The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnect...The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnected and reliant on smart digital technologies,the intersection of physical and cyber domains introduces novel security considerations,endangering the entire industrial ecosystem.The transition towards a more cooperative setting,including humans and machines in Industry 5.0,together with the growing intricacy and interconnection of CPSs,presents distinct and diverse security and privacy challenges.In this regard,this study provides a comprehensive review of security and privacy concerns pertaining to CPSs in the context of Industry 5.0.The review commences by providing an outline of the role of CPSs in Industry 5.0 and then proceeds to conduct a thorough review of the different security risks associated with CPSs in the context of Industry 5.0.Afterward,the study also presents the privacy implications inherent in these systems,particularly in light of the massive data collection and processing required.In addition,the paper delineates potential avenues for future research and provides countermeasures to surmount these challenges.Overall,the study underscores the imperative of adopting comprehensive security and privacy strategies within the context of Industry 5.0.展开更多
Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leak...Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leakage.For this reason,this paper discusses the standards for cybersecurity protection,examines the current state of cybersecurity management and the risks faced by cloud platforms,expands the time and space for training on cloud platforms,and provides recommendations for measuring the level of cybersecurity protection within cloud platforms in order to build a solid foundation for them.展开更多
To better improve the electrical safety of buildings and fulfill the role of lightning protection and grounding,this article combines cases and discusses seven aspects of lightning protection devices’construction tec...To better improve the electrical safety of buildings and fulfill the role of lightning protection and grounding,this article combines cases and discusses seven aspects of lightning protection devices’construction technology.These aspects include the lightning protection classification of buildings,air terminals,down conductors,grounding devices,division of lightning protection zones,and lightning electromagnetic pulse shielding.Through the introduction of this article,readers can gain a comprehensive understanding of the application and value of lightning protection grounding construction technology in building electrical installation projects.展开更多
Food security, food safety and environmental protection are major livelihood issues in front of the Chinese people. The priorities of the three are different, and there is mutually dependent and contradictory relation...Food security, food safety and environmental protection are major livelihood issues in front of the Chinese people. The priorities of the three are different, and there is mutually dependent and contradictory relationship among them. Facing the triple pressures of food security, food safety, and environmental protection, this paper analyzes the priority of the three from the historical development, then further analyzes the interaction between food security,food safety and environmental protection and finally puts forward the healthy development of food security, food safety and environmental protection, and the proper settlement of the three problems.展开更多
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the serv...Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.展开更多
The quantity and quality of farmland is the key factor determining grain production capacity, so protecting farmland has become the key to guaranteeing food security. I take Anshan City in Liaoning Province as the stu...The quantity and quality of farmland is the key factor determining grain production capacity, so protecting farmland has become the key to guaranteeing food security. I take Anshan City in Liaoning Province as the study area which has its own particularity in terms of protecting farmland. Based on the prediction of population, coupled with the relevant data concerning farmland area, the per unit area yield of grain, the prediction and analysis of the balance of supply and demand of farmland in Anshan City are conducted. The results show that in the year 2010, the maximum supply amount of farmland that the city can offer is 239 000 hm2, and in the year 2020 the maximum supply amount of farmland that the city can offer will be 238 000 hm2; in the year 2010, the maximum demand amount of farmland is 204 186.02 hm2, and in the year 2020 the maximum supply amount of farmland will be 226 409.61 hm2. So the supply amount of farmland that the city can offer can meet the need of grain production objective. Some problems concerning farmland protection are pointed out in order to provide beneficial exploration of the farmland protection based on the model of food security.展开更多
Nowadays, African cities are subjected to upsets which result from the extraordinary growth of urban populations. The growth of the population of cities has induced some changes in the structure of the activity of tho...Nowadays, African cities are subjected to upsets which result from the extraordinary growth of urban populations. The growth of the population of cities has induced some changes in the structure of the activity of those cities. Agriculture which was formerly confined to the countryside henceforth develops in the urban area and occupies a preponderant place as a strategy of survival, of insertion and of food supplying of the city-dwellers. It has become an activity integrated to the urban tissue through systems of occupying and exploitation of land in the urban area. Population growth (4.81%) between 2002 and 2013 is a critical poverty rate (65%) of the population of Parakou city, entailing a misery perceptible in all its social and economic dimensions. The market-gardening activity has integrated itself to the urban tissue. The objective of this study is to understand how urban agriculture through market-gardening can be a solution for rural farmers who have moved to Parakou city. In this study, documentary research, interviews and field observation are used for data collection. The main results to be signaled among others are: evolution and status of the market-gardening areas in Parakou, the reduction of food insecurity with the permanent availability in quantity and in quality of market-gardening products accessible to the population: the protection of the environment through the drainage of the urban area and the preservation of the diversity of vegetables;the increase of the income of the households of the farmers and the creation of employments.展开更多
Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environm...Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environment of the Oracle production database in China University of Geosciences (Beijing), combined with the practical operation and maintenance experience, this paper provides a design and implementation case of Oracle database security protection system and disaster recovery architecture. The network security protection architecture of the three-layer firewall and fortress machine, the detection and repair of security vulnerabilities, the management of system accounts and permissions, data encryption and database audit constitute the security protection system of the database. Oracle RAC (Real Application Clusters), Oracle DataGuard, redundant backup management and backup recovery constitute the disaster recovery architecture of the database. The case has practical significance for database operation and maintenance management in other colleges and universities.展开更多
In this paper security systems deployed over an area are regarded abstractly as a diagram of security network. We propose the Neyman-Pearson protection model for security systems, which can be used to determine the pr...In this paper security systems deployed over an area are regarded abstractly as a diagram of security network. We propose the Neyman-Pearson protection model for security systems, which can be used to determine the protection probability of a security system and find the weakest breach path of a security network. We present the weakest breach path problem formulation, which is defined by the breach protection probability of an unauthorized target passing through a guard field, and provide a solution for this problem by using the Dijkstra’s shortest path algorithm. Finally we study the variation of the breach protection probability with the change of the parameters of the model.展开更多
This work proposed the application of system engineering methods to identify organizations vital for society, seeking development and well-being. System engineering requires the identification of blocks (or systems), ...This work proposed the application of system engineering methods to identify organizations vital for society, seeking development and well-being. System engineering requires the identification of blocks (or systems), identification of their service functions, identification of states, identification of required quality and identification of constraints. Analyzing modern societies, vital functions were identified and countries behavior was modeled, identifying their states. In this context, nuclear power was found to be fundamental for development and defense because of its inherent advantages for military naval purposes at war. Another striking conclusion is that nuclear power is the best solution for country energy security, more than to avoid climate changes, but to help the nation to resist climate changes. A solution to mitigate the high overnight costs of nuclear power was also proposed. It was demonstrated qualitatively that the adoption of dual purpose mobile nuclear power plants military performances, economic development and risks management.展开更多
COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since Januar...COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since January 24,and China has carried out intensive epidemic control.It is critical for effectively responding to COVID-19 to collect,collate and analyze people’s personal data.What’s more,obtaining identity information,travel records and health information of confirmed cases,suspected cases and close contacts has become a crucial step in epidemic investigation.All regions have made full use of big data to carry out personnel screening,travel records analysis and other related work in epidemic prevention and control,effectively improving the efficiency of epidemic prevention and control.However,data leakage,personnel privacy data exposure,and personal attack frequently occurred in the process of personnel travel records analysis and epidemic prevention and control.It even happened in the WeChat group to forward a person’s name,phone number,address,ID number and other sensitive information.It brought discrimination,telephone and SMS harassment to the parties,which caused great harm to individuals.Based on these,lack of information security and data security awareness and other issues were exposed.Therefore,while big data has been widely concerned and applied,attention should be paid to protecting personal privacy.It is urgent to pay more attention to data privacy and information security in order to effectively protect the legitimate rights of the people.Therefore,measures can be taken to achieve this goal,such as improving the relevant legal system,strengthening technical means to enhance the supervision and management of information security and data protection.展开更多
An attacker has several options for breaking through an organization’s information security protections. Human factors are determined to be the source of some of the worst cyber-attacks every day in every business. T...An attacker has several options for breaking through an organization’s information security protections. Human factors are determined to be the source of some of the worst cyber-attacks every day in every business. The human method, often known as “social engineering”, is the hardest to cope with. This paper examines many types of social engineering. The aim of this study was to ascertain the level of awareness of social engineering, provide appropriate solutions to problems to reduce those engineering risks, and avoid obstacles that could prevent increasing awareness of the dangers of social engineering—Shaqra University (Kingdom of Saudi Arabia). A questionnaire was developed and surveyed 508 employees working at different organizations. The overall Cronbach’s alpha was 0.756, which very good value, the correlation coefficient between each of the items is statistically significant at 0.01 level. The study showed that 63.4% of the surveyed sample had no idea about social engineering. 67.3% of the total samples had no idea about social engineering threats. 42.1% have a weak knowledge of social engineering and only 7.5% of the sample had a good knowledge of social engineering. 64.7% of the male did not know what social engineering is. 68.0% of the administrators did not know what social engineering is. Employees who did not take courses showed statistically significant differences.展开更多
To cope with the challenges of CoViD-19,europe has adopted relevant measures of a data-based approach to governance,on which scholars have huge differences,and the related researches are conducive to further discussio...To cope with the challenges of CoViD-19,europe has adopted relevant measures of a data-based approach to governance,on which scholars have huge differences,and the related researches are conducive to further discussion on the differences.By sorting out the challenges posed by the pandemic to public security and data protection in europe,we can summarize the“european Solution”of the data-based approach to governance,including legislation,instruments,supervision,international cooperation,and continuity.The“Solution”has curbed the spread of the pandemic to a certain extent.However,due to the influence of the traditional values of the EU,the“Solution”is too idealistic in the balance between public security and data protection,which intensifies the dilemma and causes many problems,such as ambiguous legislation,inadequate effectiveness and security of instruments,an arduous endeavor in inter national cooperation,and imperfect regulations on digital green certificates.Therefore,in a major public health crisis,there is still a long way to go in exploring a balance between public security and data protection.展开更多
Exploring highly active and stable transition metal-based bifunctional electrocatalysts has recently attracted extensive research interests for achieving high inherent activity, abundant exposed active sites, rapid ma...Exploring highly active and stable transition metal-based bifunctional electrocatalysts has recently attracted extensive research interests for achieving high inherent activity, abundant exposed active sites, rapid mass transfer, and strong structure stability for overall water splitting. Herein, an interface engineering coupled with shell-protection strategy was applied to construct three-dimensional(3D) core-shell NixSy@MnOxHy heterostructure nanorods grown on nickel foam(NixSy@MnOxHy/NF) as a bifunctional electrocatalyst. NixSy@MnOxHy/NF was synthesized via a facile hydrothermal reaction followed by an electrodeposition process. The X-ray absorption fine structure spectra reveal that abundant Mn-S bonds connect the heterostructure interfaces of N ixSy@MnOxHy, leading to a strong electronic interaction, which improves the intrinsic activities of hydrogen evolution reaction and oxygen evolution reaction(OER). Besides, as an efficient protective shell, the MnOxHy dramatically inhibits the electrochemical corrosion of the electrocatalyst at high current densities, which remarkably enhances the stability at high potentials. Furthermore, the 3D nanorod structure not only exposes enriched active sites, but also accelerates the electrolyte diffusion and bubble desorption. Therefore, NixSy@MnOxHy/NF exhibits exceptional bifunctional activity and stability for overall water splitting, with low overpotentials of 326 and 356 mV for OER at 100 and 500 mA cm^(–2), respectively, along with high stability of 150 h at 100 mA cm^(–2). Furthermore, for overall water splitting, it presents a low cell voltage of 1.529 V at 10 mA cm^(–2), accompanied by excellent stability at 100 mA cm^(–2) for 100 h. This work sheds a light on exploring highly active and stable bifunctional electrocatalysts by the interface engineering coupled with shell-protection strategy.展开更多
With the increase in mining depth, the danger of coal and gas outbursts increases.In order to drain coal gas effectively and to eliminate the risk of coal and gas outbursts, we used a specific number of penetration bo...With the increase in mining depth, the danger of coal and gas outbursts increases.In order to drain coal gas effectively and to eliminate the risk of coal and gas outbursts, we used a specific number of penetration boreholes for draining of pressure relief gas.Based on the principle of overlying strata movement, deformation and pressure relief, a good effect of gas drainage was obtained.The practice in the Panyi coal mine has shown that, after mining the C11coal seam as the protective layer, the relative expansion deformation value of the protected layer C13 reached 2.63%, The permeability coefficient increased 2880 times, the gas drainage rate of the C13 coal seam increased to more than 60%, the amount of gas was reduced from 13.0 to 5.2 m3/t and the gas pressure declined from 4.4 to 0.4 MPa, which caused the danger the outbursts in the coal seams to be eliminated.The result was that we achieved a safe and highly efficient mining operation of the C13 coal seam.展开更多
Reasonable income distribution and eradication of rural poverty are vital for building a moderately prosperous society in all respects in China.This paper primarily examines the income distribution and poverty reducti...Reasonable income distribution and eradication of rural poverty are vital for building a moderately prosperous society in all respects in China.This paper primarily examines the income distribution and poverty reduction effects of social security spending.Market income and redistribution policies are two determinants of income gaps.Based on CHIP2018 household survey data,we find that inadequate income redistribution policies have contributed to yawning income gaps,and that social security spending is more redistributive than personal income tax and social security contributions.After estimating the redistribution effects of social security spending and itemized incomes,we find that pension payments have contributed the most to household income gaps,and that subsistence protection and rural pension payments help improve income distribution.With respect to the poverty reduction effects of social security spending,we have estimated China’s current poverty incidence and the poverty reduction effects of pension payments,healthcare,and educational allowances with CHIP2018 data,and discover that an increase in social security spending may effectively reduce rural poverty.In building a moderately prosperous society in all respects,China should increase social security spending,focusing on specific target groups,and promote the role of social security spending in regulating income distribution and offering social protection to rural residents.展开更多
Medical institution data compliance is an exogenous product of the digital society,serving as a crucial means to maintain and balance the relationship between data protection and data sharing,as well as individual int...Medical institution data compliance is an exogenous product of the digital society,serving as a crucial means to maintain and balance the relationship between data protection and data sharing,as well as individual interests and public interests.The implementation of the Healthy China Initiative greatly benefits from its practical significance.In practice,data from medical institutions takes varied forms,including personally identifiable data collected before diagnosis and treatment,clinical medical data generated during diagnosis and treatment,medical data collected in public health management,and potential medical data generated in daily life.In the new journey of comprehensively promoting the Chinese path to modernization,it is necessary to clarify the shift from an individual-oriented to a societal-oriented value system,highlighting the reinforcing role of the trust concept.Guided by the principle of minimizing data utilization,the focus is on the new developments and changes in medical institution data in the postpandemic era.This involves a series of measures such as fulfilling the obligation of notification and consent,specifying the scope of data collection and usage,strengthening the standardized use of relevant technical measures,and establishing a sound legal responsibility system for data compliance.Through these measures,a flexible and efficient medical institution data compliance system can be constructed.展开更多
In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured pro...In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted.展开更多
In order to effectively solve the problem of copyright protection of materials genome engineering data,this paper proposes a method for copyright protection of materials genome engineering data based on zero-watermark...In order to effectively solve the problem of copyright protection of materials genome engineering data,this paper proposes a method for copyright protection of materials genome engineering data based on zero-watermarking technology.First,the important attribute values are selected from the materials genome engineering database;then,use the method of remainder to group the selected attribute values and extract eigenvalues;then,the eigenvalues sequence is obtained by the majority election method;finally,XOR the sequence with the actual copyright information to obtain the watermarking information and store it in the third-party authentication center.When a copyright dispute requires copyright authentication for the database to be detected.First,the zero-watermarking construction algorithm is used to obtain an eigenvalues sequence;then,this sequence is XORed with the watermarking information stored in the third-party authentication center to obtain copyright information to-be-detected.Finally,the ownership is determined by calculating the similarity between copyright information to-be-detected and copyright information that has practical significance.The experimental result shows that the zero-watermarking method proposed in this paper can effectively resist various common attacks,and can well achieve the copyright protection of material genome engineering database.展开更多
文摘The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnected and reliant on smart digital technologies,the intersection of physical and cyber domains introduces novel security considerations,endangering the entire industrial ecosystem.The transition towards a more cooperative setting,including humans and machines in Industry 5.0,together with the growing intricacy and interconnection of CPSs,presents distinct and diverse security and privacy challenges.In this regard,this study provides a comprehensive review of security and privacy concerns pertaining to CPSs in the context of Industry 5.0.The review commences by providing an outline of the role of CPSs in Industry 5.0 and then proceeds to conduct a thorough review of the different security risks associated with CPSs in the context of Industry 5.0.Afterward,the study also presents the privacy implications inherent in these systems,particularly in light of the massive data collection and processing required.In addition,the paper delineates potential avenues for future research and provides countermeasures to surmount these challenges.Overall,the study underscores the imperative of adopting comprehensive security and privacy strategies within the context of Industry 5.0.
文摘Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leakage.For this reason,this paper discusses the standards for cybersecurity protection,examines the current state of cybersecurity management and the risks faced by cloud platforms,expands the time and space for training on cloud platforms,and provides recommendations for measuring the level of cybersecurity protection within cloud platforms in order to build a solid foundation for them.
文摘To better improve the electrical safety of buildings and fulfill the role of lightning protection and grounding,this article combines cases and discusses seven aspects of lightning protection devices’construction technology.These aspects include the lightning protection classification of buildings,air terminals,down conductors,grounding devices,division of lightning protection zones,and lightning electromagnetic pulse shielding.Through the introduction of this article,readers can gain a comprehensive understanding of the application and value of lightning protection grounding construction technology in building electrical installation projects.
基金one of the research fruits of“A Study of the Public Interest Litigation and Security Mechanism for the Quality and Safety of Agricultural Products”(15BGL135)general project granted by the National Social Sciences Planning Office
文摘Food security, food safety and environmental protection are major livelihood issues in front of the Chinese people. The priorities of the three are different, and there is mutually dependent and contradictory relationship among them. Facing the triple pressures of food security, food safety, and environmental protection, this paper analyzes the priority of the three from the historical development, then further analyzes the interaction between food security,food safety and environmental protection and finally puts forward the healthy development of food security, food safety and environmental protection, and the proper settlement of the three problems.
文摘Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.
文摘The quantity and quality of farmland is the key factor determining grain production capacity, so protecting farmland has become the key to guaranteeing food security. I take Anshan City in Liaoning Province as the study area which has its own particularity in terms of protecting farmland. Based on the prediction of population, coupled with the relevant data concerning farmland area, the per unit area yield of grain, the prediction and analysis of the balance of supply and demand of farmland in Anshan City are conducted. The results show that in the year 2010, the maximum supply amount of farmland that the city can offer is 239 000 hm2, and in the year 2020 the maximum supply amount of farmland that the city can offer will be 238 000 hm2; in the year 2010, the maximum demand amount of farmland is 204 186.02 hm2, and in the year 2020 the maximum supply amount of farmland will be 226 409.61 hm2. So the supply amount of farmland that the city can offer can meet the need of grain production objective. Some problems concerning farmland protection are pointed out in order to provide beneficial exploration of the farmland protection based on the model of food security.
文摘Nowadays, African cities are subjected to upsets which result from the extraordinary growth of urban populations. The growth of the population of cities has induced some changes in the structure of the activity of those cities. Agriculture which was formerly confined to the countryside henceforth develops in the urban area and occupies a preponderant place as a strategy of survival, of insertion and of food supplying of the city-dwellers. It has become an activity integrated to the urban tissue through systems of occupying and exploitation of land in the urban area. Population growth (4.81%) between 2002 and 2013 is a critical poverty rate (65%) of the population of Parakou city, entailing a misery perceptible in all its social and economic dimensions. The market-gardening activity has integrated itself to the urban tissue. The objective of this study is to understand how urban agriculture through market-gardening can be a solution for rural farmers who have moved to Parakou city. In this study, documentary research, interviews and field observation are used for data collection. The main results to be signaled among others are: evolution and status of the market-gardening areas in Parakou, the reduction of food insecurity with the permanent availability in quantity and in quality of market-gardening products accessible to the population: the protection of the environment through the drainage of the urban area and the preservation of the diversity of vegetables;the increase of the income of the households of the farmers and the creation of employments.
文摘Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environment of the Oracle production database in China University of Geosciences (Beijing), combined with the practical operation and maintenance experience, this paper provides a design and implementation case of Oracle database security protection system and disaster recovery architecture. The network security protection architecture of the three-layer firewall and fortress machine, the detection and repair of security vulnerabilities, the management of system accounts and permissions, data encryption and database audit constitute the security protection system of the database. Oracle RAC (Real Application Clusters), Oracle DataGuard, redundant backup management and backup recovery constitute the disaster recovery architecture of the database. The case has practical significance for database operation and maintenance management in other colleges and universities.
文摘In this paper security systems deployed over an area are regarded abstractly as a diagram of security network. We propose the Neyman-Pearson protection model for security systems, which can be used to determine the protection probability of a security system and find the weakest breach path of a security network. We present the weakest breach path problem formulation, which is defined by the breach protection probability of an unauthorized target passing through a guard field, and provide a solution for this problem by using the Dijkstra’s shortest path algorithm. Finally we study the variation of the breach protection probability with the change of the parameters of the model.
文摘This work proposed the application of system engineering methods to identify organizations vital for society, seeking development and well-being. System engineering requires the identification of blocks (or systems), identification of their service functions, identification of states, identification of required quality and identification of constraints. Analyzing modern societies, vital functions were identified and countries behavior was modeled, identifying their states. In this context, nuclear power was found to be fundamental for development and defense because of its inherent advantages for military naval purposes at war. Another striking conclusion is that nuclear power is the best solution for country energy security, more than to avoid climate changes, but to help the nation to resist climate changes. A solution to mitigate the high overnight costs of nuclear power was also proposed. It was demonstrated qualitatively that the adoption of dual purpose mobile nuclear power plants military performances, economic development and risks management.
基金This paper is support by:In 2019,Liaoning Provincial Department of Education Project named“Study on the Path Selection of Rural Revitalization in Ethnic Autonomous Areas of Liaoning Province”The 3rd Azure Talent Project of Dalian Ocean University in 2018+1 种基金In 2019,Liaoning Province’s overseas training project“China-Canada Cooperation Research Plan on Marine Law and Policy”(2019GJWYB019)The Ministry of Education filed the 2017 National and Regional Research Center Project“Northeast Asia Research Center for Marine Law and Policy”(GQ17091).
文摘COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since January 24,and China has carried out intensive epidemic control.It is critical for effectively responding to COVID-19 to collect,collate and analyze people’s personal data.What’s more,obtaining identity information,travel records and health information of confirmed cases,suspected cases and close contacts has become a crucial step in epidemic investigation.All regions have made full use of big data to carry out personnel screening,travel records analysis and other related work in epidemic prevention and control,effectively improving the efficiency of epidemic prevention and control.However,data leakage,personnel privacy data exposure,and personal attack frequently occurred in the process of personnel travel records analysis and epidemic prevention and control.It even happened in the WeChat group to forward a person’s name,phone number,address,ID number and other sensitive information.It brought discrimination,telephone and SMS harassment to the parties,which caused great harm to individuals.Based on these,lack of information security and data security awareness and other issues were exposed.Therefore,while big data has been widely concerned and applied,attention should be paid to protecting personal privacy.It is urgent to pay more attention to data privacy and information security in order to effectively protect the legitimate rights of the people.Therefore,measures can be taken to achieve this goal,such as improving the relevant legal system,strengthening technical means to enhance the supervision and management of information security and data protection.
文摘An attacker has several options for breaking through an organization’s information security protections. Human factors are determined to be the source of some of the worst cyber-attacks every day in every business. The human method, often known as “social engineering”, is the hardest to cope with. This paper examines many types of social engineering. The aim of this study was to ascertain the level of awareness of social engineering, provide appropriate solutions to problems to reduce those engineering risks, and avoid obstacles that could prevent increasing awareness of the dangers of social engineering—Shaqra University (Kingdom of Saudi Arabia). A questionnaire was developed and surveyed 508 employees working at different organizations. The overall Cronbach’s alpha was 0.756, which very good value, the correlation coefficient between each of the items is statistically significant at 0.01 level. The study showed that 63.4% of the surveyed sample had no idea about social engineering. 67.3% of the total samples had no idea about social engineering threats. 42.1% have a weak knowledge of social engineering and only 7.5% of the sample had a good knowledge of social engineering. 64.7% of the male did not know what social engineering is. 68.0% of the administrators did not know what social engineering is. Employees who did not take courses showed statistically significant differences.
基金the phased achievement of the major research project of the National Social Science Fund of China(Project Approval No.21VGQ010)supported by the 2021 Central University Basic Scientific Research Project of Lanzhou University(Project Approval No.21lzujbkyjd002).
文摘To cope with the challenges of CoViD-19,europe has adopted relevant measures of a data-based approach to governance,on which scholars have huge differences,and the related researches are conducive to further discussion on the differences.By sorting out the challenges posed by the pandemic to public security and data protection in europe,we can summarize the“european Solution”of the data-based approach to governance,including legislation,instruments,supervision,international cooperation,and continuity.The“Solution”has curbed the spread of the pandemic to a certain extent.However,due to the influence of the traditional values of the EU,the“Solution”is too idealistic in the balance between public security and data protection,which intensifies the dilemma and causes many problems,such as ambiguous legislation,inadequate effectiveness and security of instruments,an arduous endeavor in inter national cooperation,and imperfect regulations on digital green certificates.Therefore,in a major public health crisis,there is still a long way to go in exploring a balance between public security and data protection.
基金supported by the Guangdong Basic and Applied Basic Research Foundation(2021A1515110859)the Research Fund Program of Key Laboratory of Fuel Cell Technology of Guangdong Province+2 种基金the Natural Sciences and Engineering Research Council of Canada(NSERC)Institut National de la Recherche Scientifique(INRS)。
文摘Exploring highly active and stable transition metal-based bifunctional electrocatalysts has recently attracted extensive research interests for achieving high inherent activity, abundant exposed active sites, rapid mass transfer, and strong structure stability for overall water splitting. Herein, an interface engineering coupled with shell-protection strategy was applied to construct three-dimensional(3D) core-shell NixSy@MnOxHy heterostructure nanorods grown on nickel foam(NixSy@MnOxHy/NF) as a bifunctional electrocatalyst. NixSy@MnOxHy/NF was synthesized via a facile hydrothermal reaction followed by an electrodeposition process. The X-ray absorption fine structure spectra reveal that abundant Mn-S bonds connect the heterostructure interfaces of N ixSy@MnOxHy, leading to a strong electronic interaction, which improves the intrinsic activities of hydrogen evolution reaction and oxygen evolution reaction(OER). Besides, as an efficient protective shell, the MnOxHy dramatically inhibits the electrochemical corrosion of the electrocatalyst at high current densities, which remarkably enhances the stability at high potentials. Furthermore, the 3D nanorod structure not only exposes enriched active sites, but also accelerates the electrolyte diffusion and bubble desorption. Therefore, NixSy@MnOxHy/NF exhibits exceptional bifunctional activity and stability for overall water splitting, with low overpotentials of 326 and 356 mV for OER at 100 and 500 mA cm^(–2), respectively, along with high stability of 150 h at 100 mA cm^(–2). Furthermore, for overall water splitting, it presents a low cell voltage of 1.529 V at 10 mA cm^(–2), accompanied by excellent stability at 100 mA cm^(–2) for 100 h. This work sheds a light on exploring highly active and stable bifunctional electrocatalysts by the interface engineering coupled with shell-protection strategy.
基金Projects 2005CB221503 supported by the National Basic Research Program of China70533050 and 50674089 by the National Natural Science Foundationof China
文摘With the increase in mining depth, the danger of coal and gas outbursts increases.In order to drain coal gas effectively and to eliminate the risk of coal and gas outbursts, we used a specific number of penetration boreholes for draining of pressure relief gas.Based on the principle of overlying strata movement, deformation and pressure relief, a good effect of gas drainage was obtained.The practice in the Panyi coal mine has shown that, after mining the C11coal seam as the protective layer, the relative expansion deformation value of the protected layer C13 reached 2.63%, The permeability coefficient increased 2880 times, the gas drainage rate of the C13 coal seam increased to more than 60%, the amount of gas was reduced from 13.0 to 5.2 m3/t and the gas pressure declined from 4.4 to 0.4 MPa, which caused the danger the outbursts in the coal seams to be eliminated.The result was that we achieved a safe and highly efficient mining operation of the C13 coal seam.
文摘Reasonable income distribution and eradication of rural poverty are vital for building a moderately prosperous society in all respects in China.This paper primarily examines the income distribution and poverty reduction effects of social security spending.Market income and redistribution policies are two determinants of income gaps.Based on CHIP2018 household survey data,we find that inadequate income redistribution policies have contributed to yawning income gaps,and that social security spending is more redistributive than personal income tax and social security contributions.After estimating the redistribution effects of social security spending and itemized incomes,we find that pension payments have contributed the most to household income gaps,and that subsistence protection and rural pension payments help improve income distribution.With respect to the poverty reduction effects of social security spending,we have estimated China’s current poverty incidence and the poverty reduction effects of pension payments,healthcare,and educational allowances with CHIP2018 data,and discover that an increase in social security spending may effectively reduce rural poverty.In building a moderately prosperous society in all respects,China should increase social security spending,focusing on specific target groups,and promote the role of social security spending in regulating income distribution and offering social protection to rural residents.
文摘Medical institution data compliance is an exogenous product of the digital society,serving as a crucial means to maintain and balance the relationship between data protection and data sharing,as well as individual interests and public interests.The implementation of the Healthy China Initiative greatly benefits from its practical significance.In practice,data from medical institutions takes varied forms,including personally identifiable data collected before diagnosis and treatment,clinical medical data generated during diagnosis and treatment,medical data collected in public health management,and potential medical data generated in daily life.In the new journey of comprehensively promoting the Chinese path to modernization,it is necessary to clarify the shift from an individual-oriented to a societal-oriented value system,highlighting the reinforcing role of the trust concept.Guided by the principle of minimizing data utilization,the focus is on the new developments and changes in medical institution data in the postpandemic era.This involves a series of measures such as fulfilling the obligation of notification and consent,specifying the scope of data collection and usage,strengthening the standardized use of relevant technical measures,and establishing a sound legal responsibility system for data compliance.Through these measures,a flexible and efficient medical institution data compliance system can be constructed.
基金supported by National Science and Technology Major Project under Grant No.2012ZX03002003Funds of Key Lab of Fujian Province University Network Security and Cryptology under Grant No.2011009Open Research Project of State Key Laboratory of Information Security in Institute of Software,Chinese Academy of Sciences
文摘In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted.
基金This work is supported by Foundation of Beijing Key Laboratory of Internet Culture and Digital Dissemination Research No.ICDDXN004Foundation of Beijing Advanced Innovation Center for Materials Genome Engineering.
文摘In order to effectively solve the problem of copyright protection of materials genome engineering data,this paper proposes a method for copyright protection of materials genome engineering data based on zero-watermarking technology.First,the important attribute values are selected from the materials genome engineering database;then,use the method of remainder to group the selected attribute values and extract eigenvalues;then,the eigenvalues sequence is obtained by the majority election method;finally,XOR the sequence with the actual copyright information to obtain the watermarking information and store it in the third-party authentication center.When a copyright dispute requires copyright authentication for the database to be detected.First,the zero-watermarking construction algorithm is used to obtain an eigenvalues sequence;then,this sequence is XORed with the watermarking information stored in the third-party authentication center to obtain copyright information to-be-detected.Finally,the ownership is determined by calculating the similarity between copyright information to-be-detected and copyright information that has practical significance.The experimental result shows that the zero-watermarking method proposed in this paper can effectively resist various common attacks,and can well achieve the copyright protection of material genome engineering database.