The longitudinal range-gorge region (LRGR) in Southwestern China, characterized by longitudinal mountain ranges and deep valleys, includes the basins of four major international rivers: the Yuanjiang-Red, Lancang Meko...The longitudinal range-gorge region (LRGR) in Southwestern China, characterized by longitudinal mountain ranges and deep valleys, includes the basins of four major international rivers: the Yuanjiang-Red, Lancang Mekong, Nujiang Salween and Irrawaddy. This region is classified as one of the world’s biodiversity hotspots, and provides an important ecological and economic corridor linking China and Southeast Asian countries. Over the past half century, it has served as a resource base for timber and minerals needed to fuel economic development, which resulted in rapid and drastic changes in ecosystem and species diversity. Proposed and ongoing development programs, such as China’s Great Western Development campaign, Greater Mekong Subregional Economic Cooperation (GMS) and China-ASEAN free trade zone development (“10+1”), threaten to bring unprecedented disturbance to the region’s ecosystems. Present and emerging threats to eco-security have caught tremendous attention worldwide. Therefore, studies on such problems are critical for enhancing ecosystem health and transboundary eco-security. This paper indicates several multi-disciplinary and cross-sector studies on transboundary resources in this region that will meet three major national needs: 1) identifying core scientific issues of ecological development and infrastructure construction in highplateau and mountainous areas for the Western Development campaign; 2) developing maintenance mechanisms and control methodologies for transboundary eco-security and resource base development; 3) providing scientific grounds for multi-lateral diplomacy, trade and economic cooperation, and conflict resolution as part of China’s opening-up to south Asia. The key subjects to be solved include dynamics and major drive forces of this area, ecological effects caused by major projects construction, and transboundary eco-security and its controlling. The research projects proposed in this article will develop theories on ecosystem change and transboundary eco-security, and provide a scientific basis for national and international development strategies.展开更多
Ecological security of tourism destination is an important factor for the sustainable development of tourism industry, and many tourism destinations are threatened by various ecological problems. A complete understand...Ecological security of tourism destination is an important factor for the sustainable development of tourism industry, and many tourism destinations are threatened by various ecological problems. A complete understanding of eco-security situation is the foundation of maintaining sustainable development for tourism destinations. However, study on tourism destination eco-security has remained in the initial stage, based on domestic and international researches, the connotations and dynamic characteristics of tourism destination eco-security were discussed. Then, evaluation method of tourism destination eco-security and standard system were proposed, also dynamic evaluation method of tourism destination eco-safety based on the situation evaluation and trend was analyzed.展开更多
In this paper, we consider the secure data transmission over α-η-κ-μ fading channels, which are recently proposed to encompass nearly all the well-known statistical models adopted in the literature. In particular,...In this paper, we consider the secure data transmission over α-η-κ-μ fading channels, which are recently proposed to encompass nearly all the well-known statistical models adopted in the literature. In particular, we address the secrecy performance in terms of the average secrecy capacity(ASC) and the secrecy outage probability(SOP), for which novel analytical expressions are derived. Simulation results verify the analysis and demonstrate the impact of the physical parameters on the secrecy performance of this new channel fading model.展开更多
In this paper, systematic design and act of eco-security is discussed as a focal point of conflict and unrest. The situation of ecosystem, the schematic framework of eco-security design, the main acts of ecosystem imp...In this paper, systematic design and act of eco-security is discussed as a focal point of conflict and unrest. The situation of ecosystem, the schematic framework of eco-security design, the main acts of ecosystem improvement, major difficulties and challenges have also been analyzed. The purpose of this study was to formulate the systematic framework of eco-security maintenance, to highlight systematic idea or philosophy of ecological rehabilitation and eco-security. A three-dimensional schematic model is applied to design the security of ecosystem. It was concluded that: 1) maintaining ecological security requires far better and sophisticated resource management skill and ecological improvement measures, and is also a continuing and multifac-eted task. It cannot be permanently accomplished by a single action and program; 2) at present, technical system and policy and law system dimensions of ecological security are not enough even in short; 3) development of ecological industries is beneficial to local economic development and ecosystem protection.展开更多
Background: The department of defense's field manual(FM) 3-11 is among the military's field manuals for preparing for, reacting to and recovering from chemical, biological, radiological and nuclear attacks. Si...Background: The department of defense's field manual(FM) 3-11 is among the military's field manuals for preparing for, reacting to and recovering from chemical, biological, radiological and nuclear attacks. Since post 9-11, U.S. military service members have been deployed in the global war on terrorism. This study attempted to determine the effectiveness of the FM 3-11 in detecting, deterring or preventing a human-borne with bioagent(HBBA) terrorist breach at an entry control point(ECP).Methods: This time-specific, cross-sectional study disseminated a validated survey tool with Cronbach's α>0.82 to respondents who have had antiterrorism training and combat ECP experience. The return rate was greater than 75.0%; however, many of the respondents failed to meet the inclusion criteria. Consequently, only 26 questionnaires were included in the sample.Results: The results revealed that while over 60.0% of the respondents either strongly agreed or agreed that biointelligence, the deployment of biodetectors and the use of biowarning systems could be effective in preventing an ECP breach by a terrorist with a bioagent, the use of protective equipment and immunization to decontaminate service members or other tactics, techniques and procedures(TTPs) would never prevent a breach. A large percentage of respondents claimed that soldiers at the ECP lacked the devices or the knowledge to detect an HBBA at an ECP, and 72.0% suggested modifying current ECP TTPs to include education, training and equipment for security personnel at military base ECPs.Conclusion: If obtained from appropriate sources and communicated to the personnel at the ECP in an effective or timely manner, the possible effectiveness of certain TTPs in the FM 3-11, specifically FM 3-11.86(intelligence), might increase.展开更多
The effects of scatterers, fluctuation parameter and propagation clusters significantly affect the performance of κ-μ shadowed fading channel. On the other hand, opportunistic relaying is an efficient technique to i...The effects of scatterers, fluctuation parameter and propagation clusters significantly affect the performance of κ-μ shadowed fading channel. On the other hand, opportunistic relaying is an efficient technique to improve the performance of fading channels reducing the effects of aforementioned parameters. Motivated by these issues, in this paper, a secure wireless multicasting scenario through κ-μ shadowed fading channel is considered in the presence of multiple eavesdroppers with opportunistic relaying. The main purpose of this paper is to ensure the security level in wireless multicasting compensating the loss of security due to the effects of power ratio between dominant and scattered waves, fluctuation parameter, and the number of propagation clusters, multicast users and eavesdroppers, by opportunistic relaying technique. The closed-form analytical expressions are derived for the probability of non-zero secrecy multicast capacity (PNSMC) and the secure outage probability for multicasting (SOPM) to understand the insight of the effects of above parameters. The results show that the loss of security in multicasting through κ-μ shadowed fading channel can be significantly enhanced using opportunistic relaying technique by compensating the effects of scatterers, fluctuation parameter, and the number of propagation clusters, multicast users and eavesdroppers.展开更多
Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publicati...Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publication base as an effective solution. The NIST Special Publication 800-66 Revision 1 was an essential standard in US healthcare, which was withdrawn in February 2024 and superseded by SP 800-66 Revision 2. This review investigates the academic papers concerning the application of the NIST SP 800-66 Revision 1 standard in the US healthcare literature. A systematic review method was used in this study to determine current knowledge gaps of the SP 800-66 Revision 1. Some limitations were employed in the search to enforce validity. A total of eleven articles were found eligible for the study. Consequently, this study suggests the necessity for additional academic papers pertaining to SP 800-66 Revision 2 in the US healthcare literature. In turn, it will enhance awareness of safeguarding electronic protected health information (ePHI), help to mitigate potential future risks, and eventually reduce breaches.展开更多
Anatomical details are given in this article, which is performed by investigating the relationship between through the frangibility of mountain eco-environment and the status of irrational land-use in typical region o...Anatomical details are given in this article, which is performed by investigating the relationship between through the frangibility of mountain eco-environment and the status of irrational land-use in typical region of debris flow in Dongchuan district, Kunming city, yunnan Province. This analysis is extended to the relationship between vicissitude of mountain disasters and the frangibility of mountain environment. The relatively coupling action of a vicious circle is a evolving characteristic by debris flow sand-gravel there. The eco-security is being faced with serious challenge. The tactics of eco-security has been constructed since 1980s. Thus, the eco-environrnent can gradually be repaired and optimized to achieve a fine circle.展开更多
A serious sandstorm occurred in North China from April 5 to April 7, 2000, while the remote smallsand decending took place in even larger area to the far northeast China. In Chanchun city, smallsand descending with sn...A serious sandstorm occurred in North China from April 5 to April 7, 2000, while the remote smallsand decending took place in even larger area to the far northeast China. In Chanchun city, smallsand descending with snow provides the best samples to conduct a quantitative research on the possible impacts of city - ecology. In the 253km2 urban district area of Changchun city, smallsands accumulated up to more than 3000t on April 7, according to the calculation of four "mud - snow" samples. After naturally melting in room temperature, two samples are taken to do quarantine of "invasion bacteria". As a preliminary result, the individual amount of bacterium in 1 ml sample water is up to 8. 9 x 104 or 1. 05 x 105, and it is estimated that there are 640 million "invasion bacterium" individuals in one square meter. This study proves that other than the obvious environmental effects of sandstorm, the urban micro - ecosystem is very possible under threat by the "invasion bacterium" accompanied by remote descending smallsand.展开更多
In December 2015,the Central Rural Work Conference put forward the structural reform of agricultural supply side,to ensure the national food security. At present,China's grain production is increasing,the supply a...In December 2015,the Central Rural Work Conference put forward the structural reform of agricultural supply side,to ensure the national food security. At present,China's grain production is increasing,the supply and demand structure of grain market is not balanced,and the ineffective supply due to the lack of market supply and demand has caused the problem of structural surplus and structural shortage.And price and quality difference of domestic and international grain is obvious,and the agricultural products in China are overstock,so the reform of agricultural supply side based on food security must be implemented. To adjust structure,reduce stock,reduce cost,increase quality,promote the primary,secondary and tertiary industries convergence will become the focus of China's agricultural supply side structural reform,and we can develop the ecological agriculture,improve the competitiveness of the grain market in price and quality,to ensure food security for the nation.展开更多
在人类活动导致的生态环境问题中,土地利用格局变化对区域生态安全起着决定性作用。选择我国乃至在世界上都罕见的多沙、粗沙、强烈水土流失的黄河皇甫川流域作为研究区域,针对土壤侵蚀和生态用水这两大影响流域生态安全的关键问题,开...在人类活动导致的生态环境问题中,土地利用格局变化对区域生态安全起着决定性作用。选择我国乃至在世界上都罕见的多沙、粗沙、强烈水土流失的黄河皇甫川流域作为研究区域,针对土壤侵蚀和生态用水这两大影响流域生态安全的关键问题,开展土地利用变化模拟、土壤侵蚀3S监测、适宜植被盖度估算、土壤侵蚀情景模拟、土地利用格局优化等方面的综合研究。结果表明:(1)土地利用格局变化是导致土壤侵蚀变化的重要因素。从1987年到2015年,建筑用地、林地和灌丛面积增加,水域、沙地和裸砒砂岩面积减少,导致流域年平均土壤侵蚀模数由16160.72 t km-2a-1降至9710.72 t km-2a-1。(2)土地利用类型与土壤侵蚀模数密切相关并存在一定规律。6种不同土地利用类型多年平均土壤侵蚀模数的大小顺序为:裸砒砂岩>沙地>耕地>草地>林地>灌丛,表明灌、林措施是流域植被恢复和土壤侵蚀减少的首选。(3)土地利用结构和空间格局优化有助于提升区域生态安全水平。在优化格局下,2007年和2015年土壤侵蚀模数比优化前分别减少5469.57 t km-2a-1和5432.77 t km-2a-1,优化后2015年土壤侵蚀模数仅为4277.95 t km-2a-1,低于流域自然侵蚀临界值或允许土壤侵蚀模数5300 t km-2a-1,优化土地利用格局成为加强流域生态环境建设的重要途径。展开更多
文摘The longitudinal range-gorge region (LRGR) in Southwestern China, characterized by longitudinal mountain ranges and deep valleys, includes the basins of four major international rivers: the Yuanjiang-Red, Lancang Mekong, Nujiang Salween and Irrawaddy. This region is classified as one of the world’s biodiversity hotspots, and provides an important ecological and economic corridor linking China and Southeast Asian countries. Over the past half century, it has served as a resource base for timber and minerals needed to fuel economic development, which resulted in rapid and drastic changes in ecosystem and species diversity. Proposed and ongoing development programs, such as China’s Great Western Development campaign, Greater Mekong Subregional Economic Cooperation (GMS) and China-ASEAN free trade zone development (“10+1”), threaten to bring unprecedented disturbance to the region’s ecosystems. Present and emerging threats to eco-security have caught tremendous attention worldwide. Therefore, studies on such problems are critical for enhancing ecosystem health and transboundary eco-security. This paper indicates several multi-disciplinary and cross-sector studies on transboundary resources in this region that will meet three major national needs: 1) identifying core scientific issues of ecological development and infrastructure construction in highplateau and mountainous areas for the Western Development campaign; 2) developing maintenance mechanisms and control methodologies for transboundary eco-security and resource base development; 3) providing scientific grounds for multi-lateral diplomacy, trade and economic cooperation, and conflict resolution as part of China’s opening-up to south Asia. The key subjects to be solved include dynamics and major drive forces of this area, ecological effects caused by major projects construction, and transboundary eco-security and its controlling. The research projects proposed in this article will develop theories on ecosystem change and transboundary eco-security, and provide a scientific basis for national and international development strategies.
基金Supported by Project of National Key Technology R & D (2012BAC16B04)
文摘Ecological security of tourism destination is an important factor for the sustainable development of tourism industry, and many tourism destinations are threatened by various ecological problems. A complete understanding of eco-security situation is the foundation of maintaining sustainable development for tourism destinations. However, study on tourism destination eco-security has remained in the initial stage, based on domestic and international researches, the connotations and dynamic characteristics of tourism destination eco-security were discussed. Then, evaluation method of tourism destination eco-security and standard system were proposed, also dynamic evaluation method of tourism destination eco-safety based on the situation evaluation and trend was analyzed.
基金supported by the Fundamental Research Funds for the Center University of China under Grant HIT. MKSTISP. 2016 13
文摘In this paper, we consider the secure data transmission over α-η-κ-μ fading channels, which are recently proposed to encompass nearly all the well-known statistical models adopted in the literature. In particular, we address the secrecy performance in terms of the average secrecy capacity(ASC) and the secrecy outage probability(SOP), for which novel analytical expressions are derived. Simulation results verify the analysis and demonstrate the impact of the physical parameters on the secrecy performance of this new channel fading model.
基金Supported by china's National Key Technologies ReserchDevelopement Program in the 10th Five-Year Plan(2001BA901A40)
文摘In this paper, systematic design and act of eco-security is discussed as a focal point of conflict and unrest. The situation of ecosystem, the schematic framework of eco-security design, the main acts of ecosystem improvement, major difficulties and challenges have also been analyzed. The purpose of this study was to formulate the systematic framework of eco-security maintenance, to highlight systematic idea or philosophy of ecological rehabilitation and eco-security. A three-dimensional schematic model is applied to design the security of ecosystem. It was concluded that: 1) maintaining ecological security requires far better and sophisticated resource management skill and ecological improvement measures, and is also a continuing and multifac-eted task. It cannot be permanently accomplished by a single action and program; 2) at present, technical system and policy and law system dimensions of ecological security are not enough even in short; 3) development of ecological industries is beneficial to local economic development and ecosystem protection.
文摘Background: The department of defense's field manual(FM) 3-11 is among the military's field manuals for preparing for, reacting to and recovering from chemical, biological, radiological and nuclear attacks. Since post 9-11, U.S. military service members have been deployed in the global war on terrorism. This study attempted to determine the effectiveness of the FM 3-11 in detecting, deterring or preventing a human-borne with bioagent(HBBA) terrorist breach at an entry control point(ECP).Methods: This time-specific, cross-sectional study disseminated a validated survey tool with Cronbach's α>0.82 to respondents who have had antiterrorism training and combat ECP experience. The return rate was greater than 75.0%; however, many of the respondents failed to meet the inclusion criteria. Consequently, only 26 questionnaires were included in the sample.Results: The results revealed that while over 60.0% of the respondents either strongly agreed or agreed that biointelligence, the deployment of biodetectors and the use of biowarning systems could be effective in preventing an ECP breach by a terrorist with a bioagent, the use of protective equipment and immunization to decontaminate service members or other tactics, techniques and procedures(TTPs) would never prevent a breach. A large percentage of respondents claimed that soldiers at the ECP lacked the devices or the knowledge to detect an HBBA at an ECP, and 72.0% suggested modifying current ECP TTPs to include education, training and equipment for security personnel at military base ECPs.Conclusion: If obtained from appropriate sources and communicated to the personnel at the ECP in an effective or timely manner, the possible effectiveness of certain TTPs in the FM 3-11, specifically FM 3-11.86(intelligence), might increase.
文摘The effects of scatterers, fluctuation parameter and propagation clusters significantly affect the performance of κ-μ shadowed fading channel. On the other hand, opportunistic relaying is an efficient technique to improve the performance of fading channels reducing the effects of aforementioned parameters. Motivated by these issues, in this paper, a secure wireless multicasting scenario through κ-μ shadowed fading channel is considered in the presence of multiple eavesdroppers with opportunistic relaying. The main purpose of this paper is to ensure the security level in wireless multicasting compensating the loss of security due to the effects of power ratio between dominant and scattered waves, fluctuation parameter, and the number of propagation clusters, multicast users and eavesdroppers, by opportunistic relaying technique. The closed-form analytical expressions are derived for the probability of non-zero secrecy multicast capacity (PNSMC) and the secure outage probability for multicasting (SOPM) to understand the insight of the effects of above parameters. The results show that the loss of security in multicasting through κ-μ shadowed fading channel can be significantly enhanced using opportunistic relaying technique by compensating the effects of scatterers, fluctuation parameter, and the number of propagation clusters, multicast users and eavesdroppers.
文摘Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publication base as an effective solution. The NIST Special Publication 800-66 Revision 1 was an essential standard in US healthcare, which was withdrawn in February 2024 and superseded by SP 800-66 Revision 2. This review investigates the academic papers concerning the application of the NIST SP 800-66 Revision 1 standard in the US healthcare literature. A systematic review method was used in this study to determine current knowledge gaps of the SP 800-66 Revision 1. Some limitations were employed in the search to enforce validity. A total of eleven articles were found eligible for the study. Consequently, this study suggests the necessity for additional academic papers pertaining to SP 800-66 Revision 2 in the US healthcare literature. In turn, it will enhance awareness of safeguarding electronic protected health information (ePHI), help to mitigate potential future risks, and eventually reduce breaches.
基金the National Natural Science Foundation of China (40671026)
文摘Anatomical details are given in this article, which is performed by investigating the relationship between through the frangibility of mountain eco-environment and the status of irrational land-use in typical region of debris flow in Dongchuan district, Kunming city, yunnan Province. This analysis is extended to the relationship between vicissitude of mountain disasters and the frangibility of mountain environment. The relatively coupling action of a vicious circle is a evolving characteristic by debris flow sand-gravel there. The eco-security is being faced with serious challenge. The tactics of eco-security has been constructed since 1980s. Thus, the eco-environrnent can gradually be repaired and optimized to achieve a fine circle.
文摘A serious sandstorm occurred in North China from April 5 to April 7, 2000, while the remote smallsand decending took place in even larger area to the far northeast China. In Chanchun city, smallsand descending with snow provides the best samples to conduct a quantitative research on the possible impacts of city - ecology. In the 253km2 urban district area of Changchun city, smallsands accumulated up to more than 3000t on April 7, according to the calculation of four "mud - snow" samples. After naturally melting in room temperature, two samples are taken to do quarantine of "invasion bacteria". As a preliminary result, the individual amount of bacterium in 1 ml sample water is up to 8. 9 x 104 or 1. 05 x 105, and it is estimated that there are 640 million "invasion bacterium" individuals in one square meter. This study proves that other than the obvious environmental effects of sandstorm, the urban micro - ecosystem is very possible under threat by the "invasion bacterium" accompanied by remote descending smallsand.
基金Supported by Humanities and Social Sciences Planning Project of the Ministry of Education(16YJA790014)
文摘In December 2015,the Central Rural Work Conference put forward the structural reform of agricultural supply side,to ensure the national food security. At present,China's grain production is increasing,the supply and demand structure of grain market is not balanced,and the ineffective supply due to the lack of market supply and demand has caused the problem of structural surplus and structural shortage.And price and quality difference of domestic and international grain is obvious,and the agricultural products in China are overstock,so the reform of agricultural supply side based on food security must be implemented. To adjust structure,reduce stock,reduce cost,increase quality,promote the primary,secondary and tertiary industries convergence will become the focus of China's agricultural supply side structural reform,and we can develop the ecological agriculture,improve the competitiveness of the grain market in price and quality,to ensure food security for the nation.
文摘在人类活动导致的生态环境问题中,土地利用格局变化对区域生态安全起着决定性作用。选择我国乃至在世界上都罕见的多沙、粗沙、强烈水土流失的黄河皇甫川流域作为研究区域,针对土壤侵蚀和生态用水这两大影响流域生态安全的关键问题,开展土地利用变化模拟、土壤侵蚀3S监测、适宜植被盖度估算、土壤侵蚀情景模拟、土地利用格局优化等方面的综合研究。结果表明:(1)土地利用格局变化是导致土壤侵蚀变化的重要因素。从1987年到2015年,建筑用地、林地和灌丛面积增加,水域、沙地和裸砒砂岩面积减少,导致流域年平均土壤侵蚀模数由16160.72 t km-2a-1降至9710.72 t km-2a-1。(2)土地利用类型与土壤侵蚀模数密切相关并存在一定规律。6种不同土地利用类型多年平均土壤侵蚀模数的大小顺序为:裸砒砂岩>沙地>耕地>草地>林地>灌丛,表明灌、林措施是流域植被恢复和土壤侵蚀减少的首选。(3)土地利用结构和空间格局优化有助于提升区域生态安全水平。在优化格局下,2007年和2015年土壤侵蚀模数比优化前分别减少5469.57 t km-2a-1和5432.77 t km-2a-1,优化后2015年土壤侵蚀模数仅为4277.95 t km-2a-1,低于流域自然侵蚀临界值或允许土壤侵蚀模数5300 t km-2a-1,优化土地利用格局成为加强流域生态环境建设的重要途径。