and pledged to achieve net-zero CO_(2) emissions by 2050.China,meanwhile,has announced through the“carbon-peaking and carbon neutrality targets”in September 2020 that it aims to achieve“peak carbon use”by 2030 and“carbon neutrality”by 2060[1].According to statistical data from the International Energy Agency(IEA),Fig.1 illustrates the carbon intensity of electricity generation in various regions in the Announced Pledge Scenario(APS)from 2010 to 2040[2].One can easily observe that each region aims to accomplish a sharp decrease in the carbon intensity of electricity generation after 2020.展开更多
The establishment of an international judicial institution responsible to verify on a case-by-case basis when serious humanitarian crimes would fall within the competence of domestic judicial authorities,and when an i...The establishment of an international judicial institution responsible to verify on a case-by-case basis when serious humanitarian crimes would fall within the competence of domestic judicial authorities,and when an international judiciary would be required is a visible accomplishment advocated for years.The important paradigm shift refers to governing the transitional challenges characterizing massive humanitarian escalations in conflict and post-conflict situations between the responsibility to protect civilians and the fight against the impunity of international crimes.In the current legislation of the UN the civilian protection duties are associated to the maintenance of peace and security and to the right of intervention in the domestic affairs of sovereign States for humanitarian reasons,extending further the reach of a criminal jurisdiction to punish the perpetrators.This has been the case in Darfur,Sudan,and Libya.Both these situations have been referred by the UN Security Council to the International Criminal Court(ICC).From an empirical perspective,it is still not demonstrated whether international criminal justice would have an impact on the maintenance and restoration of international peace and security,while its complementary role with global political regimes is in transition and deserves attention.The questions arising are as follow:how to rely on international criminal justice for the preservation,maintenance,and restoration of peace and security in extreme conflict zones,without solving the governance gaps during mass atrocity escalations characterized by jurisdictional referrals?Is this realistic considering the traditional concept of international security relying on old models of militarization,such as in the case of Libya?Are there political and strategic reasons for a postponement of accountability during such humanitarian interventions?In short,what kind of public authority is desired for the emerging regime of international criminal justice,and how would such tool function in the complexity of international governance?展开更多
In this study, we investigated the performance improvement caused by the addition of copper(Cu)nanoparticles to high-density polyethylene(HDPE) matrix material. Composite materials, with filler percentages of 0.0, 2.0...In this study, we investigated the performance improvement caused by the addition of copper(Cu)nanoparticles to high-density polyethylene(HDPE) matrix material. Composite materials, with filler percentages of 0.0, 2.0, 4.0, 6.0, 8.0, and 10.0 wt% were synthesized through the material extrusion(MEX)3D printing technique. The synthesized nanocomposite filaments were utilized for the manufacturing of specimens suitable for the experimental procedure that followed. Hence, we were able to systematically investigate their tensile, flexural, impact, and microhardness properties through various mechanical tests that were conducted according to the corresponding standards. Broadband Dielectric Spectroscopy was used to investigate the electrical/dielectric properties of the composites. Moreover, by employing means of Raman spectroscopy and thermogravimetric analysis(TGA) we were also able to further investigate their vibrational, structural, and thermal properties. Concomitantly, means of scanning electron microscopy(SEM), as well as atomic force microscopy(AFM), were used for the examination of the morphological and structural characteristics of the synthesized specimens, while energy-dispersive Xray spectroscopy(EDS) was also performed in order to receive a more detailed picture on the structural characteristics of the various synthesized composites. The corresponding nanomaterials were also assessed for their antibacterial properties regarding Staphylococcus aureus(S. aureus) and Escherichia coli(E. coli) with the assistance of a method named screening agar well diffusion. The results showed that the mechanical properties of HDPE benefited from the utilization of Cu as a filler, as they showed a notable improvement. The specimen of HDPE/Cu 4.0 wt% was the one that presented the highest levels of reinforcement in four out of the seven tested mechanical properties(for example, it exhibited a 36.7%improvement in the flexural strength, compared to the pure matrix). At the same time, the nanocomposites were efficient against the S. aureus bacterium and less efficient against the E. coli bacterium.The use of such multi-functional, robust nanocomposites in MEX 3D printing is positively impacting applications in various fields, most notably in the defense and security sectors. The latter becomes increasingly important if one takes into account that most firearms encompass various polymeric parts that require robustness and improved mechanical properties, while at the same time keeping the risk of spreading various infectious microorganisms at a bare minimum.展开更多
The scope of the Internet of Things(IoT)applications varies from strategic applications,such as smart grids,smart transportation,smart security,and smart healthcare,to industrial applications such as smart manufacturi...The scope of the Internet of Things(IoT)applications varies from strategic applications,such as smart grids,smart transportation,smart security,and smart healthcare,to industrial applications such as smart manufacturing,smart logistics,smart banking,and smart insurance.In the advancement of the IoT,connected devices become smart and intelligent with the help of sensors and actuators.However,issues and challenges need to be addressed regarding the data reliability and protection for signicant nextgeneration IoT applications like smart healthcare.For these next-generation applications,there is a requirement for far-reaching privacy and security in the IoT.Recently,blockchain systems have emerged as a key technology that changes the way we exchange data.This emerging technology has revealed encouraging implementation scenarios,such as secured digital currencies.As a technical advancement,the blockchain network has the high possibility of transforming various industries,and the next-generation healthcare IoT(HIoT)can be one of those applications.There have been several studies on the integration of blockchain networks and IoT.However,blockchain-as-autility(BaaU)for privacy and security in HIoT systems requires a systematic framework.This paper reviews blockchain networks and proposes BaaU as one of the enablers.The proposed BaaU-based framework for trustworthiness in the next-generation HIoT systems is divided into two scenarios.The rst scenario suggests that a healthcare service provider integrates IoT sensors such as body sensors to receive and transmit information to a blockchain network on the IoT devices.The second proposed scenario recommends implementing smart contracts,such as Ethereum,to automate and control the trusted devices’subscription in the HIoT services.展开更多
The fifth generation(5G)system is the forthcoming generation of the mobile communication system.It has numerous additional features and offers an extensively high data rate,more capacity,and low latency.However,these ...The fifth generation(5G)system is the forthcoming generation of the mobile communication system.It has numerous additional features and offers an extensively high data rate,more capacity,and low latency.However,these features and applications have many problems and issues in terms of security,which has become a great challenge in the telecommunication industry.This paper aimed to propose a solution to preserve the user identity privacy in the 5G system that can identify permanent identity by using Variable Mobile Subscriber Identity,which randomly changes and does not use the permanent identity between the user equipment and home network.Through this mechanism,the user identity privacy would be secured and hidden.Moreover,it improves the synchronization between mobile users and home networks.Additionally,its compliance with the Authentication and Key Agreement(AKA)structure was adopted in the previous generations.It can be deployed efficiently in the preceding generations because the current architecture imposes minimal modifications on the network parties without changes in the authentication vector’s message size.Moreover,the addition of any hardware to the AKA carries minor adjustments on the network parties.In this paper,the ProVerif is used to verify the proposed scheme.展开更多
The burgeoning advances in machine learning and wireless technologies are forg?ing a new paradigm for future networks, which are expected to possess higher degrees of in?telligence via the inference from vast dataset ...The burgeoning advances in machine learning and wireless technologies are forg?ing a new paradigm for future networks, which are expected to possess higher degrees of in?telligence via the inference from vast dataset and being able to respond to local events in a timely manner. Due to the sheer volume of data generated by end-user devices, as well as the increasing concerns about sharing private information, a new branch of machine learn?ing models, namely federated learning, has emerged from the intersection of artificial intelli?gence and edge computing. In contrast to conventional machine learning methods, federated learning brings the models directly to the device for training, where only the resultant param?eters shall be sent to the edge servers. The local copies of the model on the devices bring along great advantages of eliminating network latency and preserving data privacy. Never?theless, to make federated learning possible, one needs to tackle new challenges that require a fundamental departure from standard methods designed for distributed optimizations. In this paper, we aim to deliver a comprehensive introduction of federated learning. Specifical?ly, we first survey the basis of federated learning, including its learning structure and the distinct features from conventional machine learning models. We then enumerate several critical issues associated with the deployment of federated learning in a wireless network, and show why and how technologies should be jointly integrated to facilitate the full imple?mentation from different perspectives, ranging from algorithmic design, on-device training, to communication resource management. Finally, we conclude by shedding light on some po?tential applications and future trends.展开更多
文摘The third plenary session of the 20th Central Committee of the Communist Party of China(CPC)stressed that,to further deepen reform,we must adhere to systematic thinking and properly handle the relationship between development and security;furthermore,we must achieve positive interplay between high-quality development and high-level security to effectively ensure China's long-term stability.Ensuring both development and security is a major principle underlying the CPC's governance.This principle has been gradually established and enriched in the CPC's struggle to promote socio-economic development and safeguard national security.It is an important component of Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era,encapsulating the worldview and methodology of the CPC's innovative theories in the new era and realizing the dialectical unity of political security and economic security,a people-centered development philosophy and a people-oriented security philosophy,the fundamental approaches to development and the fundamental requirements of security,high-quality development and high-level security,and maintaining the initiative for development and enhancing security preparedness.Since the 18th CPC National Congress,the principle of ensuring both development and security has demonstrated great strength in guiding our thinking and promoting practical creativity,showing that the CPC's understanding of the dialectical relationship between development and security and its capacity to enhance security through development and ensure development through security have reached new heights.
基金supported by the National Natural Science Foundation Innovation Group Project(61521003)。
文摘Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"dark functions"such as system vulnerabilities and backdoors,and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels;rather,it is necessary to develop or utilize the endogenous security functions of the system architecture itself.In addition,this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace,introduces endogenous safety and security mechanisms and characteristics based on dynamic heterogeneous redundancy(DHR)architecture,and describes the theoretical implications of a coding channel based on DHR.
文摘The weighing system designed for large structure object is mainly composed of three parts. The part of hydraulic system is made up of hydraulic cylinders, high pressure hydraulic hoses and electric pumps; the part of computer controlling system comprises pressure sensors, displacement sensors, data acquisitions, RS 485 network and the computer controlling model; the part of loading system is composed of the fulcrum structure and the concrete girder. The measurement principle and composition of the weighing system are discussed in this paper. Credibility and security of the weighing system are fully considered during the design phase. The hydraulic system is controlled by pilot operated check valves in case of the sudden loss of system pressure. The states of all gauges and RS485 network are monitored by computer controlling system functioning in different modules. When the system is running incorrectly, it will be switched to manual mode and give alarm. The finite element method is employed to analyze fulcrum structure so that the system has enough intensity to be lifted. Hence the reliability of the whole system is enhanced.
文摘Important Dates Submission due November 15, 2005 Notification of acceptance December 30, 2005 Camera-ready copy due January 10, 2006 Workshop Scope Intelligence and Security Informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications. The First and Second Symposiums on ISI were held in Tucson,Arizona,in 2003 and 2004,respectively. In 2005,the IEEE International Conference on ISI was held in Atlanta,Georgia. These ISI conferences have brought together academic researchers,law enforcement and intelligence experts,information technology consultant and practitioners to discuss their research and practice related to various ISI topics including ISI data management,data and text mining for ISI applications,terrorism informatics,deception detection,terrorist and criminal social network analysis,crime analysis,monitoring and surveillance,policy studies and evaluation,information assurance,among others. We continue this stream of ISI conferences by organizing the Workshop on Intelligence and Security Informatics (WISI’06) in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD’06). WISI’06 will provide a stimulating forum for ISI researchers in Pacific Asia and other regions of the world to exchange ideas and report research progress. The workshop also welcomes contributions dealing with ISI challenges specific to the Pacific Asian region.
文摘The African economy,with average annual growth of 5%during 1995 to 2014,greatly interests investors but the current security situation hampers regional development and foreign direct investment.Investment in Africa has featured high return and high risk historically,and it remains clear that no single entity can properly solve current security challenges that Africa faces.The moment calls for international joint collaboration and concerted effort on the part of China,the US and African countries.
文摘The United States is launching an all-out crackdown against China in the name of competition,which has posed increasingly severe challenges to development and security in China.The strategic competition between China and the United States is becoming an essential part of once-in-a-century changes that is shaping the world today.Under such circumstances,the Communist Party of China applies a holistic approach to national security,which aims to balance development and security as well as opening up and security.Furthermore,it intends to implement the national rejuvenation strategy within the wider context of once-ina-century global changes.Managing China’s affairs well to achieve a dynamic balance and positive interaction among high-quality development,high-level security,and high-standard opening-up can provide the basis for realizing the rejuvenation of the Chinese nation and response to containment by the United States.While fostering a new development paradigm,China advances scientific and technological innovation and pursues common prosperity.Moreover,it defends national security through firm but flexible struggles and promotes safe development by accelerating domestic circulation.However,China needs to control the costs of its security investment,pay equal attention to the risks and gains brought about by its opening-up policy,and,thus,enhance its capability to compete with the United States in the long term.
文摘China has always placed great importance on the relationship between development and security. Since the founding of the People’s Republic in 1949, China has been modifying its approach to security and development to keep pace with domestic and international changes. It has gone through three periods in terms of its approach to development and security—prioritizing security before the launch of the reform and opening-up policy in 1978, prioritizing development between 1978 and the 18th National Congress of the Communist Party of China(CPC), and gradually enhancing both these two imperatives after the 18th CPC National Congress. Currently, with the once-in-a-century global changes and the increase in traditional and non-traditional security threats, China is confronted with unprecedented external challenges. However, its capability to preserve national security still needs improvement. Based on a clear understanding of the situation, the CPC Central Committee with Comrade Xi Jinping at its core has proposed a holistic approach to national security, highlighting “ensuring both development and security” as a guideline for China’s socio-economic development and a major principle underlying the CPC’s governance. Thus, it provides guidance, both in theory and in practice, for pursuing the path of national security with Chinese characteristics.
文摘Sino-US relations are complex relations with multi-aspects between the two bigcountries in the world. It has three levels: the global level, the Asia-Pacificlevel and the bilateral level. The critical relationship between China and the US isembodied in the regional and bilateral levels that are more specific and essential.Beyond the field of economy and trade, their relationship is mainly embodied in thestrategic and security field.
文摘The aim of the study is to examine the technical and security conditions of state vessels traveling to Bushehr ports. This research is filled out through a 22-item questionnaire by 40 security and controlling officers of Bushehrvessels. The results of Kolmogrov-Smirinov test suggest that the data are normal and T-test has been used for questionnaire analysis. The findings indicate that failure in technical and security certificates, failure of qualification certificate, failure of machinery and electrical appliances, structural safety defects, failure of telecommunication equipment, failure of security in under 500 tons motor boats and traditional and metal vessels [1]. As well, above 500 tons vessels traveling to Bushehr waters (state vessels) have suitable conditions.
基金supported in part by the National Natural Science Foundation of China (62072248, 62072247)the Jiangsu Agriculture Science and Technology Innovation Fund (CX(21)3060)。
文摘Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT.
文摘The landscape of cybersecurity is rapidly evolving due to the advancement and integration of Artificial Intelligence (AI) and Machine Learning (ML). This paper explores the crucial role of AI and ML in enhancing cybersecurity defenses against increasingly sophisticated cyber threats, while also highlighting the new vulnerabilities introduced by these technologies. Through a comprehensive analysis that includes historical trends, technological evaluations, and predictive modeling, the dual-edged nature of AI and ML in cybersecurity is examined. Significant challenges such as data privacy, continuous training of AI models, manipulation risks, and ethical concerns are addressed. The paper emphasizes a balanced approach that leverages technological innovation alongside rigorous ethical standards and robust cybersecurity practices. This approach facilitates collaboration among various stakeholders to develop guidelines that ensure responsible and effective use of AI in cybersecurity, aiming to enhance system integrity and privacy without compromising security.
文摘The discussions of U.S.return to Asia-Pacific unfold more around the state to state relationship,and are lack of studies based on regions.This paper intends to analyze the connections between regional security dilemma and regional security ownership,and further examine how it is possible for the United States to return to Asia-Pacific.Although the United States during the early years of the end of the Cold War overlooked the importance of its Asia-Pacific strategy,however,the Asia-Pacific countries in short of consensus on regional security and a post-Cold War extensive security dilemma enable the United States to return to Asia-Pacific,improve and upgrade its U.S.-led regional security system.But,as far as China is concerned,the U.S.return to Asia-Pacific itself is both a challenge and an opportunity.
基金Supported by Special Funds of National Agricultural product Quality and Safety Risk Assessment(GJFP201600402)Youth Foundation of Hubei Academy of Agricultural Sciences(2015NKYJJ36)~~
文摘The analysis of pesticide residues in Citrus from Yichang, Danjiangkou, Zigui and Xingshan in Hubei Province was accomplished by UPLC-MS and GC-MS. The results showed that the detection rate of pesticide residues in Citrus reticulate was 91.9%. The detection rate of banned pesticides was 1.6%. The detection rate of restricted pesticides was 9.5%. The detection rate of allowed pesticides was 68.3%. The detection rate of unregistered pesticides was 15.9%. The pesticide used in citrus was relatively common. Because of the banned and restricted pesticides were both in the control degree, on the whole, the quality and security of Citrus reticulata was safe.
文摘1 Introduction The United States,Japan,Canada,the European Union,and other developed countries and regions have all formulated climate strategies and pledged to achieve net-zero CO_(2) emissions by 2050.China,meanwhile,has announced through the“carbon-peaking and carbon neutrality targets”in September 2020 that it aims to achieve“peak carbon use”by 2030 and“carbon neutrality”by 2060[1].According to statistical data from the International Energy Agency(IEA),Fig.1 illustrates the carbon intensity of electricity generation in various regions in the Announced Pledge Scenario(APS)from 2010 to 2040[2].One can easily observe that each region aims to accomplish a sharp decrease in the carbon intensity of electricity generation after 2020.
文摘The establishment of an international judicial institution responsible to verify on a case-by-case basis when serious humanitarian crimes would fall within the competence of domestic judicial authorities,and when an international judiciary would be required is a visible accomplishment advocated for years.The important paradigm shift refers to governing the transitional challenges characterizing massive humanitarian escalations in conflict and post-conflict situations between the responsibility to protect civilians and the fight against the impunity of international crimes.In the current legislation of the UN the civilian protection duties are associated to the maintenance of peace and security and to the right of intervention in the domestic affairs of sovereign States for humanitarian reasons,extending further the reach of a criminal jurisdiction to punish the perpetrators.This has been the case in Darfur,Sudan,and Libya.Both these situations have been referred by the UN Security Council to the International Criminal Court(ICC).From an empirical perspective,it is still not demonstrated whether international criminal justice would have an impact on the maintenance and restoration of international peace and security,while its complementary role with global political regimes is in transition and deserves attention.The questions arising are as follow:how to rely on international criminal justice for the preservation,maintenance,and restoration of peace and security in extreme conflict zones,without solving the governance gaps during mass atrocity escalations characterized by jurisdictional referrals?Is this realistic considering the traditional concept of international security relying on old models of militarization,such as in the case of Libya?Are there political and strategic reasons for a postponement of accountability during such humanitarian interventions?In short,what kind of public authority is desired for the emerging regime of international criminal justice,and how would such tool function in the complexity of international governance?
文摘In this study, we investigated the performance improvement caused by the addition of copper(Cu)nanoparticles to high-density polyethylene(HDPE) matrix material. Composite materials, with filler percentages of 0.0, 2.0, 4.0, 6.0, 8.0, and 10.0 wt% were synthesized through the material extrusion(MEX)3D printing technique. The synthesized nanocomposite filaments were utilized for the manufacturing of specimens suitable for the experimental procedure that followed. Hence, we were able to systematically investigate their tensile, flexural, impact, and microhardness properties through various mechanical tests that were conducted according to the corresponding standards. Broadband Dielectric Spectroscopy was used to investigate the electrical/dielectric properties of the composites. Moreover, by employing means of Raman spectroscopy and thermogravimetric analysis(TGA) we were also able to further investigate their vibrational, structural, and thermal properties. Concomitantly, means of scanning electron microscopy(SEM), as well as atomic force microscopy(AFM), were used for the examination of the morphological and structural characteristics of the synthesized specimens, while energy-dispersive Xray spectroscopy(EDS) was also performed in order to receive a more detailed picture on the structural characteristics of the various synthesized composites. The corresponding nanomaterials were also assessed for their antibacterial properties regarding Staphylococcus aureus(S. aureus) and Escherichia coli(E. coli) with the assistance of a method named screening agar well diffusion. The results showed that the mechanical properties of HDPE benefited from the utilization of Cu as a filler, as they showed a notable improvement. The specimen of HDPE/Cu 4.0 wt% was the one that presented the highest levels of reinforcement in four out of the seven tested mechanical properties(for example, it exhibited a 36.7%improvement in the flexural strength, compared to the pure matrix). At the same time, the nanocomposites were efficient against the S. aureus bacterium and less efficient against the E. coli bacterium.The use of such multi-functional, robust nanocomposites in MEX 3D printing is positively impacting applications in various fields, most notably in the defense and security sectors. The latter becomes increasingly important if one takes into account that most firearms encompass various polymeric parts that require robustness and improved mechanical properties, while at the same time keeping the risk of spreading various infectious microorganisms at a bare minimum.
基金supported by the Deanship of Scientic Research(DSR),King Abdulaziz University,Jeddah,under Grant No.RG-2-611-41(A.OA.received the gran)。
文摘The scope of the Internet of Things(IoT)applications varies from strategic applications,such as smart grids,smart transportation,smart security,and smart healthcare,to industrial applications such as smart manufacturing,smart logistics,smart banking,and smart insurance.In the advancement of the IoT,connected devices become smart and intelligent with the help of sensors and actuators.However,issues and challenges need to be addressed regarding the data reliability and protection for signicant nextgeneration IoT applications like smart healthcare.For these next-generation applications,there is a requirement for far-reaching privacy and security in the IoT.Recently,blockchain systems have emerged as a key technology that changes the way we exchange data.This emerging technology has revealed encouraging implementation scenarios,such as secured digital currencies.As a technical advancement,the blockchain network has the high possibility of transforming various industries,and the next-generation healthcare IoT(HIoT)can be one of those applications.There have been several studies on the integration of blockchain networks and IoT.However,blockchain-as-autility(BaaU)for privacy and security in HIoT systems requires a systematic framework.This paper reviews blockchain networks and proposes BaaU as one of the enablers.The proposed BaaU-based framework for trustworthiness in the next-generation HIoT systems is divided into two scenarios.The rst scenario suggests that a healthcare service provider integrates IoT sensors such as body sensors to receive and transmit information to a blockchain network on the IoT devices.The second proposed scenario recommends implementing smart contracts,such as Ethereum,to automate and control the trusted devices’subscription in the HIoT services.
基金The Universiti Kebangsaan Malaysia(UKM)Research Grant Scheme GGPM-2020-028 funded this research.
文摘The fifth generation(5G)system is the forthcoming generation of the mobile communication system.It has numerous additional features and offers an extensively high data rate,more capacity,and low latency.However,these features and applications have many problems and issues in terms of security,which has become a great challenge in the telecommunication industry.This paper aimed to propose a solution to preserve the user identity privacy in the 5G system that can identify permanent identity by using Variable Mobile Subscriber Identity,which randomly changes and does not use the permanent identity between the user equipment and home network.Through this mechanism,the user identity privacy would be secured and hidden.Moreover,it improves the synchronization between mobile users and home networks.Additionally,its compliance with the Authentication and Key Agreement(AKA)structure was adopted in the previous generations.It can be deployed efficiently in the preceding generations because the current architecture imposes minimal modifications on the network parties without changes in the authentication vector’s message size.Moreover,the addition of any hardware to the AKA carries minor adjustments on the network parties.In this paper,the ProVerif is used to verify the proposed scheme.
文摘The burgeoning advances in machine learning and wireless technologies are forg?ing a new paradigm for future networks, which are expected to possess higher degrees of in?telligence via the inference from vast dataset and being able to respond to local events in a timely manner. Due to the sheer volume of data generated by end-user devices, as well as the increasing concerns about sharing private information, a new branch of machine learn?ing models, namely federated learning, has emerged from the intersection of artificial intelli?gence and edge computing. In contrast to conventional machine learning methods, federated learning brings the models directly to the device for training, where only the resultant param?eters shall be sent to the edge servers. The local copies of the model on the devices bring along great advantages of eliminating network latency and preserving data privacy. Never?theless, to make federated learning possible, one needs to tackle new challenges that require a fundamental departure from standard methods designed for distributed optimizations. In this paper, we aim to deliver a comprehensive introduction of federated learning. Specifical?ly, we first survey the basis of federated learning, including its learning structure and the distinct features from conventional machine learning models. We then enumerate several critical issues associated with the deployment of federated learning in a wireless network, and show why and how technologies should be jointly integrated to facilitate the full imple?mentation from different perspectives, ranging from algorithmic design, on-device training, to communication resource management. Finally, we conclude by shedding light on some po?tential applications and future trends.